1,189 research outputs found

    DCDIDP: A Distributed, Collaborative, and Data-driven IDP Framework for the Cloud

    Get PDF
    Recent advances in distributed computing, grid computing, virtualization mechanisms, and utility computing led into Cloud Computing as one of the industry buzz words of our decade. As the popularity of the services provided in the cloud environment grows exponentially, the exploitation of possible vulnerabilities grows with the same pace. Intrusion Detection and Prevention Systems (IDPSs) are one of the most popular tools among the front line fundamental tools to defend the computation and communication infrastructures from the intruders. In this poster, we propose a distributed, collaborative, and data-driven IDP (DCDIDP) framework for cloud computing environments. Both cloud providers and cloud customers will benefit significantly from DCDIDP that dynamically evolves and gradually mobilizes the resources in the cloud as suspicion about attacks increases. Such system will provide homogeneous IDPS for all the cloud providers that collaborate distributively. It will respond to the attacks, by collaborating with other peers and in a distributed manner, as near as possible to attack sources and at different levels of operations (e.g. network, host, VM). We present the DCDIDP framework and explain its components. However, further explanation is part of our ongoing work

    Ontology-based access control for social network systems

    Get PDF
    As the information flowing around in social network systems is mainly related or can be attributed to their users, controlling access to such information by individual users becomes a crucial requirement. The intricate semantic relations among data objects, different users, and between data objects and users further add to the complexity of access control needs. In this paper, we propose an access control model based on semantic web technologies that takes into account the above mentioned complex relations. The proposed model enables expressing much more fine-grained access control policies on a social network knowledge base than the existing models. We demonstrate the applicability of our approach by implementing a proof-of-concept prototype of the proposed access control framework and evaluating its performance

    Analysing security and privacy issues of using e-mail address as identity

    Get PDF
    Nowadays, many websites allow or require users to use their e-mail addresses either as identity or for other purposes. Although username-based identity problems resulting from users’ behaviours have been a research focus for quite some time, the serious issues of using e-mail address as identity and the associated online behaviours of users have not been well investigated. In this paper, we discuss and analyse security and privacy problems resulting from using e-mail address as identity via well-designed user behaviour survey and by investigating websites’ design schemes. Our results illustrate that using e-mail address as identity poses high security and privacy risks. This is mainly because of the multiple usages of e-mail addresses and users’ improper online habits. Moreover, we discuss drawbacks of existing solutions for e-mail address as identity and related password problems, and present potential solutions that may be used to secure online identity management systems in future

    Security in Dynamic Spectrum Access Systems: A Survey

    Get PDF
    Dynamic Spectrum Access (DSA) systems are being developed to improve spectrum utilization. Most of the research on DSA systems assumes that the participants involved are honest, cooperative, and that no malicious adversaries will attack or exploit the network. Some recent research efforts have focused on studying security issues in cognitive radios but there are still significant security challenges in the implementation of DSA systems that have not been addressed. In this paper we focus on security issues in DSA. We identify various attacks (e.g., DoS attacks, system penetration, repudiation, spoofing, authorization violation, malware infection, data modification, etc.) and suggest various approaches to address them. We show that significant security issues exist that should be addressed by the research community if DSA is to find its way into production systems. We also show that, in many cases, existing approaches to securing IT systems can be applied to DSA and identify other DSA specific security challenges where additional research will be required

    An anticancer drug suppresses the primary nucleation reaction that initiates the production of the toxic Aβ42 aggregates linked with Alzheimer's disease.

    Get PDF
    The conversion of the β-amyloid (Aβ) peptide into pathogenic aggregates is linked to the onset and progression of Alzheimer's disease. Although this observation has prompted an extensive search for therapeutic agents to modulate the concentration of Aβ or inhibit its aggregation, all clinical trials with these objectives have so far failed, at least in part because of a lack of understanding of the molecular mechanisms underlying the process of aggregation and its inhibition. To address this problem, we describe a chemical kinetics approach for rational drug discovery, in which the effects of small molecules on the rates of specific microscopic steps in the self-assembly of Aβ42, the most aggregation-prone variant of Aβ, are analyzed quantitatively. By applying this approach, we report that bexarotene, an anticancer drug approved by the U.S. Food and Drug Administration, selectively targets the primary nucleation step in Aβ42 aggregation, delays the formation of toxic species in neuroblastoma cells, and completely suppresses Aβ42 deposition and its consequences in a Caenorhabditis elegans model of Aβ42-mediated toxicity. These results suggest that the prevention of the primary nucleation of Aβ42 by compounds such as bexarotene could potentially reduce the risk of onset of Alzheimer's disease and, more generally, that our strategy provides a general framework for the rational identification of a range of candidate drugs directed against neurodegenerative disorders.This work was supported by the Centre for Misfolding Diseases, University of Cambridge.This is the final published version. It first appeared at http://advances.sciencemag.org/content/2/2/e1501244

    Evaluation of rate law approximations in bottom-up kinetic models of metabolism.

