523 research outputs found

    Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol

    Get PDF
    Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014International audienceThe introduction of e-Health applications has not only brought benefits, but also raised serious concerns regarding security and privacy of health data. The increasing demands of accessing health data, highlighted critical questions and challenges concerning the confidentiality of electronic patient records and the efficiency of accessing these records. Therefore, the aim of this paper is to provide secure and efficient access to electronic patient records. In this paper, we propose a novel protocol called the Linkable Anonymous Access protocol (LAA). We formally verify and analyse the protocol against security properties such as secrecy and authentication using the Casper/FDR2 verification tool. In addition, we have implemented the protocol using the Java technology to evaluate its performance. Our formal security analysis and performance evaluation proved that the LAA protocol supports secure access to electronic patient records without compromising performance

    A Quantum Bousso Bound

    Get PDF
    The Bousso bound requires that one quarter the area of a closed codimension two spacelike surface exceeds the entropy flux across a certain lightsheet terminating on the surface. The bound can be violated by quantum effects such as Hawking radiation. It is proposed that at the quantum level the bound be modified by adding to the area the quantum entanglement entropy across the surface. The validity of this quantum Bousso bound is proven in a two-dimensional large N dilaton gravity theory.Comment: 17 page

    Water intake, faecal output and intestinal motility in horses moved from pasture to a stabled management regime with controlled exercise

    Get PDF
    Reasons for performing study: A change in management from pasture to stabling is a risk factor for equine colic. Objectives: To investigate the effect of a management change from pasture with no controlled exercise to stabling with light exercise on aspects of gastrointestinal function related to large colon impaction. The hypothesis was that drinking water intake, faecal output, faecal water content and large intestinal motility would be altered by a transition from a pastured to a stabled regime. Study design: Within-subject management intervention trial involving changes in feeding and exercise using noninvasive techniques. Methods: Seven normal horses were evaluated in a within-subjects study design. Horses were monitored while at pasture 24 h/day, and for 14 days following a transition to a stabling regime with light controlled exercise. Drinking water intake, faecal output and faecal dry matter were measured. Motility of the caecum, sternal flexure and left colon (contractions/min) were measured twice daily by transcutaneous ultrasound. Mean values were pooled for the pastured regime and used as a reference for comparison with stabled data (Days 1–14 post stabling) for multilevel statistical analysis. Results: Drinking water intake was significantly increased (mean ± s.d. pasture 2.4 ± 1.8 vs. stabled 6.4 ± 0.6 l/100 kg bwt/day), total faecal output was significantly decreased (pasture 4.62 ± 1.69 vs. stabled 1.81 ± 0.5 kg/100 kg bwt/day) and faecal dry matter content was significantly increased (pasture 18.7 ± 2.28 vs. stabled 27.2 ± 1.93% DM/day) on all days post stabling compared with measurements taken at pasture (P<0.05). Motility was significantly decreased in all regions of the large colon collectively on Day 2 post stabling (-0.76 contractions/min), and in the left colon only on Day 4 (-0.62 contractions/min; P<0.05). Conclusions: There were significant changes in large intestinal motility patterns and parameters relating to gastrointestinal water balance during a transition from pasture to stabled management, particularly during the first 5 days

    Visualising high-dimensional Pareto relationships in two-dimensional scatterplots

    Get PDF
    Copyright © 2013 Springer-Verlag Berlin Heidelberg. The final publication is availablevia the DOI in this recordBook title: Evolutionary Multi-Criterion Optimization7th International Conference on Evolutionary Multi-Criterion Optimization (EMO 2013), Sheffield, UK, March 19-22, 2013The codebase for this paper is available at https://github.com/fieldsend/emo_2013_vizIn this paper two novel methods for projecting high dimensional data into two dimensions for visualisation are introduced, which aim to limit the loss of dominance and Pareto shell relationships between solutions to multi-objective optimisation problems. It has already been shown that, in general, it is impossible to completely preserve the dominance relationship when mapping from a higher to a lower dimension – however, approaches that attempt this projection with minimal loss of dominance information are useful for a number of reasons. (1) They may represent the data to the user of a multi-objective optimisation problem in an intuitive fashion, (2) they may help provide insights into the relationships between solutions which are not immediately apparent through other visualisation methods, and (3) they may offer a useful visual medium for interactive optimisation. We are concerned here with examining (1) and (2), and developing relatively rapid methods to achieve visualisations, rather than generating an entirely new search/optimisation problem which has to be solved to achieve the visualisation– which may prove infeasible in an interactive environment for real time use. Results are presented on randomly generated data, and the search population of an optimiser as it progresses. Structural insights into the evolution of a set-based optimiser that can be derived from this visualisation are also discussed

