50 research outputs found

    Cy Twombly. Bild, Text, Paratext

    Get PDF
    Die Bildwerke des US-amerikanischen Künstlers Cy Twombly (1928–2011) gelten als hermetisch und schwer zugänglich. Bleistiftgekritzel, Farbballungen, taumelnde Linien, einander überlagernde Farbschichten und Einschreibungen, geometrische Figuren, Zahlen, Zahlenreihen, Wörter, Zitatfragmente und rätselhafte Bildtitel stellen Forscher wie Betrachter vor ganz besondere Herausforderungen. Gemäß der interdisziplinär-transkulturellen Forschungsmethode des Internationalen Kollegs Morphomata an der Universität zu Köln versammelte im Juni 2012 ein Kongress neben Kunsthistorikern auch namhafte Fachleute aus den Bereichen Ägyptologie, Archäologie, Germanistik, Gräzistik, Anglistik, Japanologie und Romanistik, d.h. all jenen Fachgebieten und Kulturkreisen, die eine Inspirationsquelle für das OEuvre Cy Twomblys darstellten. Befragen diese den Bezug zwischen Werktitel, Werk und eingeschriebenen Zitaten, so legen führende Vertreter der Twomblyforschung den Fokus auf Bildsprache und Schriftbildlichkeit bei Cy Twombly. Durch umfassende Deutungen berühmter Einzelwerke und Werkgruppen in sämtlichen von Twombly angewandten künstlerischen Medien erschließt der Band in einem fächerübergreifenden Blick einen Zugang zur assoziativ-referentiellen Bildsprache Cy Twomblys

    Cy Twombly. Image, Text, Paratext

    Get PDF
    The artworks of the US artist Cy Twombly (1928–2011) are considered to be hermetic and inaccessible. Pencil scribblings, explosions of paint, tumbling lines, overlapping layers of color, and inscriptions, geometrical figures, numerals, rows of numbers, words, fragments of quotations, and enigmatic work-titles present very special challenges to both researchers and viewers. In the interdisciplinary and transcultural research method of the Morphomata International Center for Advanced Studies at the University of Cologne, a conference was held in June 2012 that brought art historians together with renowned scholars of Egyptology, Archaeology, German, Greek, English, Japanese, and the Romance languages, i.e. all the fields and cultural spheres that were a source of inspiration for the œuvre of Cy Twombly. While these scholars inquire into the relation between title, work, and inscribed quotations, leading representatives of research on Twombly focus on the visual language and scriptural-imagistic quality of Cy Twombly’s work. Through comprehensive interpretations of famous single works and groups in all the artistic media employed by Twombly, the volume’s cross-disciplinary view opens up a route into the associative-referential visual language of Cy Twombly

    Practical whole-system provenance capture

    Get PDF
    Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been applied to them. Data provenance has many uses, from forensics and security to aiding the reproducibility of scientific experiments. We present CamFlow, a whole-system provenance capture mechanism that integrates easily into a PaaS offering. While there have been several prior whole-system provenance systems that captured a comprehensive, systemic and ubiquitous record of a system’s behavior, none have been widely adopted. They either A) impose too much overhead, B) are designed for long-outdated kernel releases and are hard to port to current systems, C) generate too much data, or D) are designed for a single system. CamFlow addresses these shortcoming by: 1) leveraging the latest kernel design advances to achieve efficiency; 2) using a self-contained, easily maintainable implementation relying on a Linux Security Module, NetFilter, and other existing kernel facilities; 3) providing a mechanism to tailor the captured provenance data to the needs of the application; and 4) making it easy to integrate provenance across distributed systems. The provenance we capture is streamed and consumed by tenant-built auditor applications. We illustrate the usability of our implementation by describing three such applications: demonstrating compliance with data regulations; performing fault/intrusion detection; and implementing data loss prevention. We also show how CamFlow can be leveraged to capture meaningful provenance without modifying existing applications.Engineering and Applied Science

    An Evolutionary Approach to Multilaterally Secure Services

    Get PDF
    Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensitive data. Modern services, e.g. call forwarding, tele-conferencing, and voice mail services use or store personal data to implement individual services. Sensitive data include personal identities or calling numbers, location information of the communicating parties, service indicators, number translation tables, reachability information, and time and duration of communication events. Generally usable open security services interfaces are proposed, that promote security services implemented in user terminals or Trusted Third Parties in order to satisfy currently ignored and evolving security requirements in a more flexible and scalable way. This approach will both save the huge investments in today’s telecommunication infrastructure and promote open security services that are independent of the underlying network infrastructure.

    Prima: policy-reduced integrity measurement architecture

    No full text
    LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. Ithas been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). Copies may be requested from IBM T. J. Watson Research Center, P
    corecore