Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailÀ propos de l'évêque Marus de Trèves
Dubuisson, Bastien UL

in Analecta Bollandiana: Revue Critique d'Hagiographie (in press)

The life of Bishop Marus of Trier (5th century) is little known, apart from a few snippets of information transmitted in the Gesta Treverorum (ca. 1100). Only a brief miraculous account from the beginning ... [more ▼]

The life of Bishop Marus of Trier (5th century) is little known, apart from a few snippets of information transmitted in the Gesta Treverorum (ca. 1100). Only a brief miraculous account from the beginning of the 16th century provides some additional details on the character, limited however to his qualities as an intercessor. The discovery of an older witness to this work in the Sanctilogium of Jean Gielemans of the Abbey of Rouge-Cloître makes it possible to re-evaluate its dating. The investigation into the genesis and transmission of this text (the edition of which is given in the appendix) is an opportunity to deal with a lesser-known period of the hagiography of Trier and to address the question of the existence of a Vita of the bishop. [less ▲]

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailMarital Patterns and Income Inequality
Dupuy, Arnaud UL; Weber, Simon

in Economica (in press)

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailNIKE from Affine Determinant Programs
Barthel, Jim Jean-Pierre UL; Rosie, Razvan UL

in Qiong, Huang; Yu, Yu (Eds.) Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

A multi-party non-interactive key-exchange (NIKE) scheme enables N users to securely exchange a secret key K in a non-interactive manner. It is well-known that NIKE schemes can be obtained assuming the ... [more ▼]

A multi-party non-interactive key-exchange (NIKE) scheme enables N users to securely exchange a secret key K in a non-interactive manner. It is well-known that NIKE schemes can be obtained assuming the existence of indistinguishability obfuscation (iO). In this work, we revisit the original, iO-based, provably-secure NIKE construction by Boneh and Zhandry, aiming to simplify it. The core idea behind our protocol is to replace the functionality of the obfuscator with the one of an affine determinant program (ADP). Although ADPs have been designed with the purpose of attaining indistinguishability obfuscation, such implication is left open for general circuits. The ingredients enabling to prove the security of our scheme stem into a more careful analysis of the branching programs needed to build ADPs. In particular, we show: 1) An intuitive indistinguishability notion defined for ADPs of puncturable pseudorandom functions (PRFs) is sufficient to prove security for NIKE. 2) A set of simple conditions based on ADP's branching program topology that are sufficient for proving indistinguishability of ADPs. We leave open the question of finding ADPs satisfying them. [less ▲]

Detailed reference viewed: 40 (4 UL)
Full Text
Peer Reviewed
See detailPartitioned Searchable Encryption
Barthel, Jim Jean-Pierre UL; Beunardeau, Marc; Rosie, Razvan et al

in Qiong, Huang; Yu, Yu (Eds.) Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the ... [more ▼]

Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the search/update queries. In this work we put forth a new flavour of symmetric searchable encryption (SSE): Partitioned SSE is meant to capture the cases where the search rights must be partitioned among multiple individuals. We motivate through compelling examples the practical need for such a notion and discuss instantiations based on functional encryption and trapdoor permutations. First we leverage the power of functional encryption (FE). Our construction follows the general technique of encrypting the set of keywords and the presumably larger datafiles separately, a keyword acting as a ``pointer'' to datafiles it belongs to. To improve on the constraint factors (large ciphertext, slow encryption/decryption procedures) that are inherent in FE schemes, the keyword check is done with the help of a Bloom filter -- one per datafile: the crux idea is to split the filter into buckets, and encrypt each bucket separately under an FE scheme. Functional keys are given for binary \masks checking if relevant positions are set to 1 inside the underlying bit-vector of the Bloom filter. The second construction we present achieves forward security and stems from the scheme by Bost in CCS'16. We show that a simple tweak of the original construction gives rise to a scheme supporting updates in the partitioned setting. Moreover, the constructions take into account the possibility that some specific users are malicious while declaring their search results. [less ▲]

Detailed reference viewed: 101 (1 UL)
Full Text
Peer Reviewed
See detailLehren und Lernen auf Distanz – Impulse für digitale Unterrichtsentwicklung in Luxemburg
Baumann, Isabell Eva UL; Harion, Dominic UL

in Bildungsbericht für Luxemburg 2021 (in press)

