5,259 research outputs found

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Alignment of LHCb tracking stations with tracks fitted with a Kalman filter

    Get PDF
    The LHCb detector, operating at the Large Hadron Collider at CERN, is a single arm spectrometer optimized for the detection of the forward b anti-b production for b physics studies. The reconstruction of vertices and tracks is done by silicon micro-strips and gaseous straw-tube based detectors. In order to achieve good mass resolution for resonances the tracking detectors should be aligned to a precision of the order of ten microns. A software framework has been developed to achieve these goals and has been tested in various configurations. After a description of the software, we present alignment results and show in particular for the first time that a global χ2\chi^2 solving for alignment using a locally parameterized track trajectory can be achieved

    Competitive market for multiple firms and economic crisis

    Full text link
    The origin of economic crises is a key problem for economics. We present a model of long-run competitive markets to show that the multiplicity of behaviors in an economic system, over a long time scale, emerge as statistical regularities (perfectly competitive markets obey Bose-Einstein statistics and purely monopolistic-competitive markets obey Boltzmann statistics) and that how interaction among firms influences the evolutionary of competitive markets. It has been widely accepted that perfect competition is most efficient. Our study shows that the perfectly competitive system, as an extreme case of competitive markets, is most efficient but not stable, and gives rise to economic crises as society reaches full employment. In the economic crisis revealed by our model, many firms condense (collapse) into the lowest supply level (zero supply, namely bankruptcy status), in analogy to Bose-Einstein condensation. This curious phenomenon arises because perfect competition (homogeneous competitions) equals symmetric (indistinguishable) investment direction, a fact abhorred by nature. Therefore, we urge the promotion of monopolistic competition (heterogeneous competitions) rather than perfect competition. To provide early warning of economic crises, we introduce a resolving index of investment, which approaches zero in the run-up to an economic crisis. On the other hand, our model discloses, as a profound conclusion, that the technological level for a long-run social or economic system is proportional to the freedom (disorder) of this system; in other words, technology equals the entropy of system. As an application of this new concept, we give a possible answer to the Needham question: "Why was it that despite the immense achievements of traditional China it had been in Europe and not in China that the scientific and industrial revolutions occurred?"Comment: 17 pages; 3 figure

    First studies of T-station alignment with simulated data

    Get PDF
    The alignment of the tracking stations using tracks fitted using standard LHCb track fit is studied. The procedure is presented together with two examples using simulated data. The first scenario presents the alignment of the IT and OT layers using beam-gas events at 450~GeV with no magnetic field. The second scenario is the alignment of the OT layers and IT boxes, layers and ladders with magnet-on data using minimum bias events at nominal energy. The results are validated by refitting J/ψ\psi tracks using the misaligned geometry compared to the re-aligned case as well as the default. It is shown that after alignment the J ψ\psi mass resolution is degraded by at most 3~\%

    Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol

    Get PDF
    Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014International audienceThe introduction of e-Health applications has not only brought benefits, but also raised serious concerns regarding security and privacy of health data. The increasing demands of accessing health data, highlighted critical questions and challenges concerning the confidentiality of electronic patient records and the efficiency of accessing these records. Therefore, the aim of this paper is to provide secure and efficient access to electronic patient records. In this paper, we propose a novel protocol called the Linkable Anonymous Access protocol (LAA). We formally verify and analyse the protocol against security properties such as secrecy and authentication using the Casper/FDR2 verification tool. In addition, we have implemented the protocol using the Java technology to evaluate its performance. Our formal security analysis and performance evaluation proved that the LAA protocol supports secure access to electronic patient records without compromising performance
    • 

    corecore