925 resultados para cache coherence protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transmitting sensitive data over non-secret channels has always required encryption technologies to ensure that the data arrives without exposure to eavesdroppers. The Internet has made it possible to transmit vast volumes of data more rapidly and cheaply and to a wider audience than ever before. At the same time, strong encryption makes it possible to send data securely, to digitally sign it, to prove it was sent or received, and to guarantee its integrity. The Internet and encryption make bulk transmission of data a commercially viable proposition. However, there are implementation challenges to solve before commercial bulk transmission becomes mainstream. Powerful have a performance cost, and may affect quality of service. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Performance degradation and potential for commercial loss discourage the bulk transmission of data over the Internet in any commercial application. This paper outlines technical solutions to these problems. We develop new technologies and combine existing ones in new and powerful ways to minimise commercial loss without compromising performance or inflating overheads.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the presence and distribution of plastic particles in waters off the NW Spanish Atlantic coast. A pilot sampling program was initiated in 2013 to study the presence of plastic particles in surface waters. A total of 41 neuston samples were collected using a manta trawl fitted with a 333 μm mesh (21 samples in 2013 and 20 samples in 2014). Several types of plastic particles were observed in 95% of the stations. A total of 1463 plastic microparticles (<5 mm; mps) and 208 mesoparticles (>5 mm and <20 mm; MPS) were counted. Average concentrations recorded were 0.034 ± 0.032 and 0.176 ± 0.278 mps m−2 and 0.005 ± 0.005 and 0.028 ± 0.043 MPS m−2, respectively for 2013 and 2014. Results on this emerging topic are discussed as a preliminary step towards implementation of the Marine Strategy Framework Directive in the region. Harmonization of protocols for determination of plastic particles is urgently needed in order to compare results between regions and to ensure coherence in the implementation of the MSFD. This aspect is also important at a worldwide scale.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A rapid rate and high percentage of macadamia nut germination, together with production of vigorous seedlings, are required by nurseries and breeding programs. Germination of nuts is typically protracted, however, and rarely reaches 100%. Many studies have been conducted into macadamia germination, but most have assessed percent germination only. This study investigated the effects of various treatments on percent germination, germination rate, and plant, shoot and root dry weights. The treatments tested were combinations of: (i) soaking or not soaking seeds in a dilute fungicide solution prior to planting; (ii) four different planting media; and (iii) leaving seed trays open or placing them inside clear plastic bags. For freshly harvested nuts, sowing in potting mix under clear plastic and without soaking produced the highest percent germination and germination rate, the largest shoots, and longest lateral roots.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The coming out process has been conceptualized as a developmental imperative for those who will eventually accept their same-sex attractions. It is widely accepted that homophobia, heterosexism, and homonegativity are cultural realities that may complicate this developmental process for gay men. The current study views coming out as an extra-developmental life task that is at best a stressful event, and at worst traumatic when coming out results in the rupture of salient relationships with parents, siblings, and/or close friends. To date, the minority stress model (Meyer, 1995; 2003) has been utilized as an organizing framework for how to empirically examine external stressors and mental health disparities for lesbians, gay men, and bisexual individuals in the United States. The current study builds on this literature by focusing on the influence of how gay men make sense of and represent the coming out process in a semi-structured interview, more specifically, by examining the legacy of the coming out process on indicators of wellness. In a two-part process, this study first employs the framework well articulated in the adult attachment literature of coherence of narratives to explore both variation and implications of the coming out experience for a sample of gay men (n = 60) in romantic relationships (n = 30). In particular, this study employed constructs identified in the adult attachment literature, namely Preoccupied and Dismissing current state of mind, to code a Coming Out Interview (COI). In the present study current state of mind refers to the degree of coherent discourse produced about coming out experiences as relayed during the COI. Multilevel analyses tested the extent to which these COI dimensions, as revealed through an analysis of coming out narratives in the COI, were associated with relationship quality, including self-reported satisfaction and observed emotional tone in a standard laboratory interaction task and self-reported symptoms of psychopathology. In addition, multilevel analyses also assessed the Acceptance by primary relationship figures at the time of disclosure, as well as the degree of Outness at the time of the study. Results revealed that participant’s narratives on the COI varied with regard to Preoccupied and Dismissing current state of mind, suggesting that the AAI coding system provides a viable organizing framework for extracting meaning from coming out narratives as related to attachment relevant constructs. Multilevel modeling revealed construct validity of the attachment dimensions assessed via the COI; attachment (i.e., Preoccupied and Dismissing current state of mind) as assessed via the Adult Attachment Interview (AAI) was significantly correlated with the corresponding COI variables. These finding suggest both methodological and conceptual convergence between these two measures. However, with one exception, COI Preoccupied and Dismissing current state of mind did not predict relationship outcomes or self-reported internalizing and externalizing symptoms. However, further analyses revealed that the degree to which one is out to others moderated the relationship between COI Preoccupied and internalizing. Specifically, for those who were less out to others, there was a significant and positive relationship between Preoccupied current state of mind towards coming out and internalizing symptoms. In addition, the degree of perceived acceptance of sexual orientation by salient relationship figures at the time of disclosure emerged as a predictor of mental health. In particular, Acceptance was significantly negatively related to internalizing symptoms. Overall, the results offer preliminary support that gay men’s narratives do reflect variation as assessed by attachment dimensions and highlights the role of Acceptance by salient relationship figures at the time of disclosure. Still, for the most part, current state of mind towards coming out in this study was not associated with relationship quality and self-reported indicators of mental health. This finding may be a function of low statistical power given the modest sample size. However, the relationship between Preoccupied current state of mind and mental health (i.e., internalizing) appears to depend on degree of Outness. In addition, the response of primary relationships figures to coming out may be a relevant factor in shaping mental health outcomes for gay men. Limitations and suggestions for future research and clinical intervention are offered.