Australian Computer Society

Displaying 1-40 of 119 results

  • White Papers // May 2013

    Peer-to-Peer Data Mining Classifiers for Decentralized Detection of Network Attacks

    Data mining aims to extract from huge amount of data stochastic theories, called knowledge models, to explain or predict complex phenomenon. In this paper the authors propose new distributed data mining algorithms to recognize network attacks against a set of devices from statistic data generated locally by each device according...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Finding Skylines for Incomplete Data

    In the last decade, skyline queries have been extensively studied for different domains because of their wide applications in multi-criteria decision making and search space pruning. A skyline query returns all the interesting points in a multi-dimensional data set that are not dominated by any other point with respect to...

    Provided By Australian Computer Society

  • White Papers // May 2013

    User Awareness and Policy Compliance of Data Privacy in Cloud Computing

    Cloud computing is promising many technical benefits such as enhanced scalability, computing elasticity, and cost efficiency. However, with the benefits of cloud-based, hosted software platforms also comes the responsibility to data privacy. This paper investigates the data privacy issues brought about by cloud computing from an Australian perspective with specific...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Cloud-Aware Processing of MapReduce-Based OLAP Applications

    As the volume of data to be processed in a timely manner soars, the scale of computing and storage systems has much trouble keeping up with such a rate of explosive data growth. A hybrid cloud combining two or more clouds is emerging as an appealing alternative to expand local/private...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Non-blocking Parallel Subset Construction on Shared-memory Multicore Architectures

    The authors discuss ways to effectively parallelize the sub-set construction algorithm, which is used to convert Non-deterministic Finite Automata (NFAs) to Deterministic Finite Automata (DFAs). This conversion is at the heart of string pattern matching based on regular expressions and thus has many applications in text processing, compilers, scripting languages...

    Provided By Australian Computer Society

  • White Papers // May 2013

    A Request Oriented Model for Web Services

    The existing service modeling methodologies, such as WSDL and OWL-S, are service-oriented, which mainly focus on providing formalisms for the important features of a web service, including its functionality and QoS parameters. Conforming to these models, users need to first find what the available services are, go through the descriptions,...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Anatomy of Drive-by Download Attack

    Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques to classify web pages as malicious or benign have been proposed...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Simseer and Bugwise - Web Services for Binary-level Software Similarity and Defect Detection

    Simseer and bugwise are online web services that perform binary program analysis: simseer identifies similarity between submitted executables based on similarity in the control flow of each binary. A software similarity service provides benefit in identifying malware variants and families, discovering software theft, and revealing plagiarism of software programs. Simseer...

    Provided By Australian Computer Society

  • White Papers // May 2013

    A Dynamic, Decentralised Search Algorithm for Efficient Data Retrieval in a Distributed Tuple Space

    In this paper, the authors present an algorithm which may be used to efficiently search for and retrieve tuples in a distributed tuple space. The algorithm, a core part of the Tupleware system, is based on the success or failure of previous tuple requests to remote nodes in the system,...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Scaling Up Transit Priority Modelling Using High-Throughput Computing

    The optimization of Road Space Allocation (RSA) from a network perspective is computationally challenging. An analogue to the Network Design Problem (NDP), RSA can be classified NP-hard. In large-scale networks when the number of alternatives increases exponentially, there is a need for an efficient method to reduce the number of...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Efficient Identity-based Signcryption without Random Oracles

    In this paper, the authors propose a new Identity-Based SignCryption (IBSC) scheme in the standard model. Their scheme shows an improvement of approximately 40% reduction in the ciphertext size when compared to the previously proposed IBSC schemes in the standard model. Further, they argue that the previous IBSC schemes do...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Non-Functional Requirements in Business Process Modeling

    Business Process Modeling entails the capture of a set of tasks that invariably model the functional behavior of a system. Another aspect of Business Process Modeling involves the accurate capture of operational behavior and the associated process constraints. Whether the process is automated or manual, such operational constraints and behavior...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Robust WYSIWYS: A Method for Ensuring that What You See is What You Sign

    The security of digital signatures depends not only on the cryptographic strength of the digital signature algorithms used, but also on the integrity of the platform on which the digital signature application is running. Breach of platform integrity due to unintentional or intentional malfunctioning has the potential of wrongly imposing...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Event Sequence Mining to Develop Profiles for Computer Forensic Investigation Purposes

    Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators can often be used to establish a view of regular usage patterns which can then be examined for unusual occurrences. This paper describes one such method...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists

