445 research outputs found

    Aura: Programming with Authorization and Audit

    Get PDF
    Standard programming models do not provide direct ways of managing secret or untrusted data. This is a problem because programmers must use ad hoc methods to ensure that secrets are not leaked and, conversely, that tainted data is not used to make critical decisions. This dissertation advocates integrating cryptography and language-based analyses in order to build programming environments for declarative information security, in which high-level specifications of confidentiality and integrity constraints are automatically enforced in hostile execution environments. This dissertation describes Aura, a family of programing languages which integrate functional programming, access control via authorization logic, automatic audit logging, and confidentially via encryption. Aura\u27s programming model marries an expressive, principled way to specify security policies with a practical policy-enforcement methodology that is well suited for auditing access grants and protecting secrets. Aura security policies are expressed as propositions in an authorization logic. Such logics are suitable for discussing delegation, permission, and other security-relevant concepts. Aura\u27s (dependent) type system cleanly integrates standard data types, like integers, with proofs of authorization-logic propositions; this lets programs manipulate authorization proofs just like ordinary values. In addition, security-relevant implementation details---like the creation of audit trails or the cryptographic representation of language constructs---can be handled automatically with little or no programmer intervention

    A Cryptographic Decentralized Label Model

    Get PDF
    Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based security has assumed that programs run in a closed, managed environment and that they use potentially unsafe constructs, such as declassification, to interface to external communication channels, perhaps after encrypting data to preserve its confidentiality. This situation is unsatisfactory for systems that need to communicate over untrusted channels or use untrusted persistent storage, since the connection between the cryptographic mechanisms used in the untrusted environment and the abstract security labels used in the trusted language environment is ad hoc and unclear. This paper addresses this problem in three ways: First, it presents a simple, security-typed language with a novel mechanism called packages that provides an abstract means for creating opaque objects and associating them with security labels; well-typed programs in this language enforce noninterference. Second, it shows how to implement these packages using public-key cryptography. This implementation strategy uses a variant of Myers and Liskov\u27s decentralized label model, which supports a rich label structure in which mutually distrusting data owners can specify independent confidentiality and integrity requirements. Third, it demonstrates that this implementation of packages is sound with respect to Dolev-Yao style attackers-such an attacker cannot determine the contents of a package without possessing the appropriate keys, as determined by the security label on the package

    A bulk-mass-modeling-based method for retrieving particulate matter pollution using CALIOP observations

    Get PDF
    In this proof-of-concept paper, we apply a bulk-mass-modeling method using observations from the NASA Cloud-Aerosol Lidar with Orthogonal Polarization (CALIOP) instrument for retrieving particulate matter (PM) concentration over the contiguous United States (CONUS) over a 2-year period (2008–2009). Different from previous approaches that rely on empirical relationships between aerosol optical depth (AOD) and PM2.5 (PM with particle diameters less than 2.5 µm), for the first time, we derive PM2.5 concentrations, during both daytime and nighttime, from near-surface CALIOP aerosol extinction retrievals using bulk mass extinction coefficients and model-based hygroscopicity. Preliminary results from this 2-year study conducted over the CONUS show a good agreement (r2∼0.48; mean bias of −3.3 µg m−3) between the averaged nighttime CALIOP-derived PM2.5 and ground-based PM2.5 (with a lower r2 of ∼0.21 for daytime; mean bias of −0.4 µg m−3), suggesting that PM concentrations can be obtained from active-based spaceborne observations with reasonable accuracy. Results from sensitivity studies suggest that accurate aerosol typing is needed for applying CALIOP measurements for PM2.5 studies. Lastly, the e-folding correlation length for surface PM2.5 is found to be around 600 km for the entire CONUS (∼300 km for western CONUS and ∼700 km for eastern CONUS), indicating that CALIOP observations, although sparse in spatial coverage, may still be applicable for PM2.5 studies

    Self-Identifying Data for Fair Use

    Get PDF
    Public-use earth science datasets are a useful resource with the unfortunate feature that their provenance is easily disconnected from their content. “Fair-use policies” typically associated with these datasets require appropriate attribution of providers by users, but sound and complete attribution is difficult if provenance information is lost. To address this we introduce a technique to directly associate provenance information with sensor datasets. Our technique is similar to traditional watermarking but is intended for application to unstructured time-series datasets. Our approach is potentially imperceptible given sufficient margins of error in datasets, and is robust to a number of benign but likely transformations including truncation, rounding, bit-flipping, sampling, and reordering. We provide algorithms for both one-bit and blind mark checking, and show how our system can be adapted to various data representation types. Our algorithms are probabilistic in nature and are characterized by both combinatorial and empirical analyses. Mark embedding can be applied at any point in the data lifecycle, allowing adaptation of our scheme to social or scientific concerns.Engineering and Applied Science

    Flow and retreat of the Late Quaternary Pine Island-Thwaites palaeo-ice stream, West Antarctica

