5,671 research outputs found

    SAFIUS - A secure and accountable filesystem over untrusted storage

    Get PDF
    We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention from rollback attacks, and accountability. SAFIUS also enables read/write sharing of data and provides the standard UNIX-like interface for applications. To achieve accountability with good performance, it uses asynchronous signatures; to reduce the space required for storing these signatures, a novel signature pruning mechanism is used. SAFIUS has been implemented on a GNU/Linux based system modifying OpenGFS. Preliminary performance studies show that SAFIUS has a tolerable overhead for providing secure storage: while it has an overhead of about 50% of OpenGFS in data intensive workloads (due to the overhead of performing encryption/decryption in software), it is comparable (or better in some cases) to OpenGFS in metadata intensive workloads.Comment: 11pt, 12 pages, 16 figure

    Thymoma with Myasthenia Gravis in Adolescent

    Get PDF
    Thymomas are exceedingly rare in the first 20 years of life, Thymic lesions comprise approximately 2–3% of all pediatric mediastinal tumors and include thymic cysts, hyperplasia, carcinoma, and thymomas. Fewer than 30 cases in children have been described in the literature. Thymomas in adults are commonly associated with other diseases, the most frequent being myasthenia gravis. However, this association has been rarely reported in childhood. These tumors are typically aggressive, with poor outcomes. We report a case of thymoma associated with myasthenia gravis in a 16-year-old girl and review the literature

    Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    Full text link
    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots

    Supply and demand for cereals in Nepal, 2010–2030:

    Get PDF
    This paper attempts to estimate the future supply and demand for cereals in Nepal. While there has been considerable research in the past examining the agricultural sector in Nepal, to the best of our knowledge there has been no analysis of the supply-demand scenario for food grains in the country. The analysis undertaken in this paper attempts to bridge this gap in the literature by estimating supply and demand models for the three most important cereals in Nepal's food basket: rice, wheat, and maize. The supply projections have been carried out on the basis of a single-crop production function model using data for the period 1995–2008. For estimating the demand function and projecting future demand, data from the Nepal Living Standards Survey II (NLSS II), undertaken in the year 2003/04, are used.cereal supply, cereal demand,

    NSF CAREER: Scalable Learning and Adaptation with Intelligent Techniques and Neural Networks for Reconfiguration and Survivability of Complex Systems

    Get PDF
    The NSF CAREER program is a premier program that emphasizes the importance the foundation places on the early development of academic careers solely dedicated to stimulating the discovery process in which the excitement of research enriched by inspired teaching and enthusiastic learning. This paper describes the research and education experiences gained by the principal investigator and his research collaborators and students as a result of a NSF CAREER proposal been awarded by the power, control and adaptive networks (PCAN) program of the electrical, communications and cyber systems division, effective June 1, 2004. In addition, suggestions on writing a winning NSF CAREER proposal are presented

    Intelligent Sense-making for Smart Grid Stability

    Get PDF
    The power systems of the future - smart grids - will see an increase in both renewable energy sources and load demand, thus increasing the need for fast dynamic reconfiguration of system parameters to handle energy and load dispatches. Power systems will need to be monitored continuously to maintain stability under normal and abnormal operating conditions and when facing disturbances. a combination of system state prediction, dynamic power flow, system optimization, and solution stability checking will allow for a more reliable, affordable, efficient and clean power grid. the optimization and control systems on a smart grid will require a computational systems thinking capability to handle the uncertainties and variability that exist in a smart grid environment. the concept of sense-making based on computational intelligence methods, including neural networks, fuzzy logic and swarm intelligence, as well as online measurements from a smart grid to provide \u27situational\u27 awareness in the context of stability, is introduced in this paper. © 2011 IEEE
    corecore