51 research outputs found

    Many-to-Many Information Flow Policies

    Get PDF
    Information flow techniques typically classify information according to suitable security levels and enforce policies that are based on binary relations between individual levels, e.g., stating that information is allowed to flow from one level to another. We argue that some information flow properties of interest naturally require coordination patterns that involve sets of security levels rather than individual levels: some secret information could be safely disclosed to a set of confidential channels of incomparable security levels, with individual leaks considered instead illegal; a group of competing agencies might agree to disclose their secrets, with individual disclosures being undesired, etc. Motivated by this we propose a simple language for expressing information flow policies where the usual admitted flow relation between individual security levels is replaced by a relation between sets of security levels, thus allowing to capture coordinated flows of information. The flow of information is expressed in terms of causal dependencies and the satisfaction of a policy is defined with respect to an event structure that is assumed to capture the causal structure of system computations. We suggest applications to secret exchange protocols, program security and security architectures, and discuss the relation to classic notions of information flow control

    Automata for true concurrency properties

    Get PDF
    We present an automata-theoretic framework for the model checking of true concurrency properties. These are specified in a fixpoint logic, corresponding to history-preserving bisimilarity, capable of describing events in computations and their dependencies. The models of the logic are event structures or any formalism which can be given a causal semantics, like Petri nets. Given a formula and an event structure satisfying suitable regularity conditions we show how to construct a parity tree automaton whose language is non-empty if and only if the event structure satisfies the formula. The automaton, due to the nature of event structure models, is usually infinite. We discuss how it can be quotiented to an equivalent finite automaton, where emptiness can be checked effectively. In order to show the applicability of the approach, we discuss how it instantiates to finite safe Petri nets. As a proof of concept we provide a model checking tool implementing the technique

    Dual clumped isotope thermometry resolves kinetic biases in carbonate formation temperatures

    Get PDF
    © The Author(s), 2020. This article is distributed under the terms of the Creative Commons Attribution License. The definitive version was published in Bajnai, D., Guo, W., Spötl, C., Coplen, T. B., Methner, K., Löffler, N., Krsnik, E., Gischler, E., Hansen, M., Henkel, D., Price, G. D., Raddatz, J., Scholz, D., & Fiebig, J. Dual clumped isotope thermometry resolves kinetic biases in carbonate formation temperatures. Nature Communications, 11(1), (2020): 4005, doi:10.1038/s41467-020-17501-0.Surface temperature is a fundamental parameter of Earth’s climate. Its evolution through time is commonly reconstructed using the oxygen isotope and the clumped isotope compositions of carbonate archives. However, reaction kinetics involved in the precipitation of carbonates can introduce inaccuracies in the derived temperatures. Here, we show that dual clumped isotope analyses, i.e., simultaneous ∆47 and ∆48 measurements on the single carbonate phase, can identify the origin and quantify the extent of these kinetic biases. Our results verify theoretical predictions and evidence that the isotopic disequilibrium commonly observed in speleothems and scleractinian coral skeletons is inherited from the dissolved inorganic carbon pool of their parent solutions. Further, we show that dual clumped isotope thermometry can achieve reliable palaeotemperature reconstructions, devoid of kinetic bias. Analysis of a belemnite rostrum implies that it precipitated near isotopic equilibrium and confirms the warmer-than-present temperatures during the Early Cretaceous at southern high latitudes.This work became possible through DFG grant “INST 161/871-1” and the Investment in Science Fund at Woods Hole Oceanographic Institution. The authors would like to thank Sven Hofmann and Manuel Schumann for their assistance in the joint Goethe University – Senckenberg BiK-F Stable Isotope Facility at the Institute of Geosciences, Goethe University Frankfurt. K.M. acknowledges funding through “DFG ME 4955/1-1”, E.K. through “DFG MU 2845/6-1”, D.S. through “DFG SCHO 1274/8-1” and “DFG SCHO 1274/11-1”, and M.H. through “DFG HA 8694/1-1”. C.S. acknowledges funding from the University of Innsbruck. A review of the manuscript by David Evans on behalf of the USGS is acknowledged

    Progression of pathology in PINK1-deficient mouse brain from splicing via ubiquitination, ER stress, and mitophagy changes to neuroinflammation

    Full text link

    Innate immune memory and homeostasis may be conferred through crosstalk between the TLR3 and TLR7 pathways

    No full text
    10.1126/scisignal.aac9340SCIENCE SIGNALING9436ra70

    Kleene Theorems for Synchronous Products with Matching

    No full text
    In earlier work [LMP11], we showed that a graph-theoretic condition called “structural cyclicity” enables us to extract syntax from a conflict-equivalent product system of automata. In this paper we have a “pairing” property in our syntax which allows us to connect to a broader class of synchronous product systems [Arn94] with a “matching” property, where the conflict-equivalence is not statically fixed. These systems have been related to labelled free choice nets
    corecore