Sample records for secure distributed applications

  1. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  2. An Immunological Model of Distributed Detection and Its Application to Computer Security

    E-print Network

    Forrest, Stephanie

    An Immunological Model of Distributed Detection and Its Application to Computer Security By Steven vii #12;#12;An Immunological Model of Distributed Detection and Its Application to Computer Security By Steven Andrew Hofmeyr Doctor of Philosophy Computer Science May 1999 #12;#12;An Immunological Model

  3. Design and Applications of a Secure and Decentralized Distributed Hash Table

    E-print Network

    , creating many fake identities is cheap; (2) an attacker can subvert periodic routing table maintenanceDesign and Applications of a Secure and Decentralized Distributed Hash Table by Christopher T and Applications of a Secure and Decentralized Distributed Hash Table by Christopher T. Lesniewski-Laas Submitted

  4. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage

    E-print Network

    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage Giuseppe) proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts and secure re-encryption will become increasingly popular as a method for managing encrypted file systems

  5. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security

    E-print Network

    Unidirectional Key Distribution Across Time and Space with Applications to RFID Security Ari Juels problem, however, is that of practical key management in RFID (Radio-Frequency IDentification) systems. We describe the application of our techniques to RFID-enabled supply chains and a prototype privacy

  6. Shared and Distributed Memory Parallel Security Analysis of Large-Scale Source Code and Binary Applications

    SciTech Connect

    Quinlan, D; Barany, G; Panas, T

    2007-08-30

    Many forms of security analysis on large scale applications can be substantially automated but the size and complexity can exceed the time and memory available on conventional desktop computers. Most commercial tools are understandably focused on such conventional desktop resources. This paper presents research work on the parallelization of security analysis of both source code and binaries within our Compass tool, which is implemented using the ROSE source-to-source open compiler infrastructure. We have focused on both shared and distributed memory parallelization of the evaluation of rules implemented as checkers for a wide range of secure programming rules, applicable to desktop machines, networks of workstations and dedicated clusters. While Compass as a tool focuses on source code analysis and reports violations of an extensible set of rules, the binary analysis work uses the exact same infrastructure but is less well developed into an equivalent final tool.

  7. Application Distribution Model and Related Security Attacks in Navid Nikaein, Soumya Kanti Datta, Irshad Marecar, Christian Bonnet

    E-print Network

    Gesbert, David

    Application Distribution Model and Related Security Attacks in VANET Navid Nikaein, Soumya Kanti distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack

  8. Secure software distribution system

    SciTech Connect

    Bartoletti, T.; Dobbs, L.A.; Kelley, M.

    1997-02-01

    Authenticating and upgrading system software plays a critical role in information security, yet practical tools for assessing and installing software are lacking in today`s marketplace. The Secure Software Distribution System (SSDS) will provide automated analysis, notification, distribution, and installation of security patches and related software to network-based computer systems in a vendor-independent fashion. SSDS will assist with the authentication of software by comparing the system`s objects with the patch`s objects. SSDS will monitor vendor`s patch sites to determine when new patches are released and will upgrade system software on target systems automatically. This paper describes the design of SSDS. Motivations behind the project, the advantages of SSDS over existing tools as well as the current status of the project are also discussed. 2 figs.

  9. Turning a Web 2.0 social network into a Web 3.0, distributed, and secured social web application

    Microsoft Academic Search

    Henry Story; Romain Blin; Julien Subercaze; Christophe Gravier; Pierre Maret

    2012-01-01

    This demonstration presents the process of transforming a Web 2.0 centralized social network into a Web 3.0, distributed, and secured Social application, and what was learnt in this process. The initial Web 2.0 Social Network application was written by a group of students over a period of 4 months in the spring of 2011. It had all the bells and

  10. Application Security Automation

    ERIC Educational Resources Information Center

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  11. Distributed Internet Security and Measurement

    E-print Network

    Forrest, Stephanie

    #12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science and Mathematics, Hendrix College, 2002 DISSERTATION Submitted in Partial Fulfillment of the Requirements Internet Security and Measurement by Josh Karlin ABSTRACT OF DISSERTATION Submitted in Partial Fulfillment

  12. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  13. Security architecture for heterogeneous distributed computing systems

    Microsoft Academic Search

    Syed Naqvi; Michel Riguidel

    2004-01-01

    Distributed systems face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. The advent of reliable spontaneous networking technologies has ostensibly raised the stakes for the design of computing intensive environments using intelligent devices. As environmental intelligence grows, so will the number of heterogeneous devices connected to the environment. The creation of security

  14. Secure Distributed Human Computation

    NASA Astrophysics Data System (ADS)

    Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart

    In Peha’s Financial Cryptography 2004 invited talk, he described the Cyphermint PayCash system (see www.cyphermint.com), which allows people without bank accounts or credit cards (a sizeable segment of the U.S. population) to automatically and instantly cash checks, pay bills, or make Internet transactions through publicly-accessible kiosks. Since PayCash offers automated financial transactions and since the system uses (unprotected) kiosks, security is critical. The kiosk must decide whether a person cashing a check is really the person to whom the check was made out, so it takes a digital picture of the person cashing the check and transmits this picture electronically to a central office, where a human worker compares the kiosk’s picture to one that was taken when the person registered with Cyphermint. If both pictures are of the same person, then the human worker authorizes the transaction.

  15. Design and applications of a secure and decentralized Distributed Hash Table

    E-print Network

    Lesniewski-Laas, Christopher T. (Christopher Tur), 1980-

    2011-01-01

    Distributed Hash Tables (DHTs) are a powerful building block for highly scalable decentralized systems. They route requests over a structured overlay network to the node responsible for a given key. DHTs are subject to the ...

  16. Providing Scheduling Applications as Secure Internet Services

    Microsoft Academic Search

    Goulas George; Barkayannis Vassilios; Housos Efthymios

    This paper describes SchedSP, a proposed architecture for providing scheduling applications as services over the Internet in a secure manner. This architecture is based on secure XML messaging over the HTTP protocol and utilizes a distributed Grid-based organization of computational resources for the execution of the scheduling solutions. Along with the prototype of the system, three case studies are presented.

  17. Information SecurityInformation Security--Applications andApplications and

    E-print Network

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  18. Perfectly-Secure Key Distribution for Dynamic Conferences

    Microsoft Academic Search

    Carlo Blundo; Alfredo De Santis; Amir Herzberg Shay Kutten; Ugo Vaccaro

    1993-01-01

    A key distribution scheme for dynamic conferences is a method by which initiallyan (off-line) trusted server distributes private individual pieces of informationto a set of users. Later, each member of any group of users of a given size (a dynamicconference) can compute a common secure group key. In this paper westudy the theory and applications of such perfectly secure systems.

  19. Views and Security in Distributed Database Management Systems

    Microsoft Academic Search

    Elisa Bertino; Laura M. Haas

    1988-01-01

    Views are used in database systems to present data to different applications in a form reflecting their individual needs. The view mechanism contributes to data protection, independence, and isolation. In this paper we first discuss some issues concerning Distributed Database security and then the design of distributed views providing security features. The following issues concerning views are discussed: represention, change,

  20. Security Data Warehouse Application

    NASA Technical Reports Server (NTRS)

    Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John

    2012-01-01

    The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.

  1. The Digital Distributed System Security Architecture

    Microsoft Academic Search

    Andy Goldstein; Butler Lampson; Charlie Kaufman; Morrie Gasser

    1989-01-01

    The Digital Distributed System Security Architecture is a comprehensive specification for security in a distributed system that employs state-of-the-art concepts to address the needs of both commercial and government environments. The architecture covers user and system authentication, mandatory and discretionary security, secure initialization and loading, and delegation in a general-purpose computing environment of heterogeneous systems where there are no central

  2. Security and Privacy for Distributed Multimedia Sensor Networks

    Microsoft Academic Search

    Deepa Kundur; William Luh; Unoma Ndili Okorafor; Takis Zourntos

    2008-01-01

    There is a critical need to provide privacy and security assurances for distributed multimedia sensor networking in applications including military surveillance and healthcare monitoring. Such guarantees enable the widespread adoption of such information systems, leading to large-scale societal benefit. To effectively address protection and reliability issues, secure communications and processing must be considered from system inception. Due to the emerging

  3. Secure Computation for Biometric Data Security - Application to Speaker Verification

    Microsoft Academic Search

    Bon K. Sy

    2009-01-01

    The goal of this research is to develop provable secure computation techniques for two biometric security tasks in complex distributed systems involving multiple parties; namely biometric data retrieval and authentication. We first present models for privacy and security that delineate the conditions under which biometric data disclosure are allowed. We then discuss the secure computation techniques for retrieval and authentication

  4. Security seal. [Patent application

    DOEpatents

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  5. Software To Secure Distributed Propulsion Simulations

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines

  6. Perfectly-Secure Key Distribution for Dynamic Conferences

    Microsoft Academic Search

    Carlo Blundo; Alfredo De Santis; Amir Herzberg; Shay Kutten; Ugo Vaccaro; Moti Yung

    1992-01-01

    A key distribution scheme for dynamic conferences is a method by which initially an (off-line) trusted server distributes private individ- ual pieces of information to a set of users. Later any group of users of a given size (a dynamic conference) is able to compute a common secure key. In this paper we study the theory and applications of such

  7. Integrating security in a group oriented distributed system

    NASA Technical Reports Server (NTRS)

    Reiter, Michael; Birman, Kenneth; Gong, LI

    1992-01-01

    A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

  8. THINK: a secure distributed systems architecture

    Microsoft Academic Search

    Christophe Rippert; Jean-bernard Stefani

    2002-01-01

    In this paper, we present THINK, our distributed systems architecture, and the research we have conducted to provide the system programmer with an architecture he can use to build efficient and secure operating systems. By specifying and implementing elementary tools that can be used by the system programmer to implement a chosen security policy, we prove that flexibility can be

  9. Homeland Security and Defense Applications

    SciTech Connect

    None

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  10. Homeland Security and Defense Applications

    ScienceCinema

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  11. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-print Network

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your the items as they apply to that person. 2. Show an address where you can receive the card 10 to 14 days from

  12. A Secure Communications Infrastructure for High-Performance Distributed Computing

    Microsoft Academic Search

    Ian Foster; Nicholas T. Karonis; Carl Kesselman Greg Koenig; Steven Tuecke

    1996-01-01

    We describe a software infrastructure designed to support the development of applicationsthat use high-speed networks to connect geographically distributed supercomputers,databases, and scientific instruments. Such applications may need to operate over opennetworks and access valuable resources, and hence can require mechanisms for ensuringintegrity and confidentialityofcommunications and for authenticating both users andresources. Yet security solutions developed for traditional...

  13. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    SciTech Connect

    Not Available

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  14. CORBASec Used to Secure Distributed Aerospace Propulsion Simulations

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.

  15. The security of practical quantum key distribution

    Microsoft Academic Search

    Valerio Scarani; Helle Bechmann-Pasquinucci; Nicolas J. Cerf; Miloslav Dusek; Norbert Lütkenhaus; Momtchil Peev

    2009-01-01

    Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's

  16. Integrating security in a large distributed system

    Microsoft Academic Search

    Mahadev Satyanarayanan

    1989-01-01

    Andrew is a distributed computing environment that is a synthesis of the personal computing and timesharing paradigms. When mature, it is expected to encompass over 5,000 workstations spanning the Carnegie Mellon University campus. This paper examines the security issues that arise in such an environment and describes the mechanisms that have been developed to address them. These mechanisms include the

  17. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  18. Secure Coprocessors in Electronic Commerce Applications

    Microsoft Academic Search

    Bennet Yee; J. D. Tygar

    1996-01-01

    Many researchers believe electronic wallets (secure stor- age devices that maintain account balances) are the solu- tion to electronic commerce challenges. This paper argues for a more powerful model — a secure coprocessor — that can run a small operating system, run application pro- grams, and also keep secure storage for cryptographic keys and balance information. We have built a

  19. Secure application partitioning for intellectual property protection

    E-print Network

    O'Donnell, Charles W., S.M. Massachusetts Institute of Technology

    2005-01-01

    Intellectual property protection is a major concern for both hardware and software architects today. Recently secure platforms have been proposed to protect the privacy of application code and enforce that an application ...

  20. Enabling Secure Secret Sharing in Distributed Online Social Networks

    Microsoft Academic Search

    Le-hung Vu; Karl Aberer; Sonja Buchegger; Anwitaman Datta

    2009-01-01

    Abstract—We study a new,application of threshold-based secret sharing in a distributed online social network (DOSN), where,users need a means,to back up,and,recover their private keys in a network of untrusted servers. Using a simple threshold-based secret sharing in such an environment,is insufficiently secured since delegates keeping the secret s hares may,collude to steal the user’s private keys. To mitigate this problem,

  1. Derived virtual devices: a secure distributed file system mechanism

    NASA Technical Reports Server (NTRS)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  2. Secure and Robust Overlay Content Distribution

    ERIC Educational Resources Information Center

    Kang, Hun Jeong

    2010-01-01

    With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…

  3. Video performance for high security applications.

    SciTech Connect

    Connell, Jack C.; Norman, Bradley C.

    2010-06-01

    The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

  4. Secure coprocessing applications and research issues

    SciTech Connect

    Smith, S.W.

    1996-08-01

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  5. Web Applications and Security Web protocol overview

    E-print Network

    Massachusetts at Amherst, University of

    Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

  6. Secure voice for mobile satellite applications

    NASA Technical Reports Server (NTRS)

    Vaisnys, Arvydas; Berner, Jeff

    1990-01-01

    The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.

  7. A study of Android application security

    E-print Network

    William Enck; Damien Octeau; Patrick Mcdaniel; Swarat Chaudhuri

    2011-01-01

    security by studying 1,100 popular free Android applications. We introduce the ded decompiler, which recovers Android application source code directly from its installation image. We design and execute a horizontal study of smartphone applications based on static analysis of 21 million lines of recovered

  8. A Tool for Securely Integrating Legacy Systems into a Distributed Environment

    E-print Network

    Mancoridis, Spiros

    the security do- mains of the host and the distributed object system. This security layer includes a sandbox Access Model is an original system access model that presents a four tiered sandboxing model for wrapping legacy applications: complete encapsulation, shared sandbox, single sandbox, sandboxless operation

  9. IBM Software IBM Security AppScan: Application

    E-print Network

    IBM Software Security June 2012 IBM Security AppScan: Application security and risk management. #12;3IBM Software The IBM Security AppScan portfolio includes solutions specifi- c Identify, prioritize, track and remediate critical security vulnerabilities #12;2 IBM Security App

  10. Oriented Engineering Application for Voltage Security Analysis of Power Systems

    Microsoft Academic Search

    Zhou Xia; Li Bi-jun; Li Wen-yun; Wu Chen; Xu Tai-shan; Ren Xian-cheng

    2006-01-01

    This paper deals with oriented engineering application of voltage security analysis of large-scale power systems, including engineering criterion of voltage security, principal objective, and systematic procedure of voltage security assessment. A systematic approach to voltage security assessment is presented in this paper. Example of Yunnan grid voltage security analysis using systematic voltage security analysis method is presented

  11. A Proof of the Security of Quantum Key Distribution

    Microsoft Academic Search

    Eli Biham; Michel Boyer; P. Oscar Boykin; Tal Mor; Vwani P. Roychowdhury

    2006-01-01

    We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security

  12. A contamination source identification model for water distribution system security

    NASA Astrophysics Data System (ADS)

    Preis, A.; Ostfeld, A.

    2007-12-01

    This article presents and demonstrates a simple, straightforward genetic algorithm (GA) scheme for contamination source identification to enhance the security of water distribution systems. Related previous work on this subject has concentrated on developing analytical water quality inverse models with two major restrictions: the ability to disclose unique solutions and to handle water distribution systems of large size. These two limitations are addressed in this study by coupling a GA with EPANET. The objective function is minimization of the least-squares of the differences between simulated and measured contaminant concentrations, with the decision variables being the contaminant event characteristics of intrusion location, starting time, duration and mass rate. The developed methodology is demonstrated through base runs and sensitivity analysis of three water distribution system example applications of increasing complexity.

  13. Implementing a secure client/server application

    SciTech Connect

    Kissinger, B.A.

    1994-08-01

    There is an increasing rise in attacks and security breaches on computer systems. Particularly vulnerable are systems that exchange user names and passwords directly across a network without encryption. These kinds of systems include many commercial-off-the-shelf client/server applications. A secure technique for authenticating computer users and transmitting passwords through the use of a trusted {open_quotes}broker{close_quotes} and public/private keys is described in this paper.

  14. Applications for cyber security - System and application monitoring

    SciTech Connect

    Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

    2006-07-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  15. Developing Provable Secure M-Commerce Applications

    Microsoft Academic Search

    Holger Grandy; Dominik Haneberg; Wolfgang Reif; Kurt Stenzel

    2006-01-01

    \\u000a We present a modeling framework and a verification technique for m-commerce applications. Our approach supports the development\\u000a of secure communication protocols for such applications as well as the refinement of the abstract protocol descriptions into\\u000a executable Java code without any gap. The technique is explained using an interesting m-commerce application, an electronic\\u000a ticketing system for cinema tickets. The verification has

  16. Security Models and Requirements for Healthcare Application Clouds

    E-print Network

    Liu, Ling

    an EHR security reference model for managing security issues in healthcare clouds, which highlights three computing. B. Security and Privacy Issues in Healthcare Research on the various security issues surroundingSecurity Models and Requirements for Healthcare Application Clouds Rui Zhang 1,2 and Ling Liu 1 1

  17. MEMS and MOEMS for national security applications

    NASA Astrophysics Data System (ADS)

    Scott, Marion W.

    2003-01-01

    Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

  18. Developmental Integrative BiologyCyber Security UNT is recognized by the National Security Agency and the Department of

    E-print Network

    Tarau, Paul

    , watermarking, cryptography, secured electronic commerce, and secured mobile applications and VoIP security UNT and Engineering: cloud computing and distributed and parallel systems, including architecture and security

  19. Power laser application for security glass production

    Microsoft Academic Search

    Vladimir Abashkin; Elena Achimova

    2009-01-01

    Modern glass application needs to move from traditional tempering with only average controlled fragmentation of security glass to computerized controlled fragmentation by developing engineered stress profiles in glass article. The new treatment methods of soda-lime float glass using irradiation by power Nd:YAG laser which is moved by robot will be discussed. The transparency of glass for laser wavelength is one

  20. Security of quantum key distribution with arbitrary individual imperfections

    SciTech Connect

    Maroey, Oystein; Lydersen, Lars; Skaar, Johannes [Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim, Norway and University Graduate Center, NO-2027 Kjeller (Norway)

    2010-09-15

    We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system may otherwise be completely uncharacterized and contain large losses.

  1. Research on Distributed Access Control by Security E-government

    Microsoft Academic Search

    Shen Yue; Yu Fei; Zhang Linfeng; Liao Guiping; Zhou Tao

    2006-01-01

    Since the method of using username and password and the traditional access-control list mechanism can no more keep up with the further development of e-government, we realized a distributed-access-control model to settle this problem. This model divides the security management into two levels: First is global security management level which is responsible for harmonizing and controlling the security management of

  2. 17 CFR 230.139 - Publications or distributions of research reports by brokers or dealers distributing securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01...reports by brokers or dealers distributing securities. 230.139 Section 230.139 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  3. 17 CFR 230.139 - Publications or distributions of research reports by brokers or dealers distributing securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01...reports by brokers or dealers distributing securities. 230.139 Section 230.139 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  4. Message Passing for Distributed QoS-Security Tradeoffs

    E-print Network

    Massachusetts at Amherst, University of

    that the security mechanisms are effective, and the system can be entrusted with critical information processingMessage Passing for Distributed QoS-Security Tradeoffs Hala Mostafa1 , Partha Pal1 and Patrick Email: hmostafa@bbn.com Information Assurance (IA) is a growing concern, since almost every aspect

  5. Security of Quantum Key Distribution against All Collective Attacks

    Microsoft Academic Search

    Eli Biham; Michel Boyer; Gilles Brassard; Jeroen Van De Graaf; Tal Mor

    2002-01-01

    Security of quantum key distribution against sophisticated attacks is among the most important issues in quantum information theory. In this work we prove security against a very important class of attacks called collective attacks (under a compatible noise model) which use quantum memories and gates, and which are directed against the final key. This work was crucial for a full

  6. Security against individual attacks for realistic quantum key distribution

    Microsoft Academic Search

    Norbert Lütkenhaus

    2000-01-01

    I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and down-conversion sources. The proof applies to the Bennett-Brassard 1984 protocol with the standard detection scheme (no strong reference pulse). I obtain a formula for the secure bit rate per time slot of an experimental setup, which can be used to

  7. Blue versus Red: Towards a Model of Distributed Security Attacks

    Microsoft Academic Search

    Neal Fultz; Jens Grossklags

    2009-01-01

    Abstract. This paper analyzes the threat of distributed attacks by de- veloping a two-sided multiplayer model of security in which attackers aim to deny service and defenders strategize to secure their assets. Attack- ers benet from the successful compromise of target systems, however, may suer,penalties for increased attack activity. Defenders weigh the likelihood of an attack against the cost of

  8. Distributed Reputation-based Secure Localization in Sensor Networks

    E-print Network

    Wu, Jie

    malicious BNs to ensure secure localization of SNs. To the best of our knowledge, DRBTS is the first1 Distributed Reputation-based Secure Localization in Sensor Networks Avinash Srinivasan, Jie Wu) that assist other sensor nodes (SNs) to determine their location. In BN-based models, it is critical

  9. Photonic sensor applications in transportation security

    NASA Astrophysics Data System (ADS)

    Krohn, David A.

    2007-09-01

    There is a broad range of security sensing applications in transportation that can be facilitated by using fiber optic sensors and photonic sensor integrated wireless systems. Many of these vital assets are under constant threat of being attacked. It is important to realize that the threats are not just from terrorism but an aging and often neglected infrastructure. To specifically address transportation security, photonic sensors fall into two categories: fixed point monitoring and mobile tracking. In fixed point monitoring, the sensors monitor bridge and tunnel structural health and environment problems such as toxic gases in a tunnel. Mobile tracking sensors are being designed to track cargo such as shipboard cargo containers and trucks. Mobile tracking sensor systems have multifunctional sensor requirements including intrusion (tampering), biochemical, radiation and explosives detection. This paper will review the state of the art of photonic sensor technologies and their ability to meet the challenges of transportation security.

  10. Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks

    E-print Network

    Han, Richard Y.

    Descriptors K.6.5 [Computing Milieux]: Management of Computing and Information SystemsSecure Code Distribution in Dynamically Programmable Wireless Sensor Networks Jing Deng Richard Han Shivakant Mishra Department of Computer Science University of Colorado Boulder, Colorado, USA Jing

  11. Audit trails in the Aeolus distributed security platform

    E-print Network

    Popic, Victoria

    2010-01-01

    This thesis provides a complete design and implementation of audit trail collection and storage for Aeolus, a distributed security platform based on information flow control. An information flow control system regulates ...

  12. Audit Trails in the Aeolus Distributed Security Platform

    E-print Network

    Popic, Victoria

    2010-09-29

    This thesis provides a complete design and implementation of audit trail collection and storage for Aeolus, a distributed security platform based on information flow control. An information flow control system regulates ...

  13. Paper ID # 900041 DISTRIBUTED CERTIFICATE AND APPLICATION ARCHITECTURE FOR VANETs

    E-print Network

    Zou, Cliff C.

    1 of 7 Paper ID # 900041 DISTRIBUTED CERTIFICATE AND APPLICATION ARCHITECTURE FOR VANETs Baber (VANET) applications. A lot of solutions have been presented to address these issues. However of VANET. In this paper, we present a distributed security architecture for VANET that does not rest

  14. Security for Multimedia Space Data Distribution over the Internet

    NASA Technical Reports Server (NTRS)

    Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)

    1995-01-01

    Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.

  15. Incorporation of Security Mechanisms into the TMO Scheme for Real Time Distributed Computing

    Microsoft Academic Search

    Juan A. Colmenares; Moon-Cheol Kim; Zhen Zhang; Qian Zhou; Doo Hyun Kim; Stephen S. Yau

    2009-01-01

    Many real-time distributed computing (RTDC) applications have stringent action timing requirements as well as tight security-enforcement requirements. Integration of security enforcement mechanisms into advanced component-based RTDC schemes has been recognized as an important research topic in recent years. In this paper we propose the first formal extension of the Time-triggered Message-triggered Object (TMO) component model devised to facilitate efficient construction

  16. Design and Implementation of Security Camera Control Application for Mobile Phones

    Microsoft Academic Search

    Takeshi Kato; Tomoyuki Osano; Norihiro Ishikawa

    2009-01-01

    In recent years, due to the rise in crime, growing numbers of governments, companies, and schools are equipping their facilities with security cameras to deter crime and to investigate crimes that have happened. In this study, we investigate a distributed application that provides an efficient access method for security cameras placed in various areas. Peer-to-peer is a suitable technology for

  17. 7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...2013-01-01 2013-01-01 false Refinancing of existing secured debt-distribution...Percent Private Financing § 1717.857 Refinancing of existing secured debt—distribution...accommodation or subordination for the refinancing of existing secured debt...

  18. 7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...2011-01-01 2011-01-01 false Refinancing of existing secured debt-distribution...Percent Private Financing § 1717.857 Refinancing of existing secured debt—distribution...accommodation or subordination for the refinancing of existing secured debt...

  19. 7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...2010-01-01 2010-01-01 false Refinancing of existing secured debt-distribution...Percent Private Financing § 1717.857 Refinancing of existing secured debt—distribution...accommodation or subordination for the refinancing of existing secured debt...

  20. 7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...2014-01-01 2014-01-01 false Refinancing of existing secured debt-distribution...Percent Private Financing § 1717.857 Refinancing of existing secured debt—distribution...accommodation or subordination for the refinancing of existing secured debt...

  1. 7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...2012-01-01 2012-01-01 false Refinancing of existing secured debt-distribution...Percent Private Financing § 1717.857 Refinancing of existing secured debt—distribution...accommodation or subordination for the refinancing of existing secured debt...

  2. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...false Application for security deposit determination; information to be submitted; other... Insurance Carrier Security Deposit Requirements...203 Application for security deposit determination; information to be submitted;...

  3. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...false Application for security deposit determination; information to be submitted; other... Insurance Carrier Security Deposit Requirements...203 Application for security deposit determination; information to be submitted;...

  4. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...false Application for security deposit determination; information to be submitted; other... Insurance Carrier Security Deposit Requirements...203 Application for security deposit determination; information to be submitted;...

  5. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...false Application for security deposit determination; information to be submitted; other... Insurance Carrier Security Deposit Requirements...203 Application for security deposit determination; information to be submitted;...

