Florida Atlantic University

Displaying 1-40 of 40 results

  • White Papers // Nov 2012

    Adding Security to BPEL Workflows of Web Services

    BPEL (Business Process Enterprise Language) is a language for web services composition and several implementations of it exist. For BPEL to be effective, it is necessary that it provides more support for security. BPEL doesn't present any means to specify security constraints for workflows. BPEL through its activities tries to...

    Provided By Florida Atlantic University

  • White Papers // Aug 2012

    Scalable Deniable Group Key Establishment

    To simplify the design process for a group key establishment protocol, it can be convenient to restrict first to a scenario with a passive adversary, where the problem of authenticating protocol participants does not need to be addressed. The popular Katz-Yung compiler from CRYPTO 2003 can be used to transform...

    Provided By Florida Atlantic University

  • White Papers // Jun 2012

    Introduction to the Special Issue on Recent Advances in Web Services

    Web services first appeared around the year 2000 in an effort to improve interoperability between applications, and both IBM and Microsoft adopted them as part of their main strategic objectives. The authors have collected five papers describing different aspects of web services and cloud computing. Cloud computing is the next...

    Provided By Florida Atlantic University

  • White Papers // Apr 2012

    A Survey of Patterns for Web Services Security and Reliability Standards

    An important aspect for the acceptance of Service-Oriented Architectures is having convenient ways to help designers build secure applications. Numerous standards define ways to apply security in web services. However, these standards are rather complex and sometimes overlap, which makes them hard to use and may produce inconsistencies. Representing them...

    Provided By Florida Atlantic University

  • White Papers // Jan 2011

    Mobility Control With Local Views of Neighborhood in Mobile Networks

    Recent work in mobile ad hoc networks, simply MANETs, has drawn attention to the mobility capability of each node. It is proved that the optimal positions of the relay nodes along a single active flow must lie entirely on the line between the source and destination with each node spaced...

    Provided By Florida Atlantic University

  • White Papers // Jan 2011

    Energy-Efficient Data Gathering in Heterogeneous Wireless Sensor Networks

    This paper considers a heterogeneous wireless sensor network consisting in several resource-rich supernodes used for data relaying and a large number of energy constrained wireless sensor nodes. Sensor nodes are deployed randomly to monitor a number of targets. Since targets are redundantly covered by more sensors, in order to conserve...

    Provided By Florida Atlantic University

  • White Papers // Jan 2011

    New Approaches to Encryption and Steganography for Digital Videos

    In this paper, the authors propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. They also present an extended classification of digital video encryption algorithms in order to clarify these advantages. They analyze both security and performance aspects of...

    Provided By Florida Atlantic University

  • White Papers // Jan 2011

    Cryptanalysis of the Block Cipher Based on the Hopfield Neural Network

    A Hopfield neural network exhibits the phenomenon of stochastic error in convergence. Based on this non-determinism, Guo-Cheng-Cheng proposed a symmetric block cipher. Cryptanalysis of this cryptosystem led to an interesting mathematical problem - given two matrices that are conjugate of each other by a permutation matrix, find such permutation matrix....

    Provided By Florida Atlantic University

  • White Papers // Oct 2010

    Model-Driven Application and Validation of Security Patterns

    The spread of software services through the Internet has increased the importance of software security. Security patterns is a tool that helps developers, architects and security specialists utilize security experts' knowledge and standardize how they respond to security threats. Security patterns contain recurring solutions about security problems. However, there is...

    Provided By Florida Atlantic University

  • White Papers // May 2010

    Side-channel Analysis of Six SHA-3 Candidates

    Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further research in collision attacks seemingly in vain. In this paper, the authors show that the principles of collision attacks can be adapted to efficiently...

    Provided By Florida Atlantic University

  • White Papers // Mar 2010

    An IP-Based Live Database Approach to Surveillance Application Development

    With the proliferation of inexpensive cameras, video surveillance applications are becoming ubiquitous in many domains such as public safety and security, manufacturing, intelligent transportation systems, and healthcare. IP-based video surveillance technologies, in particular, are able to bring traditional video surveillance centers to virtually any computer at any location with an...

    Provided By Florida Atlantic University

  • White Papers // Jan 2010

    Digital Signature with Hashing and XML Signature Patterns

    Data security has become one of the most important concerns for organizations. Information is a valuable asset and needs to be protected. One important countermeasure against attackers is the use of digital signatures. Digital signatures provides message authentication and may also provide message integrity. The authors present here two patterns:...

