22 research outputs found
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things
Internet of Things is a novel concept that semantically implies a world-wide
network of uniquely addressable interconnected smart objects. It is aimed at
establishing any paradigm in computing. This environment is one where the
boundary between virtual and physical world is eliminated. As the network gets
loaded with hitherto unknown applications, security threats also become
rampant. Current security solutions fail as new threats appear to de-struct the
reliability of information. The network has to be transformed to IPv6 enabled
network to address huge number of smart objects. Thus new addressing schemes
come up with new attacks. Real time analysis of information from the
heterogeneous smart objects needs use of cloud services. This can fall prey to
cloud specific security threats. Therefore need arises for a review of security
threats for a new area having huge demand. Here a study of security issues in
this domain is briefly presented.Comment: 12 pages, CISIM 201
Recommended from our members
Variability in the reported management of pulmonary metastases in osteosarcoma.
Nearly 20% of patients with newly diagnosed osteosarcoma have detectable metastases at diagnosis; the majority of which occur in the lungs. There are no established recommendations for the timing and modality of metastasectomy. Members of the Connective Tissue Oncology Society (CTOS) were emailed an anonymous 10-min survey assessing their management practices for pulmonary findings at the time of an osteosarcoma diagnosis. The questionnaire presented three scenarios and discussed the choice to perform surgery, the timing of resection, and the choice of surgical procedure. Analyses were stratified by medical profession. One hundred and eighty-three physicians responded to our questionnaire. Respondents were comprised of orthopedic surgeons (37%), medical oncologists (31%), pediatric oncologists (22%), and other medical subspecialties (10%). There was variability among the respondents in the management of the pulmonary nodules. The majority of physicians chose to resect the pulmonary nodules following neoadjuvant chemotherapy (46-63%). Thoracotomy was the preferred technique for surgical resection. When only unilateral findings were present, the majority of physicians did not explore the contralateral lung. The majority of respondents did not recommend resection if the pulmonary nodule disappeared following chemotherapy. The survey demonstrated heterogeneity in the management of pulmonary metastases in osteosarcoma. Prospective trials need to evaluate whether these differences in management have implications for outcomes for patients with metastatic osteosarcoma
Rationale for Stereotactic Body Radiation Therapy in Treating Patients with Oligometastatic Hormone-Naïve Prostate Cancer
Despite advances in treatment for metastatic prostate cancer, patients eventually progress to castrate-resistant disease and ultimately succumb to their cancer. Androgen deprivation therapy (ADT) is the standard treatment for metastatic prostate cancer and has been shown to improve median time to progression and median survival time. Research suggests that castrate-resistant clones may be present early in the disease process prior to the initiation of ADT. These clones are not susceptible to ADT and may even flourish when androgen-responsive clones are depleted. Stereotactic body radiation therapy (SBRT) is a safe and efficacious method of treating clinically localized prostate cancer and metastases. In patients with a limited number of metastatic sites, SBRT may have a role in eliminating castrate-resistant clones and possibly delaying progression to castrate-resistant disease
A Two-stage Flow-based Intrusion Detection Model ForNext-generation Networks
The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results
Bio-authentication for layered remote health monitor framework
Aged people, patients with chronic disease, patients at remote location need continuous monitoring under healthcare professionals. Remote health monitor is likely to be an effective approach to provide healthcare service in a simple and cost effective way. However, effective implementation of this type of framework needs consideration of variety of security threats. In this paper, a layer based remote health monitor framework is proposed to analyze health condition of patients from remote places. Beside this, a multi-modal biometric authentication mechanism is proposed here to reduce misuse of health data and biometrics templates in heterogeneous cloud environment. Main focus of the paper is to design semi-continuous authentication mechanism after establishing mutual 1:1 trust relationship among the participants in cloud environment. Behavioral biometrics keystroke analysis is fused with physiological biometrics face recognition to enhance accuracy of authentication. Instead of considering traditional performance evaluation parameters for biometrics, this paper considers a few performance metrics for determining efficiency of semi-continuous verification of the proposed framework
Synthesis and enzymatic evaluation of ketose phosphonates: the interplay between mutarotation, monofluorination and acidity
Ketose-phosphonates may adopt open chain, or \u3b1- or \u3b2-furanosyl, or \u3b1- or \u3b2-pyranosyl configurational isomers in aqueous solution. An HPLC and NMR analysis of a series of ketose-phosphonates with a thymidylyltransferase (dTDP-glucose pyrophosphorylase) implied a rapid dynamic equilibrium between the pyranosyl forms of gluco-ketose phosphonate leading to efficient production of unique sugar nucleotide analogues. The preparation of diastereomerically pure gluco-configured monofluoromethylenephosphonates enabled the determination of the thymidylyltransferase preference for CHF stereochemistry. The effects of acidity upon thymidylyltransferase substrate specificity were determined using a series of monofluoro- and difluoro- ketose-phosphonates. WaterLOGSY NMR spectroscopy demonstrated a switching of the ordered Bi-Bi mechanism with ketose-phosphonate substrates. Ketose-phosphonates are presented as a unique class of sugar 1-phosphate analogues with potential applications as glycosyltransferase probes.Peer reviewed: YesNRC publication: Ye
A Privacy-Preserving Model for Biometric Fusion
Biometric designs have attracted attention in practical technological schemes with high requirements in terms of accuracy, security and privacy. Nevertheless, multimodalities have been approached with skepticism, as fusion deployments are affected by performance metrics. In this paper, we introduce a basic fusion model blueprint for a privacy-preserving cloud-based user verification/authentication. We consider the case of three modalities, permanently "located" in different databases of semi-honest providers, being combined according to their strength performance parameters, in a user-specific weighted score level fusion. Secure multiparty computation techniques are utilized for protecting confidentiality and privacy among the parties.status: publishe
Recommended from our members
Variability in the reported management of pulmonary metastases in osteosarcoma.
Nearly 20% of patients with newly diagnosed osteosarcoma have detectable metastases at diagnosis; the majority of which occur in the lungs. There are no established recommendations for the timing and modality of metastasectomy. Members of the Connective Tissue Oncology Society (CTOS) were emailed an anonymous 10-min survey assessing their management practices for pulmonary findings at the time of an osteosarcoma diagnosis. The questionnaire presented three scenarios and discussed the choice to perform surgery, the timing of resection, and the choice of surgical procedure. Analyses were stratified by medical profession. One hundred and eighty-three physicians responded to our questionnaire. Respondents were comprised of orthopedic surgeons (37%), medical oncologists (31%), pediatric oncologists (22%), and other medical subspecialties (10%). There was variability among the respondents in the management of the pulmonary nodules. The majority of physicians chose to resect the pulmonary nodules following neoadjuvant chemotherapy (46-63%). Thoracotomy was the preferred technique for surgical resection. When only unilateral findings were present, the majority of physicians did not explore the contralateral lung. The majority of respondents did not recommend resection if the pulmonary nodule disappeared following chemotherapy. The survey demonstrated heterogeneity in the management of pulmonary metastases in osteosarcoma. Prospective trials need to evaluate whether these differences in management have implications for outcomes for patients with metastatic osteosarcoma