Australian Computer Society

Displaying 1-40 of 286 results

  • White Papers // Jan 2015

    Towards An Ontology-Based Pivot Model for Spatio-Temporal Sources

    The spectacular evolution of sensor networks and the proliferation of location-sensing devices in daily life activities are leading to an explosion of disparate spatio-temporal data. The collected data describes the movement of mobile objects used to construct what everyone calls trajectory data. The diversity of these generated data has led...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    A Semi-supervised Topic-based User Model for Web Information Visualization

    Web graph is a very effective tool to visualize web information. To serve user specific visualization and to reduce the size, personalization is applied to web graphs, by integrating user interests in filtering, graph generation and clustering. Modelling of the user interests is the key aspect to achieve personalization. Keyword...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    On the Effectiveness of Virtualisation Assisted View Comparison for Rootkit Detection

    There is growing interest in tools for monitoring virtualization infrastructure and detecting malware within Virtual Machines (VMs). View comparison, or cross view validation, is a technique for detecting object hiding by malware. It involves comparing different views of system objects to and discrepancies that might indicate the use of object...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Breakfast with ICT Employers: What Do They Want to See in Our Graduates?

    In an increasingly globalized and competitive economy, there is a need to ensure that graduates have the skills, knowledge and attitudes to be not only work ready for today but work ready PLUS for tomorrow. Data from the graduate destination survey (2012) show that 75% of ICT students get a...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Enhancing Recommender Systems Using Linked Open Data-Based Semantic Analysis of Items

    The Linked Open Data (LOD) project is a community effort that aims to publish structured data using open and liberal licenses. The LOD cloud provides free access to datasets in diverse areas such as media, geography, publications and life sciences. These datasets are publicly available for machine and human consumption...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Temporal Attributes: Status and Subsumption

    Representing data that changes over time in conceptual data models is required by various application domains and requires a language that is expressive enough to fully capture the operational semantics of the time-varying information. Temporal modelling languages typically focus on representing and reasoning over temporal classes and relationships, but have...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Linked Data and Entity Search: A Brief History and Some Ways Ahead

    In this paper, the authors present a brief survey of the current efforts in the semantic Web literature with respect to the three research topics of linked data, semantic search and search interfaces. First they give a basic overview about linked data, discussing the concepts, principles and examples of relevant...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Linked Data Provenance: State of the Art and Challenges

    Linked Open Data (LOD) is rapidly emerging in publishing and sharing structured data over the semantic web using URIs (Uniform Resource Identifiers) and RDF (Resource Description Framework) in many application domains such as fisheries, health, environment, education and agriculture. Since different schemas that have the same semantics are found in...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Judgement and Analysis Rules for Ontology-driven Comparative Data Analysis in Data Warehouses

    Online analytical processing tools facilitate interactive inspection of aggregated measures of groups of data in data warehouses. In comparative data analysis, business analysts assess measures of a group of interest against measures of a group of comparison. Judgement rules annotate comparisons with background knowledge otherwise tacit to the business analyst....

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Validation of Expressive XML Keys with XML Schema and XQuery

    The eXtensible Markup Language (XML) is the de-facto industry standard for exchanging data on the Web and elsewhere. While the relational model of data enjoys a well-accepted definition of a key, several competing notions of keys exist in XML. These have complementary properties and therefore serve different applications domains. In...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    BPIM: A Multi-view Model for Business Process Instances

    Business process management has grown into a mature discipline supported by a large number of commercial and open source products, collectively referred to as Business Process Management Systems (BPMSs). Because most of the business processes are long-running, any data relating to a running instance of a business process need to...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Model-Driven Optimisation of Memory Hierarchy and Multithreading on GPUs

    Due to their potentially high peak performance and energy efficiency, GPUs (Graphics Processing Units) are increasingly popular for scientific computations. However, the complexity of the architecture makes it difficult to write code that achieves high performance. Two of the most important factors in achieving high performance are the usage of...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Effect of Similarity Distribution on the Convergence of Decentralized Similarity Overlays

    Decentralized systems are used by a significant number of Internet users due to their specific features such as autonomy and content privacy. With the evolution of big data, the problem of filtering information based on user interests has become prevalent. Decentralized strategies for information filtering, such as similarity clustering, seem...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Performance Evaluation of Parallel-processing Networked System with Linear Time Delay

