IARIA

Displaying 1-40 of 1218 results

  • White Papers // Jan 2014

    Multi-Version Databases on Flash: Append Storage and Access Paths

    New storage technologies, such as flash and non-volatile memories, with fundamentally different properties are appearing. Leveraging their performance and endurance requires a redesign of existing architecture and algorithms in modern high performance databases. Multi-Version Concurrency Control (MVCC) approaches in database systems, maintain multiple time-stamped versions of a tuple. Once a...

    Provided By IARIA

  • White Papers // Jan 2014

    Easy Development of Web Applications using WebODRA2 and a Dedicated IDE

    The modern web requires new ways for creating applications. The authors present their approach combining a web framework with a modern object-oriented database and a dedicated Integrated Development Environment (IDE). It makes it easier to develop web applications by rising the level of abstraction. In contrast to many existing solutions,...

    Provided By IARIA

  • White Papers // Jan 2014

    A Diversified Set of Security Features for XMPP Communication Systems Useful in Cloud Computing Federation

    Now-a-days, in the panorama of cloud computing, finding a right compromise between interactivity and security is not trivial at all. Currently, most of cloud providers base their communication systems on the web service technology. The problem is that both cloud architectures and services have started as simple but they are...

    Provided By IARIA

  • White Papers // Jan 2014

    Security Considerations for Multicast Communication in Power Systems

    Information security is gaining increasingly more importance for real-time automation networks. Multicast communication is used widely especially on field and process level to cope with performance requirements and to ease the handling of communication peers as the destinations need not to be known by the sender. A security design must...

    Provided By IARIA

  • White Papers // Nov 2013

    Towards a Framework for Designing Secure Mobile Enterprise Applications

    Mobile devices like Smartphone's and tablets are not only designed for private use, but also for business use as well. Mobile solutions, such as mobile enterprise resource planning and mobile business intelligence, are now-a-days becoming more common. However, without strong consideration of security, especially in mobile devices, these solutions would...

    Provided By IARIA

  • White Papers // Nov 2013

    Integrated Technologies for Communication Security on Mobile Devices

    In this paper, the authors presented design decisions taken during the construction of a framework for cryptographically secure communication on Android devices. The early prototypes still have many challenges to be overtaken, as follows. The use of cryptosystems for short signatures, elliptic curve cryptography and pairings-based cryptography are some of...

    Provided By IARIA

  • White Papers // Oct 2013

    Kongdroid: A Proposal for a Cloud Service for Stress Testing on Android Applications

    In this paper, the authors propose a new and scalable service for stress testing on Android applications. This tool is available through cloud computing resources to support developers in their applications validation, aiming robustness, stability and compatibility, in different devices before commercial deployment. The solution focuses on the generation of...

    Provided By IARIA

  • White Papers // Oct 2013

    Commercialized Practical Network Service Applications From the Integration of Network Distribution and High-Speed Cipher Technologies in Cloud Environments

    In this paper, the authors present the evaluation results of the commercialization of High Security Disaster Recovery Technology (HS-DRT) that uses network distribution and high-speed strong cipher technologies to realize efficient and secure network services. They have commercialized a disaster recovery system and evaluated the performance of the distributed engines...

    Provided By IARIA

  • White Papers // Oct 2013

    Pricing the Cloud: An Adaptive Brokerage for Cloud Computing

    Using a multi-agent social simulation model to predict the behavior of cloud computing markets, Rogers & Cliff (R&C) demonstrated the existence of a profitable cloud brokerage capable of benefitting cloud providers and cloud consumers alike. Functionally similar to financial market brokers, the cloud broker matches provider supply with consumer demand....

    Provided By IARIA

  • White Papers // Oct 2013

    Towards a Smart City Security Model

    Even though concepts related to smart cities are well established and spread, those concepts are still very thin when related to Information Security. This paper will present some studies on smart cities, and will show that those studies are based on three macro concepts, system interoperability, applications and frameworks/platforms. Solutions...

    Provided By IARIA

  • White Papers // Oct 2013

    A Privacy-Enhanced User-Centric Identity and Access Management Based on Notary

    Identity and Access Management (IAM) systems aim to control of users' attributes for authentication, authorization and accountability processes. Public Key Certificates (PKCs), like the X.509 standard, use asymmetric key pairs to support digital signatures, authentication processes and to increase the trust in the communication. Nevertheless, the PKC does not concern...

