74 research outputs found

    Data degradation to enhance privacy for the Ambient Intelligence

    Get PDF
    Increasing research in ubiquitous computing techniques towards the development of an Ambient Intelligence raises issues regarding privacy. To gain the required data needed to enable application in this Ambient Intelligence to offer smart services to users, sensors will monitor users' behavior to fill personal context histories. Those context histories will be stored on database/information systems which we consider as honest: they can be trusted now, but might be subject to attacks in the future. Making this assumption implies that protecting context histories by means of access control might be not enough. To reduce the impact of possible attacks, we propose to use limited retention techniques. In our approach, we present applications a degraded set of data with a retention delay attached to it which matches both application requirements and users privacy wishes. Data degradation can be twofold: the accuracy of context data can be lowered such that the less privacy sensitive parts are retained, and context data can be transformed such that only particular abilities for application remain available. Retention periods can be specified to trigger irreversible removal of the context data from the system

    Hierarchical Spring-Block Model for Multiscale Friction Problems

    Get PDF
    N.M.P. is supported by the European Research Council PoC 2015 “Silkene” No. 693670, by the European Commission H2020 under the Graphene Flagship Core 1 No. 696656 (WP14 “Polymer Nanocomposites”), and FET Proactive “Neurofibers” grant No. 732344. G.C. and F.B. are supported by H2020 FET Proactive “Neurofibers” grant No. 73234

    Role of Interaction and Nucleoside Diphosphate Kinase B in Regulation of the Cystic Fibrosis Transmembrane Conductance Regulator Function by cAMP-Dependent Protein Kinase A

    Get PDF
    Cystic fibrosis results from mutations in the cystic fibrosis transmembrane conductance regulator (CFTR), a cAMP-dependent protein kinase A (PKA) and ATP-regulated chloride channel. Here, we demonstrate that nucleoside diphosphate kinase B (NDPK-B, NM23-H2) forms a functional complex with CFTR. In airway epithelia forskolin/IBMX significantly increases NDPK-B co-localisation with CFTR whereas PKA inhibitors attenuate complex formation. Furthermore, an NDPK-B derived peptide (but not its NDPK-A equivalent) disrupts the NDPK-B/CFTR complex in vitro (19-mers comprising amino acids 36-54 from NDPK-B or NDPK-A). Overlay (Far-Western) and Surface Plasmon Resonance (SPR) analysis both demonstrate that NDPK-B binds CFTR within its first nucleotide binding domain (NBD1, CFTR amino acids 351-727). Analysis of chloride currents reflective of CFTR or outwardly rectifying chloride channels (ORCC, DIDS-sensitive) showed that the 19-mer NDPK-B peptide (but not its NDPK-A equivalent) reduced both chloride conductances. Additionally, the NDPK-B (but not NDPK-A) peptide also attenuated acetylcholine-induced intestinal short circuit currents. In silico analysis of the NBD1/NDPK-B complex reveals an extended interaction surface between the two proteins. This binding zone is also target of the 19-mer NDPK-B peptide, thus confirming its capability to disrupt NDPK-B/CFTR complex. We propose that NDPK-B forms part of the complex that controls chloride currents in epithelia

    Folk-IS

    No full text

    A new Sharing Paradigm for the Personal Cloud

    No full text
    International audiencePushed by recent legislation and smart disclosure initiatives, personal cloud solutions emerge and hold the promise of giving the control back to the individual on her data. However, this shift leaves the privacy and security issues in user's hands, a role that few people can properly endorse. Considering the inadequacy of existing sharing models, we advocate the definition of a new sharing paradigm dedicated to the personal cloud context. This sharing paradigm, called SWYSWYK (Share What You See with Who You Know), allows to derive intuitive sharing rules from the personal cloud content, to self-administer the subjects and the sensitive permissions, and to visualize the net effects of the sharing policy on the user's personal cloud. We then propose a reference architecture providing the users tangible guarantees about the enforcement of the SWYSWYK policies. An instance of this architecture has been implemented on top of an existing personal cloud platform to demonstrate the practicality of the approach

    SQL/AA

    No full text

    Folk-IS: Opportunistic Data Services in Least Developed Countries

    Get PDF
    According to a wide range of studies, IT should become a key facilitator in establishing primary education, reducing mortality and supporting commercial initiatives in Least Developed Countries (LDCs). The main barrier to the development of IT services in these regions is not only the lack of communication facilities, but also the lack of consistent information systems, security procedures, economic and legal support, as well as political commitment. In this paper, we propose the vision of an infrastructureless data platform well suited for the development of innovative IT services in LDCs. We propose a participatory approach, where each individual implements a small subset of a complete information system thanks to highly secure, portable and low-cost personal devices as well as opportunistic networking, without the need of any form of infrastructure. We review the technical challenges that are specific to this approach. 1

    DiSC: Benchmarking Secure Chip DBMS

    No full text
    • 

    corecore