1,268 research outputs found

    A Cut Principle for Information Flow

    Full text link
    We view a distributed system as a graph of active locations with unidirectional channels between them, through which they pass messages. In this context, the graph structure of a system constrains the propagation of information through it. Suppose a set of channels is a cut set between an information source and a potential sink. We prove that, if there is no disclosure from the source to the cut set, then there can be no disclosure to the sink. We introduce a new formalization of partial disclosure, called *blur operators*, and show that the same cut property is preserved for disclosure to within a blur operator. This cut-blur property also implies a compositional principle, which ensures limited disclosure for a class of systems that differ only beyond the cut.Comment: 31 page

    A Hybrid Analysis for Security Protocols with State

    Full text link
    Cryptographic protocols rely on message-passing to coordinate activity among principals. Each principal maintains local state in individual local sessions only as needed to complete that session. However, in some protocols a principal also uses state to coordinate its different local sessions. Sometimes the non-local, mutable state is used as a means, for example with smart cards or Trusted Platform Modules. Sometimes it is the purpose of running the protocol, for example in commercial transactions. Many richly developed tools and techniques, based on well-understood foundations, are available for design and analysis of pure message-passing protocols. But the presence of cross-session state poses difficulties for these techniques. In this paper we provide a framework for modeling stateful protocols. We define a hybrid analysis method. It leverages theorem-proving---in this instance, the PVS prover---for reasoning about computations over state. It combines that with an "enrich-by-need" approach---embodied by CPSA---that focuses on the message-passing part. As a case study we give a full analysis of the Envelope Protocol, due to Mark Ryan

    Laser ablation loading of a surface-electrode ion trap

    Full text link
    We demonstrate loading by laser ablation of 88^{88}Sr+^+ ions into a mm-scale surface-electrode ion trap. The laser used for ablation is a pulsed, frequency-tripled Nd:YAG with pulse energies of 1-10 mJ and durations of 3-5 ns. An additional laser is not required to photoionize the ablated material. The efficiency and lifetime of several candidate materials for the laser ablation target are characterized by measuring the trapped ion fluorescence signal for a number of consecutive loads. Additionally, laser ablation is used to load traps with a trap depth (40 meV) below where electron impact ionization loading is typically successful (≳\gtrsim 500 meV).Comment: 4 pages, 4 figure

    Lack of Evidence from Studies of Soluble Protein Fragments that Knops Blood Group Polymorphisms in Complement Receptor-Type 1 Are Driven by Malaria

    Get PDF
    Complement receptor-type 1 (CR1, CD35) is the immune-adherence receptor, a complement regulator, and an erythroid receptor for Plasmodium falciparum during merozoite invasion and subsequent rosette formation involving parasitized and non-infected erythrocytes. The non-uniform geographical distribution of Knops blood group CR1 alleles Sl1/2 and McCa/b may result from selective pressures exerted by differential exposure to infectious hazards. Here, four variant short recombinant versions of CR1 were produced and analyzed, focusing on complement control protein modules (CCPs) 15–25 of its ectodomain. These eleven modules encompass a region (CCPs 15–17) key to rosetting, opsonin recognition and complement regulation, as well as the Knops blood group polymorphisms in CCPs 24–25. All four CR1 15–25 variants were monomeric and had similar axial ratios. Modules 21 and 22, despite their double-length inter-modular linker, did not lie side-by-side so as to stabilize a bent-back architecture that would facilitate cooperation between key functional modules and Knops blood group antigens. Indeed, the four CR1 15–25 variants had virtually indistinguishable affinities for immobilized complement fragments C3b (KD = 0.8–1.1 µM) and C4b (KD = 5.0–5.3 µM). They were all equally good co-factors for factor I-catalysed cleavage of C3b and C4b, and they bound equally within a narrow affinity range, to immobilized C1q. No differences between the variants were observed in assays for inhibition of erythrocyte invasion by P. falciparum or for rosette disruption. Neither differences in complement-regulatory functionality, nor interactions with P. falciparum proteins tested here, appear to have driven the non-uniform geographic distribution of these alleles

    The Seismic Noise Environment of Antarctica

    Get PDF
    This characterization of the seismic noise environment of Antarctica, documentation of instrument performance, and comparisons of installation conditions (e.g., ice vaults vs. rock sites) is intended to facilitate optimization of future seismological deployments in such environments. We analyze data from a range of recent experiments to provide a broad geographical characterization of Antarctica’s seismic noise environment, which can now include more substantial observations from regions that are free from anthropogenic noise contamination
    • …
    corecore