6,515 research outputs found

    Name-passing calculi and crypto-primitives: A survey

    No full text
    The paper surveys the literature on high-level name-passing process calculi, and their extensions with cryptographic primitives. The survey is by no means exhaustive, for essentially two reasons. First, in trying to provide a coherent presentation of different ideas and techniques, one inevitably ends up leaving out the approaches that do not fit the intended roadmap. Secondly, the literature on the subject has been growing at very high rate over the years. As a consequence, we decided to concentrate on few papers that introduce the main ideas, in the hope that discussing them in some detail will provide sufficient insight for further reading

    Arsenic precipitation by an anaerobic arsenic-respiring bacterial strain isolated from the polluted sediments of Orbetello Lagoon, Italy

    Get PDF
    AIMS: To isolate and characterize an anaerobic bacterial strain from the deeper polluted lagoon sediment able to use as electron acceptors [As(V)] and sulfate (SO4(2-)), using lactate as an electron donor. METHODS AND RESULTS: Methods for isolation from polluted lagoon sediments included anaerobic enrichment cultures in the presence of As(V) and SO4(2-). Reduction of As(V) to As(III) was observed during the growth of the bacterial strain, and the final concentration of As(III) was lower than the initial As(V) one, suggesting the immobilization of As(III) in the yellow precipitate. The precipitate was identified by energy dispersive spectroscopy X-ray as arsenic sulfide. Scanning electron microscopy (SEM) revealed rod-shaped bacterial cells embedded in the precipitate, where net-like formations strictly related to the bacterial cells were visible. The surface of the precipitate showed the adhesion of bacterial cells, forming clusters. Transmission electron microscopy (TEM) also highlighted precipitates inside the bacterial cells and on their surface. Following 16S rRNA sequencing, the bacterial strain 063 was assigned to the genus Desulfosporosinus. CONCLUSIONS: This study reports, for the first time, the isolation from the polluted lagoon sediments of a strain capable of respiring and using As(V) and SO4(2-) as electron acceptors with lactate as the sole carbon and energy source with the formation of an arsenic sulfide precipitate. SIGNIFICANCE AND IMPACT OF THE STUDY: The identification of these properties provides novel insight into the possible use of the anaerobic strain in bioremediation processes and also adds to the knowledge on the biogeochemical cycling of arsenic

    A hard lesson: Assessing the HTTPS deployment of Italian university websites

    Get PDF
    In this paper we carry out a systematic analysis of the state of the HTTPS deployment of the most popular Italian university websites. Our analysis focuses on three different key aspects: HTTPS adoption and activation, HTTPS certificates, and cryptographic TLS implementations. Our investigation shows that the current state of the HTTPS deployment is unsatisfactory, yet it is possible to significantly improve the level of security by working exclusively at the web application layer. We hope this observation will encourage site operators to take actions to improve the current state of protection

    Epoxy/ graphene nanocomposites ā€“ processing and properties: a review

    Get PDF
    Graphene has recently attracted significant academic and industrial interest because of its excellent performance in mechanical, electrical and thermal applications. Graphene can significantly improve physical properties of epoxy at extremely small loading when incorporated appropriately. Herein, the structure, preparation and properties of epoxy/graphene nanocomposites are reviewed in general, along with detailed examples drawn from the key scientific literature. The modification of graphene and the utilization of these materials in the fabrication of nanocomposites with different processing methods have been explored. This review has been focused on the processing methods and mechanical, electrical, thermal, and fire retardant properties of the nanocomposites. The synergic effects of graphene and other fillers in epoxy matrix have been summarised as well

    A Semantic Hierarchy for Erasure Policies

    Get PDF
    We consider the problem of logical data erasure, contrasting with physical erasure in the same way that end-to-end information flow control contrasts with access control. We present a semantic hierarchy for erasure policies, using a possibilistic knowledge-based semantics to define policy satisfaction such that there is an intuitively clear upper bound on what information an erasure policy permits to be retained. Our hierarchy allows a rich class of erasure policies to be expressed, taking account of the power of the attacker, how much information may be retained, and under what conditions it may be retained. While our main aim is to specify erasure policies, the semantic framework allows quite general information-flow policies to be formulated for a variety of semantic notions of secrecy.Comment: 18 pages, ICISS 201

    A logarithmic epiperimetric inequality for the obstacle problem

    Full text link
    For the general obstacle problem, we prove by direct methods an epiperimetric inequality at regular and singular points, thus answering a question of Weiss (Invent. Math., 138 (1999), 23--50). In particular at singular points we introduce a new tool, which we call logarithmic epiperimetric inequality, which yields an explicit logarithmic modulus of continuity on the C1C^1 regularity of the singular set, thus improving previous results of Caffarelli and Monneau

    Non-interference for deterministic interactive programs

    Get PDF
    We consider the problem of defining an appropriate notion of non-interference (NI) for deterministic interactive programs. Previous work on the security of interactive programs by O'Neill, Clarkson and Chong (CSFW 2006) builds on earlier ideas due to Wittbold and Johnson (Symposium on Security and Privacy 1990), and argues for a notion of NI defined in terms of strategies modelling the behaviour of users. We show that, for deterministic interactive programs, it is not necessary to consider strategies and that a simple stream model of the users' behaviour is sufficient. The key technical result is that, for deterministic programs, stream-based NI implies the apparently more general strategy-based NI (in fact we consider a wider class of strategies than those of O'Neill et al). We give our results in terms of a simple notion of Input-Output Labelled Transition System, thus allowing application of the results to a large class of deterministic interactive programming languages

    A new sample of bright galaxy pairs in UZC

    Get PDF
    We present a new sample of bright galaxy pairs extracted applying an objective selection code to UZC catalog.The sample is volume limited to Mzw_{zw} = -18.9 +5 log h{\it h} and contains 89 galaxy pairs.We analyze the kinematical, morphological and photometrical properties of galaxies belonging to this sample. We show that velocity separation, āˆ£Ī”vrāˆ£| \Delta v_{r} |, between pair members is significantly lower in spiral type (S+S) pairs than in early-type (E+E) and mixed (E+S) pairs.This indicates that truly isolated galaxy pairs are more likely to be found among S+S pairs. We show that ellipticals are rare and underluminous in B and that late spirals (T ā‰„\ge 4) are overluminous. We confirm that the formation of bright ellipticals is a phenomenon linked to group/cluster environment, while galaxy-galaxy interaction may enhance blue luminosity of disk galaxies through SF phenomena. This last statement is supported by the presence of strong FIR emission from early spirals in this sample and by the high frequency of AGN/SB phenomenon, revealed mainly in pairs of low relative radial velocity separation and showing signs of interaction.Comment: A & A accepted, 6 pages, 6 figure
    • ā€¦
    corecore