Cornell University

Displaying 1-40 of 1213 results

  • White Papers // Mar 2015

    Efficient Query Processing for SPARQL Federations with Replicated Fragments

    Low reliability and availability of public SPARQL endpoints prevent real-world applications from exploiting all the potential of these querying infrastructures. Fragmenting data on servers can improve data availability but degrades performance. Replicating fragments can offer new tradeoff between performance and availability. The authors propose FEDRA, a framework for querying Linked...

    Provided By Cornell University

  • White Papers // Mar 2015

    EmptyHeaded: Boolean Algebra Based Graph Processing

    The authors present a graph pattern engine, EmptyHeaded that uses recent algorithmic advances in join processing to compile patterns into Boolean algebra operations that exploit SIMD parallelism. The EmptyHeaded engine demonstrates that treating graph patterns as a general join processing problem can compete with and often outperform both specialized approaches...

    Provided By Cornell University

  • White Papers // Mar 2015

    Mapping-Equivalence and Oid-Equivalence of Single-Function Object-Creating Conjunctive Queries

    Conjunctive database queries have been extended with a mechanism for object creation to capture important applications such as data ex-change, data integration, and ontology-based data access. Object creation generates new object identifiers in the result that do not belong to the set of constants in the source database. The new...

    Provided By Cornell University

  • White Papers // Feb 2015

    Designing Applications with Distributed Databases in a Hybrid Cloud

    The authors present a set of technological approaches for efficient application development in a hybrid cloud infrastructure. Under the hybrid cloud infrastructure, they understand the distributed databases in the private and public cloud, as well as communication channels and programs providing the interaction between the components of the database. Designing...

    Provided By Cornell University

  • White Papers // Feb 2015

    Fraudulent Electronic Transaction Detection Using Dynamic KDA Model

    Clustering analysis and data mining methodologies were applied to the problem of identifying illegal and fraud transactions. The researchers independently developed model and software using data provided by a bank and using rapid-miner modeling tool. This paper is to propose dynamic model and mechanism to cover fraud detection system limitations....

    Provided By Cornell University

  • White Papers // Jan 2015

    Joint Ranging and Clock Parameter Estimation by Wireless Round Trip Time Measurements

    In this paper, the authors develop a new technique for estimating fine clock errors and range between two nodes simultaneously by two-way time-of-arrival measurements using impulse-radio ultra-wideband signals. Estimators for clock parameters and the range are proposed that are robust with respect to outliers. They are analyzed numerically and by...

    Provided By Cornell University

  • White Papers // Jan 2015

    QoE-Centric Localized Mobility Management for Future Mobile Networks

    Mobility support in future networks will be predominately based on micro mobility protocols. Current proposed schemes such as Hierarchical Mobile IPv6 (HMIPv6) and more importantly Proxy Mobile IPv6 (PMIPv6) provide localized mobility support by electing a node within the network (topologically close to the Access Routers (AR)) to act as...

    Provided By Cornell University

  • White Papers // Jan 2015

    Designing Low Cost and Energy Efficient Access Network for the Developing World

    The authors' main observation is the existence of users that allow switching o the networking devices during night hours. However, it is not straightforward to implement the energy savings as the network topology is a tree in which any switched o node may imply disconnection of the users. The issue...

    Provided By Cornell University

  • White Papers // Jan 2015

    Seeking Black Lining in Cloud

    In this paper, the authors focus on attacks on confidentiality that require time synchronization. This manuscript proposes a detection framework for covert channel perspective in cloud security. This problem is interpreted as a binary classification problem and the algorithm proposed is based on certain features that emerged after data analysis...

    Provided By Cornell University

  • White Papers // Jan 2015

    Open-Source Software Implications in the Competitive Mobile Platforms Market

    The era of the PC platform left a legacy of competitive strategies for the future technologies to follow. However, this notion became more complicated, once the future grew out to be a present with huge bundle of innovative technologies, Internet capabilities, communication possibilities, and ease in life. A major step...

    Provided By Cornell University

  • White Papers // Dec 2014

    Associative Arrays: Unified Mathematics for Spreadsheets, Databases, Matrices, and Graphs

    Data processing systems impose multiple views on data as it is processed by the system. These views include spreadsheets, databases, matrices, and graphs. The common theme amongst these views is the need to store and operate on data as whole sets instead of as individual data elements. This paper describes...

