Newcastle University

Displaying 1-32 of 32 results

  • White Papers // Apr 2014

    On Cloud-Based Engineering of Dependable Systems

    The cloud computing paradigm is being adopted by many organizations in different application domains as it is cost effective and offers a virtually unlimited pool of resources. Engineering critical systems can benefit from clouds in attaining all dependability means: fault tolerance, fault prevention, fault removal and fault forecasting. The authors'...

    Provided By Newcastle University

  • White Papers // Feb 2013

    Cryptanalysis of the Dragonfly Key Exchange Protocol

    Recently, harkins submitted a variant of the protocol to the Internet Engineering Task Force (IETF) as a candidate standard for general internet use. Dragonfly is a password authenticated key exchange protocol that has been submitted to the internet engineering task force as a candidate standard for general internet use. The...

    Provided By Newcastle University

  • White Papers // Aug 2012

    Modeling Chernoff Information Loss in Cooperative Sensor Networks

    The authors investigate the Chernoff Information Loss (CIL) characteristics in Wireless Sensor Networks (WSNs) as the sensor attempts to send a 1-bit information about the presence or absence of a Phenomenon-Of-Interest (POI) to a remote data sink through either the Single-Hop (SH) or Multi-Hop (MH) wireless connectivity. Firstly, they describe...

    Provided By Newcastle University

  • White Papers // Apr 2012

    Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus

    The BP-calculus is a formalism based on the pi-calculus and encoded in WS-BPEL. The BP-calculus is intended to specifically model and verify Service Oriented applications. One important feature of SOA is the ability to compose services that may dynamically evolve along runtime. Dynamic reconfiguration of services increases their availability, but...

    Provided By Newcastle University

  • White Papers // Mar 2012

    Cloud Computing for Fast Prediction of Chemical Activity

    Quantitative Structure-Activity Relationships (QSAR) is a method to create models that can predict certain properties of compounds. Because of the importance of QSAR in designing new drugs, ability to accelerate this process becomes crucial. One way to achieve that is to be able to quickly explore the QSAR model space...

    Provided By Newcastle University

  • White Papers // Feb 2012

    Implementing Workflow Reconfiguration in WS-BPEL

    In this paper, the authors investigate the problem of dynamic reconfiguration by means of a workflow-based paper used for discussion. They state the requirements on a system implementing the workflow and its reconfiguration, and they describe the system's design in BPMN. WS-BPEL, a language that would not naturally support dynamic...

    Provided By Newcastle University

  • White Papers // Jan 2012

    Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol

    This paper shows several security weaknesses of a Multi-Factor Authenticated Key Exchange (MK-AKE) protocol, proposed by Pointcheval and Zimmer at ACNS'08. The Pointcheval-Zimmer scheme was designed to combine three authentication factors in one system, including a password, a secure token (that stores a private key) and biometrics. In a formal...

    Provided By Newcastle University

  • White Papers // Jan 2012

    A General Transmission Scheme for Bi-Directional Communication by Using Eigenmode Sharing

    In this paper, the authors develop a general transmission scheme for bi-directional communications by using eigenmode sharing, where existing two-way relaying protocols can be viewed as a special case of the proposed transmission scheme. In addition, the proposed bi-directional scheme can also be applied to more challenging scenarios with more...

    Provided By Newcastle University

  • White Papers // Jan 2012

    Security in Wireless Networks Through Cooperative Chatter

    The secure transmission of information in wireless networks without knowledge of the eavesdroppers' locations is considered. Two key mechanisms are employed: artificial noise generation from system nodes other than the transmitter and receiver, and a form of multi-user diversity that allows message reception in the presence of the artificial noise....

    Provided By Newcastle University

  • White Papers // Nov 2011

    Uncertainty and Uncertainty Tolerance in Service Provisioning

    In recent years, the Internet has become an important platform to provide services to the end users. Services Computing, Service-oriented Computing, Cloud Computing, Web Services and Utility Computing are all different paradigm of implementation for distributed systems. One of the challenges for Internet-based service provisioning is to provide a measure...

