Search results
Filter
Filetype
Your search for "*" yielded 529926 hits
What is knowledge in school?
Negotiating ‘Voice’ in the Space Between: Using digital platforms for transformative and transnational knowledge production
In this paper, we present the findings of a Universitas 21 (U21) Graduate Research Project collaboration between Pontificia Universidad Católica de Chile, the University of Nottingham, England, and Lund University, Sweden. This project brought together six doctoral candidates at various stages in their postgraduate careers. The students had conducted qualitative and quantitative inquiry into diver
TruSDN: Bootstrapping Trust in Cloud Network Infrastructure
Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN , a fram
Evidensbaserad omvårdnad vid måttligt förhöjt blodtryck
Threats to 5G group-based authentication
The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, a n
Hemblodtrycksmätning
A secure group-based AKA protocol for machine-type communications
The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a groupbased Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed p
A high assurance virtualization platform for ARMv8
This paper presents the first results from the ongoing research project HASPOC, developing a high assurance virtualization platform for the ARMv8 CPU architecture. Formal verification at machine code level guarantees information isolation between different guest systems (e.g. OSs) running on the platform. To use the platform in networking scenarios, we allow guest systems to securely communicate w
IoT protection through device to cloud synchronization
This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine
Providing User Security Guarantees in Public Infrastructure Clouds
The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants-insulated from the minutiae of hardware maintenance-rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating oper
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake
DTLS is a transport layer security protocol designed to provide secure communication over unreliable datagram protocols. Before starting to communicate, a DTLS client and server perform a specific handshake in order to establish a secure session and agree on a common security context. However, the DTLS handshake is affected by two relevant issues. First, the DTLS server is vulnerable to a specific
Bootstrapping trust in software defined networks
Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN, a frame
Perioperative alcohol cessation intervention for postoperative complications
Background: Risky consumption of alcohol is a global problem. More than 3.3 million deaths annually are associated with risky use of alcohol, and global alcohol consumption continues to increase. People who have high alcohol consumption often require planned and emergency surgical procedures. Risky drinking is associated with increased postoperative complications such as infections, cardiopulmonar
Aerodynamics of manoeuvring flight in brown long-eared bats (Plecotus auritus)
In this study, we explicitly examine the aerodynamics of manoeuvring flight in animals. We studied brown long-eared bats flying in a wind tunnel while performing basic sideways manoeuvres. We used particle image velocimetry in combination with high-speed filming to link aerodynamics and kinematics to understand the mechanistic basis of manoeuvres. We predicted that the bats would primarily use the
Kungligt sällskap som sätter snurr på vetandet
Sexual dimorphism in a top predator (Notophthalmus viridescens) drives aquatic prey community assembly
Intraspecific variation can have important consequences for the structure and function of ecological communities, and serves to link community ecology to evolutionary processes. Differences between the sexes are an overwhelmingly common form of intraspecific variation, but its community-level consequences have never been experimentally investigated. Here, we manipulate the sex ratio of a sexually
High-level software requirements and iteration changes : a predictive model
Knowing whether a software feature will be completed in its planned iteration can help with release planning decisions. However, existing research has focused on predictions of only low-level software tasks, like bug fixes. In this paper, we describe a mixed-method empirical study on three large IBM projects. We investigated the types of iteration changes that occur. We show that up to 54% of high
Protected areas act as a buffer against detrimental effects of climate change—Evidence from large-scale, long-term abundance data
Climate change is driving species to shift their distributions toward high altitudes and latitudes, while habitat loss and fragmentation may hamper species ability to follow their climatic envelope. These two drivers of change may act in synergy, with particularly disastrous impacts on biodiversity. Protected areas, PAs, may thus represent crucial buffers against the compounded effects of climate
Toll-like receptor 3 agonist, polyinosinic-polycytidylic acid, upregulates carbonic anhydrase ii in human keratinocytes
Carbonic anhydrases are ubiquitously expressed enzymes that reversibly hydrate carbon dioxide to bicar-bonate and protons. While the main function of carbonic anhydrases is to regulate pH and osmotic balance, their involvement in other physiological processes remains to be explored. This study analysed changes in mRNA and protein levels of carbonic anhydrase II in human primary keratinocytes treat