72 resultados para Coq
Resumo:
La seguridad verificada es una metodología para demostrar propiedades de seguridad de los sistemas informáticos que se destaca por las altas garantías de corrección que provee. Los sistemas informáticos se modelan como programas probabilísticos y para probar que verifican una determinada propiedad de seguridad se utilizan técnicas rigurosas basadas en modelos matemáticos de los programas. En particular, la seguridad verificada promueve el uso de demostradores de teoremas interactivos o automáticos para construir demostraciones completamente formales cuya corrección es certificada mecánicamente (por ordenador). La seguridad verificada demostró ser una técnica muy efectiva para razonar sobre diversas nociones de seguridad en el área de criptografía. Sin embargo, no ha podido cubrir un importante conjunto de nociones de seguridad “aproximada”. La característica distintiva de estas nociones de seguridad es que se expresan como una condición de “similitud” entre las distribuciones de salida de dos programas probabilísticos y esta similitud se cuantifica usando alguna noción de distancia entre distribuciones de probabilidad. Este conjunto incluye destacadas nociones de seguridad de diversas áreas como la minería de datos privados, el análisis de flujo de información y la criptografía. Ejemplos representativos de estas nociones de seguridad son la indiferenciabilidad, que permite reemplazar un componente idealizado de un sistema por una implementación concreta (sin alterar significativamente sus propiedades de seguridad), o la privacidad diferencial, una noción de privacidad que ha recibido mucha atención en los últimos años y tiene como objetivo evitar la publicación datos confidenciales en la minería de datos. La falta de técnicas rigurosas que permitan verificar formalmente este tipo de propiedades constituye un notable problema abierto que tiene que ser abordado. En esta tesis introducimos varias lógicas de programa quantitativas para razonar sobre esta clase de propiedades de seguridad. Nuestra principal contribución teórica es una versión quantitativa de una lógica de Hoare relacional para programas probabilísticos. Las pruebas de correción de estas lógicas son completamente formalizadas en el asistente de pruebas Coq. Desarrollamos, además, una herramienta para razonar sobre propiedades de programas a través de estas lógicas extendiendo CertiCrypt, un framework para verificar pruebas de criptografía en Coq. Confirmamos la efectividad y aplicabilidad de nuestra metodología construyendo pruebas certificadas por ordendor de varios sistemas cuyo análisis estaba fuera del alcance de la seguridad verificada. Esto incluye, entre otros, una meta-construcción para diseñar funciones de hash “seguras” sobre curvas elípticas y algoritmos diferencialmente privados para varios problemas de optimización combinatoria de la literatura reciente. ABSTRACT The verified security methodology is an emerging approach to build high assurance proofs about security properties of computer systems. Computer systems are modeled as probabilistic programs and one relies on rigorous program semantics techniques to prove that they comply with a given security goal. In particular, it advocates the use of interactive theorem provers or automated provers to build fully formal machine-checked versions of these security proofs. The verified security methodology has proved successful in modeling and reasoning about several standard security notions in the area of cryptography. However, it has fallen short of covering an important class of approximate, quantitative security notions. The distinguishing characteristic of this class of security notions is that they are stated as a “similarity” condition between the output distributions of two probabilistic programs, and this similarity is quantified using some notion of distance between probability distributions. This class comprises prominent security notions from multiple areas such as private data analysis, information flow analysis and cryptography. These include, for instance, indifferentiability, which enables securely replacing an idealized component of system with a concrete implementation, and differential privacy, a notion of privacy-preserving data mining that has received a great deal of attention in the last few years. The lack of rigorous techniques for verifying these properties is thus an important problem that needs to be addressed. In this dissertation we introduce several quantitative program logics to reason about this class of security notions. Our main theoretical contribution is, in particular, a quantitative variant of a full-fledged relational Hoare logic for probabilistic programs. The soundness of these logics is fully formalized in the Coq proof-assistant and tool support is also available through an extension of CertiCrypt, a framework to verify cryptographic proofs in Coq. We validate the applicability of our approach by building fully machine-checked proofs for several systems that were out of the reach of the verified security methodology. These comprise, among others, a construction to build “safe” hash functions into elliptic curves and differentially private algorithms for several combinatorial optimization problems from the recent literature.