    Provided By Newcastle University

  • White Papers // Jul 2011

    On Robust Key Agreement Based on Public Key Authentication

    In this paper, the authors discuss public-key authenticated key agreement protocols. First, they critically analyze several authenticated key agreement protocols and uncover various theoretical and practical flaws. In particular, they present two new attacks on the HMQV protocol, which is currently being standardized by IEEE P1363. These attacks suggest the...

    Provided By Newcastle University

  • White Papers // May 2011

    A Quantitative Analyser for Programs in a Core Imperative Language

    This paper presents a tool for analyzing Quantified Information Flow (QIF) for programs written in a core imperative language. The intended application is measuring leakage of secrets. The tool can provide either exact leakage or an upper bound depending on the trade off chosen by the user between exactitude or...

    Provided By Newcastle University

  • White Papers // May 2011

    Power Adaptive Computing System Design in Energy Harvesting Environment

    Energy harvesting systems provide a promising alternative to battery-powered systems and create an opportunity for architecture and design method innovation for the exploitation of ambient energy source. In this paper, the authors propose a two stage optimization approach to develop power adaptive computing systems which can efficiently use energy harvested...

    Provided By Newcastle University

  • White Papers // Apr 2011

    A Typology of Real-Time Parallel Geoprocessing for the Sensor Web Era

    The rise of digital sensors and the Sensor Web is expected to have wide reaching implications for the monitoring of the physical and human world and has already resulted in an explosion in the volume and availability of spatially referenced data pertaining to the surroundings. While this deluge of easily...

    Provided By Newcastle University

  • White Papers // Apr 2011

    Supporting Accountable Business to Business Document Exchange in the Cloud

    Business-To-Business (B2B) interactions can be defined in terms of the exchange of documents. Such exchanges must be regulated to comply with obligations including service agreements, contracts and law. It is fundamental to such regulation that participants are held accountable for their actions. This can be achieved through the deployment of...

    Provided By Newcastle University

  • White Papers // Dec 2010

    SRN Model for IEEE 802.11 DCF MAC Protocol in Multi-Hop Ad Hoc Networks With Hidden Nodes

    Since its development for WLAN, IEEE 802.11 standard has been widely used for various wireless networks due to the low cost and effectiveness in reducing collisions with simple and decentralized mechanisms. In this paper, the authors present a novel analytical SRN model for performance evaluation of IEEE 802.11 DCF MAC...

    Provided By Newcastle University

  • White Papers // Dec 2010

    Design of QoS-Aware Provisioning Systems

    The authors present architecture of a hosting system consisting of a set of hosted Web Services subject to QoS constraints, and a certain number of servers used to run users demand. The traffic is session-based, while provider and users agree on SLAs specifying the expected level of service performance such...

    Provided By Newcastle University

  • White Papers // Nov 2010

    Distributed Cooperative Localization of Wireless Sensor Networks With Convex Hull Constraint

    Localization of wireless sensor networks is aimed at determining the positions of all sensors in a network, usually given a few connected anchor nodes' positions and certain relative measurements, where the latter could be pairwise distance measurements among directly connected neighbors as considered in this paper. In this paper, the...

    Provided By Newcastle University

  • White Papers // Sep 2010

    Analogue Network Coding for Multi-Pair, Bidirectional Relay Channels

    The authors consider a scenario where multiple pairs of users exchange information within pair, with the help of a dedicated multi-antenna relay. The proposed protocol integrates the idea of analogue network coding in mixing two data streams originating from the same user pair, together with the spatial multiplexing of the...

    Provided By Newcastle University

  • White Papers // Jul 2010

    Formal Analysis of BPMN Models Using Event-B

    The use of business process models has gone far beyond documentation purposes. In the development of business applications, they can play the role of an artifact on which high level properties can be verified and design errors can be revealed in an effort to reduce overhead at later software development...

    Provided By Newcastle University

  • White Papers // Jun 2010

    Error Performance Bounds for Routing Algorithms in Wireless Cooperative Networks

    Cooperative diversity has emerged as a promising approach to improving reception reliability by realizing spatial diversity gains for nodes with single antenna. The authors consider here cooperative ad-hoc wireless networks where communications between two nodes can be assisted by a single relay using two time slots. This paper continues their...

