We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether... more
We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services
Meyor, spoken in a few villages in northeast Arunachal Pradesh, is a highly endangered language of possible Tibeto-Burman affiliation. A closely related language, Zha, is spoken across the border in Tibet in three villages. The paper is... more
Meyor, spoken in a few villages in northeast Arunachal Pradesh, is a highly endangered language of possible Tibeto-Burman affiliation. A closely related language, Zha, is spoken across the border in Tibet in three villages. The paper is an attempt to unravel the language history of Meyor by comparison with Kman [=Miju] and other nearby languages. There is little doubt that Meyor shares much lexicon with Kman, but the similarities suggest this is possibly borrowing. Meyor also has borrowings from spoken Tibetan and some Naga-type languages. Nonetheless it retains a core of lexicon of no clear origin. Only further more detailed work may help establish whether it is a language isolate or a previously unknown branch of Tibeto-Burman.
Meyor, spoken in a few villages in northeast Arunachal Pradesh, is a highly endangered language of possible Tibeto-Burman affiliation. A closely related language, Zha, is spoken across the border in Tibet in three villages. The paper is... more
Meyor, spoken in a few villages in northeast Arunachal Pradesh, is a highly endangered language of possible Tibeto-Burman affiliation. A closely related language, Zha, is spoken across the border in Tibet in three villages. The paper is an attempt to unravel the language history of Meyor by comparison with Kman [=Miju] and other nearby languages. There is little doubt that Meyor shares much lexicon with Kman, but the similarities suggest this is possibly borrowing. Meyor also has borrowings from spoken Tibetan and some Naga-type languages. Nonetheless it retains a core of lexicon of no clear origin. Only further more detailed work may help establish whether it is a language isolate or a previously unknown branch of Tibeto-Burman.
Meyor, spoken in a few villages in northeast Arunachal Pradesh, is a highly endangered language of possible Tibeto-Burman affiliation. A closely related language, Zha, is spoken across the border in Tibet in three villages. The paper is... more
Meyor, spoken in a few villages in northeast Arunachal Pradesh, is a highly endangered language of possible Tibeto-Burman affiliation. A closely related language, Zha, is spoken across the border in Tibet in three villages. The paper is an attempt to unravel the language history of Meyor by comparison with Kman [=Miju] and other nearby languages. There is little doubt that Meyor shares much lexicon with Kman, but the similarities suggest this is possibly borrowing. Meyor also has borrowings from spoken Tibetan and some Naga-type languages. Nonetheless it retains a core of lexicon of no clear origin. Only further more detailed work may help establish whether it is a language isolate or a previously unknown branch of Tibeto-Burman.
In the Middle Ages a chain suspended between two towers defended the entrance of Kyrenia’s little harbour, like the chain across the Golden Horn in Constantinople. William de Oldenburg, who visited Cyprus in 1211 during the reign of King... more
In the Middle Ages a chain suspended between two towers defended the entrance of Kyrenia’s little harbour, like the chain across the Golden Horn in Constantinople. William de Oldenburg, who visited Cyprus in 1211 during the reign of King Hugh I, referred to Kyrenia as “a small town well-fortified, which has a castle with walls and towers”. He perceived the chain tower as part of Kyrenia’s fortification system in that time. The Byzantines had already fortified the city, but in the thirteenth century, during the Longobard war, before the siege of the city, Frederick II’s party, under the direction of Captain Philippo Genardo, improved the defences of the city. The chain tower is still visible today in the north side of the old Kyrenia harbour. It consists of an 8,15 m diameter cylindrical tower and a 1,5 m diameter pillar on top of it. The tower was supporting a chain attached on the other side to another structure. The fortifications on the north side terminated against the harbour i...
