5,054 research outputs found

    On trust and privacy in context-aware systems

    Get PDF
    Recent advances in networking, handheld computing and sensors technologies have led to the emergence of context-aware systems. The vast amounts of personal information collected by such systems has led to growing concerns about the privacy of their users. Users concerned about their private information are likely to refuse participation in such systems. Therefore, it is quite clear that for any context-aware system to be acceptable by the users, mechanisms for controlling access to personal information are a necessity. According to Alan Westin "privacy is the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information is communicated to others"1. Within this context we can classify users as either information owners or information receivers. It is also acknowledged that information owners are willing to disclose personal information if this disclosure is potentially beneficial. So, the acceptance of any context-aware system depends on the provision of mechanisms for fine-grained control of the disclosure of personal information incorporating an explicit notion of benefit

    Privacy, security, and trust issues in smart environments

    Get PDF
    Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning

    A Mid-Infrared Galaxy Atlas (MIGA)

    Full text link
    A mid-infrared atlas of part of the Galactic plane (75∘<l<148∘,b=±6∘75^\circ < l < 148^\circ, b = \pm6^\circ) has been constructed using HIRES processed infrared data to provide a mid-infrared data set for the Canadian Galactic Plane Survey (CGPS). The addition of this data set to the CGPS will enable the study of the emission from the smallest components of interstellar dust at an angular resolution comparable to that of the radio, millimetre, and far-infrared data in the CGPS. The Mid-Infrared Galaxy Atlas (MIGA) is a mid-infrared (12 ÎŒ\mum and 25 ÎŒ\mum) counterpart to the far-infrared IRAS Galaxy Atlas (IGA), and consists of resolution enhanced (∌0.5â€Č\sim 0.5' resolution) HIRES images along with ancillary maps. This paper describes the processing and characteristics of the atlas, the cross-beam simulation technique used to obtain high-resolution ratio maps, and future plans to extend both the IGA and MIGA.Comment: 38 pages (including 15 tables), 13 figures (8 dithered GIF and 5 EPS). Submitted to Astrophysical Journal Supplement Series. A preprint with higher resolution figures is available at http://www.cita.utoronto.ca/~kerton/publications.htm

    Dynamic trust models for ubiquitous computing environments

    Get PDF
    A significant characteristic of ubiquitous computing is the need for interactions of highly mobile entities to be secure: secure both for the entity and the environment in which the entity operates. Moreover, ubiquitous computing is also characterised by partial views over the state of the global environment, implying that we cannot guarantee that an environment can always verify the properties of the mobile entity that it has just received. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. an entity might encrypt a deliberately incorrect answer to a legitimate request). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two entities during an interaction in a ubiquitous environment

    The SECURE collaboration model

    Get PDF
    The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems

    Discrete breathers in a nonlinear electric line: Modeling, Computation and Experiment

    Get PDF
    We study experimentally and numerically the existence and stability properties of discrete breathers in a periodic nonlinear electric line. The electric line is composed of single cell nodes, containing a varactor diode and an inductor, coupled together in a periodic ring configuration through inductors and driven uniformly by a harmonic external voltage source. A simple model for each cell is proposed by using a nonlinear form for the varactor characteristics through the current and capacitance dependence on the voltage. For an electrical line composed of 32 elements, we find the regions, in driver voltage and frequency, where nn-peaked breather solutions exist and characterize their stability. The results are compared to experimental measurements with good quantitative agreement. We also examine the spontaneous formation of nn-peaked breathers through modulational instability of the homogeneous steady state. The competition between different discrete breathers seeded by the modulational instability eventually leads to stationary nn-peaked solutions whose precise locations is seen to sensitively depend on the initial conditions

    Prevalence and risk factors for mast cell tumours in dogs in England

    Get PDF
    BACKGROUND: Mast cell tumour (MCT) appears to be a frequent tumour type in dogs, though there is little published in relation to its frequency in dogs in the UK. The current study aimed to investigate prevalence and risk factors for MCTs in dogs attending English primary-care veterinary practices. METHODS: Electronic patient records from practices participating in the VetCompass animal surveillance project between July 2007 and June 2013 were searched for MCT diagnosis. Various search terms and standard diagnostic terms (VeNom codes) identified records containing MCT diagnoses, which were evaluated against clinical criteria for inclusion to the study. MCT prevalence for the entire dataset and specific breed types were calculated. Descriptive statistics characterised MCT cases and multivariable logistic regression methods evaluated risk factors for association with MCT (P < 0.05). RESULTS: Within a population of 168,636 dogs, 453 had MCT, yielding a prevalence of 0.27% (95% confidence interval (CI) 0.24% - 0.29%). The highest breed type specific prevalences were for the Boxer at 1.95% (95% CI 1.40% - 2.51%), Golden Retriever at 1.39% (0.98% - 1.81%) and Weimaraner at 0.85% (95% CI 0.17% to 1.53%). Age, insurance status, neuter status, weight and breed type were associated with MCT diagnosis. Of dogs of specific breed type, the Boxer, Pug and Staffordshire Bull Terrier showed greater odds of MCT diagnosis compared with crossbred dogs. Conversely, the German Shepherd Dog, Border Collie, West Highland White Terrier, Springer Spaniel and Cocker Spaniel had reduced odds of MCT diagnosis compared with crossbred dogs. No association was found between MCT diagnosis and sex. CLINICAL SIGNIFICANCE: This study highlights a clinically significant prevalence of MCT and identifies specific breed types with predisposition to MCT, potentially aiding veterinarian awareness and facilitating diagnosis

    Ultrastable lasers based on vibration insensitive cavities

    Full text link
    We present two ultra-stable lasers based on two vibration insensitive cavity designs, one with vertical optical axis geometry, the other horizontal. Ultra-stable cavities are constructed with fused silica mirror substrates, shown to decrease the thermal noise limit, in order to improve the frequency stability over previous designs. Vibration sensitivity components measured are equal to or better than 1.5e-11 per m.s^-2 for each spatial direction, which shows significant improvement over previous studies. We have tested the very low dependence on the position of the cavity support points, in order to establish that our designs eliminate the need for fine tuning to achieve extremely low vibration sensitivity. Relative frequency measurements show that at least one of the stabilized lasers has a stability better than 5.6e-16 at 1 second, which is the best result obtained for this length of cavity.Comment: 8 pages 12 figure
    • 

    corecore