    Provided By IARIA

  • White Papers // Sep 2013

    Novel Models and Architectures for Distributed Semantic Data Management

    Semantic data management refers to a range of techniques for the manipulation and usage of data based on its meaning and its rapid growth gives rise to the problems of building novel models and architectures for its distributed management allowing efficient query processing and reasoning. The first part of the...

    Provided By IARIA

  • White Papers // Sep 2013

    Key Performance Indicators for Cloud Computing SLAs

    Reducing IT costs by using cloud computing is tempting for many companies. As cloud rapidly is gaining momentum as alternative mean of providing IT resources, the need for regulated service qualities increases. To attract companies to outsource their services to clouds, providers need to offer service level objectives specified in...

    Provided By IARIA

  • White Papers // Sep 2013

    Exploiting Wiktionary for Lightweight Part-of-Speech Tagging for Machine Learning Tasks

    Part-of-speech (PoS) tagging is a crucial part in many natural language machine learning tasks. Current state-of-the-art PoS taggers exhibit excellent qualitative performance, but also contribute heavily to the total runtime of text preprocessing and feature generation, which makes feature engineering a time-consuming task. The authors propose a lightweight dictionary and...

    Provided By IARIA

  • White Papers // Sep 2013

    The Data Checking Engine: Monitoring Data Quality

    In the context of data warehousing and business intelligence, data quality is of utmost importance. However, many mid-size Data WareHouse (DWH) projects do not implement a proper data quality process due to huge up-front investments. However, assessing and monitoring data quality is necessary to establish confidence in the DWH data....

    Provided By IARIA

  • White Papers // Sep 2013

    Discovering and Linking Financial Data on the Web

    The constant publishing of large volumes of financial information by various business sector organizations through its financial statements is a fact that must be exploited by using semantic technologies. This paper describes the use of Linked Data to generate a financial dataset that is part of the ongoing work of...

    Provided By IARIA

  • White Papers // Aug 2013

    Advanced Metering and Data Access Infrastructures in Smart Grid Environments

    For securing the provision with electric energy in smart grids, the ascertainment of energy consumption and production is inevitable in order to be able to apply appropriate control algorithms. As energy management is a highly distributed task, a data network has to exist in parallel to the power network for...

    Provided By IARIA

  • White Papers // Aug 2013

    Challenges in Securing Wireless Sensor Networks

    Wireless sensor networks are highly prone to faults and errors due to their restrictive capabilities and limited resources. In this paper, some of the challenges facing the wireless sensor networks such as security, routing, computing capability, and battery power, will be discussed. The authors will focus on both security and...

    Provided By IARIA

  • White Papers // Aug 2013

    The Cloning Attack Vulnerability in WSN Key Management Schemes

    The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of...

    Provided By IARIA

  • White Papers // Aug 2013

    Proposed Middleware for Sensor Networks in Cyber-Physical System Environments

    This paper describes the modeling proposal of a middleware for sensor networks in Cyber-Physical (CP) environments adopting the reuse of Designs Patterns, which must favor the coupling in the underlying layers of the middleware and facilitate the communication between components in the upper layers. The authors' main goal is to...

    Provided By IARIA

  • White Papers // Aug 2013

    Fighting Spam by Breaking the Economy of Advertising by Unsolicited Emails

    Unsolicited email (spam) is still a problem for users of the email service. Even though current email anti-spam solutions filter most spam emails, some still are delivered to the inbox of users. A special class of spam emails advertises websites, e.g., online dating sites or online pharmacies. The success rate...

    Provided By IARIA

  • White Papers // Aug 2013

    Risk-Based Dynamic Access Control for a Highly Scalable Cloud Federation

    Cloud computing is already a successful paradigm for distributed computing and is still growing in popularity. However, many problems still linger in the application of this model and some new ideas are emerging to help leverage its features even further. One of these ideas is the cloud federation, which is...

    Provided By IARIA

  • White Papers // Aug 2013

    Policy-Aware Provisioning of Cloud Applications

    The automated provisioning of complex composite cloud applications is a major issue and of vital importance in cloud computing. It is key to enable cloud properties such as pay-as-you-go pricing, on-demand self-service, and elasticity. The functional aspects of provisioning such as instantiating virtual machines or installing software components are covered...

