scholarly journals Security assurance cases—state of the art of an emerging approach

2021 ◽  
Vol 26 (4) ◽  
Author(s):  
Mazen Mohamad ◽  
Jan-Philipp Steghöfer ◽  
Riccardo Scandariato

AbstractSecurity Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful adoption of assurance cases for safety, SAC are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing pressure to be compliant with several security standards and regulations. Accordingly, research in the field of SAC has flourished in the past decade, with different approaches being investigated. In an effort to systematize this active field of research, we conducted a systematic literature review (SLR) of the existing academic studies on SAC. Our review resulted in an in-depth analysis and comparison of 51 papers. Our results indicate that, while there are numerous papers discussing the importance of SAC and their usage scenarios, the literature is still immature with respect to concrete support for practitioners on how to build and maintain a SAC. More importantly, even though some methodologies are available, their validation and tool support is still lacking.

2016 ◽  
Vol 3 (4) ◽  
pp. 46-67 ◽  
Author(s):  
Rhythm Walia ◽  
M.P.S. Bhatia

With the advent of web 2.0 and anonymous free Internet services available to almost everyone, social media has gained immense popularity in disseminating information. It has become an effective channel for advertising and viral marketing. People rely on social networks for news, communication and it has become an integral part of our daily lives. But due to the limited accountability of users, it is often misused for the spread of rumors. Such rumor diffusion hampers the credibility of social media and may spread social panic. Analyzing rumors in social media has gained immense attention from the researchers in the past decade. In this paper the authors provide a survey of work in rumor analysis, which will serve as a stepping-stone for new researchers. They organized the study of rumors into four categories and discussed state of the art papers in each with an in-depth analysis of results of different models used and a comparative analysis between approaches used by different authors.


Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


2021 ◽  
Vol 13 (14) ◽  
pp. 7939
Author(s):  
Sohani Vihanga Withanage ◽  
Komal Habib

The unprecedented technological development and economic growth over the past two decades has resulted in streams of rapidly growing electronic waste (e-waste) around the world. As the potential source of secondary raw materials including precious and critical materials, e-waste has recently gained significant attention across the board, ranging from governments and industry, to academia and civil society organizations. This paper aims to provide a comprehensive review of the last decade of e-waste literature followed by an in-depth analysis of the application of material flow analysis (MFA) and life cycle assessment (LCA), i.e., two less commonly used strategic tools to guide the relevant stakeholders in efficient management of e-waste. Through a keyword search on two main online search databases, Scopus and Web of Science, 1835 peer-reviewed publications were selected and subjected to a bibliographic network analysis to identify and visualize major research themes across the selected literature. The selected 1835 studies were classified into ten different categories based on research area, such as environmental and human health impacts, recycling and recovery technologies, associated social aspects, etc. With this selected literature in mind, the review process revealed the two least explored research areas over the past decade: MFA and LCA with 33 and 31 studies, respectively. A further in-depth analysis was conducted for these two areas regarding their application to various systems with numerous scopes and different stages of e-waste life cycle. The study provides a detailed discussion regarding their applicability, and highlights challenges and opportunities for further research.


2021 ◽  
pp. 1-30
Author(s):  
F. D. Maia ◽  
J. M. Lourenço da Saúde

ABSTRACT A state-of-the-art review of all the developments, standards and regulations associated with the use of major unmanned aircraft systems under development is presented. Requirements and constraints are identified by evaluating technologies specific to urban air mobility, considering equivalent levels of safety required by current and future civil aviation standards. Strategies, technologies and lessons learnt from remotely piloted aviation and novel unmanned traffic management systems are taken as the starting point to assess operational scenarios for autonomous urban air mobility.


2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Xudong Zhu ◽  
Zhiyang Chen ◽  
Weiyan Shen ◽  
Gang Huang ◽  
John M. Sedivy ◽  
...  

AbstractRemarkable progress in ageing research has been achieved over the past decades. General perceptions and experimental evidence pinpoint that the decline of physical function often initiates by cell senescence and organ ageing. Epigenetic dynamics and immunometabolic reprogramming link to the alterations of cellular response to intrinsic and extrinsic stimuli, representing current hotspots as they not only (re-)shape the individual cell identity, but also involve in cell fate decision. This review focuses on the present findings and emerging concepts in epigenetic, inflammatory, and metabolic regulations and the consequences of the ageing process. Potential therapeutic interventions targeting cell senescence and regulatory mechanisms, using state-of-the-art techniques are also discussed.