    The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organizations and possibly an increasing reluctance to use email by some users. Currently most spam prevention techniques rely on methods that examine the whole email...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    QUIP: A Protocol for Securing Content in Peer-to-Peer Publish/Subscribe Overlay Networks

    Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber submits a description of the sort of content they are interested in, then the publish/subscribe system delivers any appropriate messages as they are published. Although publish/subscribe networks offer advantages over...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Transformation and Reaction Rules for Data on the Web

    The transformation and manipulation of XML is an increasingly important research topic. This paper examines a number of issues with regard to languages for transforming and reacting to changes on XML data. On the transformation side, the authors focus on XSLT, a powerful language for converting XML data into other...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Cooperative Query Answering for Semistructured Data

    Semi-structured data, in particular XML, has emerged as one of the primary means for information exchange and content management. The power of XML allows authors to structure a document in a way which precisely captures the semantics of the data. This, however, poses a substantial barrier to casual and non-expert...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Conflict Scheduling of Transactions on XML Documents

    In the last few years an interest in native XML databases has surfaced. With other authors researchers argue that such databases need their own provisions for concurrency control since traditional methods are inadequate to capture the complicated update-behavior that is possible for XML documents. Ideally, updates should not be limited...

    Provided By Australian Computer Society

  • White Papers // Oct 2012

    A Web Portal for Management of Aneka-Based MultiCloud Environments

    Many Cloud providers offer services with different sets of configurations and settings. This makes it difficult for their clients to seamlessly integrate various services from different Cloud providers. To simplify, the authors developed an extendible Cloud Web Portal (CWP), a comprehensive open source Cloud management portal that aims to deliver...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Managing Large Numbers of Business Processes with Cloud Workflow Systems

    With the emergence of cloud computing which can deliver on-demand high-performance computing resources over the Internet, cloud workflow systems offer a competitive software solution for managing large numbers of business processes. In this paper, the authors first analyze the basic system requirements through a motivating example, and then, the general...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Optimised X-HYBRIDJOIN for Near-Real-Time Data Warehousing

    Stream-based join algorithms are needed in modern near-real-time data warehouses. A particular class of stream-based join algorithms, with MESHJOIN as a typical example, computes the join between a stream and a disk-based relation. Recently the authors have presented a new algorithm X-HYBRIDJOIN (EXtended HYBRID JOIN) in that class. X-HYBRIDJOIN achieves...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Energy Efficiency for MapReduce Workloads: An In-depth Study

    The energy efficiency has emerged as a crucial optimization goal in data centers. MapReduce has become a popular and even fashionable distributed processing model for parallel computing in data centers. Hadoop is an open-source implementation of MapReduce, which is widely used for short jobs requiring low response time. In this...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Evaluating Semantic Browsers for Consuming Linked Data

    The value of a single dataset is increased when it is linked to combinations of datasets to provide users with more information. Linked data is a style of publishing data on the web by using a structured machine-readable format, RDF, and semantically typed relations to connect related data. Its structured...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Indexing RFID Data Using the VG-Curve

    Existing methods for the management of multi-dimensional data typically do not scale well with an increased number of dimensions or require the unsupported augmentation of the kernel. However, the use of multidimensional data continues to grow in modern database applications, specifically in spatio-temporal databases. These systems produce vast volumes of...

    Provided By Australian Computer Society

  • White Papers // Nov 2011

    Zero-Day Malware Detection based on Supervised Learning Algorithms of API Call Signatures

    "Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent code to produce offspring copies which have the same functionality but with different signatures. Current techniques reported in literature lack the capability of detecting zero-day malware with the required accuracy and efficiency. In this paper,...

    Provided By Australian Computer Society

  • White Papers // Nov 2011

    How to Manage Spatio-Temporal Events in Relational Databases

    In this paper, the authors discuss the need for Event-Condition-Action (ECA) rules in spatio-temporal databases and outline a generic scenario for them. A proposal for the implementation of ECA rules is then presented in which several implementation alternatives for different spatio-temporal rule types are considered. Through a series of experiments,...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    CARL: A Complex Applications Interoperability Language based on Semantic Technologies for Platform-as-a-Service Integration and Cloud Computing

    Cloud computing technologies have recently gained momentum and moved from a hyped trend to a mature set of technological innovations providing an infrastructure for the Software-as-a-Service (SaaS) paradigm. However, a number of questions about cloud-deployed applications inter-operability and cross-integration, stemming from multiple areas of computer science domains, have also been...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    Developing Families of Software Services: A Semantic Web Approach