    Provided By Cornell University

  • White Papers // Dec 2014

    Graph Analytics Using the Vertica Relational Database

    Graph analytics is becoming increasingly popular, with a deluge of new systems for graph analytics having been proposed in the past few years. These systems often start from the assumption that a new storage or query processing system is needed, in spite of graph data being often collected and stored...

    Provided By Cornell University

  • White Papers // Dec 2014

    Material Recognition in the Wild with the Materials in Context Database

    Recognizing materials in images in the wild is a challenging task. Real-world materials have rich surface texture, geometry, lighting conditions, and clutter, which combine to make the problem particularly difficult. Recently, deep learning combined with large datasets is proving to be an effective approach to tackling hard problems in scene...

    Provided By Cornell University

  • White Papers // Nov 2014

    Survey of End-to-End Mobile Network Measurement Testbeds

    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, research, development, and regulatory communities have taken an increased interest in measuring mobile network performance and its impact on...

    Provided By Cornell University

  • White Papers // Nov 2014

    Privacy-Preserving Content-Based Image Retrieval in the Cloud

    Storage requirements for visual data have been increasing in recent years, following the emergence of many new services and applications for both personal and corporate use. This has been a key driving factor for the adoption of cloud-based data outsourcing solutions. However, outsourcing data storage to the Cloud also leads...

    Provided By Cornell University

  • White Papers // Oct 2014

    Faster Algorithms for Algebraic Path Properties in RSMs with Constant Treewidth

    Interprocedural analysis is at the heart of numerous applications in programming languages, such as alias analysis, constant propagation, etc. Recursive State Machines (RSMs) are standard models for interprocedural analysis. The authors consider a general framework with RSMs where the transitions are labeled from a semiring, and path properties are algebraic...

    Provided By Cornell University

  • White Papers // Oct 2014

    A Note on Two Notions of Compliance

    Several recent papers have been devoted to the study of contracts as a way to formally specify abstractions of the behavior of software systems. A common aspect that gathers together some of these studies is a notion of compliance. This is a relation between systems which want to interact. Before...

    Provided By Cornell University

  • White Papers // Oct 2014

    Toward Sequentializing Overparallelized Protocol Code

    A promising application domain for coordination languages is programming protocols among threads in multi-core programs: coordination languages typically provide high-level constructs and abstractions that more easily compose into correct - with respect to a programmer's intentions - protocol specifications than do low-level synchronization constructs provided by conventional languages (e.g., locks...

    Provided By Cornell University

  • White Papers // Oct 2014

    Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependency

    Increased coupling between critical infrastructure networks, such as power and communications, has important implications for the reliability and security of these networks. To understand the implications of power-communications coupling, researchers have studied interdependent network models and reported that increased coupling can increase system vulnerability. However, these results come from models...

    Provided By Cornell University

  • White Papers // Oct 2014

    Efficient Key Generation for Dynamic Blom's Scheme

    The need for secure communication between the nodes in a network has led to the development of various key distribution schemes. Blom's scheme is a prominent key exchange protocol used for sensor and wireless networks, but its shortcomings include large computation overhead and memory cost. In this paper, the authors...

    Provided By Cornell University

  • White Papers // Oct 2014

    Repairable Threshold Secret Sharing Schemes

    In this paper, the authors propose a class of new threshold secret sharing schemes with repairing function between shares. Specifically, each share, when it is broken or lost, can be repaired by some others without the help of the dealer. Further, a construction of such repairable threshold secret sharing schemes...

    Provided By Cornell University

  • White Papers // Oct 2014

    Capacity Analysis of Decoupled Downlink and Uplink Access in 5G Heterogeneous Systems

    The peoples' traditional notion of a cell is changing dramatically given the increasing degree of heterogeneity in 4G and emerging 5G systems. Rather than belonging to a specific cell, a device would choose the most suitable connection from the plethora of connections available. In such a setting, given the transmission...

