IARIA

Displaying 161-200 of 1223 results

  • White Papers // Jan 2013

    A Validation Model of Data Input for Web Services

    Web services inherited many well-known security problems of web applications and brought new ones. Major data breaches today are consequences of bad input validation at the application level. This paper presents a way to implement an input validation model for web services which can be used to prevent cross-site scripting...

    Provided By IARIA

  • White Papers // Jan 2013

    WebODRA - A Web Framework for the Object-Oriented DBMS ODRA

    The modern web requires new ways for creating applications. The authors present their approach combining a web framework with a modern object-oriented database. It makes it easier to develop web applications by raising the level of abstraction. In contrast to many existing solutions, where the business logic is developed in...

    Provided By IARIA

  • White Papers // Jan 2013

    A Comparison of MapReduce and Parallel Database Management Systems

    Businesses have come to rely on their data warehouse as a key component in their information technology infrastructure. The costs of the architecture to support these environments are significant. Therefore, choosing the wrong architecture can be a very costly decision. However, considerable confusion exists in relation to MapReduce and parallel...

    Provided By IARIA

  • White Papers // Jan 2013

    Location-Aware Routing for Service-Oriented Opportunistic Computing

    Smartphones, tablets, netbooks and laptops are intensively used every day by a large part of the population. These devices which are equipped with Wi-Fi interfaces can form Disconnected Mobile Ad-hoc NETworks (DMANETs) dynamically. These networks may allow service providers, such as local authorities, to deliver new kinds of services in...

    Provided By IARIA

  • White Papers // Jan 2013

    Improving Fairness in QoS and QoE Domains for Adaptive Video Streaming

    In this paper, the authors present an enhancement to a category of Adaptive Video Streaming solutions aimed at improving both Quality of Service (QoS) and Quality of Experience (QoE). The specific solution used as baseline for the work is the Smooth Streaming framework from Microsoft. The presented enhancement relates to...

    Provided By IARIA

  • White Papers // Jan 2013

    NGS Workflow Optimization Using a Hybrid Cloud Infrastructure

    E-science applications involve great deal of data, to satisfy these processing requests, distributed computing paradigms, such as cluster, Grid, Virtual Grid, Cloud Computing, and Hybrid System are growing exponentially. Existing computing infrastructures, software system design, and use cases have to take into account the enormity in volume of requests, size...

    Provided By IARIA

  • White Papers // Jan 2013

    Managing Timing Implications of Security Aspects in Model-Driven Development of Real-Time Embedded Systems

    Considering security as an afterthought and adding security aspects to a system late in the development process has now been realized to be an inefficient and bad approach to security. The trend is to bring security considerations as early as possible in the design of systems. This is especially critical...

    Provided By IARIA

  • White Papers // Jan 2013

    Securing Access to Data in Business Intelligence Domains

    On-Line Analytical Processing (OLAP) has become an increasingly important and prevalent component of Decision Support Systems. OLAP is associated with a data model known as a cube, a multi-dimensional representation of the core measures and relationships within the associated organization. While numerous cube generation and processing algorithms have been presented...

    Provided By IARIA

  • White Papers // Jan 2013

    Verification with AVISPA to Engineer Network Security Protocols

    This paper summarizes work on formal mechanized verification of security protocols using Avispa, a model checker dedicated to security protocols. Avispa has been successfully used in various Master's projects. In this paper, the authors present two outstanding projects of quite different nature that highlight the spectrum of formal security protocol...

    Provided By IARIA

  • White Papers // Jan 2013

    Mitigating Distributed Service Flooding Attacks with Guided Tour Puzzles

    Various cryptographic puzzle schemes have been proposed as defenses against Denial of Service (DoS) attacks. However, these schemes have two common shortcomings that diminish their effectiveness as a DoS mitigation solution. First, the DoS-resilience that these schemes provide is minimized when there is a large disparity between the computational power...

    Provided By IARIA

  • White Papers // Jan 2013

    A Distributed Hash Table Assisted Intrusion Prevention System

    Using collaborative intrusion detection to sense network intrusions comes at a price of handling an enormous amount of data generated by detection probes, and the problem of properly correlating the evidence collected at different parts of the network. The correlation between the recorded events has to be revealed, as it...

