8,951 research outputs found

    Refinement for Administrative Policies

    Get PDF
    Flexibility of management is an important requisite for access control systems as it allows users to adapt the access control system in accordance with practical requirements. This paper builds on earlier work where we defined administrative policies for a general class of RBAC models. We present a formal definition of administrative refinnement and we show that there is an ordering for administrative privileges which yields administrative refinements of policies. We argue (by giving an example) that this privilege ordering can be very useful in practice, and we prove that the privilege ordering is tractable

    Variation and Distribution of Glucosinolates in 42 Cultivars of Brassica oleracea Vegetable Crops

    Get PDF
    Brassica vegetables are known to contain glucosinolates that are precursors for bioactive compounds like isothiocyanates that have been shown to play an important role in human health. This study reports the results of a screening of 11 Brassica oleracea crops consisting of 42 cultivars (6 white cabbage, 5 red cabbage, 7 Brussels sprouts, 2 kale, 1 tronchuda, 3 oxheart cabbage, 2 kohlrabi, 6 broccoli, 5 cauliflower, 3 romanesco and 2 Savoy cabbage). All these cultivars were cultivated under the same conditions on a single location in the same season. The variation found in the level of glucosinolates is expected to be mainly due to the genetic variation. A large variation was observed in the level and profile of glucosinolates. Total glucosinolates varied from 14 to 625 µmol/100 g fresh weight. Glucoraphanin, the precursor of the isothiocyanate sulforophane, varied from 0 to 141 µmol/100 g fresh weight. Within broccoli glucoraphanin varied from 27 to 141 µmol/100 g fresh weight. Glucoiberin that is structurally related to glucoraphanin varied from 6 to 397 µmol/100 g fresh weight. Within broccoli glucoiberin varied from 21 to 397 µmol/100 g fresh weigh

    Privacy in an Ambient World

    Get PDF
    Privacy is a prime concern in today's information society. To protect\ud the privacy of individuals, enterprises must follow certain privacy practices, while\ud collecting or processing personal data. In this chapter we look at the setting where an\ud enterprise collects private data on its website, processes it inside the enterprise and\ud shares it with partner enterprises. In particular, we analyse three different privacy\ud systems that can be used in the different stages of this lifecycle. One of them is the\ud Audit Logic, recently introduced, which can be used to keep data private when it\ud travels across enterprise boundaries. We conclude with an analysis of the features\ud and shortcomings of these systems

    Audit-based Compliance Control (AC2) for EHR Systems

    Get PDF
    Traditionally, medical data is stored and processed using paper-based files. Recently, medical facilities have started to store, access and exchange medical data in digital form. The drivers for this change are mainly demands for cost reduction, and higher quality of health care. The main concerns when dealing with medical data are availability and confidentiality. Unavailability (even temporary) of medical data is expensive. Physicians may not be able to diagnose patients correctly, or they may have to repeat exams, adding to the overall costs of health care. In extreme cases availability of medical data can even be a matter of life or death. On the other hand, confidentiality of medical data is also important. Legislation requires medical facilities to observe the privacy of the patients, and states that patients have a final say on whether or not their medical data can be processed or not. Moreover, if physicians, or their EHR systems, are not trusted by the patients, for instance because of frequent privacy breaches, then patients may refuse to submit (correct) information, complicating the work of the physicians greatly. \ud \ud In traditional data protection systems, confidentiality and availability are conflicting requirements. The more data protection methods are applied to shield data from outsiders the more likely it becomes that authorized persons will not get access to the data in time. Consider for example, a password verification service that is temporarily not available, an access pass that someone forgot to bring, and so on. In this report we discuss a novel approach to data protection, Audit-based Compliance Control (AC2), and we argue that it is particularly suited for application in EHR systems. In AC2, a-priori access control is minimized to the mere authentication of users and objects, and their basic authorizations. More complex security procedures, such as checking user compliance to policies, are performed a-posteriori by using a formal and automated auditing mechanism. To support our claim we discuss legislation concerning the processing of health records, and we formalize a scenario involving medical personnel and a basic EHR system to show how AC2 can be used in practice. \ud \ud This report is based on previous work (Dekker & Etalle 2006) where we assessed the applicability of a-posteriori access control in a health care scenario. A more technically detailed article about AC2 recently appeared in the IJIS journal, where we focussed however on collaborative work environments (Cederquist, Corin, Dekker, Etalle, & Hartog, 2007). In this report we first provide background and related work before explaining the principal components of the AC2 framework. Moreover we model a detailed EHR case study to show its operation in practice. We conclude by discussing how this framework meets current trends in healthcare and by highlighting the main advantages and drawbacks of using an a-posteriori access control mechanism as opposed to more traditional access control mechanisms

