Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailVSOC - A Virtual Security Operating Center
Falk, Eric UL; Fiz Pontiveros, Beltran UL; Repcek, Stefan et al

in Global Communications (2017)

Security in virtualised environments is becoming increasingly important for institutions, not only for a firm’s own on-site servers and network but also for data and sites that are hosted in the cloud ... [more ▼]

Security in virtualised environments is becoming increasingly important for institutions, not only for a firm’s own on-site servers and network but also for data and sites that are hosted in the cloud. Today, security is either handled globally by the cloud provider, or each customer needs to invest in its own security infrastructure. This paper proposes a Virtual Security Operation Center (VSOC) that allows to collect, analyse and visualize security related data from multiple sources. For instance, a user can forward log data from its firewalls, applications and routers in order to check for anomalies and other suspicious activities. The security analytics provided by the VSOC are comparable to those of commercial security incident and event management (SIEM) solutions, but are deployed as a cloud-based solution with the additional benefit of using big data processing tools to handle large volumes of data. This allows us to detect more complex attacks that cannot be detected with todays signature-based (i.e. rules) SIEM solutions. [less ▲]

Detailed reference viewed: 35 (7 UL)
Full Text
See detailBlockchain Technology - Arsenal for a Shariah-Compliant Financial Ecosystem
Lacasse, Rcihard-Marc; Lambert, Berthe; Khan, Nida UL

Scientific Conference (2017, December 05)

The authors’ first challenge is to decipher the complexity of Islamic Finance despite the opacity of the sector. A second focal point is the agent’s agenda; in the Islamic Finance industry, contributors ... [more ▼]

The authors’ first challenge is to decipher the complexity of Islamic Finance despite the opacity of the sector. A second focal point is the agent’s agenda; in the Islamic Finance industry, contributors mandate intermediaries (agents) to transfer their contributions to social causes according to the Shariah; in principle, Islamic financial institutions must create value for their stakeholders by offering Shariah-compliant products and services. An underlying assumption of agency theory is that agents attempt to maximize their personal welfare and compensation, but such behaviour may not always be in the best interests of other stakeholders, and an analysis of the agent’s agenda can help explain how agents can fall off the pedestal of altruism. Relationships between Islamic banks and three key stakeholders (contributors, beneficiaries and regulators) are also explored via a complexity-aware monitoring process. Contributors provide funds to an Islamic bank (agent), and in return, the agent should be accountable to the contributors, but the form and degree of accountability can vary depending on the organization’s mission. There are many unanswered questions regarding the monitoring process. One objective of the article is to consider whether agents act in the best interests of the stakeholders. Finally, the authors explore the following question: Can blockchain technology and smart contracts support and enhance the transparency feature, which is the core underlying principle of all transactions in the Islamic Finance industry? A qualitative research framework was adopted because of the constraints of the enigmatic, secretive Islamic Finance culture. [less ▲]

Detailed reference viewed: 108 (7 UL)
Full Text
See detailPatrimoine et identités
Kmec, Sonja UL

Conference given outside the academic context (2017)

A partir de deux exemples du Luxembourg - les vieux quartiers et fortifications de la Ville de Luxembourg (patrimoine mondial depuis 1994) et la procession dansante d’Echternach (patrimoine culturel ... [more ▼]

A partir de deux exemples du Luxembourg - les vieux quartiers et fortifications de la Ville de Luxembourg (patrimoine mondial depuis 1994) et la procession dansante d’Echternach (patrimoine culturel immatériel depuis 2010) - cette conférence se penche sur les arguments avancés en faveur de leur inscription et les critères appliqués. Elle décrit trois types de discours qui relient patrimoine et identités. La conférence sera diffusée sur la radio 100,7. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
See detailWWII: Die Suche nach dem alten Freund
Ganschow, Inna UL

Article for general public (2017)

The article treats a friendship between a Soviet POW and a Luxemburger in 1944, both working at the Reichsbahn under the German occupation in Luxembourg.