    Provided By IARIA

  • White Papers // Jan 2013

    Enabling User Involvement in Trust Decision Making for Inter-Enterprise Collaborations

    Trust decisions on inter-enterprise collaborations involve a trustor's subjective evaluation of its willingness to participate in a specific collaboration, given the risks and incentives involved. The authors have built support for automating routine trust decisions based on a combination of risk, reputation and incentive information. To handle non-routine decisions, they...

    Provided By IARIA

  • White Papers // Nov 2012

    Supporting Time Planning Aligned With CMMI-DEV and PMBOK

    Software projects often fail, because they are not adequately managed. The establishment of effective and efficient project management practices especially with respect to time management still remains a key challenge to software organizations. Striving to address these needs, \"Best practice\" models, such as, the Capability Maturity Model Integration (CMMI) or...

    Provided By IARIA

  • White Papers // Nov 2012

    AgileKDD: An Agile Business Intelligence Process Model

    In a knowledge-based society, transforming data into information and knowledge to support the decision making process is a crucial success factor for all the organizations. In this paper, one mission of Software Engineering is to produce systems able to process large volumes of data, transform them into relevant knowledge and...

    Provided By IARIA

  • White Papers // Nov 2012

    Automated Test Code Generation Based on Formalized Natural Language Business Rules

    The paper addresses two fundamental problems in requirements engineering. First, the conflict between understandability for non-programmers and a semantically well founded representation of business rules. Second, the verification of productive code against business rules in requirements documents. As a solution, a language to specify business rules that are close to...

    Provided By IARIA

  • White Papers // Nov 2012

    Group Key Establishment Scheme Using Wireless Channel Status

    Broadcast-based wireless communication is vulnerable to sniffing and eavesdropping by adversaries. Hence, wireless network security mechanisms have relied on cryptographic algorithms to protect information and support confidentiality. The authors propose a group key establishment scheme for secure wireless multicast services without a key management center. The proposed scheme exploits wireless...

    Provided By IARIA

  • White Papers // Nov 2012

    User-Centric IT Security: How to Design Usable Security Mechanisms

    Now-a-days, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the...

    Provided By IARIA

  • White Papers // Nov 2012

    Software Architectural Drivers for Cloud Testing

    In this paper, the authors focus on the research issues that cloud computing imposes on software testing. For this purpose, cloud testing can be defined as a software testing method based on cloud computing technology. Software testing has been an important component within the development process. In order to face...

    Provided By IARIA

  • White Papers // Oct 2012

    A Framework for Migrating Traditional Web Applications Into Multi-Tenant SaaS

    Software-as-a-Service (SaaS) is emerging as a new model of delivering a software, where users utilize software over the internet as a hosted service rather than an installable product. Multi-tenancy is a core concept in SaaS. It is the principle of running a single instance of the software on a server...

    Provided By IARIA

  • White Papers // Oct 2012

    Cloud Applications Versus Web Applications: A Differential Study

    Cloud computing revolution started reshaping the entire ICT industry and adding new concepts; cloud application is one of these new concepts. This paper aims at differentiating between cloud applications and web applications and to position on the question \"What are the differences between cloud applications and web applications?\" The paper...

    Provided By IARIA

  • White Papers // Oct 2012

    Enabling Dynamical Use of Integrated Systems and Scientific Supercomputing Resources for Archaeological Information Systems

    This paper presents the results from combining Integrated Information and Computing System components with classification for the purpose of enabling multidisciplinary and dynamical use of information systems and supercomputing resources for Archaeological Information Systems. The essential base are a flexible collaboration framework, suitable long-term documentation, structuring and classification of objects,...

    Provided By IARIA

  • White Papers // Oct 2012

    User Involvement and Social Networking for Information System Development

    Since the beginning of Business Information System (BIS) development, the problem of end-user involvement in the system design and implementation has been discussed. For years, BISs for users have been changed into the systems constructed by end-users. The Web 2.0 technologies should strongly support this tendency. The paper aims to...

    Provided By IARIA

  • White Papers // Oct 2012

    Biometric Security Systems for Mobile Devices Based on Fingerprint Recognition Algorithm

    In this paper, the authors propose a selective attention algorithm which increases the reliability of biometrics security system based on fingerprint recognition. They compare the existing fingerprint recognition algorithms and test their own algorithm on fingerprints database which changes in the structure as a result of physical damage. They propose...

