University of Memphis

Displaying 1-21 of 21 results

  • White Papers // Jan 2014

    Delegation Across Storage Clouds: On-Boarding Federation as a Case Study

    As the volume of digital data rapidly increases, storage clouds are becoming a popular solution for both enterprise and personal data, and the number of storage cloud solutions is also increasing. However, these solutions do not yet deal with the need of customers for interoperability and data migration from one...

    Provided By University of Memphis

  • White Papers // May 2013

    Improving Virtual Machine Migration in Federated Cloud Environments

    Cloud federation is the future of the cloud computing. In such new emerging scenarios, the \"Hot\" and \"Cold\" migrations imply the movement of a virtual machine disk-image from a server placed in a cloud provider to a server placed in another one, with a consequent consumption of bandwidth and cloud...

    Provided By University of Memphis

  • White Papers // May 2013

    Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication

    Cloud federation aims to cost-effective assets and resources optimization among heterogeneous environments where clouds can cooperate together with the goal of obtaining \"Unbounded\" computation resources, hence new business opportunities. This paper describes an architecture for the federation establishment, where clouds that need external resources ask to federated clouds the renting...

    Provided By University of Memphis

  • White Papers // May 2013

    How to Federate VISION Clouds Through SAML/Shibboleth Authentication

    Federation is currently finding a wide argumentation in Cloud Computing. The federation among cloud operators should allow new opportunities and businesses even making the role of SMEs crucial in these new scenarios. In this paper, the authors provide a solution on how to federate Storage Cloud providers, enabling the transparent...

    Provided By University of Memphis

  • White Papers // May 2013

    A Remote Attestation Approach for a Secure Virtual Machine Migration in Federated Cloud Environments

    Now-a-days, cloud computing is considered as a new charming technology, where new opportunities in ICT world are becoming real. Cloud is appealing many IT companies, but the largest business is in hand of big cloud operators. In the near future the scenario could change, and becoming much more complex even...

    Provided By University of Memphis

  • White Papers // Oct 2012

    SAaaS: a Framework for Volunteer-Based Sensing Clouds

    Cloud computing has emerged as a popular solution to provide cheap, elastic and easy access to computing and storage resources. However, a key drawback of current cloud solutions is that they do not include mechanisms for interaction with the physical world. This paper intends to contribute to the design of...

    Provided By University of Memphis

  • White Papers // May 2012

    The Cloud@Home Project: Towards a New Enhanced Computing Paradigm

    Cloud Computing is emerging as a promising paradigm capable of providing a flexible, dynamic, resilient and cost effective infrastructure for both academic and business environments. The aim of this paper is to create a new Cloud paradigm, "Cloud@Home", in which both the commercial/business and the volunteer/scientific viewpoints coexist. The Cloud@Home...

    Provided By University of Memphis

  • White Papers // Dec 2011

    Sentry Selection in Sensor Networks: Theory and Algorithms

    The authors study the geometric aspects of the sentry selection problem for a sensor network with randomly distributed sensors each of which covers a small disc. The problem is to partition the sensors into a predetermined number of groups, so that, for each group, the sensing regions of the sensors...

    Provided By University of Memphis

  • White Papers // Feb 2011

    An Approach for Security, Performance, and Generic Data Retrieval in RESERVOIR Clouds

    RESERVOIR is a Cloud service provider able to arrange virtual environments in order to provide on-demand Infrastructure-as-a-Services (IaaSs) to its clients. Typically, the RESERVOIR's clients use such services to deploy their own software platforms. However, clients need to logically identify both the entities related to their software platforms and the...

    Provided By University of Memphis

  • White Papers // Aug 2010

    Exploring the Impact of Context Sensitivity on Blended Analysis

    This paper explores the use of context sensitivity both intra- and inter-procedurally in a blended (static/dynamic) program analysis for identifying source of object churn in framework-intensive Web-based applications. Empirical experiments with an existing blended analysis algorithm compare combinations of use of a context-insensitive call graph with a context-sensitive calling context...

    Provided By University of Memphis

  • White Papers // Jul 2010

    Password Security Through Negative Filtering

    The purpose of an authentication system is to identify and verify incoming authentication requests comparing with some form of (stored) user identity. This stored user profile is at risk of being hacked and exploited by the attackers. The Negative Filtering or Negative Authentication (NA) approach utilizes a form of complement...

    Provided By University of Memphis

  • White Papers // Jul 2010

    Evolving Gaming Strategies for Attacker-Defender in a Simulated Network Environment

    This work investigates an evolutionary approach to generate gaming strategies for the Attacker-Defender or Intruder-Administrator in simulated cyber warfare. Given a network environment, attack graphs are defined in an anticipation game framework to generate action strategies by analyzing (local/global) vulnerabilities and security measures. The proposed approach extends an Anticipation Game...

