7 research outputs found
Enforcing Security and Assurance Properties in Cloud Environment
International audienceBefore deploying their infrastructure (resources, data, communications, ...) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But describing and enforcing security properties and getting strong evidences of it is a complex task. To address this issue, in [1], we have proposed a language that can be used to express both security and assurance properties on distributed resources. Then, we have shown how these global properties can be cut into a set of properties to be enforced locally. In this paper, we show how these local properties can be used to automatically configure security mechanisms. Our language is context-based which allows it to be easily adapted to any resource naming systems e.g., Linux and Android (with SELinux) or PostgreSQL. Moreover, by abstracting low-level functionalities (e.g., deny write to a file) through capabilities, our language remains independent from the security mechanisms. These capabilities can then be combined into security and assurance properties in order to provide high-level functionalities, such as confidentiality or integrity. Furthermore, we propose a global architecture that receives these properties and automatically configures the security and assurance mechanisms accordingly. Finally, we express the security and assurance policies of an industrial environment for a commercialized product and show how its security is enforced
Map-aided software enhancement for autonomous GNSS complementary positioning system for railway
Independently on the business case addressed, one of the main drawbacks of the railway use cases that need continuous Global Navigation Satellite Systems data is the lack of availability for the 100% of the time of the journey. Additionally, the integrity assessment of the position estimation given is also mandatory for safety critical applications. Thus, tunnels and multipath effects are one of the most challenging situations for the continuous positioning systems. In this context, an autonomous on-board Complementary Positioning System has been proposed to overcome the limitation of Global Navigation Satellite System based positioning systems. This paper proposes a positioning enhancement solution by means of fusing data from the satellite navigation system and inertial measurement units. That hybrid solution provides higher availability and accuracy to the positioning specially on known blocked scenarios, such as tunnels, or urban canyons, by means of a novel environment aware map aided software technique named Known Blocked Scenarios algorithm... This paper describes the Complementary Positioning System and the field test carried out in a challenging environment to validate the enhancement proposed by the authors, which demonstrate the benefits that this system has in known harsh environments for railways
Enforcing Security and Assurance Properties in Cloud Environment
International audienceBefore deploying their infrastructure (resources, data, communications, ...) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But describing and enforcing security properties and getting strong evidences of it is a complex task. To address this issue, in [1], we have proposed a language that can be used to express both security and assurance properties on distributed resources. Then, we have shown how these global properties can be cut into a set of properties to be enforced locally. In this paper, we show how these local properties can be used to automatically configure security mechanisms. Our language is context-based which allows it to be easily adapted to any resource naming systems e.g., Linux and Android (with SELinux) or PostgreSQL. Moreover, by abstracting low-level functionalities (e.g., deny write to a file) through capabilities, our language remains independent from the security mechanisms. These capabilities can then be combined into security and assurance properties in order to provide high-level functionalities, such as confidentiality or integrity. Furthermore, we propose a global architecture that receives these properties and automatically configures the security and assurance mechanisms accordingly. Finally, we express the security and assurance policies of an industrial environment for a commercialized product and show how its security is enforced
Energy and macronutrient intake and risk of differentiated thyroid carcinoma in the European Prospective Investigation into Cancer and Nutrition study
Incidence rates of differentiated thyroid carcinoma (TC) have increased
in many countries. Adiposity and dietary risk factors may play a role,
but little is known on the influence of energy intake and macronutrient
composition. The aim of this study was to investigate the associations
between TC and the intake of energy, macronutrients, glycemic index (GI)
and glycemic load in the European Prospective Investigation into Cancer
and Nutrition (EPIC) cohort. The study included 477,274 middle-age
participants (70.2% women) from ten European countries. Dietary data
were collected using country-specific validated dietary questionnaires.
Total carbohydrates, proteins, fats, saturated, monounsaturated and
polyunsaturated fats (PUFA), starch, sugar, and fiber were computed as
g/1,000 kcal. Multivariable Cox regression was used to calculate
multivariable adjusted hazard ratios (HR) and 95% confidence interval
(CI) by intake quartile (Q). After a mean follow-up time of 11 years,
differentiated TC was diagnosed in 556 participants (90% women).
Overall, we found significant associations only with total energy
(HRQ4vs.Q1, 1.29; 95% CI, 1.00-1.68) and PUFA intakes (HRQ4vs.Q1, 0.74;
95% CI, 0.57-0.95). However, the associations with starch and sugar
intake and GI were significantly heterogeneous across body mass index
(BMI) groups, i.e., positive associations with starch and GI were found
in participants with a BMI25 and with sugar intake in those with BMI<25.
Moreover, inverse associations with starch and GI were observed in
subjects with BMI<25. In conclusion, our results suggest that high total
energy and low PUFA intakes may increase the risk of differentiated TC.
Positive associations with starch intake and GI in participants with
BMI25 suggest that those persons may have a greater insulin response to
high starch intake and GI than lean people.
What’s New? The role of lifestyle factors in the growing numbers of
thyroid cancer remains unclear. Here, the authors uncover associations
with high total energy intake and low consumption of polyunsaturated
fatty acids in a large European cohort (EPIC). They further find
positive associations with starch intake and glycemic index only in
people with a body mass index equal or larger than 25, possibly
implicating an altered insulin response in the etiology of this cancer