3D survey and advanced modeling in the study of the Forts of Rome: the Forte Monte AntenneIn the studies the authors are conducting on the entrenched camp of Rome, 3D surveys and digital models are used as means to understand... more
3D survey and advanced modeling in the study of the Forts of Rome: the Forte Monte AntenneIn the studies the authors are conducting on the entrenched camp of Rome, 3D surveys and digital models are used as means to understand constructions with the aim of developing restoration and re-utilization projects. For Forte Monte Antenne (1882-1891), the authors have carried out systematic studies of the formal and structural aspects. The data acquired from a direct survey and with laser scanner, drone and photogrammetry, integrated with data obtained from iconographic and bibliographic sources, were integrated in the creation of a digital model, which made the classification of the various elements in a structured database possible, including the verification of the relationship among the parts at varying levels, and the system of aeration ducts. Convective motions and the thermo-hygrometric and visual comfort within some of the environments, as well as thermographic surveys of the walls w...
Selasa, 07 Juni 2011 | di 1:16 AM Menurut Harold Lasswell, politik adalah kegiatan masyarakat yang berkisar pada masalah-masalah "siapa memperoleh apa, kapan dan bagaimana" (who gets what, when and how). Pengertian cakupan politik seperti... more
Selasa, 07 Juni 2011 | di 1:16 AM Menurut Harold Lasswell, politik adalah kegiatan masyarakat yang berkisar pada masalah-masalah "siapa memperoleh apa, kapan dan bagaimana" (who gets what, when and how). Pengertian cakupan politik seperti itu memang tidak salah. Dalam kenyataan, persoalan politik selalu menyangkut siapa yang sedang mengejar apa. Kemudian juga kapan dan bagaimana yang dikejar itu dapat diperoleh. Sebagai misal, siapa saja yang ingin menjadi ketua partai? Kemudian kapan dan bagaimana kursi ketua partai itu dapat diraih? Dengan cara yang wajar atau tidak? Timing nya tepat atau tidak? Dan sebagainya. Peristiwa politik memang sarat dengan hal-hal seperti di atas. Siapa yang ingin menjadi anggota parlemen, gubernur, bupati, menteri, presiden, dsb., selalu menarik untuk dianalisis. Kemudian kelompok-kelompok politik mana saja yang mendukung siapa tersebut. Lantas masalah kapan dan bagaimana selalu merupakan masalah-masalah menarik yang menyertainya. Harold Lasswell menggunakan paradigma komunikasi dalam menjelaskan mengenai sistem politik. Lasswell mengatakan bahwa cara yang baik untuk untuk menjelaskan komunikasi ialah dengan menjawab pertanyaan sebagai berikut: Who Says What In Which Channel To Whom With What Effect? Paradigma Lasswell di atas menunjukkan bahwa komunikasi meliputi lima unsur sebagai jawaban dari pertanyaan yang diajukan itu,yaitu: Komunikator (siapa yang mengatakan?) Pesan (mengatakan apa?) Media (melalui saluran/ channel/media apa?) Komunikan (kepada siapa?) Efek (dengan dampak/efek apa?).
Sieges of the Morea War in the celebratory cycle of Francesco Morosini. Art, topography and military historyThe forty-eight paintings executed between the seventeenth and eighteenth centuries to celebrate the military campaigns of... more
Sieges of the Morea War in the celebratory cycle of Francesco Morosini. Art, topography and military historyThe forty-eight paintings executed between the seventeenth and eighteenth centuries to celebrate the military campaigns of Francesco Morosini (1619-1694) are an exceptional repertoire of military genre painting. The canvas uses different figurative registers to represent naval battles, cities and territories, siege operations. If the relations with war literature and propaganda prints, which spread across Europe and which had their official “historiographer” in Vincenzo Coronelli in Venice, are evident, equally strong relationships can be established between the paintings, war reports and the plans made on the battlefield by military engineers. This paper deals with the paintings dedicated to the sieges of Corone and Negroponte are examined here.
Malicious actors in the world are using more ingenuity than ever for both data infiltration and exfiltration purposes, also known as command and control communications. In this paper I aim to describe a system that could be used to send... more
Malicious actors in the world are using more ingenuity than ever for both data infiltration and exfiltration purposes, also known as command and control communications. In this paper I aim to describe a system that could be used to send or receive data from both a client and a server perspective utilizing research into x509 certificates specifically in areas where you can place arbitrary binary data into the certificate or utilizing them as a covert channel. While lots of attention is given to data infiltration and exfiltration techniques they are commonly done so after they’ve been used in an incident, making this area of cyber security very retroactive in a defensive posture. The aim in presenting this material is to demonstrate that we can take some lessons from the other areas of cyber security research, namely exploitation, and look at potential use cases in how malware authors could utilize technologies outside of their intended purposes to not only accomplish their goals but ...