    Provided By University of Memphis

  • White Papers // May 2010

    Techniques for Validation and Controlled Execution of Processes, Codes and Data: A Survey

    Various security mechanisms are available to validate, authenticate and permit codes, data and scripts for executing in a computing device. Accordingly, different techniques and tools have been developed to preserve integrity and confidentiality at the process, protocol, system and communication levels. For example, Trusted Platform Module, Intel Trusted Execution Technology...

    Provided By University of Memphis

  • White Papers // May 2010

    A Parallel Framework for Multi-Objective Evolutionary Optimization

    This work focuses on the development of a parallel framework method to improve the effectiveness and the efficiency of the obtained solutions by Multi-objective Evolutionary Algorithms. Specifically, a parallel architecture based on JavaSpaces technology and an island paradigm model is proposed and tested on two important and complex computational problems:...

    Provided By University of Memphis

  • White Papers // Jan 2010

    A Stochastic Game Model With Imperfect Information in Cyber Security

    While there are significant advances in information technology and infrastructure which offer new opportunities, cyberspace is still far from completely secured. Recently, researchers have started exploring the applicability of game theory to address the cyber security problem. The interaction between the attacks and the defense mechanisms can be considered as...

    Provided By University of Memphis

  • White Papers // Oct 2009

    AVOIDIT: A Cyber Attack Taxonomy

    Cyber attacks have greatly increased over the years, where the attackers have progressively improved in devising attacks towards a specific target. To aid in identifying and defending against cyber attacks the authors proposes a cyber attack taxonomy called AVOIDIT (Attack Vector, Operational Impact, Defense, Information Impact, and Target). The authors...

    Provided By University of Memphis

  • White Papers // Sep 2009

    A Survey of Game Theory as Applied to Network Security

    Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two decades. However, the network security problem is far from completely solved. Researchers have been exploring the applicability of game theoretic approaches to address...

    Provided By University of Memphis

  • White Papers // Aug 2009

    An Automated Analysis Methodology to Detect Inconsistencies in Web Services With WSDL Interfaces

    Web Service Definition Language (WSDL) is being increasingly used to specify web service interfaces. Specifications of this type, however, are often incomplete or imprecise, which can create difficulties for client developers who rely on the WSDL files. To address this problem a semi-automated methodology that probes a web service with...

    Provided By University of Memphis

  • White Papers // May 2009

    Clustering of Defect Reports Using Graph Partitioning Algorithms

    The authors present in this paper several solutions to the challenging task of clustering software defect reports. Clustering defect reports can be very useful for prioritizing the testing effort and to better understand the nature of software defects. Despite some challenges with the language used and semi-structured nature of defect...

    Provided By University of Memphis

  • White Papers // Apr 2009

    An Integrated Cyber Security Monitoring System Using Correlation-Based Techniques

    This paper proposes an adaptive cyber security monitoring system that integrates a number of component techniques to collect time-series situation information, perform intrusion detection, keep track of event evolution, and characterize and identify security events so corresponding defense actions can be taken in a timely and effective manner. Particularly, the...

    Provided By University of Memphis

  • White Papers // Jan 2009

    Characterizing Comment Spam in the Blogosphere Through Content Analysis

    Spams are no longer limited to emails and webpages. The increasing penetration of spam in the form of comments in blogs and social networks has started becoming a nuisance and potential threat. In this work, the author explores the challenges posed by this type of spam in the blogosphere with...

    Provided By University of Memphis

  • White Papers // Jan 2009

    Characterizing Comment Spam in the Blogosphere Through Content Analysis

    Spams are no longer limited to emails and webpages. The increasing penetration of spam in the form of comments in blogs and social networks has started becoming a nuisance and potential threat. In this work, the author explores the challenges posed by this type of spam in the blogosphere with...

    Provided By University of Memphis

  • White Papers // Oct 2009

    AVOIDIT: A Cyber Attack Taxonomy

    Cyber attacks have greatly increased over the years, where the attackers have progressively improved in devising attacks towards a specific target. To aid in identifying and defending against cyber attacks the authors proposes a cyber attack taxonomy called AVOIDIT (Attack Vector, Operational Impact, Defense, Information Impact, and Target). The authors...