    Provided By Florida Atlantic University

  • White Papers // Jan 2010

    Routing Techniques in Wireless Ad Hoc Networks - Classication and Comparison

    Routing (and forwarding) is a core problem in networks for delivering data from one node to another. Today wireless networks are becoming popular because of their "3 Anys" - Any person, Anywhere and Any time. Wireless ad hoc networks are termed as mobile distributed multihop wireless networks without predetermined topology...

    Provided By Florida Atlantic University

  • White Papers // Dec 2009

    System Level Power Management for Embedded RTOS: An Object Oriented Approach

    Power management systems for embedded devices can be developed in Real-Time Operating System (RTOS) or in applications. If power management policies are applied in Operating System (OS), then designers and developers will not have to worry about complex power management algorithms and techniques. They can rather concentrate on application development....

    Provided By Florida Atlantic University

  • White Papers // Sep 2009

    Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson

    At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly adversarial) disruption of communication. The authors show that this resynchronization process does not provide the functionality intended and in fact enables an...

    Provided By Florida Atlantic University

  • White Papers // Sep 2009

    The Emergence Of Shared Leadership From Organizational Dimensions Of Local Government

    Shared leadership is a mutually shared process by those who share vision, information, feedback, leadership responsibility, and public policy problems with members in public organizations. This paper examines the effects of organizational structure, culture, and context on shared leadership from a public sector perspective. Completed mail surveys were received from...

    Provided By Florida Atlantic University

  • White Papers // Sep 2009

    System-Level Modeling of a Network-on-Chip

    This paper presents the system-level modeling and simulation of a concurrent architecture for a customizable and scalable Network-on-Chip (NoC), using system level tools (Mission Level Designer (MLD)). MLD supports the integration of heterogeneous models of computation, which provide a framework to model various algorithms and activities, while accounting for and...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Symmetric Encryption and XML Encryption Patterns

    Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How one can protect this information from unauthorized access? Encryption provides confidentiality by protecting sensitive information from being read by intruders. This paper presents two patterns: a Symmetric...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks

    The authors' work provides a practical routing to improve the quality and performance of communication in WASN applications. A localized model, SR, is provided to describe the impact of interferences as other factors that incur local minima blocking the transmission in dynamic networks. The SR information provides a certainty of...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Erasure-Coding Based Utility Routing in Multi-Hop Wireless Networks

    Recently, erasure coding has become widely used to compensate for the low packet delivery ratio of multi-hop wireless networks. Most existing works assume that the number of redundant erasure-coded packets is unlimited for a message. In this paper, the authors relax this assumption and integrate the packet quantity into a...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) usually contain sparse or even empty regions called holes. The local optimum problem will occur when routing packets meet holes in the network. This paper proposes a novel Hole-Reshaping Routing protocol (HRR) in large-scale MANETs. It effectively solves the hole problem by regularizing a hole with...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Cooperative Anonymity Authentication in Vehicular Networks

    Data privacy in Vehicular Ad hoc NETworks(VANET) is a practical issue currently under the research and development. Privacy preserving anonymity authentication in network is a challenging topic combining anonymity, authentication, data privacy and network. Existing anonymity authentication in VANET are based on k-anonymity model, but K-anonymity model group selection may...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Message Forwarding in Cyclic MobiSpace: The Multi-Copy Case

    A key challenge of message forwarding in Delay Tolerant Networks (DTNs) is to increase delivery rate and decrease delay and cost. When information for future connectivity is not available, opportunistic routing is preferred in DTNs in which messages are forwarded opportunistic/non-deterministically to nodes with higher delivery probabilities. Many real objects...

    Provided By Florida Atlantic University

  • White Papers // Jun 2009

    Target Tracking With Monitor and Backup Sensors in Wireless Sensor Networks

    This paper proposes Target Tracking with Monitor and Backup sensors in wireless sensor networks (TTMB) to increase the energy efficiency of the network and decrease the target capturing time while considering the effect of a target's variable velocity and direction. The approach is based on a face routing and prediction...

    Provided By Florida Atlantic University

  • White Papers // Jun 2009

    Herd-Based Target Tracking Protocol in Wireless Sensor Networks

    Target tracking is a killer application in Wireless Sensor Networks (WSNs). Energy efficiency is one of the most important design goals for target tracking. This paper proposes a Herd-based Target Tracking Protocol (HTTP) with the notions of node state transition and herd-based node group for target tracking. A sensor node...