    Provided By IARIA

  • White Papers // Aug 2013

    XMPP Distributed Topology as a Potential Solution for Fog Computing

    Fog computing is potentially harmful towards existing cloud computing systems as well as big data structures. Lack of privacy and potentially unauthorized content distribution are some of many issues to solve. As a possible solution, the authors propose in the following paper the definition of a new network topology as...

    Provided By IARIA

  • White Papers // Aug 2013

    Estimation of Performance and Availability of Cloud Application Servers Through External Clients

    This paper investigates two aspects of the QoS offered by some cloud providers on the Internet, the availability and the dedicated capacity in terms of how well a user process is isolated from other users of the same application server instance. By using standard components and software utilities, a small...

    Provided By IARIA

  • White Papers // Aug 2013

    Robustness of Security-Oriented Binary Codes Under Non-Uniform Distribution of Codewords

    Robust and partially robust codes are used in cryptographic devices for detecting active side channel attacks on the hardware. The codes are usually designed for uniformly distributed code-words. In practice, however, there are code-words that are much more likely to appear than others. This paper addresses the question of how...

    Provided By IARIA

  • White Papers // Jul 2013

    A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents

    It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement...

    Provided By IARIA

  • White Papers // Jul 2013

    Protecting the Communication Structure in Sensor Networks

    In the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes exacerbates concerns about privacy and security. For example, Denial...

    Provided By IARIA

  • White Papers // Jul 2013

    Experiments in Collaborative Cloud-Based Distance Learning

    Mobile devices have revolutionary changed the process of multimedia consumption in distance learning systems and provide flexible user-oriented experience. M-learning systems typically include different kinds of multimedia resources helping learners to be more interactive and interested in collaboration. The proposed multi-tenancy group collaboration within the cloud-based learning platform (as a...

    Provided By IARIA

  • White Papers // Jul 2013

    A New Bio-Crypto System Approach to Enhance Security of 4G Mobile Networks

    In this paper, the authors examine the vulnerable security elements that MAC management messages in WiMAX initial network entry faces. The paper proposes an innovative hybrid approach to resolve such vulnerability problem and establish secret communication channels via insecure domains. The proposed protocol is based on bio-crypto systems and to...

    Provided By IARIA

  • White Papers // Jul 2013

    HMAC-Based RFID Authentication Protocol with Minimal Retrieval at Server

    In this paper, the authors propose a HMAC-based RFID mutual authentication protocol to improve performance at the back-end server. In existing hash-based protocols, the tag ID is a secret value for privacy, so the back-end server computes a lot of hash operations or modular operations to retrieve the tag ID....

    Provided By IARIA

  • White Papers // Jul 2013

    Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting

    Crime and feeling of security are pervasive occurrences and can be influenced by lighting conditions. However, lighting improvements are generally concentrated on street lighting. Meanwhile, a vast variety of new technologies, including innovative lighting systems and connected mobility, are entering into the automotive field. Hence, opportunities are not limited only...

    Provided By IARIA

  • White Papers // Jul 2013

    A Time-series Clustering Approach for Sybil Attack Detection in Vehicular Ad hoc Networks

    Sybil attack is a security threat wherein an attacker creates and uses multiple counterfeit identities risking trust and functionality of a peer-to-peer system. Sybil attack in vehicular ad hoc networks is an emergent threat to the services and security of the system. In the highly dynamic environment of vehicular ad...

    Provided By IARIA

  • White Papers // Jul 2013

    The Impact of Requirements on Software Quality Across Three Product Generations

    The authors presented data demonstrating the impact that a well-written and well-reviewed set of requirements had on software defects and other quality indicators between two generations of an Intel product. Quality indicators for the second software product all improved dramatically even with the increased complexity of the newer product. This...

    Provided By IARIA

  • White Papers // Jul 2013

    Detecting Pedestrian Flows on a Mobile Ad Hoc Network and Issues with Trends and Feasible Applications

    Due to the rapid development of mobile and ad hoc communication technology, research on extracting social contexts including the movement and density of pedestrians has also emerged in recent years. This paper explores methods to extract pedestrian flows in a distributive manner from Bluetooth detection logs. Bluetooth devices are widely...