    Provided By Newcastle University

  • White Papers // Apr 2010

    A Process Algebraic Fluid Flow Model of Emergency Egress

    Pervasive environments offer an increasing number of services to a large number of people moving within these environments including timely information about where to go and when. People using these services interact with the system, but they are also meeting other people and performing other activities as relevant opportunities arise....

    Provided By Newcastle University

  • White Papers // Apr 2010

    Automatic Software Deployment in the Azure Cloud

    For application providers, cloud computing has the advantage that it reduces the administrative e ort required to satisfy processing and storage requirements. However, to simplify the task of building scalable applications, some of the cloud computing platforms impose constraints on the application architecture, its implementation and tools that may be...

    Provided By Newcastle University

  • White Papers // Jan 2010

    Patterns for Modelling Time and Consistency in Business Information Systems

    Maintaining semantic consistency of data is a significant problem in distributed information systems, particularly those on which a business may depend. The authors' current work aims to use Event-B and the Rodin tools to support the specification and design of such systems in a way that integrates well into existing...

    Provided By Newcastle University

  • White Papers // Jan 2010

    Imperfectly-Credible Disinflation Of Small Inflations

    In this paper, the authors study and quantify the effects of a disinflationary policy on output and welfare. Their focus is the policy question of the optimal response to low inflation. The analysis takes place in the context of a DSGE model with sticky prices, time varying velocity and imperfect...

    Provided By Newcastle University

  • White Papers // Jan 2010

    Should The Joint Provision Of Credit Insurance With Unsecured Lending Be Prohibited? An Examination Of The UK Payment Protection Insurance Market

    This paper examines the joint pricing of credit insurance and unsecured lending. This case has wide regulatory implications following concerns that the sale of credit insurance as an add-on product has been detrimental to customers. A theoretical model is developed in which banks set prices for customers who have varying...

    Provided By Newcastle University

  • White Papers // Dec 2009

    A Prototype Design for Enhancing Customer Trust in Online Payments

    The adoption of mobile device technology can contribute significantly to enhance customers trust in online payment systems. The perceptions and preferences of online shoppers are influenced by several key factors which serve to both enhance and compromise this trust and in turn affect a customer intentions and behavior in relation...

    Provided By Newcastle University

  • White Papers // Nov 2009

    The Dynamics Of FDI Location: A Markov Analysis For British Regions

    The paper uses the framework of Markov chains to examine convergence in the location of inward foreign direct investment across the regions of Great Britain over 1985-2005. An analysis is undertaken by industry group that disaggregates manufacturing and services. It finds convergence in regional FDI shares, both overall and by...

    Provided By Newcastle University

  • White Papers // Jun 2009

    A Knowledge Base for Justified Information Security Decision-Making

    The majority of modern-day companies store commercially sensitive and valuable information assets in digital form. It is essential for the Chief Information Security Officer (CISO) within an organisation to ensure that such information is adequately protected. External standards exist to advise CISOs on how to secure information, but these are...

    Provided By Newcastle University

  • White Papers // Jun 2009

    A Peer to Peer Protocol for Online Dispute Resolution over Storage Consumption

    In bilateral accounting of resource consumption both the consumer and provider independently measure the amount of resources consumed by the consumer. The problem here is that potential disparities between the provider's and consumer's accountings, might lead to conflicts between the two parties that need to be resolved. The authors argue...

    Provided By Newcastle University

  • White Papers // Apr 2009

    Dependability in the Cloud: Challenges and Opportunities

    Cloud based infrastructures are rapidly becoming a destination of choice to host a variety of applications ranging from high availability enterprise services and online TV stations, to batch oriented scientific computations. With investments of billions of dollars, the fortunes of dozens of companies, and major research initiatives staked on its...

    Provided By Newcastle University

  • White Papers // Jan 2009

    Regional Financial System And The Financial Structure Of Small Firms

    The capital structure of firms is known to be different not only due to firm characteristics but also to the sources of capital. Therefore, there is a need to understand the supply side effects on a firm's capital structure. A small firm's choice of financing sources may be limited by...

