Purdue Federal Credit Union

Displaying 81-103 of 103 results

  • White Papers // Nov 2010

    A Kolmogorov Complexity Approach for Measuring Attack Path Complexity

    The difficulty associated with breaching an enterprise net-work is commensurate with the security of that network. A security breach, or a security policy violation, occurs as a result of an attacker successfully executing some attack path. The difficulty associated with this attack path, then, is critical to understanding how secure...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2010

    Capacity of 1-to-K Broadcast Packet Erasure Channels With Channel Output Feedback

    In the last decade, the new network coding concept has emerged, which focuses on achieving the capacity of a communication network. More explicitly, the network-coding-based approaches generally model each hop of a packet-based communication network by a Packet Erasure Channel (PEC) instead of the classic Gaussian channel. Such simple abstraction...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2010

    A Dynamic Data Middleware Cache for Rapidly-Growing Scientific Repositories

    Modern scientific repositories are growing rapidly in size. Scientists are increasingly interested in viewing the latest data as part of query results. Current scientific middleware cache systems, however, assume repositories are static. Thus, they cannot answer scientific queries with the latest data. The queries, instead, are routed to the repository...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2010

    A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation

    Context-awareness is a critical aspect of safe navigation, especially for the blind and visually-impaired in unfamiliar environments. Existing mobile devices for context-aware navigation fall short in many cases due to their dependence on specific infrastructure requirements as well as having limited access to resources that could provide a wealth of...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2010

    An Entity-centric Approach for Privacy and Identity Management in Cloud Computing

    Entities (e.g., users, services) have to authenticate themselves to Service Providers (SPs) in order to use their services. An entity provides Personally Identifiable Information (PII) that uniquely identifies it to an SP. In the traditional application-centric IDentity Management (IDM) model, each application keeps trace of identities of the entities that...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2010

    Cyber-Physical Trade-Offs in Distributed Detection Networks

    The authors consider a network of sensors that measure the scalar intensity due to the background or a source combined with background, inside a two-dimensional monitoring area. The sensor measurements may be random due to the underlying nature of the source and background or due to sensor errors or both....

    Provided By Purdue Federal Credit Union

  • White Papers // May 2010

    Spatio-Temporal Access Methods: Part 2 (2003 - 2010)

    In spatio-temporal applications, moving objects detect their locations via location-aware devices and update their locations continuously to the server. With the ubiquity and massive numbers of moving objects, many spatio-temporal access methods are developed to process user queries efficiently. Spatio-temporal access methods are classified into four categories: Indexing the past...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2010

    Providing Scalable Data Services in Ubiquitous Networks

    Topology is a fundamental part of a network that governs connectivity between nodes, the amount of data flow and the efficiency of data flow between nodes. In traditional networks, due to physical limitations, topology remains static for the course of the network operation. Ubiquitous Data Networks (UDNs), alternatively, are more...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2010

    Infection Quarantining for Wireless Networks Using Power Control

    In recent years, malware has proliferated into wireless LANs as these networks have grown in popularity and prevalence. While the actual effects of malware-related network traffic has been studied extensively in wired networks, analysis has been limited in wireless networks. In this paper, the authors investigate a defense strategy based...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2010

    Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor Coverage

    In this paper, the authors propose a steepest descent method to compute control parameters for achieving an optimal tradeoff between multiple objectives in stateless stochastic scheduling. By stateless, they mean that the scheduling algorithm does not need any bookkeeping of prior service received by clients, but the scheduling decision is...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2010

    Localization Leads to Improved Distributed Detection Under Non-Smooth Distributions

    The authors consider a detection network of sensors that measure intensity levels due to a source amidst background inside a two-dimensional monitoring area. The source intensity decays away from it possibly in discrete jumps, and the corresponding sensor measurements could be random due to the nature of source and background,...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2009

    Optimizing Link Assignment to Enhance Service in Probabilistic Network

    In this paper, the authors make minor adaptations to the well-known notion of probabilistic network from the machine learning community and use it as their communication model. They then formally define the above optimization problem as the Link Assignment for Successful Service problem (LASS). While LASS can be reduced to...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2009

    Efficient Privacy Preserving Protocols for Decentralized Computation of Reputation

    Reputation systems represent a key technology for securing distributed applications from misuse by dishonest entities. A reputation system computes reputation scores of the entities in the system, which helps single out those that are exhibiting less than desirable behavior. Examples of reputation systems may be found in several application domains:...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2009

    The Salvage Cache: A Fault-Tolerant Cache Architecture for Next-Generation Memory Technologies

    There has been much work on the next generation of memory technologies such as MRAM, RRAM and PRAM. Most of these are non-volatile in nature, and compared to SRAM, they are often denser, just as fast, and have much lower energy consumption. Using 3-D stacking technology, it has been proposed...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2009