    Current experience in the development of service-oriented systems indicates that tasks such as discovery, systematic reuse, and appropriate composition of services are difficult and error prone. For addressing these issues, the application of Software Product Line Engineering (SPLE) appears to be a promising approach. SPLE promotes systematic reuse in the...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    Ontology-based Dynamic Role Interaction Control in Multi-Agent Systems

    For more practical uses of multi-agent systems, the security on agents' interactions is essential to allow only authorized interactions in multi-agent systems. In this paper, the authors propose a fine-grained Dynamic Role interaction Access Control (DRiBAC) model to support exclusive authorization for an actual partnering agent of an interaction and...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    A Learning Framework for Transitioning Network Intrusion Alerts Management System to Ontology

    Intrusion detection is not new in the area of information security. It is crucial for the intrusion alerts management system to correlate the collected intrusion alerts to reflect the causal relationships between the attack steps and construct the attack scenarios. Most of these systems, however, have been built on the...

    Provided By Australian Computer Society

  • White Papers // May 2011

    Using Ontologies to Synchronize Change in Relational Database Systems

    Ontology is a building block of the semantic Web. Ontology building requires a detailed domain analysis, which in turn requires financial resources, intensive domain knowledge and time. Domain models in industry are frequently stored as relational database schemas in relational databases. An ontology base underlying such schemas can represent concepts...

    Provided By Australian Computer Society

  • White Papers // May 2011

    OQuaRE: A SQuaRE-based Approach for Evaluating the Quality of Ontologies

    The development of the semantic Web has provoked an increasing interest in the development of ontologies. There are, however, few mechanisms for guiding users in making informed decisions on which ontology to use under given circumstances. In this paper, the authors propose a framework for evaluating the quality of ontologies...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Document Logic: Risk Analysis of Business Processes Through Document Authenticity

    Document Logic is a simple yet powerful framework to infer risks in business processes. The authors focus on flows of documents and build a set of inference rules based on document authenticity and a simple trust model. They have built a prototype of a system that checks document authenticity in...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    An Ontological Model for Component Collaboration

    Building large enterprise systems has always been a difficult, expensive and risky business. The authors propose an ontology-based approach to model dynamic component systems. Component collaborations are described as the provision and consumption of typed resources. They are particularly interested in how the vocabularies used to describe component requirements and...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Generation and Evaluation of Business Continuity Processes using Algebraic Graph Transformation and the mCRL2 Process Algebra

    Critical business processes can fail. Therefore, continuity processes are needed as back-up solutions. Today, those continuity processes are set up and maintained manually. They are mostly based on best practices that focus on specific continuity scenarios, Nevertheless, failures can occur in new and unforeseen combinations. As a consequence, a given...

    Provided By Australian Computer Society

  • White Papers // Jan 2011

    20 Years of Data Quality Research: Themes, Trends and Synergies

    Data quality is a cross-disciplinary and often domain specific problem due to the importance of fitness for use in the definition of data quality metrics. It has been the target of research and development for over 4 decades by business analysts, solution architects, database experts and statisticians to name a...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Scheduling with Freshness and Performance Guarantees for Web Applications in the Cloud

    Highly distributed data management platforms (e.g., PNUTS, Dynamo, Cassandra, and BigTable) are rapidly becoming the favorite choice for hosting modern web applications in the cloud. Among other features, these platforms rely on data partitioning, replication and relaxed consistency to achieve high levels of performance and scalability. However, these design choices...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Resource Provisioning Based on Lease Preemption in InterGrid

    Resource provisioning is one of the main challenges in resource sharing environments such as InterGrid. Recently, many resource management systems in resource sharing environments use lease abstraction and virtual machines for provisioning. In resource sharing environments resource providers serve requests from external (grid) users along with their own local users....

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Privacy and Anonymity in Untrusted Data Stores

    In this paper the authors describe a security problem involving an online data repository, which acts as a proxy for multiple companies allowing their customers to perform online services (e.g., pay invoices). The repository's host is trusted to honestly fulfill its duties in maintaining the data in a manner consistent...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    CARL: A Complex Applications Interoperability Language based on Semantic Technologies for Platform-as-a-Service Integration and Cloud Computing

    Cloud computing technologies have recently gained momentum and moved from a hyped trend to a mature set of technological innovations providing an infrastructure for the Software-as-a-Service (SaaS) paradigm. However, a number of questions about cloud-deployed applications inter-operability and cross-integration, stemming from multiple areas of computer science domains, have also been...