    Provided By Newcastle University

  • White Papers // Nov 2010

    Distributed Cooperative Localization of Wireless Sensor Networks With Convex Hull Constraint

    Localization of wireless sensor networks is aimed at determining the positions of all sensors in a network, usually given a few connected anchor nodes' positions and certain relative measurements, where the latter could be pairwise distance measurements among directly connected neighbors as considered in this paper. In this paper, the...

    Provided By Newcastle University

  • White Papers // Jan 2010

    Imperfectly-Credible Disinflation Of Small Inflations

    In this paper, the authors study and quantify the effects of a disinflationary policy on output and welfare. Their focus is the policy question of the optimal response to low inflation. The analysis takes place in the context of a DSGE model with sticky prices, time varying velocity and imperfect...

    Provided By Newcastle University

  • White Papers // Sep 2010

    Analogue Network Coding for Multi-Pair, Bidirectional Relay Channels

    The authors consider a scenario where multiple pairs of users exchange information within pair, with the help of a dedicated multi-antenna relay. The proposed protocol integrates the idea of analogue network coding in mixing two data streams originating from the same user pair, together with the spatial multiplexing of the...

    Provided By Newcastle University

  • White Papers // Jun 2010

    Error Performance Bounds for Routing Algorithms in Wireless Cooperative Networks

    Cooperative diversity has emerged as a promising approach to improving reception reliability by realizing spatial diversity gains for nodes with single antenna. The authors consider here cooperative ad-hoc wireless networks where communications between two nodes can be assisted by a single relay using two time slots. This paper continues their...

    Provided By Newcastle University

  • White Papers // Dec 2010

    SRN Model for IEEE 802.11 DCF MAC Protocol in Multi-Hop Ad Hoc Networks With Hidden Nodes

    Since its development for WLAN, IEEE 802.11 standard has been widely used for various wireless networks due to the low cost and effectiveness in reducing collisions with simple and decentralized mechanisms. In this paper, the authors present a novel analytical SRN model for performance evaluation of IEEE 802.11 DCF MAC...

    Provided By Newcastle University

  • White Papers // May 2011

    A Quantitative Analyser for Programs in a Core Imperative Language

    This paper presents a tool for analyzing Quantified Information Flow (QIF) for programs written in a core imperative language. The intended application is measuring leakage of secrets. The tool can provide either exact leakage or an upper bound depending on the trade off chosen by the user between exactitude or...

    Provided By Newcastle University

  • White Papers // Jan 2012

    Security in Wireless Networks Through Cooperative Chatter

    The secure transmission of information in wireless networks without knowledge of the eavesdroppers' locations is considered. Two key mechanisms are employed: artificial noise generation from system nodes other than the transmitter and receiver, and a form of multi-user diversity that allows message reception in the presence of the artificial noise....

    Provided By Newcastle University

  • White Papers // Jan 2012

    Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol

    This paper shows several security weaknesses of a Multi-Factor Authenticated Key Exchange (MK-AKE) protocol, proposed by Pointcheval and Zimmer at ACNS'08. The Pointcheval-Zimmer scheme was designed to combine three authentication factors in one system, including a password, a secure token (that stores a private key) and biometrics. In a formal...

    Provided By Newcastle University

  • White Papers // Aug 2012

    Modeling Chernoff Information Loss in Cooperative Sensor Networks

    The authors investigate the Chernoff Information Loss (CIL) characteristics in Wireless Sensor Networks (WSNs) as the sensor attempts to send a 1-bit information about the presence or absence of a Phenomenon-Of-Interest (POI) to a remote data sink through either the Single-Hop (SH) or Multi-Hop (MH) wireless connectivity. Firstly, they describe...

    Provided By Newcastle University

  • White Papers // Nov 2011

    Uncertainty and Uncertainty Tolerance in Service Provisioning

    In recent years, the Internet has become an important platform to provide services to the end users. Services Computing, Service-oriented Computing, Cloud Computing, Web Services and Utility Computing are all different paradigm of implementation for distributed systems. One of the challenges for Internet-based service provisioning is to provide a measure...

