2,163 research outputs found

    Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems

    Get PDF
    This thesis addresses the foundational aspects of formal methods for applications in security and in particular in anonymity. More concretely, we develop frameworks for the specification of anonymity properties and propose algorithms for their verification. Since in practice anonymity protocols always leak some information, we focus on quantitative properties, which capture the amount of information leaked by a protocol. The main contribution of this thesis is cpCTL, the first temporal logic that allows for the specification and verification of conditional probabilities (which are the key ingredient of most anonymity properties). In addition, we have considered several prominent definitions of information-leakage and developed the first algorithms allowing us to compute (and even approximate) the information leakage of anonymity protocols according to these definitions. We have also studied a well-known problem in the specification and analysis of distributed anonymity protocols, namely full-information scheduling. To overcome this problem, we have proposed an alternative notion of scheduling and adjusted accordingly several anonymity properties from the literature. Our last major contribution is a debugging technique that helps on the detection of flaws in security protocols.Comment: thesis, ISBN: 978-94-91211-74-

    Differential Privacy: on the trade-off between Utility and Information Leakage

    Get PDF
    Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent datasets give the same answer is bound by e^epsilon. In the field of information flow there is a similar concern for controlling information leakage, i.e. limiting the possibility of inferring the secret information from the observables. In recent years, researchers have proposed to quantify the leakage in terms of R\'enyi min mutual information, a notion strictly related to the Bayes risk. In this paper, we show how to model the query system in terms of an information-theoretic channel, and we compare the notion of differential privacy with that of mutual information. We show that differential privacy implies a bound on the mutual information (but not vice-versa). Furthermore, we show that our bound is tight. Then, we consider the utility of the randomization mechanism, which represents how close the randomized answers are, in average, to the real ones. We show that the notion of differential privacy implies a bound on utility, also tight, and we propose a method that under certain conditions builds an optimal randomization mechanism, i.e. a mechanism which provides the best utility while guaranteeing differential privacy.Comment: 30 pages; HAL repositor

    Elucidation of molecular kinetic schemes from macroscopic traces using system identification

    Get PDF
    Overall cellular responses to biologically-relevant stimuli are mediated by networks of simpler lower-level processes. Although information about some of these processes can now be obtained by visualizing and recording events at the molecular level, this is still possible only in especially favorable cases. Therefore the development of methods to extract the dynamics and relationships between the different lower-level (microscopic) processes from the overall (macroscopic) response remains a crucial challenge in the understanding of many aspects of physiology. Here we have devised a hybrid computational-analytical method to accomplish this task, the SYStems-based MOLecular kinetic scheme Extractor (SYSMOLE). SYSMOLE utilizes system-identification input-output analysis to obtain a transfer function between the stimulus and the overall cellular response in the Laplace-transformed domain. It then derives a Markov-chain state molecular kinetic scheme uniquely associated with the transfer function by means of a classification procedure and an analytical step that imposes general biological constraints. We first tested SYSMOLE with synthetic data and evaluated its performance in terms of its rate of convergence to the correct molecular kinetic scheme and its robustness to noise. We then examined its performance on real experimental traces by analyzing macroscopic calcium-current traces elicited by membrane depolarization. SYSMOLE derived the correct, previously known molecular kinetic scheme describing the activation and inactivation of the underlying calcium channels and correctly identified the accepted mechanism of action of nifedipine, a calcium-channel blocker clinically used in patients with cardiovascular disease. Finally, we applied SYSMOLE to study the pharmacology of a new class of glutamate antipsychotic drugs and their crosstalk mechanism through a heteromeric complex of G protein-coupled receptors. Our results indicate that our methodology can be successfully applied to accurately derive molecular kinetic schemes from experimental macroscopic traces, and we anticipate that it may be useful in the study of a wide variety of biological systems

    On the information leakage of differentially-private mechanisms

    Get PDF
    International audienceDifferential privacy aims at protecting the privacy of participants instatistical databases. Roughly, a mechanism satisfies differential privacy ifthe presence or value of a single individual in the database does notsignificantly change the likelihood of obtaining a certain answer to anystatistical query posed by a data analyst. Differentially-private mechanisms areoften oblivious: first the query is processed on the database to produce a trueanswer, and then this answer is adequately randomized before being reported tothe data analyst. Ideally, a mechanism should minimize leakage, i.e., obfuscateas much as possible the link between reported answers and individuals' data,while maximizing utility, i.e., report answers as similar as possible to thetrue ones. These two goals, however, are in conflict with each other, thusimposing a trade-off between privacy and utility.In this paper we use quantitative information flow principles to analyze leakageand utility in oblivious differentially-private mechanisms. We introduce atechnique that exploits graph symmetries of the adjacency relation on databasesto derive bounds on the min-entropy leakage of the mechanism. We consider anotion of utility based on identity gain functions, which is closely related tomin-entropy leakage, and we derive bounds for it. Finally, given some graphsymmetries, we provide a mechanism that maximizes utility while preserving therequired level of differential privacy

