Pennsylvania State Employees Credit Union

Displaying 1-40 of 50 results

  • White Papers // May 2014

    Towards a Leaner Geo-distributed Cloud Infrastructure

    Modern cloud infrastructures are geo-distributed. Geodistribution offers many advantages but can increase the total cloud capacity required. To achieve low latency, geo-distribution forfeits statistical multiplexing of demand that a single data center could benefit from. Geo-distribution also complicates software design due to storage consistency issues. On the other hand, geodistribution...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Apr 2014

    Toward Detecting Compromised MapReduce Workers Through Log Analysis

    MapReduce is a framework for performing data intensive computations in parallel on commodity computers. When MapReduce is carried out in distributed settings, users maintain very little control over these computations, causing several security and privacy concerns. MapReduce activities may be subverted or compromised by malicious or cheating nodes. In this...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Mar 2014

    A Hierarchical Demand Response Framework for Data Center Power Cost Optimization Under Real-World Electricity Pricing

    The authors study the problem of optimizing data center electric utility bill under uncertainty in workloads and real-world pricing schemes. Their focus is on using control knobs that modulate the power consumption of IT equipment. To overcome the difficulty of casting/updating such control problems and the computational intractability they suffer...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2014

    A Parallel Architecture for Secure FPGA Symmetric Encryption

    Cryptographic algorithms are at the heart of secure systems worldwide, providing encryption for millions of sensitive financial, government, and private transactions daily. Reconfigurable computing platforms like FPGAs provide a relatively low-cost, high-performance method of implementing cryptographic primitives. Several standard algorithms are used: the Data Encryption Standard (DES), its cipher block...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Aug 2013

    Mining and Indexing Graphs for Supergraph Search

    The authors study SuPergraph Search (SPS), that is, given a query graph q and a graph database G that contains a collection of graphs, return graphs that have q as a supergraph from G. SPS has broad applications in bioinformatics, cheminformatics and other scientific and commercial fields. Determining whether a...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jul 2013

    Neither More Nor Less: Optimizing Thread-Level Parallelism for GPGPUs

    General-Purpose Graphics Processing Units (GPGPUs) are at their best in accelerating computation by exploiting abundant Thread-Level Parallelism (TLP) offered by many classes of HPC applications. To facilitate such high TLP, emerging programming models like CUDA and OpenCL allow programmers to create work abstractions in terms of smaller work units, called...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2013

    DAuth: Fine-grained Authorization Delegation for Distributed Web Application Consumers

    Web applications are becoming the predominant means by which users interact with online content. However, current authentication approaches use a single authentication credential to manage access permissions, which is too inflexible for the distributed programs with unique security and privacy requirements for each component. In this paper, the authors introduce...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2013

    Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing With Low Aggregation Error

    Aggregate statistics computed from time-series data contributed by individual mobile nodes can be very useful for many mobile sensing applications. Since the data from individual node may be privacy-sensitive, the aggregator should only learn the desired statistics without compromising the privacy of each node. To provide strong privacy guarantee, existing...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Mar 2013

    Energy-AwareWeb Browsing in 3G Based Smartphones

    Smartphone based web browsing wastes a lot of power when downloading web-pages due to the special characteristics of the 3G radio interface. In this paper, the authors identify these special characteristics, and address power consumption issues through two novel techniques. They reorganize the computation sequence of the web browser when...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2013

    Providing Privacy-Aware Incentives for Mobile Sensing

    Mobile sensing exploits data contributed by mobile users (e.g., via their smart phones) to make sophisticated inferences about people and their surrounding and thus can be applied to environmental monitoring, traffic monitoring and healthcare. However, the large-scale deployment of mobile sensing applications is hindered by the lack of incentives for...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2013

    Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks

    The authors address management of latent, emerging Interest Groups (IGs), spanning both unsupervised, distributed IG discovery and anycast-query forwarding, in Peer-To-Peer (P2P) on-line social networks. The P2P network is assumed to have at least one layer of superpeers (Diaspora pods) that support and moderate a group of ordinary peers/clients. There...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2013

    Smart Cards as First-Class Network Citizens

    Recent proposals have been made to connect smart cards to the Internet, to meet needs that are not easily satisfied by current smart card interface standards. However, all these proposals require the use of o-card software to do the translation between the world of the Internet and that of the...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Dec 2012

    HybridMR: A Hierarchical MapReduce Scheduler for Hybrid Data Centers

    Virtualized environments are attractive because they simplify cluster management, while facilitating cost-effective workload consolidation. As a result, virtual machines, either in public clouds or in private data centers, have become the norm for running many interactive applications such as web servers. On the other hand, batch workloads like MapReduce are...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Nov 2012

    Automated Scheduling of Deferrable PEV/PHEV Load in the Smartgrid

    The authors consider the scheduling of deferrable charging demand for Plug-in Electric or Hybrid-Electric Vehicles (PEVs/PHEVs) in the smart grid such that the grid is operating within the safety charging threshold, and as many as consumers/users are satisfied by the end of a finite horizon (e.g., 8pm- 6am). Given that...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Nov 2012

    IOPin: Runtime Profiling of Parallel I/O in HPC Systems

    Many I/O and data-intensive scientific applications use parallel I/O software to access files in high performance. On modern parallel machines, the I/O software consists of several layers, including high-level libraries such as Parallel netCDF and HDF, middleware such as MPI-IO, and low-level POSIX interface supported by the file systems. For...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Oct 2012

    The Power of Linear Reconstruction Attacks

    The authors consider the power of "Linear reconstruction attacks" in statistical data privacy, showing that they can be applied to a much wider range of settings than previously understood. Linear attacks have been studied before [3, 6, 11, 1, 14] but have so far been applied only in settings with...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Sep 2012

    The Right Files at the Right Time

    Programs fetch resources, such as files, from the operating system through the process of name resolution. However, name resolution can be subverted by adversaries to redirect victim processes to resources chosen by the adversaries, leading to a variety of attacks. These attacks are possible because traditional access control treats processes...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jul 2012

    Peer-to-Peer Caching Systems with Selfish Peers: A Spectral Approach

    In a simplified peer-to-peer (p2p) search scenario, peers and known service/data objects are given geospatial coordinates. The authors consider a dynamic distributed caching system consisting of an \"Authoritative\" server dispensing content only if the content fails to be found by searching an unstructured peer-to-peer system. In their model, the peers...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jul 2012

    Abusing Notification Services on Smartphones for Phishing and Spamming

    Notification service is a popular functionality provided by almost all modern Smartphone platforms. To facilitate customization for developers, many Smartphone platforms support highly customizable notifications, which allow the third party applications to specify the trigger events, the notification views to be displayed, and the allowed user operations on the notification...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jun 2012

    STING: Finding Name Resolution Vulnerabilities in Programs

    The process of name resolution, where names are resolved into resource references, is fundamental to computer science, but its use has resulted in several classes of vulnerabilities. These vulnerabilities are difficult for programmers to eliminate because their cause is external to the program: the adversary changes namespace bindings in the...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2012

    A Study of Unsupervised Adaptive Crowdsourcing

    The authors consider unsupervised crowd-sourcing performance based on the model wherein the responses of end-users are essentially rated according to how their responses correlate with the majority of other responses to the same subtasks/questions. In one setting, they consider an independent sequence of identically distributed crowd-sourcing assignments (meta-tasks), while in...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2012

    Demand Response for Non-Neutral Networks: Side-Payment Profitability and Convexity Modeling Congestion-Sensitive Applications

    This paper is concerned with the issue of side payments between Content Providers (CPs) and Internet Service (access bandwidth) Providers (ISPs) in an Internet that is potentially not neutral. The authors herein generalize past results modeling the ISP and CP interaction as a non-cooperative game in two directions. They consider...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Apr 2012