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailTightly-Secure PAK(E)
Lopez Becerra, José Miguel UL; Iovino, Vincenzo UL; Ostrev, Dimiter UL et al

in Cryptology and Network Security (2017, December 02)

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete ... [more ▼]

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete security. Our proof is the first to show that the PAK protocol can provide meaningful security guarantees for values of the parameters typical in today’s world. [less ▲]

Detailed reference viewed: 21 (2 UL)
See detailDas postfaktische Drängen des Buchstaben in Zeiten rechtlich-sprachlicher Entgrenzung
Becker, Katrin UL

Presentation (2017, December 01)

Detailed reference viewed: 27 (5 UL)
Full Text
See detailPreparing Future Teachers for Strategic Uses of Educational Technology: A Project-Based Approach
Reuter, Bob UL; Busana, Gilbert UL

Scientific Conference (2017, December 01)

Given (1) the need for teachers who are willing and able to design, implement and reflect meaningful and successful educational technology practices in schools and (2) the current rarity of strategic uses ... [more ▼]

Given (1) the need for teachers who are willing and able to design, implement and reflect meaningful and successful educational technology practices in schools and (2) the current rarity of strategic uses of ICT in education in Luxembourgish schools, the self-declared lack of competencies and the low confidence of teachers when it comes to teaching with ICT (Reuter, Busana & Linckels, 2016), we have designed, implemented and tested a project-based approach to the development of practice- oriented TPACK in pre-service teachers. Future teacher students are instructed to define an educational problem they want to solve, to explore existing pedagogical and technological solutions and to design an original solution that involves the strategic use of ICT (theoretically grounded and practically meaningful). They then have to implement the designed learning & teaching scenario in a classroom, to document the teaching & learning processes, to analyse, evaluate and to critically reflect them. Finally, they are required to write a structured report about their project and to present it to their peers and to interested teachers from schools. Overall, we observe that while most students become able to design and implement relatively meaningful educational technology practices, they still tend to feel that they are not ready to teach with technology in a more general sense, because their work was focused on one or two tools and does not give them access to a broader range of meaningful ICT-enriched teaching scenarios for their later professional career. [less ▲]

Detailed reference viewed: 28 (2 UL)
Full Text
Peer Reviewed
See detailFast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
Xinwei, Gao; Li, Lin; Jintai, Ding et al

in The 13th International Conference on Information Security Practice and Experience - ISPEC 2017 (2017, December 01)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailEvaluating the Impact of Juice Filming Charging Attack in Practical Environments
Meng, Weizhi; Lee, Wanghao; Liu, Zhe UL et al

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 01)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailCombined Use of Lifecycle Management and IoT in Smart Cities
Hefnawy, Ahmed; Elhariri, Taha; Bouras, Abdelaziz et al

in Combined Use of Lifecycle Management and IoT in Smart Cities (2017, December)

Detailed reference viewed: 23 (2 UL)
Full Text
Peer Reviewed
See detailProbabilistic Analysis of Low-Criticality Execution
Küttler, Martin; Roitzsch, Michael; Hamann, Claude-Joachim et al

Scientific Conference (2017, December)

The mixed-criticality toolbox promises system architects a powerful framework for consolidating real-time tasks with different safety properties on a single computing platform. Thanks to the research ... [more ▼]

The mixed-criticality toolbox promises system architects a powerful framework for consolidating real-time tasks with different safety properties on a single computing platform. Thanks to the research efforts in the mixed-criticality field, guarantees provided to the highest criticality level are well understood. However, lower-criticality job execution depends on the condition that all high-criticality jobs complete within their more optimistic low-criticality execution time bounds. Otherwise, no guarantees are made. In this paper, we add to the mixed-criticality toolbox by providing a probabilistic analysis method for low-criticality tasks. While deterministic models reduce task behavior to constant numbers, probabilistic analysis captures varying runtime behavior. We introduce a novel algorithmic approach for probabilistic timing analysis, which we call symbolic scheduling. For restricted task sets, we also present an analytical solution. We use this method to calculate per-job success probabilities for low-criticality tasks, in order to quantify, how low-criticality tasks behave in case of high-criticality jobs overrunning their optimistic low-criticality reservation. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
See detailLegal Knowledge and Information Systems - JURIX 2017: The Thirtieth Annual Conference
Wyner, Adam; Casini, Giovanni UL

Book published by IOS Press BV (2017)

The proceedings of the 30th International Conference on Legal Knowledge and Information Systems – JURIX 2017. For three decades, the JURIX conferences have been held under the auspices of the Dutch ... [more ▼]

