996 resultados para Tag data confidentiality


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Research has shown that data security has always been an important aspect of quality of service for data service providers; but cloud computing poses new and challenging security threats. The most common security concerns for users of cloud storage are data confidentiality, integrity and availability. Microsoft has considered these concerns and responded with the Azure virtual private storage based on Searchable Encryption. Amazon has also responded to these security issues with its Amazon Web Services. In this paper, we investigate and compare in depth the features of Microsoft Azure and Amazon Web Services deemed to provide security with a particular focus on confidentiality, integrity and availability of data.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The threat that malware poses to RFID systems was identified only recently. Fortunately, all currently known RFID malware is based on SQLIA. Therefore, in this chapter we propose a dual pronged, tag based SQLIA detection and prevention method optimized for RFID systems. The first technique is a SQL query matching approach that uses simple string comparisons and provides strong security against a majority of the SQLIA types possible on RFID systems. To provide security against second order SQLIA, which is a major gap in the current literature, we also propose a tag data validation and sanitization technique. The preliminary evaluation of our query matching technique is very promising, showing 100% detection rates and 0% false positives for all attacks other than second order injection.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Leafcutters are the highest evolved within Neotropical ants in the tribe Attini and model systems for studying caste formation, labor division and symbiosis with microorganisms. Some species of leafcutters are agricultural pests controlled by chemicals which affect other animals and accumulate in the environment. Aiming to provide genetic basis for the study of leafcutters and for the development of more specific and environmentally friendly methods for the control of pest leafcutters, we generated expressed sequence tag data from Atta laevigata, one of the pest ants with broad geographic distribution in South America. Results: The analysis of the expressed sequence tags allowed us to characterize 2,006 unique sequences in Atta laevigata. Sixteen of these genes had a high number of transcripts and are likely positively selected for high level of gene expression, being responsible for three basic biological functions: energy conservation through redox reactions in mitochondria; cytoskeleton and muscle structuring; regulation of gene expression and metabolism. Based on leafcutters lifestyle and reports of genes involved in key processes of other social insects, we identified 146 sequences potential targets for controlling pest leafcutters. The targets are responsible for antixenobiosis, development and longevity, immunity, resistance to pathogens, pheromone function, cell signaling, behavior, polysaccharide metabolism and arginine kynase activity. Conclusion: The generation and analysis of expressed sequence tags from Atta laevigata have provided important genetic basis for future studies on the biology of leaf-cutting ants and may contribute to the development of a more specific and environmentally friendly method for the control of agricultural pest leafcutters.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

European lobsters were captured by employees of the Marine Biological Station and local fishermen from the rocky subtidal zone around the island of Helgoland (North Sea, 54°11.3'N, 7°54.0'E) and from the Helgoland Deep Trench, located south west of the island. The animals were captured by pots, traps, trawl and divers. All measured lobsters were tagged and released. A tagged lobster was classified by the absence or presence of colour tag and/or T-bar tag. Data of lobsters contains capture date, fresh weight, carapace lengths, sex and the information if lobsters were egg-bearing and tagged. Furthermore, data of commercial landed lobsters are included.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