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailOn the (M)iNTRU assumption in the integer case
Barthel, Jim Jean-Pierre UL; Müller, Volker UL; Rosie, Razvan UL

in Provable and Practical Security, 15th International Conference, ProvSec 2021, Guangzhou, November 5 – November 8, 2021, Proceedings (in press)

In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous NTRU (iNTRU) assumption and its matrix version MiNTRU ... [more ▼]

In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous NTRU (iNTRU) assumption and its matrix version MiNTRU. In this work, we break the integer case of the iNTRU assumption through elementary lattice reduction, and we describe how the attack might be generalized to polynomial rings and to the low dimensional MiNTRU assumption with small noise. [less ▲]

Detailed reference viewed: 74 (9 UL)
Full Text
Peer Reviewed
See detailA Note on the Estimation of Job Amenities and Labor Productivity
Dupuy, Arnaud UL; Galichon, Alfred

in Quantitative Economics (in press)

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailLife Satisfaction and the Human Development Index Across the World
Yin, Remi UL; Lepinteur, Anthony UL; Clark, Andrew et al

in Journal of Cross-Cultural Psychology (in press)

We use annual data on over 150 countries between 2005 and 2018 to look at the relationship between subjective well-being (both cognitive and affective) and the Human Development Index (HDI). The HDI ... [more ▼]

We use annual data on over 150 countries between 2005 and 2018 to look at the relationship between subjective well-being (both cognitive and affective) and the Human Development Index (HDI). The HDI appears to be more closely related to cognitive than affective well-being. We also consider the relationships between the three HDI components (the Income, Health and Education Indices) and well-being, and find that, on average, the Income Index has the strongest predictive power. Importantly, we find that the three HDI components only matter equally in Western and rich countries. Our analysis contributes to the discussion about cultural sensitivity in paradigms of societal development in two ways. We first show that differences in preferences towards development aims exist. Second, we propose a weighting procedure for a culturally-sensitive version of the HDI. [less ▲]

Detailed reference viewed: 61 (4 UL)
Full Text
Peer Reviewed
See detailPrenatal exposure to endocrine disrupting chemicals is associated with altered DNA methylation in cord blood
Mattonet, Katharina; Nowack-Weyers, Nikola; Vogel, Vanessa et al

in Epigenetics (in press)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailHeartbeat evoked potentials in patients with posttraumatic stress disorder: an unaltered neurobiological regulation system?
Schmitz, Marius; Müller, Laura E.; Seitz, Katja I. et al

in European Journal of Psychotraumatology (in press)

Background: Early life maltreatment is a risk factor for psychiatric disorders, including posttraumatic stress disorder (PTSD). Posttraumatic stress disorder is a severe and heterogeneous disorder with ... [more ▼]

Background: Early life maltreatment is a risk factor for psychiatric disorders, including posttraumatic stress disorder (PTSD). Posttraumatic stress disorder is a severe and heterogeneous disorder with fluctuating states of emotional over- and undermodulation including hypervigilance, dissociation, and emotion regulation deficits. The perception and regulation of emotions have been linked to interoception, the cortical representation and sensing of inner bodily processes. Although first therapeutic approaches targeting bodily sensations have been found effective in patients with PTSD, and deficits in interoceptive signal representation have been reported in other trauma-related disorders such as borderline personality disorder (BPD), the role of interoception remains largely unexplored for PTSD. Objective: The objective was to investigate the cortical representation of cardiac interoceptive signals in patients with PTSD and its associations with early life maltreatment, trait dissociation, and emotion dysregulation. Methods: Twenty-four medication-free patients with PTSD and 31 healthy controls (HC) completed a 5-min resting electrocardiogram (ECG) with parallel electroencephalogram (EEG). Heartbeat evoked potential (HEP) amplitudes as a measure for cortical representation of cardiac interoceptive signals were compared between groups and correlated with self-report questionnaires. Results: We did not find significantly different mean HEP amplitudes in patients with PTSD compared to HC, although HEPs of patients with PTSD were descriptively higher. No significant associations between mean HEP amplitudes and early life maltreatment, trait dissociation or emotion dysregulation were obtained within the groups. Conclusion: The current finding does not indicate deficits in interoceptive signal representation at rest in individuals with PTSD. Whether patients with PTSD show altered HEP modulations during emotion regulation tasks and might benefit from therapeutic approaches aiming at changing the perception of bodily signals, needs to be investigated in future studies. [less ▲]

