982 resultados para certificate signatures


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wydział Nauk Geograficznych i Geologicznych

Relevância:

10.00% 10.00%

Publicador:

Resumo:

PDF file

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. Surprisingly, this is possible even after the adversary has inconspicuously learned (exposed) some-or even all-the secrets in the system. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger. But at least the fact of the tampering will be made evident. We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controls all the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times. We provide tamper-evident schemes for all the variants and prove their optimality. Achieving the strongest tamper evidence turns out to be provably expensive. However, we define a somewhat weaker, but still practical, variant: α-synchronous tamper-evidence (α-te) and provide α-te schemes with logarithmic cost. Our α-te schemes use a combinatorial construction of α-separating sets, which might be of independent interest. We stress that our mechanisms are purely cryptographic: the tamper-detection algorithm Div is stateless and takes no inputs except the two signatures (in particular, it keeps no logs), we use no infrastructure (or other ways to conceal additional secrets), and we use no hardware properties (except those implied by the standard cryptographic assumptions, such as random number generators). Our constructions are based on arbitrary ordinary signature schemes and do not require random oracles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the Bytecode Verifier, a critical component used to verify class semantics before loading is complete. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analysis on any block of Java bytecodes by converting the bytes into relation initializers in Alloy. Any counterexamples found by the Alloy analyzer correspond directly to insecure code. Analysis of the approach in the context of known security exploits is provided. This type of analysis represents a significant departure from standard malware analysis methods based on signatures or anomaly detection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SyNAPSE program of the Defense Advanced Projects Research Agency (HRL Laboratories LLC, subcontract #801881-BS under DARPA prime contract HR0011-09-C-0001); CELEST, a National Science Foundation Science of Learning Center (SBE-0354378)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Early years’ education has increasingly been identified as a mechanism to alleviate educational disadvantage in areas of social exclusion. Early years’ intervention programmes are now a common government social policy for addressing social problems (Reynolds, Mann, Miedel, and Smokowski, 1997). In particular, state provided early years’ programmes such as Head Start in the United States and Early Start in Ireland have been established to combat educational disadvantage for children experiencing poverty and socio-economic inequality. The focus of this research is on the long-term outcomes of an early years’ intervention programme in Ireland. It aims to assess whether participation in the programme enhances the life course of children at-risk of educational disadvantage. It involves an in-depth analysis of one Early Start project which was included in the original eight projects established by the Department of Education and Science in 1994. The study utilises a multi-group design to provide a detailed analysis of both the academic and social progress of programme participants. It examines programme outcomes from a number of perspectives by collecting the views of the three main stakeholders involved in the education process; students who participated in Early Start in 1994/5, their parents and their teachers. To contribute to understanding the impact of the programme from a community perspective interviews were also conducted with local community educators and other local early years’ services. In general, Early Start was perceived by all participants in this study as making a positive contribution to parent involvement in education and to strengthening educational capital in the local area. The study found that parents and primary school teachers identified aspects of school readiness as the main benefit of participation in Early Start and parents and teachers were very positive about the role of Early Start in preparing children for the transition to formal school. In addition to this, participation in Early Start appears to have made a positive contribution to academic attainment in Maths and Science at Junior Certificate level. Students who had participated in Early Start were also rated more highly by their second level teachers in terms of goal-setting and future orientation which are important factors in educational attainment. Early Start then can be viewed as providing a positive contribution to the long-term social and academic outcomes for its participants.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research study investigates the image of mathematics held by 5th-year post-primary students in Ireland. For this study, “image of mathematics” is conceptualized as a mental representation or view of mathematics, presumably constructed as a result of past experiences, mediated through school, parents, peers or society. It is also understood to include attitudes, beliefs, emotions, self-concept and motivation in relation to mathematics. This study explores the image of mathematics held by a sample of 356 5th-year students studying ordinary level mathematics. Students were aged between 15 and 18 years. In addition, this study examines the factors influencing students‟ images of mathematics and the possible reasons for students choosing not to study higher level mathematics for the Leaving Certificate. The design for this study is chiefly explorative. A questionnaire survey was created containing both quantitative and qualitative methods to investigate the research interest. The quantitative aspect incorporated eight pre-established scales to examine students‟ attitudes, beliefs, emotions, self-concept and motivation regarding mathematics. The qualitative element explored students‟ past experiences of mathematics, their causal attributions for success or failure in mathematics and their influences in mathematics. The quantitative and qualitative data was analysed for all students and also for students grouped by gender, prior achievement, type of post-primary school attending, co-educational status of the post-primary school and the attendance of a Project Maths pilot school. Students‟ images of mathematics were seen to be strongly indicated by their attitudes (enjoyment and value), beliefs, motivation, self-concept and anxiety, with each of these elements strongly correlated with each other, particularly self-concept and anxiety. Students‟ current images of mathematics were found to be influenced by their past experiences of mathematics, by their mathematics teachers, parents and peers, and by their prior mathematical achievement. Gender differences occur for students in their images of mathematics, with males having more positive images of mathematics than females and this is most noticeable with regards to anxiety about mathematics. Mathematics anxiety was identified as a possible reason for the low number of students continuing with higher level mathematics for the Leaving Certificate. Some students also expressed low mathematical self-concept with regards to higher level mathematics specifically. Students with low prior achievement in mathematics tended to believe that mathematics requires a natural ability which they do not possess. Rote-learning was found to be common among many students in the sample. The most positive image of mathematics held by students was the “problem-solving image”, with resulting implications for the new Project Maths syllabus in post-primary education. Findings from this research study provide important insights into the image of mathematics held by the sample of Irish post-primary students and make an innovative contribution to mathematics education research. In particular, findings contribute to the current national interest in Ireland in post-primary mathematics education, highlighting issues regarding the low uptake of higher level mathematics for the Leaving Certificate and also making a preliminary comparison between students who took part in the piloting of Project Maths and students who were more recently introduced to the new syllabus. This research study also holds implications for mathematics teachers, parents and the mathematics education community in Ireland, with some suggestions made on improving students‟ images of mathematics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The theme of New City utilizes ever changing time signatures and the main theme creates a dynamic dialogue between the melody instruments and the percusssion section.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Contemporary Latin