    Get PDF
    Multibeam swath bathymetry and sub-bottom profiler data are used to establish constraints on the flow and retreat history of a major palaeo-ice stream that carried the combined discharge from the parts of the West Antarctic Ice Sheet now occupied by the Pine Island and Thwaites glacier basins. Sets of highly elongated bedforms show that, at the last glacial maximum, the route of the Pine Island-Thwaites palaeo-ice stream arced north-northeast following a prominent cross-shelf trough. In this area, the grounding line advanced to within similar to 68 km of, and probably reached, the shelf edge. Minimum ice thickness is estimated at 715 m on the outer shelf, and we estimate a minimum ice discharge of similar to 108 km(3) yr(-1) assuming velocities similar to today's Pine Island glacier (similar to 2.5 km yr(-1)). Additional bed forms observed in a trough northwest of Pine Island Bay likely formed via diachronous ice flows across the outer shelf and demonstrate switching ice stream behavior. The "style" of ice retreat is also evident in five grounding zone wedges, which suggest episodic deglaciation characterized by halts in grounding line migration up-trough. Stillstands occurred in association with changes in ice bed gradient, and phases of inferred rapid retreat correlate to higher bed slopes, supporting theoretical studies that show bed geometry as a control on ice margin recession. However, estimates that individual wedges could have formed within several centuries still imply a relatively rapid overall retreat. Our findings show that the ice stream channeled a substantial fraction of West Antarctica's discharge in the past, just as the Pine Island and Thwaites glaciers do today

    Minimum Aerosol Layer Detection Sensitivities and Their Subsequent Impacts on Aerosol Optical Thickness Retrievals in CALIPSO Level 2 Data Products

    Get PDF
    Due to instrument sensitivities and algorithm detection limits, level 2 (L2) Cloud-Aerosol Lidar with Orthogonal Polarization (CALIOP) 532 nm aerosol extinction profile retrievals are often populated with retrieval fill values (RFVs), which indicate the absence of detectable levels of aerosol within the profile. In this study, using 4 years (20072008 and 20102011) of CALIOP version 3 L2 aerosol data, the occurrence frequency of daytime CALIOP profiles containing all RFVs (all-RFV profiles) is studied. In the CALIOP data products, the aerosol optical thickness (AOT) of any all-RFV profile is reported as being zero, which may introduce a bias in CALIOP-based AOT climatologies. For this study, we derive revised estimates of AOT for all-RFV profiles using collocated Moderate Resolution Imaging Spectroradiometer (MODIS) Dark Target (DT) and, where available, AErosol RObotic NEtwork (AERONET) data. Globally, all-RFV profiles comprise roughly 71 % of all daytime CALIOP L2 aerosol profiles (i.e., including completely attenuated profiles), accounting for nearly half (45 %) of all daytime cloud-free L2 aerosol profiles. The mean collocated MODIS DT (AERONET) 550 nm AOT is found to be near 0.06 (0.08) for CALIOP all-RFV profiles. We further estimate a global mean aerosol extinction profile, a so-called noise floor, for CALIOP all-RFV profiles. The global mean CALIOP AOT is then recomputed by replacing RFV values with the derived noise-floor values for both all-RFV and non-all-RFV profiles. This process yields an improvement in the agreement of CALIOP and MODIS over-ocean AOT

    Population dynamics of sporogony for Plasmodium vivax parasites from western Thailand developing within three species of colonized Anopheles mosquitoes

    Get PDF
    BACKGROUND: The population dynamics of Plasmodium sporogony within mosquitoes consists of an early phase where parasite abundance decreases during the transition from gametocyte to oocyst, an intermediate phase where parasite abundance remains static as oocysts, and a later phase where parasite abundance increases during the release of progeny sporozoites from oocysts. Sporogonic development is complete when sporozoites invade the mosquito salivary glands. The dynamics and efficiency of this developmental sequence were determined in laboratory strains of Anopheles dirus, Anopheles minimus and Anopheles sawadwongporni mosquitoes for Plasmodium vivax parasites circulating naturally in western Thailand. METHODS: Mosquitoes were fed blood from 20 symptomatic Thai adults via membrane feeders. Absolute densities were estimated for macrogametocytes, round stages (= female gametes/zygotes), ookinetes, oocysts, haemolymph sporozoites and salivary gland sporozoites. From these census data, five aspects of population dynamics were analysed; 1) changes in life-stage prevalence during early sporogony, 2) kinetics of life-stage formation, 3) efficiency of life-stage transitions, 4) density relationships between successive life-stages, and 5) parasite aggregation patterns. RESULTS: There was no difference among the three mosquito species tested in total losses incurred by P. vivax populations during early sporogony. Averaged across all infections, parasite populations incurred a 68-fold loss in abundance, with losses of ca. 19-fold, 2-fold and 2-fold at the first (= gametogenesis/fertilization), second (= round stage transformation), and third (= ookinete migration) life-stage transitions, respectively. However, total losses varied widely among infections, ranging from 6-fold to over 2,000-fold loss. Losses during gametogenesis/fertilization accounted for most of this variability, indicating that gametocytes originating from some volunteers were more fertile than those from other volunteers. Although reasons for such variability were not determined, gametocyte fertility was not correlated with blood haematocrit, asexual parasitaemia, gametocyte density or gametocyte sex ratio. Round stages and ookinetes were present in mosquito midguts for up to 48 hours and development was asynchronous. Parasite losses during fertilization and round stage differentiation were more influenced by factors intrinsic to the parasite and/or factors in the blood, whereas ookinete losses were more strongly influenced by mosquito factors. Oocysts released sporozoites on days 12 to 14, but even by day 22 many oocysts were still present on the midgut. The per capita production was estimated to be approximately 500 sporozoites per oocyst and approximately 75% of the sporozoites released into the haemocoel successfully invaded the salivary glands. CONCLUSION: The major developmental bottleneck in early sporogony occurred during the transition from macrogametocyte to round stage. Sporozoite invasion into the salivary glands was very efficient. Information on the natural population dynamics of sporogony within malaria-endemic areas may benefit intervention strategies that target early sporogony (e.g., transmission blocking vaccines, transgenic mosquitoes)
    corecore