    Get PDF
    BackgroundThe mechanistic description of enzyme kinetics in a dynamic model of metabolism requires specifying the numerical values of a large number of kinetic parameters. The parameterization challenge is often addressed through the use of simplifying approximations to form reaction rate laws with reduced numbers of parameters. Whether such simplified models can reproduce dynamic characteristics of the full system is an important question.ResultsIn this work, we compared the local transient response properties of dynamic models constructed using rate laws with varying levels of approximation. These approximate rate laws were: 1) a Michaelis-Menten rate law with measured enzyme parameters, 2) a Michaelis-Menten rate law with approximated parameters, using the convenience kinetics convention, 3) a thermodynamic rate law resulting from a metabolite saturation assumption, and 4) a pure chemical reaction mass action rate law that removes the role of the enzyme from the reaction kinetics. We utilized in vivo data for the human red blood cell to compare the effect of rate law choices against the backdrop of physiological flux and concentration differences. We found that the Michaelis-Menten rate law with measured enzyme parameters yields an excellent approximation of the full system dynamics, while other assumptions cause greater discrepancies in system dynamic behavior. However, iteratively replacing mechanistic rate laws with approximations resulted in a model that retains a high correlation with the true model behavior. Investigating this consistency, we determined that the order of magnitude differences among fluxes and concentrations in the network were greatly influential on the network dynamics. We further identified reaction features such as thermodynamic reversibility, high substrate concentration, and lack of allosteric regulation, which make certain reactions more suitable for rate law approximations.ConclusionsOverall, our work generally supports the use of approximate rate laws when building large scale kinetic models, due to the key role that physiologically meaningful flux and concentration ranges play in determining network dynamics. However, we also showed that detailed mechanistic models show a clear benefit in prediction accuracy when data is available. The work here should help to provide guidance to future kinetic modeling efforts on the choice of rate law and parameterization approaches

    Rhizosphere dynamics of inoculated cyanobacteria and their growth-promoting role in rice crop

    Get PDF
    Nitrogen fixing cyanobacteria are the predominant flora in waterlogged paddy fields which contribute significantly towards nitrogen budgeting in these ecosystems. Their establishment and role in plant growth promotion and soil microbial activity is poorly known. Under greenhouse conditions, pots were inoculated with one of a set of twenty cyanobacterial strains isolated from the rhizosphere of diverse rice and wheat varieties. Several strains established in the soil and persisted up to the harvest stage in soil and roots, significantly enhancing soil microbial biomass carbon, available nitrogen, and related soil microbiological parameters, and increased grain yields and grain weight. This can help in selecting promising strains for developing carrier-based inoculants to promote the growth of crop and soil microflora, leading to enhanced soil fertility and crop yields

    Observation of associated near-side and away-side long-range correlations in √sNN=5.02  TeV proton-lead collisions with the ATLAS detector

    Get PDF
    Two-particle correlations in relative azimuthal angle (Δϕ) and pseudorapidity (Δη) are measured in √sNN=5.02  TeV p+Pb collisions using the ATLAS detector at the LHC. The measurements are performed using approximately 1  μb-1 of data as a function of transverse momentum (pT) and the transverse energy (ΣETPb) summed over 3.1<η<4.9 in the direction of the Pb beam. The correlation function, constructed from charged particles, exhibits a long-range (2<|Δη|<5) “near-side” (Δϕ∼0) correlation that grows rapidly with increasing ΣETPb. A long-range “away-side” (Δϕ∼π) correlation, obtained by subtracting the expected contributions from recoiling dijets and other sources estimated using events with small ΣETPb, is found to match the near-side correlation in magnitude, shape (in Δη and Δϕ) and ΣETPb dependence. The resultant Δϕ correlation is approximately symmetric about π/2, and is consistent with a dominant cos⁡2Δϕ modulation for all ΣETPb ranges and particle pT

    Search for direct pair production of the top squark in all-hadronic final states in proton-proton collisions at s√=8 TeV with the ATLAS detector

    Get PDF
    The results of a search for direct pair production of the scalar partner to the top quark using an integrated luminosity of 20.1fb−1 of proton–proton collision data at √s = 8 TeV recorded with the ATLAS detector at the LHC are reported. The top squark is assumed to decay via t˜→tχ˜01 or t˜→ bχ˜±1 →bW(∗)χ˜01 , where χ˜01 (χ˜±1 ) denotes the lightest neutralino (chargino) in supersymmetric models. The search targets a fully-hadronic final state in events with four or more jets and large missing transverse momentum. No significant excess over the Standard Model background prediction is observed, and exclusion limits are reported in terms of the top squark and neutralino masses and as a function of the branching fraction of t˜ → tχ˜01 . For a branching fraction of 100%, top squark masses in the range 270–645 GeV are excluded for χ˜01 masses below 30 GeV. For a branching fraction of 50% to either t˜ → tχ˜01 or t˜ → bχ˜±1 , and assuming the χ˜±1 mass to be twice the χ˜01 mass, top squark masses in the range 250–550 GeV are excluded for χ˜01 masses below 60 GeV

    Coastline changes and sedimentation related with the opening of an artificial channel: the Valo Grande Delta, SE Brazil

    Get PDF
    The role played by human activity in coastline changes indicates a general tendency of retreating coasts, especially deltaic environments, as a result of the recent trend of sea level rise as well as the blockage of the transfer of sediments towards the coast, especially due to the construction of dams. This is particularly important in deltaic environments which have been suffering a dramatic loss of area in the last decades. In contrast, in this paper, we report the origin and evolution of an anthropogenic delta, the Valo Grande delta, on the south-eastern Brazilian coast, whose origin is related to the opening of an artificial channel and the diversion of the main flow of the Ribeira de Iguape River. The methodology included the analysis of coastline changes, bathy metry and coring, which were used to determine the sedimentation rates and grain-size changes over time. The results allowed us to recognize the different facies of the anthropogenic delta and establish its lateral and vertical depositional trends. Despite not being very frequent, anthropogenic deltas represent a favorable environment for the record of natural and anthropogenic changes in historical times and, thus, deserve more attention from researchers of different subjects.Fundacao de Amparo a Pesquisa do Estado de Sao Paulo (FAPESP) [06/04344-2]info:eu-repo/semantics/publishedVersio
    corecore