A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap
[chapter]
2012
Lecture Notes in Computer Science
In this paper we present an approach to binding specifications of security protocols to actual implementations and show how it can be effectively used to automatically test implementations against putative ...
Model checkers have been remarkably successful in finding flaws in security protocols. ...
It is worth pointing out that most model checking techniques (and the associated tools) for security protocol analysis work on abstract models of the protocols. ...
doi:10.1007/978-3-642-30473-6_3
fatcat:6hg3jt7qjzfxtmvhxatd4wivc4
HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System
[article]
2017
arXiv
pre-print
We believe that this study details a previously unseen vector of attack that security experts should be aware of. ...
Therefore, an attacker's main challenge is to determine a way to command and control the compromised hosts that are isolated from an accessible network (e.g., the Internet). ...
Therefore, the contributions of this paper are as follows: 1) A new adversarial attack model for bridging an air gap. ...
arXiv:1703.10454v1
fatcat:42kr2d4rcrebnj7n57pfz2wkcu
Bridging the gap between pervasive devices and global networks
2008
2008 International Symposium on Collaborative Technologies and Systems
In this paper, we will present an advanced architecture for bridging the gap between pervasive devices like wireless sensors and the Internet. ...
However, there are a variety of problems like security, scalability, reliability, as well as resource and cost constraints. ...
In sum, the MC bridges the network gap and the device gap is -at least partly -bridged by the Controller. ...
doi:10.1109/cts.2008.4543905
dblp:conf/cts/HenriciWM08
fatcat:vcuci5fu25g27dkm6w2p4iezta
Towards bridging the knowledge gap between lawyers and technologists
2008
International Journal of Technology Transfer and Commercialisation
The result is a conceptual model for information privacy metrics including its basic foundation; the constructs and dimensions of the metrics. ...
Without this guarantee from the organizations, individuals will be more unwilling to share their personal information. ...
This is where information privacy metrics can bridge the gap. ...
doi:10.1504/ijttc.2008.020695
fatcat:46borvjwwbaxfpdmtjosmmulsq
Bridging the gap between distributed shared memory and message passing
1998
Concurrency Practice and Experience
This paper proposes an extension to the DSM-based Charlotte system that incorporates advantages from both approaches. Annotations are used to describe the data dependencies of parallel routines. ...
The possibility to freely mix and to easily switch between unannotated code, annotated code and shared primitive data types entails a big flexibility for the programmer. ...
The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Defense ...
doi:10.1002/(sici)1096-9128(199809/11)10:11/13<887::aid-cpe416>3.0.co;2-0
fatcat:loamnpquincbhfc7luftzqw6aa
Why Fairness Cannot Be Automated: Bridging the Gap Between EU Non-Discrimination Law and AI
2020
Social Science Research Network
Due to the disparate nature of algorithmic and human discrimination, the EU's current requirements are too contextual, reliant on intuition, and open to judicial interpretation to be automated. ...
Through this proposal for procedural regularity in the identification and assessment of automated discrimination, we clarify how to build considerations of fairness into automated systems as far as possible ...
To bridge this gap the technical community often focuses, among other things, on discussion and development of new fairness metrics. ...
doi:10.2139/ssrn.3547922
fatcat:qo37miiei5a3nprdh5d2zr35za
Digital Pathology: The Time Is Now to Bridge the Gap between Medicine and Technological Singularity
[chapter]
2019
Interactive Multimedia [Working Title]
The use of quantum computing protocols on encrypted data is crucial for the permanent implementation of virtual pathology in hospitals and universities. ...
glass slides for routine diagnostics is far from the perspectives of many departments of laboratory medicine and pathology. ...
Acknowledgements This chapter is dedicated to the 73rd birthday of Professor Kim Solez, who is an American pathologist and co-founder of the Banff Classification, the first standardized international classification ...
doi:10.5772/intechopen.84329
fatcat:ng2qouuzzbd3bn7jzxruyyltv4
CISTI: Bridging the information gap
カナダ国立科学技術情報機関CISTI
2007
Journal of Information Processing and Management
カナダ国立科学技術情報機関CISTI
the Information Gap". ...
GISTI: Bridging the Information Gap submitting document delivery requests can be found at: http://www.lac-bac. gc. calwbi n/i I lcntct/s u rvsee/r=O 1 3 Append ix #l Technical Terms Naomi Krym, B.Sc, M.L.S ...
doi:10.1241/johokanri.50.11
fatcat:nkaqgrx4vnfs3okfqjb4wpatbq
A new fair non-repudiation protocol for secure negotiation and contract signing
2006
Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST '06
Finally, we describe how the protocol is being used to achieve agreements on the rights of copyrighted works. ...