    An analytical tool for elucidating ion-channel molecular mechanisms from macroscopic current traces

    Get PDF
    Building models to describe the dynamics of macroscopic currents through ion channels has been the object of numerous studies in the literature with the aim of understanding ion-channel function. Following a perturbation, typically a step in voltage or ligand concentration, the response is formed by a combination of different processes such as activation or inactivation that pull the measured quantity (macroscopic current) in the same or opposite directions with different strengths and different time constants. Although this dynamic response can be readily recorded in time, the relationship between the underlying processes cannot be easily teased apart without structural analysis or single-channel recordings. An example is the classic problem of determining from sodium-channel macroscopic traces whether the activation and inactivation processes occur in parallel or inactivation is dependent on previous activation. We present a mathematical tool to analyze electrophysiological traces and derive molecular kinetic schemes that reflect the interplay between the different processes involved. This tool is based on system-identification algorithms and consists of three modules as summarized in Figure 1. The identifier takes the input and output signals in the time domain and applies autoregressive ARX methods to obtain a transfer function in the Laplace domain yielding a set of poles, zeros and gain that provide a unique signature of the channel response. The classifier capitalizes on this signature to reveal the block diagram associated with the interplay of the processes, that are here described as first order systems in classic engineering terms (a relaxation with one time constant and a gain for each process). Finally, the molecular kinetic converter uses the transfer function together with the block diagram and maps them into a molecular kinetic scheme, a description with states associated with a system of differential equations

    On the relation between virial coefficients and the close-packing of hard disks and hard spheres

    Full text link
    The question of whether the known virial coefficients are enough to determine the packing fraction η\eta_\infty at which the fluid equation of state of a hard-sphere fluid diverges is addressed. It is found that the information derived from the direct Pad\'e approximants to the compressibility factor constructed with the virial coefficients is inconclusive. An alternative approach is proposed which makes use of the same virial coefficients and of the equation of state in a form where the packing fraction is explicitly given as a function of the pressure. The results of this approach both for hard-disk and hard-sphere fluids, which can straightforwardly accommodate higher virial coefficients when available, lends support to the conjecture that η\eta_\infty is equal to the maximum packing fraction corresponding to an ordered crystalline structure.Comment: 10 pages, 6 figures; v2: discussion about hard-square and hard-hexagon systems on a lattice added; five new reference

    Variables Sociodemográficas y niveles de salud en población general: Un estudio en la isla de Formentera

    Get PDF
    Se presentan los resultados de la primera fase de un estudio epidemiológico descriptivo transversal realizado en la isla de Formentera. Se ha utilizado el General Health Questionnaire (GHQ), en su versión de 28 items, en una muestra de población general constituida por 697 personas. El GHQ es una escala que evalúa síntomas somáticos de origen psicológico, angustia o ansiedad, disfunción social en las actividades diarias y depresión y suele utilizarse como instrumento de screening. Los resultados indican que un 20% de los entrevistados puede ser considerado como probable caso, dándose un porcentaje mayor de probables casos positivos entre las mujeres, las personas más jóvenes y las mayores y entre quienes carecen de ocupación laboral. Concretamente, las mujeres puntúan significativamente más alto en las escalas que evalúan los síntomas somáticos de origen psicológico y las personas sin trabajo en aquellas que evalúan angustia/ ansiedad, disfunción social en las actividades diarias y depresión. No existen diferencias estadísticamente significativas entre los grupos diferenciados según estado civil, nivel de estudios o nivel económico

    Efficient methods for radiation, scattering and propagation. Poster

    Get PDF
    This document describes the research activities performed in the areas of antennas, scattering and wave propagation by several research groups belonging to different Universities located in Eastern Spain. These groups are working in the practical applications of efficient numerical electromagnetic methods within the frame of several research projects funded by private and public Spanish and European institutions. The main results obtained by these groups related to such topics, i.e. analysis algorithms, CAD tools, validation prototypes, as well as most relevant publications in technical conferences, journals and books, will be thoroughly described in this summary

    Excited-state absorption in erbium-doped silica fiber with simultaneous excitation at 977 and 1531 nm

    Get PDF
    We report a study of the excited-state absorption (ESA) in erbium-doped silica fiber (EDF) pumped at 977 nm, when the fiber is simultaneously excited by signal radiation at 1531 nm. We show, both experimentally and theoretically, that ESA efficiency at 977 nm gets strongly enhanced only in the presence of signal power. Experimentally, this conclusion is supported through the detection of upconversion emission, a “fingerprint” of the ESA process, and through the measurements of the EDF nonlinear transmission coefficient for the pump wavelength, which is sensitive to the ESA value. It is shown that the experimental data are precisely modeled with an advanced five-level Er3+ model developed for the [email protected] [email protected]

    Elucidating the real-time Ag nanoparticle growth on alpha-Ag2WO4 during electron beam irradiation: experimental evidence and theoretical insights

