2 resultados para Tag data confidentiality

em University of Queensland eSpace - Australia


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The tropical abalone. Haliotis asinina. is,in ideal species to investigate the molecular mechanisms that control development. growth, reproduction and shell formation in all cultured haliotids. Here we describe the analysis of 232 expressed sequence tags (EST) obtained front a developmental H. asinina cDNA library intended for future microarray studies. From this data set we identified 183 unique gene Clusters. Of these, 90 clusters showed significant homology with sequences lodged in GenBank, ranging in function from general housekeeping to signal transduction, gene regulation and cell-cell communication. Seventy-one clusters possessed completely novel ORFs greater than 50 codons in length, highlighting the paucity of sequence data from molluscs and other lophotrochozoans. This study of developmental gene expression in H. asinina provides the foundation for further detailed analyses of abalone growth, development and reproduction.