Detailed reference viewed: 86 (7 UL)
Full Text
Peer Reviewed
See detailWell-being and working from home during COVID-19
Schifano, Sonia UL; Clark, Andrew; Greiff, Samuel UL et al

in Information Technology and People (in press)

Purpose – The authors track the well-being of individuals across five European countries during the course of the coronavirus disease 2019 (COVID-19) pandemic and relate their well-being to working from ... [more ▼]

Purpose – The authors track the well-being of individuals across five European countries during the course of the coronavirus disease 2019 (COVID-19) pandemic and relate their well-being to working from home. The authors also consider the role of pandemic-policy stringency in affecting well-being in Europe. Design/methodology/approach – The authors have four waves of novel harmonised longitudinal data in France, Italy, Germany, Spain and Sweden, covering the period May–November 2020. Well-being is measured in five dimensions: life satisfaction, a worthwhile life, loneliness, depression and anxiety. A retrospective diary indicates whether the individual was working in each month since February 2020 and if so whether at home or not at home. Policy stringency is matched in per country at the daily level. The authors consider both cross- section and panel regressions and the mediating and moderating effects of control variables, including household variables and income. Findings – Well-being among workers is lower for those who work from home, and those who are not working have the lowest well-being of all. The panel results are more mitigated, with switching into working at home yielding a small drop in anxiety. The panel and cross-section difference could reflect adaptation or the selection of certain types of individuals into working at home. Policy stringency is always negatively correlated with well-being. The authors find no mediation effects. The well-being penalty from working at home is larger for the older, the better-educated, those with young children and those with more crowded housing. Originality/value – The harmonised cross-country panel data on individuals’ experiences during COVID-19 are novel. The authors relate working from home and policy stringency to multiple well-being measures. The authors emphasise the effect of working from home on not only the level of well-being but also its distribution. [less ▲]

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailModeling Data Protection and Privacy: Application and Experience with GDPR
Torre, Damiano UL; Alferez, Mauricio UL; Soltana, Ghanem UL et al

in Software and Systems Modeling (in press)

In Europe and indeed worldwide, the Gen- eral Data Protection Regulation (GDPR) provides pro- tection to individuals regarding their personal data in the face of new technological developments. GDPR is ... [more ▼]

In Europe and indeed worldwide, the Gen- eral Data Protection Regulation (GDPR) provides pro- tection to individuals regarding their personal data in the face of new technological developments. GDPR is widely viewed as the benchmark for data protection and privacy regulations that harmonizes data privacy laws across Europe. Although the GDPR is highly ben- e cial to individuals, it presents signi cant challenges for organizations monitoring or storing personal infor- mation. Since there is currently no automated solution with broad industrial applicability, organizations have no choice but to carry out expensive manual audits to ensure GDPR compliance. In this paper, we present a complete GDPR UML model as a rst step towards de- signing automated methods for checking GDPR compli- ance. Given that the practical application of the GDPR is infuenced by national laws of the EU Member States,we suggest a two-tiered description of the GDPR, generic and specialized. In this paper, we provide (1) the GDPR conceptual model we developed with complete trace- ability from its classes to the GDPR, (2) a glossary to help understand the model, (3) the plain-English de- scription of 35 compliance rules derived from GDPR along with their encoding in OCL, and (4) the set of 20 variations points derived from GDPR to specialize the generic model. We further present the challenges we faced in our modeling endeavor, the lessons we learned from it, and future directions for research. [less ▲]

Detailed reference viewed: 39 (3 UL)
Full Text
See detailAlgorithmic Decision Making with Python Resources: From multicriteria performance records to decision algorithms via bipolar-valued outranking digraphs
Bisdorff, Raymond UL

Book published by Springer (in press)

This book describes Python3 programming resources for implementing decision aiding algorithms in the context of a bipolar-valued outranking approach. These computing resources, made available under the ... [more ▼]

