799 research outputs found

    A Logic for Constraint-based Security Protocol Analysis

    Get PDF
    We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we present a sound and complete decision procedure to establish the validity of security properties for symbolic execution traces, and show the integration with constraint-based analysis techniques

    Timed Analysis of Security Protocols

    Get PDF
    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the well known Clark Jacob library and the Security Protocol Open Repository (SPORE) library. Finally, we present some new challenges and threats that arise when considering time in the analysis, by providing a novel protocol that uses time challenges and exposing a timing attack over an implementation of an existing security protocol

    An Audit Logic for Accountability

    Get PDF
    We describe and implement a policy language. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are accountable for their actions, and may be audited by an authority requiring justifications.Comment: To appear in Proceedings of IEEE Policy 200

    On the Localization of One-Photon States

    Get PDF
    Single photon states with arbitrarily fast asymptotic power-law fall-off of energy density and photodetection rate are explicitly constructed. This goes beyond the recently discovered tenth power-law of the Hellwarth-Nouchi photon which itself superseded the long-standing seventh power-law of the Amrein photon.Comment: 7 pages, tex, no figure

    Optimistic Non-repudiation Protocol Analysis

    Get PDF
    The original publication is available at www.springerlink.com ; ISBN 978-3-540-72353-0 (Pring) 0302-9743 (Online) 1611-3349International audienceNon-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol

    New functional families (FunFams) in CATH to improve the mapping of conserved functional sites to 3D structures.

    Get PDF
    CATH version 3.5 (Class, Architecture, Topology, Homology, available at http://www.cathdb.info/) contains 173 536 domains, 2626 homologous superfamilies and 1313 fold groups. When focusing on structural genomics (SG) structures, we observe that the number of new folds for CATH v3.5 is slightly less than for previous releases, and this observation suggests that we may now know the majority of folds that are easily accessible to structure determination. We have improved the accuracy of our functional family (FunFams) sub-classification method and the CATH sequence domain search facility has been extended to provide FunFam annotations for each domain. The CATH website has been redesigned. We have improved the display of functional data and of conserved sequence features associated with FunFams within each CATH superfamily

    A Robust and Rapid Method of Producing Soluble, Stable, and Functional G-Protein Coupled Receptors

    Get PDF
    Membrane proteins, particularly G-protein coupled receptors (GPCRs), are notoriously difficult to express. Using commercial E.coli cell-free systems with the detergent Brij-35, we could rapidly produce milligram quantities of 13 unique GPCRs. Immunoaffinity purification yielded receptors at >90% purity. Secondary structure analysis using circular dichroism indicated that the purified receptors were properly folded. Microscale thermophoresis, a novel label-free and surface-free detection technique that uses thermal gradients, showed that these receptors bound their ligands. The secondary structure and ligand-binding results from cell-free produced proteins were comparable to those expressed and purified from HEK293 cells. Our study demonstrates that cell-free protein production using commercially available kits and optimal detergents is a robust technology that can be used to produce sufficient GPCRs for biochemical, structural, and functional analyses. This robust and simple method may further stimulate others to study the structure and function of membrane proteins.United States. Defense Advanced Research Projects Agency (DARPA-HR0011-09-C-0012)Massachusetts Institute of Technology. Undergraduate Research Opportunities Progra

    Transcriptomic, Functional, and Network Analyses Reveal Novel Genes Involved in the Interaction between \u3ci\u3eCaenorhabditis elegans\u3c/i\u3e and \u3ci\u3eStenotrophomonas maltophilia\u3c/i\u3e

    Get PDF
    The bacterivorous nematode Caenorhabditis elegans is an excellent model for the study of innate immune responses to a variety of bacterial pathogens, including the emerging nosocomial bacterial pathogen Stenotrophomonas maltophilia. The study of this interaction has ecological and medical relevance as S. maltophilia is found in association with C. elegans and other nematodes in the wild and is an emerging opportunistic bacterial pathogen. We identified 393 genes that were differentially expressed when exposed to virulent and avirulent strains of S.maltophilia and an avirulent strain of E. coli. We then used a probabilistic functional gene network model (WormNet) to determine that 118 of the 393 differentially expressed genes formed an interacting network and identified a set of highly connected genes with eight or more predicted interactions.We hypothesized that these highly connected genes might play an important role in the defense against S. maltophila and found that mutations of six of seven highly connected genes have a significant effect on nematode survival in response to these bacteria. Of these genes, C48B4.1, mpk-2, cpr-4, clec-67, and lys-6 are needed for combating the virulent S. maltophilia JCMS strain, while dod-22 was solely involved in response to the avirulent S. maltophilia K279a strain. We further found that dod-22 and clec-67 were up regulated in response to JCMS vs. K279a, while C48B4.1, mpk-2, cpr-4, and lys-6 were down regulated. Only dod-22 had a documented role in innate immunity, which demonstrates the merit of our approach in the identification of novel genes that are involved in combating S. maltophilia infection
    corecore