scholarly journals Software Separation in Measuring Instruments through Security Concepts and Separation Kernels

ACTA IMEKO ◽  
2018 ◽  
Vol 7 (1) ◽  
pp. 13
Author(s):  
Daniel Peters ◽  
Patrick Scholz ◽  
Florian Thiel

<p class="Abstract">In the age of the Internet of Things and Industry 4.0, more and more embedded systems are connected through open networks, which also concerns measuring instruments under legal control (e.g. smart meters). Therefore, cyber-security for measuring instruments is becoming increasingly important. In this paper, possibilities to design secure measuring software running on general-purpose operating systems are analyzed according to legal requirements set up by European Directives, e.g., the Measuring Instruments Directive (2014/32/EU), which define the mandatory security level. Technical interpretations for the security concepts described in this paper are derived from these legal requirements with the aim to provide manufacturers the architectural guidance to construct systems which easily pass a conformity assessment at a Notified Body. In this paper security concepts, i.e., SELinux, AppArmor and Mandatory Integrity Control (MIC) are being described, which are based on Mandatory Access Control (MAC) strategies. Additionally, high-security methodologies and concepts, e.g., MILS and security kernels, are highlighted. In the examples given, software separation, which enhances overall security, is achieved by using SELinux mechanisms in the modules (virtual machines) atop a separation kernel.</p>

2001 ◽  
Vol 29 (3) ◽  
pp. 219-235 ◽  
Author(s):  
G. Q. Huang ◽  
B. Shen ◽  
K. L. Mak

TELD stands for “Teaching by Examples and Learning by Doing.” It is an on-line courseware engine over the World Wide Web. There are four folds of meanings in TELD. First, TELD represents a teaching and learning method that unifies a number of contemporary methods such as Problem-Based Learning (PBL) in medical education, Project-Based Learning (PBL) in engineering education, and Case Method (CM) in business education. Second, TELD serves as a Web server for hosting teaching and learning materials especially based on the TELD method. A variety of on-line facilities are provided for editing and uploading course materials such as syllabus, schedule, curriculum, examples of case study, exercises of mini-project, formative and summative assessments, etc. Third, TELD is a courseware search engine where educators are able to register their course materials and search for materials suitable for a particular course. In contrast with general-purpose search engines, TELD is set up for the special purpose of education. Therefore, the time and efforts spent on surfing are expected to be reduced dramatically. Finally, TELD is an on-line virtual classroom for electronic delivery of electronic curriculum materials. In addition to providing the lecture notes, TELD not only provides discussion questions for conducting in-class discussions and homework as formative assessment but also provides facilities for students to plan and submit their group work. This article presents an overview of the TELD courseware engine together with its background and underlying philosophy.


2014 ◽  
Vol 1046 ◽  
pp. 508-511
Author(s):  
Jian Rong Zhu ◽  
Yi Zhuang ◽  
Jing Li ◽  
Wei Zhu

How to reduce energy consumption while improving utility of datacenter is one of the key technologies in the cloud computing environment. In this paper, we use energy consumption and utility of data center as objective functions to set up a virtual machine scheduling model based on multi-objective optimization VMSA-MOP, and design a virtual machine scheduling algorithm based on NSGA-2 to solve the model. Experimental results show that compared with other virtual machine scheduling algorithms, our algorithm can obtain relatively optimal scheduling results.


2005 ◽  
Vol 27 (4) ◽  
pp. 827-840
Author(s):  
John Philpot

On November 8,1994, the Security Council of the United Nations adopted Resolution 955 creating an ad hoc international criminal tribunal to judge individuals responsible for violations of international humanitarian law committed in Rwanda between January 1, 1994 and December 31, 1994. In its form and structure, the Tribunal does not respect basic legal requirements required of a tribunal set up in international law. Us mandate - limited in time, in scope of potential indictment, and in jurisdiction to violations of international humanitarian law - mil prevent any light from being shed on the real issue raised by the Rwandan conflict, namely that of armed military intervention in Rwanda from Uganda. It will likely lead to the reinforcement of a one-sided view of the crisis in Rwanda and legitimate further unilateral interventionist policies in Africa and elsewhere. The Tribunal will institutionalize the de facto impunity for the members and supporters of the present government of Rwanda who undoubtedly committed many serious crimes between October 1, 1990 and the present.


This chapter summarizes the basic concepts related to the most targeted and widely used Windows operating system. The chapter explains Windows architecture and authentication process along with different Windows operating system tools including Windows management instrumentation command-line (WMIC), recycle bin, msinfo32, netsh (network shell), Windows services console, Windows registry, event viewer, NBTSTAT (NetBIOS over TCP/IP Status), system file checker, group policy editor, Windows firewall, Windows task manager, MSCONFIG utility, netstat (network statistics) utility, Attrib command, diskpart utility, etc. The chapter provides details of Windows powershell, an integrated scripting environment (ISE) for executing the commands at runtime as well as for developing and testing PowerShell scripts along with net commands and netsh commands. These tools are useful for diagnosing and testing the security level or condition of existing Windows installation. The Windows virtual machines created as part of experimental setup discussed as in first chapter of this book can be used to exercise the windows commands and utilities mentioned in this chapter.