    Provided By IARIA

  • White Papers // Oct 2012

    Oracle NoSQL Database - Scalable, Transactional Key-Value Store

    Oracle NoSQL Database is a highly scalable, highly available key-value database, designed to address the low latency data access needs of the \"Big data\" space. Among its unique features, Oracle NoSQL Database provides major and minor keys, flexible durability and consistency policies, and integration with both MapReduce infrastructure and conventional...

    Provided By IARIA

  • White Papers // Sep 2012

    Optimization of Proxy Caches using Proxy Filters

    Web proxy caches are a widely used tool to reduce the network load by storing often needed web pages. Increasing amounts of data transferred require new intelligent caching strategies with smarter replacement algorithms to predict, which web documents will be requested most likely in the future. However, these algorithms are...

    Provided By IARIA

  • White Papers // Sep 2012

    Semantic Supply Chain Management

    The efficiencies of Supply Chain Management (SCM) are often impaired by inconsistent exchange and sharing of information semantics among supply chain partners. Small and medium enterprises formed into a supply chain are working in a multi-cultural and multilingual environment. The eBEST platform equips these enterprises and their associations with state-of-the-art...

    Provided By IARIA

  • White Papers // Sep 2012

    Towards an Agile E-Commerce

    Creating an agile e-commerce is still a challenging issue. The alignment between business and IT plays a key role as changing business demands must be implemented immediately. To avoid misunderstandings and to lead to a better business-IT alignment the authors provide an ontology model, describing enterprise objects and their relations....

    Provided By IARIA

  • White Papers // Sep 2012

    The Open Data Interface (ODI) Framework for Public Utilization of Big Data

    In the paper, the Open Data Interface (ODI) framework for public utilization of Big Data was suggested. Comparing to conventional Web based open APIs which provide restricted access to the internal database of large data companies, the ODI provides multi-level access of data in public domain, ranging from copying plain...

    Provided By IARIA

  • White Papers // Sep 2012

    Ontology-Guided Data Acquisition and Analysis: Using Ontologies for Advanced Statistical Analysis

    The authors present an ontology-based, domain independent data acquisition and preparation system, which is able to process arbitrarily structured data. The system is fully generic and customizes itself automatically at runtime based on a user-defined ontology. So it can be instantiated for any domain of application by defining an ontology...

    Provided By IARIA

  • White Papers // Sep 2012

    Structured Data and Source Code Analysis for Financial Fraud Investigations

    Financial fraud investigations are becoming increasingly complex. The volume of data continues to increase along with the volume and complexity of underlying source code logic. As the volume and complexity increase, so too does the importance of identifying techniques for reducing the data to manageable sizes and identifying fraudulent activity...

    Provided By IARIA

  • White Papers // Sep 2012

    An Architecture for Semantically Enriched Data Stream Mining

    Data Stream Mining (DSM) techniques can be used to extract knowledge from continuous data streams. In this paper, the authors present an approach providing a modelling and execution architecture for networks of DSM operators. It can be applied in resource-constrained environments, and provides capabilities for semantic enrichment of data streams....

    Provided By IARIA

  • White Papers // Sep 2012

    Evaluating Data Minability Through Compression - An Experimental Study

    The authors' goal is to show that compression can be used as a tool to evaluate the potential of a data set of producing interesting results in a data mining process. The basic idea that data that displays repetitive patterns or patterns that occur with a certain regularity will be...

    Provided By IARIA

  • White Papers // Sep 2012

    Analysis of Streaming Service Quality Using Data Analytics of Network Parameters

    Quality of multimedia streaming service depends on network parameters such as bandwidth, delay, jitter and packet loss rate. In order to effectively improve the Quality of Service (QoS), it is needed to know which parameter is dominant in deterioration of the service quality at the moment. In the paper, the...

    Provided By IARIA

  • White Papers // Sep 2012

    Characterization of Network Traffic Data: A Data Preprocessing and Data Mining Application

    Large amount of traffic data are transmitted during day-to-day operation of wide area networks. Due to the increment of diversity in network applications, its traffic features have substantially changed. Data complexity and its diversity have been rapidly expanding with the changing nature of network applications. In addition, bandwidth and speed...

