12,407 Hits in 8.4 sec

From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap [chapter]

Alessandro Armando, Giancarlo Pellegrino, Roberto Carbone, Alessio Merlo, Davide Balzarotti
2012 Lecture Notes in Computer Science  
In this paper we present an approach to binding specifications of security protocols to actual implementations and show how it can be effectively used to automatically test implementations against putative  ...  Model checkers have been remarkably successful in finding flaws in security protocols.  ...  It is worth pointing out that most model checking techniques (and the associated tools) for security protocol analysis work on abstract models of the protocols.  ... 
doi:10.1007/978-3-642-30473-6_3 fatcat:6hg3jt7qjzfxtmvhxatd4wivc4

HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System [article]

Yisroel Mirsky, Mordechai Guri, Yuval Elovici
2017 arXiv   pre-print
We believe that this study details a previously unseen vector of attack that security experts should be aware of.  ...  Therefore, an attacker's main challenge is to determine a way to command and control the compromised hosts that are isolated from an accessible network (e.g., the Internet).  ...  Therefore, the contributions of this paper are as follows: 1) A new adversarial attack model for bridging an air gap.  ... 
arXiv:1703.10454v1 fatcat:42kr2d4rcrebnj7n57pfz2wkcu

Bridging the gap between pervasive devices and global networks

Dirk Henrici, Patric de Waha, Paul Mueller
2008 2008 International Symposium on Collaborative Technologies and Systems  
In this paper, we will present an advanced architecture for bridging the gap between pervasive devices like wireless sensors and the Internet.  ...  However, there are a variety of problems like security, scalability, reliability, as well as resource and cost constraints.  ...  In sum, the MC bridges the network gap and the device gap is -at least partly -bridged by the Controller.  ... 
doi:10.1109/cts.2008.4543905 dblp:conf/cts/HenriciWM08 fatcat:vcuci5fu25g27dkm6w2p4iezta

Towards bridging the knowledge gap between lawyers and technologists

Rasika Dayarathna
2008 International Journal of Technology Transfer and Commercialisation  
The result is a conceptual model for information privacy metrics including its basic foundation; the constructs and dimensions of the metrics.  ...  Without this guarantee from the organizations, individuals will be more unwilling to share their personal information.  ...  This is where information privacy metrics can bridge the gap.  ... 
doi:10.1504/ijttc.2008.020695 fatcat:46borvjwwbaxfpdmtjosmmulsq

Bridging the gap between distributed shared memory and message passing

Holger Karl
1998 Concurrency Practice and Experience  
This paper proposes an extension to the DSM-based Charlotte system that incorporates advantages from both approaches. Annotations are used to describe the data dependencies of parallel routines.  ...  The possibility to freely mix and to easily switch between unannotated code, annotated code and shared primitive data types entails a big flexibility for the programmer.  ...  The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Defense  ... 
doi:10.1002/(sici)1096-9128(199809/11)10:11/13<887::aid-cpe416>;2-0 fatcat:loamnpquincbhfc7luftzqw6aa

Why Fairness Cannot Be Automated: Bridging the Gap Between EU Non-Discrimination Law and AI

Sandra Wachter, Brent Mittelstadt, Chris Russell
2020 Social Science Research Network  
Due to the disparate nature of algorithmic and human discrimination, the EU's current requirements are too contextual, reliant on intuition, and open to judicial interpretation to be automated.  ...  Through this proposal for procedural regularity in the identification and assessment of automated discrimination, we clarify how to build considerations of fairness into automated systems as far as possible  ...  To bridge this gap the technical community often focuses, among other things, on discussion and development of new fairness metrics.  ... 
doi:10.2139/ssrn.3547922 fatcat:qo37miiei5a3nprdh5d2zr35za

Digital Pathology: The Time Is Now to Bridge the Gap between Medicine and Technological Singularity [chapter]

Consolato M. Sergi
2019 Interactive Multimedia [Working Title]  
The use of quantum computing protocols on encrypted data is crucial for the permanent implementation of virtual pathology in hospitals and universities.  ...  glass slides for routine diagnostics is far from the perspectives of many departments of laboratory medicine and pathology.  ...  Acknowledgements This chapter is dedicated to the 73rd birthday of Professor Kim Solez, who is an American pathologist and co-founder of the Banff Classification, the first standardized international classification  ... 
doi:10.5772/intechopen.84329 fatcat:ng2qouuzzbd3bn7jzxruyyltv4

CISTI: Bridging the information gap

Naomi KRYM, written., Hideaki SUZUKI, transl., Shigeru MATSUSHITA, transl.
2007 Journal of Information Processing and Management  
the Information Gap".  ...  GISTI: Bridging the Information Gap submitting document delivery requests can be found at: http://www.lac-bac. gc. calwbi n/i I lcntct/s u rvsee/r=O 1 3 Append ix #l Technical Terms Naomi Krym, B.Sc, M.L.S  ... 
doi:10.1241/johokanri.50.11 fatcat:nkaqgrx4vnfs3okfqjb4wpatbq