Author(s):  
Fabrice Gallais ◽  
Olivier Pible ◽  
Jean-Charles Gaillard ◽  
Stéphanie Debroas ◽  
Hélène Batina ◽  
...  

AbstractCOVID-19 is the most disturbing pandemic of the past hundred years. Its causative agent, the SARS-CoV-2 virus, has been the subject of an unprecedented investigation to characterize its molecular structure and intimate functioning. While markers for its detection have been proposed and several diagnostic methodologies developed, its propensity to evolve and evade diagnostic tools and the immune response is of great concern. The recent spread of new variants with increased infectivity requires even more attention. Here, we document how shotgun proteomics can be useful for rapidly monitoring the evolution of the SARS-CoV-2 virus. We evaluated the heterogeneity of purified SARS-CoV-2 virus obtained after culturing in the Vero E6 cell line. We found that cell culture induces significant changes that are translated at the protein level, such changes being detectable by tandem mass spectrometry. Production of viral particles requires careful quality control which can be easily performed by shotgun proteomics. Although considered relatively stable so far, the SARS-CoV-2 genome turns out to be prone to frequent variations. Therefore, the sequencing of SARS-CoV-2 variants from patients reporting only the consensus genome after its amplification would deserve more attention and could benefit from more in-depth analysis of low level but crystal-clear signals, as well as complementary and rapid analysis by shotgun proteomics. Graphical abstract


Author(s):  
Fabricio Almeida-Silva ◽  
Kanhu C Moharana ◽  
Thiago M Venancio

Abstract In the past decade, over 3000 samples of soybean transcriptomic data have accumulated in public repositories. Here, we review the state of the art in soybean transcriptomics, highlighting the major microarray and RNA-seq studies that investigated soybean transcriptional programs in different tissues and conditions. Further, we propose approaches for integrating such big data using gene coexpression network and outline important web resources that may facilitate soybean data acquisition and analysis, contributing to the acceleration of soybean breeding and functional genomics research.


SAGE Open ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 215824402110335
Author(s):  
Tingting Hu ◽  
Tianru Guan

Through an in-depth analysis of gender representation in the box office record-breaking Chinese movie Wolf Warrior II, this study interrogates how the male body is used as a site for the projection of Chinese national power. Furthermore, it illustrates a revival of patriotic pride in China through a contemporary reading of cross-genre action-military films. Developing Shuqin Cui’s notion of “woman-as-nation,” which understands on-screen female victimization in Chinese films as signifying the past suffering of the nation, this study proposes the new concept of “man-as-nation” to explain how the masculine virtues of male protagonists in Chinese films signify the nation’s rejuvenation and strength. Framing male virtue into the paradigms of wu (武), as martial valor, and wen (文), as cultural attainment, this article argues that masculinity has come to symbolize China’s enhanced comprehensive power and to embody its ideological orientation in both global and domestic domains.


2021 ◽  
Vol 54 (3) ◽  
pp. 1-36
Author(s):  
Syed Wasif Abbas Hamdani ◽  
Haider Abbas ◽  
Abdul Rehman Janjua ◽  
Waleed Bin Shahid ◽  
Muhammad Faisal Amjad ◽  
...  

Cyber threats have been growing tremendously in recent years. There are significant advancements in the threat space that have led towards an essential need for the strengthening of digital infrastructure security. Better security can be achieved by fine-tuning system parameters to the best and optimized security levels. For the protection of infrastructure and information systems, several guidelines have been provided by well-known organizations in the form of cybersecurity standards. Since security vulnerabilities incur a very high degree of financial, reputational, informational, and organizational security compromise, it is imperative that a baseline for standard compliance be established. The selection of security standards and extracting requirements from those standards in an organizational context is a tedious task. This article presents a detailed literature review, a comprehensive analysis of various cybersecurity standards, and statistics of cyber-attacks related to operating systems (OS). In addition to that, an explicit comparison between the frameworks, tools, and software available for OS compliance testing is provided. An in-depth analysis of the most common software solutions ensuring compliance with certain cybersecurity standards is also presented. Finally, based on the cybersecurity standards under consideration, a comprehensive set of minimum requirements is proposed for OS hardening and a few open research challenges are discussed.


Sign in / Sign up

Export Citation Format

Share Document