    Verifying System Integrity by Proxy

    Users are increasingly turning to online services, but are concerned for the safety of their personal data and critical business tasks. While secure communication protocols like TLS authenticate and protect connections to these services, they cannot guarantee the correctness of the endpoint system. Users would like assurance that all the...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Sep 2011

    Recruiting Multi-Antenna Transmitters as Cooperative Jammers: An Auction-Theoretic Approach

    This paper proposes and investigates a distributed mechanism that motivates otherwise non-cooperative terminals to participate as cooperative jammers assisting a source-destination pair that communicates over a wireless medium, in the presence of an eavesdropper from whom the communicated messages need to be kept secret. The cooperation incentive is provided by...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jul 2011

    Towards Ground Truthing Observations in Gray-Box Anomaly Detection

    Anomaly detection has been attracting interests from researchers due to its advantage of being able to detect zero-day exploits. A gray-box anomaly detector first observes benign executions of a computer program and then extracts reliable rules that govern the normal execution of the program. However, such observations from benign executions...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jun 2011

    Improving Energy Efficiency of Multi-Threaded Applications using Heterogeneous CMOS-TFET Multicores

    Energy-Delay-Product-aware DVFS is a widely-used technique that improves energy efficiency by dynamically adjusting the frequencies of cores. Further, for multithreaded applications, barrier-aware DVFS is a method that can dynamically tune the frequencies of cores to reduce barrier stall times and achieve higher energy efficiency. In both forms of DVFS, frequencies...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jun 2011

    Broadcast Scheduling with Data Bundles

    Broadcast scheduling has been extensively studied in wireless environments, where a base station broadcasts data to multiple users. Due to the sole wireless channel's limited bandwidth, only a subset of the needs may be satisfiable, and so maximizing total (weighted) throughput is a popular objective. In many realistic applications, however,...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2011

    Classical Cryptographic Protocols in a Quantum World

    Cryptographic protocols, such as protocols for Secure Function Evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If the authors accept that quantum information processing is the most realistic model of physically feasible...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2011

    Botnet Detection Through Fine Flow Classification

    The prevalence of botnets, which is defined as a group of infected machines, have become the predominant factor among all the internet malicious attacks such as DDoS, spam, and click fraud. The number of botnets is steadily increasing, and the characteristic C&C channels have evolved from IRC to HTTP, FTP,...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Dec 2010

    ACCESS: Smart Scheduling for Asymmetric Cache CMPs

    In current, Chip Multi-Processors (CMPs), a significant portion of the die is consumed by the last-level cache. Until recently, the balance of cache and core space has been primarily guided by the needs of single applications. However, as multiple applications or Virtual Machines (VMs) are consolidated on such a platform,...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Oct 2010

    Network-Based Root of Trust for Installation

    Administrators of large data centers often require network installation mechanisms, such as disk cloning over the network, to manage the integrity of their machines. However, network-based installation is vulnerable to a variety of attacks, including compromised machines responding to installation requests with malware. To enable verification that running machines were...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jun 2010

    Privacy Policies for Shared Content in Social Network Sites

    Social networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of subscribed users. Social networks enable a form of self-expression for users and help them to socialize and share content with other users. In spite of the fact that content sharing represents one...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jun 2010

    Designing a Virtual Lab for Computer Forensics

    The fast growing demand on information security education, both in terms of the numbers of courses and students, presents a major challenge to developing and maintaining a laboratory facility that reinforces concepts and skills taught in class with hands-on experiences. In this paper, the authors present an approach for designing...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Mar 2010