    Provided By Australian Computer Society

  • White Papers // May 2011

    Using Ontologies to Synchronize Change in Relational Database Systems

    Ontology is a building block of the semantic Web. Ontology building requires a detailed domain analysis, which in turn requires financial resources, intensive domain knowledge and time. Domain models in industry are frequently stored as relational database schemas in relational databases. An ontology base underlying such schemas can represent concepts...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Designing and Developing a Modern Distributed Data Acquisition and Monitoring System

    In this paper the authors introduce new control system aspects used for designing and implementing a distributed data acquisition and monitoring software system. These aspects are proposed according to OPC technologies and XML as standards for interfaces, functionalities, and architectures. The proposed system allows the authors to easily aggregate existing...

    Provided By Australian Computer Society

  • White Papers // May 2010

    A Query System for XML Data Stream and its Semantics-based Buffer Reduction

    With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buffer scale may increase exponentially, which can cause memory bottleneck. Some optimization techniques have been proposed to solve the problem. However, the limit of...

    Provided By Australian Computer Society

  • White Papers // May 2009

    Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services

    Data warehouses manage historical information for the decision making process, and this information could be discovered by unauthorized users if security constraints are not established. It is therefore highly important for OLAP tools to consider the security rules defined at early stages of the development lifecycle. By following the MDA...

    Provided By Australian Computer Society

  • White Papers // Aug 2008

    A Privacy-Enhancing Architecture for Databases

    Innovative approaches to searching for hidden meaning in data have recently emerged. In some cases, however, the support of privacy is compromised and consistent privacy protection remains elusive. Privacy perceptions and requirements differ from person to person and over time, leading to diverse privacy preferences within a community. This paper...

    Provided By Australian Computer Society

  • White Papers // Feb 2008

    An Investigation into Business-to-Business Electronic Commerce Organizations

    The issue of Information Technology (IT) investment evaluation in B2BEC (Business-To-Business Electronic Commerce) has generated a lot of interest and discussion among academics and researchers. This paper was undertaken to investigate the relationships between the level of IT maturity, the use of IT Investment Evaluation Methodology (IEM) and Benefits Realization...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Availability Modeling and Evaluation on High Performance Cluster Computing Systems

    Cluster computing has been attracting more and more attention from both the industrial and the academic world for its enormous computing power and scalability. Beowulf type cluster, for example, is a typical High Performance Computing (HPC) cluster system. Availability, as a key attribute of the system, needs to be considered...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    Developing Families of Software Services: A Semantic Web Approach

    Current experience in the development of service-oriented systems indicates that tasks such as discovery, systematic reuse, and appropriate composition of services are difficult and error prone. For addressing these issues, the application of Software Product Line Engineering (SPLE) appears to be a promising approach. SPLE promotes systematic reuse in the...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    Ontology-based Dynamic Role Interaction Control in Multi-Agent Systems

    For more practical uses of multi-agent systems, the security on agents' interactions is essential to allow only authorized interactions in multi-agent systems. In this paper, the authors propose a fine-grained Dynamic Role interaction Access Control (DRiBAC) model to support exclusive authorization for an actual partnering agent of an interaction and...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    A Learning Framework for Transitioning Network Intrusion Alerts Management System to Ontology

    Intrusion detection is not new in the area of information security. It is crucial for the intrusion alerts management system to correlate the collected intrusion alerts to reflect the causal relationships between the attack steps and construct the attack scenarios. Most of these systems, however, have been built on the...

    Provided By Australian Computer Society

  • White Papers // May 2011

    OQuaRE: A SQuaRE-based Approach for Evaluating the Quality of Ontologies

    The development of the semantic Web has provoked an increasing interest in the development of ontologies. There are, however, few mechanisms for guiding users in making informed decisions on which ontology to use under given circumstances. In this paper, the authors propose a framework for evaluating the quality of ontologies...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    An Ontological Model for Component Collaboration

    Building large enterprise systems has always been a difficult, expensive and risky business. The authors propose an ontology-based approach to model dynamic component systems. Component collaborations are described as the provision and consumption of typed resources. They are particularly interested in how the vocabularies used to describe component requirements and...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Generation and Evaluation of Business Continuity Processes using Algebraic Graph Transformation and the mCRL2 Process Algebra

    Critical business processes can fail. Therefore, continuity processes are needed as back-up solutions. Today, those continuity processes are set up and maintained manually. They are mostly based on best practices that focus on specific continuity scenarios, Nevertheless, failures can occur in new and unforeseen combinations. As a consequence, a given...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    A Resource-based Analysis of IT Personnel Capabilities and Strategic Alignment