  6. Semantically Rich Application-Centric Security in Android

    Microsoft Academic Search

    Machigar Ongtang; Stephen E. Mclaughlin; William Enck; Patrick Drew Mcdaniel

    2009-01-01

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smart- phone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to

  7. Distributed security for communications and memories in a multiprocessor architecture

    E-print Network

    Paris-Sud XI, Université de

    Distributed security for communications and memories in a multiprocessor architecture Pascal Cotret architecture of the system. This paper targets this point and proposes a solution with distributed enhancements architectures within an embedded system. Coburn et al. [1] propose a solution dedicated to buses

  8. Security strategy of EPR type protocol of quantum key distribution

    Microsoft Academic Search

    Chong Xiang; Li Yang

    2008-01-01

    Ekert91 protocol of quantum key distribution is an important protocol of key distribution that based on the quantum mechanics. According to it, we first discuss the variance functions of Bell inequality test and error rate comparison, and then define the sensitivities of two security strategies based on Bell inequality test and error rate comparison respectively. Finally we give out the

  9. Unconditional Secure Conference Key Distribution Schemes with Disenrollment Capability

    Microsoft Academic Search

    Carlo Blundo; Antonella Cresti

    1999-01-01

    A conference key distribution scheme with disenrollment capability is a method to distribute pieces of information among a set of users in such a way that each group of them can compute a common key to be used for secure communication. In such a scheme any user can be disenrolled. After each disenrollment, although the disenrolled user reveals his private

  10. A contamination source identification model for water distribution system security

    Microsoft Academic Search

    A. Preis; A. Ostfeld

    2007-01-01

    This article presents and demonstrates a simple, straightforward genetic algorithm (GA) scheme for contamination source identification to enhance the security of water distribution systems. Related previous work on this subject has concentrated on developing analytical water quality inverse models with two major restrictions: the ability to disclose unique solutions and to handle water distribution systems of large size. These two

  11. Security Certificate Revocation List Distribution for VANET Kenneth P. Laberteaux

    E-print Network

    Hu, Yih-Chun

    Security Certificate Revocation List Distribution for VANET Kenneth P. Laberteaux Toyota Technical.uiuc.edu, yihchun@crhc.uiuc.edu ABSTRACT In a VANET, a certificate authority issues keys and certifi- cates to vehicles. Each vehicle distributes these certificates to other VANET participants and subsequently signs

  12. Scalable, Secure, and Highly Available Distributed File Access

    Microsoft Academic Search

    Mahadev Satyanarayanan

    1990-01-01

    A summary of and historical perspective on work done to implement easy-to-share distributed file systems based on the Unix model are presented. Andrew and Coda are distributed Unix file systems that embody many of the recent advances in solving the problem of data sharing in large, physically dispersed workstation environments. The Andrew architecture is presented, the scalability and security of

  13. Power laser application for security glass production

    NASA Astrophysics Data System (ADS)

    Abashkin, Vladimir; Achimova, Elena

    2010-05-01

    Modern glass application needs to move from traditional tempering with only average controlled fragmentation of security glass to computerized controlled fragmentation by developing engineered stress profiles in glass article. The new treatment methods of soda-lime float glass using irradiation by power Nd:YAG laser which is moved by robot will be discussed. The transparency of glass for laser wavelength is one of the problems of glass treatment by laser. Noncontact stress control by light scattering will be shown. The two main objectives of this work will be discussed: 1. Glass treatment by power laser beam directed to secure glass production; 2. Control methods of residual stress into float glasses treated by laser.

  14. User assigned security policy framework for m-commerce applications

    Microsoft Academic Search

    M. Aramudhan

    2008-01-01

    M-Commerce is the ability to perform commercial transactions using mobile phones or other wireless devices on the move. It is a major application domain for mobile devices where applications require a high level of security. Generally, security policies are enforced by either Server Operating System or application authority for the specific user about its behavior to access the applications after

  15. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  16. Simple security proof of quantum key distribution via uncertainty principle

    E-print Network

    Masato Koashi

    2005-05-14

    We present an approach to the unconditional security of quantum key distribution protocols based on the uncertainty principle. The approach applies to every case that has been treated via the argument by Shor and Preskill, and relieve them from the constraints of finding quantum error correcting codes. It can also treat the cases with uncharacterized apparatuses. We derive a secure key rate for the Bennett-Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence.

  17. Provably secure and practical quantum key distribution over 307?km of optical fibre

    NASA Astrophysics Data System (ADS)

    Korzh, Boris; Lim, Charles Ci Wen; Houlmann, Raphael; Gisin, Nicolas; Li, Ming Jun; Nolan, Daniel; Sanguinetti, Bruno; Thew, Rob; Zbinden, Hugo

    2015-03-01

    Proposed in 1984, quantum key distribution (QKD) allows two users to exchange provably secure keys via a potentially insecure quantum channel. Since then, QKD has attracted much attention and significant progress has been made both in theory and practice. On the application front, however, the operating distance of practical fibre-based QKD systems is limited to about 150?km (ref. 4), mainly due to the high background noise of practical single-photon detectors and inefficient finite-key security analysis. Here, we present, for the first time, a compact and autonomous QKD system that is capable of distributing provably secure cryptographic keys over 307?km of optical fibre. This is achieved by using semiconductor single-photon detectors with record low background noise and a novel finite-key security analysis, which is efficient even for short key lengths. This demonstrates the feasibility of practical long-distance QKD based on standard fibre-optic telecom components.

  18. For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentica-

    E-print Network

    Plusquellic, James

    component for secure activation, IC authentica- tion and for other important applications including manufacturing variations of the IC. Robust silicon-derived keys are implemented using physically unclonable on the measured equivalent resistance variations in the power distribution system (PDS) of an IC

  19. ReDiSen: Reputation-based Secure Cooperative Sensing in Distributed Cognitive Radio Networks

    E-print Network

    Li, Zongpeng

    ReDiSen: Reputation-based Secure Cooperative Sensing in Distributed Cognitive Radio Networks Calgary, Alberta, Canada T2N 1N4 {tozhang, rei, zongpeng}@ucalgary.ca Abstract--Cognitive radio techniques channel, and is therefore more applicable in dynamic cognitive radio networks. Index Terms--Cognitive

  20. Security of Continuous-Variable Quantum Key Distribution with Imperfect Phase Compensation

    NASA Astrophysics Data System (ADS)

    Huang, Peng; Lin, Da-kai; Huang, Duan; Zeng, Gui-Hua

    2015-01-01

    Phase compensation is a necessary procedure in practical application of continuous-variable quantum key distribution (CVQKD) for the reason of unavoidable phase drifts of quantum signals in quantum channel. However, the phase compensation may become imperfect in practical applications. The security of CVQKD scheme with imperfect phase compensation is investigated under realistic conditions of quantum channel and detector. In particular, a tight security bound to the phase noise of the imperfect phase compensation are derived for reverse reconciliation and realistic homodyne detection. Moreover, the phase noise is analyzed experimentally and a practical phase compensation procedure is applied to simulate the imperct processing. The simulation results show its coincidence to the security bound, and reveal the sensitivity of the security of the reverse reconciliation CVQKD protocol to the noise arising from imperfect phase compensation.

  1. Secure Distributed Framework for Achieving -Differential Privacy

    E-print Network

    Fung, Benjamin C. M.

    to different hospitals. Periodically, hospitals are required to submit the blood transfusion information received blood transfusion. Both parties w. Consider a blood bank collects and examines the blood provided from donors and then distributes the blood

  2. Security certificate revocation list distribution for vanet

    Microsoft Academic Search

    Kenneth P. Laberteaux; Jason J. Haas; Yih-chun Hu

    2008-01-01

    In a VANET, a certificate authority issues keys and certifi- cates to vehicles. Each vehicle distributes these certificates to other VANET participants and subsequently signs mes- sages against these certificates. If the certificate authority needs to revoke a certificate (e.g. due to a breach of trust), it universally distributes a certificate revocation list. We pro- pose a method for car-to-car

  3. Passive terahertz imaging for security application

    NASA Astrophysics Data System (ADS)

    Guo, Lan-tao; Deng, Chao; Zhao, Yuan-meng; Zhang, Cun-lin

    2013-08-01

    The passive detection is safe for passengers and operators as no radiation. Therefore, passive terahertz (THz) imaging can be applied to human body security check. Imaging in the THz band offers the unique property of being able to identify object through a range of materials. Therefore passive THz imaging is meaningful for security applications. This attribute has always been of interest to both the civil and military marks with applications. We took advantage of a single THz detector and a trihedral scanning mirror to propose another passive THz beam scanning imaging method. This method overcame the deficiencies of the serious decline in image quality due to the movement of the focused mirror. We exploited a THz scanning mirror with a trihedral scanning mirror and an ellipsoidal mirror to streamline the structure of the system and increase the scanning speed. Then the passive THz beam scanning imaging system was developed based on this method. The parameters were set as follows: the best imaging distance was 1.7m, the image height was 2m, the image width was 1m, the minimum imaging time of per frame was 8s, and the minimum resolution was 4cm. We imaged humans with different objects hidden under their clothes, such as fruit knife, belt buckle, mobile phone, screwdriver, bus cards, keys and other items. All the tested stuffs could be detected and recognized from the image.

  4. A Security Architecture for Web 2.0 Applications

    Microsoft Academic Search

    Lieven Desmet; Wouter Joosen; Fabio Massacci; Katsiaryna Naliuka; Pieter Philippaerts; Frank Piessens; Ida Siahaan; Dries Vanoverberghe

    2009-01-01

    The problem of supporting the secure execution of potentially mali- cious third-party applications has received a considerable amount of attention in the past decade. In this paper we describe a security architecture for Web 2.0 applications that supports the flexible integration of a variety of advanced tech- nologies for such secure execution of applications, including run-time monitor- ing, static verification

  5. Management of Network Security Applications Philip C. Hyland

    E-print Network

    Sandhu, Ravi

    with the Simple Network Management Protocol (SNMP). Security applications are assessed for value of management via, privacy, performance, and reliability are growing. The rapid deployment of new secu- rity technology needs that counter security risks with controls and pro- tective measures. Security policy has a direct impact

  6. Network and data security design for telemedicine applications.

    PubMed

    Makris, L; Argiriou, N; Strintzis, M G

    1997-01-01

    The maturing of telecommunication technologies has ushered in a whole new era of applications and services in the health care environment. Teleworking, teleconsultation, mutlimedia conferencing and medical data distribution are rapidly becoming commonplace in clinical practice. As a result, a set of problems arises, concerning data confidentiality and integrity. Public computer networks, such as the emerging ISDN technology, are vulnerable to eavesdropping. Therefore it is important for telemedicine applications to employ end-to-end encryption mechanisms securing the data channel from unauthorized access of modification. We propose a network access and encryption system that is both economical and easily implemented for integration in developing or existing applications, using well-known and thoroughly tested encryption algorithms. Public-key cryptography is used for session-key exchange, while symmetric algorithms are used for bulk encryption. Mechanisms for session-key generation and exchange are also provided. PMID:9304559

  7. Radiation Detection for Homeland Security Applications

    NASA Astrophysics Data System (ADS)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will be reviewed. Opportunities for further research and development to improve the current equipment and methodologies for radiation detection for the important task of homeland security will be the final topic to be discussed.

  8. Device Calibration Impacts Security of Quantum Key Distribution

    Microsoft Academic Search

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-01-01

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine.

  9. Security proof for quantum key distribution using qudit systems

    NASA Astrophysics Data System (ADS)

    Sheridan, Lana; Scarani, Valerio

    2010-09-01

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d?20.

  10. Security proof for quantum key distribution using qudit systems

    SciTech Connect

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  11. Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation

    Microsoft Academic Search

    Shiguo Lian; Zhiquan Wang

    2008-01-01

    In this paper, a secure multimedia distribution scheme resistant to collusion attacks is proposed. In this scheme, the multimedia content is modulated by n pseudorandom sequences at the server side, which generates the unintelligible multimedia content, and then demodulated under the control of the fingerprint code at the customer side, which produces the multimedia content contains a unique code. The

  12. A virtualization approach for distributed resources security in network manufacturing

    Microsoft Academic Search

    Lei Ren; Yabin Zhang; Yongliang Luo; Lin Zhang

    2010-01-01

    Network manufacturing technology has proven an effective approach to achieving integration of the distributed manufacturing resources over Internet. The nature of high interoperability of network manufacturing results in a variety of security threats due to the ultimate dependence upon operating system. Virtualization technology, allowing a monitor and control layer running between operating system and underlying infrastructure, could provide a promising

  13. 78 FR 79298 - Securities Exempted; Distribution of Shares by Registered Open-End Management Investment Company...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-30

    ...33-9503; IC-30845] Securities Exempted; Distribution...Registered Open- End Management Investment Company...Profit-Sharing Plans AGENCY: Securities and Exchange Commission...Division of Investment Management, U.S. Securities and Exchange...

  14. 76 FR 17158 - Assumption Buster Workshop: Distributed Data Schemes Provide Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-28

    ...assumptions that underlie current security architectures. Challenging those assumptions both...Provide Security''. Distributed data architectures, such as cloud computing, offer very...much discussion about securing such architectures, and it is generally felt that...

  15. Tools for distributed application management

    NASA Technical Reports Server (NTRS)

    Marzullo, Keith; Cooper, Robert; Wood, Mark; Birman, Kenneth P.

    1990-01-01

    Distributed application management consists of monitoring and controlling an application as it executes in a distributed environment. It encompasses such activities as configuration, initialization, performance monitoring, resource scheduling, and failure response. The Meta system (a collection of tools for constructing distributed application management software) is described. Meta provides the mechanism, while the programmer specifies the policy for application management. The policy is manifested as a control program which is a soft real-time reactive program. The underlying application is instrumented with a variety of built-in and user-defined sensors and actuators. These define the interface between the control program and the application. The control program also has access to a database describing the structure of the application and the characteristics of its environment. Some of the more difficult problems for application management occur when preexisting, nondistributed programs are integrated into a distributed application for which they may not have been intended. Meta allows management functions to be retrofitted to such programs with a minimum of effort.

  16. Tools for distributed application management

    NASA Technical Reports Server (NTRS)

    Marzullo, Keith; Wood, Mark; Cooper, Robert; Birman, Kenneth P.

    1990-01-01

    Distributed application management consists of monitoring and controlling an application as it executes in a distributed environment. It encompasses such activities as configuration, initialization, performance monitoring, resource scheduling, and failure response. The Meta system is described: a collection of tools for constructing distributed application management software. Meta provides the mechanism, while the programmer specifies the policy for application management. The policy is manifested as a control program which is a soft real time reactive program. The underlying application is instrumented with a variety of built-in and user defined sensors and actuators. These define the interface between the control program and the application. The control program also has access to a database describing the structure of the application and the characteristics of its environment. Some of the more difficult problems for application management occur when pre-existing, nondistributed programs are integrated into a distributed application for which they may not have been intended. Meta allows management functions to be retrofitted to such programs with a minimum of effort.

  17. Drop-in Security for Distributed and Portable Computing Elements.

    ERIC Educational Resources Information Center

    Prevelakis, Vassilis; Keromytis, Angelos

    2003-01-01

    Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…

  18. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-print Network

    Sandhu, Ravi

    Develops into a NIST/ANSI Standard (2004) Usage Control (UCON) Model (2004) Attribute-Based Access for Cyber Security (ICS) Founded 2007 Dark Screen Exercises and Training National Collegiate Cyber Defense research Role-Based Access Control (RBAC) Model (1996) Catalyzes dominance of RBAC in commercial systems

  19. Device calibration impacts security of quantum key distribution

    E-print Network

    Jain, Nitin; Lydersen, Lars; Wiechers, Carlos; Elser, Dominique; Marquardt, Christoph; Makarov, Vadim; Leuchs, Gerd

    2011-01-01

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy based on a faked-state attack that breaks the security of the cryptosystem. A fix for this loophole is also suggested.

  20. Device calibration impacts security of quantum key distribution

    E-print Network

    Nitin Jain; Christoffer Wittmann; Lars Lydersen; Carlos Wiechers; Dominique Elser; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2011-09-16

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  1. Semantically Rich Application-Centric Security in Android

    E-print Network

    Machigar Ongtang; Stephen Mclaughlin; William Enck; Patrick Mcdaniel

    2009-01-01

    paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as

  2. Security proof of quantum key distribution with detection efficiency mismatch

    E-print Network

    Chi-Hang Fred Fung; Kiyoshi Tamaki; Bing Qi; Hoi-Kwong Lo; Xiongfeng Ma

    2008-10-15

    In theory, quantum key distribution (QKD) offers unconditional security based on the laws of physics. However, as demonstrated in recent quantum hacking theory and experimental papers, detection efficiency loophole can be fatal to the security of practical QKD systems. Here, we describe the physical origin of detection efficiency mismatch in various domains including spatial, spectral, and time domains and in various experimental set-ups. More importantly, we prove the unconditional security of QKD even with detection efficiency mismatch. We explicitly show how the key generation rate is characterized by the maximal detection efficiency ratio between the two detectors. Furthermore, we prove that by randomly switching the bit assignments of the detectors, the effect of detection efficiency mismatch can be completely eliminated.

  3. Web Application Security Standards and Practices Page 1 of 13 Web Application Security Standard Operating Environment (SOE) V1 1 (2).

    E-print Network

    Grishok, Alla

    Web Application Security Standards and Practices Page 1 of 13 Web Application Security Standard Operating Environment (SOE) V1 1 (2). Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices

  4. Scoring recognizability of faces for security applications

    NASA Astrophysics Data System (ADS)

    Bianco, Simone; Ciocca, Gianluigi; Guarnera, Giuseppe Claudio; Scaggiante, Andrea; Schettini, Raimondo

    2014-03-01

    In security applications the human face plays a fundamental role, however we have to assume non-collaborative subjects. A face can be partially visible or occluded due to common-use accessories such as sunglasses, hats, scarves and so on. Also the posture of the head influence the face recognizability. Given a video sequence in input, the proposed system is able to establish if a face is depicted in a frame, and to determine its degree of recognizability in terms of clearly visible facial features. The system implements features filtering scheme combined with a skin-based face detection to improve its the robustness to false positives and cartoon-like faces. Moreover the system takes into account the recognizability trend over a customizable sliding time window to allow a high level analysis of the subject behaviour. The recognizability criteria can be tuned for each specific application. We evaluate our system both in qualitative and quantitative terms, using a data set of manually annotated videos. Experimental results confirm the effectiveness of the proposed system.

  5. Acoustic cueing for surveillance and security applications

    NASA Astrophysics Data System (ADS)

    Ferguson, Brian G.; Lo, Kam W.

    2006-05-01

    Acoustic sensing systems are used to detect, localize, track and classify sources of military interest in real time with negligible false alarm rates. Automated acoustic systems are able to cue response systems and devices such as cameras for source identification. Two defense applications are demonstrated: one involves remote land-based surveillance where an array of unattended passive acoustic ground sensors automatically cues a day/night camera to observe the passage of ground vehicles, the landing of air vehicles on an isolated air strip, and the transit of motor-powered watercraft in estuarine waters. The video imagery is compressed and relayed via satellite to a central monitoring facility for input to the decision and intelligence processes. The other application is for in-harbor force protection and port infrastructure security where a high-frequency high-resolution monostatic active sonar automatically detects, localizes and tracks fast inshore surface watercraft in real time. A cavitating propeller forms a bubble wake that lasts several minutes and is highly reflective of the incident sonar energy. The wake, which traces the trajectory of the watercraft, is clearly delineated on the sonar display. The active sonar reliably estimates the instantaneous position of the moving source at each point along its path of travel. The sonar can be used to pan an imaging device to aid identification of the moving source or to vector autonomous response craft for intercept purposes.

  6. Securing Cluster-Based Ad Hoc Networks with Distributed Authorities

    Microsoft Academic Search

    Lung-Chung Li; Ru-Sheng Liu

    2010-01-01

    In this paper, we address key management in cluster-based mobile ad hoc networks (MANETs). Ensuring secure communication in an ad hoc network is extremely challenging because of the dynamic nature of the network and the lack of centralized management. For this reason, key management is particularly difficult to implement in such networks. We present a fully-distributed ID-based multiple secrets key

  7. Recent applications of thermal imagers for security assessment

    SciTech Connect

    Bisbee, T.L.

    1997-06-01

    This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

  8. Simultaneous scalability and security for data-intensive web applications

    Microsoft Academic Search

    Amit Manjhi; Anastassia Ailamaki; Bruce M. Maggs; Todd C. Mowry; Christopher Olston; Anthony Tomasic

    2006-01-01

    For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches application data and supplies query answers on behalf of the application. Cost-effective DSSPs will need to cache data from many applications, inevitably raising concerns about security. However, if all data passing through a DSSP is

  9. Web application security assessment by fault injection and behavior monitoring

    Microsoft Academic Search

    Yao-Wen Huang; Shih-Kun Huang; Tsung-Po Lin; Chung-Hung Tsai

    2003-01-01

    As a large and complex application platform, the World Wide Web is capable of delivering a broad range of sophisticated applications. However, many Web applications go through rapid development phases with extremely short turnaround time, making it difficult to eliminate vulnerabilities. Here we analyze the design of Web application security assessment mechanisms in order to identify poor coding practices that

  10. Simple fiber optic sensor for applications in security systems

    NASA Astrophysics Data System (ADS)

    Zyczkowski, M.; Karol, M.; Markowski, P.; Napierala, M. S.

    2014-10-01

    In this paper we demonstrate measurement results of the modalmetric fiber optic sensor used for the monitoring of the fiber optic link integrity to protect it against unauthorized access to classified information. The presented construction is based on the detection of changes of the modes distribution in a multimode fiber. Any mechanical stress on the multimode fiber causes changes of polarization and distribution of propagating modes, hence it changes the distribution of modes at the end of the multimode fiber. Observation of these changes using a narrow core single-mode fiber allows to use the structure as an optical fiber sensor. We used several kilometers long optical links to conduct field tests of laboratory sensor. On this basis the prototype module of modalmetric fiber optic sensor wasbuilt. The modification of optoelectronic part, the variation of sensor length and the change of the method of light reflection at the end of the fiber enable the use of the modalmetric fiber optic sensor in many applications. The sensor finds wide range of applications in security systems. It can be applied to protect the museum's collection, transmission lines and to protect objects of critical infrastructure.

  11. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  12. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  13. Architectures for Inlining Security Monitors in Web Applications

    E-print Network

    Sabelfeld, Andrei

    policies to be enforced in web applications. This paper focuses on securing JavaScript code by inlining architectures for inlining security monitors for JavaScript: via browser extension, via web proxy, via suffix the modern browsing experience on the web. JavaScript enables dynamic and interactive web pages. Glued

  14. Application of Radial Function Neural Network in Network Security

    Microsoft Academic Search

    Yi Niu; Yi Chun Peng

    2008-01-01

    With the widespread application of large and complicated network, network safety has become an important issue. In this paper, a security operation center (SOC) concept based on multi-sensor data fusion technology is presented from the viewpoint of the network security. A structure of a SOC system based on radial basis function neural (RBFN) network is proposed, and the detailed method

  15. Information Flow for Secure Distributed Applications

    E-print Network

    Cheng, Winnie Wing-Yee

    2009-08-27

    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  16. SECURE DOCUMENT ACCESS ARCHITECTURE BASED ON DISTRIBUTED FIREWALL AND

    E-print Network

    Yang, Kai-Hsiang

    the Secure Socket Layer (SSL) and Virtual Private Network (VPN) technique to secure the connection, network security. SSL VPN 1. (Virtual Private Network VPN) (Secure Socket Layer SSL) PPTPIPSec VPN TCP/IP (Denial of Service DoS) (Man

  17. Composable security proof for continuous-variable quantum key distribution with coherent states

    E-print Network

    Anthony Leverrier

    2015-02-03

    We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the Postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption, will find applications elsewhere, for instance for the reliable quantification of continuous-variable entanglement in finite-size settings.

  18. Composable Security Proof for Continuous-Variable Quantum Key Distribution with Coherent States

    NASA Astrophysics Data System (ADS)

    Leverrier, Anthony

    2015-02-01

    We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.

  19. Composable security proof for continuous-variable quantum key distribution with coherent States.

    PubMed

    Leverrier, Anthony

    2015-02-20

    We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings. PMID:25763943

  20. From client-side encryption to secure web applications

    E-print Network

    Stark, Emily (Emily Margarete)

    2013-01-01

    This thesis presents an approach for designing secure web applications that use client-side encryption to keep user data private in the face of arbitrary web server compromises, as well as a set of tools, called CryptFrame, ...

  1. AppsPlayground: Automatic Security Analysis of Smartphone Applications

    E-print Network

    Chen, Yan

    AppsPlayground: Automatic Security Analysis of Smartphone Applications Vaibhav Rastogi, Yan Chen information without informing userwithout informing user · Malware Number increasing consistently­ Number;Kernellevel MonitoringKernel level Monitoring · Useful for malware detectionUseful for malware detection

  2. Grammar and Model Extraction for Security Applications using

    E-print Network

    Caballero, Juan

    Grammar and Model Extraction for Security Applications using Dynamic Program Binary Analysis of California, Berkeley Prof. David Andersen . . . . . . . . . . . . Carnegie Mellon University Prof. Vern-time behavior of the program, without the approximations that static analysis requires. In particular, we

  3. SPA - a secure Amulet core for smartcard applications

    Microsoft Academic Search

    Luis A. Plana; P. A. Riocreux; W. J. Bainbridge; Andrew Bardsley; Steve Temple; Jim D. Garside; Z. C. Yu

    2003-01-01

    SPA is a synthesised, self-timed, ARM-compatible processor core designed for use in security-sensitive applications. It was incorporated in an experimental smartcard chip which is being used to evaluate the applicability of self-timed logic in secure devices. The system-on-chip was synthesised using the Balsa synthesis system with only a small amount of hand design employed to boost the throughput of the

  4. Lilith: A scalable secure tool for massively parallel distributed computing

    SciTech Connect

    Armstrong, R.C.; Camp, L.J.; Evensky, D.A.; Gentile, A.C.

    1997-06-01

    Changes in high performance computing have necessitated the ability to utilize and interrogate potentially many thousands of processors. The ASCI (Advanced Strategic Computing Initiative) program conducted by the United States Department of Energy, for example, envisions thousands of distinct operating systems connected by low-latency gigabit-per-second networks. In addition multiple systems of this kind will be linked via high-capacity networks with latencies as low as the speed of light will allow. Code which spans systems of this sort must be scalable; yet constructing such code whether for applications, debugging, or maintenance is an unsolved problem. Lilith is a research software platform that attempts to answer these questions with an end toward meeting these needs. Presently, Lilith exists as a test-bed, written in Java, for various spanning algorithms and security schemes. The test-bed software has, and enforces, hooks allowing implementation and testing of various security schemes.

  5. 17 CFR 242.609 - Registration of securities information processors: form of application and amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

  6. 17 CFR 242.609 - Registration of securities information processors: form of application and amendments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

  7. 17 CFR 242.609 - Registration of securities information processors: form of application and amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

  8. 17 CFR 242.609 - Registration of securities information processors: form of application and amendments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

  9. 17 CFR 242.609 - Registration of securities information processors: form of application and amendments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

  10. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...Applications and other forms used in Social Security Administration programs. 422...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION...Applications and other forms used in Social Security Administration programs....

