930 research outputs found

    Chemical Changes in the Serum Associated With Equine Encephalomyelitis and Moldy Corn Poisoning of Horses

    Get PDF
    Specific infectious equine encephalomyelitis and moldy corn poisoning in horses are becoming more prevalent in Iowa yearly. Encephalomyelitis has been described, the etiology determined, the mode of transmission established and the typical clinical and pathological findings resolved

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Human-driven Machine-automation of Engineering Research

    Get PDF
    This paper presents a framework for efficiently producing engineering research in a global collaborative effort in a rigorous scientific manner. The proposed framework reduces subjective analysis, automates several mundane research tasks and provides a suitable formal structure for efficient information sharing and collaboration. The implementation of the framework involves multiple research groups setting up different web-servers that can perform the steps of the scientific method and automatically determine the quality and value of new research by directly communicating between servers via public and private Application Programming Interfaces (APIs) using a set of object-oriented protocols. The automation of many mundane research tasks (e.g. data manipulation), would allow researchers to focus more on the novel aspects of their research efforts. The increased clarity around the quality and value of research would allow the research efforts of individuals and available research funding to be better disbursed. The paper discusses the major aspects of the scientific method, object-orientated programming, the application of the proposed research framework for experimental/analytical/numerical engineering research, some of the potential benefits and drawbacks, as well as the current state of implementation

    Deduction with XOR Constraints in Security API Modelling

    Get PDF
    We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols
    • …
    corecore