    Researchers argue that Information Technology (IT) personnel capabilities and strategic alignment are important organizational resources. Grounded in the resource-based view, this paper examines the relationship between IT personnel capabilities and strategic alignment, showing how companies leverage IT effectively on the basis of complementary and co-specialized organizational resources. This paper confirmed...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Modelling and Enforcement of Inter-Process Dependencies with Business Process Modelling Languages

    Business process languages have been successfully applied in research and industry for the development of information systems. They are used for the analysis, design, construction and verification of software applications and fit well into the model-driven paradigm. Although many business process languages have emerged in the last couple of years,...

    Provided By Australian Computer Society

  • White Papers // Feb 2010

    An Ontology-Driven Approach Applied to Information Security

    Software systems have become highly distributed and complex involving independent components working together towards achieving systems' goals. Meanwhile, security attacks against such systems have increased to become more sophisticated and difficult to detect and withstand. In this paper, the authors argue that the collaboration of a system's constituent components is...

    Provided By Australian Computer Society

  • White Papers // Aug 2009

    RFID and Application Security

    The question of how well Radio-Frequency IDentification (RFID) technology can maintain security in business applications continues to plague both information system developers and end-consumers. Today's RFID standards do not necessarily cover all of the desired security capabilities. In this paper, the authors suggest characterizing potential applications of RFID in terms...

    Provided By Australian Computer Society

  • White Papers // Aug 2009

    Translating Topic Maps to RDF/RDF Schema for the Semantic Web

    In this paper, the authors focus on the issue for translating Web metadata, especially topic maps and RDF/RDF Schema (RDF(S)). For the semantic Web, all Web information resources should be accepted and understood by any browsers and web applications. Topic maps and RDF are both representative international standards for description...

    Provided By Australian Computer Society

  • White Papers // May 2009

    A Multi-Dimensional Classification for Users of Security Patterns

    In this paper, the authors present a classification for security patterns that addresses the needs of users. The approach uses a matrix defined by dividing the problem space along multiple dimensions, and allows patterns to occupy regions, defined by multiple cells in the matrix. It supports filtering for narrow or...

    Provided By Australian Computer Society

  • White Papers // May 2007

    Secure Federated Authentication and Authorisation to GRID Portal Applications using SAML and XACML

    Internationally, the need for federated identity & access management continues to grow, as it allows users to get single sign-on access to external resources (a.k.a. service providers) using their home account and some attributes that are being released securely by their home organization (a.k.a. identity providers). In other words, it...

    Provided By Australian Computer Society

  • White Papers // Feb 2006

    A UML 2.0/OCL Extension for Designing Secure Data Warehouses

    At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in the successful design of data warehouses. If that methodology were developed, its complexity would hinder its success. The solution, therefore, would be an approach in which techniques and models defined...

    Provided By Australian Computer Society

  • White Papers // Feb 2006

    Return On Security Investment (ROSI) - A Practical Quantitative Model

    In a world where hackers, computer viruses and cyber-terrorists are making headlines daily, security has become a priority in all aspects of life, including business. Organizations need practical security benchmarking tools in order to plan effective security strategies. This paper explores a number of techniques that can be used to...

    Provided By Australian Computer Society

  • White Papers // Feb 2006

    Towards a Process for Web Services Security

    Web Services (WS) security has undergone an enormous development, as carried out by the major organizations and consortiums of the industry over the last few years. This has brought about the appearance of a huge number of WS security standards. Such a fact has made organizations remain reticent about adopting...

    Provided By Australian Computer Society

  • White Papers // Feb 2006

    Cooperative Defence against DDoS Attacks

    Distributed Denial of Service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available Intrusion Detection Systems (IDS) cannot detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Deploying Access and Flow Control in Distributed Workflows

    Workflows are operational business processes. WorkFlow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there has been a trend to integrate WFMS in distributed inter-organizational systems. In this case malfunctioning of one WFMS can affect more than one organization, making the correct...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences

    In this paper, the authors develop a new cellular automata-based linear model for several nonlinear pseudorandom number generators with practical applications in symmetric cryptography. Such a model generates all the solutions of linear binary difference equations as well as many of these solutions are pseudo-random keystream sequences. In this way,...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves

    The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good elliptic curves from a given one....

