Oxford University

Displaying 1-14 of 14 results

  • White Papers // Aug 2013

    ROSeAnn: Reconciling Opinions of Semantic Annotators

    Named entity extractors can be used to enrich both text and Web documents with semantic annotations. While originally focused on a few standard entity types, the ecosystem of annotators is becoming increasingly diverse, with recognition capabilities ranging from generic to specialized entity types. Both the overlap and the diversity in...

    Provided By Oxford University

  • White Papers // May 2013

    Towards Enhancing Web Application Security Using Trusted Execution

    The web continues to serve as a powerful medium through which various services and resources can be exposed or consumed through web applications. Web application platforms such as webinos facilitate communication between the various smart devices in a personal network. Although modern web applications use various cryptographic techniques for authentication...

    Provided By Oxford University

  • White Papers // Mar 2013

    Measuring Privacy and Utility in Privacy-Preserving Visualization

    "In this paper, the authors proposed a technique for preserving the privacy of quasi-identifiers in sensitive data when visualized using parallel coordinates. This paper builds on that work by introducing a number of metrics that can be used to assess both the level of privacy and the amount of utility...

    Provided By Oxford University

  • White Papers // Nov 2012

    LAGE: A Java Framework to Reconstruct Gene Regulatory Networks From Large-Scale Continues Expression Data

    LAGE is a systematic framework developed in Java. The motivation of LAGE is to provide a scalable and parallel solution to reconstruct Gene Regulatory Networks (GRNs) from continuous gene expression data for very large amount of genes. The basic idea of the authors' framework is motivated by the philosophy of...

    Provided By Oxford University

  • White Papers // Jan 2012

    Scheduling Workflow Applications Based on Multi-source Parallel Data Retrieval in Distributed Computing Networks

    Many scientific experiments are carried out in collaboration with researchers around the world to use existing infrastructures and conduct experiments at massive scale. Data produced by such experiments are thus replicated and cached at multiple geographic locations. This gives rise to new challenges when selecting distributed data and compute resources...

    Provided By Oxford University

  • White Papers // Aug 2011

    Fully Deniable Message Authentication Protocols Preserving Confidentiality

    "Although the objective of secure communication can be achieved by using cryptographic tools, the undeniability that results from cryptographic properties may create a potential threat to the sender of the message. Unfortunately, most existing deniable protocols only provide 1-out-of-2 deniability. When both parties (the sender and the receiver) are allowed...

    Provided By Oxford University

  • White Papers // Feb 2011

    Toward Trustworthy Clouds' Internet Scale Critical Infrastructure

    Cloud computing is a new concept using old technologies that have emerged from industry to academia. This result in some confusion about Cloud potential capabilities by overestimating some features and underestimating the challenges, which the authors attempt to, clarify in this paper. They present an overview of Cloud critical infrastructure...

    Provided By Oxford University

  • White Papers // Jan 2011

    Self-Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure

    Current clouds infrastructure do not provide the full potential of automated self-managed services. Cloud infrastructure management are supported by clouds' internal employees and contractors (e.g. enterprise architects, system and security administrators). Such manual management process that require human intervention is not adequate considering the cloud promising future as an Internet...

    Provided By Oxford University

  • White Papers // Dec 2009

    Reducing Online Model-Development Time by Agents Using Constraints Between Shared Observations

    A situated agent must determine aspects of its environment in order to make appropriate decisions. This determination must be done quickly, as performance can suffer until each agent develops a sufficiently accurate model of its environment. The authors introduce a two-phase model-development approach called Pre-deployment Learning And Situated Model-development in...

    Provided By Oxford University

  • White Papers // Oct 2009

    Classifying ELH Ontologies in SQL Databases

    The current implementations of ontology classification procedures use the main memory of the computer for loading and processing ontologies, which soon can become one of the main limiting factors for very large ontologies. The authors describe a secondary memory implementation of a classification procedure for ELH ontologies using an SQL...

    Provided By Oxford University

  • White Papers // Sep 2009

    Security and Usability: Analysis and Evaluation

    The differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers; however, the extent to which these apply to the field of HCISec is arguable given the fine balance...

    Provided By Oxford University

  • White Papers // May 2008

    Chaining Secure Channels

    Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper the authors examine the possibilities for chaining secure channels. They present a surprising theorem that shows that, in some cases, two channels can be chained through...

    Provided By Oxford University

  • White Papers // Mar 2008

    Specifying Secure Transport Layers

    A popular technique for designing security architecture is to rely on a secure transport layer to protect messages on the network. Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper the authors present a hierarchy...

    Provided By Oxford University

  • White Papers // Feb 2007

    On the Specification of Secure Channels

    In this paper the authors have examined a hierarchy of secure channel specifications. They illustrated these channel specifications via example protocols that might implement them, but they have not proven that the implementations are correct. Security architectures often make use of secure transport protocols to protect network messages: the transport...