    Provided By Cornell University

  • White Papers // Oct 2014

    Quantum Clouds: A Future Perspective

    Quantum computing and cloud computing are two gaints for futuristic computing. Both technologies complement each other. Quantum clouds, therefore, is deploying the resources of quantum computation in a cloud environment to provide solution to the challenges and problems faced by present model of classical cloud computation. State of the art...

    Provided By Cornell University

  • White Papers // Oct 2014

    Effects of Social Influence in Peer Online Recommendation

    Website providers often use peer recommendation to help people find interesting content. A common method for leveraging opinions of others on these web sites is to display the number of prior recommendations as a social signal. How people react to these social influence signals, in combination with other effects, such...

    Provided By Cornell University

  • White Papers // Oct 2014

    Detection of Core-Periphery Structure in Networks Using Spectral Methods and Geodesic Paths

    The authors introduce several novel and computationally efficient methods for detecting \"Core-periphery structure\" in networks. Core-periphery structure is a type of meso-scale structure that includes densely-connected core vertices and sparsely-connected peripheral vertices. Core vertices are well-connected both among themselves and to peripheral vertices, which are not well-connected to any vertices....

    Provided By Cornell University

  • White Papers // Oct 2014

    Efficient LTE Access with Collision Resolution for Massive M2M Communications

    LTE random access procedure performs satisfactorily in case of asynchronous, uncorrelated traffic arrivals. However, when the arrivals are correlated and arrive synchronously, the performance of the Random Access CHannel (RACH) is drastically reduced, causing a large number of devices to experience outage. In this paper, the authors propose a LTE...

    Provided By Cornell University

  • White Papers // Oct 2014

    Statistical Models for Cores Decomposition of Undirected Random Graphs

    The authors develop a rigorous and interpretable statistical model for networks using their shell structure to construct minimal sufficient statistics. The model provides the formalism necessary for using k-cores in statistical considerations of random graphs, and in particular social networks. It cannot be specialized to any known degree-centric model and...

    Provided By Cornell University

  • White Papers // Oct 2014

    Pricing in Social Networks with Negative Externalities

    The authors study the problems of pricing an indivisible product to consumers who are embedded in a given social network. The goal is to maximize the revenue of the seller. They assume impatient consumers who buy the product as soon as the seller posts a price not greater than their...

    Provided By Cornell University

  • White Papers // Oct 2014

    Hierarchical Sequencing of Online Social Graphs

    In online communications, patterns of conduct of individual actors and use of emotions in the process can lead to a complex social graph exhibiting multilayered structure and mesoscopic communities. Using simplicial complexes representation of graphs, the authors investigate in-depth topology of online social network which is based on MySpace dialogs....

    Provided By Cornell University

  • White Papers // Oct 2014

    Probabilistic Definitions of Actual Causation Using CP-logic

    Since Pearl's seminal work on providing a formal language for causality, the subject has garnered a lot of interest among philosophers and researchers in artificial intelligence alike. One of the most debated topics in this context regards the notion of actual causation, which concerns itself with specific - as opposed...

    Provided By Cornell University

  • White Papers // Oct 2014

    Timed Influence: Computation and Maximization

    The authors consider a cost model for diffusion in a network that captures both the scope of infection and its propagation time: the edges of the network have associated lengths which model transmission times, and influence scores are higher for faster propagation. They propose an intuitive measure of timed influence,...

    Provided By Cornell University

  • White Papers // Oct 2014

    Applying Agile Requirements Engineering Approach for Re-engineering & Changes in existing Brownfield Adaptive Systems

    Requirements Engineering (RE) is a key activity in the development of software systems and is concerned with the identification of the goals of stakeholders and their elaboration into precise statements of desired services and behavior. The paper describes an agile requirements engineering approach for re-engineering & changes in existing brownfield...

    Provided By Cornell University

  • White Papers // Oct 2014

    QoE Modelling, Measurement and Prediction: A Review

    In mobile computing systems, users can access network services anywhere and anytime using mobile devices such as tablets and Smartphone's. These devices connect to the Internet via network or telecommunications operators. Users usually have some expectations about the services provided to them by different operators. Users' expectations along with additional...

