523 research outputs found
Globalisation and Skills for Development in Rwanda and Tanzania
International Development,
Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014International audienceThe introduction of e-Health applications has not only brought benefits, but also raised serious concerns regarding security and privacy of health data. The increasing demands of accessing health data, highlighted critical questions and challenges concerning the confidentiality of electronic patient records and the efficiency of accessing these records. Therefore, the aim of this paper is to provide secure and efficient access to electronic patient records. In this paper, we propose a novel protocol called the Linkable Anonymous Access protocol (LAA). We formally verify and analyse the protocol against security properties such as secrecy and authentication using the Casper/FDR2 verification tool. In addition, we have implemented the protocol using the Java technology to evaluate its performance. Our formal security analysis and performance evaluation proved that the LAA protocol supports secure access to electronic patient records without compromising performance
A Quantum Bousso Bound
The Bousso bound requires that one quarter the area of a closed codimension
two spacelike surface exceeds the entropy flux across a certain lightsheet
terminating on the surface. The bound can be violated by quantum effects such
as Hawking radiation. It is proposed that at the quantum level the bound be
modified by adding to the area the quantum entanglement entropy across the
surface. The validity of this quantum Bousso bound is proven in a
two-dimensional large N dilaton gravity theory.Comment: 17 page
Water intake, faecal output and intestinal motility in horses moved from pasture to a stabled management regime with controlled exercise
Reasons for performing study: A change in management from pasture to stabling is a risk factor for equine colic.
Objectives: To investigate the effect of a management change from pasture with no controlled exercise to stabling with light exercise on aspects of gastrointestinal function related to large colon impaction. The hypothesis was that drinking water intake, faecal output, faecal water content and large intestinal motility would be altered by a transition from a pastured to a stabled regime.
Study design: Within-subject management intervention trial involving changes in feeding and exercise using noninvasive techniques.
Methods: Seven normal horses were evaluated in a within-subjects study design. Horses were monitored while at pasture 24 h/day, and for 14 days following a transition to a stabling regime with light controlled exercise. Drinking water intake, faecal output and faecal dry matter were measured. Motility of the caecum, sternal flexure and left colon (contractions/min) were measured twice daily by transcutaneous ultrasound. Mean values were pooled for the pastured regime and used as a reference for comparison with stabled data (Days 1–14 post stabling) for multilevel statistical analysis.
Results: Drinking water intake was significantly increased (mean ± s.d. pasture 2.4 ± 1.8 vs. stabled 6.4 ± 0.6 l/100 kg bwt/day), total faecal output was significantly decreased (pasture 4.62 ± 1.69 vs. stabled 1.81 ± 0.5 kg/100 kg bwt/day) and faecal dry matter content was significantly increased (pasture 18.7 ± 2.28 vs. stabled 27.2 ± 1.93% DM/day) on all days post stabling compared with measurements taken at pasture (P<0.05). Motility was significantly decreased in all regions of the large colon collectively on Day 2 post stabling (-0.76 contractions/min), and in the left colon only on Day 4 (-0.62 contractions/min; P<0.05).