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Tribbles family of genes consist of three members; TRIB1, TRIB2 and TRIB3. Trib1 and Trib2 have been identified as oncogenes that can induce AML in mice. However little is known about how the expressions of the Tribbles family genes are controlled in the cell during haematopoiesis or leukaemogenesis. To investigate the Tribbles genes in leukaemia a bioinformatics approach was used. TRIB2 expression was found to be elevated in T-ALL and ALL with t(1;19). TRIB1 was found not to be significantly elevated in any leukaemic subtypes. Analyses of the TRIB1 and TRIB2 gene signatures in both leukaemic and normal haematopoietic cells identified pathways and transcription factors associated with these signatures. Pathways enriched for the TRIB1 signature included TLR signalling pathways and NF-κB pathways. Transcription factors enriched for this signature include C/EBP and SRF. Enriched for the TRIB2 signature includes T cell signalling pathways and Notch signalling pathways. Transcription factors enriched for this signature include E2F and ETS. Further investigation in vitro confirmed the finding that E2F1 was as a potential regulator of TRIB2 expression. E2F1 is able to directly bind to the TRIB2 promoter region and induce TRIB2 expression. C/EBPα p42 was found to inhibit E2F1 and the p30 isoform was found to cooperate with E2F1 induced activation of the TRIB2 promoter. Indicating the potential presence of a regulatory loop involved in the regulation of the TRIB2 gene. In conclusion we have investigated the Tribbles gene signatures in both normal haematopoietic and leukaemic cells. This has led to the identification of a number of pathways and transcription factors associated with these genes. We have also identified a family of transcription factors directly responsible for the regulation of TRIB2 expression. This regulatory pathway has the potential to be targeted in the treatment of leukaemia with a high TRIB2 signature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Many European countries including Ireland lack high quality, on-going, population based estimates of maternal behaviours and experiences during pregnancy. PRAMS is a CDC surveillance program which was established in the United States in 1987 to generate high quality, population based data to reduce infant mortality rates and improve maternal and infant health. PRAMS is the only on-going population based surveillance system of maternal behaviours and experiences that occur before, during and after pregnancy worldwide.Methods: The objective of this study was to adapt, test and evaluate a modified CDC PRAMS methodology in Ireland. The birth certificate file which is the standard approach to sampling for PRAMS in the United States was not available for the PRAMS Ireland study. Consequently, delivery record books for the period between 3 and 5 months before the study start date at a large urban obstetric hospital [8,900 births per year] were used to randomly sample 124 women. Name, address, maternal age, infant sex, gestational age at delivery, delivery method, APGAR score and birth weight were manually extracted from records. Stillbirths and early neonatal deaths were excluded using APGAR scores and hospital records. Women were sent a letter of invitation to participate including option to opt out, followed by a modified PRAMS survey, a reminder letter and a final survey.Results: The response rate for the pilot was 67%. Two per cent of women refused the survey, 7% opted out of the study and 24% did not respond. Survey items were at least 88% complete for all 82 respondents. Prevalence estimates of socially undesirable behaviours such as alcohol consumption during pregnancy were high [>50%] and comparable with international estimates.Conclusion: PRAMS is a feasible and valid method of collecting information on maternal experiences and behaviours during pregnancy in Ireland. PRAMS may offer a potential solution to data deficits in maternal health behaviour indicators in Ireland with further work. This study is important to researchers in Europe and elsewhere who may be interested in new ways of tailoring an established CDC methodology to their unique settings to resolve data deficits in maternal health.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work we introduce a new mathematical tool for optimization of routes, topology design, and energy efficiency in wireless sensor networks. We introduce a vector field formulation that models communication in the network, and routing is performed in the direction of this vector field at every location of the network. The magnitude of the vector field at every location represents the density of amount of data that is being transited through that location. We define the total communication cost in the network as the integral of a quadratic form of the vector field over the network area. With the above formulation, we introduce a mathematical machinery based on partial differential equations very similar to the Maxwell's equations in electrostatic theory. We show that in order to minimize the cost, the routes should be found based on the solution of these partial differential equations. In our formulation, the sensors are sources of information, and they are similar to the positive charges in electrostatics, the destinations are sinks of information and they are similar to negative charges, and the network is similar to a non-homogeneous dielectric media with variable dielectric constant (or permittivity coefficient). In one of the applications of our mathematical model based on the vector fields, we offer a scheme for energy efficient routing. Our routing scheme is based on changing the permittivity coefficient to a higher value in the places of the network where nodes