    Time delays in system subcomponents or control may result into unacceptable system operation or uncertainty in specialized technical systems like aircraft control, plant control, robotics, etc. In parallel computing, different computing subunits share their tasks to balance loads to increase performance and throughput. To be able to do so, subsystems...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    A Stack-Based Concatenative Approach to Co-processor Simulation and Code Generation

    As users run to the end of the silicon roadmap, the rapidly escalating cost of design, fabrication and test in future systems-on-chip may justify a reevaluation of homogeneous reconfigurable mesh architectures. Ultimately, the geometric constraints of extreme nanoscale device layout may support only simple functional arrays with predominately nearest neighbor...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Adaptive Planning for Distributed Systems using Goal Accomplishment Tracking

    Goal accomplishment tracking is the process of monitoring the progress of a task or series of tasks towards completing a goal. Goal accomplishment tracking is used to monitor goal progress in a variety of domains, including workflow processing, teleoperation and industrial manufacturing. Practically, it involves the constant monitoring of task...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    An Accurate FPGA-Based Hardware Emulation on Quantum Fourier Transform

    Powerful parallelism is among the leading attractions towards quantum computing research. Before large-scale quantum computers become viable, the use of Field Programmable Gate Array (FPGA) technology which can mimic the behavior of quantum parallelism is vital. In this paper, a methodology to perform mapping of quantum algorithms for efficient quantum...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    On the Reliability and Energy Efficiency in Cloud Computing

    Cloud computing is the next major revolution in Information and Communication Technology (ICT) which uses virtualization technology to provide a powerful and flexible computing environment. With the popularity of cloud computing, it becomes crucial to provide on-demand services dynamically according to the user's requirements. Reliability and energy efficiency are two...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    DEWE: A Framework for Distributed Elastic Scientific Workflow Execution

    As cloud computing is increasingly adopted, the open, on-demand nature of public clouds makes explicit consideration of the underlying environment highly advantageous in terms of decreasing cost and increasing elasticity. In this paper, the authors address the exploitation of such cloud capabilities and present DEWE, a framework for the distributed,...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Recognizing Hand-drawn Glyphs from One Example and Four Lines of Code

    The biggest challenge in the development of gesture based user interfaces is the creation of a gesture recognizer. Existing approaches to support high-level recognition of glyphs require a lot of effort from developers are error prone and suffer from low recognition rates. The authors propose a tool that generates a...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    A Performance Model for Scalable Cloud Computing

    Cloud computing is a new paradigm that offers several advantages in terms of scalability, maintainability, high availability, efficiency and data processing. Infrastructure and applications are moved to the cloud and provided as a pay-for-use service. When designing a cloud infrastructure, it is critical to assure beforehand that the system will...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Hypervisor-based Security Architecture to Protect Web Applications

    Web based applications are very common now-a-days where almost every software can be accessible through a web browser in one form or the other. This paper proposes techniques to detect different threats related to web applications by using hypervisor-based security architecture. The proposed architecture leverages the hypervisor's visibility of the...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    The Effectiveness of Transient User Interface Components

    With small screen devices, including mobile and tablet based systems, becoming more common, the effective use of available screen space has become a critical skill in the design of user interfaces. Transient interface components are one technique that allows for a more complex interface to be displayed, in the form...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Hardware Trojans - A Systemic Threat

    Hardware Trojans are a systemic threat that can impact the operations and infrastructure of corporations and government organizations. In this paper, the authors evaluate a credible and organization-wide hardware Trojan threat from compromised network cards. Their research examines the systemic threat of hardware Trojans with an actual hardware Trojan implementation...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Potentiality of Power Management on Database Systems with Power Saving Function of Disk Drives

    Power consumption of modern datacenters is increasing rapidly. Databases, especially OLTPs (Online Transaction Processing Systems), have become a major application at datacenters. Therefore, power-saving management for OLTP applications has become an important task for user budgets and datacenter operations. A recent report described that disk drives consume about 70% of...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    On Inferences of Full Hierarchical Dependencies

    Full Hierarchical Dependencies (FHDs) constitute a large class of relational dependencies. A relation exhibits an FHD precisely when it can be decomposed into at least two of its projections without loss of information. Therefore, FHDs generalize MultiValued Dependencies (MVDs) in which case the number of these projections is precisely two....

