This presentation concerns concepts such as naming, identification, addressing and location. Several examples are provided. The examples are used to motivate a collection of definitions.
This document proposes a security framework for open systems like service-oriented applications and grid computing. The framework models entities as autonomous software agents that can communicate and reason about trust. Agents interact using public dialogue game protocols and private strategies. Agents compute trust in other agents based on direct interaction histories and social networks. The trust computation considers parameters like number of interactions, social network size, and timeliness of information. Simulations show the framework can efficiently detect malicious entities. The framework provides protocols, strategies, and parameters for trust computation that overcome limitations of existing quantitative trust models.
- An object is an entity that has state, behavior, and identity. The state is represented by attributes and the behavior is represented by methods.
- Objects communicate by sending messages. An object's interface specifies the messages it can receive. When an object receives a message, it may change state and send messages to other objects.
- Encapsulation hides implementation details and controls access to an object's state. The interface only exposes what is necessary. Collaboration between objects enables complex behaviors to emerge from simple objects interacting.
The document discusses techniques for detecting data leakage when sensitive data is distributed to third parties. It proposes distributing data intelligently using allocation strategies to improve the chances of identifying a guilty agent if data is leaked. Specifically, it evaluates distributing data with and without "fake objects" that resemble real data but do not correspond to real entities. The strategies are evaluated experimentally using simulated data leakage problems. The goal is to identify agents who leak data with strong evidence in order to hold them legally accountable.
Data leakage occurs when sensitive data is transmitted outside an organization without authorization. To prevent leakage, organizations distribute data to third-party agents but must ensure the agents do not leak the data. The document proposes strategies for distributing data to agents in a way that improves the ability to detect which agent leaked the data, should a leak occur. Specifically, the strategies involve distributing disjoint or unique subsets of real data to agents, along with fake data to identify the source of any leaks. The strategies aim to minimize overlap in the data distributed to different agents.
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
This document proposes a method for detecting data leakage using cloud computing. It discusses how data leakage occurs, different techniques for protecting data, and a proposed methodology. Specifically, it presents an algorithm for allocating data to agents in a way that maximizes the ability to detect which agent leaked the data if a leak occurs. The algorithm takes agents' data requests as input and allocates real and fake data to the agents while aiming to minimize overlap between the agents' data sets.
The authors propose strategies for detecting data leakage when sensitive data is shared with third parties (agents). They develop a model to assess the likelihood that leaked data came from one or more agents versus being independently gathered. The strategies involve how to distribute data objects among agents in a way that improves the ability to identify leakages. Some strategies involve injecting "fake but realistic" data objects that act as watermarks without modifying real data. The strategies are evaluated based on their ability to identify leakers in different data leakage scenarios.
The document discusses techniques for detecting data leakage when sensitive data is shared with third parties (agents). It proposes:
1) A model to calculate the probability that each agent is guilty of leaking a set of data (S) that was discovered outside of authorized channels. The model accounts for the likelihood that data in S could be guessed or obtained from other public sources versus leaked by agents.
2) Strategies for allocating data among agents in a way that improves the ability to identify leakers, such as distributing unique or rare records to single agents.
3) The optional addition of "fake" records to the data in a manner similar to digital watermarks, allowing positive identification of leakers if fake
This document proposes a security framework for open systems like service-oriented applications and grid computing. The framework models entities as autonomous software agents that can communicate and reason about trust. Agents interact using public dialogue game protocols and private strategies. Agents compute trust in other agents based on direct interaction histories and social networks. The trust computation considers parameters like number of interactions, social network size, and timeliness of information. Simulations show the framework can efficiently detect malicious entities. The framework provides protocols, strategies, and parameters for trust computation that overcome limitations of existing quantitative trust models.
- An object is an entity that has state, behavior, and identity. The state is represented by attributes and the behavior is represented by methods.
- Objects communicate by sending messages. An object's interface specifies the messages it can receive. When an object receives a message, it may change state and send messages to other objects.
- Encapsulation hides implementation details and controls access to an object's state. The interface only exposes what is necessary. Collaboration between objects enables complex behaviors to emerge from simple objects interacting.
The document discusses techniques for detecting data leakage when sensitive data is distributed to third parties. It proposes distributing data intelligently using allocation strategies to improve the chances of identifying a guilty agent if data is leaked. Specifically, it evaluates distributing data with and without "fake objects" that resemble real data but do not correspond to real entities. The strategies are evaluated experimentally using simulated data leakage problems. The goal is to identify agents who leak data with strong evidence in order to hold them legally accountable.
