651 research outputs found
Controlled Data Sharing for Collaborative Predictive Blacklisting
Although sharing data across organizations is often advocated as a promising
way to enhance cybersecurity, collaborative initiatives are rarely put into
practice owing to confidentiality, trust, and liability challenges. In this
paper, we investigate whether collaborative threat mitigation can be realized
via a controlled data sharing approach, whereby organizations make informed
decisions as to whether or not, and how much, to share. Using appropriate
cryptographic tools, entities can estimate the benefits of collaboration and
agree on what to share in a privacy-preserving way, without having to disclose
their datasets. We focus on collaborative predictive blacklisting, i.e.,
forecasting attack sources based on one's logs and those contributed by other
organizations. We study the impact of different sharing strategies by
experimenting on a real-world dataset of two billion suspicious IP addresses
collected from Dshield over two months. We find that controlled data sharing
yields up to 105% accuracy improvement on average, while also reducing the
false positive rate.Comment: A preliminary version of this paper appears in DIMVA 2015. This is
the full version. arXiv admin note: substantial text overlap with
arXiv:1403.212
Flexible and Robust Privacy-Preserving Implicit Authentication
Implicit authentication consists of a server authenticating a user based on
the user's usage profile, instead of/in addition to relying on something the
user explicitly knows (passwords, private keys, etc.). While implicit
authentication makes identity theft by third parties more difficult, it
requires the server to learn and store the user's usage profile. Recently, the
first privacy-preserving implicit authentication system was presented, in which
the server does not learn the user's profile. It uses an ad hoc two-party
computation protocol to compare the user's fresh sampled features against an
encrypted stored user's profile. The protocol requires storing the usage
profile and comparing against it using two different cryptosystems, one of them
order-preserving; furthermore, features must be numerical. We present here a
simpler protocol based on set intersection that has the advantages of: i)
requiring only one cryptosystem; ii) not leaking the relative order of fresh
feature samples; iii) being able to deal with any type of features (numerical
or non-numerical).
Keywords: Privacy-preserving implicit authentication, privacy-preserving set
intersection, implicit authentication, active authentication, transparent
authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May
26-28, 2015, IFIP AICT, Springer, to appea
Fibrinogen-elongated Chain Inhibits Thrombin-induced Platelet Response, Hindering the Interaction with Different Receptors
The expression of the elongated fibrinogen γ chain, termed γ′, derives from alternative splicing of mRNA and causes an insertion sequence of 20 amino acids. This insertion domain interacts with the anion-binding exosite (ABE)-II of thrombin. This study investigated whether and how γ′ chain binding to ABE-II affects thrombin interaction with its platelet receptors, i.e. glycoprotein Ibα (GpIbα), protease-activated receptor (PAR) 1, and PAR4. Both synthetic γ′ peptide and fibrinogen fragment D*, containing the elongated γ′ chain, inhibited thrombin-induced platelet aggregation up to 70%, with IC50 values of 42 ± 3.5 and 0.47 ± 0.03 μm, respectively. Solid-phase binding and spectrofluorimetric assays showed that both fragment D* and the synthetic γ′ peptide specifically bind to thrombin ABE-II and competitively inhibit the thrombin binding to GpIbα with a mean Ki ≈ 0.5 and ≈35 μm, respectively. Both these γ′ chain-containing ligands allosterically inhibited thrombin cleavage of a synthetic PAR1 peptide, of native PAR1 molecules on intact platelets, and of the synthetic chromogenic peptide d-Phe-pipecolyl-Arg-p-nitroanilide. PAR4 cleavage was unaffected. In summary, fibrinogen γ′ chain binds with high affinity to thrombin and inhibits with combined mechanisms the platelet response to thrombin. Thus, its variations in vivo may affect the hemostatic balance in arterial circulation
Creative and Stylistic Devices Employed by Children During a Storybook Narrative Task: A Cross-Cultural Study
Purpose: The purpose of this study was to analyze the effects of culture on the creative and stylistic features children employ when producing narratives based on wordless picture books.
Method: Participants included 60 first- and second-grade African American, Latino American, and Caucasian children. A subset of narratives based on wordless picture books collected as part of a larger study was coded and analyzed for the following creative and stylistic conventions: organizational style (topic centered, linear, cyclical), dialogue (direct, indirect), reference to character relationships (nature, naming, conduct), embellishment (fantasy, suspense, conflict), and paralinguistic devices (expressive sounds, exclamatory utterances).
Results: Many similarities and differences between ethnic groups were found. No significant differences were found between ethnic groups in organizational style or use of paralinguistic devices. African American children included more fantasy in their stories, Latino children named their characters more often, and Caucasian children made more references to the nature of character relationships.
Conclusion: Even within the context of a highly structured narrative task based on wordless picture books, culture influences children’s production of narratives. Enhanced understanding of narrative structure, creativity, and style is necessary to provide ecologically valid narrative assessment and intervention for children from diverse cultural backgrounds
Influence of carbon and nitrogen on electronic structure and hyperfine interactions in fcc iron-based alloys
Carbon and nitrogen austenites, modeled by Fe8N and Fe8C superstructures are
studied by full-potential LAPW method. Structure parameters, electronic and
magnetic properties as well as hyperfine interaction parameters are obtained.
Calculations prove that Fe-C austenite can be successfully modeled by ordered
Fe8C superstructure. The results show that chemical Fe-C bond in Fe8C has
higher covalent part than in Fe8N. Detailed analysis of electric field gradient
formation for both systems is performed. The calculation of electric field
gradient allow us to carry out a good interpretation of Moessbauer spectra for
Fe-C and Fe-N systems.Comment: 8 pages, 3 figures, IOP-style LaTeX, submitted to J. Phys. Condens.