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    SQL-Sampler: A Tool to Visualize and Consolidate Domain Semantics by Perfect SQL Sample Data

    SQL (Structured Query Language) database designs can result from methodologies such as UML (Unified Modeling Language) or entity-relationship modeling, description logic specifications, or relational normalization. Independently from the methodology, the use of good sample data is promoted by academia and commercial database design tools to visualize validate and consolidate the...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Effects of 3D Display Technologies on Spatial Memory

    Spatial memory has been recognized as an important factor in efficient human-computer interaction. However, most previous studies are limited to very simple depth cues and 2D displays. The authors present a study investigating the effects of head-coupled perspective, stereoscopy and simple landmarks on spatial memory by measuring performance and accuracy...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Developmental Directions in Parallel Accelerators

    Parallel accelerators such as massively-cored graphical processing units or many-cored co-processors such as the Xeon Phi are becoming widespread and affordable on many systems including blade servers and even desktops. The use of a single such accelerator is now quite common for many applications, but the use of multiple devices...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Hypervisor-based Security Architecture for Validating DNS Services (Poster)

    Domain Name System (DNS) is one of the critical services in the current Internet infrastructure. However DNS is vulnerable to a range of attacks. One of the fundamental weaknesses with the existing DNS protocols is that the request and response messages are transmitted on the network as plain text. This...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Shape Predicates Allow Unbounded Verification of Linearizability Using Canonical Abstraction

    Canonical abstraction is a static analysis technique that represents states as 3-valued logical structures and is able to construct finite representations of systems with infinite statespaces for verification. The granularity of the abstraction can be altered by the definition of instrumentation predicates, which derive their meaning from other predicates. The...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Formal Approach for Generating Privacy Preserving User Requirements-Based Business Process Fragments

    A business process fragment is a portion of a business process, more commonly designed for reuse purposes. Fragments are intended to be declared as safe from a privacy perspective, when manipulated in an open context. Privacy is related to the authority to have a view on some sensitive information. A...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    A Multi-tier Client-Server Project Employing Mobile Clients

    The current generation of computer science students are far more likely to engage with computer networking through their own mobile, wireless devices than they are using wired, desktop computers. Traditional approaches to teaching computer networking evolved when the Internet was composed of fixed wired infrastructure and this historical background still...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    An Adaptive Aggregate Maintenance Approach for Mixed Workloads in Columnar In-Memory Databases

    The mixed database workloads generated by enterprise applications can be categorized into short running transactional as well as long-running analytical queries with resource-intensive data aggregations. The introduction of materialized views can accelerate the execution of aggregate queries significantly. However, the overhead of materialized view maintenance has to be taken into...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    DAC: Database Application Context Analysis applied to Enterprise Applications

    In today's fast-paced business environment, everyone see an ongoing trend towards the need for analytics on the latest operational data. The data management layer of enterprise applications needs to adapt to this requirement and in-memory column stores have been proposed as a new architecture that can handle such mixed workload...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Difference Computation for Grammar-Compressed XML Data

    Whenever web data processing requires the storage or the exchange of multiple versions of big XML (eXtensible Markup Language) data collections and the pure size of big XML data becomes a bottleneck in storage or fast data exchange over the web, XML compression and XML version control may become significant...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Keyword Search on DAG-Compressed XML Data

    With the growing size of publicly available XML (eXtensible Markup Language) document collections, fast keyword search becomes increasingly important. The authors present an indexing and keyword search technique that is suitable for DAG (Directed Acyclic Graph) compressed data and has the advantage that common subtrees have to be searched only...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    A Load-Balanced MapReduce Algorithm for Blocking-based Entity-resolution with Multiple Keys

    Entity Resolution (ER), which detects records referring to the same entity across data sources, is a long-lasting challenge in database management research. The sheer volume of data collections today calls for the need of a blocking-based ER algorithm using the MapReduce framework for cloud computing. Most studies on blocking-based ER...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Communication Delegation Method for Exascale Systems

    High Performance Computing is trending towards exascale and some of the major barriers of high performance computing or scientific computing are dominated by latencies incurred due to storage, communication and component failures. In this paper, the authors discuss a technique to overcome one of those obstacles: latency incurred due to...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Efficient Parallel Algorithms for the Maximum Subarray Problem

    Parallel algorithm design is generally hard. Parallel program verification is even harder. The authors take an example from the maximum subarray problem and show those two problems of design and verification. The best known communication steps for mesh architecture for the maximum subarray problem are 2n - 1. They give...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Spreadsheet Visualisation to Improve End-User Understanding

    Spreadsheets are an extremely common form of end-user programming that have many applications, from calculating student marks to accounting for global multinationals. Ways of studying the structure of a spreadsheet itself are normally constrained to the tools provided in the spreadsheet software. This paper explores new ways to visualise spreadsheets...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    iAnnotate: Exploring Multi-User Ink Annotation in Web Browsers