En los últimos años, la seguridad en redes y servicios ha evolucionado de manera exponencial debido al crecimiento de dispositivos conectados a Internet. Con el avance de las nuevas tecnologías es imprescindible dotar a cualquier servicio o dispositivo de la seguridad adecuada dado que éstos se pueden ver afectados por diversas amenazas tales como la accesibilidad, la integridad, la identidad del usuario, la disponibilidad y la confidencialidad de los datos. Cuando se trata de comunicaciones, la seguridad cobra especial importancia dado que los datos enviados a través de la red pueden ser interceptados por un agente no autorizado y utilizarlos para su propio beneficio o alterar su contenido. Para contrarrestar estos ataques, se han definido unos servicios de seguridad como son, por ejemplo, la confidencialidad y la integridad de los datos. Existen diversos mecanismos de seguridad que implementan estos servicios los cuales se apoyan en técnicas criptográficas. Desde el comienzo de las primeras comunicaciones se han desarrollado diferentes técnicas criptográficas que han ido evolucionando a la vez que éstas. La primera de estas técnicas conocida fue escítala lacedemonia en el siglo V a.C. Los éforos espartanos, que eran los que utilizaban dicha técnica, escribían el mensaje en una cinta de cuero o papiro enrollada en una vara de grosor variable. A continuación desenrollaban la cinta y la enviaban al receptor. Sí el mensaje era interceptado solo podrían leer una pila de letras sin sentido. Sí el mensaje llegaba al receptor, éste enrollaría de nuevo la cinta en una vara del mismo grosor que lo hizo el emisor y leería el mensaje. En este proyecto de fin de grado se va a realizar un estudio del estado de arte sobre mecanismos de seguridad para posteriormente diseñar e implementar un componente de seguridad que ofrecerá los servicios citados. Dicho componente se integrará en el sistema del proyecto Europeo I3RES como un servicio más de los definidos dentro del propio proyecto. Los servicios de seguridad que requiere el proyecto I3RES, y por tanto los que ofrecerá el componente, son los de autenticación, integridad, no repudio y confidencialidad. El proyecto I3RES basa su sistema en una arquitectura distribuida por lo que es necesario realizar un estudio del estado del arte sobre dichas arquitecturas para el correcto despliegue del componente en el sistema. Actualmente, la mayoría de los sistemas mantienen una arquitectura distribuida. Este tipo de arquitectura conecta distintos equipos y dispositivos que están separados físicamente mediante una red llamada middleware. Estos equipos trabajan conjuntamente para implementar un conjunto de servicios. En el documento presente se tratan todos los temas anteriormente citados y se detalla el componente a desarrollar así como las correspondientes pruebas de validación y las conclusiones obtenidas. ABSTRACT. Security in networks and services have been extensively developed in last decades due to the arising of multiple devices connected to Internet. Advances in new technologies enhanced the necessity of security requirements to in order to avoid several warnings such as accessibility, integrity, user identity, availability, and confidentiality of our data. In terms of communications, security is crucial due to data could be intercepted on Internet by non-authorised agents which could use them or even alter their content. In order to avoid this warnings, security services have been defined such as data confidentiality and integrity. There is several security mechanism which implement this services based on cryptographic techniques. In parallel to the evolution of communication, cryptographic technics have been also developed with. The most ancient of technics was described in s. V b.C called escitala lacedemonia. Spartan ephorts, which extensively used this method, were used to write messages on the surface of a leather tape or papyri which were rolled on a rod. Next, they unrolled the tape and they sent to the receptor. Whether the message was intercepted they just would be able to read a mess of letters without sense. On the other hand, if the message arrive to the proper receptor, he roll the tape again in a rod with similar anchor of the transmitter one which leads to the adequate read. This Degree Project is focused on an analysis of the state of art about security mechanism together with a design and implement of a security component which offered the services mentioned. This component will be integrated within the European project I3RES as one of the security elements defined inside the project. The security components required in project I3REs are authentication, integrity and non-repudiation will be offered by the designed component as well. Nowadays, the most of the systems maintain a distributed architecture. This type of architecture connect several devices which are physically separated by a network called middleware. This equipment work altogether to implement a set of services. This document is focused on all the topics mentioned as well as the details of the component developed together with the validation tests required and the conclusions obtained.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A cDNA encoding human gamma-glutamyl hydrolase has been identified by searching an expressed sequence tag data base and using rat gamma-glutamyl hydrolase cDNA as the query sequence. The cDNA encodes a 318-amino acid protein of Mr 35,960. The deduced amino acid sequence of human gamma-glutamyl hydrolase shows 67% identity to that of rat gamma-glutamyl hydrolase. In both rat and human the 24 amino acids preceding the N terminus constitute a structural motif that is analogous to a leader or signal sequence. There are four consensus asparagine glycosylation sites in the human sequence, with three of them conserved in the rat enzyme. Expression of both the human and rat cDNA in Escherichia coli produced antigenically related proteins with enzyme activities characteristic of the native human and rat enzymes, respectively, when methotrexate di- or pentaglutamate were used as substrates. With the latter substrate the rat enzyme cleaved the innermost gamma-glutamyl linkage resulting in the sole production of methotrexate as the pteroyl containing product. The human enzyme differed in that it produced methotrexate tetraglutamate initially, followed by the triglutamate, and then the diglutamate and methotrexate. Hence the rat enzyme is an endopeptidase with methotrexate pentaglutamate as substrate, whereas the human enzyme exhibits exopeptidase activity. Another difference is that the expressed rat enzyme is equally active on methotrexate di- and pentaglutamate whereas the human enzyme has severalfold greater activity on methotrexate pentaglutamate compared with the diglutamate. These properties are consistent with the enzymes derived from human and rat sources.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This thesis analyses the impact of deregulation on the theory and practice of investment decision making in the electricity sector and appraises the likely effects on its long term future inefficiency. Part I describes the market and its shortcomings in promoting an optimal generation margin and plant mix and in reducing prices through competition. A full size operational model is developed to simulate hour by hour operation of the market and analyse its features. A relationship is established between the SMP and plant mix and between the LOLP and plant margin and it is shown bow a theoretical optimum can be derived when the combined LOLP payments and the capital costs of additional generation reach a minimum. A comparison of prices against an idealised bulk supply tariff is used to show how energy prices have risen some 12% in excess of what might have occurred under the CEGB regime. This part concludes with proposals to improve the marldata confidentiality. Part 2 demonstrates that the classical approach to generation investment appraisal is no longer valid and develops a new approach. It is shown how an individual generator can predict his utilisation and income to establish the worth of investment and demonstrates the validity of the operational model proposed. An empirical relationship is developed between profit and capacity and this is used to develop the theory to illustrate how companies interact. 