    Provided By IARIA

  • White Papers // Jul 2013

    Maximizing Utilization in Private IaaS Clouds with Heterogenous Load Through Time Series Forecasting

    In this paper, the authors present ongoing work on creating a computing system that can run two types of workloads on a private cloud computing cluster, namely web servers and batch computing jobs, in a way that would maximize utilization of the computing infrastructure. To this end, a queue engine...

    Provided By IARIA

  • White Papers // Jul 2013

    Application of the Simulation Attack on Entanglement Swapping Based QKD and QSS Protocols

    The authors discuss the security of quantum key distribution protocols based on entanglement swapping against collective attacks. Therefore, they apply a generic version of a collective attack strategy on the most general entanglement swapping scenario used for key distribution. Further, they focus on basis transformations, which are the most common...

    Provided By IARIA

  • White Papers // Jul 2013

    Optimal Query Operator Materialization Strategy for Hybrid Databases

    Recent research shows that main memory database system provides many different advantages over traditional disk based systems. Furthermore it is shown that the way how data is persisted in such a system is very important. Modern systems provide a hybrid row- and column-oriented storage layer that proves to be optimal...

    Provided By IARIA

  • White Papers // Jul 2013

    Ensembles of Decision Trees for Network Intrusion Detection Systems

    The paper discusses intrusion detection systems built using ensemble approaches, i.e., by combining several machine learning algorithms. The main idea is to exploit the strengths of each algorithm of the ensemble to obtain a robust classifier. Network attacks can be divided into four classes: probe, remote to local, denial of...

    Provided By IARIA

  • White Papers // Jul 2013

    Towards Enhanced Usability of IT Security Mechanisms: How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

    Now-a-days, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the...

    Provided By IARIA

  • White Papers // Apr 2012

    Eruption of Policy in the Charging Arena

    In the early days of mobile Internet, bandwidth was not an issue, so price plans were quite simple, very often expressed in the form of a flat rate or "All you can eat" pricing. As long as capacity was greatly available, this was a convenient and simple way to define...

    Provided By IARIA

  • White Papers // Jan 2013

    Securing Access to Data in Business Intelligence Domains

    On-Line Analytical Processing (OLAP) has become an increasingly important and prevalent component of Decision Support Systems. OLAP is associated with a data model known as a cube, a multi-dimensional representation of the core measures and relationships within the associated organization. While numerous cube generation and processing algorithms have been presented...

    Provided By IARIA

  • White Papers // Jan 2013

    Verification with AVISPA to Engineer Network Security Protocols

    This paper summarizes work on formal mechanized verification of security protocols using Avispa, a model checker dedicated to security protocols. Avispa has been successfully used in various Master's projects. In this paper, the authors present two outstanding projects of quite different nature that highlight the spectrum of formal security protocol...

    Provided By IARIA

  • White Papers // Jan 2013

    Mitigating Distributed Service Flooding Attacks with Guided Tour Puzzles

    Various cryptographic puzzle schemes have been proposed as defenses against Denial of Service (DoS) attacks. However, these schemes have two common shortcomings that diminish their effectiveness as a DoS mitigation solution. First, the DoS-resilience that these schemes provide is minimized when there is a large disparity between the computational power...

    Provided By IARIA

  • White Papers // Jan 2013

    A Distributed Hash Table Assisted Intrusion Prevention System

    Using collaborative intrusion detection to sense network intrusions comes at a price of handling an enormous amount of data generated by detection probes, and the problem of properly correlating the evidence collected at different parts of the network. The correlation between the recorded events has to be revealed, as it...

    Provided By IARIA

  • White Papers // Apr 2012

    Preventing Protocol Switching Covert Channels

    Network covert channels enable a policy-breaking network communication (e.g., within botnets). Within the last years, new covert channel techniques arose which are based on the capability of protocol switching. Such protocol switching covert channels operate within overlay networks and can (as a special case) contain their own internal control protocols....