    Get PDF
    FAPESP - FUNDAÇÃO DE AMPARO À PESQUISA DO ESTADO DE SÃO PAULOCNPQ - CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICOCAPES - COORDENAÇÃO DE APERFEIÇOAMENTO DE PESSOAL DE NÍVEL SUPERIORWhy and how Ag is formed when electron beam irradiation takes place on alpha-Ag2WO4 in a vacuum transmission electron microscopy chamber? To find an answer, the atomic-scale mechanisms underlying the formation and growth of Ag on alpha-Ag2WO4 have been investigated by detailed in situ transmission electron microscopy (TEM) and field emission scanning electron microscopy (FE-SEM) studies, density functional theory based calculations and ab initio molecular dynamics simulations. The growth process at different times, chemical composition, size distribution and element distribution were analyzed in depth at the nanoscale level using FE-SEM, operated at different voltages (5, 10, 15, and 20 kV), and TEM with energy dispersive spectroscopy (EDS) characterization. The size of Ag nanoparticles covers a wide range of values. Most of the Ag particles are in the 20-40 nm range. The nucleation and formation of Ag on alpha-Ag2WO4 is a result of structural and electronic changes in the AgOx (x = 2,4, 6, and 7) clusters used as constituent building blocks of this material, consistent with metallic Ag formation. First principle calculations point out that Ag-3 and Ag-4-fold coordinated centers, located in the sub-surface of the (100) surface, are the most energetically favorable to undergo the diffusion process to form metallic Ag. Ab initio molecular dynamics simulations and the nudged elastic band (NEB) method were used to investigate the minimum energy pathways of these Ag atoms from positions in the first slab layer to outward sites on the (100) surface of alpha-Ag2WO4. The results point out that the injection of electrons decreases the activation barrier for this diffusion step and this unusual behavior results from the presence of a lower energy barrier process.Why and how Ag is formed when electron beam irradiation takes place on alpha-Ag2WO4 in a vacuum transmission electron microscopy chamber? To find an answer, the atomic-scale mechanisms underlying the formation and growth of Ag on alpha-Ag2WO4 have been investigated by detailed in situ transmission electron microscopy (TEM) and field emission scanning electron microscopy (FE-SEM) studies, density functional theory based calculations and ab initio molecular dynamics simulations. The growth process at different times, chemical composition, size distribution and element distribution were analyzed in depth at the nanoscale level using FE-SEM, operated at different voltages (5, 10, 15, and 20 kV), and TEM with energy dispersive spectroscopy (EDS) characterization. The size of Ag nanoparticles covers a wide range of values. Most of the Ag particles are in the 20-40 nm range. The nucleation and formation of Ag on alpha-Ag2WO4 is a result of structural and electronic changes in the AgOx (x = 2,4, 6, and 7) clusters used as constituent building blocks of this material, consistent with metallic Ag formation. First principle calculations point out that Ag-3 and Ag-4-fold coordinated centers, located in the sub-surface of the (100) surface, are the most energetically favorable to undergo the diffusion process to form metallic Ag. Ab initio molecular dynamics simulations and the nudged elastic band (NEB) method were used to investigate the minimum energy pathways of these Ag atoms from positions in the first slab layer to outward sites on the (100) surface of alpha-Ag2WO4. The results point out that the injection of electrons decreases the activation barrier for this diffusion step and this unusual behavior results from the presence of a lower energy barrier process.17753525359FAPESP - FUNDAÇÃO DE AMPARO À PESQUISA DO ESTADO DE SÃO PAULOCNPQ - CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICOCAPES - COORDENAÇÃO DE APERFEIÇOAMENTO DE PESSOAL DE NÍVEL SUPERIORFAPESP - FUNDAÇÃO DE AMPARO À PESQUISA DO ESTADO DE SÃO PAULOCNPQ - CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICOCAPES - COORDENAÇÃO DE APERFEIÇOAMENTO DE PESSOAL DE NÍVEL SUPERIORFAPESP [2013/07296-2, 2012/14468-1, 2010/16970-0, 2013/02032-7]CNPq [573636/2008-7, 150753/2013-6]CAPES [088/2013]2010/16970-02012/14468-12013/02032-72013/07296-2573636/2008-7150753/2013-6088/2013The authors are grateful to Prometeo/2009/053 (GeneralitatValenciana), Ministerio de Economia y Competitividad (Spain), CTQ2012-36253-C03-02, Spanish Brazilian program (PHB2009-0065-PC), FAPESP (Project 2013/07296-2) (Project 2012/14468-1) (Project 2010/16970-0), grant (2013/02032-7), CAPES and CNPq (Project 573636/2008-7, Grant 150753/2013-6) and CAPES (Project 088/2013) for financially supporting this research. Most of the calculations were performed using IFGW-UNICAMP computer facilities and the National Center for High Performance Computing in São Paulo (CENAPAD-SP). We also acknowledge the Servei Informática, Universitat Jaume I, for the generous allotment of computer time
    corecore