  11. 20 CFR 404.611 - How do I file an application for Social Security benefits?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...How do I file an application for Social Security benefits? 404.611 Section...611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...How do I file an application for Social Security benefits? (a) General...

  12. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...Applications and other forms used in Social Security Administration programs. 422...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION...Applications and other forms used in Social Security Administration programs....

  13. 20 CFR 404.611 - How do I file an application for Social Security benefits?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...How do I file an application for Social Security benefits? 404.611 Section...611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...How do I file an application for Social Security benefits? (a) General...

  14. 20 CFR 404.611 - How do I file an application for Social Security benefits?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...How do I file an application for Social Security benefits? 404.611 Section...611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...How do I file an application for Social Security benefits? (a) General...

  15. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...Applications and other forms used in Social Security Administration programs. 422...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION...Applications and other forms used in Social Security Administration programs....

  16. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...Applications and other forms used in Social Security Administration programs. 422...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION...Applications and other forms used in Social Security Administration programs....

  17. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...703.203 Application for security deposit determination; information...unsecured obligations and the security deposit required. The application...seeking an exemption from the security deposit requirements based...the Branch and posted on the Internet at...

  18. Neutron Detection Alternatives to 3He for National Security Applications

    SciTech Connect

    Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

    2010-11-21

    One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to the search for an alternative technology to replace the use of 3He-based neutron detectors. In this paper, we review the testing of currently commercially available alternative technologies for neutron detection in large systems used in various national security applications.

  19. Distributional Effects in a General Equilibrium Analysis of Social Security Laurence J. Kotlikoff

    E-print Network

    Spence, Harlan Ernest

    Distributional Effects in a General Equilibrium Analysis of Social Security by Laurence J This paper reviews our recent general equilibrium analyses of the distributional effects of social security realistic pattern of births and length of life. We reach six conclusions. First, SocialSecurity

  20. Energy-efficiency and Security Issues in the Cisco Nexus Virtual Distributed Benjamin Peterson

    E-print Network

    Politècnica de Catalunya, Universitat

    Energy-efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching Benjamin with the Cisco Nexus virtual switching environment. However, possible security issues of this environment have of the security implications of the Cisco Nexus virtual distributed switching environment. Keywords

  1. Unconditional security of continuous-variable quantum key distribution

    E-print Network

    Anthony Leverrier; Evgueni Karpov; Philippe Grangier; Nicolas J. Cerf

    2010-12-14

    The unconditional security of continuous-variable quantum key distribution is established for all schemes based on the estimation of the channel loss and excess noise. It is proved that, in the limit of large keys, Gaussian attacks are asymptotically optimal among the most general (coherent) attacks, where the transmission is tapped using arbitrary ancillas and stored in a quantum memory as a whole. Then, it is shown that the previously derived bounds on the achievable secret key rates against collective attacks remain asymptotically valid for arbitrary coherent attacks.

  2. Unconditional security of continuous-variable quantum key distribution

    E-print Network

    Leverrier, Anthony; Grangier, Philippe; Cerf, Nicolas J

    2008-01-01

    The unconditional security of continuous-variable quantum key distribution is established for all schemes based on the estimation of the channel loss and excess noise. It is proved that, in the limit of large keys, Gaussian attacks are asymptotically optimal among the most general (coherent) attacks, where the transmission is tapped using arbitrary ancillas and stored in a quantum memory as a whole. Then, it is shown that the previously derived bounds on the achievable secret key rates against collective attacks remain asymptotically valid for arbitrary coherent attacks.

  3. A Cooperative Model for IS Security Risk Management in Distributed Environment

    PubMed Central

    Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626

  4. A cooperative model for IS security risk management in distributed environment.

    PubMed

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626

  5. Efficient quantum key distribution secure against no-signalling eavesdroppers

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Massar, Serge; Pironio, Stefano

    2006-08-01

    By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a hypothetical 'post-quantum' eavesdroppers limited by the no-signalling principle only. We introduce a family of quantum key distribution protocols of this type, which are more efficient than previous ones, both in terms of key rate and noise resistance. Interestingly, the best protocols involve large number of measurements. We show that in the absence of noise, these protocols can yield one secret bit per entanglement bit, implying that the key rates in the no-signalling post-quantum scenario are comparable to the key rates in usual quantum key distribution.

  6. Equivalence between two-qubit entanglement and secure key distribution.

    PubMed

    Acín, Antonio; Masanes, Lluis; Gisin, Nicolas

    2003-10-17

    We study the problem of secret key distillation from bipartite states in the scenario where Alice and Bob can perform measurements only at the single-copy level and classically process the obtained outcomes. Even with these limitations, secret bits can be asymptotically distilled by the honest parties from any two-qubit entangled state, under any individual attack. Our results point out a complete equivalence between two-qubit entanglement and secure key distribution: a key can be established through a one-qubit channel if and only if it allows one to distribute entanglement. These results can be generalized to a higher dimension for all those states that are one-copy distillable. PMID:14611441

  7. A Construction Kit for Modeling the Security of M-commerce Applications

    Microsoft Academic Search

    Dominik Haneberg; Wolfgang Reif; Kurt Stenzel

    2004-01-01

    In this article we present a method to avoid security prob- lems in modern m-commerce applications. The security problems that we are addressing are breaches of security due to erroneous cryptographic protocols. We describe a specication technique that gives way to a for- mal, and thereby rigorous, treatment of the security protocols used in such applications. Security of communication is

  8. Consistency and Security in Mobile Real Time Distributed Database (MRTDDB): A Combinational Giant Challenge

    NASA Astrophysics Data System (ADS)

    Gupta, Gyanendra Kr.; Sharma, A. K.; Swaroop, Vishnu

    2010-11-01

    Many type of Information System are widely used in various fields. With the hasty development of computer network, Information System users care more about data sharing in networks. In traditional relational database, data consistency was controlled by consistency control mechanism when a data object is locked in a sharing mode, other transactions can only read it, but can not update it. If the traditional consistency control method has been used yet, the system's concurrency will be inadequately influenced. So there are many new necessities for the consistency control and security in MRTDDB. The problem not limited only to type of data (e.g. mobile or real-time databases). There are many aspects of data consistency problems in MRTDDB, such as inconsistency between attribute and type of data; the inconsistency of topological relations after objects has been modified. In this paper, many cases of consistency are discussed. As the mobile computing becomes well liked and the database grows with information sharing security is a big issue for researchers. Consistency and Security of data is a big challenge for researchers because when ever the data is not consistent and secure no maneuver on the data (e.g. transaction) is productive. It becomes more and more crucial when the transactions are used in non-traditional environment like Mobile, Distributed, Real Time and Multimedia databases. In this paper we raise the different aspects and analyze the available solution for consistency and security of databases. Traditional Database Security has focused primarily on creating user accounts and managing user privileges to database objects. But in the mobility and nomadic computing uses these database creating a new opportunities for research. The wide spread use of databases over the web, heterogeneous client-server architectures, application servers, and networks creates a critical need to amplify this focus. In this paper we also discuss an overview of the new and old database security challenges.

  9. A resilient and secure software platform and architecture for distributed spacecraft

    NASA Astrophysics Data System (ADS)

    Otte, William R.; Dubey, Abhishek; Karsai, Gabor

    2014-06-01

    A distributed spacecraft is a cluster of independent satellite modules flying in formation that communicate via ad-hoc wireless networks. This system in space is a cloud platform that facilitates sharing sensors and other computing and communication resources across multiple applications, potentially developed and maintained by different organizations. Effectively, such architecture can realize the functions of monolithic satellites at a reduced cost and with improved adaptivity and robustness. Openness of these architectures pose special challenges because the distributed software platform has to support applications from different security domains and organizations, and where information flows have to be carefully managed and compartmentalized. If the platform is used as a robust shared resource its management, configuration, and resilience becomes a challenge in itself. We have designed and prototyped a distributed software platform for such architectures. The core element of the platform is a new operating system whose services were designed to restrict access to the network and the file system, and to enforce resource management constraints for all non-privileged processes Mixed-criticality applications operating at different security labels are deployed and controlled by a privileged management process that is also pre-configuring all information flows. This paper describes the design and objective of this layer.

  10. AppsPlayground: Automatic Security Analysis of Smartphone Applications

    E-print Network

    Chen, Yan

    , malware, privacy leakage 1. INTRODUCTION Mobile devices such as smartphones have gained great popularityAppsPlayground: Automatic Security Analysis of Smartphone Applications Vaibhav Rastogi, Yan Chen@northwestern.edu, enck@cs.ncsu.edu ABSTRACT Today's smartphone application markets host an ever in- creasing number

  11. Securing web application code by static analysis and runtime protection

    Microsoft Academic Search

    Yao-Wen Huang; Fang Yu; Christian Hang; Chung-Hung Tsai; Der-Tsai Lee; Sy-Yen Kuo

    2004-01-01

    Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabilities have been attributed to Web application bugs. Many verification tools are discovering previously unknown vulnerabilities in legacy C programs, raising hopes that the same success can be achieved with Web applications. In this paper,

  12. Security and privacy in RFID and applications in telemedicine

    Microsoft Academic Search

    Yang Xiao; Xuemin Shen; BO Sun; Lin Cai

    2006-01-01

    Radio frequency identification systems have many applications in manufacturing, supply chain management, inventory control, and telemedicine. In an RFID system, products and objects are given RFID tags to identify themselves. However, security and privacy issues pose significant challenges on these systems. In this article we first briefly introduce RFID systems. Then two RFID applications in telemedicine are proposed: studying supply

  13. Collaborative Knowledge Discovery & Marshalling for Intelligence & Security Applications

    SciTech Connect

    Cowell, Andrew J.; Jensen, Russell S.; Gregory, Michelle L.; Ellis, Peter C.; Fligg, Alan K.; McGrath, Liam R.; O'Hara, Kelly A.; Bell, Eric B.

    2010-05-24

    This paper discusses the Knowledge Encapsulation Framework, a flexible, extensible evidence-marshalling environment built upon a natural language processing pipeline and exposed to users via an open-source semantic wiki. We focus our discussion on applications of the framework to intelligence and security applications, specifically, an instantiation of the KEF environment for researching illicit trafficking in nuclear materials.

  14. 17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

  15. 17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

  16. 17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

  17. 17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

  18. 17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

  19. Optimal service distribution in WSN service system subject to data security constraints.

    PubMed

    Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

    2014-01-01

    Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

  20. Optimal Service Distribution in WSN Service System Subject to Data Security Constraints

    PubMed Central

    Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

    2014-01-01

    Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

  1. NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission

    E-print Network

    Miami, University of

    NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission Presentation Title: National security and climate change Presenters: Larry J. Paxton, Principal

  2. On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure

    Microsoft Academic Search

    Ventzislav Nikov; Svetla Nikova; Bart Preneel; Joos Vandewalle

    2002-01-01

    A Key Distribution Center of a network is a server enabling private communications within groups of users. A Distributed Key Distri- bution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we build a robust Distributed Key Distribution Center Scheme secure against active and mobile adversary. We consider a general access structure for

  3. ADDE: Application Development for the Distributed Enterprise.

    ERIC Educational Resources Information Center

    Franckson, Marcel; Hall, John; Helmerich, Alfred; Canadas, Rafael; Dehn, Martin

    1998-01-01

    Describes the Application Development for the Distributed Enterprise (ADDE) project, a methodological set that supports the design of distributed business processes and information and communication technologies. Discusses principles behind ADDE, guidance on definition and planning of application development, guidance on distributed application

  4. Addressing security issues related to virtual institute distributed activities

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the security challenges that face the virtual institute and the characteristics of the standards that must be employed. Section Four contains our proposal for documentation of the cybersecurity standards. Section Five contains the conclusion and suggestions for further work.

  5. Quantum cryptography in real-life applications: Assumptions and security

    NASA Astrophysics Data System (ADS)

    Zhao, Yi

    Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure communication. The security is in principle based on the fundamental laws of physics. Security proofs show that if quantum cryptography is appropriately implemented, even the most powerful eavesdropper cannot decrypt the message from a cipher. The implementations of quantum crypto-systems in real life may not fully comply with the assumptions made in the security proofs. Such discrepancy between the experiment and the theory can be fatal to the security of a QKD system. In this thesis we address a number of these discrepancies. A perfect single-photon source is often assumed in many security proofs. However, a weak coherent source is widely used in a real-life QKD implementation. Decoy state protocols have been proposed as a novel approach to dramatically improve the performance of a weak coherent source based QKD implementation without jeopardizing its security. Here, we present the first experimental demonstrations of decoy state protocols. Our experimental scheme was later adopted by most decoy state QKD implementations. In the security proof of decoy state protocols as well as many other QKD protocols, it is widely assumed that a sender generates a phase-randomized coherent state. This assumption has been enforced in few implementations. We close this gap in two steps: First, we implement and verify the phase randomization experimentally; second, we prove the security of a QKD implementation without the coherent state assumption. In many security proofs of QKD, it is assumed that all the detectors on the receiver's side have identical detection efficiencies. We show experimentally that this assumption may be violated in a commercial QKD implementation due to an eavesdropper's malicious manipulation. Moreover, we show that the eavesdropper can learn part of the final key shared by the legitimate users as a consequence of this violation of the assumptions.

  6. Software and CyberSecurity: Attack Resistant Secure Software Development Survivable Distributed Communication Services (DCS)

    Microsoft Academic Search

    N. J. Fuller; G. Simco

    2008-01-01

    Messaging is a critical prerequisite for the scalability, dependability, and reliability of distributed services. A scalable messaging platform accommodates multiple diverse clients and adapts seamlessly within a heterogeneous environment. A reliable and dependable messaging scheme also offers a specific level of guarantee for the delivery of messages to legitimate services. Application services rely on message transport intermediaries to preserve loosely

  7. Enabling Distributed Addition of Secure Access to Patient's Records in A Tele-Referring Group

    E-print Network

    Poovendran, Radha

    Enabling Distributed Addition of Secure Access to Patient's Records in A Tele-Referring Group-medicine. In this paper, we introduce an emerging problem of secure access to EHR added by the patient directly Mingyan Li and Radha Poovendran Network Security Lab Department of Electrical Engineering, University

  8. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

    E-print Network

    Carl A. Miller; Yaoyun Shi

    2015-04-10

    Randomness is a vital resource for modern day information processing, especially for cryptography. A wide range of applications critically rely on abundant, high quality random numbers generated securely. Here we show how to expand a random seed at an exponential rate without trusting the underlying quantum devices. Our approach is secure against the most general adversaries, and has the following new features: cryptographic quality output security, tolerating a constant level of implementation imprecision, requiring only a constant size quantum memory for the honest implementation, and allowing a large natural class of constructions. In conjunct with a recent work by Chung, Shi and Wu (QIP 2014), it also leads to robust unbounded expansion using just 2 multi-part devices. When adapted for distributing cryptographic keys, our method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance. The proof proceeds by showing that the Renyi divergence of the outputs of the protocol (for a specific bounding operator) decreases linearly as the protocol iterates. At the heart of the proof are a new uncertainty principle on quantum measurements, and a method for simulating trusted measurements with untrusted devices.

  9. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

    E-print Network

    Carl A. Miller; Yaoyun Shi

    2014-02-25

    Randomness is a vital resource for modern day information processing, especially for cryptography. A wide range of applications critically rely on abundant, high quality random numbers generated securely. Here we show how to expand a random seed at an exponential rate without trusting the underlying quantum devices. Our approach is secure against the most general adversaries, and has the following new features: cryptographic quality output security, tolerating a constant level of implementation imprecision, requiring only a constant size quantum memory for the honest implementation, and allowing a large natural class of constructions. In conjunct with a recent work by Chung, Shi and Wu (QIP 2014), it also leads to robust unbounded expansion using just 2 multi-part devices. When adapted for distributing cryptographic keys, our method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance. The proof proceeds by showing that the Renyi divergence of the outputs of the protocol (for a specific bounding operator) decreases linearly as the protocol iterates. At the heart of the proof are a new uncertainty principle on quantum measurements, and a method for simulating trusted measurements with untrusted devices.

  10. 78 FR 72132 - RBS Securities Inc. and Citizens Investment Advisors; Notice of Application and Temporary Order

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ...Applicants' Representations 1. RBS Securities, a Delaware corporation, is registered as a broker-dealer under the Securities Exchange...RBS Securities Inc., Case Number 1:13-cv-01643-WWE (D. Conn. Nov. 25,...

  11. A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State

    NASA Technical Reports Server (NTRS)

    Guo, Guang-Can; Zhang, Xiao-Yu

    1996-01-01

    The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.

  12. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  13. Part III: AFS - A Secure Distributed File System

    SciTech Connect

    Wachsmann, A.; /SLAC

    2005-06-29

    AFS is a secure distributed global file system providing location independence, scalability and transparent migration capabilities for data. AFS works across a multitude of Unix and non-Unix operating systems and is used at many large sites in production for many years. AFS still provides unique features that are not available with other distributed file systems even though AFS is almost 20 years old. This age might make it less appealing to some but with IBM making AFS available as open-source in 2000, new interest in use and development was sparked. When talking about AFS, people often mention other file systems as potential alternatives. Coda (http://www.coda.cs.cmu.edu/) with its disconnected mode will always be a research project and never have production quality. Intermezzo (http://www.inter-mezzo.org/) is now in the Linux kernel but not available for any other operating systems. NFSv4 (http://www.nfsv4.org/) which picked up many ideas from AFS and Coda is not mature enough yet to be used in serious production mode. This article presents the rich features of AFS and invites readers to play with it.

  14. Income distribution patterns from a complete social security database

    E-print Network

    Derzsy, N; Santos, M A

    2012-01-01

    We analyze the income distribution of employees for 9 consecutive years (2001-2009) using a complete social security database for an economically important district of Romania. The database contains detailed information on more than half million taxpayers, including their monthly salaries from all employers where they worked. Besides studying the characteristic distribution functions in the high and low/medium income limits, the database allows us a detailed dynamical study by following the time-evolution of the taxpayers income. To our knowledge, this is the first extensive study of this kind (a previous japanese taxpayers survey was limited to two years). In the high income limit we prove once again the validity of Pareto's law, obtaining a perfect scaling on four orders of magnitude in the rank for all the studied years. The obtained Pareto exponents are quite stable with values around $\\alpha \\approx 2.5$, in spite of the fact that during this period the economy developed rapidly and also a financial-econ...

  15. 26 CFR 1.1081-5 - Distribution solely of stock or securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... INCOME TAX (CONTINUED) INCOME TAXES Exchanges in Obedience to S.e.c. Orders § 1.1081-5 Distribution solely...such shareholder is made by the distributing corporation in obedience to an order of the Securities and Exchange...

  16. Terahertz receivers development for astronomy and security applications

    Microsoft Academic Search

    H. Richter; S. Pavlov; A. Semenov; H.-W. Hubers; K. Ill'in; M. Siegel; R. Kohler; L. Mahler; A. Tredicucci; H. E. Beere; D. A. Ritchie

    2007-01-01

    Various applications in astronomy and security need highly sensitive heterodyne receiver with a quantum cascade laser or a gas laser as local oscillator and a quasioptically coupled hot-electron bolometer mixer. Here we report on the development and characterization of the receiver components for frequencies up to 2.5 THz.

  17. AT&T Consulting Application Security Code-Level Review

    E-print Network

    Fisher, Kathleen

    applications can be described as the engine that runs all of your IT business processes. It is also (PCI-DSS). For organizations relying on outsourced developers, successful completion of a security tests to isolate specific weaknesses. Our processes can uncover whether a combination of vulnerabilities

  18. Elaine Gelman Nurse Practitioner Scholarship Application Name Social Security # Date

    E-print Network

    Portman, Douglas

    Elaine Gelman Nurse Practitioner Scholarship Application Name Social Security # Date: Address Home Practitioner Scholarship was established in 2002 and will recognize a nurse practitioner student who presidency of the New York State Coalition of Nurse Practitioners. New York State's NP's would not have

  19. Mobile RFID Applications and Security Konidala M. Divyan, Kwangjo Kim

    E-print Network

    Kim, Kwangjo

    Mobile RFID Applications and Security Challenges Konidala M. Divyan, Kwangjo Kim InformationDong, Daejeon 305732, Republic of Korea {divyan, kkj}@icu.ac.kr Abstract. With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers

  20. Design of Secure and Application-Oriented VANETs

    Microsoft Academic Search

    Yi Qian; Nader Moayeri

    2008-01-01

    Vehicular ad hoc networks (VANETs) are important components of Intelligent Transportation Systems. The main benefit of VANET communication is seen in active safety systems that increase passenger safety by exchanging warning messages between vehicles. Other applications and private services are also permitted in order to lower the cost and to encourage VANET deployment and adoption. Security is one of the

  1. Finding Security Vulnerabilities in Java Applications with Static Analysis

    E-print Network

    Livshits, Ben

    and Monica S. Lam Computer Science Department Stanford University {livshits, lam}@cs.stanford.edu Abstract in the statically analyzed code. Results of our static analysis are presented to the user for assessment from hacker attacks. However, the current state of application security leaves much to be desired

  2. Flexible and Secure Secret Updating for Unidirectional Key Distribution in Rfid-Enabled Supply Chains

    Microsoft Academic Search

    Shaoying Cai; Tieyan Li; Changshe Ma; Yingjiu LI; Robert Huijie DENG

    2009-01-01

    In USENIX Security 08, Juels, Pappu and Parno proposed a secret sharing based mechanism to alleviate the key distribution problem in RFID-enabled supply chains. Compared to existing pseudonym based RFID protocols, the secret sharing based solution is more suitable for RFID-enabled supply chains since it does not require a database of keys be distributed among supply chain parties for secure

  3. Web Application Security—Past, Present, and Future

    Microsoft Academic Search

    Yao-Wen Huang; D. T. Lee

    Web application security remains a major roadblock to universal acceptance of the Web for many kinds of online transactions,\\u000a especially since the recent sharp increase in remotely exploitable vulnerabilities has been attributed to Web application\\u000a bugs. In software engineering, software testing is an established and well-researched process for improving software quality.\\u000a Recently, formal verification tools have also shown success in

  4. Research and Application of Data Security for Mobile Devices

    Microsoft Academic Search

    Xiandi Zhang; Feng Yang; Zhongqiang Liu; Zhenzhi Wang; Kaiyi Wang

    2010-01-01

    \\u000a Mobile devices have been increasingly become important tools for the information system application in agriculture, but the\\u000a safe problem that follow also results in risks of economy lose. Considering above problems and combining the application of\\u000a an agriculture chain logistics management system, a series of jobs have been done. This paper presents a data security solution\\u000a which encrypts the configuration

  5. X-ray imaging for security applications

    NASA Astrophysics Data System (ADS)

    Evans, J. Paul

    2004-01-01

    The X-ray screening of luggage by aviation security personnel may be badly hindered by the lack of visual cues to depth in an image that has been produced by transmitted radiation. Two-dimensional "shadowgraphs" with "organic" and "metallic" objects encoded using two different colors (usually orange and blue) are still in common use. In the context of luggage screening there are no reliable cues to depth present in individual shadowgraph X-ray images. Therefore, the screener is required to convert the 'zero depth resolution' shadowgraph into a three-dimensional mental picture to be able to interpret the relative spatial relationship of the objects under inspection. Consequently, additional cognitive processing is required e.g. integration, inference and memory. However, these processes can lead to serious misinterpretations of the actual physical structure being examined. This paper describes the development of a stereoscopic imaging technique enabling the screener to utilise binocular stereopsis and kinetic depth to enhance their interpretation of the actual nature of the objects under examination. Further work has led to the development of a technique to combine parallax data (to calculate the thickness of a target material) with the results of a basis material subtraction technique to approximate the target's effective atomic number and density. This has been achieved in preliminary experiments with a novel spatially interleaved dual-energy sensor which reduces the number of scintillation elements required by 50% in comparison to conventional sensor configurations.

  6. Distributed Security Constrained Optimal Power Flow Integrated to a DSM Based Energy Management System for Real Time Power Systems Security Control

    Microsoft Academic Search

    Juliana M. T. Alves; Carmen L. T. Borges; Ayru L. Oliveira Filho

    2006-01-01

    This paper presents the development of the distributed processing based Security Constrained Optimal Power Flow (SCOPF) and its integration to a Distributed Shared Memory Energy Management System (EMS) in order to enable real time power systems security control. The optimization problem is solved by the Interior Points Method and the security constraints are considered by the use of Benders Decomposition

  7. Nanomaterials and their application to defense and homeland security

    NASA Astrophysics Data System (ADS)

    Reynolds, John G.; Hart, Bradley R.

    2004-01-01

    A critical issue to homeland security and defense is the development of broad range collectors and detectors of weapons of mass destruction. Nanoscience and nanotechnology are increasingly important in the area of such separation and detection. This article presents an overview of the research at the Forensic Science Center at Lawrence Livermore National Laboratory to develop nanostructured materials for applications to forensics and homeland security. Among the many types of nanomaterials reviewed are silica-based materials, molecular imprinted polymers, and silicon platforms. The main aim of the article is to optimize these new classes of materials for the collection concentration and detection of chemical weapons or other related compounds.

  8. Noble Gas Excimer Detectors for Security and Safeguards Applications

    NASA Astrophysics Data System (ADS)

    Hynes, Michael V.; Chandra, Rico; Davatz, Giovanna; Lanza, Richard

    2011-12-01

    Noble gas excimer detectors are a technology that is common in particle physics research and less common in applications for security and international safeguards. These detectors offer the capability to detect gammas with an energy resolution similar to NaI and to detect neutrons with good energy resolution as well. Depending on the noble gas selected and whether or not it is in a gaseous or liquid state, the sensitivity to gammas and neutrons can be tuned according to the needs of the application. All of this flexibility can be available at a significant cost saving over alternative technologies. This paper will review this detector technology and its applicability to security and safeguards.

  9. Distributed Control Applications Within Sensor Networks

    E-print Network

    California at Berkeley, University of

    applications. Self-config- urable, ubiquitous, easy to deploy, secure, undetectable SNs are an ideal technology. INTRODUCTION Sensor networks (SNs) are gaining a role of importance in the research community. Embedded among each other. The advantage of wireless SNs is enormous--de- ploying and maintaining a network

  10. Modeling of Evolution to Secure Application System: from Requirements Model to Software Architecture

    Microsoft Academic Search

    Michael Shin

    2006-01-01

    This paper describes an approach to modeling the evolution of an application system to a secure application system in terms of the software requirements model and software architecture model. The requirements for security services are captured separately from application requirements, and the security services are encapsulated in connectors in the software architecture, separately from the components providing functional services. In

  11. Proof of security of quantum key distribution with two-way classical communications

    Microsoft Academic Search

    Daniel Gottesman; Hoi-kwong Lo

    2003-01-01

    Shor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BB84) by demonstrating a connection between key distribution and entanglement purification protocols with one-way communications. Here we provide proofs of security of standard quantum key distribution schemes, BB84 and the six-state scheme, against the most general attack, by using

  12. Portable Resource Control in Java: Application to Mobile Agent Security

    Microsoft Academic Search

    Walter Binder; Jarle Hulaas; Alex Villazón

    2001-01-01

    Prevention of denial-of-service attacks is indispensable for distributed agent sys- tems to execute securely. To implement the required defense mechanisms, it is necessary to have support for resource control, i.e., accounting and limiting the consumption of resources like CPU, memory, and threads. Java is the predominant implementation language for mobile agent systems, even though resource control is a missing feature

  13. Practical Pocket PC Application w/Biometric Security

    NASA Technical Reports Server (NTRS)

    Logan, Julian

    2004-01-01

    I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.

