2017
Authors
Bahmani, R; Barbosa, M; Brasser, F; Portela, B; Sadeghi, AR; Scerri, G; Warinschi, B;
Publication
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers
Abstract
In this paper we show how Isolated Execution Environments (IEE) offered by novel commodity hardware such as Intel’s SGX provide a new path to constructing general secure multiparty computation (MPC) protocols. Our protocol is intuitive and elegant: it uses code within an IEE to play the role of a trusted third party (TTP), and the attestation guarantees of SGX to bootstrap secure communications between participants and the TTP. The load of communications and computations on participants only depends on the size of each party’s inputs and outputs and is thus small and independent from the intricacies of the functionality to be computed. The remaining computational load– essentially that of computing the functionality – is moved to an untrusted party running an IEE-enabled machine, an attractive feature for Cloud-based scenarios. Our rigorous modular security analysis relies on the novel notion of labeled attested computation which we put forth in this paper. This notion is a convenient abstraction of the kind of attestation guarantees one can obtain from trusted hardware in multi-user scenarios. Finally, we present an extensive experimental evaluation of our solution on SGX-enabled hardware. Our implementation is open-source and it is functionality agnostic: it can be used to securely outsource to the Cloud arbitrary off-the-shelf collaborative software, such as the one employed on financial data applications, enabling secure collaborative execution over private inputs provided by multiple parties. © 2017, International Financial Cryptography Association.
2017
Authors
Martins, S; Amorim, P; Figueira, G; Almada Lobo, B;
Publication
COMPUTERS & INDUSTRIAL ENGINEERING
Abstract
The pharmaceutical industry operates in a very competitive and regulated market The increased pressure of pharmacies to order fewer products and to receive them more frequently is overcharging the pharmaceutical's distribution network Furthermore, the tight margins and the continuous growth of generic drugs consumption are pressing wholesalers to optimize their supply chains. In order to survive, wholesalers are rethinking their strategies to increase competitiveness. This paper proposes an optimization-simulation approach to address the wholesalers network redesign problem, trading off the operational costs and customer service level. Firstly, at a strategic-tactical level, the supply chain network redesign decisions are optimized via a mixed integer programming model. Here, the number, location, function and capacity of the warehouses, the allocation of customers to the warehouses and the capacity and function of the distribution channels are defined. Secondly, at an operation level, the solution found is evaluated by means of a discrete event simulation model to assess the impact of the redesign in the wholesaler's daily activities. Computational results on a pharmaceutical wholesaler case-study are discussed and the benefits of this solution approach exposed.
2017
Authors
Amorim, VA; Maia, JM; Alexandre, D; Marques, PVS;
Publication
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON PHOTONICS, OPTICS AND LASER TECHNOLOGY (PHOTOPTICS)
Abstract
1xN (N=2, 3, 4) MMI power splitters were fabricated in a fused silica substrate by laser direct writing, using a focused 515 nm amplified femtosecond laser beam, and characterized at 1550 nm. To accomplish this, several low loss waveguides were fabricated side by side to form a multimode waveguide with the output in a polished facet of the substrate, while a single low loss waveguide was fabricated to inject light in the centre of the multimode waveguide. The performance of the fabricated devices was optimized by testing three different designs.
2017
Authors
Saleiro, P; Frayling, NM; Rodrigues, EM; Soares, C;
Publication
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, Shinjuku, Tokyo, Japan, August 7-11, 2017
Abstract
Improvements of entity-relationship (E-R) search techniques have been hampered by a lack of test collections, particularly for complex queries involving multiple entities and relationships. In this paper we describe a method for generating E-R test queries to support comprehensive E-R search experiments. Queries and relevance judgments are created from content that exists in a tabular form where columns represent entity types and the table structure implies one or more relationships among the entities. Editorial work involves creating natural language queries based on relationships represented by the entries in the table. We have publicly released the RELink test collection comprising 600 queries and relevance judgments obtained from a sample of Wikipedia List-of-lists-oflists tables. The latter comprise tuples of entities that are extracted from columns and labelled by corresponding entity types and relationships they represent. In order to facilitate research in complex E-R retrieval, we have created and released as open source the RELink Framework that includes Apache Lucene indexing and search specifically tailored to E-R retrieval. RELink includes entity and relationship indexing based on the ClueWeb-09-BWeb collection with FACC1 text span annotations linked to Wikipedia entities. With ready to use search resources and a comprehensive test collection, we support community in pursuing E-R research at scale. © 2017 ACM.
2017
Authors
Queiros, R; Portela, F; Machado, J;
Publication
RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3
Abstract
The advent of Internet and ubiquitous technologies has been fostering the appearance of intelligent mobile applications aware of their environment and the objects nearby. Despite its popularity, mobile developers are often required to write large and disorganized amounts of code, mixing UI with business logic and interact, in a ad-hoc fashion, with sensor devices and services. These habits hinder the code maintenance, refactoring and testing, while negatively influencing the consistency and performance of mobile applications. In this paper we present Magni as an abstract framework for the design and implementation of personalized and context-aware mobile applications. The corner stone of the framework is its architectural pattern based on the Model-View-Presenter pattern in the UI layer relying in REST services the majority of the app features. This paradigm fosters the modular design, implementing the separation of concerns concept and allowing an easier implementation of unit tests. In order to validate the framework, we present a prototype for an healthcare automotive app. The main goal of the app is to facilitate the access to health related points of interest such as hospitals, clinics and pharmacies.
2017
Authors
Coelho, N; Universidade Trás-os-Montes e Alto Douro, Portugal,; Fonseca, B; Castro, A; Universidade Trás-os-Montes e Alto Douro, Portugal,; Instituto Superior de Engenharia do Porto, Portugal,;
Publication
Atas da Conferencia da Associacao Portuguesa de Sistemas de Informacao
Abstract
Recently the world knew by the media, that its leading nations follow closely their citizens, disregarding any moral and technological threshold, that internal and external security agencies in the USA and Europe closely follow telephone conversations, e-mail, web traffic of their counterparts, using powerful monitoring and surveillance programs. In other corners of the globe nations in turmoil or wrapped in the cloak of censorship persecute and deny uncontrolled web access without harmful repercussions to their citizens. This work is a research-in-progress project and consists in showing the research done so far to develop a methodology. This consists in the construction of an operative system with an academic scientific source that permits a secure and anonymous use of the web. For such methodology, first is required to comprehend and get acquaintance with the technologies that controls usage of web consumers, solutions that enable and grant some anonymity and security in web traffic.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.