    Old Russian birchbark letters: a pragmatic approach

    Get PDF
    This study is devoted to a corpus of Old Russian letters, written on pieces of birchbark. These unique texts from Novgorod and surroundings give us an exceptional impression of everyday life in medieval Russian society. The organic material has been preserved in the soil, and every year new birchbark letters tend to be unearthed during excavations in Novgorod. In this study, the birchbark letters are addressed from a pragmatic angle. A number of linguistic parameters are identified that shed light on the degree to which literacy had gained ground in the communicative processes of the time. It is demonstrated that the birchbark letters occupy an intermediate position between orality and literacy. On the one hand, old oral habits of communication persisted, and are reflected in the way in which the birchbark letters are phrased; they are characterized by a large degree of context-dependence. On the other hand, new literate modes of expression emerged, which can be seen in the development of normative conventions and fixed formulae. The subject will be of interest not only to scholars of Russian, but also to a broader circle of linguists who work in the fields of corpus linguistics and historical pragmatics

    A Mechanism for Cutting Carbon Nanotubes with a Scanning Tunneling Microscope

    Full text link
    We discuss the local cutting of single-walled carbon nanotubes by a voltage pulse to the tip of a scanning tunneling microscope. The tip voltage (V\mid V \mid \ge ~3.8 eV) is the key physical quantity in the cutting process. After reviewing several possible physical mechanisms we conclude that the cutting process relies on the weakening of the carbon-carbon bonds through a combination of localized particle-hole excitations induced by inelastically tunneling electrons and elastic deformation due to the electric field between tip and sample. The carbon network releases part of the induced mechanical stress by forming topological defects that act as nucleation centers for the formation of dislocations that dynamically propagate towards bond-breaking.Comment: 7 pages, 6 postscript figures, submitted to PR

    Scanning Tunneling Spectroscopy of Suspended Single-Wall Carbon Nanotubes

    Full text link
    We have performed low-temperature STM measurements on single-wall carbon nanotubes that are freely suspended over a trench. The nanotubes were grown by CVD on a Pt substrate with predefined trenches etched into it. Atomic resolution was obtained on the freestanding portions of the nanotubes. Spatially resolved spectroscopy on the suspended portion of both metallic and semiconducting nanotubes was also achieved, showing a Coulomb-staircase behavior superimposed on the local density of states. The spacing of the Coulomb blockade peaks changed with tip position reflecting a changing tip-tube capacitance

    Teaching Signal Processing to the Medical Profession

    Get PDF
    Knowledge of signal processing is very important for medical students. A medical signal may be used for monitoring, constructing an image, or for extracting the numerical quantity of a parameter. This information forms a basis for medical decisions. However, the processing of the signal may lead to distortion and an incorrect interpretation. The present article describes an educational practical for first year medical students. It uses the electrocardiogram, which can be obtained easily, as a convenient example of a medical signal. The practical was developed at the VU University Amsterdam and summarizes the elementary concepts of signal processing

    Crossover from Luttinger liquid to Coulomb blockade regime in carbon nanotubes

    Full text link
    We develop a theoretical approach to the low-energy properties of 1D electron systems aimed to encompass the mixed features of Luttinger liquid and Coulomb blockade behavior observed in the crossover between the two regimes. For this aim we extend the Luttinger liquid description by incorporating the effects of a discrete single-particle spectrum. The intermediate regime is characterized by a power-law behavior of the conductance, but with an exponent oscillating with the gate voltage, in agreement with recent experimental observations. Our construction also accounts naturally for the existence of a crossover in the zero-bias conductance, mediating between two temperature ranges where the power-law behavior is preserved but with different exponent.Comment: 5 pages, 3 figure

    Electronic Transport Spectroscopy of Carbon Nanotubes in a Magnetic Field

    Full text link
    We report magnetic field spectroscopy measurements in carbon nanotube quantum dots exhibiting four-fold shell structure in the energy level spectrum. The magnetic field induces a large splitting between the two orbital states of each shell, demonstrating their opposite magnetic moment and determining transitions in the spin and orbital configuration of the quantum dot ground state. We use inelastic cotunneling spectroscopy to accurately resolve the spin and orbital contributions to the magnetic moment. A small coupling is found between orbitals with opposite magnetic moment leading to anticrossing behavior at zero field.Comment: 7 pages, 4 figure
    corecore