    Provided By Cornell University

  • White Papers // Oct 2014

    Lost in Space: Improving Inference of IPv4 Address Space Utilization

    One challenge in understanding the evolution of Internet infrastructure is the lack of systematic mechanisms for monitoring the extent to which allocated IP addresses are actually used. In this paper, the authors try to advance the science of inferring IPv4 address space utilization by analyzing and correlating results obtained through...

    Provided By Cornell University

  • White Papers // Oct 2014

    Parameterizing the Semantics of Fuzzy Attribute Implications by Systems of Isotone Galois Connections

    The authors study the semantics of fuzzy if-then rules called fuzzy attribute implications parameterized by systems of isotone Galois connections. The rules express dependencies between fuzzy attributes in object-attribute incidence data. The proposed parameterizations are general and include as special cases the parameterizations by linguistic hedges used in earlier approaches....

    Provided By Cornell University

  • White Papers // Oct 2014

    Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection

    With the proliferation of mobile devices, cloud-based photo sharing and searching services are becoming common due to the mobile devices' resource constrains. Meanwhile, there is also increasing concern about privacy in photos. In this paper, the authors present a framework SouTu, which enables cloud servers to provide privacy-preserving photo sharing...

    Provided By Cornell University

  • White Papers // Oct 2014

    That Ain't You: Blocking Spearphishing Emails Before they are Sent

    One of the ways in which attackers try to steal sensitive information from corporations is by sending spear-phishing emails. This type of emails typically appears to be sent by one of the victim's coworkers, but have instead been crafted by an attacker. A particularly insidious type of spear-phishing emails are...

    Provided By Cornell University

  • White Papers // Oct 2014

    Practical Massively Parallel Sorting - Basic Algorithmic Ideas

    Sorting is one of the most fundamental non-numeric algorithms which are needed in a multitude of applications. For example, map-reduce based computations in every step have to group the data items by key values. Or load balancing in supercomputers often uses space-filling curves. This boils down to sorting data by...

    Provided By Cornell University

  • White Papers // Oct 2014

    ASTOR: Evolutionary Automatic Software Repair for Java

    During last years, many automatic software repair approaches have been presented by the software engineering research community. According to the corresponding papers, these approaches are able to repair real defects from open source projects. Some previous publications in the automatic repair field do not provide the implementation of theirs approaches...

    Provided By Cornell University

  • White Papers // Oct 2014

    The Quantum Nature of Identity in Human Thought: Bose-Einstein Statistics for Conceptual Indistinguishability

    Increasing experimental evidence shows that humans combine concepts in a way that violates the rules of classical logic and probability theory. On the other hand, mathematical models inspired by the formalism of quantum theory are in accordance with data on concepts and their combinations. In this paper, the authors investigate...

    Provided By Cornell University

  • White Papers // Oct 2012

    Location-Based Events Detection on Micro-Blogs

    The increasing use of social networks generates enormous amounts of data that can be used for various types of analysis. Some of these data have temporal and geographical information, which can be used for comprehensive examination. In this paper, the authors propose a new method to analyze the massive volume...

    Provided By Cornell University

  • White Papers // Oct 2012

    Opinion Mining for Relating Subjective Expressions and Annual Earnings in US Financial Statements

    Financial statements contain quantitative information and manager's subjective evaluation of firm's financial status. Using information released in U.S. 10-K filings. Both qualitative and quantitative appraisals are crucial for quality financial decisions. To extract such opinioned statements from the reports, the authors built tagging models based on the Conditional Random Field...

    Provided By Cornell University

  • White Papers // Oct 2012

    Wireless Network-Coded Four-Way Relaying Using Latin Hyper-Cubes

    This paper deals with physical layer network-coding for the four-way wireless relaying scenario where four nodes A, B, C and D wish to communicate their messages to all the other nodes with the help of the relay node R. The scheme given in the paper is based on the denoise-and-forward...

    Provided By Cornell University

  • White Papers // Oct 2012

    The Limitation of Random Network Coding

    It is already known that in multicast (single source, multiple sinks) network, random linear network coding can achieve the maximum flow upper bound. In this paper, the authors investigate how random linear network coding behaves in general multi-source multi-sink case, where each sink has different demands, and they characterize all...