  14. Forward-Secure Content Distribution to Reconfigurable Hardware

    Microsoft Academic Search

    David Champagne; Reouven Elbaz; Catherine H. Gebotys; Lionel Torres; Ruby B. Lee

    2008-01-01

    Confidentiality and integrity of bitstreams and authenticated update of FPGA configurations are fundamental to trusted computing on reconfigurable technology. In this paper, we propose to provide these security services for digital content broadcast to FPGA-based devices. To that end, we introduce a new property we call forward security, which ensures that broadcast content can only be accessed by FPGA chips

  15. An Impact Assessment Model for Distributed Adaptive Security Situation Assessment*

    E-print Network

    California at Davis, University of

    Teknowledge Corporation Abstract: The goal of any intrusion detection, anti-virus, firewall or other security of a system to complete its mission. A human or robot analyst can use the model to assess the security status of a monitored system and to allocate resources in an optimal way. 1. Introduction* Intrusion detection and other

  16. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    SciTech Connect

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-06-09

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  17. Cinema - An architecture for distributed multimedia applications

    Microsoft Academic Search

    Kurt Rothermel; Ingo Barth; Tobias Helbig

    1993-01-01

    Distributed multimedia applications combine the advantage of distributed computing with the capability of processing discrete and continuous media in an integrated fashion. The development of multimedia applications in distri- buted environments requires specific abstractions and services, which are usually not provided by generic operating systems. These services are typi- cally realized by software components, often referred to as middleware. The

  18. Model-Driven Design of Distributed Applications

    Microsoft Academic Search

    João Paulo A. Almeida

    2004-01-01

    The objective of the Ph.D. work discussed in this paper is to define a methodology for the design of distributed applications, in line with the Model- Driven Architecture (MDA). An important characteristic of this methodology is that it leads to models of distributed applications that withstand the impact of change in (middleware) platform technologies. These models are organized into different

  19. A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory

    NASA Astrophysics Data System (ADS)

    Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu

    2014-07-01

    Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.

  20. Numerically Efficient Water Quality Modeling and Security Applications

    E-print Network

    Mann, Angelica

    2013-02-04

    NUMERICALLY EFFICIENT WATER QUALITY MODELING AND SECURITY APPLICATIONS A Dissertation by ANGELICA VANESSA MANN Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree... of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Carl D. Laird Committee Members, Sergiy I. Butenko Juergen Hahn Katy C. Kao Department Head, Muhammad N. Karim May 2013 Major Subject: Chemical Engineering Copyright 2013 Angelica Vanessa Mann...

  1. Secure Middleware for Situation-Aware Naval C2 and Combat Systems In Proc. 9th International Workshop on Future Trends of Distributed Computing Systems FTDCS 2003

    E-print Network

    Secure Middleware for Situation-Aware Naval C2 and Combat Systems In Proc. 9th International and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and sur for constructing situation-aware Command and Con- trol C2 and combat applications. We pay particu- lar attention

  2. Field test of a fully distributed fiber optic intrusion detection system for long-distance security monitoring of national borderline

    NASA Astrophysics Data System (ADS)

    Wu, Huijuan; Wang, Zinan; Peng, Fei; Peng, Zhengpu; Li, Xiaoyu; Wu, Yu; Rao, Yunjiang

    2014-05-01

    In this paper, we presented a successful field test of a fully distributed fiber-optical intrusion detection system for security monitoring of 220km long national borderline in China. Such a fiber fence shows its outstanding ability to operate at extreme weather conditions, like strong wind, heavy snow and storm, wide temperature range from -55° to +50°, et al, which may be the most difficult and complicated environment for practical applications of fiber fences.

  3. Open, flexible and portable secure web-based health applications.

    PubMed

    Vlachos, Michael; Stassinopoulos, George

    2003-01-01

    This paper presents a totally generic client-server model for accessing legacy and new databases according to the three tier architecture principles. It is based on an integrated environment that eases the dynamic creation and instantiation of secure web applications that access multiple database management systems. Emphasis is placed on the ability to query almost any type of relational database and queries can simultaneously address a multitude of data sources. The information is collected, assembled and presented to users depending on a possible set of user profiles. These profiles originate from work on securing the conduct of clinical studies. This has been achieved in the context of the EU funded project HARP (Harmonisation for the Security of Web Technologies and Applications). The generic character of the model is exploited through an accompanying set of development tools. This permits efficient and effective creation and maintenance of applications in several domains of health telematics and beyond. Main merit is the lightweight character of the resulting platform, whereby all necessary instantiations are accomplished through a set of related XML documents. PMID:15061523

  4. Consistent cloud computing storage as the basis for distributed applications

    E-print Network

    Anderson, James William

    2011-01-01

    cloud computing applications share certain com- mon requirements of scalability, performance, availability, reliability, security,security, and e?iciency poses sig- ni?cant challenges. The cloud computing

  5. Agent Approaches to Enforce Role-Based Security in Distributed and Web-Based Computing

    Microsoft Academic Search

    S. A. Demurjian; Y. He; T. C. Ting; M. Saba

    In the a ge of information technology, organizations of all types are seeking to effectively utilize a nd d isseminate information, by designing and d eveloping dependable a nd secure distributed computing environments that allow existing and future systems to inter-operate. While many existing access control approaches (mandatory, discretionary, and role-based) can be leveraged for the support of security in

  6. Supporting secure programming in web applications through interactive static analysis.

    PubMed

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  7. Supporting secure programming in web applications through interactive static analysis

    PubMed Central

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  8. An ethernet/IP security review with intrusion detection applications

    SciTech Connect

    Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  9. On the Truncated Pareto Distribution with applications

    E-print Network

    Lorenzo Zaninetti; Mario Ferraro

    2008-04-02

    The Pareto probability distribution is widely applied in different fields such us finance, physics, hydrology, geology and astronomy. This note deals with an application of the Pareto distribution to astrophysics and more precisely to the statistical analysis of mass of stars and of diameters of asteroids. In particular a comparison between the usual Pareto distribution and its truncated version is presented. Finally a possible physical mechanism that produces Pareto tails for the distribution of the masses of stars is suggested.

  10. Transmission pricing of distributed multilateral energy transactions to ensure system security and guide economic dispatch

    E-print Network

    Ilic, Marija D.

    2002-01-01

    In this paper we provide a simulations-based demonstration of a hybrid electricity market that combines the distributed competitive advantages of decentralized markets with the system security guarantees of centralized ...

  11. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  12. Model Checking An Entire Linux Distribution for Security Violations Benjamin Schwarz Hao Chen David Wagner

    E-print Network

    California at Irvine, University of

    Model Checking An Entire Linux Distribution for Security Violations Benjamin Schwarz Hao Chen David}@fortifysoftware.com Jeremy Lin (jjlin@ocf.berkeley.edu) Wei Tu (tuwei@berkeley.edu) University of California, Berkeley

  13. Security-aware Resource Optimization in Distributed Service Kaiqi Xiong and Harry Perros

    E-print Network

    Perros, Harry

    Security-aware Resource Optimization in Distributed Service Computing Kaiqi Xiong and Harry Perros Department of Computer Science North Carolina State University Raleigh, NC 27965-7534, USA {xiong, hp

  14. 17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

  15. 17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

  16. 17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

  17. 17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

  18. 17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

  19. Some physics and system issues in the security analysis of quantum key distribution protocols

    NASA Astrophysics Data System (ADS)

    Yuen, Horace P.

    2014-10-01

    In this paper, we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks, which are not accounted for in the security analysis and proofs. Hence, the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

  20. Social Security Number (SSN) Application Instructions For International Students, Scholars and Visitors

    E-print Network

    Gordon, Geoffrey J.

    5/2013 Social Security Number (SSN) Application Instructions For International Students, Scholars and Visitors A Social Security Number (SSN) is a unique, 9-digit identification number issued by the US Social International applicants apply in person at the nearest Social Security office NO EARLIER THAN 10 days after

  1. A Construction Kit for Modeling the Security of M-Commerce Applications

    E-print Network

    Reif, Wolfgang

    A Construction Kit for Modeling the Security of M-Commerce Applications Dominik Haneberg, Wolfgang}@informatik.uni-augsburg.de Abstract. In this article we present a method to avoid security prob- lems in modern m-commerce is important in modern m-commerce applications. As parts of the specification of the security protocols, we

  2. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP and with the use of Anonymizers we have covered the identity of true source of data. Modifier tokens are generated along encryption of data which are distributed among virtual parties, then sent to TTP and finally used in the computation. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have also given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved.

  3. Security Applications of Diodes with Unique Current-Voltage Characteristics

    NASA Astrophysics Data System (ADS)

    Rührmair, Ulrich; Jaeger, Christian; Hilgers, Christian; Algasinger, Michael; Csaba, György; Stutzmann, Martin

    Diodes are among the most simple and inexpensive electric components. In this paper, we investigate how random diodes with irregular I(U) curves can be employed for crypto and security purposes. We show that such diodes can be used to build Strong Physical Unclonable Functions (PUFs), Certificates of Authenticity (COAs), and Physically Obfuscated Keys (POKs), making them a broadly usable security tool. We detail how such diodes can be produced by an efficient and inexpensive method known as ALILE process. Furthermore, we present measurement data from real systems and discuss prototypical implementations. This includes the generation of helper data as well as efficient signature generation by elliptic curves and 2D barcode generation for the application of the diodes as COAs.

  4. Intelligent Facial Recognition Systems: Technology advancements for security applications

    SciTech Connect

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  5. Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2007-01-01

    This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.

  6. The Role of Trust Management in Distributed Systems Security

    Microsoft Academic Search

    Matt Blaze; Joan Feigenbaum; Angelos D. Keromytis

    1999-01-01

    . Existing authorization mechanisms fail to provide powerfuland robust tools for handling security at the scale necessary for today'sInternet. These mechanisms are coming under increasing strain from thedevelopment and deployment of systems that increase the programmabilityof the Internet. Moreover, this "increased flexibility through programmability" trend seems to be accelerating with the advent of proposalssuch as Active Networking and Mobile Agents.The

  7. WATER DISTRIBUTION SYSTEM OPERATION: APPLICATION OF

    E-print Network

    Mays, Larry W.

    CHAPTER 5 WATER DISTRIBUTION SYSTEM OPERATION: APPLICATION OF SIMULATED ANNEALING Fred E. Goldman Arizona State University, Tempe, Arizona 5.1 INTRODUCTION The operation of water distribution systems affects the water quality in these systems. EPA regulations require that water quality be maintained

  8. Form SS-5 (08-2011) ef (08-2011) Destroy Prior Editions Application for a Social Security Card

    E-print Network

    Shapiro, Benjamin

    Form SS-5 (08-2011) ef (08-2011) Destroy Prior Editions Application for a Social Security Card Page 1 SOCIAL SECURITY ADMINISTRATION Applying for a Social Security Card is free! USE THIS APPLICATION TO: Apply for an original Social Security card Apply for a replacement Social Security card Change

  9. Checkpointing Distributed Applications on Mobile Computers

    Microsoft Academic Search

    Arup Acharya; B. R. Badrinath

    1994-01-01

    The integration of mobile\\/portable computing devices within existing data networks can be expected to spawn distributed applications that execute on mobile hosts (MHs). For reliability, it is vital that the global state of such applications be checkpointed from time to time. A global checkpoint consists of a set of local checkpoints, one per participant. This paper first identifies the problems

  10. A Software Platform for Distributed Multimedia Applications

    Microsoft Academic Search

    Christian Blum; Refik Molva

    1995-01-01

    The paper discusses the functionality that a platform for distributed multimedia applications should provide. Five platforms - Touring Machine, Beteus, Lakes, Medusa and IMA - are presented and evaluated. The paper then intro- duces a new platform that is geared towards service provi- sion in larger networks. In this platform, application and media processing are logically and per default geographi-

  11. Security of quantum key distribution using a simplified trusted relay

    NASA Astrophysics Data System (ADS)

    Stacey, William; Annabestani, Razieh; Ma, Xiongfeng; Lütkenhaus, Norbert

    2015-01-01

    We propose a QKD protocol for trusted node relays. Our protocol shifts the communication and computational weight of classical postprocessing to the end users by reassigning the roles of error correction and privacy amplification, while leaving the exchange of quantum signals untouched. We perform a security analysis for this protocol based on the Bennett-Brassard 1984 protocol on the level of infinite key formulas, taking into account weak coherent implementations involving decoy analysis.

  12. Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds

    E-print Network

    . The proposed cloud-based re-encryption model is secure, efficient, and highly scalable in a cloud computing the performance of the model. Keywords-Distributed systems, mobile computing, security. I. INTRODUCTION Cloud rated security as the chief concern in the use of cloud computing services [1]; the concern

  13. USE OF DISTRIBUTION SYSTEM WATER QUALITY MODELS IN SUPPORT OF WATER SECURITY

    Microsoft Academic Search

    WALTER GRAYMAN

    Hydraulic and water quality models of water distribution systems are routinely applied for operational and design purposes. In the past few years, these models have been increasingly used in issues related to water security. This paper provides a general overview and history of water quality modeling in distribution systems. It also discusses how these models are being used to address

  14. Security and Privacy Behavior-Based Access Control for Distributed Healthcare Systems

    E-print Network

    Sartipi, Kamran

    information technology with traditional healthcare workflows for sharing patient profiles has made the wholeSecurity and Privacy Behavior-Based Access Control for Distributed Healthcare Systems M. Yarmand, K requirements for using patient profiles in distributed healthcare environments. The amalgamation of new

  15. Security in the CernVM File System and the Frontier Distributed Database Caching System

    NASA Astrophysics Data System (ADS)

    Dykstra, D.; Blomer, J.

    2014-06-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  16. Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters

    PubMed Central

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions. PMID:23936164

  17. Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

    PubMed

    Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions. PMID:23936164

  18. A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications

    NASA Astrophysics Data System (ADS)

    Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald

    Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.

  19. Security applications of a remote electric-field sensor technology

    NASA Astrophysics Data System (ADS)

    Prance, Robert J.; Harland, Christopher J.; Prance, Helen

    2008-10-01

    A new generation of electric field sensors developed at the University of Sussex is enabling an alternative to contact voltage and non-contact magnetic field measurements. We have demonstrated the capability of this technology in a number of areas including ECG through clothing, remote off-body ECG, through wall movement sensing and electric field imaging. Clearly, there are many applications for a generic sensor technology with this capability, including long term vital sign monitoring. The non-invasive nature of the measurement also makes these sensors ideal for man/machine and human/robot interfacing. In addition, there are obvious security and biometric possibilities since we can obtain physiological data remotely, without the knowledge of the subject. This is a clear advantage if such systems are to be used for evaluating the psychological state of a subject. In this paper we report the results obtained with a new version of the sensor which is capable of acquiring electrophysiological signals remotely in an open unshielded laboratory. We believe that this technology opens up a new area of remote biometrics which could have considerable implications for security applications. We have also demonstrated the ability of EPS to function in closely-packed one and two dimensional arrays for real-time imaging.

  20. Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms

    Microsoft Academic Search

    Jordi Guitart; David Carrera; Vicenç Beltran; Jordi Torres; Eduard Ayguadé

    2008-01-01

    Overload control mechanisms such as admission control and connection differentiation have proven effective for pre- venting overload of application servers running secure web applications. However, achieving optimal results in overload prevention is only possible when some kind of resource management is considered in addition to these mechanisms. In this paper we propose an overload control strategy for secure web applications

  1. Semi-device-independent security of one-way quantum key distribution

    SciTech Connect

    Pawlowski, Marcin [Department of Mathematics, University of Bristol, Bristol BS8 1TW (United Kingdom); Institute of Theoretical Physics and Astrophysics, University of Gdansk, PL-80-952 Gdansk (Poland); Brunner, Nicolas [H. H. Wills Physics Laboratory, University of Bristol, Bristol BS8 1TL (United Kingdom)

    2011-07-15

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ''device-independent.'' Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are noncharacterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses, and random-access codes.

  2. T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security

    SciTech Connect

    Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

    2009-07-20

    Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

  3. High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20 th Century

    Microsoft Academic Search

    Seymour E. Goodman; Peter Wolcott; Patrick T. Homer

    1998-01-01

    this report and its predecessor requires the establishment of an"upper bound" for the control threshold that lies at or above the lower bound, but below theperformance requirements of key applications of national security concern, or clusters ofnational security applications. This study has cataloged in detail an extensive number ofnational security applications. The national security community must decide which of thesehave

  4. Security bound of two-basis quantum-key-distribution protocols using qudits

    Microsoft Academic Search

    Georgios M. Nikolopoulos; Gernot Alber

    2005-01-01

    We investigate the security bounds of quantum-cryptographic protocols using d -level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well

  5. A flexible security architecture to support third-party applications on mobile devices

    Microsoft Academic Search

    Lieven Desmet; Wouter Joosen; Fabio Massacci; Katsiaryna Naliuka; Pieter Philippaerts; Frank Piessens; Dries Vanoverberghe

    2007-01-01

    The problem of supporting the secure execution of poten- tially malicious third-party applications has received a con- siderable amount of attention in the past decade. In this paper we describe a security architecture for mobile de- vices that supports the flexible integration of a variety of advanced technologies for such secure execution of applica- tions, including run-time monitoring, static verification

  6. M-Identity and its Authentication Protocol for Secure Mobile Commerce Applications

    E-print Network

    van Schyndel, Ron

    , establishing a secure m-commerce platform that offers high level of service can be challeng- ing. This paper into these networks [4]. Security can be regarded as an enabling factor for the success of m-commerce ap- plications authentication (BDIA) protocol for secure m-commerce applications is proposed. In order to ensure reliable user

  7. Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel

    SciTech Connect

    Lu Hua [State Key Laboratory of Magnetics Resonances and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China); Department of Mathematics and Physics, Hubei University of Technology, Wuhan 430068 (China); Fung, Chi-Hang Fred [Department of Physics and Center of Computational and Theoretical Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Center for Quantum Information and Quantum Control, Department of Physics, University of Toronto, Toronto, M5S 1A7 (Canada); Cai Qingyu [State Key Laboratory of Magnetics Resonances and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)

    2011-10-15

    In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob. After measuring the returned qubit, Bob can obtain Alice's key bit immediately, without basis reconciliation. Since an eavesdropper may attack the qubits traveling on either the Bob-Alice channel or the Alice-Bob channel, the security analysis of DQKD protocol with a two-way quantum channel is complicated and its unconditional security has been controversial. This paper presents a security proof of a single-photon four-state DQKD protocol against general attacks.

  8. Security of Electronic Business Applications - Structure and Quantification

    Microsoft Academic Search

    Konstantin Knorr; Susanne Röhrig

    2000-01-01

    The rapid growth of the commercial use of the Internet goes along with a rising need for security for both customer and merchant. As many parties and different systems are involved, security becomes a complicated issue. There- fore, the need for definition, structuring, and quantification of security arises. This paper proposes a structured approach to analyze security measures and to

  9. Empirical Distributional Semantics: Methods and Biomedical Applications

    PubMed Central

    Cohen, Trevor; Widdows, Dominic

    2009-01-01

    Over the past fifteen years, a range of methods have been developed that are able to learn human-like estimates of the semantic relatedness between terms from the way in which these terms are distributed in a corpus of unannotated natural language text. These methods have also been evaluated in a number of applications in the cognitive science, computational linguistics and the information retrieval literatures. In this paper, we review the available methodologies for derivation of semantic relatedness from free text, as well as their evaluation in a variety of biomedical and other applications. Recent methodological developments, and their applicability to several existing applications are also discussed. PMID:19232399

  10. High-speed secure key distribution over an optical network based on computational correlation imaging.

    PubMed

    Li, Shen; Yao, Xu-Ri; Yu, Wen-Kai; Wu, Ling-An; Zhai, Guang-Jie

    2013-06-15

    We present a protocol for an optical key distribution network based on computational correlation imaging, which can simultaneously realize privacy amplification and multiparty distribution. With current technology, the key distribution rate could reach hundreds of Mbit/s with suitable choice of parameters. The setup is simple and inexpensive, and may be employed in real networks where high-speed long-distance secure communication is required. PMID:23939004

  11. Web-Based Training Applications in Safeguards and Security

    SciTech Connect

    Lopez, R.L.

    1999-05-21

    The U.S. Department of Energy (DOE) requires all employees who hold a security clearance and have access to classified information and/or special nuclear material to be trained in the area of Safeguards and Security. Since the advent of the World Wide Web, personnel who are responsible for training have capitalized on this communication medium to develop and deliver Web-based training. Unlike traditional computer based training where the student was required to find a workstation where the training program resided, one of Web-based training strongest advantage is that the training can be delivered right to the workers desk top computer. This paper will address reasons for the driving forces behind the utilization of Web-based training at the Laboratory with a brief explanation of the different types of training conducted. Also discussed briefly is the different types of distance learning used in conjunction with Web-based training. The implementation strategy will be addressed and how the Laboratory utilized a Web-Based Standards Committee to develop standards for Web-based training applications. Web-based problems resulting from little or no communication between training personnel across the Laboratory will be touched on and how this was solved. Also discussed is the development of a ''Virtual Training Center'' where personnel can shop on-line for their training needs. Web-based training programs within the Safeguards and Security arena will be briefly discussed. Specifically, Web-based training in the area of Materials Control and Accountability will be explored. A Web-based example of what a student would experience during a training session is also discussed. A short closing statement of what the future of Web-based Training holds in the future is offered.

  12. Computer Science Tripos part 1b | Security Lecture 1 | Security Applications

    E-print Network

    Cengarle, María Victoria

    , bolts and bars, so a computer system can be made more secure by adding more and more #12;rewalls mechanisms) to enforce the security policy. The strength of mechanisms that we use should be proportional

  13. SDSI -A Simple Distributed Security Infrastructure Ronald L. Rivest

    E-print Network

    Lampson, Butler W.

    with the "Get" protocol *.*. Reconfirmation Queries *.*. Auto-Certs *.* Delegation Certificates *.*. Transport-like tickets *.*. Distributing signed code *.*. Corporate database access *.*. Access to medical records systems. Issues regarding the liabilities and/or the legal interpretation of certificates

  14. SDSI A Simple Distributed Security Infrastructure Ronald L. Rivest

    E-print Network

    Lampson, Butler W.

    with the ``Get'' protocol *.*. Reconfirmation Queries *.*. Auto­Certs *.* Delegation Certificates *.*. Transport­like tickets *.*. Distributing signed code *.*. Corporate database access *.*. Access to medical records systems. Issues regarding the liabilities and/or the legal interpretation of certificates

  15. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 ...X-15AA-1, for application for registration as a national securities association or affiliated securities association. 249.801 Section 249.801...

  16. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  17. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Microsoft Academic Search

    Mark D. Hadley; Samuel L. Clements

    2009-01-01

    Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness\\/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort

  18. The application research of airport security information management system on the field of civil aviation security

    Microsoft Academic Search

    Wu Wei

    2009-01-01

    The airport security information management system (ASIMS) has been playing very important role in preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database

  19. Wireless sensors and sensor networks for homeland security applications

    PubMed Central

    Potyrailo, Radislav A.; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M.; Kelley-Loughnane, Nancy; Naik, Rajesh R.

    2012-01-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers. PMID:23175590

  20. A secure RFID-based WBAN for healthcare applications.

    PubMed

    Ullah, Sana; Alamri, Atif

    2013-10-01

    A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years. PMID:24061704

  1. Intelligent Data Processing in Distributed Internet Applications

    Microsoft Academic Search

    Beata Zielosko; Alicja Wakulicz-deja

    2005-01-01

    We discuses usage of elements of. Net platform — Web Service and XML to create distributed internet applications as data processing\\u000a system. The main aim is to create retrieval system of hidden relations between data. The application uses elements of rough\\u000a sets theory in order to get data, which could be used for further exploration. Data are sent to particular

  2. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    PubMed Central

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

  3. Addressing security issues related to virtual institute distributed activities

    Microsoft Academic Search

    Martin R. Stytz; Sheila B. Banks

    2008-01-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require

  4. Security of Quantum Key Distribution with Realistic Devices

    Microsoft Academic Search

    Xiongfeng Ma

    2005-01-01

    We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD procedures. A new data post-processing protocol is introduced, mainly including error correction and privacy amplification. This protocol combines the ideas of GLLP and the decoy states, which essentially only requires to turn up and down the source power. We propose a practical way to perform

  5. Configuring distributed multimedia applications using CINEMA

    Microsoft Academic Search

    Ingo Barth

    1996-01-01

    We describe the configuration of distributed multimedia applications using the CINEMA system. Components, interconnected by links via ports are used to handle multimedia data. Configuration management controls these interconnections, establishes components in threads on different systems and allows an interactive control of data handling functions. We present an object-oriented interface, that is able to handle different types of components. To

  6. High Speed Communication For Distributed Applications

    Microsoft Academic Search

    Alfred C. Weaver

    1992-01-01

    The distributed applications of the 1990s, especially those related to factory automation, will require a new set of com- munications services and will demand a iiew standard of p~rf,-11- mance. In this paper we discuss the design of the Xpress Transfer Protocol which is intended to provide these new services. We explain its history and motivation as well as its

  7. Security

    E-print Network

    Nitesh Dhanjani

    “A virtual arms cache at your fingertips. HackNotes Linux and Unix Security Portable Reference is a valuable reference for busy administrators and consultants who value the condensed and practical insight to understanding the threats they face and how to practically utilize tools to test the security of their environments.”

  8. Some advances on inverse particle transport problems with applications to homeland security Gregory Thoreson1

    E-print Network

    Bangerth, Wolfgang

    Some advances on inverse particle transport problems with applications to homeland security Gregory boundaries (noninvasive method). For the purpose of homeland security applications, such as cargo between the two frameworks. Furthermore, for conciseness, we define , bf g d x± ± = fg where bd x d

  9. A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker

    Microsoft Academic Search

    Ian Goldberg; David Wagner; Randi Thomas; Eric Brewer

    1996-01-01

    Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises significant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper

  10. Choice of Secure Routing Protocol for Applications in Wireless Sensor Networks

    Microsoft Academic Search

    Jiang Du; Su Peng

    2009-01-01

    Recently, with the development of wireless sensor networks (WSNs), many new routing protocols have been designed for WSNs. Routing protocols in WSNs, however, might differ depending on the application and network architecture. Furthermore, WSNs are exposed to numerous routing security threats. Therefore, it is headachy for us to choose secure routing protocols for application in WSNs. In respect that the

  11. Environmental security planning : an application to the Longwood Medical Area

    E-print Network

    Garmaise, Miriam Gail

    1982-01-01

    The thesis is a study of the security problems due to street crime in the Longwood Medical Area of Boston. The first part of the thesis defines the theories and practices of environmental security .planning, the urban ...