    Provided By IARIA

  • White Papers // Apr 2012

    CincoSecurity: Automating the Security of Java EE Applications with Fine-Grained Roles and Security Profiles

    Almost every software system must include a security module to authenticate users and to authorize what elements of the system can be accessed by each user. This paper describes a security model called \"Cinco-Security\" that follows the Role Based Access Control model (RBAC), but implementing fine-grained roles that can be...

    Provided By IARIA

  • White Papers // Apr 2012

    Advancement Towards Secure Authentication in the Session Initiation Protocol

    The digest access authentication method used in the voice over IP signaling protocol, SIP, is weak. This authentication method is the only method with mandatory support and widespread adoption in the industry. At the same time, this authentication method is vulnerable to a serious real-world attack. This poses a threat...

    Provided By IARIA

  • White Papers // Jul 2012

    Advances in Protecting Remote Component Authentication

    Component authentication allows verifying the originality of various components being part of a machine or a system, or being connected to control equipment. Various technologies are available, ranging from holograms, hidden marks, and special inks to cryptography-based component authentication. Typical applied cryptography-based mechanisms employ a challenge-response-based component authentication mechanism. These...

    Provided By IARIA

  • White Papers // Jul 2012

    A Scalability Analysis of an Architecture for Countering Network-Centric Insider Threats

    Dealing with the insider threat in networked environments poses many challenges. Privileged users have great power over the systems they own in organizations. To mitigate the potential threat posed by insiders, the authors introduced in previous work a preliminary architecture for the Autonomic Violation Prevention System (AVPS), which is designed...

    Provided By IARIA

  • White Papers // Jun 2010

    A Distributed Identity Handling Approach Enriched with Identity Semantics

    People rely on many forms of identities to access offline and online services. The inconvenience of possessing and using identities creates significant security vulnerability. This paper proposes an identity handling mechanism enriched with identity semantics which is believed to ease and secure identity usage. In this regard, user's identities are...

    Provided By IARIA

  • White Papers // Aug 2013

    Advanced Metering and Data Access Infrastructures in Smart Grid Environments

    For securing the provision with electric energy in smart grids, the ascertainment of energy consumption and production is inevitable in order to be able to apply appropriate control algorithms. As energy management is a highly distributed task, a data network has to exist in parallel to the power network for...

    Provided By IARIA

  • White Papers // Aug 2013

    Challenges in Securing Wireless Sensor Networks

    Wireless sensor networks are highly prone to faults and errors due to their restrictive capabilities and limited resources. In this paper, some of the challenges facing the wireless sensor networks such as security, routing, computing capability, and battery power, will be discussed. The authors will focus on both security and...

    Provided By IARIA

  • White Papers // Aug 2013

    The Cloning Attack Vulnerability in WSN Key Management Schemes

    The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of...

    Provided By IARIA

  • White Papers // Aug 2013

    Proposed Middleware for Sensor Networks in Cyber-Physical System Environments

    This paper describes the modeling proposal of a middleware for sensor networks in Cyber-Physical (CP) environments adopting the reuse of Designs Patterns, which must favor the coupling in the underlying layers of the middleware and facilitate the communication between components in the upper layers. The authors' main goal is to...

    Provided By IARIA

  • White Papers // Aug 2012

    Sensor Based Risk Assessment for the Supply of Dangerous Products

    As a consequence of globalization, supply chain systems recently evolved toward a dynamic network of firms and industries. This complexification of supply chain processes raises several challenges in particular with respect to compliance to regulations (e.g., safety, security). With the multiplication of intermediate actors, a single non-compliant actor might jeopardize...

    Provided By IARIA

  • White Papers // Aug 2012

    Linking Sensor Data to a Cloud-based Storage Server Using a Smartphone Bridge

    There is a need for systems that unify the processes of collecting, storing and analyzing long-term sensor data in multi-user contexts. The ubiquity and communication features of Smartphone make them suitable as data aggregation platforms for standalone sensors. Cloud-based servers are advantageous for their centralization and scalability in the storage...

    Provided By IARIA

  • White Papers // Aug 2012

    Towards Intelligent Sensor Evolution: A Holonic-Based System Architecture

    Rapid developments of smart sensor technologies envisage a new era where information handling and knowledge sharing will play a crucial role. Traditional sensors were conceived as simple hardware transducers of physical quantities into measurable signals, eventually requiring an analogue/digital conversion to make data available for software applications. IEEE-1451 family of...