Matte
Histone Acetylation-Mediated Regulation of the Hippo Pathway
The Hippo pathway is a signaling cascade recently found to play a key role in tumorigenesis therefore understanding the mechanisms that regulate it should open new opportunities for cancer treatment. Available data indicate that this pathway is controlled by signals from cell-cell junctions however the potential role of nuclear regulation has not yet been described. Here we set out to verify this possibility and define putative mechanism(s) by which it might occur. By using a luciferase reporter of the Hippo pathway, we measured the effects of different nuclear targeting drugs and found that chromatin-modifying agents, and to a lesser extent certain DNA damaging drugs, strongly induced activity of the reporter. This effect was not mediated by upstream core components (i.e. Mst, Lats) of the Hippo pathway, but through enhanced levels of the Hippo transducer TAZ. Investigation of the underlying mechanism led to the finding that cancer cell exposure to histone deacetylase inhibitors induced secretion of growth factors and cytokines, which in turn activate Akt and inhibit the GSK3 beta associated protein degradation complex in drug-affected as well as in their neighboring cells. Consequently, expression of EMT genes, cell migration and resistance to therapy were induced. These processes were suppressed by using pyrvinium, a recently described small molecule activator of the GSK 3 beta associated degradation complex. Overall, these findings shed light on a previously unrecognized phenomenon by which certain anti-cancer agents may paradoxically promote tumor progression by facilitating stabilization of the Hippo transducer TAZ and inducing cancer cell migration and resistance to therapy. Pharmacological targeting of the GSK3 beta associated degradation complex may thus represent a unique approach to treat cancer. © 2013 Basu et al
How Much Does GenoGuard Really "Guard"? An Empirical Analysis of Long-Term Security for Genomic Data
Due to its hereditary nature, genomic data is not only linked to its owner but to that of close relatives as well. As a result, its sensitivity does not really degrade over time; in fact, the relevance of a genomic sequence is likely to be longer than the security provided by encryption. This prompts the need for specialized techniques providing long-term security for genomic data, yet the only available tool for this purpose is GenoGuard~\citehuang_genoguard:_2015. By relying on \em Honey Encryption, GenoGuard is secure against an adversary that can brute force all possible keys; i.e., whenever an attacker tries to decrypt using an incorrect password, she will obtain an incorrect but plausible looking decoy sequence. In this paper, we set to analyze the real-world security guarantees provided by GenoGuard; specifically, assess how much more information does access to a ciphertext encrypted using GenoGuard yield, compared to one that was not. Overall, we find that, if the adversary has access to side information in the form of partial information from the target sequence, the use of GenoGuard does appreciably increase her power in determining the rest of the sequence. We show that, in the case of a sequence encrypted using an easily guessable (low-entropy) password, the adversary is able to rule out most decoy sequences, and obtain the target sequence with just 2.5% of it available as side information. In the case of a harder-to-guess (high-entropy) password, we show that the adversary still obtains, on average, better accuracy in guessing the rest of the target sequences than using state-of-the-art genomic sequence inference methods, obtaining up to 15% improvement in accuracy
Self and Shared Leadership in Decision Quality: A Tale of Two Sides
Purpose
This study aims to investigate the relationship between shared leadership (SL) and decision quality, utilizing shared leadership theory (SLT) and behavioral decision theory (BDT). The authors will explore the mediating role of “decision comprehensiveness” in the SL–decision quality linkage. Additionally, the authors will examine how individual “self-leadership” and “debate” among team members moderate the relationship between SL and decision comprehensiveness.
Design/methodology/approach
The authors tested the hypothesized moderated mediation model using a sample of 506 professionals employed in 112 research and development (R&D) teams, along with their direct managers from large Italian firms. To examine the relationships, the authors employed confirmatory factor analyses and path analyses. In order to address endogeneity concerns, the authors incorporated an instrumental variable, namely delegation, into the analysis.
Findings
SL positively influences decision quality, mediated by decision comprehensiveness, where teams include comprehensive information in decision-making. The level of debate among team members positively moderates the SL–decision comprehensiveness relationship. High levels of self-leadership can harm SL by reducing decision comprehensiveness, indicating a downside. However, low or moderate levels of self-leadership do not harm decision comprehensiveness and can even benefit SL.
Originality/value
This is the first work to investigate the relationship between SL and decision quality, shedding light on the mechanisms underlying this association. By integrating SLT and BDT, the authors provide insights into how managers can make higher-quality decisions within self-leading teams. Moreover, this research makes a distinct contribution to the field of self-leadership by delineating its boundaries and identifying a potentially negative aspect within the self-influence process
Reconstructing Druze population history
The Druze are an aggregate of communities in the Levant and Near East living almost exclusively in the mountains of Syria, Lebanon and Israel whose ~1000 year old religion formally opposes mixed marriages and conversions. Despite increasing interest in genetics of the population structure of the Druze, their population history remains unknown. We investigated the genetic relationships between Israeli Druze and both modern and ancient populations. We evaluated our findings in light of three hypotheses purporting to explain Druze history that posit Arabian, Persian or mixed Near Eastern-Levantine roots. The biogeographical analysis localised proto-Druze to the mountainous regions of southeastern Turkey, northern Iraq and southeast Syria and their descendants clustered along a trajectory between these two regions. The mixed Near Eastern-Middle Eastern localisation of the Druze, shown using both modern and ancient DNA data, is distinct from that of neighbouring Syrians, Palestinians and most of the Lebanese, who exhibit a high affinity to the Levant. Druze biogeographic affinity, migration patterns, time of emergence and genetic similarity to Near Eastern populations are highly suggestive of Armenian-Turkish ancestries for the proto-Druze
- …