    This paper presents iAnnotate, a tool that provides multi-user digital ink annotation on standard web pages within a commercial browser. The annotation can be saved, retrieved and shared with others via a URL. In addition multiple users' annotations can be displayed on the same page. The paper describes the design...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Middleware for Context Sensitive Mobile Applications

    Contextual information such as spatial location can significantly enhance the utility of mobile applications. This paper introduces the concept of active preferences that represent a combination of user preference information and choices combined with spatial or temporal information. Active preferences set the policy on how a mobile application should customise...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Visualising Java Data Structures as Graphs

    This paper presents a simple, general-purpose tool for visualising Java data structures. The tool uses Java reflection and an open-source graph drawing program to produce text-book quality depictions of arbitrary Java objects. The tool offers certain pedagogical advantages over other "Heavy-Weight" visualisation systems. Its simplicity and generality means that students...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Optimizing the Lazy DFA Approach for XML Stream Processing

    Lazy DFA (Deterministic Finite Automata) approach has been recently proposed to for efficient XML stream data processing. This paper discusses the drawbacks of the approach, suggests several optimizations as solutions, and presents a detailed analysis for the processing model. The experiments show that the proposed approach is indeed effective and...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Efficient Management of XML Documents

    XML has become a de facto standard for data representation and exchange on the World-Wide-Web. Unlike HTML tags that are mainly used to describe presentations, tags in XML capture some semantics, especially when domain-specific common DTDs are used when authoring XML documents. Since industries are indeed enthusiastic about XML, and...

    Provided By Australian Computer Society

  • White Papers // Dec 2009

    Multi-Factor Password-Authenticated Key Exchange

    The authors consider a new form of authenticated key exchange which they call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Resource Provisioning Based on Lease Preemption in InterGrid

    Resource provisioning is one of the main challenges in resource sharing environments such as InterGrid. Recently, many resource management systems in resource sharing environments use lease abstraction and virtual machines for provisioning. In resource sharing environments resource providers serve requests from external (grid) users along with their own local users....

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    CARL: A Complex Applications Interoperability Language based on Semantic Technologies for Platform-as-a-Service Integration and Cloud Computing

    Cloud computing technologies have recently gained momentum and moved from a hyped trend to a mature set of technological innovations providing an infrastructure for the Software-as-a-Service (SaaS) paradigm. However, a number of questions about cloud-deployed applications inter-operability and cross-integration, stemming from multiple areas of computer science domains, have also been...

    Provided By Australian Computer Society

  • White Papers // May 2011

    Using Ontologies to Synchronize Change in Relational Database Systems

    Ontology is a building block of the semantic Web. Ontology building requires a detailed domain analysis, which in turn requires financial resources, intensive domain knowledge and time. Domain models in industry are frequently stored as relational database schemas in relational databases. An ontology base underlying such schemas can represent concepts...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Designing and Developing a Modern Distributed Data Acquisition and Monitoring System

    In this paper the authors introduce new control system aspects used for designing and implementing a distributed data acquisition and monitoring software system. These aspects are proposed according to OPC technologies and XML as standards for interfaces, functionalities, and architectures. The proposed system allows the authors to easily aggregate existing...

    Provided By Australian Computer Society

  • White Papers // May 2010

    A Query System for XML Data Stream and its Semantics-based Buffer Reduction

    With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buffer scale may increase exponentially, which can cause memory bottleneck. Some optimization techniques have been proposed to solve the problem. However, the limit of...

    Provided By Australian Computer Society

  • White Papers // May 2009

    Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services

    Data warehouses manage historical information for the decision making process, and this information could be discovered by unauthorized users if security constraints are not established. It is therefore highly important for OLAP tools to consider the security rules defined at early stages of the development lifecycle. By following the MDA...

    Provided By Australian Computer Society

  • White Papers // Aug 2008

    A Privacy-Enhancing Architecture for Databases

    Innovative approaches to searching for hidden meaning in data have recently emerged. In some cases, however, the support of privacy is compromised and consistent privacy protection remains elusive. Privacy perceptions and requirements differ from person to person and over time, leading to diverse privacy preferences within a community. This paper...

