No Arabic abstract
ZeroDB is an end-to-end encrypted database that enables clients to operate on (search, sort, query, and share) encrypted data without exposing encryption keys or cleartext data to the database server. The familiar client-server architecture is unchanged, but query logic and encryption keys are pushed client-side. Since the server has no insight into the nature of the data, the risk of data being exposed via a server-side data breach is eliminated. Even if the server is successfully infiltrated, adversaries would not have access to the cleartext data and cannot derive anything useful out of disk or RAM snapshots. ZeroDB provides end-to-end encryption while maintaining much of the functionality expected of a modern database, such as full-text search, sort, and range queries. Additionally, ZeroDB uses proxy re-encryption and/or delta key technology to enable secure, granular sharing of encrypted data without exposing keys to the server and without sharing the same encryption key between users of the database.
The SARS-CoV-2 (Covid-19) pandemic has caused significant strain on public health institutions around the world. Contact tracing is an essential tool to change the course of the Covid-19 pandemic. Manual contact tracing of Covid-19 cases has significant challenges that limit the ability of public health authorities to minimize community infections. Personalized peer-to-peer contact tracing through the use of mobile apps has the potential to shift the paradigm. Some countries have deployed centralized tracking systems, but more privacy-protecting decentralized systems offer much of the same benefit without concentrating data in the hands of a state authority or for-profit corporations. Machine learning methods can circumvent some of the limitations of standard digital tracing by incorporating many clues and their uncertainty into a more graded and precise estimation of infection risk. The estimated risk can provide early risk awareness, personalized recommendations and relevant information to the user. Finally, non-identifying risk data can inform epidemiological models trained jointly with the machine learning predictor. These models can provide statistical evidence for the importance of factors involved in disease transmission. They can also be used to monitor, evaluate and optimize health policy and (de)confinement scenarios according to medical and economic productivity indicators. However, such a strategy based on mobile apps and machine learning should proactively mitigate potential ethical and privacy risks, which could have substantial impacts on society (not only impacts on health but also impacts such as stigmatization and abuse of personal data). Here, we present an overview of the rationale, design, ethical considerations and privacy strategy of `COVI, a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current open internet regulation, the telco cloud can be used for trust services only equally for all users. 6G network must support embedded trust for increased level of information security in 6G. Trust modeling, trust policies and trust mechanisms need to be defined. 6G interlinks physical and digital worlds making safety dependent on information security. Therefore, we need trustworthy 6G. Security: In 6G era, the dependence of the economy and societies on IT and the networks will deepen. The role of IT and the networks in national security keeps rising - a continuation of what we see in 5G. The development towards cloud and edge native infrastructures is expected to continue in 6G networks, and we need holistic 6G network security architecture planning. Security automation opens new questions: machine learning can be used to make safer systems, but also more dangerous attacks. Physical layer security techniques can also represent efficient solutions for securing less investigated network segments as first line of defense. Privacy: There is currently no way to unambiguously determine when linked, deidentified datasets cross the threshold to become personally identifiable. Courts in different parts of the world are making decisions about whether privacy is being infringed, while companies are seeking new ways to exploit private data to create new business revenues. As solution alternatives, we may consider blockchain, distributed ledger technologies and differential privacy approaches.
Interacting binaries in which a white dwarf accretes material from a companion --- cataclysmic variables (CVs) in which the mass loss is via Roche-lobe overflow, and symbiotic stars in which the white dwarf captures the wind of a late type giant --- are relatively commonplace. They display a wide range of behaviors in the optical, X-rays, and other wavelengths, which still often baffles observers and theorists alike. They are likely to be a significant contributor to the Galactic ridge X-ray emission, and the possibility that some CVs or symbiotic stars may be the progenitors of some of the Type Ia supernovae deserves serious consideration. Furthermore, these binaries serve as excellent laboratories in which to study physics of X-ray emission from high density plasma, accretion physics, reflection, and particle acceleration. ASTRO-H is well-matched to the study of X-ray emission from many of these objects. In particular, the excellent spectral resolution of the SXS will enable dynamical studies of the X-ray emitting plasma. We also discuss the possibility of identifying an accreting, near-Chandrasekhar-mass white dwarf by measuring the gravitational redshift of the 6.4 keV line.
In contemporary cryptographic systems, secret keys are usually exchanged by means of methods, which suffer from mathematical and technology inherent drawbacks. That could lead to unnoticed complete compromise of cryptographic systems, without a chance of control by its legitimate owners. Therefore a need for innovative solutions exists when truly and reliably secure transmission of secrets is required for dealing with critical data and applications. Quantum Cryptography (QC), in particular Quantum Key Distribution (QKD) can answer that need. The business white paper (BWP) summarizes how secret key establishment and distribution problems can be solved by quantum cryptography. It deals with several considerations related to how the quantum cryptography innovation could contribute to provide business effectiveness. It addresses advantages and also limitations of quantum cryptography, proposes a scenario case study, and invokes standardization related issues. In addition, it answers most frequently asked questions about quantum cryptography.
The NSF has chosen the site for the Deep Underground Science and Engineering Laboratory (DUSEL) to be in Lead, South Dakota. In fact, the state of South Dakota has already stepped up to the plate and contributed its own funding for the proposed lab, see http://www.sanfordlaboratoryathomestake.org/index.html. The final decision by NSF for funding the Initial Suite of Experiments for DUSEL will be made early in 2009. At that time the NSF Science Board must make a decision. Of order 200 experimentalists have already expressed an interest in performing experiments at DUSEL. In order to assess the interest of the theoretical community, the Center for Cosmology and Astro-Particle Physics (CCAPP) at The Ohio State University (OSU) organized a 3-day DUSEL Theory Workshop in Columbus, Ohio from April 4 - 6, 2008. The workshop focused on the scientific case for six proposed experiments for DUSEL: long baseline neutrino oscillations, proton decay, dark matter, astrophysical neutrinos, neutrinoless double beta decay and N-Nbar oscillations. The outcome of this workshop is the DUSEL Theory White paper addressing the scientific case at a level which may be useful in the decision making process for policy makers at the NSF and in the U.S. Congress. In order to assess the physics interest in the DUSEL project we have posted the DUSEL Theory White paper on the following CCAPP link http://ccapp.osu.edu/whitepaper.html . Please read the white paper and, if you are interested, use the link to show your support by co-signing the white paper.