    A Case Study of Incremental and Background Hybrid In-Memory Checkpointing

    Future exascale computing systems will have high failure rates due to the sheer number of components present in the system. A classic fault-tolerance technique used in today's supercomputers is a checkpoint-restart mechanism. However, traditional hard disk-based checkpointing techniques will soon hit the scalability wall. Recently, many emerging non-volatile memory technologies,...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2010

    m-LIGHT: Indexing Multi-Dimensional Data over DHTs

    In this paper, the authors study the problem of indexing multidimensional data in the P2P networks based on Distributed Hash Tables (DHTs). They identify several design issues and propose a novel over-DHT indexing scheme called m-LIGHT. To preserve data locality, m-LIGHT employs a clever naming mechanism that gracefully maps the...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Oct 2009

    Joint Channel and Echo Impulse Response Shortening for High-Speed Data Transmission

    The unit-norm constraint optimization for joint shortening of channel and echo impulse response is presented in this paper. The optimization is performed in the Mean Square sEnse (MSE) and compared to unit-tap constraint joint shortening optimization. The proposed method could serve in performing joint echo cancellation and equalization for data...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Aug 2009

    Understanding Sub-Stream Scheduling in P2P Hybrid Live Streaming Systems

    As an emerging and promising streaming architecture, the P2P pull-push hybrid architecture has achieved great success in delivering live video traffic over the Internet. However, a formal study on the sub-stream scheduling problem, a key design issue in hybrid systems, is still lacking. In this paper, the authors propose a...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jun 2009

    A Computer Scientist's Introductory Guide to Business Process Management (BPM)

    Computers play an integral part in designing, modeling, optimizing, and managing business processes within and across companies. Although Business Process Management (BPM), WorkFlow Management (WfM), and Business Process Reengineering (BPR) have been IT-related disciplines with a history of about three decades, there is still a lack of publications clarifying definitions...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Apr 2009

    Software Engineering within a Dynamic Digital Business Ecosystem

    The goal of fast adaptations and modifications according to continuous change requests is common to all software engineering methodologies. In most cases, sooner or later this results in a mismatch between the software specification and the actual implementation with related disadvantages such as the impossibility of performing validations of related...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Nov 2008

    Optimizing BGP Security by Exploiting Path Stability

    The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has been widely deployed. The lack of adoption is largely caused by a failure to find a balance between deployability, cost, and security....

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Nov 2012

    IOPin: Runtime Profiling of Parallel I/O in HPC Systems

    Many I/O and data-intensive scientific applications use parallel I/O software to access files in high performance. On modern parallel machines, the I/O software consists of several layers, including high-level libraries such as Parallel netCDF and HDF, middleware such as MPI-IO, and low-level POSIX interface supported by the file systems. For...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2013

    Providing Privacy-Aware Incentives for Mobile Sensing

    Mobile sensing exploits data contributed by mobile users (e.g., via their smart phones) to make sophisticated inferences about people and their surrounding and thus can be applied to environmental monitoring, traffic monitoring and healthcare. However, the large-scale deployment of mobile sensing applications is hindered by the lack of incentives for...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Oct 2009

    Joint Channel and Echo Impulse Response Shortening for High-Speed Data Transmission

    The unit-norm constraint optimization for joint shortening of channel and echo impulse response is presented in this paper. The optimization is performed in the Mean Square sEnse (MSE) and compared to unit-tap constraint joint shortening optimization. The proposed method could serve in performing joint echo cancellation and equalization for data...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Aug 2009

    Understanding Sub-Stream Scheduling in P2P Hybrid Live Streaming Systems

    As an emerging and promising streaming architecture, the P2P pull-push hybrid architecture has achieved great success in delivering live video traffic over the Internet. However, a formal study on the sub-stream scheduling problem, a key design issue in hybrid systems, is still lacking. In this paper, the authors propose a...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Sep 2012

    The Right Files at the Right Time

    Programs fetch resources, such as files, from the operating system through the process of name resolution. However, name resolution can be subverted by adversaries to redirect victim processes to resources chosen by the adversaries, leading to a variety of attacks. These attacks are possible because traditional access control treats processes...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Apr 2012