In this paper, we present a new protocol which is designed to make negotiation and contract signing processes secure and confidential. ...
Acknowledgements We would like to thank the anonymous reviewers for their comments and suggestions. They have significantly contributed to improve the quality of this paper. ...
doi:10.1145/1501434.1501454
dblp:conf/pst/Ruiz-MartinezMBG06
fatcat:w5ik3cp3a5hhnfcdziubaj6bhm
Net2plan: an open source network planning tool for bridging the gap between academia and industry
2015
IEEE Network
Built on top of a technology-agnostic network representation, it automates the elaboration of performance evaluation tests for user-defined or built-in network design algorithms, network recovery schemes ...
Net2Plan Net2Plan is an open-source Java-based software, publicly and freely available to download from its website [2] . It is licensed under the GNU Lesser General Public License (LGPL). ...
Acknowledgements This research was partially supported by the Spanish project grant TEC2010-21405-C02-02/TCM (CALM) and the FPU predoctoral fellowship program of the Spanish Ministry of Education, Culture ...
doi:10.1109/mnet.2015.7293311
fatcat:owv2l7nmrvf6xaxdgmjded7dnq
Betwixt and Between: Bridging the Gap Between Field and Repository
2018
Biodiversity Information Science and Standards
the National Park Service, and lack of compliance from field archaeologists, have resulted in collections throughout the United States being at risk of loss through deterioration, mismanagement, and neglect ...
Part 79), was intended to ensure the long-term management and care of these resources, the absence of funding at the institutional and federal levels, nonexistent enforcement of the legislation through ...
Thank you for your time for answering the above questions. Please feel free to contact me at mgrizzle@ku.edu if you have any further questions or comments that you feel are necessary. ...
doi:10.3897/biss.2.27042
fatcat:sjcb33jvzbbgjfhmpuuwko5rna
Bridging the Gap between Real and Simulated Environments: A Hybrid Agent-Based Smart Home Simulator Architecture for Complex Systems
2016
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
Based on the simulation of human behaviour, water and electricity consumption profiles are generated and sent to Simulink models using the TCP/IP communication protocol. ...
However, these simulations may suffer from lack of accuracy due to the inability to properly reproduce the operation of complex technologies such as solar panels, Heating, Ventilating and Air Conditioning ...
The platform will evaluate the feasibility of integrating these two modelling approaches in order to bridge the gap between the configuration of a a simulated and a real Smart Home. ...
doi:10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0052
dblp:conf/uic/EstebanSPCIMMAB16
fatcat:wlozvuggvndx3o2dwnxcqchk7a
Topological analysis of network attack vulnerability
2006
Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST '06
Our Topological Vulnerability Analysis (TVA) tool automates the labor-intensive type of analysis usually performed by penetration-testing experts. ...
The TVA tool includes modeling of network security conditions and attack techniques (exploits), automatic population of models via the Nessus vulnerability scanner, and analysis of exploit sequences (attack ...
The work of Sushil Jajodia was partially supported by the Virginia Commonwealth Information Security Center (www.cisc.jmu.edu). ...
doi:10.1145/1501434.1501437
dblp:conf/pst/Jajodia06
fatcat:3xk6eikaendofjprkfm5gnczfm
A Mobile Virtual Butler to Bridge the Gap between Users and Ambient Assisted Living: A Smart Home Case Study
2014
Sensors
According to the evaluation carried out, the Virtual Butler is assessed as a very interesting and loved digital friend, filling the gap between the user and the smart home. ...
The Virtual Butler is aware of the user location and moves to the computing device which is closest to the user, in order to be always present. ...
Conflicts of Interest The authors declare no conflict of interest. ...
doi:10.3390/s140814302
pmid:25102342
pmcid:PMC4179076
fatcat:637afbas7zcs7pgevnzpnl4e5e
The Translational Medicine Ontology and Knowledge Base: driving personalized medicine by bridging the gap between bench and bedside
2011
Journal of Biomedical Semantics
Translational medicine requires the integration of knowledge using heterogeneous data from health care to the life sciences. ...
the recruitment of patients into active clinical trials. ...
Acknowledgements We would like to thank the National Center for Biomedical Ontology (NCBO) for their contribution to this work. ...
doi:10.1186/2041-1480-2-s2-s1
pmid:21624155
pmcid:PMC3102889
fatcat:kfw5qjv7aje2vdb6gfszqu5mkm
« Previous
Showing results 1 — 15 out of 12,407 results