  12. SECURE MANAGEMENT OF KEYS IN CRYPTOGRAPHIC APPLICATIONS: GUIDANCE FOR ORGANIZATIONS

    E-print Network

    management practices into their security planning activities. Parts 1 and 2 establish a sound basis, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Organizations that depend upon information technology (IT) systems to carry out essential

  13. Pattern-driven Partitioning in Designing Distributed Object Applications

    E-print Network

    Simons, Anthony J. H.

    and Partitioning Process Patterns. The technique is developed within the context of an existing objectPattern-driven Partitioning in Designing Distributed Object Applications Widayashanti P. Sardjono of the fundamental challenges in designing distributed object applications (DOAs) is application partitioning

  14. Distributed Reputation-based Secure Localization in Sensor Networks

    Microsoft Academic Search

    Avinash Srinivasan; Jie Wu; Joshua Teitelbaum

    Wireless Sensor Networks (WSNs) have crit- ical applications in diverse domains like environmental monitoring and military operations like target tracking and land-mine detection where accurate location of sensors is vital. One common method of localization in literature uses a set of specialty nodes known as beacon nodes (BNs) that assist other sensor nodes (SNs) to determine their location. In BN-based

  15. Optical characterization of photopolymer and photoresist materials for storage, sensing, and security applications

    NASA Astrophysics Data System (ADS)

    Feid, Timo; Frohmann, Sven; Rass, Jens; Müller, Christian; Orlic, Susanna

    2008-08-01

    Diffractive optical elements with application specific tailored properties can be fabricated by light induced alternation of the material's refractive index. Holographic polymers or photoresists are typically used for permanent optical structurization. Today, photostructurable media become core elements of photonic systems with innovative capabilities. We investigate different classes of organic photosensitive materials in order to optimize the interaction between the material and an optoelectronic system around. Some exemplary applications are microholographic data storage, 3D nano/micro structurization, optical patterning for advanced security features. Key issues include dynamic material response, spectral and temporal grating development, influence of the light intensity distribution, effects of pre-exposure and post-curing, etc. Materials under investigation are cationic and free radical polymerization systems, liquid crystalline polymer nanocomposites, and photoresist systems.

  16. Quantum key distribution using multilevel encoding: security analysis

    Microsoft Academic Search

    Mohamed Bourennane; Anders Karlsson; Gunnar Björk; Nicolas Gisin; Nicolas J. Cerf

    2002-01-01

    We propose an extension of quantum key distribution based on encoding the key into quNits, i.e. quantum states in an N-dimensional Hilbert space. We estimate both the mutual information between the legitimate parties and the eavesdropper, and the error rate, as a function of the dimension of the Hilbert space. We derive the information gained by an eavesdropper using optimal

  17. An Electronic Patient Record "on Steroids": Distributed, Peer-to-Peer, Secure and Privacy-conscious.

    E-print Network

    Cautis, Bogdan

    An Electronic Patient Record "on Steroids": Distributed, Peer-to-Peer, Secure and Privacy, collaborative workspaces, etc. The goals of this demo are (1) to propose a unified, peer- to-peer, privacy a setting where the information is highly centralized (e.g. in hospitals), for which centralized approaches

  18. Security analysis of decoy state quantum key distribution incorporating finite statistics

    Microsoft Academic Search

    Jun Hasegawa; Masahito Hayashi; Tohya Hiroshima; Akihisa Tomita

    2007-01-01

    Decoy state method quantum key distribution (QKD) is one of the promising practical solutions to BB84 QKD with coherent light pulses. In the real world, however, statistical fluctuations with the finite code length cannot be negligible, and the securities of theoretical and experimental researches of the decoy method state QKD so far are based on the asymptotic GLLP's formula which

  19. Upper bounds for the secure key rate of the decoy-state quantum key distribution

    Microsoft Academic Search

    Marcos Curty; Tobias Moroder; Xiongfeng Ma; Hoi-Kwong Lo; Norbert Lütkenhaus

    2009-01-01

    The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques or better classical postprocessing methods might further improve their

  20. Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid

    E-print Network

    Shehab, Mohamed

    is crucial to optimize the energy usage with its production cost, so that the price paid by the users varying energy prices, giving incentive for using energy at off-peak hours. Smart grids provide innovativeSecure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid Mohammad

  1. Fault tolerance adaptation requirements vs. quality-of-service, realtime and security in dynamic distributed systems

    Microsoft Academic Search

    Rodica Tirtea; Geert Deconinck; Ronnie Belmans

    2006-01-01

    Due to deregulation of electricity market and the trend towards distributed electricity generation based on renewable energy (e.g. wind energy), electric power infrastructure relies increasingly on communication infrastructure. Communication infrastructure has to fulfil requirements as survivability and dependability to secure a high availability and reliability of electric power infrastructure. For this requirements, the communication infrastructure must be able to adapt

  2. The Hive Mind: Applying a Distributed Security Sensor Network to GENI

    E-print Network

    California at Davis, University of

    The Hive Mind: Applying a Distributed Security Sensor Network to GENI Sean Peisert, University for resource discovery and exploitation based on communication using stigmergy (i.e. local modification, and immune systems use simple communication to induce group behavior, direct detection and response actions

  3. Security engineering: systems engineering of security through the adaptation and application of risk management

    NASA Technical Reports Server (NTRS)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  4. A versatile digital video engine for safeguards and security applications

    SciTech Connect

    Hale, W.R.; Johnson, C.S. [Sandia National Labs., Albuquerque, NM (United States); DeKeyser, P. [Fast Forward Video, Irvine, CA (United States)

    1996-08-01

    The capture and storage of video images have been major engineering challenges for safeguard and security applications since the video camera provided a method to observe remote operations. The problems of designing reliable video cameras were solved in the early 1980`s with the introduction of the CCD (charged couple device) camera. The first CCD cameras cost in the thousands of dollars but have now been replaced by cameras costing in the hundreds. The remaining problem of storing and viewing video images in both attended and unattended video surveillance systems and remote monitoring systems is being solved by sophisticated digital compression systems. One such system is the PC-104 three card set which is literally a ``video engine`` that can provide power for video storage systems. The use of digital images in surveillance systems makes it possible to develop remote monitoring systems, portable video surveillance units, image review stations, and authenticated camera modules. This paper discusses the video card set and how it can be used in many applications.

  5. Modulated digital images for biometric and other security applications

    NASA Astrophysics Data System (ADS)

    McCarthy, Lawry D.; Lee, Robert A.; Swiegers, Gerhard F.

    2004-06-01

    There are, in general, two ways for an observer to deal with light that is incorrect in some way (e.g. which is partially out of focus). One approach is to correct the error (e.g. by using a lens to selectively bend the light). Another approach employs selective masking to block those portions of the light which are unwanted (e.g. out of focus). The principle of selective masking is used in a number of important industries. However it has not found widespread application in the field of optical security devices. This work describes the selective masking, or modulation, of digital images as a means of creating documents and transparent media containing overt or covert biometric and other images. In particular, we show how animation effects, flash-illumination features, color-shifting patches, information concealment devices, and biometric portraiture in various settings can be incorporated in transparent media like plastic packaging materials, credit cards, and plastic banknotes. We also demonstrate the application of modulated digital images to the preparation of optically variable diffractive foils which are readily customized to display biometric portraits and information. Selective masking is shown to be an important means of creating a diverse range of effects useful in authentication. Such effects can be readily and inexpensively produced without the need, for example, to fabricate lenses on materials which may not be conducive in this respect.

  6. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    PubMed Central

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  7. Applications of shape analysis to domestic and international security.

    SciTech Connect

    Prasad, Lakshman; Skourikhine, A. N. (Alexei N.); Doak, J. E. (Justin E.)

    2002-01-01

    The rapidly growing area of cooperative international security calls for pervasive deployment of smart sensors that render valuable information and reduce operational costs and errors. Among the sensors used, vision sensors are by far the most versatile, tangible, and rich in the information they provide about their environment. On the flip side, they are also the most complex to analyze automatically for the extraction of high-level information. The ability to process imagery in a useful manner requires at least partial functional emulation of human capabilities of visual understanding. Of all visual cues available in image data, shape is perhaps the most important for understanding the content of an image. In this paper we present an overview of ongoing research at LANL on geometric shape analysis. The objective of our research is to develop a computational framework for multiscale characterization, analysis, and recognition of shapes. This framework will enable the development of a comprehensive and connected body of mathematical methods and algorithms, based on the topological, metrical, and morphological properties of shapes. We discuss its potential applications to automated surveillance, monitoring, container tracking and inspection, weapons dismantlement, and treaty verification. The framework will develop a geometric filtering scheme for extracting semantically salient shape features. This effort creates a paradigm for solving shape-related problems in Pattern Recognition, Computer Vision, and Image Understanding in a conceptually cohesive and algorithmically amenable manner. The research aims to develop an advanced image analysis capability at LANL for solving a wide range of problems in automated facility surveillance, nuclear materials monitoring, treaty verification, and container inspection and tracking. The research provides the scientific underpinnings that will enable us to build smart surveillance cameras, with a direct practical impact on LANL's capabilities in domestic and international safeguards and security.

  8. Rapid response radiation sensors for homeland security applications

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Guss, Paul

    2014-09-01

    The National Security Technologies, LLC, Remote Sensing Laboratory is developing a rapid response radiation detection system for homeland security field applications. The intelligence-driven system is deployed only when non-radiological information about the target is verifiable. The survey area is often limited, so the detection range is small; in most cases covering a distance of 10 meters or less suffices. Definitive response is required in no more than 3 seconds and should minimize false negative alarms, but can err on the side of positive false alarms. The detection system is rapidly reconfigurable in terms of size, shape, and outer appearance; it is a plug-and-play system. Multiple radiation detection components (viz., two or more sodium iodide scintillators) are used to independently "over-determine" the existence of the threat object. Rapid response electronic dose rate meters are also included in the equipment suite. Carefully studied threat signatures are the basis of the decision making. The use of Rad-Detect predictive modeling provides information on the nature of the threat object. Rad-Detect provides accurate dose rate from heavily shielded large sources; for example those lost in Mexico were Category 1 radiation sources (~3,000 Ci of 60Co), the most dangerous of five categories defined by the International Atomic Energy Agency. Taken out of their shielding containers, Category 1 sources can kill anyone who is exposed to them at close range for a few minutes to an hour. Whenever possible sub-second data acquisition will be attempted, and, when deployed, the system will be characterized for false alarm rates. Although the radiation detection materials selected are fast (viz., faster scintillators), their speed is secondary to sensitivity, which is of primary importance. Results from these efforts will be discussed and demonstrated.

  9. USING DISTRIBUTED SOURCE CODING TO SECURE FINGERPRINT BIOMETRICS Stark C. Draper, Ashish Khisti, Emin Martinian, Anthony Vetro, Jonathan S. Yedidia

    E-print Network

    Khisti, Ashish

    USING DISTRIBUTED SOURCE CODING TO SECURE FINGERPRINT BIOMETRICS Stark C. Draper, Ashish Khisti Broadway Ave, Cambridge MA, 02139 ABSTRACT We describe a method to encode fingerprint biometrics securely fingerprint. Our approach is based on the use of distributed source coding techniques implemented with graph

  10. 76 FR 41829 - J.P. Morgan Securities LLC, et al.; Notice of Application and Temporary Order

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ...applicant using the Company name box, at...limited liability company organized under the laws of Delaware...broker-dealer under the Securities Exchange Act...under the federal securities laws. 6. Applicants...registered investment companies and ESCs,...

  11. 76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ...1974; Department of Homeland Security/ALL--032 Official Passport Application and...Department of Homeland Security/ ALL--032 Official Passport Application and...Washington, DC 20528. Instructions: All submissions received must include the...

  12. Application of the JDL data fusion process model for cyber security

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2010-04-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

  13. Quantum key distribution for security guarantees over QoS-driven 3D satellite networks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Zhang, Xi; Chen, Genshe; Pham, Khanh; Blasch, Erik

    2014-06-01

    In recent years, quantum-based communication is emerging as a new technique for ensuring secured communications because it can guarantee absolute security between two different remote entities. Quantum communication performs the transmission and exchange of quantum information among distant nodes within a network. Quantum key distribution (QKD) is a methodology for generating and distributing random encryption keys using the principles of quantum physics. In this paper, we investigate the techniques on how to efficiently use QKD in 3D satellite networks and propose an effective method to overcome its communications-distance limitations. In order to implement secured and reliable communications over wireless satellite links, we develop a free-space quantum channel model in satellite communication networks. To enlarge the communications distances over 3D satellite networks, we propose to employ the intermediate nodes to relay the unconditional keys and guarantee the Quantum Bit Error Rate (QBER) for security requirement over 3D satellite networks. We also propose the communication model for QKD security-Quality of Service (QoS) guarantee and an adaptive cooperative routing selection scheme to optimize the throughput performance of QKD-based satellite communications networks. The obtained simulation results verify our proposed schemes.

  14. Secure Large-Scale Airport Simulations Using Distributed Computational Resources

    NASA Technical Reports Server (NTRS)

    McDermott, William J.; Maluf, David A.; Gawdiak, Yuri; Tran, Peter; Clancy, Dan (Technical Monitor)

    2001-01-01

    To fully conduct research that will support the far-term concepts, technologies and methods required to improve the safety of Air Transportation a simulation environment of the requisite degree of fidelity must first be in place. The Virtual National Airspace Simulation (VNAS) will provide the underlying infrastructure necessary for such a simulation system. Aerospace-specific knowledge management services such as intelligent data-integration middleware will support the management of information associated with this complex and critically important operational environment. This simulation environment, in conjunction with a distributed network of supercomputers, and high-speed network connections to aircraft, and to Federal Aviation Administration (FAA), airline and other data-sources will provide the capability to continuously monitor and measure operational performance against expected performance. The VNAS will also provide the tools to use this performance baseline to obtain a perspective of what is happening today and of the potential impact of proposed changes before they are introduced into the system.

  15. Security bound of two-bases quantum key-distribution protocols using qudits

    E-print Network

    Georgios M. Nikolopoulos; Gernot Alber

    2005-07-22

    We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the BB84 quantum key distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  16. Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate.

    PubMed

    Dixon, A R; Yuan, Z L; Dynes, J F; Sharpe, A W; Shields, A J

    2008-11-10

    We report the first gigahertz clocked decoy-protocol quantum key distribution (QKD). Record key rates have been achieved thanks to the use of self-differencing InGaAs avalanche photodiodes designed specifically for high speed single photon detection. The system is characterized with a secure key rate of 1.02 Mbit/s for a fiber distance of 20 km and 10.1 kbit/s for 100 km. As the present advance relies upon compact non-cryogenic detectors, it opens the door towards practical and low cost QKD systems to secure broadband communication in future. PMID:19581967

  17. Distributed Computing Framework for Synthetic Radar Application

    NASA Technical Reports Server (NTRS)

    Gurrola, Eric M.; Rosen, Paul A.; Aivazis, Michael

    2006-01-01

    We are developing an extensible software framework, in response to Air Force and NASA needs for distributed computing facilities for a variety of radar applications. The objective of this work is to develop a Python based software framework, that is the framework elements of the middleware that allows developers to control processing flow on a grid in a distributed computing environment. Framework architectures to date allow developers to connect processing functions together as interchangeable objects, thereby allowing a data flow graph to be devised for a specific problem to be solved. The Pyre framework, developed at the California Institute of Technology (Caltech), and now being used as the basis for next-generation radar processing at JPL, is a Python-based software framework. We have extended the Pyre framework to include new facilities to deploy processing components as services, including components that monitor and assess the state of the distributed network for eventual real-time control of grid resources.

  18. Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin, Gregor v. Bochmann,

    E-print Network

    Jourdan, Guy-Vincent

    Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin ubiquitous day by day, and among these applications, a new trend is emerging: rich Internet applications directions to address the open problems. Keywords: rich Internet applications, formal models, software

  19. Foundational Security Principles for Medical Application Platforms* (Extended Abstract)

    PubMed Central

    Vasserman, Eugene Y.; Hatcliff, John

    2014-01-01

    We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096

  20. Laser-induced breakdown spectroscopy in industrial and security applications

    SciTech Connect

    Bol'shakov, Alexander A.; Yoo, Jong H.; Liu Chunyi; Plumer, John R.; Russo, Richard E.

    2010-05-01

    Laser-induced breakdown spectroscopy (LIBS) offers rapid, localized chemical analysis of solid or liquid materials with high spatial resolution in lateral and depth profiling, without the need for sample preparation. Principal component analysis and partial least squares algorithms were applied to identify a variety of complex organic and inorganic samples. This work illustrates how LIBS analyzers can answer a multitude of real-world needs for rapid analysis, such as determination of lead in paint and children's toys, analysis of electronic and solder materials, quality control of fiberglass panels, discrimination of coffee beans from different vendors, and identification of generic versus brand-name drugs. Lateral and depth profiling was performed on children's toys and paint layers. Traditional one-element calibration or multivariate chemometric procedures were applied for elemental quantification, from single laser shot determination of metal traces at {approx}10 {mu}g/g to determination of halogens at 90 {mu}g/g using 50-shot spectral accumulation. The effectiveness of LIBS for security applications was demonstrated in the field by testing the 50-m standoff LIBS rasterizing detector.

  1. NASA guidelines for assuring the adequacy and appropriateness of security safeguards in sensitive applications

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1984-01-01

    The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.

  2. Applications, Denials, and Appeals for Social Security Disability Insurance

    Microsoft Academic Search

    Olivia S. Mitchell; John W. R. Phillips

    2002-01-01

    This project explores the process by which older workers apply for, and are awarded, Social Security Disability Insurance (DI) benefits. Our focus is on how and whether DI serves as a path out of the labor market at older ages. This research is important to the extent that proposals to raise the early retirement age under Social Security alter the

  3. Security Challenges for User-Oriented RFID Applications within the `Internet of Things'

    E-print Network

    Hancke, Gerhard

    Security Challenges for User-Oriented RFID Applications within the `Internet of Things' G.P. HANCKE to be an important building block of the `Internet of Things' and examine how RFID, assisted by the deployment of NFC will need to address. Keywords: RFID, NFC, security, `Internet of Things', user-oriented architecture 1

  4. Securing Location Services Infrastructures: Practical Criteria for Application Developers and Solutions Architects

    ERIC Educational Resources Information Center

    Karamanian, Andre

    2013-01-01

    This qualitative, exploratory, normative study examined the security and privacy of location based services in mobile applications. This study explored risk, and controls to implement privacy and security. This study was addressed using components of the FIPS Risk Management Framework. This study found that risk to location information was…

  5. NOAA, 2012 Climate Prediction Applications Science Workshop, Climate Services for National Security Challenges: Abstract Submission

    E-print Network

    Miami, University of

    NOAA, 2012 Climate Prediction Applications Science Workshop, Climate Services for National Security Challenges: Abstract Submission Presentation Title: Real-time Energy and Climate Simulations: Tools for Understanding and Creating a Secure Future Presenter: Andrew P. Jones, Climate Interactive, Co-Director, 8

  6. Application of the JDL data fusion process model for cyber security

    Microsoft Academic Search

    Nicklaus A. Giacobe

    2010-01-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining

  7. Object Oriented Verification Kernels for Secure Java Applications Holger Grandy, Kurt Stenzel, Wolfgang Reif

    E-print Network

    Reif, Wolfgang

    at Trojan horses, viruses, or malicious users. The method has been applied to a realistic case study, an M-commerceObject Oriented Verification Kernels for Secure Java Applications Holger Grandy, Kurt Stenzel of source code that must be considered. Additionally, a suitable method for program- ming security critical

  8. EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond

    E-print Network

    Anderson, Richard

    EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond Karl for security ap- plications. As a central case study, we examine the recently issued United States Passport tags. We explore several issues: 1. Cloning: We report on the data format of Passport Cards and WA EDLs

  9. Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems

    E-print Network

    Van Oorschot, Paul

    Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems David enabling the flexibility and independence of a multi-market environment. We propose Meteor as a security- plication (Meteorite) to demonstrate the technical feasibility of our proposal. The Meteor approach provides

  10. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  11. Full security of quantum key distribution from no-signaling constraints

    E-print Network

    Ll. Masanes; R. Renner; M. Christandl; A. Winter; J. Barrett

    2014-09-24

    We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers, constrained only by the assumption that any information accessible to them must be compatible with the non-signaling principle. The claim holds with respect to the state-of-the-art security definition used in cryptography, known as universally-composable security. The non-signaling assumption only refers to the statistics of measurement outcomes depending on the choices of measurements; hence security is independent of the internal workings of the devices --- they do not even need to follow the laws of quantum theory. This is relevant for practice as a correct and complete modeling of realistic devices is generally impossible. The techniques developed are general and can be applied to other Bell inequality-based protocols. In particular, we provide a scheme for estimating Bell-inequality violations when the samples are not independent and identically distributed.

  12. Improving Web Server Performance by Distributing Web Applications

    Microsoft Academic Search

    Mital Kakaiya; Sushant Goel; Hema Sharda; David Taniar

    2003-01-01

    \\u000a Distributed interNet Application (DNA) covers a wide range of topics. DNA is a methodology that specifies how to distribute\\u000a Internet application on various Web servers. DNA helps to generate scalable, reliable enterprise applications. It provides\\u000a load-balancing techniques to distribute load on multiple Web servers. This paper describes DNA methodology for a distributed\\u000a application, which enables better performance, availability and service

  13. Transparent Process Migration for Distributed Applications in a Beowulf Cluster

    Microsoft Academic Search

    Mark Claypool; David Finkel

    2002-01-01

    Powerful, low-cost clusters of personal computers, such as Beowulf clusters, have fueled the potential for widespread distributed computation. While these Beowulf clusters typically have software that facilitates development of distributed applications, there is stil l a need for effective distributed computation that is transparent to the application programmer. This paper describes the design and development of the PANTS Application Node

  14. A Management Information Repository for Distributed Applications Management 1

    E-print Network

    Graham, Nick

    1 A Management Information Repository for Distributed Applications Management 1 November 1995­6513 (martin@qucis.queensu.ca) Abstract The Management of Distributed Applications and Systems (MANDAS) project addresses problems arising in the management of distributed applications. Specifically, we are studying

  15. A Management Information Repository for Distributed Applications Management1

    E-print Network

    Graham, Nick

    1 A Management Information Repository for Distributed Applications Management1 November 1995-6513 (martin@qucis.queensu.ca) Abstract The Management of Distributed Applications and Systems (MANDAS) project addresses problems arising in the management of distributed applications. Specifically, we are studying

  16. Secure, Autonomous, Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations

    NASA Astrophysics Data System (ADS)

    Ivancic, W. D.; Paulsen, P. E.; Miller, E. M.; Sage, S. P.

    This report describes a Secure, Autonomous, and Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations. It includes a description of current improvements to existing Virtual Mission Operations Center technology being used by US Department of Defense and originally developed under NASA funding. The report also highlights a technology demonstration performed in partnership with the United States Geological Service for Earth Resources Observation and Science using DigitalGlobe® satellites to obtain space-based sensor data.

  17. Reliability of Calderbank Shor Steane codes and security of quantum key distribution

    Microsoft Academic Search

    Mitsuru Hamada

    2004-01-01

    After Mayers (1996 Advances in Cryptography: Proc. Crypto'96 pp 343-57 2001 J. Assoc. Comput. Mach. 48 351-406) gave a proof of the security of the Bennett-Brassard (1984 Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing (Bangalore, India) pp 175-9) (BB84) quantum key distribution protocol, Shor and Preskill (2000 Phys. Rev. Lett. 85 441-4) made a remarkable observation that

  18. Secure, Autonomous, Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Paulsen, Phillip E.; Miller, Eric M.; Sage, Steen P.

    2013-01-01

    This report describes a Secure, Autonomous, and Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations. It includes a description of current improvements to existing Virtual Mission Operations Center technology being used by US Department of Defense and originally developed under NASA funding. The report also highlights a technology demonstration performed in partnership with the United States Geological Service for Earth Resources Observation and Science using DigitalGlobe(Registered TradeMark) satellites to obtain space-based sensor data.

  19. 78 FR 46622 - Application of Topaz Exchange, LLC for Registration as a National Securities Exchange; Findings...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ...34-70050; File No. 10-209] Application of Topaz Exchange, LLC for Registration as a National Securities...July 26, 2013. I. Introduction On July 3, 2012, Topaz Exchange, LLC (``Topaz Exchange'' or ``Exchange'') submitted to...

  20. NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission

    E-print Network

    Miami, University of

    NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission Presentation Title to climate change Presenters: William H. Swartz, Senior Scientist, The Johns

  1. NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission

    E-print Network

    Miami, University of

    NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National support public health agencies, and 3) Expanding interpretive services for persistent weather and climate Security Challenges: Abstract Submission Presentation Title: NWS's Climate-Weather-Water and Health Related

  2. NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission

    E-print Network

    Miami, University of

    NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission Presentation Title: The Weather and Climate Toolkit Presenters: Steve Ansari, Physical Scientist, NOAA's National Climatic Data Center, 151 Patton Ave, Asheville, NC

  3. NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission

    E-print Network

    Miami, University of

    NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National services. Their report, "Confronting Climate Change: An Early Analysis of Water and Wastewater Adaptation Security Challenges: Abstract Submission Presentation Title: Integration of Historical Climate Data

  4. Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue

    SciTech Connect

    Dreizler, Andreas; Fried, Alan; Gord, James R

    2007-07-01

    This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica.

  5. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Microsoft Academic Search

    Yi Guo; Myron Hohil; Sachi V. Desai

    2007-01-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities\\/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion

  6. A Novel Framework using Elliptic Curve Cryptography for Extremely Secure Transmission in Distributed Privacy Preserving Data Mining

    E-print Network

    Kiran, P; Kavya, N P

    2012-01-01

    Privacy Preserving Data Mining is a method which ensures privacy of individual information during mining. Most important task involves retrieving information from multiple data bases which is distributed. The data once in the data warehouse can be used by mining algorithms to retrieve confidential information. The proposed framework has two major tasks, secure transmission and privacy of confidential information during mining. Secure transmission is handled by using elliptic curve cryptography and data distortion for privacy preservation ensuring highly secure environment.

  7. Security Analysis and Improvement Model for Web-based Applications

    E-print Network

    Wang, Yong

    2010-01-14

    user logins, remote IP addresses, and physical locations as subject credentials to combine with the requested objects and privilege modes. Access control algorithms are developed for subjects, objects, and access privileges. A secure implementation...