    Provided By Florida Atlantic University

  • White Papers // Jun 2009

    LocalCom: A Community-Based Epidemic Forwarding Scheme in Disruption-Tolerant Networks

    In Disruption-Tolerant Networks (DTNs), network topology constantly changes and end-to-end paths can hardly be sustained. However, social network properties are observed in many DTNs and tend to be stable over time. To utilize the social network properties to facilitate packet forwarding, the authors present LocalCom, a community-based epidemic forwarding scheme...

    Provided By Florida Atlantic University

  • White Papers // May 2009

    Moral Hazard And Capital Requirements In A Lending Model Of Credit Denial

    In this paper, the authors analyze a repeated game in which an intermediary offers unsecured loans to entrepreneurs using future credit denial to induce repayment. To finance the loans, the intermediary uses a combination of equity capital and external funds. They focus on a moral hazard problem that emerges between...

    Provided By Florida Atlantic University

  • White Papers // Apr 2009

    Achieving Efficiency and Fairness for Association Control in Vehicular Networks

    Deploying city-wide 802.11 access points has made possible internet access in a vehicle; nevertheless it is challenging to maintain client performance at vehicular speed especially when multiple mobile users exist. This paper considers the association control problem for vehicular networks in drive thru Internet scenarios. In particular, the authors aim...

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    Efficient Broadcasting Using Network Coding and Directional Antennas in MANETs

    This paper considers the issue of efficient broadcasting in Mobile Ad hoc NETworks (MANETs) using network coding and directional antennas. Network coding-based broadcasting focuses on reducing the number of transmissions each forwarding node performs in the multiple source/multiple message broadcast application, where each forwarding node combines some of the received...

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    FRAME: An Innovative Incentive Scheme in Vehicular Networks

    Vehicular Ad hoc NETworks (VANETs) are envisioned to provide promising applications and services. One critical deployment issue in VANETs is to motivate vehicles and their drivers to cooperate and contribute to packet forwarding in vehicle-to-vehicle or vehicle-to-roadside communication. This paper examines this problem, analyze the drawbacks of two straightforward schemes,...

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    Efficient Resource Discovery in Mobile Ad Hoc Networks

    The highly dynamic nature of infrastructureless ad-hoc networks poses new challenges during resource discovery. In this paper, the authors propose a novel algorithm for resource discovery in mobile ad hoc networks called Efficient Resource-Discovery (ERD). When proposing this novel algorithm, the primary goal is to spread the most relevant resources...

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    Efficient Adaptive Routing in Delay Tolerant Networks

    Conventional routing algorithms in Mobile Ad hoc NETworks (MANETs), i.e., multi-hop forwarding, assume the existence of contemporaneous source-destination paths and are not scalable to large networks. On the other hand, in Delay Tolerant Networks (DTNs), routing protocols use the mobility assisted, store-carry-forward paradigm which allows delivery among disconnected network components....

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    The Role Of Service Level Agreements In Relational Management Of Information Technology Outsourcing: An Empirical Study

    This study extends the view that formal contracts and relational governance function as complements rather than as substitutes. The authors investigate how specific characteristics of service level agreements (SLAs) impact relational governance in information technology outsourcing relationships. Eleven contractual elements (categorized into three SLA characteristics: foundation, change, and governance characteristics)...

    Provided By Florida Atlantic University

  • White Papers // Feb 2009

    Survey of Network on Chip (NoC) Architectures & Contributions

    Multiprocessor architectures and platforms have been introduced to extend the applicability of Moore's law. They depend on concurrency and synchronization in both software and hardware to enhance the design productivity and system performance. These platforms will also have to incorporate highly scalable, reusable, predictable, cost- and energy-efficient architectures. With the...

    Provided By Florida Atlantic University

  • White Papers // Feb 2009

    Multi-Authority Attribute Based Encryption With Honest-But-Curious Central Authority

    An attribute based encryption scheme capable of handling multiple authorities was recently proposed by Chase. The scheme is built upon a single-authority attribute based encryption scheme presented earlier by Sahai and Waters. Chase's construction uses a trusted central authority that is inherently capable of decrypting arbitrary ciphertexts created within the...