    Developing Attack Defense Ideas for Ad Hoc Wireless Networks

    Ad hoc networks are natively cooperative systems in the sense that their nodes have to relay data to one another. The inherent drawback of this scheme is that it renders these networks susceptible to intruders. Collaborative attacks, in which various attackers may coordinate actions to hit the network stronger, are...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2009

    Polymorphing Software by Randomizing Data Structure Layout

    In this paper the authors introduce a new software polymorphism technique that randomizes program data structure layout. This technique will generate different data structure layouts for a program and thus diversify the binary code compiled from the same program source code. This technique can mitigate attacks (e.g., kernel rootkit attacks)...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2009

    VNsnap: Taking Snapshots of Virtual Networked Environments With Minimal Downtime

    A Virtual Networked Environment (VNE) consists of Virtual Machines (VMs) connected by a virtual network. It has been adopted to create "Virtual infrastructures" for individual users on a shared cloud computing infrastructure. The ability to take snapshots of an entire VNE - including images of the VMs with their execution,...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2009

    A Framework for Efficient Class-Based Sampling

    With an increasing requirement for network monitoring tools to classify traffic and track security threats, newer and efficient ways are needed for collecting traffic statistics and monitoring of network flows. However, traditional solutions based on random packet sampling treat all flows as equal and therefore, do not provide the flexibility...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2008

    Analyzing the Effectiveness of Multicore Scheduling Using Performance Counters

    In this paper, the authors analyze the impact of scheduling decisions on dynamic task performance. Performance behavior is analyzed utilizing support workloads from SPECWeb 2005 on a multicore hardware platform with an Apache web server. Hardware performance counter data is collected via extending the Linux scheduler and analysis is then...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2008

    An Access-Control Framework for WS-BPEL

    Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been proposed for specifying and orchestrating business processes, resulting in the WS-BPEL language. Even if WS-BPEL has been developed to specify automated business processes that orchestrate activities of multiple...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2007

    Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies

    In this paper, the authors develop a language and a reference architecture supporting the management and enforcement of authentication policies. Such language directly supports multi-factor authentication and the high level specification of authentication factors, in terms of conditions against the features of the various authentication mechanisms and modules. In addition...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2007

    Improving Password Security and Memorability to Protect Personal and Organizational Information

    Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method for authenticating users to determine access to such information is through the use of username password combinations. However, this is a weak method of authentication...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2007

    A Survey of Malware Detection Techniques

    Malware is a worldwide epidemic. Studies suggest that the impact of malware is getting worse. Malware detectors are the primary tools in defense against malware. The quality of such a detector is determined by the techniques it uses. It is therefore imperative that the authors paper malware detection techniques and...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics

    Dynamic malware analysis aims at revealing malware's runtime behavior. To evade analysis, advanced malware is able to detect the underlying analysis tool (e.g., one based on emulation.) On the other hand, existing malware-transparent analysis tools incur significant performance overhead, making them unsuitable for live malware monitoring and forensics. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2007

    A Survey of Malware Detection Techniques

    Malware is a worldwide epidemic. Studies suggest that the impact of malware is getting worse. Malware detectors are the primary tools in defense against malware. The quality of such a detector is determined by the techniques it uses. It is therefore imperative that the authors paper malware detection techniques and...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2013

    Parallel Maximum Clique Algorithms With Applications to Network Analysis and Storage

    The authors propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks ranging from 1000 to 100 million nodes. In a test on a social network with...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Parallel Dispatch Queue: A Queue-Based Programming Abstraction to Parallelize Fine-Grain Communication Protocols

    In this paper, the authors propose a novel queue-based programming abstraction, Parallel Dispatch Queue (PDQ) that enables efficient parallel execution of fine-grain software communication protocols. Parallel systems often use fine-grain software handlers to integrate a network message into computation. Executing such handlers in parallel requires access synchronization around resources. Much...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Sirocco: Cost-Effective Fine-Grain Distributed Shared Memory

    Software Fine-Grain Distributed Shared Memory (FGDSM) provides a simplified shared-memory programming interface with minimal or no hardware support. Originally software FGDSMs targeted uniprocessor-node parallel machines. This paper presents Sirocco, a family of software FGDSMs implemented on a network of low-cost SMPs. Sirocco takes full advantage of SMP nodes by implementing...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy

    The authors introduce mechanisms for secure keyword searches on a document server. They propose protocols with computational privacy, query correctness assurances and minimal or no leaks: the server either correctly executes client queries or (if it behaves maliciously) is immediately detected. The client is then provided with strong assurances proving...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2013

    Network Hypothesis Testing Using Mixed Kronecker Product Graph Models

    The recent interest in networks - social, physical, communication, information, etc. - has fueled a great deal of research on the analysis and modeling of graphs. However, many of the analyses have focused on a single large network (e.g., a sub-network sampled from Facebook). Although several studies have compared networks...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2007

    Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies

    In this paper, the authors develop a language and a reference architecture supporting the management and enforcement of authentication policies. Such language directly supports multi-factor authentication and the high level specification of authentication factors, in terms of conditions against the features of the various authentication mechanisms and modules. In addition...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2007

    Improving Password Security and Memorability to Protect Personal and Organizational Information

    Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method for authenticating users to determine access to such information is through the use of username password combinations. However, this is a weak method of authentication...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    Balancing Privacy and Fidelity in Packet Traces for Security Evaluation

    Security mechanisms, such as firewalls and intrusion detection systems, protect networks by generating security alarms and possibly filtering attack traffic, according to a specified security policy. Evaluation of such security mechanisms remains a challenge. In this paper, the authors examine the problem of compiling a set of high fidelity traffic...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2011

    Relational Active Learning for Joint Collective Classification Models

    In many network domains, labeled data may be costly to acquire - indicating a need for relational active learning methods. Recent paper has demonstrated that relational model performance can be improved by taking network structure into account when choosing instances to label. However, in collective inference settings, both model estimation...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2012

    Network Sampling Designs for Relational Classification

    Relational classification has been extensively studied recently due to its applications in social, biological, technological, and information networks. Much of the work in relational learning has focused on analyzing input data that comprise a single network. Although machine learning researchers have considered the issue of how to sample training and...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2012

    The Impact of Communication Structure and Interpersonal Dependencies on Distributed Teams

    In the past decade, the authors have witnessed an explosive growth of the Web, online communities, and social media. This has led to a substantial increase in the range and scope of electronic communication and distributed collaboration. In distributed teams, social communication is thought to be critical for creating and...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2013

    EasyScale: Easy Mapping for Large-Scale Network Security Experiments

    Network emulation enables network security evaluation using unmodified implementations. Experimental fidelity with emulation is higher than simulation through the integration of real hardware and systems, but the scalability of emulation testbeds is limited. Scaling techniques such as virtualization and real-time simulation enable larger scale experiments. Using scaling techniques for network...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Pegasus: Precision Hunting for Icebergs and Anomalies in Network Flows

    Accurate online network monitoring is crucial for detecting attacks, faults, and anomalies, and determining traffic properties across the network. With high bandwidth links and consequently increasing traffic volumes, it is difficult to collect and analyze detailed flow records in an online manner. Traditional solutions that decouple data collection from analysis...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2009

    The Salvage Cache: A Fault-Tolerant Cache Architecture for Next-Generation Memory Technologies

    There has been much work on the next generation of memory technologies such as MRAM, RRAM and PRAM. Most of these are non-volatile in nature, and compared to SRAM, they are often denser, just as fast, and have much lower energy consumption. Using 3-D stacking technology, it has been proposed...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Effective Management of DRAM Bandwidth in Multicore Processors

    The two technology trends of increasing transistors per die and limited power budgets have driven every major processor vendor to multicore architectures. Technology trends are leading to increasing number of cores on chip. All these cores inherently share the DRAM bandwidth. The on-chip cache resources are limited and in many...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2011

    Memory Energy Management for an Enterprise Decision Support System

    Energy efficiency is an important factor in designing and configuring enterprise servers. In these servers, memory may consume 40% of the total system power. Different memory configurations (sizes, numbers of ranks, speeds, etc.) can have significant impacts on the performance and energy consumption of enterprise workloads. Many of these workloads,...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2008

    Analyzing the Effectiveness of Multicore Scheduling Using Performance Counters

    In this paper, the authors analyze the impact of scheduling decisions on dynamic task performance. Performance behavior is analyzed utilizing support workloads from SPECWeb 2005 on a multicore hardware platform with an Apache web server. Hardware performance counter data is collected via extending the Linux scheduler and analysis is then...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Using Systems Thinking to Teach ERP Project Implementation (TERPPJ)

    This paper presents a system model of ERP implementation based on now-a-days case study and literatures. The relationships in the model are designed to be simple and functional and do not necessarily represent any particular business environments. It is meant to be a generic ERP implementation conceptual model with implications...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2008

    An Access-Control Framework for WS-BPEL

    Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been proposed for specifying and orchestrating business processes, resulting in the WS-BPEL language. Even if WS-BPEL has been developed to specify automated business processes that orchestrate activities of multiple...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Coordinating Accessibility versus Restrictions in Distributed Object Systems

    This paper aims to provide administrators with services for managing permissions in a distributed object system, by connecting business-level tasks to access controls on low level functions. Specifically, the techniques connect abilities (to complete externally invoked functions) to the access controls on individual functions, across all servers. The authors main...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection

    A Cross Site Request Forgery (CSRF) attack occurs when a user's web browser is instructed by a malicious webpage to send a request to a vulnerable web site, resulting in the vulnerable web site performing actions not intended by the user. CSRF vulnerabilities are very common, and consequences of such...

    Provided By Purdue Federal Credit Union