  8. Dark states ultra-long fiber laser for practically secure key distribution

    NASA Astrophysics Data System (ADS)

    Kotlicki, Omer; Scheuer, Jacob

    2014-10-01

    We present and demonstrate a novel ultra-long fiber laser key distribution system (UFL-KDS). The scheme quenches the lasing process when in its secure states, thus forming "dark states" which provide simple detection on one hand and increased difficulty of eavesdropping on the other. We analyze the practical aspects of previously studied UFL-KDS schemes as well as those of the one presented here and demonstrate successful key distribution across a 200 km link with bit-rates that can exceed 0.5 kbps. Spectral and temporal passive attack strategies are analyzed and discussed in details.

  9. Reviews of computing technology: Securing network applications, Kerberos and RSA

    SciTech Connect

    Johnson, S.M.

    1992-06-01

    This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

  10. Contributions to Human Errors and Breaches in National Security Applications.

    SciTech Connect

    Pond, D. J. (Daniel J.); Houghton, F. K. (Florence Kay); Gilmore, W. E. (Walter E.)

    2002-01-01

    Los Alamos National Laboratory has recognized that security infractions are often the consequence of various types of human errors (e.g., mistakes, lapses, slips) and/or breaches (i.e., deliberate deviations from policies or required procedures with no intention to bring about an adverse security consequence) and therefore has established an error reduction program based in part on the techniques used to mitigate hazard and accident potentials. One cornerstone of this program, definition of the situational and personal factors that increase the likelihood of employee errors and breaches, is detailed here. This information can be used retrospectively (as in accident investigations) to support and guide inquiries into security incidents or prospectively (as in hazard assessments) to guide efforts to reduce the likelihood of error/incident occurrence. Both approaches provide the foundation for targeted interventions to reduce the influence of these factors and for the formation of subsequent 'lessons learned.' Overall security is enhanced not only by reducing the inadvertent releases of classified information but also by reducing the security and safeguards resources devoted to them, thereby allowing these resources to be concentrated on acts of malevolence.

  11. Application of Lightweight Formal Methods to Software Security

    NASA Technical Reports Server (NTRS)

    Gilliam, David P.; Powell, John D.; Bishop, Matt

    2005-01-01

    Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines several formal techniques can increase the confidence in the verification of software security properties. Such an approach which species security properties in a library that can be reused by 2 instruments and their methodologies developed for the National Aeronautics and Space Administration (NASA) at the Jet Propulsion Laboratory (JPL) are described herein The Flexible Modeling Framework (FMF) is a model based verijkation instrument that uses Promela and the SPIN model checker. The Property Based Tester (PBT) uses TASPEC and a Text Execution Monitor (TEM). They are used to reduce vulnerabilities and unwanted exposures in software during the development and maintenance life cycles.

  12. SCanDroid: Automated Security Certification of Android Applications

    Microsoft Academic Search

    Adam P. Fuchs; Avik Chaudhuri; Jeffrey S. Foster

    Android is a popular mobile-device platform developed by Google. Android's application model is designed to encourage applications to share their code and data with other applications. While such sharing can be tightly con- trolled with permissions, in general users cannot determine what applications will do with their data, and thereby can- not decide what permissions such applications should run with.

  13. Security bound of two-basis quantum-key-distribution protocols using qudits

    SciTech Connect

    Nikolopoulos, Georgios M.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

    2005-09-15

    We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  14. A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore

    Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.

  15. An identity-based approach to secure P2P applications with Likir

    Microsoft Academic Search

    Luca Maria Aiello; Marco Milanesio; Giancarlo Ruffo; Rossano Schifanella

    Structured overlay networks are highly susceptible to attacks aimed at subverting their structure or functionalities. Although\\u000a many secure architectural design proposals have been presented in the past, a widely accepted and comprehensive solution is\\u000a lacking. Likir (Layered Identity-based Kademlia-like Infrastructure) is our solution for implementing a secure Peer-to-Peer\\u000a network based on a Distributed Hash Table. Our purpose is to focus

  16. Applications of omics for food safety and security

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Food safety and food security are important global issues. Research employing 'omics' technologies, including genomics, proteomics, and metabolomics, is helping to elucidate pathogen behavior at the molecular level and to develop better detection and typing systems. Omics-based tools enable resear...

  17. An artificial immune system architecture for computer security applications

    Microsoft Academic Search

    Paul K. Harmer; Paul D. Williams; Gregg H. Gunsch; Gary B. Lamont

    2002-01-01

    With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Current antivirus and net- work intrusion detection (ID) solutions can become overwhelmed

  18. CODESSEAL: Compiler/FPGA Approach to Secure Applications

    E-print Network

    Kuzmanovic, Aleksandar

    informatics has become a rapidly growing field involving different branches of computer science and infor an important area in computer security. This paper proposes a joint compiler/hardware infrastructure that is capable of fast encryption and decryption, and performs code integrity verifica- tion, authentication

  19. SECURE APPLICATION UPDATES ON POINT OF SALE DEVICES Manuel Mendonca

    E-print Network

    Neves, Nuno

    - Portugal Email: nuno@di.fc.ul.pt Keywords: Electronic payment systems, point of sale devices, secure (POS) devices or Auto- mated Teller Machines (ATM), where these cards are accepted. At the beginning, purchase of train or music concert tickets, deposits of checks, or money transfers between accounts

  20. Deployment of IEC 61499 compliant distributed control applications

    Microsoft Academic Search

    Tanvir Hussain; Georg Frey

    2007-01-01

    The distributed control applications of today are usually assumed to be run on a hardware consisting of heterogeneous processing elements. A standard like IEC 61499 attempts to provide an unanimous software infrastructure for these applications. An important research interest thereof is to find possible deployment of the components of the distributed application on these heterogeneous nodes. Since most of such

  1. Network virtualisation for transparent testing and experimentation of distributed applications

    Microsoft Academic Search

    Chris Edwards; Aaron Harwood; Egemen Tanin

    2005-01-01

    Popular network simulation tools, such as ns-2, are useful for undertaking experiments with emerging networking technologies. As networked applications become distributed at scales comparable to the Internet, such as peer-to-peer applications, testing and experimentation becomes increasingly difficult and important. With this paper, we are introducing an elaborate extension to existing simulation capabilities by allowing realistic highly distributed application prototypes to

  2. SCanDroid: Automated Security Certification of Android Applications

    E-print Network

    Adam P. Fuchs; Avik Chaudhuri; Jeffrey S. Foster

    Android is a popular mobile-device platform developed by Google. Android’s application model is designed to encourage applications to share their code and data with other applications. While such sharing can be tightly controlled with permissions, in general users cannot determine what applications

  3. OMOS: A Framework for Secure Communication in Mashup Applications Saman Zarandioon Danfeng (Daphne) Yao Vinod Ganapathy

    E-print Network

    Ganapathy, Vinod

    , photos that others took in the area, and so on. There are two main types of architectures for mashup apOMOS: A Framework for Secure Communication in Mashup Applications Saman Zarandioon Danfeng (Daphne,danfeng,vinodg}@cs.rutgers.edu Abstract Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous

  4. OMOS: A Framework for Secure Communication in Mashup Applications Saman Zarandioon Danfeng (Daphne) Yao Vinod Ganapathy

    E-print Network

    Lu, Chang

    OMOS: A Framework for Secure Communication in Mashup Applications Saman Zarandioon Danfeng (Daphne,danfeng,vinodg}@cs.rutgers.edu Abstract Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous experience for end-users. As mashups evolve from portals designed to offer convenient access to infor- mation

  5. A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS

    Microsoft Academic Search

    Emanuel Fonseca; Andreas Festag

    Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They o! er a wide range of applications improving road safety and driving comfort. Since VANET applications a! ect safety-of-life, data security in a vehic- ular system is mandatory. The unique characteristics of VANETs com- pared to conventional mobile ad hoc networks and sensor networks

  6. A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android

    E-print Network

    David Barrera; P. C. Van Oorschot; H. Güne¸s Kayac?k; Anil Somayaji

    -based security models which makes novel use of the Self-Organizing Map (SOM) algorithm of Kohonen (2001). While the proposed methodology may be applicable to a wide range of architectures, we analyze 1,100 Android applications as a case study. Our methodology is of independent interest for visualization of

  7. Estimating the Labor Market Impact of Voluntary Military Service Using Social Security Data on Military Applicants

    Microsoft Academic Search

    Joshua D. Angrist

    1995-01-01

    This study uses Social Security data on the earnings of military applicants to the all-volunteer forces to compare the earnings of Armed Forces veterans with the earnings of military applicants who did not enlist. Matching, regression, and Instrumental Variables (IV) estimates are presented. The matching and regression estimates control for most of the characteristics used by the military to select

  8. An empirical analysis of the social security disability application, appeal, and award process

    Microsoft Academic Search

    Hugo Ben??tez-Silva; Moshe Buchinsky; Hiu Man Chan; John Rust; Sofia Sheidvasser

    1999-01-01

    We provide an empirical analysis of the Social Security disability application, award, and appeal process using the Health and Retirement Survey (HRS). We show that the appeal option increases the award probability from 46% to 73%. However, this comes at the cost of significant delays: the duration between application and award is over three times longer for those who are

  9. Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes

    Microsoft Academic Search

    Nitesh Saxena

    2008-01-01

    To establish secure (point-to-point and\\/or broadcast) communication channels\\u000aamong the nodes of a wireless sensor network is a fundamental task. To this\\u000aend, a plethora of (socalled) key pre-distribution schemes have been proposed\\u000ain the past. All these schemes, however, rely on shared secret(s), which are\\u000aassumed to be somehow pre-loaded onto the sensor nodes. In this paper, we\\u000apropose

  10. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications

    Microsoft Academic Search

    Alessandro Armando; David A. Basin; Yohan Boichut; Yannick Chevalier; Luca Compagna; Jorge Cuéllar; Paul Hankes Drielsma; Pierre-cyrille Héam; Olga Kouchnarenko; Jacopo Mantovani; Sebastian Mödersheim; David Von Oheimb; Michaël Rusinowitch; Judson Santiago; Mathieu Turuani; Luca Viganò; Laurent Vigneron

    2005-01-01

    AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that imple- ment a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and

  11. Image-Based Electronic Patient Records for Secured Collaborative Medical Applications

    Microsoft Academic Search

    Jianguo Zhang; Jianyong Sun; Yuanyuan Yang; Chenwen Liang; Yihong Yao; Jin Jin; Weihua Cai; Kun Sun; Guozhen Zhang

    2005-01-01

    We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), image-based EPR repository server (EPR-Server), Web server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of digital signature and authentication are integrated to

  12. Efficient and Secure Evaluation of Multivariate Polynomials and Applications

    Microsoft Academic Search

    Matthew K. Franklin; Payman Mohassel

    2010-01-01

    \\u000a In this work, we design two-party and multiparty protocols for evaluating multivariate polynomials at participants’ inputs\\u000a with security against a malicious adversary who may corrupt all but one of the parties. Our protocols are round and communication efficient, and use the underlying cryptographic\\u000a primitives in a black-box way. Our construction achieves optimal communication complexity for degree 2 and 3 polynomials.

  13. Upper bounds for the secure key rate of the decoy-state quantum key distribution

    NASA Astrophysics Data System (ADS)

    Curty, Marcos; Moroder, Tobias; Ma, Xiongfeng; Lo, Hoi-Kwong; Lütkenhaus, Norbert

    2009-03-01

    The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques or better classical postprocessing methods might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy-state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible postprocessing methods is that double click events are randomly assigned to single click events. Further, we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD. The legitimate users need to prove that there exists no separable state (in the case of two-way QKD) or that there exists no quantum state having a symmetric extension (one-way QKD) that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical postprocessing techniques in decoy-state QKD.

  14. Anomaly detection using negative security model in web application

    Microsoft Academic Search

    M. Auxilia; D. Tamilselvan

    2010-01-01

    Today's combat zone for both ethical and unethical hackers is the web. Rapid growth of web sites and web applications gives way to deliver complex business applications through the web. As the web dependency increases, so do the web hacking activities. Web applications are normally written in scripting languages like JavaScript, PHP embedded in HTML allowing connectivity to the databases,

  15. Security of biased BB84 quantum key distribution with finite resource

    NASA Astrophysics Data System (ADS)

    Zhao, Liang-Yuan; Li, Hong-Wei; Yin, Zhen-Qiang; Chen, Wei; You, Juan; Han, Zheng-Fu

    2014-10-01

    In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.

  16. To appear in Proceedings of the 16th USENIX Security Symposium (Security '07) SIF: Enforcing Confidentiality and Integrity in Web Applications

    E-print Network

    Myers, Andrew C.

    and integrity information security policies. SIF web applications are written in Jif 3.0, an extended version). The enforcement mechanisms of SIF and Jif 3.0 track the flow of information within a web application applications, in exchange for trust in the servlet framework and the Jif 3.0 compiler--a good bargain be- cause

  17. Designing applications in dynamic networks: The Airplug Software Distribution

    E-print Network

    Paris-Sud XI, Université de

    2013 - Workshop ASCoMS (Architecting Safety in Collaborative Mobile Systems) of the 32nd International Conference on Computer Safety, Reliability and Security, Toulouse : France (2013)" #12;­ Infrastructure with fleets of robots or drones (Swarm robotics). From an application point of view, we leave the centralized

  18. Bayesian performance metrics of binary sensors in homeland security applications

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz P.; Forrester, Thomas C.

    2008-04-01

    Bayesian performance metrics, based on such parameters, as: prior probability, probability of detection (or, accuracy), false alarm rate, and positive predictive value, characterizes the performance of binary sensors; i.e., sensors that have only binary response: true target/false target. Such binary sensors, very common in Homeland Security, produce an alarm that can be true, or false. They include: X-ray airport inspection, IED inspections, product quality control, cancer medical diagnosis, part of ATR, and many others. In this paper, we analyze direct and inverse conditional probabilities in the context of Bayesian inference and binary sensors, using X-ray luggage inspection statistical results as a guideline.

  19. Time Scaling of Chaotic Systems: Application to Secure Communications

    E-print Network

    Donatello Materassi; Michele Basso

    2007-10-25

    The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preserving its phase portrait. Exploiting this property, a chaos encryption technique to transmit a binary signal through an analog channel is proposed. The scheme is based on a suitable time-scaling function which plays the role of a private key. The encoded transmitted signal is proved to resist known decryption attacks offering a secure and reliable communication.

  20. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    PubMed

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings. PMID:19610468

  1. A Secure Smartphone Applications Roll-out Scheme

    Microsoft Academic Search

    Alexios Mylonas; Bill Tsoumas; Stelios Dritsas; Dimitris Gritzalis

    \\u000a The adoption of smartphones, devices transforming from simple communication devices to smart and multipurpose devices, is\\u000a constantly increasing. Amongst the main reasons for their vast pervasiveness are their small size, their enhanced functionality,\\u000a as well as their ability to host many useful and attractive applications. Furthermore, recent studies estimate that application\\u000a installation in smartphones acquired from official application repositories, such

  2. Practical security for multi-user web application databases

    E-print Network

    Redfield, Catherine M. S

    2012-01-01

    Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators can ...

  3. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  4. A review of video security training and assessment-systems and their applications

    SciTech Connect

    Cellucci, J.; Hall, R.J. (Centennial Research and Development Inc. (US))

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups.

  5. SBSQLID: Securing Web Applications with Service Based SQL Injection Detection

    Microsoft Academic Search

    S. V. Shanmughaneethi; S. C. E. Shyni; S. Swamynathan

    2009-01-01

    Vulnerability in web applications allows malicious users to obtain unrestricted access to private and confidential information. SQL injection is ranked at the top in web application attack mechanisms used by hackers to steal data from organizations. Hackers' can take advantages due to flawed design, improper coding practices, improper validations of user input, configuration errors, or other weaknesses in the infrastructure.

  6. 17 CFR 230.139 - Publications or distributions of research reports by brokers or dealers distributing securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...issuers in the issuer's industry or sub-industry, or contains a comprehensive list of securities currently recommended...issuer's industry or sub-industry or substantially all...comprehensive list of securities contained in the...

  7. Scalability of Finite Element Applications on DistributedMemory Parallel

    E-print Network

    Johnsson, S. Lennart

    . Introduction Industrial design using finite element analysis software often requires solving problems involvingScalability of Finite Element Applications on Distributed­Memory Parallel Computers ZdenŸek Johan; Scalability of Finite Element Applications on Distributed­Memory Parallel Computers ZdenŸek Johan, Kapil K

  8. Secure SocialAware: A Security Framework for Mobile Social Networking Applications

    Microsoft Academic Search

    Aaron Beach; Mike Gartrell; Baishakhi Ray; Richard Han

    Social network information is now being used in ways for which it may have not been originally intended. In partic- ular, increased use of smartphones capable of running ap- plications which access social network information enable applications to be aware of a user's position and preferences. However, current models forexchangeof thisinformationre- quire users to compromise their privacy. We present a

  9. Wavelet methods and statistical applications: network security and bioinformatics

    E-print Network

    Kwon, Deukwoo

    2005-11-01

    Wavelet methods possess versatile properties for statistical applications. We would like to explore the advantages of using wavelets in the analyses in two different research areas. First of all, we develop an integrated tool for online detection...

  10. 77 FR 1965 - Central Securities Corporation; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ...restricted stock units, shares of common stock granted as a bonus, and awards denominated in cash. Applicant: Central...Restricted Stock Units''),\\2\\ grants of Shares as a bonus (``Bonus Stock''),\\3\\ and awards denominated in...

  11. Secured remote tracking of critical autonomic computing applications

    Microsoft Academic Search

    Paritosh Kumar Srivastava; Sandeep Sahu

    2004-01-01

    Autonomic computing is an entirely new philosophy for the development of computing systems. It is emerging as a significant new approach to the design of computing systems. Its goal is the development of systems that are self-configuring, self-healing, self-protecting and self-optimizing. This makes autonomic computing the best candidate when designing critical applications, thus minimizing human intervention. But these applications need

  12. In the Quantitative Risk Analysis for Security Applications Workshop at IJCAI-09 (QRASA-09), Pasadena, CA, July 2009.

    E-print Network

    Taylor, Matthew

    In the Quantitative Risk Analysis for Security Applications Workshop at IJCAI-09 (QRASA-09 A growing number of security applications, de- signed to reduce risk from adversaries' actions, are being analysis and optimality proofs, may be largely irrelevant. The primary contribu- tion of this paper

  13. In the Quantitative Risk Analysis for Security Applications Workshop at IJCAI09 (QRASA09), Pasadena, CA, July 2009.

    E-print Network

    Taylor, Matthew

    In the Quantitative Risk Analysis for Security Applications Workshop at IJCAI­09 (QRASA­09 A growing number of security applications, de­ signed to reduce risk from adversaries' actions, are being analysis and optimality proofs, may be largely irrelevant. The primary contribu­ tion of this paper

  14. SecureBus: towards application-transparent trusted computing with mandatory access control

    Microsoft Academic Search

    Xinwen Zhang; Michael J. Covington; Songqing Chen; Ravi S. Sandhu

    2007-01-01

    The increasing number of software-based attacks has attracted sub- stantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technologies have been re- cently proposed to provide strong isolation on application platforms. On the other hand, today pervasively available computing cycles and data resources have enabled various distributed applications that require collaboration among different application processes. These

  15. Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

    NASA Astrophysics Data System (ADS)

    Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

    2014-10-01

    In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

  16. Evaluating data distribution and drift vulnerabilities of machine learning algorithms in secure and adversarial environments

    NASA Astrophysics Data System (ADS)

    Nelson, Kevin; Corbin, George; Blowers, Misty

    2014-05-01

    Machine learning is continuing to gain popularity due to its ability to solve problems that are difficult to model using conventional computer programming logic. Much of the current and past work has focused on algorithm development, data processing, and optimization. Lately, a subset of research has emerged which explores issues related to security. This research is gaining traction as systems employing these methods are being applied to both secure and adversarial environments. One of machine learning's biggest benefits, its data-driven versus logic-driven approach, is also a weakness if the data on which the models rely are corrupted. Adversaries could maliciously influence systems which address drift and data distribution changes using re-training and online learning. Our work is focused on exploring the resilience of various machine learning algorithms to these data-driven attacks. In this paper, we present our initial findings using Monte Carlo simulations, and statistical analysis, to explore the maximal achievable shift to a classification model, as well as the required amount of control over the data.

  17. Game Theory with Costly Computation: Formulation and Application to Protocol Security

    E-print Network

    Keinan, Alon

    Game Theory with Costly Computation: Formulation and Application to Protocol Security Joseph Y a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic results (such as the existence of a Nash equi

  18. Information security issue of enterprises adopting the application of cloud computing

    Microsoft Academic Search

    Chang-Lung Tsai; Uei-Chin Lin; Allen Y. Chang; Chun-Jung Chen

    2010-01-01

    Cloud computing has become one of the most significant issues in recent years. Those associative applications and services based on cloud computing are dramatically emerging. However, in order to enjoy the widely utilization of cloud computing through wired\\/wireless networking, providing sufficient assurance of information security such as confidentiality, authentication, non-repudiation, and integrity is the critical factor of success promotion. In

  19. Safe VISITOR: visible, infrared, and terahertz object recognition for security screening application

    Microsoft Academic Search

    T. May; G. Zieger; S. Anders; V. Zakosarenko; H.-G. Meyer; M. Schubert; M. Starkloff; M. Rößler; G. Thorwirth; U. Krause

    2009-01-01

    Security solutions with the purpose to detect hidden objects underneath the clothing of persons are desired in many environments. With the variety of application scenarios criteria like flexibility and mobility become more important. So, many developments trend to focus on cameras, which can image scenes from a distance. This new generation of tools will have the advantage of hidden operation,

  20. Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security

    E-print Network

    Sood, Arun K.

    Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security Yih Huang. In prior work, we developed a Self-Cleansing Intrusion Tolerance (SCIT) architecture that achieves the above goal by constantly cleansing the servers and rotating the role of individual servers

  1. A SECURE VANET MAC PROTOCOL FOR DSRC APPLICATIONS , Kejie Lu 2

    E-print Network

    A SECURE VANET MAC PROTOCOL FOR DSRC APPLICATIONS Yi Qian 1 , Kejie Lu 2 , and Nader Moayeri 1 1 Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in active safety and private services are also permitted in order to lower the cost and to encourage VANET deployment

  2. DESIGN SECURE AND APPLICATION-ORIENTED VANET Yi Qian, and Nader Moayeri

    E-print Network

    DESIGN SECURE AND APPLICATION-ORIENTED VANET Yi Qian, and Nader Moayeri National Institute ad hoc network (VANET) is recognized as an important component of Intelligent Transportation Systems. The main benefit of VANET communication is seen in active safety systems, which target to increase safety

  3. REMOTE SENSING APPLICATIONS FOR SUSTAINABLE WATERSHED MANAGEMENT AND FOOD SECURITY: JOURNAL ARTICLE

    EPA Science Inventory

    NRMRL-CIN-1496A Rochon*, G., Szlag*, D., Daniel*, F.B., and Chifos**, C. Remote Sensing Applications for Sustainable Watershed Management and Food Security. Proceedings of the 21st European Association of Remote Sensing Laboratories Symposium, Marne-La-Valle, France, 5/14-16/200...

  4. Development of Standardized Clinical Training Cases for Diagnosis of Sexual Abuse using a Secure Telehealth Application

    ERIC Educational Resources Information Center

    Frasier, Lori D.; Thraen, Ioana; Kaplan, Rich; Goede, Patricia

    2012-01-01

    Objectives: The training of physicians, nurse examiners, social workers and other health professional on the evidentiary findings of sexual abuse in children is challenging. Our objective was to develop peer reviewed training cases for medical examiners of child sexual abuse, using a secure web based telehealth application (TeleCAM). Methods:…

  5. Towards Realising Secure and Efficient Image and Video Processing Applications on Quantum Computers

    Microsoft Academic Search

    Abdullah M. Iliyasu

    2013-01-01

    Exploiting the promise of security and efficiency that quantum computing offers, the basic foundations leading to commercial applications for quantum image processing are proposed. Two mathematical frameworks and algorithms to accomplish the watermarking of quantum images, authentication of ownership of already watermarked images and recovery of their unmarked versions on quantum computers are proposed. Encoding the images as 2n-sized normalised

  6. NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission

    E-print Network

    Miami, University of

    NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission Poster Presentation Title: Measuring El Niño and Climate Impacts's Climate and Health Program is to better understand the effects of climate and anticipated impacts

  7. NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission

    E-print Network

    Miami, University of

    NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National for integrated services both across the agency and with external partners, the 36th NOAA Climate Security Challenges: Abstract Submission Presentation Title: Accelerating R2O and O2R for Climate

  8. EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond

    Microsoft Academic Search

    Karl Koscher; Ari Juels; Tadayoshi Kohno; Vjekoslav Brajkovic

    2008-01-01

    EPC (Electronic Product Code) tags are industry-standard RFID devices poised to supplant optical barcodes in many applications. They are prevalent in case and pallet track- ing, and also percolating into individual consumer items and border-crossing documents. In this paper, we explore the systemic risks and challenges created by increasingly common use of EPC for security ap- plications. As a central

  9. Semantically Rich Application-Centric Security in Android Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel

    E-print Network

    McDaniel, Patrick Drew

    the security decisions on the platform. Keywords-mobile phone security; Android; application interactions system community. The security model of the Android system (and that of many other phone operatingSemantically Rich Application-Centric Security in Android Machigar Ongtang, Stephen Mc

  10. Misinterpretation of statistical distance in security of quantum key distribution shown by simulation

    NASA Astrophysics Data System (ADS)

    Iwakoshi, Takehisa; Hirota, Osamu

    2014-10-01

    This study will test an interpretation in quantum key distribution (QKD) that trace distance between the distributed quantum state and the ideal mixed state is a maximum failure probability of the protocol. Around 2004, this interpretation was proposed and standardized to satisfy both of the key uniformity in the context of universal composability and operational meaning of the failure probability of the key extraction. However, this proposal has not been verified concretely yet for many years while H. P. Yuen and O. Hirota have thrown doubt on this interpretation since 2009. To ascertain this interpretation, a physical random number generator was employed to evaluate key uniformity in QKD. In this way, we calculated statistical distance which correspond to trace distance in quantum theory after a quantum measurement is done, then we compared it with the failure probability whether universal composability was obtained. As a result, the degree of statistical distance of the probability distribution of the physical random numbers and the ideal uniformity was very large. It is also explained why trace distance is not suitable to guarantee the security in QKD from the view point of quantum binary decision theory.

  11. Lowering social security's duration-of-marriage requirement: distributional effects for future female retirees.

    PubMed

    Tamborini, Christopher R; Whitman, Kevin

    2010-01-01

    A number of alternatives to Social Security's auxiliary benefit system have been proposed in the context of changes in American family and work patterns. This article focuses on one modification therein-lowering the 10-year duration-of-marriage requirement for divorced spouses. Using a powerful microsimulation model (MINT), we examine the distributional effects of extending spouse and survivor benefit eligibility to 5- and 7-year marriages ending in divorce among female retirees in 2030, a population largely comprised of baby boomers. Results show that the options would increase benefits for a small share of female retirees, around 2 to 4%, and would not affect the vast majority of low-income divorced older women. However, of those affected, the options would substantially increase benefits and lower incidence of poverty and near poor. Low-income divorced retirees with marriages between 5 and 9 years in length and a deceased former spouse face the greatest potential gains. PMID:20661806

  12. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable. PMID:24008848

  13. MDPHnet: secure, distributed sharing of electronic health record data for public health surveillance, evaluation, and planning.