    Provided By Australian Computer Society

  • White Papers // Aug 2008

    Anonymous Communication in Multi Hop Wireless Networks

    In this paper, the authors present a protocol for unlinkable and anonymous communication in multi-hop wireless networks. There exist solutions for unlinkable communication in the internet, such as tor and mix networks. These protocols need fixed infrastructure and they are prone to traffic analysis attacks, i.e. where an attacker tries...

    Provided By Australian Computer Society

  • White Papers // May 2008

    Global Sense of Risk: Media Reporting on Scientific Studies and Potential Risks of Mobile Phones

    A high sense of risk is characteristic of modern societies. During recent decades, increasing risk awareness has caused consumers to become more prudent. Consumer policy has become more cautious and governmental security and regulatory institutions function on behalf of citizens. Politically aware non-governmental organizations are ready to take up new...

    Provided By Australian Computer Society

  • White Papers // Feb 2008

    A Model for Investigating Software Accidents

    A software accident is an unforeseen outcome that arises from a failure of a software project or software product. Death, severe injury or severe financial loss, could arise from such a failure. This paper asserts that there is not yet a good accident investigation model with which to investigate software...

    Provided By Australian Computer Society

  • White Papers // Feb 2008

    Identity-Based Parallel Key-Insulated Signature: Framework and Construction

    To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC'06 the researchers proposed an ID-Based Key-Insulated Signature (IBKIS) scheme. However, their scheme is not strong key-insulated, i.e. if a user's helper is compromised, the adversary can derive all of this user's secret keys for any time period. Moreover,...

    Provided By Australian Computer Society

  • White Papers // Nov 2007

    Reduced Pattern Training in Pattern Distributor Networks

    In this paper, the authors propose a new task decomposition method, task decomposition with Pattern Distributor (PD), for multilayered feedforward neural networks. The method uses a combination of network modules in parallel and series to generate the overall solution for a complex problem. They also introduce a method called reduced...

    Provided By Australian Computer Society

  • White Papers // Feb 2007

    Preemption Policy in QoS-Enabled Networks: A Customer Centric Approach

    Preemption is a key technique to provide available and reliable services to high priority connections in a QoS-enabled network. Preemption technique is governed by a policy which makes the decision about which connections to preempt when resource scarcity is experienced. Existing preemption policies consider preemption rate, priority of connection and...

    Provided By Australian Computer Society

  • White Papers // May 2006

    Self-Similarity and Internet Performance

    In this paper, it has been demonstrated through experiments that Long Range Dependence (LRD) in internet traffic is indeed affecting the queueing performance. Queueing performance is being degraded as the self-similarity of the packet arrival process increases. Here, the link buffer capacity and queueing delay exhibits super-linear relationship. This in...

    Provided By Australian Computer Society

  • White Papers // May 2007

    Designing and Implementing a Grid Application for Cumulative Agrichemical Residue Tracking using Third-Party Data Sources and Software Components

    It is increasingly important to design software for reuse so future changes can be implemented as easily and cheaply as possible. It is also beneficial to use existing resources where they are available. This paper describes an agricultural application for cumulative agrichemical residue tracking designed and implemented to use grid...

    Provided By Australian Computer Society

  • White Papers // Feb 2007

    Behaviour Mining for Fraud Detection

    Despite significant efforts by merchants, card issuers and law enforcement to curb fraud, online fraud continues to plague electronic commerce web sites. More advanced solutions are desired to protect merchants from the constantly evolving problem caused by fraud. The supervised machine learning technique for the most well known fraud detection...

    Provided By Australian Computer Society

  • White Papers // Feb 2007

    Dependable Dynamic Source Routing without a Trusted Third Party

    Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of their constituent wireless nodes, which are expected to forward packets for other nodes in a benign manner. The Dynamic Source Routing (DSR) protocol is one such...

    Provided By Australian Computer Society

  • White Papers // May 2009

    Modelling Reusable Security Requirements based on an Ontology Framework

    In recent years, security in Information Systems (IS) has become an important issue, and needs to be taken into account in all stages of IS development, including the early phase of Requirements Engineering (RE). Reuse of requirements improves the productivity and quality of software process and products. This can be...

    Provided By Australian Computer Society

  • White Papers // May 2009

    Lightweight Anonymous Routing for Reliability in Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are particularly vulnerable on account of their intrinsic characteristics of open medium, dynamic topology, absence of central authorities, distributed cooperation and constrained capability. These vulnerabilities create significant challenges for routing protocols operating in the entire network. Anonymous routing is a value-added technique used in MANET for...

    Provided By Australian Computer Society