    Verifying System Integrity by Proxy

    Users are increasingly turning to online services, but are concerned for the safety of their personal data and critical business tasks. While secure communication protocols like TLS authenticate and protect connections to these services, they cannot guarantee the correctness of the endpoint system. Users would like assurance that all the...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Oct 2010

    Network-Based Root of Trust for Installation

    Administrators of large data centers often require network installation mechanisms, such as disk cloning over the network, to manage the integrity of their machines. However, network-based installation is vulnerable to a variety of attacks, including compromised machines responding to installation requests with malware. To enable verification that running machines were...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Sep 2011

    Recruiting Multi-Antenna Transmitters as Cooperative Jammers: An Auction-Theoretic Approach

    This paper proposes and investigates a distributed mechanism that motivates otherwise non-cooperative terminals to participate as cooperative jammers assisting a source-destination pair that communicates over a wireless medium, in the presence of an eavesdropper from whom the communicated messages need to be kept secret. The cooperation incentive is provided by...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Mar 2013

    Energy-AwareWeb Browsing in 3G Based Smartphones

    Smartphone based web browsing wastes a lot of power when downloading web-pages due to the special characteristics of the 3G radio interface. In this paper, the authors identify these special characteristics, and address power consumption issues through two novel techniques. They reorganize the computation sequence of the web browser when...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2013

    Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing With Low Aggregation Error

    Aggregate statistics computed from time-series data contributed by individual mobile nodes can be very useful for many mobile sensing applications. Since the data from individual node may be privacy-sensitive, the aggregator should only learn the desired statistics without compromising the privacy of each node. To provide strong privacy guarantee, existing...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Dec 2012

    HybridMR: A Hierarchical MapReduce Scheduler for Hybrid Data Centers

    Virtualized environments are attractive because they simplify cluster management, while facilitating cost-effective workload consolidation. As a result, virtual machines, either in public clouds or in private data centers, have become the norm for running many interactive applications such as web servers. On the other hand, batch workloads like MapReduce are...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Oct 2012

    The Power of Linear Reconstruction Attacks

    The authors consider the power of "Linear reconstruction attacks" in statistical data privacy, showing that they can be applied to a much wider range of settings than previously understood. Linear attacks have been studied before [3, 6, 11, 1, 14] but have so far been applied only in settings with...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2012

    A Study of Unsupervised Adaptive Crowdsourcing

    The authors consider unsupervised crowd-sourcing performance based on the model wherein the responses of end-users are essentially rated according to how their responses correlate with the majority of other responses to the same subtasks/questions. In one setting, they consider an independent sequence of identically distributed crowd-sourcing assignments (meta-tasks), while in...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2012

    Demand Response for Non-Neutral Networks: Side-Payment Profitability and Convexity Modeling Congestion-Sensitive Applications

    This paper is concerned with the issue of side payments between Content Providers (CPs) and Internet Service (access bandwidth) Providers (ISPs) in an Internet that is potentially not neutral. The authors herein generalize past results modeling the ISP and CP interaction as a non-cooperative game in two directions. They consider...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Aug 2007

    Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases

    Privacy-Preserving Data Mining (PPDM) techniques aim to construct efficient data mining algorithms while maintaining privacy. Statistical Disclosure Limitation (SDL) techniques aim to preserve confidentiality but in contrast to PPDM techniques also aim to provide access to statistical data needed for \"Full\" statistical analysis. The authors draw from both PPDM and...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jul 2012

    Abusing Notification Services on Smartphones for Phishing and Spamming

    Notification service is a popular functionality provided by almost all modern Smartphone platforms. To facilitate customization for developers, many Smartphone platforms support highly customizable notifications, which allow the third party applications to specify the trigger events, the notification views to be displayed, and the allowed user operations on the notification...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jun 2010