    Provided By IARIA

  • White Papers // Sep 2012

    How to Find Important Users in a Web Community? Mining Similarity Graphs

    In this paper, the authors provide a useful tool to the web site owner for enhancing her/his marketing strategies and rise as consequence the click rates on her/his web site. Their approach addresses the following research questions: which users are important for the web community? Which users have similar interests?...

    Provided By IARIA

  • White Papers // Sep 2012

    Building OLAP Data Analytics by Storing Path-Enumeration Keys Into Sorted Sets of Key-Value Store Databases

    In this paper, a novel approach that allows the retrieval of OLAP analytics by means of storing multidimensional data in key-value databases is described and evaluated. The proposed mechanism relies on generated keys based on the path-enumeration model built upon a tree representation of a relational database. Each key represents...

    Provided By IARIA

  • White Papers // Sep 2012

    A QoS Monitoring Framework for Composite Web Services in the Cloud

    Due to the dynamic nature of the cloud, continuous monitoring of QoS requirements is necessary to manage the cloud computing environment and enforce service level agreements. In this paper, the authors propose a QoS monitoring framework for composite web services implemented using the BPEL process and deployed in the cloud...

    Provided By IARIA

  • White Papers // Sep 2012

    Fighting Botnets - A Systematic Approach

    The increasing impact of Internet in the global economy has transformed botnets into one of the most feared security threats for citizens, organizations and governments. Despite the significant efforts that have been made over the last years to understand this phenomenon and develop detection techniques and countermeasures, this continues to...

    Provided By IARIA

  • White Papers // Aug 2012

    Message Scheduling and Forwarding in Congested DTNs

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the...

    Provided By IARIA

  • White Papers // Aug 2012

    Design and Implementation of Cloud-Based Application for Cloud Provider System With SSL Accelerator and Content Redirection

    The requirement to handle large SSL connection for secure login access to applications residing in the virtual machine hosted in the cloud provider system has given rise to the need to restructure applications in the cloud utilizing the hardware load balancer or Secure Socket Layer (SSL) Accelerator. In this paper,...

    Provided By IARIA

  • White Papers // Sep 2011

    Putting Theory Into Practice: The Results of a Practical Implementation of the Secure Development Life Cycle

    Software engineering is defined as a discipline concerned with all aspects of software production from inception to the evolution of a system. It has often been referred to as the "Cradle-to-grave" approach to producing reliable, cost-efficient software delivered in a timely manner that satisfies the customer's needs. However, with the...

    Provided By IARIA

  • White Papers // Sep 2011

    Verification of Detection Methods for Robust Human Tracking System

    Much recent research is concerned with overcoming limitations of existing video surveillance systems, particularly for use in automatic human tracking systems. This paper presents detection methods which detect a lost target person during track in automatic human tracking system. The detection methods utilize an algorithm which determines the position of...

    Provided By IARIA

  • White Papers // Jun 2010

    Software Vulnerability Vs. Critical Infrastructure - A Case Study of Antivirus Software

    During the last decade, the realisation of how vulnerable critical infrastructures are due to their inter-dependencies has hit home with more gravity than ever. The abundance of vulnerabilities in the software that is widely used in critical systems could have escalating consequences. In this paper, the authors used the PROTOS...

    Provided By IARIA

  • White Papers // Jun 2010

    Data Format Description and Its Applications in IT Security

    Data formats play a central role in information processing, exchange and storage. Security-related tasks such as the documentation of exploits or format-aware fuzzing of files depend on formalized data format knowledge. In this paper, the authors present a model for describing arbitrary data format instances as well as arbitrary data...

    Provided By IARIA

  • White Papers // Apr 2011

    An Holistic Approach to Public/Private - Key Based Security in Locator/Identifier - Split Architectures

    Network security has become an essential business requirement over the past few years. As this demand will increase even more in the future, researchers agree that security must be a key element for any novel Next Generation Internet architecture. Contrary to today's add - on approach to security, the mechanisms...

    Provided By IARIA

  • White Papers // Apr 2011

    Security for the Smart Grid - Enhancing IEC 62351 to Improve Security in Energy Automation Control

    Information security has gained tremendous importance for energy distribution and energy automation systems over the last years. Security for the smart grid is crucial to ensure reliability and continuous operation of the smart grid. However, the smart grid comes along with new use cases that impose new challenges on existing...