    PubMed

    Vogel, Joshua; Brown, Jeffrey S; Land, Thomas; Platt, Richard; Klompas, Michael

    2014-12-01

    Electronic health record systems contain clinically detailed data from large populations of patients that could significantly enrich public health surveillance. Clinical practices' security, privacy, and proprietary concerns, however, have limited their willingness to share these data with public health agencies. We describe a novel distributed network for public health surveillance called MDPHnet. The system allows the Massachusetts Department of Public Health (MDPH) to initiate custom queries against participating practices' electronic health records while the data remain behind each practice's firewall. Practices can review proposed queries before execution and approve query results before releasing them to the health department. MDPH is using the system for routine surveillance for priority conditions and to evaluate the impact of public health interventions. PMID:25322301

  14. Experimental quantum key distribution with finite-key security analysis for noisy channels

    E-print Network

    Davide Bacco; Matteo Canale; Nicola Laurenti; Giuseppe Vallone; Paolo Villoresi

    2014-06-17

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  15. Quantum key distribution based on orthogonal states allows secure quantum bit commitment

    NASA Astrophysics Data System (ADS)

    He, Guang Ping

    2011-11-01

    For more than a decade, it was believed that unconditionally secure quantum bit commitment (QBC) is impossible. But based on a previously proposed quantum key distribution scheme using orthogonal states, here we build a QBC protocol in which the density matrices of the quantum states encoding the commitment do not satisfy a crucial condition on which the no-go proofs of QBC are based. Thus, the no-go proofs could be evaded. Our protocol is fault-tolerant and very feasible with currently available technology. It reopens the venue for other ‘post-cold-war’ multi-party cryptographic protocols, e.g. quantum bit string commitment and quantum strong coin tossing with an arbitrarily small bias. This result also has a strong influence on the Clifton-Bub-Halvorson theorem which suggests that quantum theory could be characterized in terms of information-theoretic constraints.

  16. Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications

    Microsoft Academic Search

    James Walden; Maureen Doyle; Robert Lenhof; John Murray

    2010-01-01

    \\u000a While Java and PHP are two of the most popular languages for open source web applications found at \\u000a freshmeat.net\\u000a , Java has had a much better security reputation than PHP. In this paper, we examine whether that reputation is deserved.\\u000a We studied whether the variation in vulnerability density is greater between languages or between different applications written\\u000a in a single

  17. J2ME application-layer end-to-end security for m-commerce

    Microsoft Academic Search

    Wassim Itani; Ayman I. Kayssi

    2004-01-01

    This paper shows an end-to-end application-layer security solution for wireless enterprise applications using the Java 2 Platform Micro Edition (J2ME). The proposed solution uses pure Java components to provide end-to-end client authentication and data confidentiality and integrity between wireless J2ME based-clients and J2EE based-servers. This solution can be implemented with the available limited resources of a Java MIDP device, without

  18. Secure E-Business applications based on the European Citizen Card

    NASA Astrophysics Data System (ADS)

    Zipfel, Christian; Daum, Henning; Meister, Gisela

    The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

  19. Securing while Sampling in Wireless Body Area Networks with Application to Electrocardiography.

    PubMed

    Dautov, Ruslan; Tsouri, Gill R

    2014-10-31

    Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources and present an implementation obstacle in compact sensornodes. This paper proposes a lightweight encryption framework augmenting Compressed Sensing with Wireless Physical Layer Security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm as well as the pre-deployment of a key thereby conserving sensor-node's limited resources. The proposed framework is evaluated using analysis, simulation and experimentation applied to a wireless electrocardiogram setup consisting of a sensor-node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor-node and the access point. PMID:25373134

  20. Distributed swirl combustion for gas turbine application

    Microsoft Academic Search

    Ahmed E. E. Khalil; Ashwani K. Gupta

    2011-01-01

    Colorless distributed combustion (CDC) has been shown to provide significant improvement in gas turbine combustor performance. Colorless distributed combustion with swirl is investigated here to develop ultra-low emissions of NO and CO, and significantly improved pattern factor. Experimental investigations have been performed using a cylindrical geometry combustor with swirling air injection and axial hot gas exit stream from the combustor.

  1. DISTRIBUTED MOBILE COMPUTER VISION AND APPLICATIONS ON THE

    E-print Network

    Lunds Universitet

    DISTRIBUTED MOBILE COMPUTER VISION AND APPLICATIONS ON THE ANDROID PLATFORM SEBASTIAN OLSSON PHILIP and limitations of computer vision applications on modern mobile devices. Depending on the application, some systems for object recognition on the mobile Android platform. It further describes the possibilities

  2. An RFID-based luggage and passenger tracking system for airport security control applications

    NASA Astrophysics Data System (ADS)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.

    2014-06-01

    Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.

  3. Geospatial Applications on Different Parallel and Distributed Systems in enviroGRIDS Project

    NASA Astrophysics Data System (ADS)

    Rodila, D.; Bacu, V.; Gorgan, D.

    2012-04-01

    The execution of Earth Science applications and services on parallel and distributed systems has become a necessity especially due to the large amounts of Geospatial data these applications require and the large geographical areas they cover. The parallelization of these applications comes to solve important performance issues and can spread from task parallelism to data parallelism as well. Parallel and distributed architectures such as Grid, Cloud, Multicore, etc. seem to offer the necessary functionalities to solve important problems in the Earth Science domain: storing, distribution, management, processing and security of Geospatial data, execution of complex processing through task and data parallelism, etc. A main goal of the FP7-funded project enviroGRIDS (Black Sea Catchment Observation and Assessment System supporting Sustainable Development) [1] is the development of a Spatial Data Infrastructure targeting this catchment region but also the development of standardized and specialized tools for storing, analyzing, processing and visualizing the Geospatial data concerning this area. For achieving these objectives, the enviroGRIDS deals with the execution of different Earth Science applications, such as hydrological models, Geospatial Web services standardized by the Open Geospatial Consortium (OGC) and others, on parallel and distributed architecture to maximize the obtained performance. This presentation analysis the integration and execution of Geospatial applications on different parallel and distributed architectures and the possibility of choosing among these architectures based on application characteristics and user requirements through a specialized component. Versions of the proposed platform have been used in enviroGRIDS project on different use cases such as: the execution of Geospatial Web services both on Web and Grid infrastructures [2] and the execution of SWAT hydrological models both on Grid and Multicore architectures [3]. The current focus is to integrate in the proposed platform the Cloud infrastructure, which is still a paradigm with critical problems to be solved despite the great efforts and investments. Cloud computing comes as a new way of delivering resources while using a large set of old as well as new technologies and tools for providing the necessary functionalities. The main challenges in the Cloud computing, most of them identified also in the Open Cloud Manifesto 2009, address resource management and monitoring, data and application interoperability and portability, security, scalability, software licensing, etc. We propose a platform able to execute different Geospatial applications on different parallel and distributed architectures such as Grid, Cloud, Multicore, etc. with the possibility of choosing among these architectures based on application characteristics and complexity, user requirements, necessary performances, cost support, etc. The execution redirection on a selected architecture is realized through a specialized component and has the purpose of offering a flexible way in achieving the best performances considering the existing restrictions.

  4. Applications of Photonuclear Physics for International Safeguards and Security

    SciTech Connect

    Johnson, M S; Hall, J M; McNabb, D P; McFarland, J; Norman, E; Bertozzi, W; Korbly, S; Ledoux, R; Park, W

    2010-04-16

    Studies of nuclear resonance fluorescence based applications are presented. Important for these applications are data for isotopes such as {sup 239}Pu. Nuclear resonance fluorescence measurements of {sup 239}Pu were performed at the free electron laser facility at UC Santa Barbara using photons from a bremsstrahlung beam with an endpoint energies between 4.0 MeV and 5.5 MeV. Though no discrete states with significant confidence level were measured, we have excluded the region above 27(3) eV-barns, or 4-sigma, where we would expect only a small chance of false positives. Details of the measurements and the results are presented here.

  5. REAL-TIME ENVIRONMENTAL MONITORING: APPLICATIONS FOR HOMELAND SECURITY

    EPA Science Inventory

    Real-time monitoring technology developed as part of the EMPACT program has a variety of potential applications. These tools can measure a variety of potential contaminants in the air, water, in buildings, or in the soil. Real-time monitoring technology allows these detection sys...

  6. A distributed slack bus model and its impact on distribution system application techniques

    Microsoft Academic Search

    Shiqiong Tong; Michael Kleinberg; Karen Miu

    2005-01-01

    Distribution system operating environments are changing rapidly. For example, with the steady and significant increase in dispersed generation expected, planning and operating application techniques must also change. This paper re-evaluates the single slack bus assumption typically employed in steady-state distribution power flow solvers. Specifically, a distributed slack bus model based on the concept of generator domains will be discussed and

  7. Insider-proof encryption with applications for quantum key distribution

    E-print Network

    Matthew McKague; Lana Sheridan

    2013-04-15

    It has been pointed out that current protocols for device independent quantum key distribution can leak key to the adversary when devices are used repeatedly and that this issue has not been addressed. We introduce the notion of an insider-proof channel. This allows us to propose a means by which devices with memories could be reused from one run of a device independent quantum key distribution protocol to the next while bounding the leakage to Eve, under the assumption that one run of the protocol could be completed securely using devices with memories.

  8. Applications of nuclear techniques relevant for civil security

    NASA Astrophysics Data System (ADS)

    Valkovi, Vlado

    2006-05-01

    The list of materials which are subject to inspection with the aim of reducing the acts of terrorism includes explosives, narcotics, chemical weapons, hazardous chemicals and radioactive materials. To this we should add also illicit trafficking with human beings. The risk of nuclear terrorism carried out by sub-national groups is considered not only in construction and/or use of nuclear device, but also in possible radioactive contamination of large urban areas. Modern personnel, parcel, vehicle and cargo inspection systems are non-invasive imaging techniques based on the use of nuclear analytical techniques. The inspection systems use penetrating radiations: hard x-rays (300 keV or more) or gamma-rays from radioactive sources (137Cs and 60Co with energies from 600 to 1300 keV) that produce a high resolution radiograph of the load. Unfortunately, this information is ''non-specific'' in that it gives no information on the nature of objects that do not match the travel documents and are not recognized by a visual analysis of the radiographic picture. Moreover, there are regions of the container where x and gamma-ray systems are ''blind'' due to the high average atomic number of the objects irradiated that appear as black spots in the radiographic image. Contrary to that is the use of neutrons; as results of the bombardment, nuclear reactions occur and a variety of nuclear particles, gamma and x-ray radiation is emitted, specific for each element in the bombarded material. The problem of material (explosive, drugs, chemicals, etc.) identification can be reduced to the problem of measuring elemental concentrations. Neutron scanning technology offers capabilities far beyond those of conventional inspection systems. The unique automatic, material specific detection of terrorist threats can significantly increase the security at ports, border-crossing stations, airports, and even within the domestic transportation infrastructure of potential urban targets as well as protecting armed forces and infrastructure.

  9. Security surveillance challenges and proven thermal imaging capabilities in real-world applications

    NASA Astrophysics Data System (ADS)

    Francisco, Glen L.; Roberts, Sharon

    2004-09-01

    Uncooled thermal imaging was first introduced to the public in early 1980's by Raytheon (legacy Texas Instruments Defense Segment Electronics Group) as a solution for military applications. Since the introduction of this technology, Raytheon has remained the leader in this market as well as introduced commercial versions of thermal imaging products specifically designed for security, law enforcement, fire fighting, automotive and industrial uses. Today, low cost thermal imaging for commercial use in security applications is a reality. Organizations of all types have begun to understand the advantages of using thermal imaging as a means to solve common surveillance problems where other popular technologies fall short. Thermal imaging has proven to be a successful solution for common security needs such as: ¸ vision at night where lighting is undesired and 24x7 surveillance is needed ¸ surveillance over waterways, lakes and ports where water and lighting options are impractical ¸ surveillance through challenging weather conditions where other technologies will be challenged by atmospheric particulates ¸ low maintenance requirements due to remote or difficult locations ¸ low cost over life of product Thermal imaging is now a common addition to the integrated security package. Companies are relying on thermal imaging for specific applications where no other technology can perform.

  10. Distribution automation applications of fiber optics

    NASA Technical Reports Server (NTRS)

    Kirkham, Harold; Johnston, A.; Friend, H.

    1989-01-01

    Motivations for interest and research in distribution automation are discussed. The communication requirements of distribution automation are examined and shown to exceed the capabilities of power line carrier, radio, and telephone systems. A fiber optic based communication system is described that is co-located with the distribution system and that could satisfy the data rate and reliability requirements. A cost comparison shows that it could be constructed at a cost that is similar to that of a power line carrier system. The requirements for fiber optic sensors for distribution automation are discussed. The design of a data link suitable for optically-powered electronic sensing is presented. Empirical results are given. A modeling technique that was used to understand the reflections of guided light from a variety of surfaces is described. An optical position-indicator design is discussed. Systems aspects of distribution automation are discussed, in particular, the lack of interface, communications, and data standards. The economics of distribution automation are examined.

  11. Iodine-129 AMS for Earth Science, Biomedical, and National Security Applications

    SciTech Connect

    Nimz, G; Brown, T; Tumey, S; Marchetti, A; Vu, A

    2007-02-20

    This Laboratory Directed Research and Development project created the capability to analyze the radionuclide iodine-129 ({sup 129}I) by accelerator mass spectrometry (AMS) in the CAMS facility at LLNL, and enhanced our scientific foundation for its application through development of sample preparation technology required for environmental, biomedical, and national security applications. The project greatly improved our environmental iodine extraction and concentration methodology, and developed new techniques for the analysis of small quantities of {sup 129}I. The project can be viewed as having two phases, one in which the basic instrumental and chemical extraction methods necessary for general {sup 129}I analysis were developed, and a second in which these techniques were improved and new techniques were developed to enable broader and more sophisticated applications. The latter occurred through the mechanism of four subprojects that also serve as proof-of-principle demonstrations of our newly developed {sup 129}I capabilities. The first subproject determined the vertical distribution of bomb-pulse {sup 129}I ({sup 129}Iv distributed globally as fallout from 1950's atmospheric nuclear testing) through 5 meters in the upper vadose zone in the arid southwestern United States. This characterizes migration mechanisms of contaminant {sup 129}I, or {sup 129}I released by nuclear fuel reprocessing, as well as the migration of labile iodine in soils relative to moisture flux, permitting a determination of nutrient cycling. The second subproject minimized the amount of iodine required in an AMS sample target. Because natural iodine abundances are very low in almost all environments, many areas of research had been precluded or made extremely difficult by the demands of sample size. Also, certain sample types of potential interest to national security are intrinsically small - for example iodine on air filters. The result of this work is the ability to measure the {sup 129}I/{sup 127}I ratio at the 2E-07 level or higher in a sample as small as a single raindrop. The third subproject tested the feasibility of using bomb-pulse {sup 129}I in shallow groundwaters in the Sierra Nevada to determine the source of waters entering into the Merced River. The sources of water and their time (age) within the hydrologic system is crucial to understanding the effects of climate change on California waters. The project is in collaboration with faculty and students at the University of California - Merced, and is now the subject of a follow-on Ph.D. dissertation project funded by the LLNL-URP University Education Participation Program. The fourth subproject examined the requirements for using the decay of {sup 129}I to date pore waters associated with continental shelf methane hydrate deposits. Understanding the age of formation and the historical stability of these hydrates is important in determining their response to climate change. Thawing of the world's methane hydrates would quickly and dramatically increase greenhouse gases in the atmosphere. The calculations and testing performed on this project have led to a follow on project that selectively implants {sup 127}I to the exclusion of {sup 129}I, creating an analytical iodine carrier with a substantially lower {sup 129}I background than is available from natural sources. This will permit measurement of {sup 129}I/{sup 127}I ratios at sub-10-14 levels, thereby providing a method for dating hydrate pore waters that are tens of millions of years old.

  12. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-print Network

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  13. 17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...4) Face-amount certificates or securities issued by an open-end management investment company or unit investment...certificate company, or redeemable securities issued by an open-end management investment company or a unit...

  14. A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents

    PubMed Central

    He, Hui; Fan, Guotao; Ye, Jianwei; Zhang, Weizhe

    2013-01-01

    It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement and anomaly detection. The key visualization algorithm and technology of the system are mainly discussed. The large-scale network system's plane visualization is realized based on the divide and conquer thought. First, the topology of the large-scale network is divided into some small-scale networks by the MLkP/CR algorithm. Second, the sub graph plane visualization algorithm is applied to each small-scale network. Finally, the small-scale networks' topologies are combined into a topology based on the automatic distribution algorithm of force analysis. As the algorithm transforms the large-scale network topology plane visualization problem into a series of small-scale network topology plane visualization and distribution problems, it has higher parallelism and is able to handle the display of ultra-large-scale network topology. PMID:24191145

  15. A topology visualization early warning distribution algorithm for large-scale network security incidents.

    PubMed

    He, Hui; Fan, Guotao; Ye, Jianwei; Zhang, Weizhe

    2013-01-01

    It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement and anomaly detection. The key visualization algorithm and technology of the system are mainly discussed. The large-scale network system's plane visualization is realized based on the divide and conquer thought. First, the topology of the large-scale network is divided into some small-scale networks by the MLkP/CR algorithm. Second, the sub graph plane visualization algorithm is applied to each small-scale network. Finally, the small-scale networks' topologies are combined into a topology based on the automatic distribution algorithm of force analysis. As the algorithm transforms the large-scale network topology plane visualization problem into a series of small-scale network topology plane visualization and distribution problems, it has higher parallelism and is able to handle the display of ultra-large-scale network topology. PMID:24191145

  16. Fabric: A Platform for Secure Distributed Computation and Storage Jed Liu Michael D. George K. Vikram

    E-print Network

    Myers, Andrew C.

    of two medical institutions that want to securely and quickly share patient information. This goal- tomated sharing of patient data poses difficulties. First, the security and privacy policies of the two, secure, consistent, and efficient access to what is logically a single patient record. Scenarios like

  17. Security in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. -

    E-print Network

    Shi, Weisong

    . There is currently enormous research potential in the field of wireless sensor network security. Thus, familiarity in the sensor security, classify many of the current attacks, and finally list their corresponding defensive ignored in most of the current research on sensor security. We classify the main aspects of wireless

  18. The Role of Earnings and Financial Risk in Distributional Analyses of Social Security Reform Measures

    ERIC Educational Resources Information Center

    Hungerford, Thomas L.

    2006-01-01

    The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…

  19. Virtualization and Programming Support for Video Sensor Networks with Application to Wireless and Physical Security

    NASA Astrophysics Data System (ADS)

    Bestavros, Azer; Ocean, Michael J.

    Network Security Systems are heavily anchored in the digital plane of "cyber space" and hence cannot be used effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts (i.e., escorting an intruder off the premises based on physical evidence). Embedded Sensor Networks (SNs) can be used to bridge the gap between digital and physical security planes, and thus can provide reciprocal benefit to security tasks on both planes. Toward that end, we present our experience integrating wireless networking security services into snBench (the Sensor Network workBench). snBench provides an extensible framework that enables the rapid development and automated deployment of SN applications on a shared, embedded sensing and actuation infrastructure. snBench's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the snBench framework, while high-level languages, compilers and execution environments allow novice SN programmers to compose SN service logic, unaware of the lower-level components on which their services rely. Concrete examples are provided to illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.

  20. Chile, 2009 APPLICATION OF A DISTRIBUTED WATERSHED

    E-print Network

    Michigan University, and the University of Michigan are jointly developing a Distributed Large Basin Runoff MODEL IN THE GREAT LAKES BASIN CARLO DEMARCHI School of Natural Resources & Environment, University of Michigan, 440 Church Street Ann Arbor, MI 48109-1041, United States THOMAS E. CROLEY II, TIMOTHY S. HUNTER

  1. Distributed Performance Monitoring: Methods, Tools, and Applications

    Microsoft Academic Search

    Richard Hofmann; Rainer Klar; Bernd Mohr; Andreas Quick; Markus Siegle

    1994-01-01

    A method for analyzing the functional behavior and the performance of programs in distributed systems is presented. We use hybrid monitoring, a technique which combines advantages of both software monitoring and hardware monitoring. The paper contains a description of a hardware monitor and a software package (ZM4\\/SIMPLE) which make our concepts available to programmers, assisting them in debugging and tuning

  2. Automatic Data Distribution for CFD Applications on Structured Grids

    NASA Technical Reports Server (NTRS)

    Frumkin, Michael; Yan, Jerry; Saini, Subhash (Technical Monitor)

    1999-01-01

    Development of HPF versions of NPB and ARC3D showed that HPF has potential to be a high level language for parallelization of CFD applications. The use of HPF requires an intimate knowledge of the applications and a detailed analysis of data affinity, data movement and data granularity. Since HPF hides data movement from the user even with this knowledge it is easy to overlook pieces of the code causing low performance of the application. In order to simplify and accelerate the task of developing HPF versions of existing CFD applications we have designed and partially implemented ADAPT (Automatic Data Distribution and Placement Tool). The ADAPT analyzes a CFD application working on a single structured grid and generates HPF TEMPLATE, (RE)DISTRIBUTION, ALIGNMENT and INDEPENDENT directives. The directives can be generated on the nest level, subroutine level, application level or inter application level. ADAPT is designed to annotate existing CFD FORTRAN application performing computations on single or multiple grids. On each grid the application can considered as a sequence of operators each applied to a set of variables defined in a particular grid domain. The operators can be classified as implicit, having data dependences, and explicit, without data dependences. In order to parallelize an explicit operator it is sufficient to create a template for the domain of the operator, align arrays used in the operator with the template, distribute the template, and declare the loops over the distributed dimensions as INDEPENDENT. In order to parallelize an implicit operator, the distribution of the operator's domain should be consistent with the operator's dependences. Any dependence between sections distributed on different processors would preclude parallelization if compiler does not have an ability to pipeline computations. If a data distribution is "orthogonal" to the dependences of an implicit operator then the loop which implements the operator can be declared as INDEPENDENT.

  3. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    PubMed Central

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  4. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    PubMed

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  5. Towards Reliable Cross Sections for National Security Applications

    SciTech Connect

    Escher, J E; Dietrich, F S; Nobre, G A; Thompson, I J

    2011-02-24

    Stockpile stewardship requires the description of weapons performance without resorting to underground nuclear testing. In the earlier tests, selected isotopes were used as detectors, and recovered after irradiation. Aspects of nuclear device performance were inferred by comparing the measured isotopic ratios to those predicted from simulations. The reaction flows that produce the final isotopic distributions proceed through regions of the nuclear chart that include unstable nuclei. Presently, improved nuclear data input is required to reanalyze prior tests and to certify the stockpile's reliability and safety. Many important cross sections are unknown, as is shown in the example of the Yttrium reaction network (Figure 1). The relevant reactions include (n,2n), (n,n'), (n,gamma), (n,p) and other charged-particle emitting reactions. The cross sections have to be calculated or inferred from indirect measurements. In both cases, reliable optical models that are valid a few nucleons away from stability are needed. The UNEDF Nuclear Reaction activities address this need by combining nuclear-structure input from UNEDF structure calculations with modern reaction theory and large-scale computational capabilities to develop microscopic nucleon-nucleus optical potentials that can be extrapolated to unstable nuclei. In addition, the reaction calculation tools and optical models developed in this context are proving valuable for planning and interpreting indirect (surrogate) measurements of the required cross sections.

  6. Transparent Process Migration for Distributed Applications in a Beowulf Cluster

    E-print Network

    Claypool, Mark

    Transparent Process Migration for Distributed Applications in a Beowulf Cluster Mark Claypool {claypool | dfinkel}@cs.wpi.edu Abstract Powerful, low-cost clusters of personal computers, such as Beowulf clusters, have fueled the potential for widespread distributed computation. While these Beowulf clusters

  7. Distributed expert systems for ground and space applications

    NASA Technical Reports Server (NTRS)

    Buckley, Brian; Wheatcraft, Louis

    1992-01-01

    Presented here is the Spacecraft Command Language (SCL) concept of the unification of ground and space operations using a distributed approach. SCL is a hybrid software environment borrowing from expert system technology, fifth generation language development, and multitasking operating system environments. Examples of potential uses for the system and current distributed applications of SCL are given.

  8. Deterministic Replay of Distributed Java Applications Ravi Konuru

    E-print Network

    Choi, Jong-Deok

    . An application of this framework was previously pub­ lished in the context of a system called DejaVu that pro(JVM). In contrast, this pa­ per focuses on distributed DejaVu that provides determinis­ tic replay of distributed, implementation and preliminary performance results of dis­ tributed DejaVu that supports both multi

  9. Distributed Embedded Smart Cameras for Surveillance Applications

    Microsoft Academic Search

    Michael Bramberger; Andreas Doblander; Arnold Maier; Bernhard Rinner; Helmut Schwabach

    2006-01-01

    Recent advances in computing, communication, and sensor technology are pushing the development of many new applications. This trend is especially evident in pervasive computing, sensor networks, and embedded systems. Smart cameras, one example of this innovation, are equipped with a high-performance onboard computing and communication infrastructure, combining video sensing, processing, and communications in a single embedded device. By providing access

  10. Distribution of Shared Key (Secret Key) using USB Dongle based identity approach for authenticated access in Mobile Agent Security

    Microsoft Academic Search

    R. Kumaravelu; N. Kasthuri

    2010-01-01

    The protection of Mobile Agent against malicious Agent is the very essential task and it seems to be more challenging task also. Due to not having adequate security the Mobile Agent environment does not have full adaptation in the real world applications. Every Mobile Agent in the environment needs a mechanism to identify the Non-malicious Agent that is Trusted Agent

  11. Application of fuzzy distributions on project management

    Microsoft Academic Search

    Don-Lin Mon; Ching-Hsue Cheng; Han-Chung Lu

    1995-01-01

    PERT\\/cost which is an extension of PERT to include economic considerations brings cost factors into project control decisions. However, PERT\\/cost is usually developed by project managers without enough experience. In calculating the critical path of crisp PERT\\/cost network, we usually suppose that all activity durations follow beta distribution of three time parameters (ai, mi, bi), i.e., the mean and variance

  12. KnittingFactory: An Infrastructure for Distributed Web Applications

    E-print Network

    perspective for Web applications, some problems are still unsolved. Among these are the question of how JavaKnittingFactory: An Infrastructure for Distributed Web Applications TR 1997­748 A. Baratloo, M Sciences New York University November 13, 1997 Abstract While Java and applets have created a new

  13. KnittingFactory: An Infrastructure for Distributed Web Applications

    E-print Network

    perspective for Web applications, some problems are still unsolved. Among these are the question of how JavaKnittingFactory: An Infrastructure for Distributed Web Applications TR 1997--748 A. Baratloo, M Sciences New York University November 13, 1997 Abstract While Java and applets have created a new

  14. Automatic Configuration and Run-time Adaptation of Distributed Applications

    Microsoft Academic Search

    Fangzhe Chang; Vijay Karamcheti

    2000-01-01

    Current technology trends point towards both an increased heterogeneity in hardware platforms and an increase in the mechanisms available to applications for controlling how these platforms are utilized. These trends motivate the design of resource-aware distributed applications, which proactively monitor and control utilization of the underlying platform, ensuring a desired performance level by adapting their behavior to changing resource characteristics.