Conclusions: There were significant changes in large intestinal motility patterns and parameters relating to gastrointestinal water balance during a transition from pasture to stabled management, particularly during the first 5 days
Visualising high-dimensional Pareto relationships in two-dimensional scatterplots
Copyright © 2013 Springer-Verlag Berlin Heidelberg. The final publication is availablevia the DOI in this recordBook title: Evolutionary Multi-Criterion Optimization7th International Conference on Evolutionary Multi-Criterion Optimization (EMO 2013), Sheffield, UK, March 19-22, 2013The codebase for this paper is available at https://github.com/fieldsend/emo_2013_vizIn this paper two novel methods for projecting high dimensional data into two dimensions for visualisation are introduced, which aim to limit the loss of dominance and Pareto shell relationships between solutions to multi-objective optimisation problems. It has already been shown that, in general, it is impossible to completely preserve the dominance relationship when mapping from a higher to a lower dimension – however, approaches that attempt this projection with minimal loss of dominance information are useful for a number of reasons. (1) They may represent the data to the user of a multi-objective optimisation problem in an intuitive fashion, (2) they may help provide insights into the relationships between solutions which are not immediately apparent through other visualisation methods, and (3) they may offer a useful visual medium for interactive optimisation. We are concerned here with examining (1) and (2), and developing relatively rapid methods to achieve visualisations, rather than generating an entirely new search/optimisation problem which has to be solved to achieve the visualisation– which may prove infeasible in an interactive environment for real time use. Results are presented on randomly generated data, and the search population of an optimiser as it progresses. Structural insights into the evolution of a set-based optimiser that can be derived from this visualisation are also discussed
TAuth: Verifying timed security protocols
Quantitative timing is often explicitly used in systems for better security, e.g., the credentials for automatic website logon often has limited lifetime. Verifying timing relevant security protocols in these systems is very challenging as timing adds another dimension of complexity compared with the untimed protocol verification. In our previous work, we proposed an approach to check the correctness of the timed authentication in security protocols with fixed timing constraints. However, a more difficult question persists, i.e., given a particular protocol design, whether the protocol has security flaws in its design or it can be configured secure with proper parameter values? In this work, we answer this question by proposing a parameterized verification framework, where the quantitative parameters in the protocols can be intuitively specified as well as automatically analyzed. Given a security protocol, our verification algorithm either produces the secure constraints of the parameters, or constructs an attack that works for any parameter values. The correctness of our algorithm is formally proved. We implement our method into a tool called PTAuth and evaluate it with several security protocols. Using PTAuth, we have successfully found a timing attack in Kerberos V which is unreported before.No Full Tex
Ten Proofs of the Generalized Second Law
Ten attempts to prove the Generalized Second Law of Thermodyanmics (GSL) are
described and critiqued. Each proof provides valuable insights which should be
useful for constructing future, more complete proofs. Rather than merely
summarizing previous research, this review offers new perspectives, and
strategies for overcoming limitations of the existing proofs. A long
introductory section addresses some choices that must be made in any
formulation the GSL: Should one use the Gibbs or the Boltzmann entropy? Should
one use the global or the apparent horizon? Is it necessary to assume any
entropy bounds? If the area has quantum fluctuations, should the GSL apply to
the average area? The definition and implications of the classical,
hydrodynamic, semiclassical and full quantum gravity regimes are also
discussed. A lack of agreement regarding how to define the "quasi-stationary"
regime is addressed by distinguishing it from the "quasi-steady" regime.Comment: 60 pages, 2 figures, 1 table. v2: corrected typos and added a
footnote to match the published versio
Hawking Spectrum and High Frequency Dispersion
We study the spectrum of created particles in two-dimensional black hole
geometries for a linear, hermitian scalar field satisfying a Lorentz
non-invariant field equation with higher spatial derivative terms that are
suppressed by powers of a fundamental momentum scale . The preferred frame
is the ``free-fall frame" of the black hole. This model is a variation of
Unruh's sonic black hole analogy. We find that there are two qualitatively
different types of particle production in this model: a thermal Hawking flux
generated by ``mode conversion" at the black hole horizon, and a non-thermal
spectrum generated via scattering off the background into negative free-fall
frequency modes. This second process has nothing to do with black holes and
does not occur for the ordinary wave equation because such modes do not
propagate outside the horizon with positive Killing frequency. The horizon
component of the radiation is astonishingly close to a perfect thermal
spectrum: for the smoothest metric studied, with Hawking temperature
, agreement is of order at frequency
, and agreement to order persists out to
where the thermal number flux is ). The flux
from scattering dominates at large and becomes many orders of
magnitude larger than the horizon component for metrics with a ``kink", i.e. a
region of high curvature localized on a static worldline outside the horizon.
This non-thermal flux amounts to roughly 10\% of the total luminosity for the
kinkier metrics considered. The flux exhibits oscillations as a function of
frequency which can be explained by interference between the various
contributions to the flux.Comment: 32 pages, plain latex, 16 figures included using psfi
- …