have high residual energy, and setting it to a low value in the places of the network where the nodes do not have much energy left. Our simulations show that our method gives a significant increase in the network life compared to the shortest path and weighted shortest path schemes. Our initial focus is on the case where there is only one destination in the network, and later we extend our approach to the case where there are multiple destinations in the network. In the case of having multiple destinations, we need to partition the network into several areas known as regions of attraction of the destinations. Each destination is responsible for collecting all messages being generated in its region of attraction. The complexity of the optimization problem in this case is how to define regions of attraction for the destinations and how much communication load to assign to each destination to optimize the performance of the network. We use our vector field model to solve the optimization problem for this case. We define a vector field, which is conservative, and hence it can be written as the gradient of a scalar field (also known as a potential field). Then we show that in the optimal assignment of the communication load of the network to the destinations, the value of that potential field should be equal at the locations of all the destinations. Another application of our vector field model is to find the optimal locations of the destinations in the network. We show that the vector field gives the gradient of the cost function with respect to the locations of the destinations. Based on this fact, we suggest an algorithm to be applied during the design phase of a network to relocate the destinations for reducing the communication cost function. The performance of our proposed schemes is confirmed by several examples and simulation experiments. In another part of this work we focus on the notions of responsiveness and conformance of TCP traffic in communication networks. We introduce the notion of responsiveness for TCP aggregates and define it as the degree to which a TCP aggregate reduces its sending rate to the network as a response to packet drops. We define metrics that describe the responsiveness of TCP aggregates, and suggest two methods for determining the values of these quantities. The first method is based on a test in which we drop a few packets from the aggregate intentionally and measure the resulting rate decrease of that aggregate. This kind of test is not robust to multiple simultaneous tests performed at different routers. We make the test robust to multiple simultaneous tests by using ideas from the CDMA approach to multiple access channels in communication theory. Based on this approach, we introduce tests of responsiveness for aggregates, and call it CDMA based Aggregate Perturbation Method (CAPM). We use CAPM to perform congestion control. A distinguishing feature of our congestion control scheme is that it maintains a degree of fairness among different aggregates. In the next step we modify CAPM to offer methods for estimating the proportion of an aggregate of TCP traffic that does not conform to protocol specifications, and hence may belong to a DDoS attack. Our methods work by intentionally perturbing the aggregate by dropping a very small number of packets from it and observing the response of the aggregate. We offer two methods for conformance testing. In the first method, we apply the perturbation tests to SYN packets being sent at the start of the TCP 3-way handshake, and we use the fact that the rate of ACK packets being exchanged in the handshake should follow the rate of perturbations. In the second method, we apply the perturbation tests to the TCP data packets and use the fact that the rate of retransmitted data packets should follow the rate of perturbations. In both methods, we use signature based perturbations, which means packet drops are performed with a rate given by a function of time. We use analogy of our problem with multiple access communication to find signatures. Specifically, we assign orthogonal CDMA based signatures to different routers in a distributed implementation of our methods. As a result of orthogonality, the performance does not degrade because of cross interference made by simultaneously testing routers. We have shown efficacy of our methods through mathematical analysis and extensive simulation experiments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Carbon Capture and Storage may use deep saline aquifers for CO(2) sequestration, but small CO(2) leakage could pose a risk to overlying fresh groundwater. We performed laboratory incubations of CO(2) infiltration under oxidizing conditions for >300 days on samples from four freshwater aquifers to 1) understand how CO(2) leakage affects freshwater quality; 2) develop selection criteria for deep sequestration sites based on inorganic metal contamination caused by CO(2) leaks to shallow aquifers; and 3) identify geochemical signatures for early detection criteria. After exposure to CO(2), water pH declines of 1-2 units were apparent in all aquifer samples. CO(2) caused concentrations of the alkali and alkaline earths and manganese, cobalt, nickel, and iron to increase by more than 2 orders of magnitude. Potentially dangerous uranium and barium increased throughout the entire experiment in some samples. Solid-phase metal mobility, carbonate buffering capacity, and redox state in the shallow overlying aquifers influence the impact of CO(2) leakage and should be considered when selecting deep geosequestration sites. Manganese, iron, calcium, and pH could be used as geochemical markers of a CO(2) leak, as their concentrations increase within 2 weeks of exposure to CO(2).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