A new fair non-repudiation protocol for secure negotiation and contract signing

A. Ruiz-Martínez, C. I. Marín-López, L. Baño-López, A. F. Gómez Skarmeta
2006 Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST '06  
Finally, we describe how the protocol is being used to achieve agreements on the rights of copyrighted works.  ...  In this paper, we present a new protocol which is designed to make negotiation and contract signing processes secure and confidential.  ...  Acknowledgements We would like to thank the anonymous reviewers for their comments and suggestions. They have significantly contributed to improve the quality of this paper.  ... 
doi:10.1145/1501434.1501454 dblp:conf/pst/Ruiz-MartinezMBG06 fatcat:w5ik3cp3a5hhnfcdziubaj6bhm

Net2plan: an open source network planning tool for bridging the gap between academia and industry

Pablo Pavon-Marino, Jose-Luis Izquierdo-Zaragoza
2015 IEEE Network  
Built on top of a technology-agnostic network representation, it automates the elaboration of performance evaluation tests for user-defined or built-in network design algorithms, network recovery schemes  ...  Net2Plan Net2Plan is an open-source Java-based software, publicly and freely available to download from its website [2] . It is licensed under the GNU Lesser General Public License (LGPL).  ...  Acknowledgements This research was partially supported by the Spanish project grant TEC2010-21405-C02-02/TCM (CALM) and the FPU predoctoral fellowship program of the Spanish Ministry of Education, Culture  ... 
doi:10.1109/mnet.2015.7293311 fatcat:owv2l7nmrvf6xaxdgmjded7dnq

Betwixt and Between: Bridging the Gap Between Field and Repository

Meghan Grizzle
2018 Biodiversity Information Science and Standards  
the National Park Service, and lack of compliance from field archaeologists, have resulted in collections throughout the United States being at risk of loss through deterioration, mismanagement, and neglect  ...  Part 79), was intended to ensure the long-term management and care of these resources, the absence of funding at the institutional and federal levels, nonexistent enforcement of the legislation through  ...  Thank you for your time for answering the above questions. Please feel free to contact me at if you have any further questions or comments that you feel are necessary.  ... 
doi:10.3897/biss.2.27042 fatcat:sjcb33jvzbbgjfhmpuuwko5rna

Bridging the Gap between Real and Simulated Environments: A Hybrid Agent-Based Smart Home Simulator Architecture for Complex Systems

Oihane Kamara-Esteban, Gorka Sorrosal, Ander Pijoan, Tony Castillo-Calzadilla, Xabiar Iriarte-Lopez, Ana M. Macarulla-Arenaza, Cristina Martin, Ainhoa Alonso-Vicario, Cruz E. Borges
2016 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)  
Based on the simulation of human behaviour, water and electricity consumption profiles are generated and sent to Simulink models using the TCP/IP communication protocol.  ...  However, these simulations may suffer from lack of accuracy due to the inability to properly reproduce the operation of complex technologies such as solar panels, Heating, Ventilating and Air Conditioning  ...  The platform will evaluate the feasibility of integrating these two modelling approaches in order to bridge the gap between the configuration of a a simulated and a real Smart Home.  ... 
doi:10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0052 dblp:conf/uic/EstebanSPCIMMAB16 fatcat:wlozvuggvndx3o2dwnxcqchk7a

Topological analysis of network attack vulnerability

Sushil Jajodia
2006 Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST '06  
Our Topological Vulnerability Analysis (TVA) tool automates the labor-intensive type of analysis usually performed by penetration-testing experts.  ...  The TVA tool includes modeling of network security conditions and attack techniques (exploits), automatic population of models via the Nessus vulnerability scanner, and analysis of exploit sequences (attack  ...  The work of Sushil Jajodia was partially supported by the Virginia Commonwealth Information Security Center (  ... 
doi:10.1145/1501434.1501437 dblp:conf/pst/Jajodia06 fatcat:3xk6eikaendofjprkfm5gnczfm

A Mobile Virtual Butler to Bridge the Gap between Users and Ambient Assisted Living: A Smart Home Case Study

Nuno Costa, Patricio Domingues, Florentino Fdez-Riverola, António Pereira
2014 Sensors  
According to the evaluation carried out, the Virtual Butler is assessed as a very interesting and loved digital friend, filling the gap between the user and the smart home.  ...  The Virtual Butler is aware of the user location and moves to the computing device which is closest to the user, in order to be always present.  ...  Conflicts of Interest The authors declare no conflict of interest.  ... 
doi:10.3390/s140814302 pmid:25102342 pmcid:PMC4179076 fatcat:637afbas7zcs7pgevnzpnl4e5e

The Translational Medicine Ontology and Knowledge Base: driving personalized medicine by bridging the gap between bench and bedside

Joanne S Luciano, Bosse Andersson, Colin Batchelor, Olivier Bodenreider, Tim Clark, Christine K Denney, Christopher Domarew, Thomas Gambet, Lee Harland, Anja Jentzsch, Vipul Kashyap, Peter Kos (+16 others)
2011 Journal of Biomedical Semantics  
Translational medicine requires the integration of knowledge using heterogeneous data from health care to the life sciences.  ...  the recruitment of patients into active clinical trials.  ...  Acknowledgements We would like to thank the National Center for Biomedical Ontology (NCBO) for their contribution to this work.  ... 
doi:10.1186/2041-1480-2-s2-s1 pmid:21624155 pmcid:PMC3102889 fatcat:kfw5qjv7aje2vdb6gfszqu5mkm
« Previous Showing results 1 — 15 out of 12,407 results