Data leakage occurs when sensitive data is transmitted outside an organization without authorization. To prevent leakage, organizations distribute data to third-party agents but must ensure the agents do not leak the data. The document proposes strategies for distributing data to agents in a way that improves the ability to detect which agent leaked the data, should a leak occur. Specifically, the strategies involve distributing disjoint or unique subsets of real data to agents, along with fake data to identify the source of any leaks. The strategies aim to minimize overlap in the data distributed to different agents.
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
This document proposes a method for detecting data leakage using cloud computing. It discusses how data leakage occurs, different techniques for protecting data, and a proposed methodology. Specifically, it presents an algorithm for allocating data to agents in a way that maximizes the ability to detect which agent leaked the data if a leak occurs. The algorithm takes agents' data requests as input and allocates real and fake data to the agents while aiming to minimize overlap between the agents' data sets.
The authors propose strategies for detecting data leakage when sensitive data is shared with third parties (agents). They develop a model to assess the likelihood that leaked data came from one or more agents versus being independently gathered. The strategies involve how to distribute data objects among agents in a way that improves the ability to identify leakages. Some strategies involve injecting "fake but realistic" data objects that act as watermarks without modifying real data. The strategies are evaluated based on their ability to identify leakers in different data leakage scenarios.
The document discusses techniques for detecting data leakage when sensitive data is shared with third parties (agents). It proposes:
1) A model to calculate the probability that each agent is guilty of leaking a set of data (S) that was discovered outside of authorized channels. The model accounts for the likelihood that data in S could be guessed or obtained from other public sources versus leaked by agents.
2) Strategies for allocating data among agents in a way that improves the ability to identify leakers, such as distributing unique or rare records to single agents.
3) The optional addition of "fake" records to the data in a manner similar to digital watermarks, allowing positive identification of leakers if fake
1. Data exploration involves describing data using statistical and visualization techniques in order to identify important aspects for further analysis. It is done before data mining. Types of attributes include nominal, binary, ordinal, and numeric attributes which can be discrete or continuous.
2. Basic statistical descriptions of data include measures of central tendency (mean, median, mode), measuring dispersion (range, quartiles, variance, standard deviation), and graphic displays (histograms, scatter plots). These help identify properties of the data and highlight outliers.
3. The document then provides details on calculating and interpreting various statistical measures like mean, median, mode, range, quartiles, interquartile range, and variance. It also describes plots like quantile
This document discusses key terms related to the Internet of Things (IoT), including things, devices, entities of interest, resources, and services. It aims to bring clarity to the terminology by describing the relationships between these concepts. Specifically, it defines entities of interest as any physical objects that are relevant from a user or application perspective. Devices are then defined as the technical components used to monitor and interact with entities of interest. Resources refer to computational elements hosted on devices that provide information about or actuation capabilities for entities of interest. And services provide access to resources from outside networks or applications.
This document summarizes a research paper that proposes a novel method for detecting data leakage. The method involves distributing data to agents while adding fake objects using watermarking. If leaked data contains fake objects, the agent that received those objects can be identified as guilty of the leakage. The paper outlines existing data leakage detection techniques, proposes a methodology using fake objects and watermarking, and models the probabilities of agents being guilty of leakage given the leaked data. The addition of fake objects allows detection of leakage without modifying real data objects.
The document provides an overview of entity relationship modeling including:
1. The key elements of an ER model are entities, attributes, and relationships. Entities can have attributes and be connected by relationships.
2. An ER diagram graphically represents the ER model using symbols and connectors to show entities, attributes, and relationships between entities.
3. The document describes the different types of relationships and provides examples of how to construct ER diagrams.
The document discusses entity relationship (ER) modeling concepts including:
- Entities, attributes, and relationships can be represented graphically or as tables
- Key types include primary keys and composite keys
- Relationship cardinalities include one-to-one, one-to-many, many-to-many
- Weak entities cannot be uniquely identified without attributes from a related strong entity
The document discusses entity relationship (ER) modeling concepts including:
- Entities, attributes, and relationships can be represented graphically in ER diagrams
- Relationships have cardinalities like one-to-one, one-to-many, many-to-many that specify how entities are associated
- Weak entities depend on other entities and cannot be uniquely identified without attributes from the associated entity
This document provides an overview of object-oriented programming concepts including objects, classes, inheritance, encapsulation, and polymorphism. It discusses the history and objectives of OOP, defines key terms, and provides examples to illustrate concepts like how objects communicate through messages and how classes act as templates for creating objects. It also explains characteristics like encapsulation, inheritance, and polymorphism in OOP and gives examples of polymorphism in different languages.
