1,458 research outputs found

    Accuracy: The fundamental requirement for voting systems

    Get PDF
    There have been several attempts to develop a comprehensive account of the requirements for voting systems, particularly for public elections. Typically, these approaches identify a number of "high level" principals which are then refined either into more detailed statements or more formal constructs. Unfortunately, these approaches do not acknowledge the complexity and diversity of the contexts in which voting takes place. This paper takes a different approach by arguing that the only requirement for a voting system is that it is accurate. More detailed requirements can then be derived from this high level requirement for the particular context in which the system is implemented and deployed. A general, formal high level model for voting systems and their context is proposed. Several related definitions of accuracy for voting systems are then developed, illustrating how the term "accuracy" is in interpreted in different contexts. Finally, a context based requirement for voting system privacy is investigated as an example of deriving a subsidiary requirement from the high level requirement for accuracy

    Using smartphones as a proxy for forensic evidence contained in cloud storage services

    Get PDF
    Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities. The investigation of these cloud environments presents new challenges for the digital forensics community. It is anticipated that smartphone devices will retain data from these storage services. Hence, this research presents a preliminary investigation into the residual artifacts created on an iOS and Android device that has accessed a cloud storage service. The contribution of this paper is twofold. First, it provides an initial assessment on the extent to which cloud storage data is stored on these client-side devices. This view acts as a proxy for data stored in the cloud. Secondly, it provides documentation on the artifacts that could be useful in a digital forensics investigation of cloud services

    Patterns of information security postures for socio-technical systems and systems-of-systems

    Get PDF
    This paper describes a proposal to develop patterns of security postures for computer based socio-technical systems and systems-of-systems. Such systems typically span many organisational boundaries, integrating multiple computer systems, infrastructures and organisational processes. The paper describes the motivation for the proposed work, and our approach to the development, specification, integration and validation of security patterns for socio-technical and system-of-system scale systems

    A comparison of forensic evidence recovery techniques for a windows mobile smart phone

    Get PDF
    <p>Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.</p> <p>A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.</p> <p>This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting.</p&gt

    Responsibility modelling for risk analysis

    Get PDF

    A comparison of forensic toolkits and mass market data recovery applications

    Get PDF
    Digital forensic application suites are large, expensive, complex software products, offering a range of functions to assist in the investigation of digital artifacts. Several authors have raised concerns as to the reliability of evidence derived from these products. This is of particular concern, given that many forensic suites are closed source and therefore can only be subject to black box evaluation. In addition, many of the individual functions integrated into forensic suites are available as commercial stand-alone products, typically at a much lower cost, or even free. This paper reports research which compared (rather than individually evaluated) the data recovery function of two forensic suites and three stand alone `non-forensic' commercial applications. The research demonstrates that, for this function at least, the commercial data recovery tools provide comparable performance to that of the forensic software suites. In addition, the research demonstrates that there is some variation in results presented by all of the data recovery tools

    Deriving Information Requirements from Responsibility Models

    Get PDF
    This paper describes research in understanding the requirements for complex information systems that are constructed from one or more generic COTS systems. We argue that, in these cases, behavioural requirements are largely defined by the underlying system and that the goal of the requirements engineering process is to understand the information requirements of system stakeholders. We discuss this notion of information requirements and propose that an understanding of how a socio-technical system is structured in terms of responsibilities is an effective way of discovering this type of requirement. We introduce the idea of responsibility modelling and show, using an example drawn from the domain of emergency planning, how a responsibility model can be used to derive information requirements for a system that coordinates the multiple agencies dealing with an emergency

    Construct, Merge, Solve and Adapt: Application to the repetition-free longest common subsequence problem

    Get PDF
    In this paper we present the application of a recently proposed, general, algorithm for combinatorial optimization to the repetition-free longest common subsequence problem. The applied algorithm, which is labelled Construct, Merge, Solve & Adapt, generates sub-instances based on merging the solution components found in randomly constructed solutions. These sub-instances are subsequently solved by means of an exact solver. Moreover, the considered sub-instances are dynamically changing due to adding new solution components at each iteration, and removing existing solution components on the basis of indicators about their usefulness. The results of applying this algorithm to the repetition-free longest common subsequence problem show that the algorithm generally outperforms competing approaches from the literature. Moreover, they show that the algorithm is competitive with CPLEX for small and medium size problem instances, whereas it outperforms CPLEX for larger problem instances.Peer ReviewedPostprint (author's final draft

    A comparison of incompressible limits for resistive plasmas

    Full text link
    The constraint of incompressibility is often used to simplify the magnetohydrodynamic (MHD) description of linearized plasma dynamics because it does not affect the ideal MHD marginal stability point. In this paper two methods for introducing incompressibility are compared in a cylindrical plasma model: In the first method, the limit γ\gamma \to \infty is taken, where γ\gamma is the ratio of specific heats; in the second, an anisotropic mass tensor ρ\mathbf{\rho} is used, with the component parallel to the magnetic field taken to vanish, ρ0\rho_{\parallel} \to 0. Use of resistive MHD reveals the nature of these two limits because the Alfv\'en and slow magnetosonic continua of ideal MHD are converted to point spectra and moved into the complex plane. Both limits profoundly change the slow-magnetosonic spectrum, but only the second limit faithfully reproduces the resistive Alfv\'en spectrum and its wavemodes. In ideal MHD, the slow magnetosonic continuum degenerates to the Alfv\'en continuum in the first method, while it is moved to infinity by the second. The degeneracy in the first is broken by finite resistivity. For numerical and semi-analytical study of these models, we choose plasma equilibria which cast light on puzzling aspects of results found in earlier literature.Comment: 14 pages, 10 figure

    Are all my volunteers here to help out? Clustering events volunteers by their motivations

    Get PDF
    Posed as a question that an event organizer might contemplate in terms of how best to attract and retain event volunteers, this study adds to the event volunteering literature by cluster analysing volunteers sampled at four sports events using items from the Special Event Volunteer Motivation Scale (SEVMS). The 28 items were first subjected to Exploratory Factor Analysis resulting in four factors (Solidary, Purposive, External Traditions/Commitments, and Spare Time), followed by a two-step clustering procedure and a series of post hoc tests to describe and validate the clusters. As a result of this procedure, three distinct clusters were formed: the Altruists, Socials, and Indifferents. The Altruists and Socials were primarily driven by two distinct internal factors, which respectively represented the Purposive and Solidary factors. The Indifferents appeared to be pushed into volunteering by external forces, rather than intrinsic motivations. Validation revealed that the Indifferents were significantly less satisfied with their volunteer experience than the other two clusters and were also less likely to volunteer in the future. Across the four events sampled, there were distinct patterns of cluster representation, with one event in particular substantially overrepresented by the more negatively inclined Indifferents. The management and research implications of these findings are discussed
    corecore