    Privacy Policies for Shared Content in Social Network Sites

    Social networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of subscribed users. Social networks enable a form of self-expression for users and help them to socialize and share content with other users. In spite of the fact that content sharing represents one...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2013

    Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks

    The authors address management of latent, emerging Interest Groups (IGs), spanning both unsupervised, distributed IG discovery and anycast-query forwarding, in Peer-To-Peer (P2P) on-line social networks. The P2P network is assumed to have at least one layer of superpeers (Diaspora pods) that support and moderate a group of ordinary peers/clients. There...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Mar 2014

    A Hierarchical Demand Response Framework for Data Center Power Cost Optimization Under Real-World Electricity Pricing

    The authors study the problem of optimizing data center electric utility bill under uncertainty in workloads and real-world pricing schemes. Their focus is on using control knobs that modulate the power consumption of IT equipment. To overcome the difficulty of casting/updating such control problems and the computational intractability they suffer...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Apr 2014

    Toward Detecting Compromised MapReduce Workers Through Log Analysis

    MapReduce is a framework for performing data intensive computations in parallel on commodity computers. When MapReduce is carried out in distributed settings, users maintain very little control over these computations, causing several security and privacy concerns. MapReduce activities may be subverted or compromised by malicious or cheating nodes. In this...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2014

    A Parallel Architecture for Secure FPGA Symmetric Encryption

    Cryptographic algorithms are at the heart of secure systems worldwide, providing encryption for millions of sensitive financial, government, and private transactions daily. Reconfigurable computing platforms like FPGAs provide a relatively low-cost, high-performance method of implementing cryptographic primitives. Several standard algorithms are used: the Data Encryption Standard (DES), its cipher block...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2010

    m-LIGHT: Indexing Multi-Dimensional Data over DHTs

    In this paper, the authors study the problem of indexing multidimensional data in the P2P networks based on Distributed Hash Tables (DHTs). They identify several design issues and propose a novel over-DHT indexing scheme called m-LIGHT. To preserve data locality, m-LIGHT employs a clever naming mechanism that gracefully maps the...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Aug 2013

    Mining and Indexing Graphs for Supergraph Search

    The authors study SuPergraph Search (SPS), that is, given a query graph q and a graph database G that contains a collection of graphs, return graphs that have q as a supergraph from G. SPS has broad applications in bioinformatics, cheminformatics and other scientific and commercial fields. Determining whether a...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2013

    DAuth: Fine-grained Authorization Delegation for Distributed Web Application Consumers

    Web applications are becoming the predominant means by which users interact with online content. However, current authentication approaches use a single authentication credential to manage access permissions, which is too inflexible for the distributed programs with unique security and privacy requirements for each component. In this paper, the authors introduce...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Mar 2007

    TANOR: A Tool for Accelerating N-Body Simulations on Reconfigurable Platform

    Algorithm-architecture co-exploration is hindered by the lack of efficient tools. As a consequence, designers are currently able to explore only a limited set of points in the whole design space. Therefore, a tool that can allow fast exploration of algorithmic and architectural tradeoffs in an automated manner is highly desired....

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2011

    Botnet Detection Through Fine Flow Classification

    The prevalence of botnets, which is defined as a group of infected machines, have become the predominant factor among all the internet malicious attacks such as DDoS, spam, and click fraud. The number of botnets is steadily increasing, and the characteristic C&C channels have evolved from IRC to HTTP, FTP,...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Nov 2012

    Automated Scheduling of Deferrable PEV/PHEV Load in the Smartgrid

    The authors consider the scheduling of deferrable charging demand for Plug-in Electric or Hybrid-Electric Vehicles (PEVs/PHEVs) in the smart grid such that the grid is operating within the safety charging threshold, and as many as consumers/users are satisfied by the end of a finite horizon (e.g., 8pm- 6am). Given that...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jul 2012