    Provided By IARIA

  • White Papers // Aug 2012

    Cluster-based Energy-efficient Composite Event Detection for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs), well known communicating architectures today, are often used to detect the occurrence of some environmental events, such as pollution monitoring, forest fires detection, location and tracking, etc. In order to reduce irrelevant alarms, multiple attributes are used in the event detection process. In WSNs, communication is...

    Provided By IARIA

  • White Papers // Aug 2012

    Solving Hidden Terminal Problem in Cognitive Networks Using Cloud Technologies

    Hidden terminal problem is one of the well-known problems when a node is visible from the access point but cannot communicate through it. The problem occurs in ad hoc networks as well as cognitive networks. The clear solution is not discussed in cognitive networks. In this paper, the authors proposed...

    Provided By IARIA

  • White Papers // Aug 2012

    Distributed Compromised Nodes Detection Scheme at First Stage for SurvSec Security Architecture

    SurvSec is a novel security architecture for reliable network recovery from base station BS failure of surveillance wireless sensor network WSN in hostile environment. Compromised nodes detection is a very important security mechanism in surveillance WSN to detect compromised nodes before they destroy the security of the WSN. Node compromise...

    Provided By IARIA

  • White Papers // Oct 2012

    Oracle NoSQL Database - Scalable, Transactional Key-Value Store

    Oracle NoSQL Database is a highly scalable, highly available key-value database, designed to address the low latency data access needs of the \"Big data\" space. Among its unique features, Oracle NoSQL Database provides major and minor keys, flexible durability and consistency policies, and integration with both MapReduce infrastructure and conventional...

    Provided By IARIA

  • White Papers // Oct 2011

    Intrusion Detection with Symbolic Model Verifier

    The intrusion field was introduced by the researcher. It was defined as an attempt or a threat to be the potential possibility of a deliberate unauthorized attempt to access information, manipulate information, or render a system unreliable or unusable. Many intrusions came from internal users. This behavior can cause damage...

    Provided By IARIA

  • White Papers // Jul 2011

    Nontechnical SPAM Detection Paradigm in Unified Communications Systems

    The recognition and filtering out of unwanted messages in technical communications media presents an ever more difficult challenge. The best-known of these problems is with ubiquitous e-mail. Most email sent is unwanted spams. In order to protect the recipient the most diverse applications must be used. Longer observations have shown...

    Provided By IARIA

  • White Papers // Jul 2011

    The Impact of Corporate Culture in Security Policies - A Methodologya

    Despite security policies, standards, awareness strategies and tools currently in place, employees are still being involved in risky a behavior that jeopardizes businesses. Meanwhile, although security policies are the cornerstone of well-designed security strategies, recent studies have demonstrated poor adherence or even negligence in accordance with the rules security policies...

    Provided By IARIA

  • White Papers // Jul 2011

    A Performance Analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines

    Recently, there has been shift to multi-core processors and consequently multithreaded application design. Multithreaded Network Intrusion Detection and Prevention Systems (NIDPS) are now being considered. Suricata is a multithreaded open source NIDPS, being developed via the Open Information Security Forum (OISF). It is increasing in popularity, as it free to...

    Provided By IARIA

  • White Papers // Jun 2013

    Signature Generation Based on Executable Parts in Suspicious Packets

    Generally, attackers obtain the control authority of a remote host through the exploit/worm codes with some executable parts. The majority of the codes are still made of the codes which can be executed directly by CPU of the remote host without some decryptions. The authors focused on the fact that...

    Provided By IARIA

  • White Papers // Jan 2012

    Identifying Potentially Useful Email Header Features for Email Spam Filtering

    Email spam continues to be a major problem in the Internet. With the spread of malware combined with the power of botnets, spammers are now able to launch large scale spam campaigns causing major traffic increase and leading to enormous economical loss. In this paper, the authors identify potentially useful...

    Provided By IARIA

  • White Papers // Aug 2012

    A Data Centric Security Cycle Model for Data Loss Prevention of Custodial Data and Company Intellectual Property

    Review of data breach trends in the last five years reveal that data at rest, in use, and in motion, inside and over the extended network, is being increasingly affected. While organizations primarily focus on protecting sensitive customer financial information, the protection of custodial data and company secrets has been...

