19 resultados para secure shell(SSH)

em CentAUR: Central Archive University of Reading - UK


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been limited development in catalyst carriers for magnetic separations where superparamagnetic nanoparticles of a high saturation magnetization with no coercivity are required to isolate expensive catalyst reagent that are subjected to repeated magnetic cycles. By using simple stepwise layer-by-layer nanochemistry techniques, we show that an fee FePt nanomagnet can be created inside each silica particle with tailored dimensions to great precision. Subsequent engineering of the external surface with Ti-O-Si species in an optimum structure to create a unique interface gives high activity and excellent selectivity of the composite material for the trans-stilbene oxidation to the corresponding epoxide in the presence of tert-butyl hydroperoxide. Thus, a new magnetic separable epoxidation catalyst is described. This work clearly demonstrates the significance of nanoengineering of a single catalyst particle by a bottom-up construction approach in modern catalyst design, which could lead to new catalytic. properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the essential needs to implement a successful e-Government web application is security. Web application firewalls (WAF) are the most important tool to secure web applications against the increasing number of web application attacks nowadays. WAFs work in different modes depending on the web traffic filtering approach used, such as positive security mode, negative security mode, session-based mode, or mixed modes. The proposed WAF, which is called (HiWAF), is a web application firewall that works in three modes: positive, negative and session based security modes. The new approach that distinguishes this WAF among other WAFs is that it utilizes the concepts of Artificial Intelligence (AI) instead of regular expressions or other traditional pattern matching techniques as its filtering engine. Both artificial neural networks and fuzzy logic concepts will be used to implement a hybrid intelligent web application firewall that works in three security modes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes a policy model to specify what information flow is permitted in a computational system. The security definition, which is based on a general notion of information lattices, allows various representations of information to be used in the enforcement of secure information flow in deterministic or nondeterministic systems. A flexible semantics-based analysis technique is presented, which uses the input-output relational model induced by an attacker's observational power, to compute the information released by the computational system. An illustrative attacker model demonstrates the use of the technique to develop a termination-sensitive analysis. The technique allows the development of various information flow analyses, parametrised by the attacker's observational power, which can be used to enforce what declassification policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

By means of a monitoring experiment in two rivers in the Netherlands, we establish a relationship between seasonally resolved growth rates in unionid freshwater bivalves and their environment. We reconstructed these seasonally resolved growth rates by using relationships of stable isotopes in the shells and their ambient river water. The reconstructed growth rates reveal that shells grow fastest in spring-early summer, when highest food availability occurs in the rivers. In addition, the reconstructed growth rates show that onset and cessation of growth are mainly influenced by water temperature.