    Provided By IARIA

  • White Papers // Sep 2010

    A Survey of Software Tools for the Creation of Networked Testbeds

    The development of testbeds for networking research has been driven by the need for experimentation with complex systems, like the Internet, that simplistic simulators fail to reproduce. Recently, networked testbeds seem to head towards more advanced, flexible and automated experimental platforms mainly as the results of many projects and research...

    Provided By IARIA

  • White Papers // Sep 2010

    Performance Analysis of Time Synchronization Protocols in Wireless Sensor Networks With Regular Topologies

    Time synchronization in wireless sensor networks is an essential issue in their operation. The synchronization is deeply influenced by network size and complexity. System dynamics and algebraic graph theory provide the suitable mathematical framework to describe the dynamical and topological features of complex networks. These features are very useful to...

    Provided By IARIA

  • White Papers // Sep 2010

    Self-Healing and Secure Adaptive Messaging Middleware for Business-Critical Systems

    Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Self-healing is either rudimentary or non-existent. In this paper, the authors present a self-healing and secure adaptive messaging...

    Provided By IARIA

  • White Papers // Jun 2010

    A Holistic Approach to Open Source VoIP Security: Results From the EUX2010SEC Project

    The paper describes the approach and preliminary results from the research project EUX2010SEC. The project works closely with Voice over IP (VoIP) companies and users. The project aims at providing better security of open source VoIP installations. The paper towards this goal is organized by gathering researchers and practitioners around...

    Provided By IARIA

  • White Papers // Jun 2010

    Security and User Aspects in the Design of the Future Trusted Ambient Networked Systems

    Research visions of ambient computing promise seamless co-existence of technology and user in such a way that the environment adapts to user context. This adaptivity also means more extensive information disclosure, hence the security concerns become paramount. While new architectures should be able to provide security as a basic feature,...

    Provided By IARIA

  • White Papers // Jun 2010

    Distributed GIS Approach for Flood Risk Assessment

    Web-based Geographic Information Systems (WbGIS) provides key decision support capabilities for the disaster and emergency management community. Perspective visualization and simultaneous access to emergency management data are important capabilities that WebGIS can provide in support of informed decision-making process. By using a case study on a section of the Don...

    Provided By IARIA

  • White Papers // Jun 2010

    Business Intelligence Based Malware Log Data Analysis as an Instrument for Security Information and Event Management

    Enterprises face various risks when trying to achieve their primary goals. In regard to the information infrastructure of an enterprise, this leads to the necessity to implement an integrated set of measures which should protect the information and information technological assets effectively and efficiently. Furthermore, tools are needed for assessing...

    Provided By IARIA

  • White Papers // Jun 2010

    Enhancing Information Reliability Through Backwards Propagation of Distrust

    Search Engines have greatly influenced the way the people experience the web. Since, the early days of the web people have been relying on search engines to find useful information. However, their ability to provide useful and unbiased information can be manipulated by Web spammers. Web spamming, the practice of...

    Provided By IARIA

  • White Papers // Jun 2010

    Security Analysis of Private Data Enquiries in Erlang

    Privacy is an issue of increasing concern to the Internet user. To ensure the continued success of distributed information systems, a reliable information flow must be established in certified but immediately evident ways. The authors begin with basic consideration of the privacy problem in the general setting of database enquiries....

    Provided By IARIA

  • White Papers // Jun 2010

    Design Patterns for a Systemic Privacy Protection

    This paper shows that existing privacy enhancing technologies and the state-of-the-art in research on the field of privacy protection has grew to a considerable maturity up to date, yet privacy protection regulation disregards these advancements and remains in vague terms. Contemporary social situation with regards to privacy protection entails serious...

    Provided By IARIA

  • White Papers // Jun 2010

    Threats to the Swarm: Security Considerations for Swarm Robotics

    Swarm robotics is a relatively new technology that is being explored for its potential use in a variety of different applications and environments. Previous emerging technologies have often overlooked security until later developmental stages, when security has had to be undesirably (and sometimes expensively) retrofitted. This paper compares swarm robotics...

    Provided By IARIA

  • White Papers // Jun 2010

    Self-Organization Supported Algorithms for Wireless Sensor Networks

    Self-organization is an important issue in wireless sensor networks because of the inherent unreliability of the network. Besides, variable threats in the networks can not be ignored. Extending battery life and enhancing robustness under variable threats are two essential aspects which need to be considered when a self-organization scheme is...