© 2010 by the American Geophysical Union.The cross-scale probabilistic structure of rainfall intensity records collected over time scales ranging from hours to decades at sites dominated by both convective and frontal systems is investigated. Across these sites, intermittency build-up from slow to fast time-scales is analyzed in terms of heavy tailed and asymmetric signatures in the scale-wise evolution of rainfall probability density functions (pdfs). The analysis demonstrates that rainfall records dominated by convective storms develop heavier-Tailed power law pdfs toward finer scales when compared with their frontal systems counterpart. Also, a concomitant marked asymmetry build-up emerges at such finer time scales. A scale-dependent probabilistic description of such fat tails and asymmetry appearance is proposed based on a modified q-Gaussian model, able to describe the cross-scale rainfall pdfs in terms of the nonextensivity parameter q, a lacunarity (intermittency) correction and a tail asymmetry coefficient, linked to the rainfall generation mechanism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tumor microenvironmental stresses, such as hypoxia and lactic acidosis, play important roles in tumor progression. Although gene signatures reflecting the influence of these stresses are powerful approaches to link expression with phenotypes, they do not fully reflect the complexity of human cancers. Here, we describe the use of latent factor models to further dissect the stress gene signatures in a breast cancer expression dataset. The genes in these latent factors are coordinately expressed in tumors and depict distinct, interacting components of the biological processes. The genes in several latent factors are highly enriched in chromosomal locations. When these factors are analyzed in independent datasets with gene expression and array CGH data, the expression values of these factors are highly correlated with copy number alterations (CNAs) of the corresponding BAC clones in both the cell lines and tumors. Therefore, variation in the expression of these pathway-associated factors is at least partially caused by variation in gene dosage and CNAs among breast cancers. We have also found the expression of two latent factors without any chromosomal enrichment is highly associated with 12q CNA, likely an instance of "trans"-variations in which CNA leads to the variations in gene expression outside of the CNA region. In addition, we have found that factor 26 (1q CNA) is negatively correlated with HIF-1alpha protein and hypoxia pathways in breast tumors and cell lines. This agrees with, and for the first time links, known good prognosis associated with both a low hypoxia signature and the presence of CNA in this region. Taken together, these results suggest the possibility that tumor segmental aneuploidy makes significant contributions to variation in the lactic acidosis/hypoxia gene signatures in human cancers and demonstrate that latent factor analysis is a powerful means to uncover such a linkage.