The proceedings of the 30th International Conference on Legal Knowledge and Information Systems – JURIX 2017. For three decades, the JURIX conferences have been held under the auspices of the Dutch Foundation for Legal Knowledge Based Systems (www.jurix.nl). In the time, it has become a European conference in terms of the diverse venues throughout Europe and the nationalities of participants. [less ▲]

Detailed reference viewed: 22 (1 UL)
Full Text
Peer Reviewed
See detailDetachment in Normative Systems: Examples, inference Patterns, Properties
Parent, Xavier UL; van der Torre, Leon UL

in The IfCoLog Journal of Logics and their Applications (2017), 4(9), 2295-3039

There is a variety of ways to reason with normative systems. This partly reflects a variety of semantics developed for deontic logic, such as traditional semantics based on possible worlds, or alternative ... [more ▼]

There is a variety of ways to reason with normative systems. This partly reflects a variety of semantics developed for deontic logic, such as traditional semantics based on possible worlds, or alternative semantics based on algebraic methods, explicit norms or techniques from non-monotonic logic. This diversity raises the question how these reasoning methods are related, and which reasoning method should be chosen for a particular application. In this paper we discuss the use of examples, inference patterns, and more abstract properties. First, benchmark examples can be used to compare ways to reason with normative systems. We give an overview of several benchmark examples of normative reasoning and deontic logic: van Fraassen’s paradox, Forrester’s paradox, Prakken and Sergot’s cottage regulations, Jeffrey’s disarmament example, Chisholm’s paradox, Makinson’s Möbius strip, and Horty’s priority examples. Moreover, we distinguish various interpretations that can be given to these benchmark examples, such as consistent interpretations, dilemma interpretations, and violability interpretations. Second, inference patterns can be used to compare different ways to reason with normative systems. Instead of analysing the benchmark examples semantically, as it is usually done, in this paper we use inference patterns to analyse them at a higher level of abstraction. We discuss inference patterns reflecting typical logical properties such as strengthening of the antecedent or weakening of the consequent. Third, more abstract properties can be defined to compare different ways to reason with normative systems. To define these more abstract properties, we first present a formal framework around the notion of detachment. Some of the ten properties we introduce are derived from the inference patterns, but others are more abstract: factual detachment, violation detection, substitution, replacements of equivalents, implication, para-consistency, conjunction, factual monotony, norm monotony, and norm induction. We consider these ten properties as desirable for a reasoning method for normative systems. [less ▲]

Detailed reference viewed: 28 (6 UL)
Full Text
Peer Reviewed
See detailFacing the Safety-Security Gap in RTES: the Challenge of Timeliness
Volp, Marcus UL; Kozhaya, David UL; Verissimo, Paulo UL

Scientific Conference (2017, December)

Safety-critical real-time systems, including real-time cyber-physical and industrial control systems, need not be solely correct but also timely. Untimely (stale) results may have severe consequences that ... [more ▼]

Safety-critical real-time systems, including real-time cyber-physical and industrial control systems, need not be solely correct but also timely. Untimely (stale) results may have severe consequences that could render the control system’s behaviour hazardous to the physical world. To ensure predictability and timeliness, developers follow a rigorous process, which essentially ensures real-time properties a priori, in all but the most unlikely combinations of circumstances. However, we have seen the complexity of both real-time applications, and the environments they run on, increase. If this is matched with the also increasing sophistication of attacks mounted to RTES systems, the case for ensuring both safety and security through aprioristic predictability loses traction, and presents an opportunity, which we take in this paper, for discussing current practices of critical realtime system design. To this end, with a slant on low-level task scheduling, we first investigate the challenges and opportunities for anticipating successful attacks on real-time systems. Then, we propose ways for adapting traditional fault- and intrusiontolerant mechanisms to tolerate such hazards. We found that tasks which typically execute as analyzed under accidental faults, may exhibit fundamentally different behavior when compromised by malicious attacks, even with interference enforcement in place. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailSymbol-level Precoding for the Non-linear Multiuser MISO Downlink Channel
Spano, Danilo UL; Alodeh, Maha; Chatzinotas, Symeon UL et al

in IEEE Transactions on Signal Processing (2017)

This paper investigates the problem of the interference among multiple simultaneous transmissions in the downlink channel of a multi-antenna wireless system. A symbol-level precoding scheme is considered ... [more ▼]

