188 research outputs found
Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing
For the sake of practicability of cloud computing, fine-grained data access is frequently required in the sense that users with different attributes should be granted different levels of access privileges. However, most of existing access control solutions are not suitable for resource-constrained users because of large computation costs, which linearly increase with the complexity of access policies. In this paper, we present an access control system based on ciphertext-policy attribute-based encryption. The proposed access control system enjoys constant computation cost and is proven secure in the random oracle model under the decision Bilinear Diffie-Hellman Exponent assumption. Our access control system supports AND-gate access policies with multiple values and wildcards, and it can efficiently support direct user revocation. Performance comparisons indicate that the proposed solution is suitable for resource-constrained environment
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice
tru
TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain
AXA Research Fund Singapor
Acquisition of interpreting strategies by student interpreters
To explore the acquisition of interpreting strategies by student interpreters, the present study first built a framework of 22 strategies based on a thorough literature review, and then identified and compared 21 strategies adopted by 66 student interpreters in a task of B-to-A consecutive interpreting (CI) between two training stages (2nd month and end of an academic year). Quantitative and qualitative analyses of interpreting performance, substantiated by retrospection and interview data, resulted in two major findings. First, as interpreting training proceeded, these students employed more frequently the strategies that interpreting instructors recommended (Type-A strategies, e.g. explicitation), and less frequently the strategies that the instructors advised them to use with caution (Type-B strategies, e.g. approximation) and the strategies that the instructors did not recommend (Type-C strategies, e.g. guessing). Second, the frequency of Type-A strategies positively correlated with interpreting performance, and that of Type-C strategies negatively correlated, especially at Stage 2. In addition, our retrospection and interview data indicated that, for these unbalanced L2 learners, strategy use mostly aimed for better information accuracy and completeness, especially at Stage 2. These results suggest that strategy training is effective, and strategy acquisition is plausible
Genome-wide analysis of CCCH zinc finger family in Arabidopsis and rice
<p>Abstract</p> <p>Background</p> <p>Genes in the CCCH family encode zinc finger proteins containing the motif with three cysteines and one histidine residues. They have been known to play important roles in RNA processing as RNA-binding proteins in animals. To date, few plant CCCH proteins have been studied functionally.</p> <p>Results</p> <p>In this study, a comprehensive computational analysis identified 68 and 67 CCCH family genes in Arabidopsis and rice, respectively. A complete overview of this gene family in Arabidopsis was presented, including the gene structures, phylogeny, protein motifs, and chromosome locations. In addition, a comparative analysis between these genes in Arabidopsis and rice was performed. These results revealed that the CCCH families in Arabidopsis and rice were divided into 11 and 8 subfamilies, respectively. The gene duplication contributed to the expansion of the CCCH gene family in Arabidopsis genome. Expression studies indicated that CCCH proteins exhibit a variety of expression patterns, suggesting diverse functions. Finally, evolutionary analysis showed that one subfamily is higher plant specific. The expression profile indicated that most members of this subfamily are regulated by abiotic or biotic stresses, suggesting that they could have an effective role in stress tolerance.</p> <p>Conclusion</p> <p>Our comparative genomics analysis of CCCH genes and encoded proteins in two model plant species provides the first step towards the functional dissection of this emerging family of potential RNA-binding proteins.</p
Attribute-based encryption for cloud computing access control: A survey
National Research Foundation (NRF) Singapore; AXA Research Fun
Security and privacy in smart health: Efficient policy-hiding attribute-based access control
AXA Research Fund Singapor
A Survey of Natural Language Generation
This paper offers a comprehensive review of the research on Natural Language
Generation (NLG) over the past two decades, especially in relation to
data-to-text generation and text-to-text generation deep learning methods, as
well as new applications of NLG technology. This survey aims to (a) give the
latest synthesis of deep learning research on the NLG core tasks, as well as
the architectures adopted in the field; (b) detail meticulously and
comprehensively various NLG tasks and datasets, and draw attention to the
challenges in NLG evaluation, focusing on different evaluation methods and
their relationships; (c) highlight some future emphasis and relatively recent
research issues that arise due to the increasing synergy between NLG and other
artificial intelligence areas, such as computer vision, text and computational
creativity.Comment: Accepted by ACM Computing Survey (CSUR) 202
- …