This book describes Python3 programming resources for implementing decision aiding algorithms in the context of a bipolar-valued outranking approach. These computing resources, made available under the name Digraph3, are useful in the field of Algorithmic Decision Theory and more specifically in outranking-based Multiple-Criteria Decision Aiding (MCDA). The first part of the book presents a set of tutorials introducing the Digraph3 collection of Python3 modules and its main objects such as bipolar-valued digraphs and outranking digraphs. The second part illustrates in eight methodological chapters multiple-criteria evaluation models and decision algorithms. These chapters are mostly problem oriented and show how edit a new multiple-criteria performance tableau, how to build a best choice recommendation, how to compute the winner of an election and how to rank or rate with incommensurable criteria. The book's third part presents three real decision case studies, while the fourth part addresses more advanced topics, such as computing ordinal correlations between bipolar-valued outranking digraphs, computing kernels in bipolar-valued digraphs, testing for confidence or stability of outranking statements when facing uncertain or solely ordinal criteria significance weights, and tempering plurality tyranny effects in social choice problems. The last part is more specifically focused on working with undirected graphs, tree graphs and forests. The closing chapter explores comparability, split, interval and permutation graphs. The book is primarily intended for graduate students in management sciences, computational statistics and operations research. Chapters presenting algorithms for ranking multicriteria performance records will be of computational interest for designers of web recommender systems. Similarly, the relative and absolute quantiles-rating algorithms, discussed and illustrated in several chapters, will be of practical interest for public or private performance auditors. [less ▲]

Detailed reference viewed: 12 (3 UL)
See detailEsclavage, servitude, travail forcé : constitution et évolution d’un cadre conceptuel
Erpelding, Michel UL

in Marchadier, Fabien (Ed.) La prohibition de l'esclavage (in press)

This chapter examines the emergence, definition and evolution of the concepts of slavery, forced labour and servitude in international law.

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Reverse Engineering of Role-based Access Control Policies of Web Applications
Le, Ha Thanh UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in Journal of Systems and Software (in press)

Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with ... [more ▼]

Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with respect to policy specifications or intended access rights. However, in practice, AC policy specifications are often missing or poorly documented; in some cases, AC policies are hard-coded in business logic implementations. This leads to difficulties in validating the correctness of policy implementations and detecting AC defects. In this paper, we present a semi-automated framework for reverse-engineering of AC policies from Web applications. Our goal is to learn and recover role-based access control (RBAC) policies from implementations, which are then used to validate implemented policies and detect AC issues. Our framework, built on top of a suite of security tools, automatically explores a given Web application, mines domain input specifications from access logs, and systematically generates and executes more access requests using combinatorial test generation. To learn policies, we apply machine learning on the obtained data to characterize relevant attributes that influence AC. Finally, the inferred policies are presented to the security engineer, for validation with respect to intended access rights and for detecting AC issues. Inconsistent and insufficient policies are highlighted as potential AC issues, being either vulnerabilities or implementation errors. We evaluated our approach on four Web applications (three open-source and a proprietary one built by our industry partner) in terms of the correctness of inferred policies. We also evaluated the usefulness of our approach by investigating whether it facilitates the detection of AC issues. The results show that 97.8% of the inferred policies are correct with respect to the actual AC implementation; the analysis of these policies led to the discovery of 64 AC issues that were reported to the developers. [less ▲]

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailLearning-Assisted User Clustering in Cell-Free Massive MIMO-NOMA Networks
Le, Quang Nhat; Nguyen, van Dinh UL; Dobre, Octavia A. et al

in IEEE Transactions on Vehicular Technology (in press)

The superior spectral efficiency (SE) and user fairness feature of non-orthogonal multiple access (NOMA) systems are achieved by exploiting user clustering (UC) more efficiently. However, a random UC ... [more ▼]

The superior spectral efficiency (SE) and user fairness feature of non-orthogonal multiple access (NOMA) systems are achieved by exploiting user clustering (UC) more efficiently. However, a random UC certainly results in a suboptimal solution while an exhaustive search method comes at the cost of high complexity, especially for systems of medium-to-large size. To address this problem, we develop two efficient unsupervised machine learning based UC algorithms, namely k-means++ and improved k-means++, to effectively cluster users into disjoint clusters in cell-free massive multiple-input multiple-output (CFmMIMO) system. Adopting full-pilot zero-forcing at access points (APs) to comprehensively assess the system performance, we formulate the sum SE optimization problem taking into account power constraints at APs, necessary conditions for implementing successive interference cancellation, and required SE constraints at user equipments. The formulated optimization problem is highly non-convex, and thus, it is difficult to obtain the global optimal solution. Therefore, we develop a simple yet efficient iterative algorithm for its solution. In addition, the performance of collocated massive MIMO-NOMA (COmMIMO-NOMA) system is also characterized. Numerical results are provided to show the superior performance of the proposed UC algorithms compared to baseline schemes. The effectiveness of applying NOMA in CFmMIMO and COmMIMO systems is also validated. [less ▲]

Detailed reference viewed: 30 (7 UL)