    Peer-to-Peer Caching Systems with Selfish Peers: A Spectral Approach

    In a simplified peer-to-peer (p2p) search scenario, peers and known service/data objects are given geospatial coordinates. The authors consider a dynamic distributed caching system consisting of an \"Authoritative\" server dispensing content only if the content fails to be found by searching an unstructured peer-to-peer system. In their model, the peers...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Nov 2006

    Privacy Preserving Web-Based Email

    Recent web-based applications offer users free service in exchange for access to personal communication, such as on-line email services and instant messaging. The inspection and retention of user communication is generally intended to enable targeted marketing. However, unless specifically stated otherwise by the collecting service's privacy policy, such records have...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Dec 2007

    Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems

    The enormous growth in the diversity of content services such as IPtv has highlighted the inadequacy of the accompanying content security: existing security mechanisms scale poorly, require complex and often costly dedicated hardware, or fail to meet basic security requirements. New security methods are needed. In this paper, the authors...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Mar 2008

    Noninvasive Methods for Host Certification

    Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks. Commonly practiced techniques used to vet these hosts, such as system scans, have the potential to infringe on the privacy of...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jul 2011

    Towards Ground Truthing Observations in Gray-Box Anomaly Detection

    Anomaly detection has been attracting interests from researchers due to its advantage of being able to detect zero-day exploits. A gray-box anomaly detector first observes benign executions of a computer program and then extracts reliable rules that govern the normal execution of the program. However, such observations from benign executions...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jun 2010

    Designing a Virtual Lab for Computer Forensics

    The fast growing demand on information security education, both in terms of the numbers of courses and students, presents a major challenge to developing and maintaining a laboratory facility that reinforces concepts and skills taught in class with hands-on experiences. In this paper, the authors present an approach for designing...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2011

    Classical Cryptographic Protocols in a Quantum World

    Cryptographic protocols, such as protocols for Secure Function Evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If the authors accept that quantum information processing is the most realistic model of physically feasible...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // May 2014

    Towards a Leaner Geo-distributed Cloud Infrastructure

    Modern cloud infrastructures are geo-distributed. Geodistribution offers many advantages but can increase the total cloud capacity required. To achieve low latency, geo-distribution forfeits statistical multiplexing of demand that a single data center could benefit from. Geo-distribution also complicates software design due to storage consistency issues. On the other hand, geodistribution...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Apr 2007

    Location Privacy Protection Through Obfuscation-Based Techniques

    The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications that manage physical positions of individuals to offer location-based services for business, social or informational purposes. As an effect of such innovative services, however, privacy concerns...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2013

    Smart Cards as First-Class Network Citizens

    Recent proposals have been made to connect smart cards to the Internet, to meet needs that are not easily satisfied by current smart card interface standards. However, all these proposals require the use of o-card software to do the translation between the world of the Internet and that of the...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jun 2009

    A Computer Scientist's Introductory Guide to Business Process Management (BPM)

    Computers play an integral part in designing, modeling, optimizing, and managing business processes within and across companies. Although Business Process Management (BPM), WorkFlow Management (WfM), and Business Process Reengineering (BPR) have been IT-related disciplines with a history of about three decades, there is still a lack of publications clarifying definitions...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jul 2006

    Application of Business Rules Approach in Clinical Trials

    The paper discusses the use of Unified Modeling Language (UML) for business rules modeling. Different techniques of business rule representation in the models reflecting different aspects of a particular system are briefly described. The paper also demonstrates a method of creating a formal business rule specification from system models based...

    Provided By Pennsylvania State Employees Credit Union

  • White Papers // Jan 2008

    Usage of Model Driven Engineering in the Context of Business Process Management

    This paper shows how Model Driven Engineering (MDE) and Business Process Management (BPM) can be combined when generating executable BPEL processes out of BPMN models. By adding appropriate meta-data information to the BPMN models, business patterns like model fragments or reference process building blocks and technical patterns are applied during...

    Provided By Pennsylvania State Employees Credit Union