    Provided By Newcastle University

  • White Papers // Apr 2009

    Dependability in the Cloud: Challenges and Opportunities

    Cloud based infrastructures are rapidly becoming a destination of choice to host a variety of applications ranging from high availability enterprise services and online TV stations, to batch oriented scientific computations. With investments of billions of dollars, the fortunes of dozens of companies, and major research initiatives staked on its...

    Provided By Newcastle University

  • White Papers // Jan 2012

    A General Transmission Scheme for Bi-Directional Communication by Using Eigenmode Sharing

    In this paper, the authors develop a general transmission scheme for bi-directional communications by using eigenmode sharing, where existing two-way relaying protocols can be viewed as a special case of the proposed transmission scheme. In addition, the proposed bi-directional scheme can also be applied to more challenging scenarios with more...

    Provided By Newcastle University

  • White Papers // Mar 2012

    Cloud Computing for Fast Prediction of Chemical Activity

    Quantitative Structure-Activity Relationships (QSAR) is a method to create models that can predict certain properties of compounds. Because of the importance of QSAR in designing new drugs, ability to accelerate this process becomes crucial. One way to achieve that is to be able to quickly explore the QSAR model space...

    Provided By Newcastle University

  • White Papers // Jun 2009

    A Knowledge Base for Justified Information Security Decision-Making

    The majority of modern-day companies store commercially sensitive and valuable information assets in digital form. It is essential for the Chief Information Security Officer (CISO) within an organisation to ensure that such information is adequately protected. External standards exist to advise CISOs on how to secure information, but these are...

    Provided By Newcastle University

  • White Papers // Jan 2010

    Should The Joint Provision Of Credit Insurance With Unsecured Lending Be Prohibited? An Examination Of The UK Payment Protection Insurance Market

    This paper examines the joint pricing of credit insurance and unsecured lending. This case has wide regulatory implications following concerns that the sale of credit insurance as an add-on product has been detrimental to customers. A theoretical model is developed in which banks set prices for customers who have varying...

    Provided By Newcastle University

  • White Papers // Apr 2010

    Automatic Software Deployment in the Azure Cloud

    For application providers, cloud computing has the advantage that it reduces the administrative e ort required to satisfy processing and storage requirements. However, to simplify the task of building scalable applications, some of the cloud computing platforms impose constraints on the application architecture, its implementation and tools that may be...

    Provided By Newcastle University

  • White Papers // Dec 2010

    Design of QoS-Aware Provisioning Systems

    The authors present architecture of a hosting system consisting of a set of hosted Web Services subject to QoS constraints, and a certain number of servers used to run users demand. The traffic is session-based, while provider and users agree on SLAs specifying the expected level of service performance such...

    Provided By Newcastle University

  • White Papers // Apr 2011

    A Typology of Real-Time Parallel Geoprocessing for the Sensor Web Era

    The rise of digital sensors and the Sensor Web is expected to have wide reaching implications for the monitoring of the physical and human world and has already resulted in an explosion in the volume and availability of spatially referenced data pertaining to the surroundings. While this deluge of easily...

    Provided By Newcastle University

  • White Papers // Apr 2010

    A Process Algebraic Fluid Flow Model of Emergency Egress

    Pervasive environments offer an increasing number of services to a large number of people moving within these environments including timely information about where to go and when. People using these services interact with the system, but they are also meeting other people and performing other activities as relevant opportunities arise....

    Provided By Newcastle University

  • White Papers // Nov 2009

    The Dynamics Of FDI Location: A Markov Analysis For British Regions

    The paper uses the framework of Markov chains to examine convergence in the location of inward foreign direct investment across the regions of Great Britain over 1985-2005. An analysis is undertaken by industry group that disaggregates manufacturing and services. It finds convergence in regional FDI shares, both overall and by...

    Provided By Newcastle University

  • White Papers // Jan 2009

    Regional Financial System And The Financial Structure Of Small Firms

    The capital structure of firms is known to be different not only due to firm characteristics but also to the sources of capital. Therefore, there is a need to understand the supply side effects on a firm's capital structure. A small firm's choice of financing sources may be limited by...

