42 research outputs found

    Using Replication and Partitioning to Build Secure Distributed Systems

    Get PDF
    A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. This paper describes a way to enforce policies for data confidentiality and integrity in such an environment. Programs annotated with security specifications are statically checked and then transformed by the compiler to run securely on a distributed system with untrusted hosts. The code and data of the computation are partitioned across the available hosts in accordance with the security specification. The key contribution is automatic replication of code and data to increase assurance of integrity—without harming confidentiality, and without placing undue trust in any host. The compiler automatically generates secure run-time protocols for communication among the replicated code partitions. Results are given from a prototype implementation applied to various distributed programs

    Gravitating discs around black holes

    Full text link
    Fluid discs and tori around black holes are discussed within different approaches and with the emphasis on the role of disc gravity. First reviewed are the prospects of investigating the gravitational field of a black hole--disc system by analytical solutions of stationary, axially symmetric Einstein's equations. Then, more detailed considerations are focused to middle and outer parts of extended disc-like configurations where relativistic effects are small and the Newtonian description is adequate. Within general relativity, only a static case has been analysed in detail. Results are often very inspiring, however, simplifying assumptions must be imposed: ad hoc profiles of the disc density are commonly assumed and the effects of frame-dragging and completely lacking. Astrophysical discs (e.g. accretion discs in active galactic nuclei) typically extend far beyond the relativistic domain and are fairly diluted. However, self-gravity is still essential for their structure and evolution, as well as for their radiation emission and the impact on the environment around. For example, a nuclear star cluster in a galactic centre may bear various imprints of mutual star--disc interactions, which can be recognised in observational properties, such as the relation between the central mass and stellar velocity dispersion.Comment: Accepted for publication in CQG; high-resolution figures will be available from http://www.iop.org/EJ/journal/CQ

    An examination of the factorial and convergent validity of four measures of conspiracist ideation, with recommendations for researchers

    Get PDF
    A number scales have been developed to measure conspiracist ideation, but little attention has been paid to the factorial validity of these scales. We reassessed the psychometric properties of four widely-used scales, namely the Belief in Conspiracy Theories Inventory (BCTI), the Conspiracy Mentality Questionnaire (CMQ), the Generic Conspiracist Beliefs Scale (GCBS), and the One-Item Conspiracy Measure (OICM). Eight-hundred-and-three U. S. adults completed all measures, along with measures of endorsement of 9/11 and anti- vaccination conspiracy theories. Through both exploratory and confirmatory factor analysis, we found that only the BCTI had acceptable factorial validity. We failed to confirm the factor structures of the CMQ and the GBCS, suggesting these measures had poor factorial valid- ity. Indices of convergent validity were acceptable for the BCTI, but weaker for the other measures. Based on these findings, we provide suggestions for the future refinement in the measurement of conspiracist ideation

    Registered Replication Report: Dijksterhuis and van Knippenberg (1998)

    Get PDF
    Dijksterhuis and van Knippenberg (1998) reported that participants primed with a category associated with intelligence ("professor") subsequently performed 13% better on a trivia test than participants primed with a category associated with a lack of intelligence ("soccer hooligans"). In two unpublished replications of this study designed to verify the appropriate testing procedures, Dijksterhuis, van Knippenberg, and Holland observed a smaller difference between conditions (2%-3%) as well as a gender difference: Men showed the effect (9.3% and 7.6%), but women did not (0.3% and -0.3%). The procedure used in those replications served as the basis for this multilab Registered Replication Report. A total of 40 laboratories collected data for this project, and 23 of these laboratories met all inclusion criteria. Here we report the meta-analytic results for those 23 direct replications (total N = 4,493), which tested whether performance on a 30-item general-knowledge trivia task differed between these two priming conditions (results of supplementary analyses of the data from all 40 labs, N = 6,454, are also reported). We observed no overall difference in trivia performance between participants primed with the "professor" category and those primed with the "hooligan" category (0.14%) and no moderation by gender

    Crowdsourcing hypothesis tests: Making transparent how design choices shape research results

    Get PDF
    To what extent are research results influenced by subjective decisions that scientists make as they design studies? Fifteen research teams independently designed studies to answer fiveoriginal research questions related to moral judgments, negotiations, and implicit cognition. Participants from two separate large samples (total N > 15,000) were then randomly assigned to complete one version of each study. Effect sizes varied dramatically across different sets of materials designed to test the same hypothesis: materials from different teams renderedstatistically significant effects in opposite directions for four out of five hypotheses, with the narrowest range in estimates being d = -0.37 to +0.26. Meta-analysis and a Bayesian perspective on the results revealed overall support for two hypotheses, and a lack of support for three hypotheses. Overall, practically none of the variability in effect sizes was attributable to the skill of the research team in designing materials, while considerable variability was attributable to the hypothesis being tested. In a forecasting survey, predictions of other scientists were significantly correlated with study results, both across and within hypotheses. Crowdsourced testing of research hypotheses helps reveal the true consistency of empirical support for a scientific claim.</div

    Stigmatized beliefs: conspiracy theories, anticipated negative evaluation of the self, and fear of social exclusion

    No full text
    Can conspiracy theories be a source of social stigma? If it is true, it would follow that people may expect to be socially excluded when they express endorsement of conspiracy theories. This effect should be partially explained by the knowledge of the negative perceptions associated with conspiracy theories. In Study 1, inducing French internet users to write a text endorsing (vs. criticizing) conspiracy theories about the Charlie Hebdo shooting, led them to anticipate fear of social exclusion. This effect was mediated by anticipated negative evaluation of the self. In Study 2, inducing French internet users to imagine defending (vs. criticizing) conspiracy theories about the Charlie Hebdo shooting in front of an audience led them to anticipate fear of social exclusion. The effect was again mediated by anticipated negative evaluation of the self. To conclude, our findings demonstrate that conspiracy theories can be viewed as a source of social stigma

    Secure web applications via automatic partitioning

    No full text
    Swift is a new, principled approach to building web applications that are secure by construction. In modern web applications, some application functionality is usually implemented as client-side code written in JavaScript. Moving code and data to the client can create security vulnerabilities, but currently there are no good methods for deciding when it is secure to do so. Swift automatically partitions application code while providing assurance that the resulting placement is secure and efficient. Application code is written as Java-like code annotated with information flow policies that specify the confidentiality and integrity of web application information. The compiler uses these policies to automatically partition the program into JavaScript code running in the browser, and Java code running on the server. To improve interactive performance, code and data are placed on the client side. However, security-critical code and data are always placed on the server. Code and data can also be replicated across the client and server, to obtain both security and performance. A max-flow algorithm is used to place code and data in a way that minimizes client–server communication

    Rare-earth ion doped Al2O3 for active integrated photonics

    No full text
    Aluminum oxide (Al2O3) is an emerging material in integrated photonics. It exhibits a very broad transparency window from the UV to the mid-IR, very low propagation losses and a high solubility for rare-earth ions leading to optical gain in different spectral ranges. Al2O3 can be deposited by different wafer-level deposition techniques, including atomic layer deposition and reactive magnetron sputtering, being compatible with the monolithic integration onto passive integrated photonics platforms, such as Si3N4, to which it provides optical amplification and lasing. When deposited at low temperatures, it is also compatible with integration onto CMOS chips. In this review, the state-of-the-art on the deposition, integration and device development in this photonic platform is described
    corecore