scholarly journals Security Property Modeling

Author(s):  
Hiba Hnaini ◽  
Luka Roux ◽  
Joel Champeau ◽  
Ciprian Teodorov
2000 ◽  
Author(s):  
S. Woll ◽  
V. Loebs ◽  
C. Phelps ◽  
H. Pippin ◽  
D. Grandall ◽  
...  

2020 ◽  
Author(s):  
Lucian Popescu ◽  
Nelu-Mihai Trofenciuc ◽  
Simina Crisan ◽  
Aurora Diana Bordejevic ◽  
Alexandru Mischie ◽  
...  

BACKGROUND A systematic and quantitative comparative analysis for this subject has not been done so far. Thus defined, the coefficient of elasticity is a whole new dimension. OBJECTIVE This study proposes a new mathematical myocardium elasticity property modeling in characterizing of the ventricular diastole and systole. METHODS The study group consisted of 2283 consecutive patients evaluated by echocardiography. The mathematical approach is made starting from energetic consideration, by applying the energy conservation low for the blood entering from left atrium into left ventricle during diastole period. RESULTS Analyzing all the data obtained we developed two brand new coefficients to describe the cardiac cycle and we had verified if the coefficients are correlated with classically used parameters. We consider that the energetic approach take into consideration the whole mechanical movement that is happening inside the heart and can offer a very synthetic and scientific solid view about the cardiac cycle. CONCLUSIONS The new coefficients are simply to be calculated and as you will see from our research the correlation with other classically used parameters is obvious. The direct physical approach of blood flow within the heart can generate new, beneficial perspectives in diagnosing various heart conditions, or even in understanding how works the filling of the ventricles and atria during a heartbeat.


2021 ◽  
Vol 181 (1) ◽  
pp. 1-35
Author(s):  
Jane Hillston ◽  
Andrea Marin ◽  
Carla Piazza ◽  
Sabina Rossi

In this paper, we study an information flow security property for systems specified as terms of a quantitative Markovian process algebra, namely the Performance Evaluation Process Algebra (PEPA). We propose a quantitative extension of the Non-Interference property used to secure systems from the functional point view by assuming that the observers are able to measure also the timing properties of the system, e.g., the response time of certain actions or its throughput. We introduce the notion of Persistent Stochastic Non-Interference (PSNI) based on the idea that every state reachable by a process satisfies a basic Stochastic Non-Interference (SNI) property. The structural operational semantics of PEPA allows us to give two characterizations of PSNI: one based on a bisimulation-like equivalence relation inducing a lumping on the underlying Markov chain, and another one based on unwinding conditions which demand properties of individual actions. These two different characterizations naturally lead to efficient methods for the verification and construction of secure systems. A decision algorithm for PSNI is presented and an application of PSNI to a queueing system is discussed.


2021 ◽  
Vol 3 (4) ◽  
Author(s):  
Seth Alornyo ◽  
Kingsford Kissi Mireku ◽  
Mustapha Adamu Mohammed ◽  
Daniel Adu-Gyamfi ◽  
Michael Asante

AbstractKey-insulated encryption reduces the problem of secret key exposure in hostile setting while signcryption cryptosystem attains the benefits of digitally signing a ciphertext and public key cryptosystem. In this study, we merge the primitives of parallel key-insulation cryptosystem and signcryption with equality test to construct ID-based parallel key-insulated signcryption with a test for equality (ID-PKSET) in cloud computing. The construction prevent data forgery, data re-play attacks and reduces the leakage of secret keys in harsh environments. Our scheme attains the security property of existential unforgeable chosen message attack (EUF-CMA) and indistinquishable identity chosen ciphertext attack (IND-ID-CCA2) using random oracle model.


2015 ◽  
Vol 26 (02) ◽  
pp. 169-194 ◽  
Author(s):  
Koji Nuida ◽  
Takuro Abe ◽  
Shizuo Kaji ◽  
Toshiaki Maeno ◽  
Yasuhide Numata

In this paper, we specify a class of mathematical problems, which we refer to as “Function Density Problems” (FDPs, in short), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced security property introduced by Dubrov and Ishai (STOC 2006). Our argument aims at proposing new theoretical frameworks for these topics (especially for the former) based on FDPs, rather than providing some concrete and practical results on the topics. We also give some examples of mathematical discussions on FDPs, which would be of independent interest from mathematical viewpoints. Finally, we discuss possible directions of future research on other crypto-graphic applications of FDPs and on mathematical studies on FDPs themselves.


2007 ◽  
Vol 3 (3) ◽  
pp. 199 ◽  
Author(s):  
Chin-Tser Huang ◽  
Manton Matthews ◽  
Matthew Ginley ◽  
Xinliang Zheng ◽  
Chuming Chen ◽  
...  

Effectively adding security measures to a multicast service is an intriguing problem, especially when the service isdeployed in a wireless setting. Next generation IEEE 802.16standard WirelessMAN networks are a perfect example of this problem, and the latest draft specification of the standard includes a secure protocol solution called Multicast and Broadcast Rekeying Algorithm (MBRA). In this paper, we expose the security problems of MBRA, including non-scalability and omission of backward and forward secrecy, and propose new approaches, ELAPSE and ELAPSE+, to address these problems. In particular, ELAPSE+ makes use of membership and mobility information gathered in the application layer to augment the adaptive group management in the MAC layer. We analyze the security property of ELAPSE and ELAPSE+, and compare their performances with MBRA by simulating group rekeying scenarios.


Sign in / Sign up

Export Citation Format

Share Document