25 research outputs found

    Randomness Concerns When Deploying Differential Privacy

    Full text link
    The U.S. Census Bureau is using differential privacy (DP) to protect confidential respondent data collected for the 2020 Decennial Census of Population & Housing. The Census Bureau's DP system is implemented in the Disclosure Avoidance System (DAS) and requires a source of random numbers. We estimate that the 2020 Census will require roughly 90TB of random bytes to protect the person and household tables. Although there are critical differences between cryptography and DP, they have similar requirements for randomness. We review the history of random number generation on deterministic computers, including von Neumann's "middle-square" method, Mersenne Twister (MT19937) (previously the default NumPy random number generator, which we conclude is unacceptable for use in production privacy-preserving systems), and the Linux /dev/urandom device. We also review hardware random number generator schemes, including the use of so-called "Lava Lamps" and the Intel Secure Key RDRAND instruction. We finally present our plan for generating random bits in the Amazon Web Services (AWS) environment using AES-CTR-DRBG seeded by mixing bits from /dev/urandom and the Intel Secure Key RDSEED instruction, a compromise of our desire to rely on a trusted hardware implementation, the unease of our external reviewers in trusting a hardware-only implementation, and the need to generate so many random bits.Comment: 12 pages plus 2 pages bibliograph

    Could scientists use Altmetric.com scores to predict longer term citation counts?

    Get PDF
    Altmetrics from Altmetric.com are widely used by publishers and researchers to give earlier evidence of attention than citation counts. This article assesses whether Altmetric.com scores are reliable early indicators of likely future impact and whether they may also reflect non-scholarly impacts. A preliminary factor analysis suggests that the main altmetric indicator of scholarly impact is Mendeley reader counts, with weaker news, informational and social network discussion/promotion dimensions in some fields. Based on a regression analysis of Altmetric.com data from November 2015 and Scopus citation counts from October 2017 for articles in 30 narrow fields, only Mendeley reader counts are consistent predictors of future citation impact. Most other Altmetric.com scores can help predict future impact in some fields. Overall, the results confirm that early Altmetric.com scores can predict later citation counts, although less well than journal impact factors, and the optimal strategy is to consider both Altmetric.com scores and journal impact factors. Altmetric.com scores can also reflect dimensions of non-scholarly impact in some fields

    Research Blogs and the Discussion of Scholarly Information

    Get PDF
    The research blog has become a popular mechanism for the quick discussion of scholarly information. However, unlike peer-reviewed journals, the characteristics of this form of scientific discourse are not well understood, for example in terms of the spread of blogger levels of education, gender and institutional affiliations. In this paper we fill this gap by analyzing a sample of blog posts discussing science via an aggregator called ResearchBlogging.org (RB). ResearchBlogging.org aggregates posts based on peer-reviewed research and allows bloggers to cite their sources in a scholarly manner. We studied the bloggers, blog posts and referenced journals of bloggers who posted at least 20 items. We found that RB bloggers show a preference for papers from high-impact journals and blog mostly about research in the life and behavioral sciences. The most frequently referenced journal sources in the sample were: Science, Nature, PNAS and PLoS One. Most of the bloggers in our sample had active Twitter accounts connected with their blogs, and at least 90% of these accounts connect to at least one other RB-related Twitter account. The average RB blogger in our sample is male, either a graduate student or has been awarded a PhD and blogs under his own name

    Piloting a surveillance system to monitor the global patterns of drug efficacy and the emergence of anthelmintic resistance in soil-transmitted helminth control programs: a Starworms study protocol

    Get PDF
    To eliminate soil-transmitted helminth (STH) infections as a public health problem, the administration of benzimidazole (BZ) drugs to children has recently intensified. But, as drug pressure increases, the development of anthelmintic drug resistance (AR) becomes a major concern. Currently, there is no global surveillance system to monitor drug efficacy and the emergence of AR. Consequently, it is unclear what the current efficacy of the used drugs is and whether AR is already present. The aim of this study is to pilot a global surveillance system to assess anthelmintic drug efficacy and the emergence of AR in STH control programs. For this, we will incorporate drug efficacy trials into national STH control programs of eight countries (Bangladesh, Cambodia, Lao PDR, Vietnam, Ghana, Rwanda, Senegal and a yet to be defined country in the Americas). In each country, one trial will be performed in one program implementation unit to assess the efficacy of BZ drugs against STHs in school-aged children by faecal egg count reduction test. Stool samples will be collected before and after treatment with BZs for Kato-Katz analysis and preserved to purify parasite DNA. The presence and frequency of known single nucleotide polymorphisms (SNPs) in the β-tubulin genes of the different STHs will subsequently be assessed. This study will provide a global pattern of drug efficacy and emergence of AR in STH control programs. The results will provide complementary insights on the validity of known SNPs in the ß-tubulin gene as a marker for AR in human STHs as well as information on the technical and financial resources required to set up a surveillance system. Finally, the collected stool samples will be an important resource to validate different molecular technologies for the detection of AR markers or to identify novel potential molecular markers associated with AR in STH

    Seven Deadliest Web Application Attacks

    No full text
    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request F

    Anti-hacker tool kit

    No full text

    Hacking web apps (Online)

    No full text
    Includes bibliographical references and index.xx, 273 p.
    corecore