Resumo:
Based on the discovery of coenzyme Q (CoQ) as an obligatory cofactor for H+ transport by uncoupling protein 1 (UCP1) [Echtay, K. S., Winkler, E. & Klingenberg, M. (2000) Nature (London) 408, 609–613] we show here that UCP2 and UCP3 are also highly active H+ transporters and require CoQ and fatty acid for H+ transport, which is inhibited by low concentrations of nucleotides. CoQ is proposed to facilitate injection of H+ from fatty acid into UCP. Human UCP2 and 3 expressed in Escherichia coli inclusion bodies are solubilized, and by exchange of sarcosyl against digitonin, nucleotide binding as measured with 2′-O-[5-(dimethylamino)naphthalene-1-sulfonyl]-GTP can be restored. After reconstitution into vesicles, Cl− but no H+ are transported. The addition of CoQ initiates H+ transport in conjunction with fatty acids. This increase is fully sensitive to nucleotides. The rates are as high as with reconstituted UCP1 from mitochondria. Maximum activity is at a molar ratio of 1:300 of CoQ:phospholipid. In UCP2 as in UCP1, ATP is a stronger inhibitor than ADP, but in UCP3 ADP inhibits more strongly than ATP. Thus UCP2 and UCP3 are regulated differently by nucleotides, in line with their different physiological contexts. These results confirm the regulation of UCP2 and UCP3 by the same factors CoQ, fatty acids, and nucleotides as UCP1. They supersede reports that UCP2 and UCP3 may not be H+ transporters.
Resumo:
The experiments reported here were designed to test the hypothesis that the two-electron quinone reductase DT-diaphorase [NAD(P)H:(quinone-acceptor) oxidoreductase, EC 1.6.99.2] functions to maintain membrane-bound coenzyme Q (CoQ) in its reduced antioxidant state, thereby providing protection from free radical damage. DT-diaphorase was isolated and purified from rat liver cytosol, and its ability to reduce several CoQ homologs incorporated into large unilamellar vesicles was demonstrated. Addition of NADH and DT-diaphorase to either large unilamellar or multilamellar vesicles containing homologs of CoQ, including CoQ9 and CoQ10, resulted in the essentially complete reduction of the CoQ. The ability of DT-diaphorase to maintain the reduced state of CoQ and protect membrane components from free radical damage as lipid peroxidation was tested by incorporating either reduced CoQ9 or CoQ10 and the lipophylic azoinitiator 2,2'-azobis(2,4-dimethylvaleronitrile) into multilamellar vesicles in the presence of NADH and DT-diaphorase. The presence of DT-diaphorase prevented the oxidation of reduced CoQ and inhibited lipid peroxidation. The interaction between DT-diaphorase and CoQ was also demonstrated in an isolated rat liver hepatocyte system. Incubation with adriamycin resulted in mitochondrial membrane damage as measured by membrane potential and the release of hydrogen peroxide. Incorporation of CoQ10 provided protection from adriamycin-induced mitochondrial membrane damage. The incorporation of dicoumarol, a potent inhibitor of DT-diaphorase, interfered with the protection provided by CoQ. The results of these experiments provide support for the hypothesis that DT-diaphorase functions as an antioxidant in both artificial membrane and natural membrane systems by acting as a two-electron CoQ reductase that forms and maintains the antioxidant form of CoQ. The suggestion is offered that DT-diaphorase was selected during evolution to perform this role and that its conversion of xenobiotics and other synthetic molecules is secondary and coincidental.
Resumo:
1. Die Texte in der Urschrift.--2. Die Texte in Transkription.
Resumo:
Contiene: La chercheuse d'esprit .- Le coq de village .- Bastien et Bastienne .- Ninette a la cour .- Les trois sultanes.
Resumo:
ICCU,
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
La bécasse.--Ce cochon de Morin.--La folle.--Pierrot.--Menuet.--La Peur.--Farce normande.--Les sabots.--La rempailleuse.--En mer.--Un Normand.--Le testament.--Aux champs.--Un coq chanta.--Un fils.--Saint-Antoine.--L'aventure de Walter Schnaffs.
Resumo:
Errata: p. 599-[1] at end.
Resumo:
"Paris: printed by J. Smith, rue Montmorency, 16"--T.p. verso.
Resumo:
This cross-country report shares first insights from the World's Largest Panel Study of Social Enterprises, which covers seven European Countries (Germany, Hungary, Portugal, Romania, Spain, Sweden, the United Kingdom), China and Russia. It captures the behavior and characteristics of representative samples of social enterprises in these countries who are employers. The report covers a range of topics from profiling social enterprise directors and their social enterprises, to innovation activities and barriers, their entrepreneurial orientation, social missions, social impact metrics to summarizing policy recommendations that social entrepreneurs would like to see being implemented in their countries. Who should read this report? The report is written for social enterprises, social enterprises support organisations and policy makers who want to get an overview of social enterprise in the UK. Thank you to all the social entrepreneurs who made this report possible by participating in our study!