    Provided By Cornell University

  • White Papers // Oct 2012

    Online Computation of Sparse Representations of Time Varying Stimuli Using a Biologically Motivated Neural Network

    Natural stimuli are highly redundant, possessing significant spatial and temporal correlations. While sparse coding has been proposed as an efficient strategy employed by neural systems to encode sensory stimuli, the underlying mechanisms are still not well understood. Most previous approaches model the neural dynamics by the sparse representation dictionary itself...

    Provided By Cornell University

  • White Papers // Oct 2012

    A Flexible Mixed Integer Programming Framework for Nurse Scheduling

    In this paper, a nurse-scheduling model is developed using mixed integer programming model. It is deployed to a general care ward to replace and automate the current manual approach for scheduling. The developed model differs from other similar studies in that it optimizes both hospital's requirement as well as nurse...

    Provided By Cornell University

  • White Papers // Sep 2012

    Classification Of Heterogeneous Operating System

    Operating system is a bridge between system and user. An Operating System (OS) is a software program that manages the hardware and software resources of a computer. The OS performs basic tasks, such as controlling and allocating memory, prioritizing the processing of instructions, controlling input and output devices, facilitating networking,...

    Provided By Cornell University

  • White Papers // Feb 2012

    Fast Packed String Matching for Short Patterns

    Searching for all occurrences of a pattern in a text is a fundamental problem in computer science with applications in many other fields, like natural language processing, information retrieval and computational biology. In the last two decades a general trend has appeared trying to exploit the power of the word...

    Provided By Cornell University

  • White Papers // Oct 2012

    Predicting Group Evolution in the Social Network

    Social communities are important components of entire societies, analyzed by means of the social network concept. Their immanent feature is continuous evolution over time. If user's know how groups in the social network has evolved user's can use this information and try to predict the next step in the given...

    Provided By Cornell University

  • White Papers // Jun 2012

    Graph-Coupled HMMs for Modeling the Spread of Infection

    The authors develop Graph-Coupled Hidden Markov Models (GCHMMs) for modeling the spread of infectious disease locally within a social network. Unlike most previous research in epidemiology, which typically models the spread of infection at the level of entire populations, they successfully leverage mobile phone data collected from 84 people over...

    Provided By Cornell University

  • White Papers // Oct 2012

    Contrasting Multiple Social Network Autocorrelations for Binary Outcomes, with Applications to Technology Adoption

    The rise of socially targeted marketing suggests that decisions made by consumers can be predicted not only from their personal tastes and characteristics, but also from the decisions of people who are close to them in their networks. One obstacle to consider is that there may be several different measures...

    Provided By Cornell University

  • White Papers // Oct 2012

    Secure Abstraction with Code Capabilities

    The authors propose embedding executable code fragments in cryptographically protected capabilities to enable flexible discretionary access control in cloud-like computing infrastructures. They are developing this as part of a sports analytics application that runs on a federation of public and enterprise clouds. The capability mechanism is implemented completely in user...

    Provided By Cornell University

  • White Papers // Sep 2012

    Secure Electronic Lock Using Pic 16f628a Microcontroller

    The proposed system implements an electronic embedded lock that provides a great benefit over a traditional lock, which uses only a manual key. If in case, the key is lost or stolen then anyone can open the lock using the key. On the other hand, losing a long and complex...

    Provided By Cornell University

  • White Papers // Apr 2012

    Towards a Security Engineering Process Model for Electronic Business Processes

    Business Process Management (BPM) and accompanying systems aim at enabling enterprises to become adaptive. In spite of the dependency of enterprises on secure business processes, BPM languages and techniques provide only little support for security. Several complementary approaches have been proposed for security in the domain of BPM. Nevertheless, support...

    Provided By Cornell University

  • White Papers // Apr 2012

    A Formal Definition and a New Security Mechanism of Physical Unclonable Functions

    The characteristic novelty of what is generally meant by a "Physical Unclonable Function" (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms. A PUF is defined as a hardware device which implements a physical function with an output...

    Provided By Cornell University

  • White Papers // Jan 2012

    Deducing Security Goals From Shape Analysis Sentences

    Guttman presented a model-theoretic approach to establishing security goals in the context of Strand Space theory. In his approach, a run of the Cryptographic Protocol Shapes Analyzer (CPSA) produces models that determine if a goal is satisfied. This paper presents a method for extracting a sentence that completely characterizes a...