    Provided By IARIA

  • White Papers // Jul 2011

    Online Banking Fraud Detection Based on Local and Global Behavior

    In this paper, the authors present a fraud detection system proposed for online banking that is based on local and global observations of users' behavior. Differential analysis is used to obtain local evidence of fraud where a significant deviation from normal behavior indicates a potential fraud. This evidence is strengthened...

    Provided By IARIA

  • White Papers // Jul 2011

    Storage QoS Aspects in Distributed Virtualized Environments

    Storage performance of a single virtual machine in a cloud computing environment may be affected by other machines using the same physical storage. At the same time, user requirements concerning quality of service continue to increase, which brings new challenges for virtualized environments. In this paper the authors present the...

    Provided By IARIA

  • White Papers // Jan 2014

    Multi-Version Databases on Flash: Append Storage and Access Paths

    New storage technologies, such as flash and non-volatile memories, with fundamentally different properties are appearing. Leveraging their performance and endurance requires a redesign of existing architecture and algorithms in modern high performance databases. Multi-Version Concurrency Control (MVCC) approaches in database systems, maintain multiple time-stamped versions of a tuple. Once a...

    Provided By IARIA

  • White Papers // Apr 2012

    Using Statistical Information for Efficient Design and Evaluation of Hybrid XML Storage

    Modern relational database management systems provide hybrid XML storage, combining relational and native technologies. Hybrid storage offers many design alternatives for XML data. In this paper the authors explore how to aid the user in effective design of hybrid storage. In particular they investigate how the XML schema and statistical...

    Provided By IARIA

  • White Papers // Apr 2011

    Prioritized Redundancy of Data Storage in Wireless Sensor Networks

    Wireless sensor networks have evolved into complex deployments, where their nodes can have a full network protocol stack, database systems, etc. The main rationed resource in such a deployment is energy. Having power usage tightly managed ensures a long operational life for the node in cases where replenishments (either via...

    Provided By IARIA

  • White Papers // Mar 2013

    Resource-Efficient Management Scheme of Sensor Data

    In this paper, the authors propose a resource-efficient management scheme of sensor data for building energy saving. To manage buildings, they collect data from the variety of sensors in buildings able to recognize illumination, motion, temperature, humidity and so on. They analyze this data and derive energy saving measures from...

    Provided By IARIA

  • White Papers // Nov 2011

    Modular P2P-Based Approach for RDF Data Storage and Retrieval

    One of the key elements of the semantic web is the Resource Description Framework (RDF). Efficient storage and retrieval of RDF data in large scale settings is still challenging and existing solutions are monolithic and thus not very flexible from a software engineering point of view. In this paper, the...

    Provided By IARIA

  • White Papers // Sep 2013

    Novel Models and Architectures for Distributed Semantic Data Management

    Semantic data management refers to a range of techniques for the manipulation and usage of data based on its meaning and its rapid growth gives rise to the problems of building novel models and architectures for its distributed management allowing efficient query processing and reasoning. The first part of the...

    Provided By IARIA

  • White Papers // Nov 2011

    ZeDDS - Fault-Tolerant Data Management in Wireless Sensor Networks with Mobile Users

    In application scenarios where sensor data is temporarily stored within the WSN - instead of transferring the data directly to a base station - data availability is an important factor. Ubiquitous Wireless Sensor Networks (WSNs) consist of sensor nodes which may communicate with each other via unreliable communication links. Furthermore,...

    Provided By IARIA

  • White Papers // May 2013

    Transparent Access on Encrypted Data Distributed over Multiple Cloud Infrastructures

    Using cloud infrastructures to store and backup data is becoming a popular alternative that guarantees performance and scalability at reasonable prices. However, standard cloud solutions could raise some concerns about data confidentiality and dependency on a single provider. The authors aim to address these issues by using cloud storage of...

    Provided By IARIA

  • White Papers // Jan 2014

    Easy Development of Web Applications using WebODRA2 and a Dedicated IDE

    The modern web requires new ways for creating applications. The authors present their approach combining a web framework with a modern object-oriented database and a dedicated Integrated Development Environment (IDE). It makes it easier to develop web applications by rising the level of abstraction. In contrast to many existing solutions,...

    Provided By IARIA