    Provided By Florida Atlantic University

  • White Papers // Jan 2009

    A Survey on Cryptography Applied to Secure Mobile Ad Hoc Networks and Wireless Sensor Networks

    Some security research in Mobile Ad Hoc NETworks (MANETs) and Wireless Sensor Networks (WSNs) is very closely related to cryptography. There are numerous security routing protocols and key management schemes that have been designed based on cryptographic techniques, such as public key infrastructures and identity-based cryptography. In fact, some of...

    Provided By Florida Atlantic University

  • White Papers // Jan 2009

    Efficient Geometric Routing in Three Dimensional Ad Hoc Networks

    Efficient geometric routing algorithms have been studied extensively in two-dimensional ad hoc networks, or simply 2D networks. These algorithms are efficient and they have been proven to be the worst-case optimal, localized routing algorithms. However, few prior works have focused on efficient geometric routing in 3D networks due to the...

    Provided By Florida Atlantic University

  • White Papers // Jan 2009

    Opportunistic Routing Algebra and Its Applications

    Opportunistic Routing (OR) has received much attention as a new routing paradigm due to its efficient utilization of broadcasting and special diversity of the wireless medium. Although numerous OR algorithms and protocols have been proposed to apply to various environments and integrate with numerous techniques, as far as the authors...

    Provided By Florida Atlantic University

  • White Papers // Jan 2009

    Patterns for Application Firewalls

    Enterprise applications are typically implemented as web applications and may use web services. This provides a flexible architecture suitable for B2B communication but it may introduce new security threats. This paper discusses here an analysis pattern for an Application Firewall, intended to protect the applications from some of these threats....

    Provided By Florida Atlantic University

  • White Papers // Apr 2008

    A Concurrent Architectural Model for Communication Sub-System

    Multiprocessor architectures and platforms such as Multi-Processor System-on-Chip (MPSoC) recently introduced to extend the applicability of the Moore's law, depend upon concurrency and synchronization in both software and hardware to enhance design productivity and system performance. These platforms will have to incorporate highly scalable, reusable, predictable, cost and energy efficient...

    Provided By Florida Atlantic University

  • White Papers // Aug 2012

    Scalable Deniable Group Key Establishment

    To simplify the design process for a group key establishment protocol, it can be convenient to restrict first to a scenario with a passive adversary, where the problem of authenticating protocol participants does not need to be addressed. The popular Katz-Yung compiler from CRYPTO 2003 can be used to transform...

    Provided By Florida Atlantic University

  • White Papers // Jan 2009

    Patterns for Application Firewalls

    Enterprise applications are typically implemented as web applications and may use web services. This provides a flexible architecture suitable for B2B communication but it may introduce new security threats. This paper discusses here an analysis pattern for an Application Firewall, intended to protect the applications from some of these threats....

    Provided By Florida Atlantic University

  • White Papers // Mar 2010

    An IP-Based Live Database Approach to Surveillance Application Development

    With the proliferation of inexpensive cameras, video surveillance applications are becoming ubiquitous in many domains such as public safety and security, manufacturing, intelligent transportation systems, and healthcare. IP-based video surveillance technologies, in particular, are able to bring traditional video surveillance centers to virtually any computer at any location with an...

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    The Role Of Service Level Agreements In Relational Management Of Information Technology Outsourcing: An Empirical Study

    This study extends the view that formal contracts and relational governance function as complements rather than as substitutes. The authors investigate how specific characteristics of service level agreements (SLAs) impact relational governance in information technology outsourcing relationships. Eleven contractual elements (categorized into three SLA characteristics: foundation, change, and governance characteristics)...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Symmetric Encryption and XML Encryption Patterns

    Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How one can protect this information from unauthorized access? Encryption provides confidentiality by protecting sensitive information from being read by intruders. This paper presents two patterns: a Symmetric...

    Provided By Florida Atlantic University

  • White Papers // Jan 2010

    Routing Techniques in Wireless Ad Hoc Networks - Classication and Comparison

    Routing (and forwarding) is a core problem in networks for delivering data from one node to another. Today wireless networks are becoming popular because of their "3 Anys" - Any person, Anywhere and Any time. Wireless ad hoc networks are termed as mobile distributed multihop wireless networks without predetermined topology...