    Provided By IARIA

  • White Papers // Jun 2010

    Performance, Survivability, and Cost Aspects of Business Continuity Processes According to BS 25999

    A new model is presented for evaluating the performance of a Business Continuity Management System according to BS 25999. Performance is based fundamentally on the system's Business Continuity Plans and Disaster Recovery Plans. Typically, the performance of these plans is inadequately evaluated using a number of specific exercises at various...

    Provided By IARIA

  • White Papers // Jun 2010

    Formalization of Security Properties: Enforcement for MAC Operating Systems and Verification of Dynamic MAC Policies

    Enforcement of security properties by Operating Systems is an open problem. To the best of the authors' knowledge, the solution presented in this paper is the first one that enables a wide range of integrity and confidentiality properties to be enforced. A unified formalization is proposed for the major properties...

    Provided By IARIA

  • White Papers // Jun 2010

    Development of Measurable Security for a Distributed Messaging System

    Systematically developed security metrics make it possible to gather sufficient and credible security evidence for run-time adaptive security management and off-line security engineering and management. This paper introduces and analyzes security metrics and parameter dependencies for one particular distributed messaging system. The focus is on the effectiveness and correctness of...

    Provided By IARIA

  • White Papers // Jun 2010

    Analysing Security Requirements Formally and Flexibly Based on Suspicion

    Increasingly, engineers need to approach security and software engineering in a unified way. This paper presents an approach to the formal analysis of security requirements that is based on model-checking and uses the concept of suspicion to guide the search for threats and security vulnerabilities in requirements. It proposes an...

    Provided By IARIA

  • White Papers // Jun 2010

    A Novel Countermeasure to Resist Side Channel Attacks on FPGA Implementations

    Side Channel Attacks (SCAs) have proven to be very effective in extracting information from algorithmically secure systems. Since, the earliest reports of attacks exploiting side channels such as power consumption, timing behavior and electromagnetic radiation etc., the countermeasures to resist such attacks have also been proposed. A variety of countermeasures...

    Provided By IARIA

  • White Papers // Jun 2010

    Meta-Design With Safe and Secure Embedded System Networking

    The paper presents several validated principles of a meta-design support for end-user development of safe and secure embedded system networking. The devised approach offers a reusable framework for Internet-based embedded system applications. Such resulting framework provides a flexible development environment kernel that can be adapted for various safety/security critical embedded...

    Provided By IARIA

  • White Papers // Jun 2010

    Security and Authentication Architecture Using MPEG-21 for Wireless Patient Monitoring Systems

    Privacy and security are two major concerns in the ubiquitous deployment of wireless patient monitoring systems, where wireless sensor networks become an integral part of the monitoring process. To address and handle threats which arise from the use of wireless sensors, the authors propose a framework using MPEG-21. MPEG-21 is...

    Provided By IARIA

  • White Papers // Jun 2010

    A Distributed Reputation System for Super-Peer Desktop Grids

    Desktop Grids leverage otherwise unused resources of idle desktop computers, providing vast amounts of cumulative computational power. However, resource sharing in Peer-to-Peer environments with selfish participants suffers from the free-riding phenomenon unless the environment provides appropriate countermeasures. In Peer-to-Peer-based Desktop Grids, cooperative participants require protection against free-riding job distributors. In...

    Provided By IARIA

  • White Papers // Jun 2010

    A Secure P2P Incentive Mechanism for Mobile Devices

    Peer-to-Peer applications are emerging into mobile devices. However, resource limitations of these devices introduce new challenges for P2P technologies. For instance, there is a need for incentive mechanisms, which address the free riding problem but do not waste devices' battery or communication resources. A centralized and user-identity based incentive mechanism...

    Provided By IARIA

  • White Papers // Jun 2010

    Peer-to-Peer Networks: Security Analysis

    In this paper, the authors are dealing with security in highly distributed systems, specifically peer-to-peer networks. They are describing some known theoretical attacks and defenses in these kinds of networks and comparing them with real world data. Classification of attacks realizable in peer-to-peer networks is given. They also discuss influences...

