41 research outputs found
Formation of Super-Earths
Super-Earths are the most abundant planets known to date and are
characterized by having sizes between that of Earth and Neptune, typical
orbital periods of less than 100 days and gaseous envelopes that are often
massive enough to significantly contribute to the planet's overall radius.
Furthermore, super-Earths regularly appear in tightly-packed multiple-planet
systems, but resonant configurations in such systems are rare. This chapters
summarizes current super-Earth formation theories. It starts from the formation
of rocky cores and subsequent accretion of gaseous envelopes. We follow the
thermal evolution of newly formed super-Earths and discuss their atmospheric
mass loss due to disk dispersal, photoevaporation, core-cooling and collisions.
We conclude with a comparison of observations and theoretical predictions,
highlighting that even super-Earths that appear as barren rocky cores today
likely formed with primordial hydrogen and helium envelopes and discuss some
paths forward for the future.Comment: Invited review accepted for publication in the 'Handbook of
Exoplanets,' Planet Formation section, Springer Reference Works, Juan Antonio
Belmonte and Hans Deeg, Ed
Climate-Smart Crop-Livestock Systems for Smallholders in the Tropics: Regulation of Nitrification in Soil by Brachiaria humidicola Hybrids
DRIVE : Dynamische IntegritÀtsmessung zur Laufzeit
Cyberattacks have been rapidly gaining ground over the last few years, and there is an escalating conflict between those who develop new security techniques and those who develop new attacks that circumvent these countermeasures. This thesis presents a novel and holistic runtime protection technology that is based on a comparison of the binary code loaded and the memory image found during runtime. This approach rests on information data structures that are present in systems under attack. In particular, this thesis sets forth the background, design, implementation and evaluation of a memory protection concept at runtime and is based on an assessment of memory contents and meta information that are verified using trusted binary sources and policies. The results of this work demonstrate that the developed runtime protection technology is a suitable solution and an appropriate addition to further increase the overall security of systems used today
Electrical gas discharges and the influence of airborne pollution
SIGLEAvailable from INIST (FR), Document Supply Service, under shelf-number : T 84494 / INIST-CNRS - Institut de l'Information Scientifique et TechniqueFRFranc
Les campylobacters dans les intoxications alimentaires
STRASBOURG ILLKIRCH-Pharmacie (672182101) / SudocSudocFranceF
Building Secure Systems Using a Security Engineering Process and Security Building Blocks
In todayâs software development process, security related design decisions are rarely made early in the overall process. Even if security is considered early, this means that in most cases a more-or-less encompassing security requirements analysis is made. Based on this analysis best-practices, ad-hoc design decisions or individual expertise is used to integrate security during the development process or after weak-nesses are found after the deployment. This paper explains the SecFutur security en-gineering process with a focus on Security Building Block Models which are used to build security related components, namely Security Building Blocks. These Security Building Blocks represent concrete security solutions and can be accessed via SecFu-tur patterns on the level of domain-specific models for particular application domains. The goal of this approach is to provide already defined and tested security related software components, which can be used early in the overall development process, to support security-design-decision already while modeling the software-system. Secu-rity Building Blocks are discussed in the context of the SecFutur Security Engineering Process with its requirement analysis and definition of security properties.
Trust establishment in cooperating cyber-physical systems
Cooperating systems are systems of systems that collaborate for a common purpose. Cooperating cyber-physical systems often base important decisions on data gathered from external sensors and use external actuators to enforce safety critical actions. Using the example of a hydroelectric power plant control system, this paper analyzes security threats for networked cooperating systems, where sensors providing decision critical data are placed in non-protected areas and thus are exposed to various kinds of attacks. We propose a concept for trust establishment in cyber-physical cooperating systems. Using trusted event reporting for critical event sources, the authenticity of the security related events can be verified. Based on measurements obtained with a prototypical realisation, we evaluate and analyze the amount of overhead data transmission between event source and data verification system needed for trust establishment. We propose an efficient synchronisation scheme for system integrity data, reducing network traffic as well as verification effort
Plus vite, plus haut, plus riche : la médiatisation de la culture sportive américaine au XXe siÚcle
Eesti Arst 2014; 93(10):559â56
Market-driven Code Provisioning to Mobile Secure Hardware
Today, most smartphones feature different kinds of secure
hardware such as processor-based security extensions (e.g., TrustZone)
and dedicated secure co-processors, e.g., a SIM card or an embedded secure
element available on NFC-enabled devices (e.g., as used by Google
Wallet). Unfortunately, the available secure hardware is almost never
utilized by commercial third party apps, although their usage would
drastically improve the security of security critical apps. The reasons
are diverse: secure hardware stakeholders such as phone manufacturers
and mobile network operators (MNOs) have full control over the corresponding
interfaces and expect high financial revenue; and the current
code provisioning schemes are inflexible and impractical since they require
developers to collaborate with secure hardware stakeholders, which
is hardly affordable for typical developers of mobile apps.
In this paper we propose a new paradigm for secure hardware code provisioning.
Our solution (i) allows developers to distribute security sensitive
code (e.g., trusted apps or applets) as a part of the mobile app package;
(ii) supports flexible and dynamic assignment of access rights to secure
hardware APIs from mobile apps independently from an OS vendor and
a stakeholder; (iii) enables stakeholders of secure hardware to obtain revenue
for every provisioned piece of code; (iv) allows for automated and
transparent installation and deinstallation of applets on demand in order
to permit arbitrary number of applets, e.g., in the constraint Java
card environment. Our scheme is compatible with Global Platform (GP)
specifications and can be easily incorporated into existing standards. We
developed a proof of concept prototype based on a Java card secure element
on an Android-based smartphone and smartwatch and evaluated
it by deploying a security critical application for access control