University of Geneva

Displaying 1-16 of 16 results

  • White Papers // Sep 2013

    Model Checking Authorization Requirements in Business Processes

    Business processes are usually expected to meet high level authorization requirements (e.g., separation of duty). Since violation of authorization requirements may lead to economic losses and/or legal implications, ensuring that a business process meets them is of paramount importance. Previous work showed that model checking can be profitably used to...

    Provided By University of Geneva

  • White Papers // Mar 2013

    Modeling and Reasoning About Business Processes Under Authorization Constraints: A Planning-Based Approach

    Business processes under authorization control are sets of coordinated activities subject to a security policy stating which agent can access which resource. Their behavior is difficult to predict due to the complex and unexpected interleaving of different execution flows within the process. Therefore, serious flaws may go undetected and manifest...

    Provided By University of Geneva

  • White Papers // Dec 2012

    Relationship-Aware Sequential Pattern Mining

    Relationship-aware sequential pattern mining is the problem of mining frequent patterns in sequences in which the events of a sequence are mutually related by one or more concepts from some respective hierarchical taxonomy, based on the type of the events. Additionally events themselves are also described with a certain number...

    Provided By University of Geneva

  • White Papers // Sep 2012

    Security Issues in the Android Cross-Layer Architecture

    The security of Android has been recently challenged by the discovery of a number of vulnerabilities involving different layers of the Android stack. The authors argue that such vulnerabilities are largely related to the interplay among layers com-posing the Android stack. Thus, they also argue that such interplay has been...

    Provided By University of Geneva

  • White Papers // Mar 2012

    EVILSEED: A Guided Approach to Finding Malicious Web Pages

    Malicious web pages that use drive-by download attacks or social engineering techniques to install unwanted software on a user's computer have become the main avenue for the propagation of malicious code. To search for malicious web pages, the first step is typically to use a crawler to collect URLs that...

    Provided By University of Geneva

  • White Papers // Feb 2012

    Key Recycling in Authentication

    In their paper on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely...

    Provided By University of Geneva

  • White Papers // Mar 2011

    Trust Management for Selecting Trustworthy Access Points

    Both free and low-priced mobile wireless networks are expanding and its users are more numerous every day. This success is particularly due to the mobility offered to users. These networks have promoted and widespread the success and availability of mobile devices and their access technologies such as Wi-Fi, WiMAX and...

    Provided By University of Geneva

  • White Papers // Jan 2011

    Virtual Reality Software and Technology

    Virtual Reality (VR) refers to a technology which is capable of shifting a subject into a different environment without physically moving him/her. To this end the inputs into the subject's sensory organs are manipulated in such a way, that the perceived environment is associated with the desired Virtual Environment (VE)...

    Provided By University of Geneva

  • White Papers // Jan 2011

    Tree-Pattern Similarity Estimation for Scalable Content-Based Routing

    With the advent of XML as the de facto language for data publishing and exchange, scalable distribution of XML data to large, dynamic populations of consumers remains an important challenge. Content-based publish/subscribe systems offer a convenient design paradigm, as most of the complexity related to addressing and routing is encapsulated...

    Provided By University of Geneva

  • White Papers // Dec 2010

    Security Validation of Business Processes via Model-checking

    More and more industrial activities are captured through Business Processes (BPs). To evaluate whether a BP under-design enjoys certain security desiderata is hardly manageable by business analysts without tool support, as the BP runtime environment is highly dynamic (e.g., task delegation). Automated reasoning techniques such as model checking can provide...

    Provided By University of Geneva

  • White Papers // Nov 2010

    Leverage Bubble

    Leverage is strongly related to liquidity in a market and lack of liquidity is considered a cause and/or consequence of the recent financial crisis. A repurchase agreement is a financial instrument where a security is sold simultaneously with an agreement to buy it back at a later date. Repurchase agreements...