1bree different economic models are developed to represent different market conditions and these are tested against the actual investment decisions since deregulation to demonstrate their appropriateness. It is shown that the current market mechanisms could lead to suboptimal investment. Part 3 discusses the essential role of transmission in enabling competition and reviews worldwide practices illustrating little consensus on charging for its use. Basic costing principles are described and a new model is developed to demonstrate bow a generator may strike supply agreements either side of an interconnector to influence prices so as to maximise his income. The optimal pricing strategy for the transmitter is also derived and consumer response is simulated .The concept of transmission uplift is developed and the operational model is extended to include transmission constraints and then used to establish monthly incremental transmission constraint cost functions. It is shown how these can be used to appraise investment options and optimally plan outages. Part 4 concludes by discussing the regulatory framework and its limitations in improving efficiency or encouraging the optimum levels of investment. The principal findings of the thesis are reviewed and potential market improvement are described. This part concludes with a discussion of alternative market structures and likely future developments.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The +Contigo Project is a longitudinal research project based on a multilevel network intervention aimed at promoting mental health and well-being and preventing suicidal behaviors. Students participate in social skills training sessions on the stigma of mental disorders, adolescence, self-esteem, problem-solving skills, and wellbeing. Problem statement: To identify the qualitative impact of the +Contigo Project. Objectives: To identify the importance of the project for students, the problem situations which it helped to solve, and its impact on an individual level. Research methods: Content analysis (Bardin, 2009) with a posteriori categorical identification. Semi-structured interview guide with 5 questions. A convenience sample of 16 students, from three schools of one school cluster in the Center Region of Portugal, was used. The ethical aspects of parental consent, voluntary participation and data confidentiality were addressed. Findings: Fourteen categories emerged from the data analysis. The answers to Question 4 'How was this project important to you?' were particularly relevant. Students mentioned that it improved their self-esteem by increasing self-confidence and interpersonal skills, and that it increased their reflection and awareness on problems with which they learned how to cope during the sessions. Conclusions: All interviewees considered that the +Contigo project helped them to solve problems, improve their interpersonal skills and cope with the adolescence period. Students improved their self-esteem and self-knowledge, and were able to apply what they had learned in the sessions in their daily lives. We concluded that the project had a positive impact on the students' mental health.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Opportunistic Networks aim to set a reliable networks where the nodes has no end-To-end connection and the communication links often suffer from frequent disruption and long delays. The design of the OppNets routing protocols is facing a serious challenges such as the protection of the data confidentiality and integrity. OppNets exploit the characteristics of the human social, such as similarities, daily routines, mobility patterns and interests to perform the message routing and data sharing. Packet dropping attack is one of the hardest attacks in Opportunistic Networks as both the source nodes and the destination nodes have no knowledge of where or when the packet will be dropped. In this paper, we present a new malicious nodes detection technique against packet faking attack where the malicious node drops one or more packets and instead of them injects new fake packets. We have called this novel attack in our previous works a packet faking attack. Each node in Opportunistic Networks can detect and then traceback the malicious nodes based on a solid and powerful idea that is, hash chain techniques. In our hash chain based defense techniques we have two phases. The first phases is to detect the attack, and the second phases is to find the malicious nodes. We have compared our approach with the acknowledgement based mechanisms and the networks coding based mechanism which are well known approaches in the literature. In our simulation, we have achieved a very high node detection accuracy and low false negative rate.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Vehicular ad hoc network (VANET) is an increasing important paradigm, which not only provides safety enhancement but also improves roadway system efficiency. However, the security issues of data confidentiality, and access control over transmitted messages in VANET have remained to be solved. In this paper, we propose a secure and efficient message dissemination scheme (SEMD) with policy enforcement in VANET, and construct an outsourcing decryption of ciphertext-policy attribute-based encryption (CP-ABE) to provide differentiated access control services, which makes the vehicles delegate most of the decryption computation to nearest roadside unit (RSU). Performance evaluation demonstrates its efficiency in terms of computational complexity, space complexity, and decryption time. Security proof shows that it is secure against replayable choosen-ciphertext attacks (RCCA) in the standard model.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We derive a new method for determining size-transition matrices (STMs) that eliminates probabilities of negative growth and accounts for individual variability. STMs are an important part of size-structured models, which are used in the stock assessment of aquatic species. The elements of STMs represent the probability of growth from one size class to another, given a time step. The growth increment over this time step can be modelled with a variety of methods, but when a population construct is assumed for the underlying growth model, the resulting STM may contain entries that predict negative growth. To solve this problem, we use a maximum likelihood method that incorporates individual variability in the asymptotic length, relative age at tagging, and measurement error to obtain von Bertalanffy growth model parameter estimates. The statistical moments for the future length given an individual's previous length measurement and time at liberty are then derived. We moment match the true conditional distributions with skewed-normal distributions and use these to accurately estimate the elements of the STMs. The method is investigated with simulated tag-recapture data and tag-recapture data gathered from the Australian eastern king prawn (Melicertus plebejus).