    Provided By IARIA

  • White Papers // Jun 2010

    User Preferences to Support Privacy Policy Handling in Pervasive/Ubiquitous Systems

    An important approach for handling user privacy in ubiquitous or pervasive systems is identity management, in which the user has a number of different virtual identities that conceal his/her real identity. One extension of the basic approach identifies the private data needed by services and uses the notion of a...

    Provided By IARIA

  • White Papers // Sep 2011

    PIGA-HIPS: Protection of a Shared HPC Cluster

    Protecting a shared High Performance Computing cluster is still an open research problem. Existing solutions deal with sand-boxing and Discretionary Access Control for controlling remote connections. Guaranteeing security properties for a shared cluster is complex since users demand an environment at the same time efficient and preventing confidentiality and integrity...

    Provided By IARIA

  • White Papers // Sep 2011

    Tailored Concepts for Software Integrity Protection in Mobile Networks

    This paper presents research results on SW security for network elements. The authors' investigations contribute to the ongoing ASMONIA project, which is focusing on collaborative approaches and on protection and warning mechanisms in 4G networks. This paper is dedicated to examine specific aspects thereof, concentrating on SoftWare Integrity Protection (SWIP)...

    Provided By IARIA

  • White Papers // Sep 2011

    Advanced Policies Management for the Support of the Administrative Delegation in Federated Systems

    Current identity management systems are experiencing an increasing workload of their administrators in the management of the system policies, mainly derived from the sheer amount of policies they have to create and maintain. This problem is even more relevant in federated environments, where roaming users force them to authenticate and...

    Provided By IARIA

  • White Papers // Sep 2011

    An Adaptive and Dependable Distributed Monitoring Framework

    This paper discusses several relevant aspects of performing monitoring in the context of software-intensive systems. The focus is especially on cases where the observed system is distributed, and the monitoring system needs to be secure, dependable and capable of adapting to a number of dynamic scenarios during the system evolution....

    Provided By IARIA

  • White Papers // Sep 2011

    Security Test Approach for Automated Detection of Vulnerabilities of SIP-Based VoIP Softphones

    Voice over Internet Protocol based systems replace phone lines in many scenarios and are in wide use today. Automated security tests of such systems are required to detect implementation and configuration mistakes early and in an efficient way. In this paper, the authors present a plugin for their fuzzer framework...

    Provided By IARIA

  • White Papers // Sep 2011

    Genomics-Based Security Protocols: From Plaintext to Cipherprotein

    The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles...

    Provided By IARIA

  • White Papers // Sep 2011

    Evaluating Quality of Chaotic Pseudo-Random Generators. Application to Information Hiding

    Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes...

    Provided By IARIA

  • White Papers // Sep 2011

    Touch'n Trust: An NFC-Enabled Trusted Platform Module

    Instant and ubiquitous access to devices such as public terminals raises several security concerns in terms of confidentiality and trust. While Trusted Computing introduces advanced security mechanisms into terminal hardware, there is often no convenient way to help users decide on the trustworthiness of a device. To overcome this issue,...

    Provided By IARIA

  • White Papers // Apr 2011

    Enhancing Law Modeling and Analysis: Using BPR-Based and Goal-Oriented Frameworks

    Legal documents contain regulations and principles at different levels of abstraction. They constitute rich sources of information for Public Administrations (PA) redesign and eventually for the software delivery that must comply with normative regulations that are specified in laws and procedures. In order to facilitate the alignment between these elements,...

    Provided By IARIA

  • White Papers // Apr 2011

    Integrating Future High End Computing and Information Systems Using a Collaboration Framework Respecting Implementation, Legal Issues, and Security

    This paper gives an extended overview of challenges creating complex integrated information and computing systems. It covers implementation, legal, and security issues with these processes and how the overall complexity can be reduced using collaboration frameworks with Distributed and High Performance Computing resources in natural sciences disciplines for building integrated...

    Provided By IARIA

  • White Papers // Apr 2011

    ASPF: A Policy Administration Framework for Self-Protection of Large-Scale Systems

    Despite its potential to tackle many security challenges of large-scale systems such as pervasive networks, self-managed protection has been little explored. This paper addresses the problem from a policy management perspective by presenting a policy-driven framework for self-protection of pervasive systems called ASPF (Autonomic Security Policy Framework). Enforced authorization policies...

    Provided By IARIA