    Provided By University of Geneva

  • White Papers // Oct 2010

    Algorithms for Scheduling With Power Control in Wireless Networks

    In this paper the authors study the following problem of scheduling with power control in wireless networks: given a set of communication requests, one needs to assign the powers of the network nodes, and schedule the transmissions so that they can be done in a minimum time, taking into account...

    Provided By University of Geneva

  • White Papers // Sep 2010

    VHDL Modules and Circuits for Underwater Optical Wireless Communication Systems

    Underwater wireless optical communication has been used for establish a link between mobile vehicles and/or fixed nodes because light, especially in the blue/green region, allows to achieve higher data-rate than acoustical or electromagnetic waves for moderate distances. The here proposed work has the aim to pave the way for diffuse...

    Provided By University of Geneva

  • White Papers // Sep 2009

    Collaborative QoS-Information Sharing for Mobile Service Users: A Web 2.0 Business Model Proposal

    Mobile Service Providers (MoSPs) emerge, propelled by ubiquitous availability of mobile devices and wireless communication infrastructures. MoSPs' customers satisfaction and consequently their revenues, largely depend on the Quality of Service (QoS) offered by Wireless Network Providers (WNPs) at a particular location and time of a mobile service usage. This paper...

    Provided By University of Geneva

  • White Papers // May 2009

    Formal Specification and Automatic Analysis of Business Processes Under Authorization Constraints: An Action-Based Approach

    The authors present an approach to the formal specification and automatic analysis of business processes under authorization constraints based on the action language C. The use of C allows for a natural and concise modeling of the business process and the associated security policy and for the automatic analysis of...

    Provided By University of Geneva

  • White Papers // Jan 2009

    Incomplete Information, Idiosyncratic Volatility And Stock Returns

    The authors develop a model of firm investment under incomplete information that explains why idiosyncratic volatility and stock returns are related. When the unobserved state variable proxies for business cycles, they show that a properly calibrated version of the model generates a negative relation due to the natural asymmetry in...

    Provided By University of Geneva

  • White Papers // Mar 2012

    EVILSEED: A Guided Approach to Finding Malicious Web Pages

    Malicious web pages that use drive-by download attacks or social engineering techniques to install unwanted software on a user's computer have become the main avenue for the propagation of malicious code. To search for malicious web pages, the first step is typically to use a crawler to collect URLs that...

    Provided By University of Geneva

  • White Papers // Sep 2009

    Collaborative QoS-Information Sharing for Mobile Service Users: A Web 2.0 Business Model Proposal

    Mobile Service Providers (MoSPs) emerge, propelled by ubiquitous availability of mobile devices and wireless communication infrastructures. MoSPs' customers satisfaction and consequently their revenues, largely depend on the Quality of Service (QoS) offered by Wireless Network Providers (WNPs) at a particular location and time of a mobile service usage. This paper...

    Provided By University of Geneva

  • White Papers // Oct 2010

    Algorithms for Scheduling With Power Control in Wireless Networks

    In this paper the authors study the following problem of scheduling with power control in wireless networks: given a set of communication requests, one needs to assign the powers of the network nodes, and schedule the transmissions so that they can be done in a minimum time, taking into account...

    Provided By University of Geneva

  • White Papers // Jan 2011

    Virtual Reality Software and Technology

    Virtual Reality (VR) refers to a technology which is capable of shifting a subject into a different environment without physically moving him/her. To this end the inputs into the subject's sensory organs are manipulated in such a way, that the perceived environment is associated with the desired Virtual Environment (VE)...

    Provided By University of Geneva

  • White Papers // Mar 2011

    Trust Management for Selecting Trustworthy Access Points

    Both free and low-priced mobile wireless networks are expanding and its users are more numerous every day. This success is particularly due to the mobility offered to users. These networks have promoted and widespread the success and availability of mobile devices and their access technologies such as Wi-Fi, WiMAX and...