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    Efficient Resource Discovery in Mobile Ad Hoc Networks

    The highly dynamic nature of infrastructureless ad-hoc networks poses new challenges during resource discovery. In this paper, the authors propose a novel algorithm for resource discovery in mobile ad hoc networks called Efficient Resource-Discovery (ERD). When proposing this novel algorithm, the primary goal is to spread the most relevant resources...

    Provided By Florida Atlantic University

  • White Papers // Sep 2009

    The Emergence Of Shared Leadership From Organizational Dimensions Of Local Government

    Shared leadership is a mutually shared process by those who share vision, information, feedback, leadership responsibility, and public policy problems with members in public organizations. This paper examines the effects of organizational structure, culture, and context on shared leadership from a public sector perspective. Completed mail surveys were received from...

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    Efficient Broadcasting Using Network Coding and Directional Antennas in MANETs

    This paper considers the issue of efficient broadcasting in Mobile Ad hoc NETworks (MANETs) using network coding and directional antennas. Network coding-based broadcasting focuses on reducing the number of transmissions each forwarding node performs in the multiple source/multiple message broadcast application, where each forwarding node combines some of the received...

    Provided By Florida Atlantic University

  • White Papers // Jan 2009

    A Survey on Cryptography Applied to Secure Mobile Ad Hoc Networks and Wireless Sensor Networks

    Some security research in Mobile Ad Hoc NETworks (MANETs) and Wireless Sensor Networks (WSNs) is very closely related to cryptography. There are numerous security routing protocols and key management schemes that have been designed based on cryptographic techniques, such as public key infrastructures and identity-based cryptography. In fact, some of...

    Provided By Florida Atlantic University

  • White Papers // Jan 2009

    Opportunistic Routing Algebra and Its Applications

    Opportunistic Routing (OR) has received much attention as a new routing paradigm due to its efficient utilization of broadcasting and special diversity of the wireless medium. Although numerous OR algorithms and protocols have been proposed to apply to various environments and integrate with numerous techniques, as far as the authors...

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    Efficient Adaptive Routing in Delay Tolerant Networks

    Conventional routing algorithms in Mobile Ad hoc NETworks (MANETs), i.e., multi-hop forwarding, assume the existence of contemporaneous source-destination paths and are not scalable to large networks. On the other hand, in Delay Tolerant Networks (DTNs), routing protocols use the mobility assisted, store-carry-forward paradigm which allows delivery among disconnected network components....

    Provided By Florida Atlantic University

  • White Papers // Mar 2009

    FRAME: An Innovative Incentive Scheme in Vehicular Networks

    Vehicular Ad hoc NETworks (VANETs) are envisioned to provide promising applications and services. One critical deployment issue in VANETs is to motivate vehicles and their drivers to cooperate and contribute to packet forwarding in vehicle-to-vehicle or vehicle-to-roadside communication. This paper examines this problem, analyze the drawbacks of two straightforward schemes,...

    Provided By Florida Atlantic University

  • White Papers // Jun 2009

    Target Tracking With Monitor and Backup Sensors in Wireless Sensor Networks

    This paper proposes Target Tracking with Monitor and Backup sensors in wireless sensor networks (TTMB) to increase the energy efficiency of the network and decrease the target capturing time while considering the effect of a target's variable velocity and direction. The approach is based on a face routing and prediction...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Erasure-Coding Based Utility Routing in Multi-Hop Wireless Networks

    Recently, erasure coding has become widely used to compensate for the low packet delivery ratio of multi-hop wireless networks. Most existing works assume that the number of redundant erasure-coded packets is unlimited for a message. In this paper, the authors relax this assumption and integrate the packet quantity into a...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) usually contain sparse or even empty regions called holes. The local optimum problem will occur when routing packets meet holes in the network. This paper proposes a novel Hole-Reshaping Routing protocol (HRR) in large-scale MANETs. It effectively solves the hole problem by regularizing a hole with...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Cooperative Anonymity Authentication in Vehicular Networks

    Data privacy in Vehicular Ad hoc NETworks(VANET) is a practical issue currently under the research and development. Privacy preserving anonymity authentication in network is a challenging topic combining anonymity, authentication, data privacy and network. Existing anonymity authentication in VANET are based on k-anonymity model, but K-anonymity model group selection may...