    Provided By Oxford University

  • White Papers // Feb 2011

    Toward Trustworthy Clouds' Internet Scale Critical Infrastructure

    Cloud computing is a new concept using old technologies that have emerged from industry to academia. This result in some confusion about Cloud potential capabilities by overestimating some features and underestimating the challenges, which the authors attempt to, clarify in this paper. They present an overview of Cloud critical infrastructure...

    Provided By Oxford University

  • White Papers // Sep 2009

    Security and Usability: Analysis and Evaluation

    The differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers; however, the extent to which these apply to the field of HCISec is arguable given the fine balance...

    Provided By Oxford University

  • White Papers // Jan 2012

    Scheduling Workflow Applications Based on Multi-source Parallel Data Retrieval in Distributed Computing Networks

    Many scientific experiments are carried out in collaboration with researchers around the world to use existing infrastructures and conduct experiments at massive scale. Data produced by such experiments are thus replicated and cached at multiple geographic locations. This gives rise to new challenges when selecting distributed data and compute resources...

    Provided By Oxford University

  • White Papers // Oct 2009

    Classifying ELH Ontologies in SQL Databases

    The current implementations of ontology classification procedures use the main memory of the computer for loading and processing ontologies, which soon can become one of the main limiting factors for very large ontologies. The authors describe a secondary memory implementation of a classification procedure for ELH ontologies using an SQL...

    Provided By Oxford University

  • White Papers // Aug 2013

    ROSeAnn: Reconciling Opinions of Semantic Annotators

    Named entity extractors can be used to enrich both text and Web documents with semantic annotations. While originally focused on a few standard entity types, the ecosystem of annotators is becoming increasingly diverse, with recognition capabilities ranging from generic to specialized entity types. Both the overlap and the diversity in...

    Provided By Oxford University

  • White Papers // Nov 2012

    LAGE: A Java Framework to Reconstruct Gene Regulatory Networks From Large-Scale Continues Expression Data

    LAGE is a systematic framework developed in Java. The motivation of LAGE is to provide a scalable and parallel solution to reconstruct Gene Regulatory Networks (GRNs) from continuous gene expression data for very large amount of genes. The basic idea of the authors' framework is motivated by the philosophy of...

    Provided By Oxford University

  • White Papers // May 2013

    Towards Enhancing Web Application Security Using Trusted Execution

    The web continues to serve as a powerful medium through which various services and resources can be exposed or consumed through web applications. Web application platforms such as webinos facilitate communication between the various smart devices in a personal network. Although modern web applications use various cryptographic techniques for authentication...

    Provided By Oxford University

  • White Papers // May 2008

    Chaining Secure Channels

    Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper the authors examine the possibilities for chaining secure channels. They present a surprising theorem that shows that, in some cases, two channels can be chained through...

    Provided By Oxford University

  • White Papers // Mar 2008

    Specifying Secure Transport Layers

    A popular technique for designing security architecture is to rely on a secure transport layer to protect messages on the network. Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper the authors present a hierarchy...

    Provided By Oxford University

  • White Papers // Feb 2007

    On the Specification of Secure Channels

    In this paper the authors have examined a hierarchy of secure channel specifications. They illustrated these channel specifications via example protocols that might implement them, but they have not proven that the implementations are correct. Security architectures often make use of secure transport protocols to protect network messages: the transport...

    Provided By Oxford University

  • White Papers // Aug 2011

    Fully Deniable Message Authentication Protocols Preserving Confidentiality

    "Although the objective of secure communication can be achieved by using cryptographic tools, the undeniability that results from cryptographic properties may create a potential threat to the sender of the message. Unfortunately, most existing deniable protocols only provide 1-out-of-2 deniability. When both parties (the sender and the receiver) are allowed...

    Provided By Oxford University

  • White Papers // Mar 2013

    Measuring Privacy and Utility in Privacy-Preserving Visualization

    "In this paper, the authors proposed a technique for preserving the privacy of quasi-identifiers in sensitive data when visualized using parallel coordinates. This paper builds on that work by introducing a number of metrics that can be used to assess both the level of privacy and the amount of utility...

    Provided By Oxford University

  • White Papers // Dec 2009

    Reducing Online Model-Development Time by Agents Using Constraints Between Shared Observations

    A situated agent must determine aspects of its environment in order to make appropriate decisions. This determination must be done quickly, as performance can suffer until each agent develops a sufficiently accurate model of its environment. The authors introduce a two-phase model-development approach called Pre-deployment Learning And Situated Model-development in...

    Provided By Oxford University

  • White Papers // Jan 2011

    Self-Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure

    Current clouds infrastructure do not provide the full potential of automated self-managed services. Cloud infrastructure management are supported by clouds' internal employees and contractors (e.g. enterprise architects, system and security administrators). Such manual management process that require human intervention is not adequate considering the cloud promising future as an Internet...

    Provided By Oxford University