    Provided By University of Geneva

  • White Papers // Nov 2010

    Leverage Bubble

    Leverage is strongly related to liquidity in a market and lack of liquidity is considered a cause and/or consequence of the recent financial crisis. A repurchase agreement is a financial instrument where a security is sold simultaneously with an agreement to buy it back at a later date. Repurchase agreements...

    Provided By University of Geneva

  • White Papers // Jan 2009

    Incomplete Information, Idiosyncratic Volatility And Stock Returns

    The authors develop a model of firm investment under incomplete information that explains why idiosyncratic volatility and stock returns are related. When the unobserved state variable proxies for business cycles, they show that a properly calibrated version of the model generates a negative relation due to the natural asymmetry in...

    Provided By University of Geneva

  • White Papers // Jan 2011

    Tree-Pattern Similarity Estimation for Scalable Content-Based Routing

    With the advent of XML as the de facto language for data publishing and exchange, scalable distribution of XML data to large, dynamic populations of consumers remains an important challenge. Content-based publish/subscribe systems offer a convenient design paradigm, as most of the complexity related to addressing and routing is encapsulated...

    Provided By University of Geneva

  • White Papers // Feb 2012

    Key Recycling in Authentication

    In their paper on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely...

    Provided By University of Geneva

  • White Papers // Sep 2012

    Security Issues in the Android Cross-Layer Architecture

    The security of Android has been recently challenged by the discovery of a number of vulnerabilities involving different layers of the Android stack. The authors argue that such vulnerabilities are largely related to the interplay among layers com-posing the Android stack. Thus, they also argue that such interplay has been...

    Provided By University of Geneva

  • White Papers // Dec 2012

    Relationship-Aware Sequential Pattern Mining

    Relationship-aware sequential pattern mining is the problem of mining frequent patterns in sequences in which the events of a sequence are mutually related by one or more concepts from some respective hierarchical taxonomy, based on the type of the events. Additionally events themselves are also described with a certain number...

    Provided By University of Geneva

  • White Papers // Sep 2010

    VHDL Modules and Circuits for Underwater Optical Wireless Communication Systems

    Underwater wireless optical communication has been used for establish a link between mobile vehicles and/or fixed nodes because light, especially in the blue/green region, allows to achieve higher data-rate than acoustical or electromagnetic waves for moderate distances. The here proposed work has the aim to pave the way for diffuse...

    Provided By University of Geneva

  • White Papers // Mar 2013

    Modeling and Reasoning About Business Processes Under Authorization Constraints: A Planning-Based Approach

    Business processes under authorization control are sets of coordinated activities subject to a security policy stating which agent can access which resource. Their behavior is difficult to predict due to the complex and unexpected interleaving of different execution flows within the process. Therefore, serious flaws may go undetected and manifest...

    Provided By University of Geneva

  • White Papers // May 2009

    Formal Specification and Automatic Analysis of Business Processes Under Authorization Constraints: An Action-Based Approach

    The authors present an approach to the formal specification and automatic analysis of business processes under authorization constraints based on the action language C. The use of C allows for a natural and concise modeling of the business process and the associated security policy and for the automatic analysis of...

    Provided By University of Geneva

  • White Papers // Dec 2010

    Security Validation of Business Processes via Model-checking

    More and more industrial activities are captured through Business Processes (BPs). To evaluate whether a BP under-design enjoys certain security desiderata is hardly manageable by business analysts without tool support, as the BP runtime environment is highly dynamic (e.g., task delegation). Automated reasoning techniques such as model checking can provide...

    Provided By University of Geneva

  • White Papers // Sep 2013

    Model Checking Authorization Requirements in Business Processes

    Business processes are usually expected to meet high level authorization requirements (e.g., separation of duty). Since violation of authorization requirements may lead to economic losses and/or legal implications, ensuring that a business process meets them is of paramount importance. Previous work showed that model checking can be profitably used to...

    Provided By University of Geneva