    Provided By Cornell University

  • White Papers // Jun 2012

    A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators

    In this paper, the authors specify a class of mathematical problems, which they refer to as "Function Density Problems" (FDPs), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1), and constructions of provably secure PseudoRandom Generators...

    Provided By Cornell University

  • White Papers // Mar 2012

    Securing Business Operations in an SOA

    Service-oriented infrastructures pose new challenges in a number of areas, notably with regard to security and dependability. BT has developed a combination of innovative security solutions and governance frameworks that can address these challenges. They include advances in identity federation; distributed usage and access management; context-aware secure messaging, routing and...

    Provided By Cornell University

  • White Papers // Dec 2011

    Information Hiding in CSS : A Secure Scheme Text-Steganography Using Public Key Cryptosystem

    In many recent years, the programming world has been introduced about a new programming language for designing websites, it is CSS that can be used together with HTML to develop a web interface. And now, these two programming languages as if inseparably from each other. As a client-side scripting, CSS...

    Provided By Cornell University

  • White Papers // Jan 2012

    Secure SQL Server - Enabling Secure Access to Remote Relational Data

    The Secure SQL Server - SecSS, is a technology primarily developed to enable self service governance of states, as described in (Paulin 2012). Self service governance is a novel model of governance that rejects service based public administration and instead proposes that governed subjects manage their legal relations in a...

    Provided By Cornell University

  • White Papers // Dec 2011

    Efficient and Cryptographically Secure Generation of Chaotic Pseudorandom Numbers on GPU

    In this paper, the authors present a new PseudoRandom Number Generator (PRNG) on Graphics Processing Units (GPU). This PRNG is based on the so-called chaotic iterations. It is firstly proven to be chaotic according to the Devaney's formulation. They thus propose an efficient implementation for GPU that successfully passes the...

    Provided By Cornell University

  • White Papers // Nov 2011

    Secured Data Consistency and Storage Way in Untrusted Cloud Using Server Management Algorithm

    It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing user's data in cloud may not be fully trustworthy. Since client doesn't have copy of all stored data, he has to depend on Cloud Service Provider. But dynamic...

    Provided By Cornell University

  • White Papers // Sep 2012

    Quantum/Relativistic Computation of Security and Efficiency of Electrical Power System for a Day-Ahead

    An algorithm for Electrical Power System (EPS) quantum/relativistic security and efficiency computation via perturbative renormalization of the EPS, finding the computation flowcharts, verification and validation is built in this paper. EPS renormalization is performed via virtual thermalization. EPS energy renormalization provides EPS critical load and outlines the EPS fractal landscape....

    Provided By Cornell University

  • White Papers // Oct 2011

    Secure Capacity Region for Erasure Broadcast Channels with Feedback

    The authors formulate and explain a cryptographic problem relevant to wireless: a sender, Alice, wants to transmit private messages to two receivers, Bob and Calvin, using unreliable wireless broadcast transmissions and short public feedback from Bob and Calvin. They ask, at what rates can, they broadcast the private messages if...

    Provided By Cornell University

  • White Papers // Sep 2011

    Enhanced Secure Algorithm for Message Communion

    This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over...

    Provided By Cornell University

  • White Papers // Aug 2012

    Coordination in Network Security Games: a Monotone Comparative Statics Approach

    Malicious softwares or malwares for short have become a major security threat. While originating in criminal behavior, their impacts are also influenced by the decisions of legitimate end users. Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a...

    Provided By Cornell University

  • White Papers // Jul 2012

    Securing Speech in GSM Networks Using DES with Random Permutation and Inversion Algorithm

    Global System for Mobile Communications (GSM) is one of the most commonly used cellular technologies in the world. One of the objectives in mobile communication systems is the security of the exchanged data. GSM employs many cryptographic algorithms for security like A5/1, A5/2 and A5/3. Even so, these algorithms do...