    Provided By Australian Computer Society

  • White Papers // Feb 2008

    An Investigation into Business-to-Business Electronic Commerce Organizations

    The issue of Information Technology (IT) investment evaluation in B2BEC (Business-To-Business Electronic Commerce) has generated a lot of interest and discussion among academics and researchers. This paper was undertaken to investigate the relationships between the level of IT maturity, the use of IT Investment Evaluation Methodology (IEM) and Benefits Realization...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Availability Modeling and Evaluation on High Performance Cluster Computing Systems

    Cluster computing has been attracting more and more attention from both the industrial and the academic world for its enormous computing power and scalability. Beowulf type cluster, for example, is a typical High Performance Computing (HPC) cluster system. Availability, as a key attribute of the system, needs to be considered...

    Provided By Australian Computer Society

  • White Papers // May 2008

    Global Sense of Risk: Media Reporting on Scientific Studies and Potential Risks of Mobile Phones

    A high sense of risk is characteristic of modern societies. During recent decades, increasing risk awareness has caused consumers to become more prudent. Consumer policy has become more cautious and governmental security and regulatory institutions function on behalf of citizens. Politically aware non-governmental organizations are ready to take up new...

    Provided By Australian Computer Society

  • White Papers // Feb 2008

    A Model for Investigating Software Accidents

    A software accident is an unforeseen outcome that arises from a failure of a software project or software product. Death, severe injury or severe financial loss, could arise from such a failure. This paper asserts that there is not yet a good accident investigation model with which to investigate software...

    Provided By Australian Computer Society

  • White Papers // Feb 2008

    Identity-Based Parallel Key-Insulated Signature: Framework and Construction

    To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC'06 the researchers proposed an ID-Based Key-Insulated Signature (IBKIS) scheme. However, their scheme is not strong key-insulated, i.e. if a user's helper is compromised, the adversary can derive all of this user's secret keys for any time period. Moreover,...

    Provided By Australian Computer Society

  • White Papers // Nov 2007

    Reduced Pattern Training in Pattern Distributor Networks

    In this paper, the authors propose a new task decomposition method, task decomposition with Pattern Distributor (PD), for multilayered feedforward neural networks. The method uses a combination of network modules in parallel and series to generate the overall solution for a complex problem. They also introduce a method called reduced...

    Provided By Australian Computer Society

  • White Papers // Feb 2007

    Preemption Policy in QoS-Enabled Networks: A Customer Centric Approach

    Preemption is a key technique to provide available and reliable services to high priority connections in a QoS-enabled network. Preemption technique is governed by a policy which makes the decision about which connections to preempt when resource scarcity is experienced. Existing preemption policies consider preemption rate, priority of connection and...

    Provided By Australian Computer Society

  • White Papers // May 2006

    Self-Similarity and Internet Performance

    In this paper, it has been demonstrated through experiments that Long Range Dependence (LRD) in internet traffic is indeed affecting the queueing performance. Queueing performance is being degraded as the self-similarity of the packet arrival process increases. Here, the link buffer capacity and queueing delay exhibits super-linear relationship. This in...

    Provided By Australian Computer Society

  • White Papers // May 2007

    Designing and Implementing a Grid Application for Cumulative Agrichemical Residue Tracking using Third-Party Data Sources and Software Components

    It is increasingly important to design software for reuse so future changes can be implemented as easily and cheaply as possible. It is also beneficial to use existing resources where they are available. This paper describes an agricultural application for cumulative agrichemical residue tracking designed and implemented to use grid...

    Provided By Australian Computer Society

  • White Papers // Feb 2007

    Behaviour Mining for Fraud Detection

    Despite significant efforts by merchants, card issuers and law enforcement to curb fraud, online fraud continues to plague electronic commerce web sites. More advanced solutions are desired to protect merchants from the constantly evolving problem caused by fraud. The supervised machine learning technique for the most well known fraud detection...

    Provided By Australian Computer Society

  • White Papers // Feb 2007

    Dependable Dynamic Source Routing without a Trusted Third Party

    Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of their constituent wireless nodes, which are expected to forward packets for other nodes in a benign manner. The Dynamic Source Routing (DSR) protocol is one such...

    Provided By Australian Computer Society

  • White Papers // May 2007

    Secure Federated Authentication and Authorisation to GRID Portal Applications using SAML and XACML

    Internationally, the need for federated identity & access management continues to grow, as it allows users to get single sign-on access to external resources (a.k.a. service providers) using their home account and some attributes that are being released securely by their home organization (a.k.a. identity providers). In other words, it...