Relevância:

40.00% 40.00%

Publicador:

Resumo:

James (1991, Biometrics 47, 1519-1530) constructed unbiased estimating functions for estimating the two parameters in the von Bertalanffy growth curve from tag-recapture data. This paper provides unbiased estimating functions for a class of growth models that incorporate stochastic components and explanatory variables. a simulation study using seasonal growth models indicates that the proposed method works well while the least-squares methods that are commonly used in the literature may produce substantially biased estimates. The proposed model and method are also applied to real data from tagged rack lobsters to assess the possible seasonal effect on growth.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Six species of line-caught coral reef fish (Plectropomus spp., Lethrinus miniatus, Lethrinus laticaudis, Lutjanus sebae, Lutjanus malabaricus and Lutjanus erythropterus) were tagged by members of the Australian National Sportsfishing Association (ANSA) in Queensland between 1986 and 2003. Of the 14,757 fish tagged, 1607 were recaptured and we analysed these data to describe movement and determine factors likely to impact release survival. All species were classified as residents since over 80% of recaptures for each species occurred within 1 km of the release site. Few individuals (range 0.8-5%) were recaptured more than 20 km from their release point. L. sebae had a higher recapture rate (19.9%) than the other species studied (range 2.1-11.7%). Venting swimbladder gases, regardless of whether or not fish appeared to be suffering from barotrauma, significantly enhanced (P < 0.05) the survival of L. sebae and L. malabaricus but had no significant effect (P > 0.05) on L. erythropterus. The condition of fish on release, subjectively assessed by anglers, was only a significant effect on recapture rate for L. sebae where fish in "fair" condition had less than half the recapture rate of those assessed as in "excellent" or "good" condition. The recapture rate of L. sebae and L. laticaudis was significantly (P < 0.05) affected by depth with recapture rate declining in depths exceeding 30 m. Overall, the results showed that depth of capture, release condition and treatment for barotrauma influenced recapture rate for some species but these effects were not consistent across all species studied. Recommendations were made to the ANSA tagging clubs to record additional information such as injury, hooking location and hook type to enable a more comprehensive future assessment of the factors influencing release survival.