    TAuth: Verifying timed security protocols

    Get PDF
    Quantitative timing is often explicitly used in systems for better security, e.g., the credentials for automatic website logon often has limited lifetime. Verifying timing relevant security protocols in these systems is very challenging as timing adds another dimension of complexity compared with the untimed protocol verification. In our previous work, we proposed an approach to check the correctness of the timed authentication in security protocols with fixed timing constraints. However, a more difficult question persists, i.e., given a particular protocol design, whether the protocol has security flaws in its design or it can be configured secure with proper parameter values? In this work, we answer this question by proposing a parameterized verification framework, where the quantitative parameters in the protocols can be intuitively specified as well as automatically analyzed. Given a security protocol, our verification algorithm either produces the secure constraints of the parameters, or constructs an attack that works for any parameter values. The correctness of our algorithm is formally proved. We implement our method into a tool called PTAuth and evaluate it with several security protocols. Using PTAuth, we have successfully found a timing attack in Kerberos V which is unreported before.No Full Tex

    Ten Proofs of the Generalized Second Law

    Full text link
    Ten attempts to prove the Generalized Second Law of Thermodyanmics (GSL) are described and critiqued. Each proof provides valuable insights which should be useful for constructing future, more complete proofs. Rather than merely summarizing previous research, this review offers new perspectives, and strategies for overcoming limitations of the existing proofs. A long introductory section addresses some choices that must be made in any formulation the GSL: Should one use the Gibbs or the Boltzmann entropy? Should one use the global or the apparent horizon? Is it necessary to assume any entropy bounds? If the area has quantum fluctuations, should the GSL apply to the average area? The definition and implications of the classical, hydrodynamic, semiclassical and full quantum gravity regimes are also discussed. A lack of agreement regarding how to define the "quasi-stationary" regime is addressed by distinguishing it from the "quasi-steady" regime.Comment: 60 pages, 2 figures, 1 table. v2: corrected typos and added a footnote to match the published versio

    Hawking Spectrum and High Frequency Dispersion

    Get PDF
    We study the spectrum of created particles in two-dimensional black hole geometries for a linear, hermitian scalar field satisfying a Lorentz non-invariant field equation with higher spatial derivative terms that are suppressed by powers of a fundamental momentum scale k0k_0. The preferred frame is the ``free-fall frame" of the black hole. This model is a variation of Unruh's sonic black hole analogy. We find that there are two qualitatively different types of particle production in this model: a thermal Hawking flux generated by ``mode conversion" at the black hole horizon, and a non-thermal spectrum generated via scattering off the background into negative free-fall frequency modes. This second process has nothing to do with black holes and does not occur for the ordinary wave equation because such modes do not propagate outside the horizon with positive Killing frequency. The horizon component of the radiation is astonishingly close to a perfect thermal spectrum: for the smoothest metric studied, with Hawking temperature TH≃0.0008k0T_H\simeq0.0008k_0, agreement is of order (TH/k0)3(T_H/k_0)^3 at frequency ω=TH\omega=T_H, and agreement to order TH/k0T_H/k_0 persists out to ω/TH≃45\omega/T_H\simeq 45 where the thermal number flux is O(10−20O(10^{-20}). The flux from scattering dominates at large ω\omega and becomes many orders of magnitude larger than the horizon component for metrics with a ``kink", i.e. a region of high curvature localized on a static worldline outside the horizon. This non-thermal flux amounts to roughly 10\% of the total luminosity for the kinkier metrics considered. The flux exhibits oscillations as a function of frequency which can be explained by interference between the various contributions to the flux.Comment: 32 pages, plain latex, 16 figures included using psfi
    • …
    corecore