Fortresses are architectural pearls, cultural sites, event locations, experience places and memorials, mostly situated at breath-taking places on mountains, rivers or in the under-ground. Fortresses are monuments of common European... more
Fortresses are architectural pearls, cultural sites, event locations, experience places and memorials, mostly situated at breath-taking places on mountains, rivers or in the under-ground. Fortresses are monuments of common European history, they mirror the past into the present, connect cultures and offer deep insights into the historical conflicts. Fortified monuments are part of what makes Europe unique and attractive. This cultural heritage has to be preserved and made accessible for the culture tourism at the same time. The Iberian fortified heritage has big potential for new culture touristic topics and travel routes away from mass tourism. Therefore, cultural routes are a useful instrument. The European Culture Route Fortified Monuments –FORTE CULTURA®– is the European umbrella brand for fortress tourism. It offers useful instruments for international marketing of fortified monuments. The implementation of the attractive architectura militaris of the Iberian Peninsula into the...
Grammothele lineata, an endophyte isolated in our laboratory from jute (Corchorus olitorius acc. 2015) was found to be a substantial paclitaxel producer. Taxol and its related compounds, produced by this endophyte were extracted by... more
Grammothele lineata, an endophyte isolated in our laboratory from jute (Corchorus olitorius acc. 2015) was found to be a substantial paclitaxel producer. Taxol and its related compounds, produced by this endophyte were extracted by growing the fungus in simple nutrient media (potato dextrose broth, PDB). Taxol was identified and characterized by different analytical techniques (TLC, HPLC, FTIR, LC-ESI-MS/MS) following its extraction by ethyl acetate. In PDB media, this fungus was found to produce 382.2 μgL-1 of taxol which is about 7.6 x103 fold higher than the first reported endophytic fungi, Taxomyces andreanae. The extracted taxol exhibited cytotoxic activity in an in vitro culture of HeLa cancer cell line. The fungal extract also exhibited antifungal and antibacterial activities against different pathogenic strains. This is the first report of a jute endophytic fungus harboring the capacity to produce taxol and also the first reported taxol producing species that belongs to the ...
Narrative research is a trending topic in international studies, with a growing body of literature adopting limited insights from narratology, sociolinguistics, and related fields to construct new insights into the workings of... more
Narrative research is a trending topic in international studies, with a growing body of literature adopting limited insights from narratology, sociolinguistics, and related fields to construct new insights into the workings of international relations. These studies are mainly concerned with questions about how narratives can be used to shape future policy courses, or how they impact the identity of agents and actors. The proliferation of studies using “narratives” in international studies research has been widespread since the 2000s, following a series of puzzles raised by scholars writing on language and discourse more broadly, ever since the late 1980s as part of the “linguistic turn” in the field. The adoption of narrative theory into international relations research presents a series of important questions about the methodological implications of taking narratives seriously. These include inquiries into the extent to which scholars see themselves as contributing to current socia...
Atlas of fortified settlements in the province of Viterbo, Italy (tenth-fifteenth centuries). Sources and methods for the reconstruction of the late-medieval settlement networkThis study addressed the historical phenomenon known as... more
Atlas of fortified settlements in the province of Viterbo, Italy (tenth-fifteenth centuries). Sources and methods for the reconstruction of the late-medieval settlement networkThis study addressed the historical phenomenon known as incastellamento, in the area of the current province of Viterbo, from a quantitative and geographical perspective. The time period considered was the tenth-fifteenth century. The paper describes the documentary sources, historical maps, aerial images, past studies and archaeological sources that are available to researchers, and which have been used, in good measure, to reconstruct the fortified settlement network. Moreover, the paper explains the methodologies used to identify, store and geocode the whole dataset, which so far comes to a total of 191 fortified settlements. In conclusion, we discuss the main characteristics of the online atlas, intended as an open and interoperable platform to consult, query and retrieve information from the dataset of la...