    Provided By Florida Atlantic University

  • White Papers // Apr 2009

    Achieving Efficiency and Fairness for Association Control in Vehicular Networks

    Deploying city-wide 802.11 access points has made possible internet access in a vehicle; nevertheless it is challenging to maintain client performance at vehicular speed especially when multiple mobile users exist. This paper considers the association control problem for vehicular networks in drive thru Internet scenarios. In particular, the authors aim...

    Provided By Florida Atlantic University

  • White Papers // Jun 2009

    Herd-Based Target Tracking Protocol in Wireless Sensor Networks

    Target tracking is a killer application in Wireless Sensor Networks (WSNs). Energy efficiency is one of the most important design goals for target tracking. This paper proposes a Herd-based Target Tracking Protocol (HTTP) with the notions of node state transition and herd-based node group for target tracking. A sensor node...

    Provided By Florida Atlantic University

  • White Papers // Jan 2009

    Efficient Geometric Routing in Three Dimensional Ad Hoc Networks

    Efficient geometric routing algorithms have been studied extensively in two-dimensional ad hoc networks, or simply 2D networks. These algorithms are efficient and they have been proven to be the worst-case optimal, localized routing algorithms. However, few prior works have focused on efficient geometric routing in 3D networks due to the...

    Provided By Florida Atlantic University

  • White Papers // Jan 2011

    Mobility Control With Local Views of Neighborhood in Mobile Networks

    Recent work in mobile ad hoc networks, simply MANETs, has drawn attention to the mobility capability of each node. It is proved that the optimal positions of the relay nodes along a single active flow must lie entirely on the line between the source and destination with each node spaced...

    Provided By Florida Atlantic University

  • White Papers // Dec 2009

    System Level Power Management for Embedded RTOS: An Object Oriented Approach

    Power management systems for embedded devices can be developed in Real-Time Operating System (RTOS) or in applications. If power management policies are applied in Operating System (OS), then designers and developers will not have to worry about complex power management algorithms and techniques. They can rather concentrate on application development....

    Provided By Florida Atlantic University

  • White Papers // Sep 2009

    System-Level Modeling of a Network-on-Chip

    This paper presents the system-level modeling and simulation of a concurrent architecture for a customizable and scalable Network-on-Chip (NoC), using system level tools (Mission Level Designer (MLD)). MLD supports the integration of heterogeneous models of computation, which provide a framework to model various algorithms and activities, while accounting for and...

    Provided By Florida Atlantic University

  • White Papers // Sep 2009

    Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson

    At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly adversarial) disruption of communication. The authors show that this resynchronization process does not provide the functionality intended and in fact enables an...

    Provided By Florida Atlantic University

  • White Papers // Feb 2009

    Multi-Authority Attribute Based Encryption With Honest-But-Curious Central Authority

    An attribute based encryption scheme capable of handling multiple authorities was recently proposed by Chase. The scheme is built upon a single-authority attribute based encryption scheme presented earlier by Sahai and Waters. Chase's construction uses a trusted central authority that is inherently capable of decrypting arbitrary ciphertexts created within the...

    Provided By Florida Atlantic University

  • White Papers // Jun 2009

    LocalCom: A Community-Based Epidemic Forwarding Scheme in Disruption-Tolerant Networks

    In Disruption-Tolerant Networks (DTNs), network topology constantly changes and end-to-end paths can hardly be sustained. However, social network properties are observed in many DTNs and tend to be stable over time. To utilize the social network properties to facilitate packet forwarding, the authors present LocalCom, a community-based epidemic forwarding scheme...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    Message Forwarding in Cyclic MobiSpace: The Multi-Copy Case

    A key challenge of message forwarding in Delay Tolerant Networks (DTNs) is to increase delivery rate and decrease delay and cost. When information for future connectivity is not available, opportunistic routing is preferred in DTNs in which messages are forwarded opportunistic/non-deterministically to nodes with higher delivery probabilities. Many real objects...

    Provided By Florida Atlantic University

  • White Papers // Aug 2009

    SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks

    The authors' work provides a practical routing to improve the quality and performance of communication in WASN applications. A localized model, SR, is provided to describe the impact of interferences as other factors that incur local minima blocking the transmission in dynamic networks. The SR information provides a certainty of...

    Provided By Florida Atlantic University

  • White Papers // May 2009

    Moral Hazard And Capital Requirements In A Lending Model Of Credit Denial

    In this paper, the authors analyze a repeated game in which an intermediary offers unsecured loans to entrepreneurs using future credit denial to induce repayment. To finance the loans, the intermediary uses a combination of equity capital and external funds. They focus on a moral hazard problem that emerges between...