Author(s):  
Ismail Butun ◽  
Alparslan Sari

The internet of things (IoT) has recently brought major technological advances in many domains, including the smart grid. Despite the simplicity and efficiency that IoT brings, there are also underlying risks that are slowing down its adoption. These risks are caused by the presence of legacy systems inside existing infrastructures that were built with no security in mind. In this chapter, the authors propose a method for early-stage detection of cyber-security incidents and protection against them through applicable security measures. This chapter introduces security techniques such as anomaly detection, threat investigation through a highly automated decision support system (DSS), as well as incident response and recovery for smart grid systems. The introduced framework can be applied to industrial environments such as cyber-threats targeting the production generator as well as the electricity smart meters, etc. The chapter also illustrates the framework's cyber-resilience against zero-day threats and its ability to distinguish between operational failures as well as cyber-security incidents.


1986 ◽  
Vol 8 ◽  
pp. 93-95
Author(s):  
H. Ito ◽  
K. Schroff ◽  
Hans-jörg Frei

A device was developed, which rotates a marker for the distance measurement in the desired direction, without an operator at the spot. This is also possible with a moving object, on which the marker is set up. The device, together with adequate distance-measuring instruments, yields a precise distance measurement by a single observer at a single station. Examples of measurements using it during sea-ice studies in the Greenland Sea are described. It is shown that the application of the instrument provides a satisfactory basis for precise glacier surveying with limited personnel, cost, and time.


2020 ◽  
Vol 1 (1) ◽  
pp. 19-39
Author(s):  
Alan Mills ◽  
Phil Legg

Malware analysis is fundamental for defending against prevalent cyber security threats and requires a means to deploy and study behavioural software traits as more sophisticated malware is developed. Traditionally, virtual machines are used to provide an environment that is isolated from production systems so as to not cause any adverse impact on existing infrastructure. Malware developers are fully aware of this and so will often develop evasion techniques to avoid detection within sandbox environments. In this paper, we conduct an investigation of anti-evasion malware triggers for uncovering malware that may attempt to conceal itself when deployed in a traditional sandbox environment. To facilitate our investigation, we developed a tool called MORRIGU that couples together both automated and human-driven analysis for systematic testing of anti-evasion methods using dynamic sandbox reconfiguration techniques. This is further supported by visualisation methods for performing comparative analysis of system activity when malware is deployed under different sandbox configurations. Our study reveals a variety of anti-evasion traits that are shared amongst different malware families, such as sandbox “wear-and-tear”, and Reverse Turing Tests (RTT), as well as more sophisticated malware samples that require multiple anti-evasion checks to be deployed. We also perform a comparative study using Cuckoo sandbox to demonstrate the limitations of adopting only automated analysis tools, to justify the exploratory analysis provided by MORRIGU. By adopting a clearer systematic process for uncovering anti-evasion malware triggers, as supported by tools like MORRIGU, this study helps to further the research of evasive malware analysis so that we can better defend against such future attacks.


Author(s):  
Ioannis P. Chochliouros

The European Authorities have promoted a specific and innovative framework for the use of electronic signatures, allowing the free flow of electronic signature-related products and services cross borders, and ensuring a basic legal recognition of such facilities. The core aim was to promote the emergence of the internal market for certification products, mainly intending to satisfy various requirements for the proper use and immediate “adoption” of electronic signature applications related to e-government and personal e-banking services. Thus, a number of technical, procedural, and quality standards for electronic signature products and solutions have been developed, all conforming to the requirements imposed by the EU regulation and the relevant market needs. In the present work, we examine the role of standardization activities for the promotion of several needs of an “open” European market based on the effective usage of e-signatures, and being able to affect a great variety of technological, business- commercial, regulatory, and other issues. In any case, the transposition of legal requirements into technical specifications (or business practices) needs to be harmonized at a European member-states’ level in order to enable adequate interoperability of the final solutions proposed. Appropriate technical standards for the sector can help to establish a presumption of conformity that the electronic signature products following or implementing them comply with all the legal requirements imposed, in the background of the actual European policies. Thus we discuss recent European and/or national initiatives to fulfil such a fundamental option. The European Electronic Signature Standardization Initiative (EESSI) has been set up under the auspices of the European Commission for the carrying out of a work program aiming at the development of standards (be it technical specifications or policy practices) that would facilitate the implementation of the basic legal instrument (the “Electronic Signatures Directive”). Two major streams of possible standards-setting work have been determined, covering: (i) Qualitative and procedural standards for the provision of certification services and (ii) technical standards for product interoperability. We identify (and evaluate at a primary level) the basic components/modules of EESSI’s specific results, already developed and offered in the market either as technical regulations and/or as recognized standards, with respect to essential requirements imposed by the European regulation. We also discuss relevant “feedback” already gained from various market areas and we focus on challenges for further implementation, progress, adoption, and development, especially in the framework for the promotion of converged broadband (Internet-based) communications facilities. It is important for the market that expected standardization work takes into account new technological developments as, in the future, users will move their e-signature key from device-to-device in a connected world. The added value of standards in the e-signatures sector, for both end users and assessing parties (judge, arbitrator, conformity assessment body, etc.) is of extreme importance for the future of the European electronic communications market.


Author(s):  
Gerd Doben-Henisch

The chapter describes the set-up for an experiment in computational semiotics. Starting with a hypothesis about negative complexity in the environment of human persons today it describes a strategy, how to assist human persons to reduce this complexity by using a semiotic system. The basic ingredients of this strategy are a visual programming interface with an appropriate abstract state machine, which has to be realized by distributed virtual machines. The distributed virtual machines must be scalable, have to allow parallel processing, have to be fault tolerant, and should have the potential to work in real time. The objects, which have to be processed by these virtual machines, are logical models (LModels), which represent dynamic knowledge, including self learning systems. The descriptions are based on a concrete open source project called Planet Earth Simulator.


Sign in / Sign up

Export Citation Format

Share Document