6 resultados para security architectures
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)
Resumo:
Due to the development of nanoscience, the interest in electrochromism has increased and new assemblies of electrochromic materials at nanoscale leading to higher efficiencies and chromatic contrasts, low switching times and the possibility of color tuning have been developed. These advantages are reached due to the extensive surface area found in nanomaterials and the large amount of organic electrochromic molecules that can be easily attached onto inorganic nanoparticles, as TiO2 or SiO2. Moreover, the direct contact between electrolyte and nanomaterials produces high ionic transfer rates, leading to fast charge compensation, which is essential for high performance electrochromic electrodes. Recently, the layer-by-layer technique was presented as an interesting way to produce different architectures by the combination of both electrochromic nanoparticles and polymers. The present paper shows some of the newest insights into nanochromic science.
Resumo:
The pervasive and ubiquitous computing has motivated researches on multimedia adaptation which aims at matching the video quality to the user needs and device restrictions. This technique has a high computational cost which needs to be studied and estimated when designing architectures and applications. This paper presents an analytical model to quantify these video transcoding costs in a hardware independent way. The model was used to analyze the impact of transcoding delays in end-to-end live-video transmissions over LANs, MANs and WANs. Experiments confirm that the proposed model helps to define the best transcoding architecture for different scenarios.
Resumo:
Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy hierarchy, i.e. since the policy sets for the lower levels are automatically derived from the abstract policies (defined by the modeller), we must be sure that the derived policies uphold the high-level ones. This paper builds upon previous work on Model-based Management, particularly on the Diagram of Abstract Subsystems approach, and goes further to propose a formal validation approach for the policy hierarchies yielded by the automated policy refinement process. We establish general validation conditions for a multi-layered policy model, i.e. necessary and sufficient conditions that a policy hierarchy must satisfy so that the lower-level policy sets are valid refinements of the higher-level policies according to the criteria of consistency and completeness. Relying upon the validation conditions and upon axioms about the model representativeness, two theorems are proved to ensure compliance between the resulting system behaviour and the abstract policies that are modelled.
Resumo:
Electroactive nanostructured membranes have been produced by the layer-by-layer (LbL) technique, and used to make electrochemical enzyme biosensors for glucose by modification with cobalt hexacyanoferrate redox mediator and immobilisation of glucose oxidase enzyme. Indium tin oxide (ITO) glass electrodes were modified with up to three bilayers of polyamidoamine (PAMAM) dendrimers containing gold nanoparticles and poly(vinylsulfonate) (PVS). The gold nanoparticles were covered with cobalt hexacyanoferrate that functioned as a redox mediator, allowing the modified electrode to be used to detect H(2)O(2), the product of the oxidase enzymatic reaction, at 0.0 V vs. SCE. Enzyme was then immobilised by cross-linking with glutaraldehyde. Several parameters for optimisation of the glucose biosensor were investigated, including the number of deposited bilayers, the enzyme immobilisation protocol and the concentrations of immobilised enzyme and of the protein that was crosslinked with PAMAM. The latter was used to provide glucose oxidase with a friendly environment, in order to preserve its bioactivity. The optimised biosensor, with three bilayers, has high sensitivity and operational stability, with a detection limit of 6.1 mu M and an apparent Michaelis-Menten constant of 0.20 mM. It showed good selectivity against interferents and is suitable for glucose measurements in natural samples. (C) 2008 Elsevier B.V. All rights reserved.
Resumo:
The latest version of CATH (class, architecture, topology, homology) (version 3.2), released in July 2008 (http://www.cathdb.info), contains 1 14215 domains, 2178 Homologous superfamilies and 1110 fold groups. We have assigned 20 330 new domains, 87 new homologous superfamilies and 26 new folds since CATH release version 3.1. A total of 28 064 new domains have been assigned since our NAR 2007 database publication (CATH version 3.0). The CATH website has been completely redesigned and includes more comprehensive documentation. We have revisited the CATH architecture level as part of the development of a `Protein Chart` and present information on the population of each architecture. The CATHEDRAL structure comparison algorithm has been improved and used to characterize structural diversity in CATH superfamilies and structural overlaps between superfamilies. Although the majority of superfamilies in CATH are not structurally diverse and do not overlap significantly with other superfamilies, similar to 4% of superfamilies are very diverse and these are the superfamilies that are most highly populated in both the PDB and in the genomes. Information on the degree of structural diversity in each superfamily and structural overlaps between superfamilies can now be downloaded from the CATH website.