    Provided By Newcastle University

  • White Papers // Feb 2013

    Cryptanalysis of the Dragonfly Key Exchange Protocol

    Recently, harkins submitted a variant of the protocol to the Internet Engineering Task Force (IETF) as a candidate standard for general internet use. Dragonfly is a password authenticated key exchange protocol that has been submitted to the internet engineering task force as a candidate standard for general internet use. The...

    Provided By Newcastle University

  • White Papers // Jun 2009

    A Peer to Peer Protocol for Online Dispute Resolution over Storage Consumption

    In bilateral accounting of resource consumption both the consumer and provider independently measure the amount of resources consumed by the consumer. The problem here is that potential disparities between the provider's and consumer's accountings, might lead to conflicts between the two parties that need to be resolved. The authors argue...

    Provided By Newcastle University

  • White Papers // Jan 2010

    Patterns for Modelling Time and Consistency in Business Information Systems

    Maintaining semantic consistency of data is a significant problem in distributed information systems, particularly those on which a business may depend. The authors' current work aims to use Event-B and the Rodin tools to support the specification and design of such systems in a way that integrates well into existing...

    Provided By Newcastle University

  • White Papers // May 2011

    Power Adaptive Computing System Design in Energy Harvesting Environment

    Energy harvesting systems provide a promising alternative to battery-powered systems and create an opportunity for architecture and design method innovation for the exploitation of ambient energy source. In this paper, the authors propose a two stage optimization approach to develop power adaptive computing systems which can efficiently use energy harvested...

    Provided By Newcastle University

  • White Papers // Jul 2011

    On Robust Key Agreement Based on Public Key Authentication

    In this paper, the authors discuss public-key authenticated key agreement protocols. First, they critically analyze several authenticated key agreement protocols and uncover various theoretical and practical flaws. In particular, they present two new attacks on the HMQV protocol, which is currently being standardized by IEEE P1363. These attacks suggest the...

    Provided By Newcastle University

  • White Papers // Apr 2014

    On Cloud-Based Engineering of Dependable Systems

    The cloud computing paradigm is being adopted by many organizations in different application domains as it is cost effective and offers a virtually unlimited pool of resources. Engineering critical systems can benefit from clouds in attaining all dependability means: fault tolerance, fault prevention, fault removal and fault forecasting. The authors'...

    Provided By Newcastle University

  • White Papers // Jul 2010

    Formal Analysis of BPMN Models Using Event-B

    The use of business process models has gone far beyond documentation purposes. In the development of business applications, they can play the role of an artifact on which high level properties can be verified and design errors can be revealed in an effort to reduce overhead at later software development...

    Provided By Newcastle University

  • White Papers // Apr 2012

    Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus

    The BP-calculus is a formalism based on the pi-calculus and encoded in WS-BPEL. The BP-calculus is intended to specifically model and verify Service Oriented applications. One important feature of SOA is the ability to compose services that may dynamically evolve along runtime. Dynamic reconfiguration of services increases their availability, but...

    Provided By Newcastle University

  • White Papers // Feb 2012

    Implementing Workflow Reconfiguration in WS-BPEL

    In this paper, the authors investigate the problem of dynamic reconfiguration by means of a workflow-based paper used for discussion. They state the requirements on a system implementing the workflow and its reconfiguration, and they describe the system's design in BPMN. WS-BPEL, a language that would not naturally support dynamic...

    Provided By Newcastle University

  • White Papers // Apr 2011

    Supporting Accountable Business to Business Document Exchange in the Cloud

    Business-To-Business (B2B) interactions can be defined in terms of the exchange of documents. Such exchanges must be regulated to comply with obligations including service agreements, contracts and law. It is fundamental to such regulation that participants are held accountable for their actions. This can be achieved through the deployment of...

    Provided By Newcastle University

  • White Papers // Dec 2009

    A Prototype Design for Enhancing Customer Trust in Online Payments

    The adoption of mobile device technology can contribute significantly to enhance customers trust in online payment systems. The perceptions and preferences of online shoppers are influenced by several key factors which serve to both enhance and compromise this trust and in turn affect a customer intentions and behavior in relation...

    Provided By Newcastle University