This paper investigates the problem of the interference among multiple simultaneous transmissions in the downlink channel of a multi-antenna wireless system. A symbol-level precoding scheme is considered, in order to exploit the multi-user interference and transform it into useful power at the receiver side, through a joint utilization of the data information and the channel state information. In this context, this paper presents novel strategies which exploit the potential of symbol-level precoding to control the per-antenna instantaneous transmit power. In particular, the power peaks amongst the transmitting antennas and the instantaneous power imbalances across the different transmitted streams are minimized. These objectives are particularly relevant with respect to the non-linear amplitude and phase distortions induced by the per-antenna amplifiers, which are important sources of performance degradation in practical systems. More specifically, this work proposes two different symbol-level precoding approaches. A first approach performs a weighted per-antenna power minimization, under Quality-of-Service constraints and under a lower bound constraint on the per-antenna transmit power. A second strategy performs a minimization of the spatial peak-to-average power ratio, evaluated amongst the transmitting antennas. Numerical results are presented in a comparative fashion to show the effectiveness of the proposed techniques, which outperform the state of the art symbol-level precoding schemes in terms of spatial peak-to-average power ratio, spatial dynamic range, and symbol-error-rate over non-linear channels. [less ▲]

Detailed reference viewed: 14 (5 UL)
Full Text
Peer Reviewed
See detailMultiagent Deontic Logic and its Challenges from a Normative Systems Perspective
Pigozzi, Gabriella; van der Torre, Leon UL

in Ifcolog Journal of Logics and their Applications (2017)

This article gives an overview of several challenges studied in deontic logic, with an emphasis on challenges involving agents. We start with traditional modal deontic logic using preferences to address ... [more ▼]

This article gives an overview of several challenges studied in deontic logic, with an emphasis on challenges involving agents. We start with traditional modal deontic logic using preferences to address the challenge of contrary-toduty reasoning, and STIT theory addressing the challenges of non-deterministic actions, moral luck and procrastination. Then we turn to alternative normbased deontic logics detaching obligations from norms to address the challenge of Jørgensen’s dilemma, including the question how to derive obligations from a normative system when agents cannot assume that other agents comply with their norms. We discuss also some traditional challenges from the viewpoint of normative systems: when a set of norms may be termed ‘coherent’, how to deal with normative conflicts, how to combine normative systems and traditional deontic logic, how various kinds of permission can be accommodated, how meaning postulates and counts-as conditionals can be taken into account,how sets of norms may be revised and merged, and how normative systems can be combined with game theory. The normative systems perspective means that norms, not ideality or preference, should take the central position in deontic semantics, and that a semantics that represents norms explicitly provides a helpful tool for analysing, clarifying and solving the problems of deontic logic. We focus on the challenges rather than trying to give full coverage of related work, for which we refer to the handbook of deontic logic and normative systems. [less ▲]

Detailed reference viewed: 5 (0 UL)
Peer Reviewed
See detailGenerational Conflicts, the Spirit of ‘68 and Cultural Emancipation in the German Speaking Community of Belgium. A Historical Essay About the ‘73 Generation
Fickers, Andreas UL

in Venken, Machteld (Ed.) Borderland Studies Meets Child Studies. A European Encounter (2017)

‘Changes were in the air’ – is perhaps the best way to describe the social mood at the end of the 1960s and the beginning of the 1970s. On the international stage, the gap between the post-war generation ... [more ▼]

‘Changes were in the air’ – is perhaps the best way to describe the social mood at the end of the 1960s and the beginning of the 1970s. On the international stage, the gap between the post-war generation, known as the ‘baby boomers’ and the generation that had experienced World War II as adolescents or young adults came to light in the form of student protests, anti-war movements and new concepts of life. It is scarcely a coincidence that there were protests in eastern Belgium too at this time. What were the ‘young wild ones’ protesting against in the German speaking region of Belgium? Based on a generational approach, this article aims at contextualizing the autonomy-debate in the late 1960s and early 1970s by focusing on a historical investigation into a few young people in the Eifel region that would strike new political tones with lasting influence on the political landscape as well as on the social or cultural environment of eastern Belgium. [less ▲]

Detailed reference viewed: 13 (1 UL)