Search results

Filter

Filetype

Your search for "*" yielded 529926 hits

Negotiating ‘Voice’ in the Space Between: Using digital platforms for transformative and transnational knowledge production

In this paper, we present the findings of a Universitas 21 (U21) Graduate Research Project collaboration between Pontificia Universidad Católica de Chile, the University of Nottingham, England, and Lund University, Sweden. This project brought together six doctoral candidates at various stages in their postgraduate careers. The students had conducted qualitative and quantitative inquiry into diver

TruSDN: Bootstrapping Trust in Cloud Network Infrastructure

Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN , a fram

Threats to 5G group-based authentication

The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, a n

A secure group-based AKA protocol for machine-type communications

The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a groupbased Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed p

A high assurance virtualization platform for ARMv8

This paper presents the first results from the ongoing research project HASPOC, developing a high assurance virtualization platform for the ARMv8 CPU architecture. Formal verification at machine code level guarantees information isolation between different guest systems (e.g. OSs) running on the platform. To use the platform in networking scenarios, we allow guest systems to securely communicate w

IoT protection through device to cloud synchronization

This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine

Providing User Security Guarantees in Public Infrastructure Clouds

The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants-insulated from the minutiae of hardware maintenance-rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating oper

On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake

DTLS is a transport layer security protocol designed to provide secure communication over unreliable datagram protocols. Before starting to communicate, a DTLS client and server perform a specific handshake in order to establish a secure session and agree on a common security context. However, the DTLS handshake is affected by two relevant issues. First, the DTLS server is vulnerable to a specific

Bootstrapping trust in software defined networks

Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN, a frame

Perioperative alcohol cessation intervention for postoperative complications

Background: Risky consumption of alcohol is a global problem. More than 3.3 million deaths annually are associated with risky use of alcohol, and global alcohol consumption continues to increase. People who have high alcohol consumption often require planned and emergency surgical procedures. Risky drinking is associated with increased postoperative complications such as infections, cardiopulmonar

Aerodynamics of manoeuvring flight in brown long-eared bats (Plecotus auritus)

In this study, we explicitly examine the aerodynamics of manoeuvring flight in animals. We studied brown long-eared bats flying in a wind tunnel while performing basic sideways manoeuvres. We used particle image velocimetry in combination with high-speed filming to link aerodynamics and kinematics to understand the mechanistic basis of manoeuvres. We predicted that the bats would primarily use the

Sexual dimorphism in a top predator (Notophthalmus viridescens) drives aquatic prey community assembly

Intraspecific variation can have important consequences for the structure and function of ecological communities, and serves to link community ecology to evolutionary processes. Differences between the sexes are an overwhelmingly common form of intraspecific variation, but its community-level consequences have never been experimentally investigated. Here, we manipulate the sex ratio of a sexually

High-level software requirements and iteration changes : a predictive model

Knowing whether a software feature will be completed in its planned iteration can help with release planning decisions. However, existing research has focused on predictions of only low-level software tasks, like bug fixes. In this paper, we describe a mixed-method empirical study on three large IBM projects. We investigated the types of iteration changes that occur. We show that up to 54% of high

Protected areas act as a buffer against detrimental effects of climate change—Evidence from large-scale, long-term abundance data

Climate change is driving species to shift their distributions toward high altitudes and latitudes, while habitat loss and fragmentation may hamper species ability to follow their climatic envelope. These two drivers of change may act in synergy, with particularly disastrous impacts on biodiversity. Protected areas, PAs, may thus represent crucial buffers against the compounded effects of climate

Toll-like receptor 3 agonist, polyinosinic-polycytidylic acid, upregulates carbonic anhydrase ii in human keratinocytes

Carbonic anhydrases are ubiquitously expressed enzymes that reversibly hydrate carbon dioxide to bicar-bonate and protons. While the main function of carbonic anhydrases is to regulate pH and osmotic balance, their involvement in other physiological processes remains to be explored. This study analysed changes in mRNA and protein levels of carbonic anhydrase II in human primary keratinocytes treat