  15. Distributed reinforcement learning for a traffic engineering application

    Microsoft Academic Search

    Mark D. Pendrith

    2000-01-01

    In this paper, we report on novel reinforcement learning tech- niques applied to a real-world application. The problem do- main, a traffic engineering application, is formulated as a distributed reinforcement learning problem, where the re- turns of many agents are simultaneously updating a single shared policy. Learning occurs off-line in a traffic simulator, which allows us to retrieve and exploit

  16. Component-based middleware for distributed augmented reality applications

    E-print Network

    Paris-Sud XI, Université de

    Component-based middleware for distributed augmented reality applications Mehdi Chouiten IBISC to Augmented Reality / Mixed Reality (AR/MR) applications. The goal is to offer an environment. This comparison being meant as a starting point to extend our own framework (ARCS: Augmented Reality Component

  17. Time-Variant Distributed Agent Matching Applications David Sarne1

    E-print Network

    Kraus, Sarit

    . This is where each agent is associated with a specific type that cap- tures special characterizing propertiesTime-Variant Distributed Agent Matching Applications David Sarne1 and Sarit Kraus1,2 1 Department partnership formation is an important infrastructure for many plausible MAS applications. Each agent evaluates

  18. International and national security applications of cryogenic detectors - mostly nuclear safeguards

    SciTech Connect

    Rabin, Michael W [Los Alamos National Laboratory

    2009-01-01

    As with science, so with security - in both arenas, the extraordinary sensitivity of cryogenic sensors enables high-confidence detection and high-precision measurement even of the faintest signals. Science applications are more mature, but several national and international security applications have been identified where cryogenic detectors have high potential payoff. International safeguards and nuclear forensics are areas needing new technology and methods to boost speed, sensitivity, precision and accuracy. Successfully applied, improved nuclear materials analysis will help constrain nuclear materials diversion pathways and contribute to treaty verification. Cryogenic microcalorimeter detectors for X-ray, gamma ray, neutron, and alpha particle spectrometry are under development with these aims in mind. In each case the unsurpassed energy resolution of microcalorimeters reveals previously invi sible spectral features of nuclear materials. Preliminary results of quantitative analysis indicate substantial improvements are still possible, but significant work will be required to fully understand the ultimate performance limits.

  19. Mobility and Coordination for Distributed Java Applications

    Microsoft Academic Search

    Paolo Ciancarini; Andrea Giovannini; Davide Rossi

    1999-01-01

    A mobile agent is a piece of code which can move among the nodes of a network of computers, looking for data and services.\\u000a There are currently several programming languages and systems to develop applications including mobile agents. They are widely\\u000a different, and it is not easy to understand how they differ. We propose a taxonomy classifying different kinds of

  20. Synchronization of general chaotic systems using neural controllers with application to secure communication

    Microsoft Academic Search

    Mansour SheikhanReza Shahnazi; Reza Shahnazi; Sahar Garoucy

    The main contribution of this paper is to propose a nonlinear robust controller to synchronize general chaotic systems, such\\u000a that the controller does not need the information of the chaotic system’s model. Following this purpose, in this paper, two\\u000a methods are proposed to synchronize general forms of chaotic systems with application in secure communication. The first method\\u000a uses radial basis

  1. Secure and quality of service assurance scheduling scheme for WBAN with application to eHealth

    Microsoft Academic Search

    Mrinmoy Barua; M. S. Alam; Xiaohui Liang

    2011-01-01

    Wireless Body Area Network (WBAN) is gaining popularity due to its large scale of applications in eHealth. Due to its critical and real-time nature, eHealth care system must provide security, privacy, and quality of service (QoS) support, in order to provide an efficient, valuable and fully reliable assistance to patients. This paper studies packet scheduling schemes for real- time transmission

  2. A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri

    E-print Network

    McDaniel, Patrick Drew

    on particular security issues, there remains little insight into broader security characteristics of smartphone of smartphone applications based on static analysis of 21 million lines of recovered code. Our analysis and analytics networks. However, we did not find ev- idence of malware or exploitable vulnerabilities

  3. ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications

    E-print Network

    Chrzaszcz, Jacek

    ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications Aleksy Schubert1 static checking tools like ESC/Java2 can be used to ensure source code security properties of Java is further accompanied by a presentation on how these threats can be controlled by JML specifications and ESC/Java

  4. Generalized perton distributions: analysis and applications

    E-print Network

    P. Kroll

    2004-12-14

    Results from a recent analysis of the zero-skewness generalized parton distributions (GPDs) for valence quarks are discussed. The analysis bases on a physically motivated parameterization of the GPDs with a few free parameters adjusted to the available nucleon form factor data. Various moments of the GPDs as well as their Fourier transfroms, the quark densities in the impact parameter plane, are also presented. The 1/x moments of the zero-skewness GPDs are form factors specific to Compton scattering off protons within the handbag approach. The results of the GPD analysis enables one to predict Compton scattering.

  5. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    NASA Astrophysics Data System (ADS)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  6. Distributed Temperature Sensing: Review of Technology and Applications

    E-print Network

    Ukil, A; Krippner, P

    2015-01-01

    Distributed temperature sensors (DTS) measure temperatures by means of optical fibers. Those optoelectronic devices provide a continuous profile of the temperature distribution along the cable. Initiated in the 1980s, DTS systems have undergone significant improvements in the technology and the application scenario over the last decades. The main measuring principles are based on detecting the back-scattering of light, e.g., detecting via Rayleigh, Raman, Brillouin principles. The application domains span from traditional applications in the distributed temperature or strain sensing in the cables, to the latest smart grid initiative in the power systems, etc. In this paper, we present comparative reviews of the different DTS technologies, different applications, standard and upcoming, different manufacturers.

  7. Applications Analysis: Principles and Examples from Various Distributed Computer Applications at Sandia National Laboratories New Mexico

    SciTech Connect

    Bateman, Dennis; Evans, David; Jensen, Dal; Nelson, Spencer

    1999-08-01

    As information systems have become distributed over many computers within the enterprise, managing those applications has become increasingly important. This is an emerging area of work, recognized as such by many large organizations as well as many start-up companies. In this report, we present a summary of the move to distributed applications, some of the problems that came along for the ride, and some specific examples of the tools and techniques we have used to analyze distributed applications and gain some insight into the mechanics and politics of distributed computing.

  8. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ...Release No. 34-61400; File No. 10-198] BATS Y-Exchange, Inc.; Notice of Filing of Application...1934 January 22, 2010. On October 20, 2009, BATS Y-Exchange, Inc. (``BATS Y Exchange'') submitted to the Securities...

  9. 78 FR 3042 - J.P. Morgan Securities LLC, et al.; Notice of Application and Temporary Order

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ...applicant using the Company name box, at http...limited liability company organized under the laws of Delaware, is registered...broker-dealer under the Securities Exchange Act of 1934...limited liability companies; neither is...

  10. Secure Recording of Itineraries through Co-operating Agents

    E-print Network

    Roth, Volker

    Abstract Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper formed. Keywords: mobile agent security, malicious host, distributed applications, itinerary, agent]. Unfortunately, some security issues in itinerant or mobile agent systems are hard to solve. A prominent example

  11. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    SciTech Connect

    Martin, Madhavi Z [ORNL; Wullschleger, Stan D [ORNL; Vass, Arpad Alexander [ORNL; Martin, Rodger Carl [ORNL; Grissino-Mayer, Henri [ORNL

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  12. A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture

    Microsoft Academic Search

    Kawser Wazed Nafi; Tonny Shekha Kar; Sayed Anisul Hoque; M. M. A Hashem

    2012-01-01

    The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures

  13. Wireless PKI and Distributed IDS for Securing Intranets and M-Commerce

    Microsoft Academic Search

    Kai Hwang

    Recent R\\/D advances are presented in this keynote address on wireless and security technologies. To access Internet from mobile devices, the existing public key infrastructure (PKI) must be modified to work with limited wireless network bandwidth and low computing and memory capacity of handheld devices. A complete security chain is needed from smart cards to mobile clients, wireless PKI (WPKI)

  14. An appraisal of the Burr distribution for hydrological applications

    NASA Astrophysics Data System (ADS)

    Ganora, Daniele; Laio, Francesco

    2014-05-01

    The extended three-parameter Burr XII is a probability distribution function rarely used in hydrology, while this distribution is more popular in other disciplines. The aim of this contribution is (i) to define the scope of this distribution in hydrological applications, (ii) to describe a simplified method to estimate the distribution parameters based on the sample L-moments, and (iii) to discuss an application aimed at representing the Flow Duration Curve (FDC) with the Burr distribution. Compared to other three-parameter distributions, the Burr is particularly appealing because its range covers positive values only, which of course is convenient when modeling streamflows; moreover, the distribution has two shape parameters, which allows it to be quite flexible and to adapt well to many different shapes of the frequency curves and FDC. The third parameter of the distribution is a scale factor. Despite in the literature the most important methods for parameter estimation have been already discussed, current approaches still require numerical solution of two joint non-linear equations to evaluate the shape parameters of the distribution. This can hamper the use of the Burr distribution in practical applications due to the difficulties in implementing and controlling the estimation procedure. These difficulties are particularly relevant in extensive applications, such as the mapping of the FDCs in many section of a river network, or when professionals without expertise in numerical computation are involved. In this work we develop a simplified, although accurate, set of explicit equations to compute the two shape parameters starting from the L-CV and the L-skewness coefficients. This goal is achieved by properly weighting a set of simple base functions over the domain of the Burr distribution in the L-CV vs L-skewness space. The Burr distribution has been applied to represent the FDC of an extensive set of data including about 120 time series from stations located in Northwestern Italy. The obtained results are very encouraging in terms of quality of the representation (smaller errors compared to other distributions) and capacity to represent the FDC also in the low-flows range; in fact, other three-parameter distributions have the problem that the lower bound can be either larger than the minimum observed value, which is inconsistent with the observations, or lower than zero, which implies non-null probability of having negative streamflows.

  15. An automated approach for tone mapping operator parameter adjustment in security applications

    NASA Astrophysics Data System (ADS)

    Krasula, LukáÅ.¡; Narwaria, Manish; Le Callet, Patrick

    2014-05-01

    High Dynamic Range (HDR) imaging has been gaining popularity in recent years. Different from the traditional low dynamic range (LDR), HDR content tends to be visually more appealing and realistic as it can represent the dynamic range of the visual stimuli present in the real world. As a result, more scene details can be faithfully reproduced. As a direct consequence, the visual quality tends to improve. HDR can be also directly exploited for new applications such as video surveillance and other security tasks. Since more scene details are available in HDR, it can help in identifying/tracking visual information which otherwise might be difficult with typical LDR content due to factors such as lack/excess of illumination, extreme contrast in the scene, etc. On the other hand, with HDR, there might be issues related to increased privacy intrusion. To display the HDR content on the regular screen, tone-mapping operators (TMO) are used. In this paper, we present the universal method for TMO parameters tuning, in order to maintain as many details as possible, which is desirable in security applications. The method's performance is verified on several TMOs by comparing the outcomes from tone-mapping with default and optimized parameters. The results suggest that the proposed approach preserves more information which could be of advantage for security surveillance but, on the other hand, makes us consider possible increase in privacy intrusion.

  16. Multi-channel thermal infrared communications using engineered blackbody radiation for security applications

    NASA Astrophysics Data System (ADS)

    Hu, F.; Liang, X.; Lucyszyn, S.

    2014-10-01

    The thermal (emitted) infrared frequency bands, typically from 20-40 THz and 60-100 THz, are best known for applications in thermography, such as target acquisition, surveillance, night vision, and remote sensing. This unregulated part of the spectral range offers opportunities for the development of short-range secure communications. The `THz Torch' concept was recently demonstrated by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels. The energy in each channel is then independently pulse-modulated, transmitted and detected, creating a robust form of short-range secure communications in the far/mid infrared. In this paper, recent progress for the `THz Torch' technology will be presented; the physical level integrity for multichannel proof-of-concept working demonstrators will be evaluated. By exploring a diverse range of methods, significant enhancements to both data rate and distance can be expected. Our thermodynamics-based approach represents a new paradigm in the sense that 19th century physics can be exploited with 20th century multiplexing concepts for low-cost 21st century ubiquitous security and defence applications in the thermal infrared range.

  17. Parallel Distributed Application Performance and Message Passing: A case study

    Microsoft Academic Search

    Nayeem Islam; Robert E. Mcgrath; Roy H. Campbell

    1993-01-01

    This paper discusses experimental results concerning the design of message passing systemsoftware for shared memory and distributed memory multiprocessors as well as networks ofworkstations. It compares the performance of example applications and simple benchmarksrunning on the same operating system and message passing system on a shared memory EncoreMultimax multiprocessor, on the distributed memory Intel iPSC\\/2 and on a network of

  18. Development of passive submillimeter-wave video imaging systems for security applications

    NASA Astrophysics Data System (ADS)

    Heinz, Erik; May, Torsten; Born, Detlef; Zieger, Gabriel; Brömel, Anika; Anders, Solveig; Zakosarenko, Vyacheslav; Krause, Torsten; Krüger, André; Schulz, Marco; Bauer, Frank; Meyer, Hans-Georg

    2012-10-01

    Passive submillimeter-wave imaging is a concept that has been in the focus of interest as a promising technology for security applications for a number of years. It utilizes the unique optical properties of submillimeter waves and promises an alternative to millimeter-wave and X-ray backscattering portals for personal security screening in particular. Possible application scenarios demand sensitive, fast, and flexible high-quality imaging techniques. Considering the low radiometric contrast of indoor scenes in the submillimeter range, this objective calls for an extremely high detector sensitivity that can only be achieved using cooled detectors. Our approach to this task is a series of passive standoff video cameras for the 350 GHz band that represent an evolving concept and a continuous development since 2007. The cameras utilize arrays of superconducting transition-edge sensors (TES), i. e. cryogenic microbolometers, as radiation detectors. The TES are operated at temperatures below 1 K, cooled by a closed-cycle cooling system, and coupled to superconducting readout electronics. By this means, background limited photometry (BLIP) mode is achieved providing the maximum possible signal to noise ratio. At video rates, this leads to a pixel NETD well below 1K. The imaging system is completed by reflector optics based on free-form mirrors. For object distances of 3-10 m, a field of view up to 2m height and a diffraction-limited spatial resolution in the order of 1-2 cm is provided. Opto-mechanical scanning systems are part of the optical setup and capable frame rates up to 25 frames per second. Both spiraliform and linear scanning schemes have been developed. Several electronic and software components are used for system control, signal amplification, and data processing. Our objective is the design of an application-ready and user-friendly imaging system. For application in real world security screening scenarios, it can be extended using image processing and automated threat detection software.

  19. A Component-based Programming Model for Composite, Distributed Applications

    NASA Technical Reports Server (NTRS)

    Eidson, Thomas M.; Bushnell, Dennis M. (Technical Monitor)

    2001-01-01

    The nature of scientific programming is evolving to larger, composite applications that are composed of smaller element applications. These composite applications are more frequently being targeted for distributed, heterogeneous networks of computers. They are most likely programmed by a group of developers. Software component technology and computational frameworks are being proposed and developed to meet the programming requirements of these new applications. Historically, programming systems have had a hard time being accepted by the scientific programming community. In this paper, a programming model is outlined that attempts to organize the software component concepts and fundamental programming entities into programming abstractions that will be better understood by the application developers. The programming model is designed to support computational frameworks that manage many of the tedious programming details, but also that allow sufficient programmer control to design an accurate, high-performance application.

  20. Architecting Distributed Control Applications Based on (Re)Configurable Middleware

    Microsoft Academic Search

    Geert Deconinck; Vincenzo De Florio; Ronnie Belmans

    2003-01-01

    \\u000a Industrial distributed automation applications call for reusable software components, without endangering dependability. The\\u000a DepAuDE architecture provides middleware to integrate fault tolerance support into such applications based on a library of detection, reconfiguration and recovery functions, and a language for expressing non-functional services, such as configuration and fault tolerance. At run time, a middleware layer orchestrates\\u000a the execution of recovery actions.

  1. Cryptographic security of the quantum key distribution from the triangle inequality

    E-print Network

    Pawel Kurzynski; Marcin Markiewicz; Dagomir Kaszlikowski

    2014-09-22

    We show that the Csiszar-Korner sufficient condition for secure cryptographic key generation with the help of quantum theory can be easily derived using the triangle inequality for an information-theoretic distance.

  2. Preclinical assessment of comfort and secure fit of thermobrachytherapy surface applicator (TBSA) on volunteer subjects.

    PubMed

    Arunachalam, Kavitha; Craciunescu, Oana I; Markewitz, Edward J; Maccarini, Paolo F; Schlorff, Jaime L; Stauffer, Paul R

    2012-01-01

    A thermobrachytherapy surface applicator (TBSA) was developed for simultaneous heat and brachytherapy treatment of chest wall (CW) recurrence of breast cancer. The ability to comfortably secure the applicator over the upper torso relative to the CW target throughout treatment is assessed on volunteers. Male and postmastectomy female volunteers were enrolled to evaluate applicator secure fit to CW. Female subjects with intact breast were also enrolled to assess the ability to treat challenging cases. Magnetic resonance (MR) images of volunteers wearing a TBSA over the upper torso were acquired once every 15 minutes for 90 minutes. Applicator displacement over this time period required for treatment preplanning and delivery was assessed using MR visible markers. Applicator comfort and tolerability were assessed using a questionnaire. Probability estimates of applicator displacements were used to investigate dosimetric impact for the worst-case variation in radiation source-to-skin distance for 5 and 10 mm deep targets spread 17 × 13 cm on a torso phantom. Average and median displacements along lateral and radial directions were less than 1.2 mm over 90 minutes for all volunteers. Maximum lateral and radial displacements were measured to be less than 1 and 1.5 mm, respectively, for all CW volunteers and less than 2 mm for intact breast volunteers, excluding outliers. No complaint of pain or discomfort was reported. Phantom treatment planning for the maximum displacement of 2 mm indicated < 10% increase in skin dose with < 5% loss of homogeneity index (HI) for -2 mm uniform HDR source displacement. For +2 mm uniform displacement, skin dose decreased and HI increased by 20%. The volunteer study demonstrated that such large and uniform displacements should be rare for CW subjects, and the measured variation is expected to be low for multifraction conformal brachytherapy treatment. PMID:22955650

  3. An integrated system for secure code distribution in Wireless Sensor Networks

    Microsoft Academic Search

    Nicola Bui; Osman Ugus; Moreno Dissegna; Michele Rossi; Michele Zorzi

    2010-01-01

    This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentication protocol it provides protection against the corruption of code images during their dissemination. Au- thentication routines exploit a lightweight asymmetric T-time signature algorithm (1) and allow the out-of-order reception of data blocks. Second, confidentiality is

  4. Analysis of Hawaii Biomass Energy Resources for Distributed Energy Applications

    E-print Network

    Analysis of Hawaii Biomass Energy Resources for Distributed Energy Applications Prepared for State) concentrations on a unit energy basis for sugar cane varieties and biomass samples Energy Institute School of Ocean and Earth Sciences and Technology Scott Q. Turn Vheissu Keffer Milton

  5. Consideration of non-Poisson distributions for lidar applications

    E-print Network

    Ruf, Christopher

    realizations are often averaged to improve the signal-to-noise ratio SNR at the cost of temporal resolutionConsideration of non-Poisson distributions for lidar applications Andrew J. Gerrard, Timothy J of received photon counts from stationary processes in incoherent-detection lidar systems. However

  6. Distributed Web Application Development with Active Web Objects

    Microsoft Academic Search

    Gustaf Neumann; Uwe Zdun

    2001-01-01

    Modern distributed web applications shouldoer high customizability, various communicationresources, exible data and documentrepresentations, persistence, metadata, mechanismsfor interaction and coordination, etc.Often these requirements are realized with adiverse set of technologies, which are orthogonalto web technology and based on overlappingconcepts, abstractions, and paradigms.In this paper we present ActiWeb as a singleframework which centers around the notionof active web...

  7. Architectural design of a distributed application with autonomic quality requirements

    Microsoft Academic Search

    Danny Weyns; Kurt Schelfthout; Tom Holvoet

    2005-01-01

    An autonomic system is essentially characterized by quality requirements that specify that the system should be able to adapt itself (configure optimize, heal, etc.) under varying circumstances and situations. These quality requirements call for an architecture centric software engineering approach. In this paper, we discuss and illustrate the architectural design of a complex real-world distributed application with autonomic quality requirements.

  8. A Java Middleware Platform for Resource-Aware Distributed Applications

    E-print Network

    Paris-Sud XI, Université de

    A Java Middleware Platform for Resource-Aware Distributed Applications Frédéric Guidec, Yves Mahéo.Guidec|Yves.Maheo|Luc.Courtrai}@univ-ubs.fr Abstract This paper reports the development of D-RAJE (Dis- tributed Resource-Aware Java Environment), a Java-based middleware platform that makes it possible to model and to monitor resources

  9. Microprocessor applications in a distributed energy management system

    Microsoft Academic Search

    Meals

    1985-01-01

    The purpose of this study is to develop a microprocessor based controller for applications in a distributed energy management system. The controller is applied to two energy devices, an industrial boiler and a chiller. The hardware\\/software system that developed is quite general in nature and is discussed in the text with emphasis on essential functions. The appendices contain a listing

  10. SOIL PHOSPHOROUS SPATIAL DISTRIBUTION IN PASTURES RECEIVING POULTRY LITTER APPLICATIONS

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Environmentally-based P management strategies could be improved by delineating management zones incorporating the effects of landscape position on soil morphology, hydrology, and soil P distribution. Three farm pasture sites in SW Missouri receiving long-term poultry litter applications were sampled...

  11. Cryogenic Propellant Storage and Distribution for Space Exploration Applications

    E-print Network

    Space Suit Life Support Systems 2007 Phase II Proposal X9.01-9829 Advanced, Long-Life Cryocooler Change Material Thermal Pack for Portable Life Support Systems Paragon Space Development Corporation #12;SBIR SBIR 46 47 I Cryogenic Propellant Storage and Distribution for Space Exploration Applications

  12. Two-photon polarization data storage in bacteriorhodopsin films and its potential use in security applications

    SciTech Connect

    Imhof, Martin; Hampp, Norbert, E-mail: hampp@staff.uni-marburg.de [Department of Chemistry, Material Sciences Center, University of Marburg, Hans-Meerwein-Str., D-35032 Marburg (Germany); Rhinow, Daniel [Max-Planck-Institute of Biophysics, Max-von-Laue-Straße 3, D-60438 Frankfurt (Germany)

    2014-02-24

    Bacteriorhodopsin (BR) films allow write-once-read-many recording of polarization data by a two-photon-absorption (TPA) process. The optical changes in BR films induced by the TPA recording were measured and the Müller matrix of a BR film was determined. A potential application of BR films in security technology is shown. Polarization data can be angle-selective retrieved with high signal-to-noise ratio. The BR film does not only carry optical information but serves also as a linear polarizer. This enables that polarization features recorded in BR films may be retrieved by merely using polarized light from a mobile phone display.

  13. An efficient wireless power transfer system with security considerations for electric vehicle applications

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Chau, K. T.; Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-01

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  14. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the target site that is running the VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

  15. Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the. target site that is running the . VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

  16. An efficient wireless power transfer system with security considerations for electric vehicle applications

    SciTech Connect

    Zhang, Zhen; Chau, K. T., E-mail: ktchau@eee.hku.hk; Liu, Chunhua; Qiu, Chun; Lin, Fei [Department of Electrical and Electronic Engineering, The University of Hong Kong, Pokfulam Road, Hong Kong (China)

    2014-05-07

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  17. Distortion invariant correlation filters application for quality inspection of master-matrix for security holograms

    NASA Astrophysics Data System (ADS)

    Zlokazov, Evgeny; Shaulskiy, Dmitriy; Starikov, Rostislav; Odinokov, Sergey; Zherdev, Alexander; Koluchkin, Vasiliy; Shvetsov, Ivan; Smirnov, Andrey

    2013-03-01

    Security holograms (SH) are perspective for document and product authenticity protection due to difficulties of such a protection mark falsification. Mass production of SH uses widespread technology of hot foil or lavsan paper stamping. The quality of holograms significantly depends on perfection of nickel master-matrix that is used in stamping equipment. We represent the method of automatic quality inspection of nickel master-matrix based on digital processing of its surface relief microphotographs. Proposed processing algorithm is based on combination of image spatial frequency analysis and image matching using distortion invariant correlation filters. The results of our method application for real SH master-matrices inspection are shown in this paper.

  18. Using 3D Models And Discrete Simulations In Infrastructure Security Applications

    NASA Astrophysics Data System (ADS)

    Assogna, Pierluigi; Bertocchi, Glauco; Paoluzzi, Alberto; Vicentino, Michele; Scorzelli, Giorgio; Zollo, Roberto

    Next generation systems for critical infrastructure protection must support capabilities such as behavior analysis, situation modeling and data mining integrated within sophisticated virtual or augmented reality interfaces. This paper describes the design goals and implementation of a platform for critical infrastructure security applications. The platform is designed to support semi-automated 3D modeling of infrastructures, 3D integration of sensor networks, situation modeling and visual simulation via 3D animation, and advanced situation analysis. Such a system would enable operators to recognize preliminary indications of crisis situations and promptly activate the appropriate countermeasures. It would also assist them in optimizing normal operations and conducting simulations for emergency planning and crisis management.

  19. Coordinating complex decision support activities across distributed applications

    NASA Technical Reports Server (NTRS)

    Adler, Richard M.

    1994-01-01

    Knowledge-based technologies have been applied successfully to automate planning and scheduling in many problem domains. Automation of decision support can be increased further by integrating task-specific applications with supporting database systems, and by coordinating interactions between such tools to facilitate collaborative activities. Unfortunately, the technical obstacles that must be overcome to achieve this vision of transparent, cooperative problem-solving are daunting. Intelligent decision support tools are typically developed for standalone use, rely on incompatible, task-specific representational models and application programming interfaces (API's), and run on heterogeneous computing platforms. Getting such applications to interact freely calls for platform independent capabilities for distributed communication, as well as tools for mapping information across disparate representations. Symbiotics is developing a layered set of software tools (called NetWorks! for integrating and coordinating heterogeneous distributed applications. he top layer of tools consists of an extensible set of generic, programmable coordination services. Developers access these services via high-level API's to implement the desired interactions between distributed applications.

  20. Security model for VM in cloud

    NASA Astrophysics Data System (ADS)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.