    Provided By Cornell University

  • White Papers // Aug 2012

    Securing Instrumented Environments Over Content-Centric Networking: The Case of Lighting Control

    Instrumented environments, such as modern Building Automation Systems (BAS), are becoming commonplace and are increasingly interconnected with (and sometimes by) enterprise networks and the Internet. Regardless of the underlying communication platform, secure control of devices in such environments is a challenging task. The current trend is to move from proprietary...

    Provided By Cornell University

  • White Papers // Aug 2012

    JASF: Jasta Security Framework

    JASM is a model designed to increase the security level in authentication systems. It uses IP Address of the user in the authentication process to enhance the security. On-line security plays a vital role to prevent users sensitive data from falling into wrong hands. JAsta Security Model (JASM) can be...

    Provided By Cornell University

  • White Papers // Jul 2012

    Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

    In this paper, the authors propose an efficient digital watermarking scheme to strengthen the security level already present in the database management system and to avoid illegal access to comprehensive content of database including patient's information. Doctors diagnose medical images by seeing Region Of Interest (ROI). A ROI of a...

    Provided By Cornell University

  • White Papers // Feb 2012

    SSCADA: Securing SCADA Infrastructure Communications

    Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (SCADA) systems were developed to reduce labor costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water, and wastewater industries. While control...

    Provided By Cornell University

  • White Papers // Jul 2012

    Securing Electronic Transactions to Support E-Commerce

    Many reports regarding online fraud in varieties media create skepticism for conducting transactions online, especially through an open network such as the Internet, which offers no security whatsoever. Therefore, encryption technology is vitally important to support secure e-commerce on the Internet. Two well-known encryption representing symmetric and asymmetric cryptosystems as...

    Provided By Cornell University

  • White Papers // Jun 2012

    Classification of Various Security Techniques in Databases and Their Comparative Analysis

    Data security is one of the most crucial and a major challenge in the digital world. Security, privacy and integrity of data are demanded in every operation performed on internet. Whenever security of data is discussed, it is mostly in the context of secure transfer of data over the unreliable...

    Provided By Cornell University

  • White Papers // Jun 2012

    Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme

    CI S2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stego and topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "Watermark only attack" framework. Its topological security reinforces its...

    Provided By Cornell University

  • White Papers // Jun 2012

    Delegated Secure Sum Service for Distributed Data Mining in Multi-Cloud Settings

    An increasing number of businesses are migrating their IT operations to the cloud. Likewise there is an increased emphasis on data analytics based on multiple datasets and sources to derive information not derivable when a dataset is mined in isolation. While ensuring security of data and computation outsourced to a...

    Provided By Cornell University

  • White Papers // Apr 2012

    An Exact Solution to the Power Networks Security Index Problem and Its Generalized Min Cut Formulation

    The resilience of Supervisory Control And Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. In particular, the authors study the robustness of the observability properties of the network to the loss of some measurements. It was recently shown, under the full measurement assumption, that the...

    Provided By Cornell University

  • White Papers // Apr 2012

    STP/HAMPI and Computer Security

    In the past several years, the author have written two SMT solvers called STP and HAMPI that have found widespread use in computer security research by leading groups in academia, industry and the government. In this paper, the author summarize the features of STP/HAMPI that make them particularly suited for...

    Provided By Cornell University

  • White Papers // Aug 2012

    Inferring SQL Queries Using Program Synthesis

    Developing high-performance applications that interact with databases is a difficult task, as developers need to understand both the details of the language in which their applications are written in, and also the intricacies of the relational model. One popular solution to this problem is the use of Object-Relational Mapping (ORM)...

    Provided By Cornell University

  • White Papers // Jul 2012

    A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems

    Cyber-Physical Systems (CPSs) involve the interconnection of heterogeneous computing devices which are closely integrated with the physical processes under control. Often, these systems are resource-constrained and require specific features such as the ability to adapt in a timeliness and efficient fashion to dynamic environments. Also, they must support fault tolerance...

    Provided By Cornell University

  • White Papers // Aug 2012

    On the Sum Rate of a 2 X 2 Interference Network

    The authors consider the 2 X 2 interference network with 6 possible messages, of which the 2 X 2 interference channel and X channel are special cases obtained by using only 2 and 4 messages respectively. Starting from an achievable rate region similar to the Han-Kobayashi region, they obtain an...

    Provided By Cornell University