    Provided By Florida Atlantic University

  • White Papers // Jan 2011

    Energy-Efficient Data Gathering in Heterogeneous Wireless Sensor Networks

    This paper considers a heterogeneous wireless sensor network consisting in several resource-rich supernodes used for data relaying and a large number of energy constrained wireless sensor nodes. Sensor nodes are deployed randomly to monitor a number of targets. Since targets are redundantly covered by more sensors, in order to conserve...

    Provided By Florida Atlantic University

  • White Papers // Jan 2011

    New Approaches to Encryption and Steganography for Digital Videos

    In this paper, the authors propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. They also present an extended classification of digital video encryption algorithms in order to clarify these advantages. They analyze both security and performance aspects of...

    Provided By Florida Atlantic University

  • White Papers // Jan 2011

    Cryptanalysis of the Block Cipher Based on the Hopfield Neural Network

    A Hopfield neural network exhibits the phenomenon of stochastic error in convergence. Based on this non-determinism, Guo-Cheng-Cheng proposed a symmetric block cipher. Cryptanalysis of this cryptosystem led to an interesting mathematical problem - given two matrices that are conjugate of each other by a permutation matrix, find such permutation matrix....

    Provided By Florida Atlantic University

  • White Papers // Oct 2010

    Model-Driven Application and Validation of Security Patterns

    The spread of software services through the Internet has increased the importance of software security. Security patterns is a tool that helps developers, architects and security specialists utilize security experts' knowledge and standardize how they respond to security threats. Security patterns contain recurring solutions about security problems. However, there is...

    Provided By Florida Atlantic University

  • White Papers // Apr 2012

    A Survey of Patterns for Web Services Security and Reliability Standards

    An important aspect for the acceptance of Service-Oriented Architectures is having convenient ways to help designers build secure applications. Numerous standards define ways to apply security in web services. However, these standards are rather complex and sometimes overlap, which makes them hard to use and may produce inconsistencies. Representing them...

    Provided By Florida Atlantic University

  • White Papers // Jun 2012

    Introduction to the Special Issue on Recent Advances in Web Services

    Web services first appeared around the year 2000 in an effort to improve interoperability between applications, and both IBM and Microsoft adopted them as part of their main strategic objectives. The authors have collected five papers describing different aspects of web services and cloud computing. Cloud computing is the next...

    Provided By Florida Atlantic University

  • White Papers // Feb 2009

    Survey of Network on Chip (NoC) Architectures & Contributions

    Multiprocessor architectures and platforms have been introduced to extend the applicability of Moore's law. They depend on concurrency and synchronization in both software and hardware to enhance the design productivity and system performance. These platforms will also have to incorporate highly scalable, reusable, predictable, cost- and energy-efficient architectures. With the...

    Provided By Florida Atlantic University

  • White Papers // May 2010

    Side-channel Analysis of Six SHA-3 Candidates

    Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further research in collision attacks seemingly in vain. In this paper, the authors show that the principles of collision attacks can be adapted to efficiently...

    Provided By Florida Atlantic University

  • White Papers // Jan 2010

    Digital Signature with Hashing and XML Signature Patterns

    Data security has become one of the most important concerns for organizations. Information is a valuable asset and needs to be protected. One important countermeasure against attackers is the use of digital signatures. Digital signatures provides message authentication and may also provide message integrity. The authors present here two patterns:...

    Provided By Florida Atlantic University

  • White Papers // Apr 2008

    A Concurrent Architectural Model for Communication Sub-System

    Multiprocessor architectures and platforms such as Multi-Processor System-on-Chip (MPSoC) recently introduced to extend the applicability of the Moore's law, depend upon concurrency and synchronization in both software and hardware to enhance design productivity and system performance. These platforms will have to incorporate highly scalable, reusable, predictable, cost and energy efficient...

    Provided By Florida Atlantic University

  • White Papers // Nov 2012

    Adding Security to BPEL Workflows of Web Services

    BPEL (Business Process Enterprise Language) is a language for web services composition and several implementations of it exist. For BPEL to be effective, it is necessary that it provides more support for security. BPEL doesn't present any means to specify security constraints for workflows. BPEL through its activities tries to...

    Provided By Florida Atlantic University