George Mason University

Displaying 121-130 of 130 results

  • White Papers // Jan 2009

    Scheduling Weighted Packets With Deadlines Over a Fading Channel

    This paper considers scheduling weighted packets with time constraints over a fading channel. Packets arrive at the transmitter in an online manner. Each packet has a value and a hard deadline by which it should be sent. The fade state of the channel determines the throughput obtained per unit of...

    Provided By George Mason University

  • White Papers // Jan 2009

    Controlled Epidemic Routing for Multicasting in Delay Tolerant Networks

    Delay Tolerant Networks (DTNs) are a class of networks that experience frequent and long-duration partitions due to sparse distribution of nodes. DTN multicasting is a desirable feature for applications where some form of group communication is needed. The topological impairments experienced within a DTN pose unique challenges for designing effective...

    Provided By George Mason University

  • White Papers // Jan 2009

    A Simulation Study of Common Mobility Models for Opportunistic Networks

    Understanding mobility characteristics is important for the design and analysis of routing schemes for Mobile Ad hoc NETworks (MANETs). This is especially true for mobile opportunistic networks where node mobility is utilized to achieve message delivery. In this paper, the authors study the properties of common mobility models. Specifically, they...

    Provided By George Mason University

  • White Papers // Jan 2009

    Analysis of Core-Assisted Routing in Opportunistic Networks

    Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share information. As with all DTN environments ONs experience frequent and large delays, and an end-to-end path from the source to destination may only exist for a brief...

    Provided By George Mason University

  • White Papers // Jan 2009

    The Impact of the Mobility Model on Delay Tolerant Networking Performance Analysis

    Delay Tolerant Networks (DTNs) are a class of networks that experience frequent and long-duration partitions due to sparse distribution of nodes. The topological impairments experienced within a DTN pose unique challenges for designing effective DTN routing protocols. For an important class of DTNs nodes depend on their mobility to carry...

    Provided By George Mason University

  • White Papers // Jan 2009

    Designing Quality of Service Based Multimedia Systems Using the Unified Modeling Language

    This paper addresses the usage of UML for requirement specification and design of multimedia systems. It shows how modular specifications of components used in QoS cognizant services increase their potential to reuse. It models common components such as negotiators, monitors, and resource managers using UML models enhanced with OCL constraints....

    Provided By George Mason University

  • White Papers // Nov 2007

    A Data Outsourcing Architecture Combining Cryptography and Access Control

    Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challenging issues in such a scenario are the enforcement of authorization policies and the support of policy updates. Since a common approach for protecting...

    Provided By George Mason University

  • White Papers // Dec 2006

    Development of Block-Cipher Library for Reconfigurable Computers

    Reconfigurable computing is gaining rising attention as an alternative to traditional processing for many applications. Data encryption and decryption is one of these applications, which can get tremendous speedup running on FPGAs instead of microprocessors. The authors have developed a block-cipher library that covers 15 most popular encryption algorithms, and...

    Provided By George Mason University

  • White Papers // Jul 2006

    Autonomic Virtualized Environments

    Virtualization was invented more than thirty years ago to allow large expensive mainframes to be easily shared among different application environments. As hardware prices went down, the need for virtualization faded away. More recently, virtualization at all levels (system, storage, and network) became important again as a way to improve...

    Provided By George Mason University

  • White Papers // Jun 2006

    An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc Networks

    In this paper, the authors first define the requirements on anonymity and security properties of the routing protocol in mobile ad hoc networks, and then propose a new anonymous routing protocol with the local-repair mechanism. Detailed analysis shows that their protocol achieves both anonymity and security properties defined. A major...

    Provided By George Mason University

  • White Papers // Nov 2007

    A Data Outsourcing Architecture Combining Cryptography and Access Control

    Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challenging issues in such a scenario are the enforcement of authorization policies and the support of policy updates. Since a common approach for protecting...

    Provided By George Mason University

  • White Papers // Apr 2013

    MOTAG: Moving Target Defense Against Internet Denial of Service Attacks

    Distributed Denial of Service (DDoS) attacks still pose a significant threat to critical infrastructure and Internet services alike. In this paper, the authors propose MOTAG, a moving target defense mechanism that secures service access for authenticated clients against flooding DDoS attacks. MOTAG employs a group of dynamic packet indirection proxies...

    Provided By George Mason University

  • White Papers // Jan 2014

    Accessing Big Data in the Cloud Using Mobile Devices

    The amount of data generated annually over the internet has exceeded the zeta-byte levels. Processing data with such high volume far exceeds the computational capabilities of today's datacenters and computers, giving rise to the term big data. The amount of data acquired, stored, and processed annually over the Internet has...

    Provided By George Mason University

  • White Papers // May 2010

    Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs

    Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an evaluation should be performed in order to make it fair, transparent, practical, and acceptable for the majority of the cryptographic community....

    Provided By George Mason University

  • White Papers // Jun 2006

    An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc Networks

    In this paper, the authors first define the requirements on anonymity and security properties of the routing protocol in mobile ad hoc networks, and then propose a new anonymous routing protocol with the local-repair mechanism. Detailed analysis shows that their protocol achieves both anonymity and security properties defined. A major...

    Provided By George Mason University

  • White Papers // Apr 2013

    IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime

    Securing hardware is the foundation for implementing a secure system. However, securing hardware devices remains an open research problem. In this paper, the authors present IOCheck, a framework to enhance the security of I/O devices at runtime. It leverages System Management Mode (SMM) to quickly check the integrity of I/O...

    Provided By George Mason University

  • White Papers // Dec 2006

    Development of Block-Cipher Library for Reconfigurable Computers

    Reconfigurable computing is gaining rising attention as an alternative to traditional processing for many applications. Data encryption and decryption is one of these applications, which can get tremendous speedup running on FPGAs instead of microprocessors. The authors have developed a block-cipher library that covers 15 most popular encryption algorithms, and...

    Provided By George Mason University

  • White Papers // Sep 2009

    Topological Vulnerability Analysis: A Powerful New Approach for Network Attack Prevention, Detection, and Response

    This paper examines issues and methods for survivability of systems under malicious penetrating attacks. To protect from such attacks, it is necessary to take steps to prevent them from succeeding. At the same time, it is important to recognize that not all attacks can be averted at the outset; those...

    Provided By George Mason University

  • White Papers // Apr 2010

    Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs

    The authors optimally place Intrusion Detection System (IDS) sensors and prioritize IDS alerts using attack graph analysis. They begin by predicting all possible ways of penetrating a network to reach critical assets. The set of all such paths through the network constitutes an attack graph, which they aggregate according to...

    Provided By George Mason University

  • White Papers // Apr 2010

    Proactive Intrusion Prevention and Response via Attack Graphs

    Network defense today is largely reactive rather than proactive, and lacks sufficient context for optimal countermeasures. Administrators and security analysts are overwhelmed by constant outside threats, complexity of security measures, and network growth. Today's status quo for network defense is often reduced to mere triage and after-the-fact remediation. This paper...

    Provided By George Mason University