scholarly journals An Analysis of Smart Contracts Security Threats Alongside Existing Solutions

Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 203
Author(s):  
Antonio López Vivar ◽  
Alberto Turégano Castedo ◽  
Ana Lucila Sandoval Orozco ◽  
Luis Javier García Villalba

Smart contracts have gained a lot of popularity in recent times as they are a very powerful tool for the development of decentralised and automatic applications in many fields without the need for intermediaries or trusted third parties. However, due to the decentralised nature of the blockchain on which they are based, a series of challenges have emerged related to vulnerabilities in their programming that, given their particularities, could have (and have already had) a very high economic impact. This article provides a holistic view of security challenges associated with smart contracts, as well as the state of the art of available public domain tools.

Author(s):  
Wang Chen ◽  
Yifan Gao ◽  
Jiani Zhang ◽  
Irwin King ◽  
Michael R. Lyu

Keyphrase generation (KG) aims to generate a set of keyphrases given a document, which is a fundamental task in natural language processing (NLP). Most previous methods solve this problem in an extractive manner, while recently, several attempts are made under the generative setting using deep neural networks. However, the state-of-the-art generative methods simply treat the document title and the document main body equally, ignoring the leading role of the title to the overall document. To solve this problem, we introduce a new model called Title-Guided Network (TG-Net) for automatic keyphrase generation task based on the encoderdecoder architecture with two new features: (i) the title is additionally employed as a query-like input, and (ii) a titleguided encoder gathers the relevant information from the title to each word in the document. Experiments on a range of KG datasets demonstrate that our model outperforms the state-of-the-art models with a large margin, especially for documents with either very low or very high title length ratios.


Author(s):  
Mariana S. Leone ◽  
Sergio Caballero

La seguridad en Latinoamérica ha sido abordada tradicionalmente desde una visión estatocéntrica y marcadamente realista, destacando las amenazas que sufre el Estado frente a un actor externo o frente a desestabilizaciones internas. Este artículo busca resaltar la idoneidad de introducir los estudios feministas de seguridad y la ética del cuidado en los análisis de seguridad, en aras de redefinir las amenazas y qué implica “sentirse seguro”, máxime en el escenario generado por la pandemia de la COVID-19. Para ello, se evidencian las lagunas y los silencios de las teorías dominantes a la hora de entender el agravamiento de los desafíos a la seguridad en los primeros seis meses de pandemia y cómo desde la ética del cuidado sí se incorporan esos matices y percepciones de seguridad. Se concluye que la ética del cuidado conlleva un ensanchamiento conceptual a la hora de analizar —académica y políticamente— las amenazas a la seguridad en Latinoamérica. Abstract Security in Latin America has traditionally been addressed from a state-centric and notable realistic perspective, underlining the threats to the state, from an external actor or from internal destabilization. This paper aims to highlight the suitability of incorporating Feminist Security Studies and Care Ethics in security analysis in order to redefine threats and what “feeling safe” implies, especially in the scenario generated by the COVID-19 pandemic. To this end, the gaps and silences in mainstream theories in the diagnoses on the worsening of the security challenges in the first semester of the pandemic are evidenced. Also, the nuances and perceptions of security included in the Care Ethics approach are highlighted. It is concluded that the conceptual broadening that the Care Ethics approach entails is relevant to analyze —academically and politically— the security threats in Latin America.


2012 ◽  
Vol 4 (1) ◽  
pp. 52-66 ◽  
Author(s):  
Junaid Arshad ◽  
Paul Townend ◽  
Jie Xu ◽  
Wei Jie

The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.


1994 ◽  
Vol 160 ◽  
pp. 467-470
Author(s):  
Andrea Milani ◽  
Edward Bowell ◽  
Zoran Knežević ◽  
Anne Lemaitre ◽  
Alessandro Morbidelli ◽  
...  

We have assembled the asteroid proper elements computed by different authors, using different methods, and for different regions of the asteroid belt. Asteroids on planet crossing orbits are not yet included. The use of very different algorithms is dictated by the dynamics of the different regions. For the asteroids of the main belt, having semimajor axes between 2.1 and 3.8 AU, and with proper eccentricity and sine of inclination less than 0.3, proper elements are computed by a fully analytical iterative theory developed by Milani and Knežević (1990,1992,1994; hereafter M&K). For high inclination and/or eccentricity main-belt asteroids, having 1.8 < a < 3.8 AU and either e or sin I larger than 0.24, proper elements are computed by a semianalytical theory developed by Lemaitre and Morbidelli (1994; hereafter L&M). For Trojans, proper elements are computed by a synthetic theory (that is, from the output of a numerical integration for a few Myr) by Milani (1993). For the Hilda asteroids in the 3: 2 resonance, proper elements have been computed by a synthetic theory by Schubart (1982, 1991). For a discussion of the state of the art in the computation of proper elements, see Knežević and Milani, this volume; for Trojans, see Milani, this volume; for some other cases (e.g. proper elements for resonant asteroids), see Froeschlé and Morbidelli, this volume. When and if new proper elements will be available for other asteroids, they will be added to the public domain file, together with updates and upgrades of the existing catalogues.


2020 ◽  
Vol 2020 (2) ◽  
pp. 155-174
Author(s):  
Mert D. Pesé ◽  
Xiaoying Pu ◽  
Kang G. Shin

AbstractVehicular data-collection platforms as part of Original Equipment Manufacturers’ (OEMs’) connected telematics services are on the rise in order to provide diverse connected services to the users. They also allow the collected data to be shared with third-parties upon users’ permission. Under the current suggested permission model, we find these platforms leaking users’ location information without explicitly obtaining users’ permission. We analyze the accuracy of inferring a vehicle’s location from seemingly benign steering wheel angle (SWA) traces, and show its impact on the driver’s location privacy. By collecting and processing real-life SWA traces, we can infer the users’ exact traveled routes with up to 71% accuracy, which is much higher than the state-of-the-art.


2020 ◽  
Vol 23 (3) ◽  
pp. 2047-2065 ◽  
Author(s):  
Yazdan Ahmad Qadri ◽  
Rashid Ali ◽  
Arslan Musaddiq ◽  
Fadi Al-Turjman ◽  
Dae Wan Kim ◽  
...  

2015 ◽  
Vol 235 (1) ◽  
pp. 82-89
Author(s):  
Ullrich Heilemann

Summary This is a fine, useful book on the history and structure of macroeconometric models. Its perspective is “applied” and has a “positivistic bias”. It gives a good (or not so good) picture of the state of the art. The problems of the now “Big Science” deserve more attention than the modelling community (and Welfe) so far has been willing to pay. The trend towards ever larger policy-relevant models will continue. However, few of them are accessible to third parties. “Transparency”, a major goal models had once started to increase, continues to get out of sight.


The way organisations handle, evaluate and leverage information in any sector has essentially altered with big data. Healthcare is one of the most promising fields where big data can be used to create a change. In this paper, as applied to the healthcare industry, we surveyed the state-of - the-art security challenges in big data, assessed how security issues arise in the case of large healthcare data, and discussed ways to address them. We concentrated primarily on the lately suggested anonymization and encryption techniques, their strengths and constraints, and envisaged future directions for studies.


Sign in / Sign up

Export Citation Format

Share Document