Short Essay On My Aim In Life To Become A ScientistDaphne Ballenger
The document describes the author's experience at the beginning of their third deployment to Iraq in 2007 as a sergeant, where they were part of a platoon composed of 22 scouts, a medic, and 8 HMMWVs deployed to FOB Falcon and later COP Fish. After being initially assigned to FOB Falcon, the platoon was relocated after 4 months to COP Fish, located 10 miles south down a dangerous road known as Chicken Run and surrounded by mud huts and structures that insurgents were known to use.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
1. Data exploration involves describing data using statistical and visualization techniques in order to identify important aspects for further analysis. It is done before data mining. Types of attributes include nominal, binary, ordinal, and numeric attributes which can be discrete or continuous.
2. Basic statistical descriptions of data include measures of central tendency (mean, median, mode), measuring dispersion (range, quartiles, variance, standard deviation), and graphic displays (histograms, scatter plots). These help identify properties of the data and highlight outliers.
3. The document then provides details on calculating and interpreting various statistical measures like mean, median, mode, range, quartiles, interquartile range, and variance. It also describes plots like quantile
This document discusses key terms related to the Internet of Things (IoT), including things, devices, entities of interest, resources, and services. It aims to bring clarity to the terminology by describing the relationships between these concepts. Specifically, it defines entities of interest as any physical objects that are relevant from a user or application perspective. Devices are then defined as the technical components used to monitor and interact with entities of interest. Resources refer to computational elements hosted on devices that provide information about or actuation capabilities for entities of interest. And services provide access to resources from outside networks or applications.
This document summarizes a research paper that proposes a novel method for detecting data leakage. The method involves distributing data to agents while adding fake objects using watermarking. If leaked data contains fake objects, the agent that received those objects can be identified as guilty of the leakage. The paper outlines existing data leakage detection techniques, proposes a methodology using fake objects and watermarking, and models the probabilities of agents being guilty of leakage given the leaked data. The addition of fake objects allows detection of leakage without modifying real data objects.
The document provides an overview of entity relationship modeling including:
1. The key elements of an ER model are entities, attributes, and relationships. Entities can have attributes and be connected by relationships.
2. An ER diagram graphically represents the ER model using symbols and connectors to show entities, attributes, and relationships between entities.
3. The document describes the different types of relationships and provides examples of how to construct ER diagrams.
The document discusses entity relationship (ER) modeling concepts including:
- Entities, attributes, and relationships can be represented graphically or as tables
- Key types include primary keys and composite keys
- Relationship cardinalities include one-to-one, one-to-many, many-to-many
- Weak entities cannot be uniquely identified without attributes from a related strong entity
The document discusses entity relationship (ER) modeling concepts including:
- Entities, attributes, and relationships can be represented graphically in ER diagrams
- Relationships have cardinalities like one-to-one, one-to-many, many-to-many that specify how entities are associated
- Weak entities depend on other entities and cannot be uniquely identified without attributes from the associated entity
This document provides an overview of object-oriented programming concepts including objects, classes, inheritance, encapsulation, and polymorphism. It discusses the history and objectives of OOP, defines key terms, and provides examples to illustrate concepts like how objects communicate through messages and how classes act as templates for creating objects. It also explains characteristics like encapsulation, inheritance, and polymorphism in OOP and gives examples of polymorphism in different languages.
Short Essay On My Aim In Life To Become A ScientistDaphne Ballenger
The document describes the author's experience at the beginning of their third deployment to Iraq in 2007 as a sergeant, where they were part of a platoon composed of 22 scouts, a medic, and 8 HMMWVs deployed to FOB Falcon and later COP Fish. After being initially assigned to FOB Falcon, the platoon was relocated after 4 months to COP Fish, located 10 miles south down a dangerous road known as Chicken Run and surrounded by mud huts and structures that insurgents were known to use.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
7. Agent X
Agent Y
Agent Z
Modify Thing B
Modify Thing B
Thing B
A
Figure 2: Intermediate entities between Things A and B
Thing A wants to send a request to Thing B but
there are several agents between A and B.
10. Agent X
Agent Y
Agent Z
Modify all things that
meet given criteria
Thing A
Modify all things that
meet given criteria
Modify all things that
meet given criteria
A
Figure 3: Identifications of Things via Search Criteria