3 resultados para Hemispheric Security
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)
Resumo:
Benign focal epilepsy in childhood with centrotemporal spikes (BECTS) is one of the most common forms of epilepsy. In adults there is a higher percentage of lateralized epileptic discharges in the left cerebral hemisphere; however, in children this pattern does not seem to have the same distribution. The objective of this study was to evaluate the lateralization of interictal spikes in children with BECTS in relation to the sex of the child and the age of onset of epilepsy. We studied the electroencephalograms (EEGs) of 114 children with a clinical diagnosis of BECTS according to ILAE. The results obtained from two EEGs, performed at intervals of 6 and 12 months, were correlated with the age of onset of the epileptic seizures and the sex of the child. There was no association between the onset of epileptic seizures and the age of the child (p=0.461). When we analyzed the relationship between laterality and sex we did not observe any difference in the first EEG (p = 0.767) results; however, in the results of the second EEG there was a difference (p = 0.002). In males, left and bilateral interictal spikes were predominant, and in females the right hemisphere showed predominant spikes and there were continuous spike-and-wave discharges during slow sleep (CSWSS). The analysis between laterality and a child`s age did not show predominant interictal spikes in the hemispheres, except in males where there were predominant multifocal and generalized spikes, but not lateralization (p=0.011). The conclusion was that in BECTS the lateralization of interictal spikes was not consistent as described in adult patients, but there was a slight left hemispheric predominance in boys and right hemispheric predominance in girls.
Resumo:
Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy hierarchy, i.e. since the policy sets for the lower levels are automatically derived from the abstract policies (defined by the modeller), we must be sure that the derived policies uphold the high-level ones. This paper builds upon previous work on Model-based Management, particularly on the Diagram of Abstract Subsystems approach, and goes further to propose a formal validation approach for the policy hierarchies yielded by the automated policy refinement process. We establish general validation conditions for a multi-layered policy model, i.e. necessary and sufficient conditions that a policy hierarchy must satisfy so that the lower-level policy sets are valid refinements of the higher-level policies according to the criteria of consistency and completeness. Relying upon the validation conditions and upon axioms about the model representativeness, two theorems are proved to ensure compliance between the resulting system behaviour and the abstract policies that are modelled.