    Provided By Australian Computer Society

  • White Papers // Feb 2006

    A UML 2.0/OCL Extension for Designing Secure Data Warehouses

    At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in the successful design of data warehouses. If that methodology were developed, its complexity would hinder its success. The solution, therefore, would be an approach in which techniques and models defined...

    Provided By Australian Computer Society

  • White Papers // Feb 2006

    Return On Security Investment (ROSI) - A Practical Quantitative Model

    In a world where hackers, computer viruses and cyber-terrorists are making headlines daily, security has become a priority in all aspects of life, including business. Organizations need practical security benchmarking tools in order to plan effective security strategies. This paper explores a number of techniques that can be used to...

    Provided By Australian Computer Society

  • White Papers // Feb 2006

    Towards a Process for Web Services Security

    Web Services (WS) security has undergone an enormous development, as carried out by the major organizations and consortiums of the industry over the last few years. This has brought about the appearance of a huge number of WS security standards. Such a fact has made organizations remain reticent about adopting...

    Provided By Australian Computer Society

  • White Papers // Feb 2006

    Cooperative Defence against DDoS Attacks

    Distributed Denial of Service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available Intrusion Detection Systems (IDS) cannot detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this...

    Provided By Australian Computer Society

  • White Papers // May 2009

    Modelling Reusable Security Requirements based on an Ontology Framework

    In recent years, security in Information Systems (IS) has become an important issue, and needs to be taken into account in all stages of IS development, including the early phase of Requirements Engineering (RE). Reuse of requirements improves the productivity and quality of software process and products. This can be...

    Provided By Australian Computer Society

  • White Papers // May 2009

    Lightweight Anonymous Routing for Reliability in Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are particularly vulnerable on account of their intrinsic characteristics of open medium, dynamic topology, absence of central authorities, distributed cooperation and constrained capability. These vulnerabilities create significant challenges for routing protocols operating in the entire network. Anonymous routing is a value-added technique used in MANET for...

    Provided By Australian Computer Society

  • White Papers // May 2009

    New Attack Strategy for the Shrinking Generator

    In this paper, the authors show that the cryptanalysis of the shrinking generator requires fewer intercepted bits than that indicated by the linear complexity. Indeed, whereas the linear complexity of shrunken sequences is between A.2(S-2) and A.2(S-1), they claim that the initial states of both component registers are easily computed...

    Provided By Australian Computer Society

  • White Papers // Feb 2009

    AODV-HM: A Hybrid Mesh Ad-hoc On-demand Distance Vector Routing Protocol

    Wireless Mesh Networks (WMNs) have recently gained increasing attention and have emerged as a technology with great potential for a wide range of applications. WMNs can be considered as a superset of traditional Mobile Ad-hoc NETworks (MANETs), where the network is comprised of mobile client devices MESH-CLIENTs. In addition to...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Deploying Access and Flow Control in Distributed Workflows

    Workflows are operational business processes. WorkFlow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there has been a trend to integrate WFMS in distributed inter-organizational systems. In this case malfunctioning of one WFMS can affect more than one organization, making the correct...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences

    In this paper, the authors develop a new cellular automata-based linear model for several nonlinear pseudorandom number generators with practical applications in symmetric cryptography. Such a model generates all the solutions of linear binary difference equations as well as many of these solutions are pseudo-random keystream sequences. In this way,...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves

    The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good elliptic curves from a given one....

    Provided By Australian Computer Society

  • White Papers // Aug 2008

    Anonymous Communication in Multi Hop Wireless Networks

    In this paper, the authors present a protocol for unlinkable and anonymous communication in multi-hop wireless networks. There exist solutions for unlinkable communication in the internet, such as tor and mix networks. These protocols need fixed infrastructure and they are prone to traffic analysis attacks, i.e. where an attacker tries...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    An Ontological Model for Component Collaboration

    Building large enterprise systems has always been a difficult, expensive and risky business. The authors propose an ontology-based approach to model dynamic component systems. Component collaborations are described as the provision and consumption of typed resources. They are particularly interested in how the vocabularies used to describe component requirements and...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Generation and Evaluation of Business Continuity Processes using Algebraic Graph Transformation and the mCRL2 Process Algebra

    Critical business processes can fail. Therefore, continuity processes are needed as back-up solutions. Today, those continuity processes are set up and maintained manually. They are mostly based on best practices that focus on specific continuity scenarios, Nevertheless, failures can occur in new and unforeseen combinations. As a consequence, a given...

    Provided By Australian Computer Society