    Provided By University of Memphis

  • White Papers // Apr 2009

    An Integrated Cyber Security Monitoring System Using Correlation-Based Techniques

    This paper proposes an adaptive cyber security monitoring system that integrates a number of component techniques to collect time-series situation information, perform intrusion detection, keep track of event evolution, and characterize and identify security events so corresponding defense actions can be taken in a timely and effective manner. Particularly, the...

    Provided By University of Memphis

  • White Papers // May 2010

    Techniques for Validation and Controlled Execution of Processes, Codes and Data: A Survey

    Various security mechanisms are available to validate, authenticate and permit codes, data and scripts for executing in a computing device. Accordingly, different techniques and tools have been developed to preserve integrity and confidentiality at the process, protocol, system and communication levels. For example, Trusted Platform Module, Intel Trusted Execution Technology...

    Provided By University of Memphis

  • White Papers // Jan 2010

    A Stochastic Game Model With Imperfect Information in Cyber Security

    While there are significant advances in information technology and infrastructure which offer new opportunities, cyberspace is still far from completely secured. Recently, researchers have started exploring the applicability of game theory to address the cyber security problem. The interaction between the attacks and the defense mechanisms can be considered as...

    Provided By University of Memphis

  • White Papers // Sep 2009

    A Survey of Game Theory as Applied to Network Security

    Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two decades. However, the network security problem is far from completely solved. Researchers have been exploring the applicability of game theoretic approaches to address...

    Provided By University of Memphis

  • White Papers // Jul 2010

    Password Security Through Negative Filtering

    The purpose of an authentication system is to identify and verify incoming authentication requests comparing with some form of (stored) user identity. This stored user profile is at risk of being hacked and exploited by the attackers. The Negative Filtering or Negative Authentication (NA) approach utilizes a form of complement...

    Provided By University of Memphis

  • White Papers // Jul 2010

    Evolving Gaming Strategies for Attacker-Defender in a Simulated Network Environment

    This work investigates an evolutionary approach to generate gaming strategies for the Attacker-Defender or Intruder-Administrator in simulated cyber warfare. Given a network environment, attack graphs are defined in an anticipation game framework to generate action strategies by analyzing (local/global) vulnerabilities and security measures. The proposed approach extends an Anticipation Game...

    Provided By University of Memphis

  • White Papers // May 2010

    A Parallel Framework for Multi-Objective Evolutionary Optimization

    This work focuses on the development of a parallel framework method to improve the effectiveness and the efficiency of the obtained solutions by Multi-objective Evolutionary Algorithms. Specifically, a parallel architecture based on JavaSpaces technology and an island paradigm model is proposed and tested on two important and complex computational problems:...

    Provided By University of Memphis

  • White Papers // Aug 2009

    An Automated Analysis Methodology to Detect Inconsistencies in Web Services With WSDL Interfaces

    Web Service Definition Language (WSDL) is being increasingly used to specify web service interfaces. Specifications of this type, however, are often incomplete or imprecise, which can create difficulties for client developers who rely on the WSDL files. To address this problem a semi-automated methodology that probes a web service with...

    Provided By University of Memphis

  • White Papers // May 2009

    Clustering of Defect Reports Using Graph Partitioning Algorithms

    The authors present in this paper several solutions to the challenging task of clustering software defect reports. Clustering defect reports can be very useful for prioritizing the testing effort and to better understand the nature of software defects. Despite some challenges with the language used and semi-structured nature of defect...

    Provided By University of Memphis

  • White Papers // Dec 2011

    Sentry Selection in Sensor Networks: Theory and Algorithms

    The authors study the geometric aspects of the sentry selection problem for a sensor network with randomly distributed sensors each of which covers a small disc. The problem is to partition the sensors into a predetermined number of groups, so that, for each group, the sensing regions of the sensors...

    Provided By University of Memphis

  • White Papers // Aug 2010

    Exploring the Impact of Context Sensitivity on Blended Analysis

    This paper explores the use of context sensitivity both intra- and inter-procedurally in a blended (static/dynamic) program analysis for identifying source of object churn in framework-intensive Web-based applications. Empirical experiments with an existing blended analysis algorithm compare combinations of use of a context-insensitive call graph with a context-sensitive calling context...

    Provided By University of Memphis

  • White Papers // May 2012

    The Cloud@Home Project: Towards a New Enhanced Computing Paradigm

    Cloud Computing is emerging as a promising paradigm capable of providing a flexible, dynamic, resilient and cost effective infrastructure for both academic and business environments. The aim of this paper is to create a new Cloud paradigm, "Cloud@Home", in which both the commercial/business and the volunteer/scientific viewpoints coexist. The Cloud@Home...

    Provided By University of Memphis

  • White Papers // May 2013

    Improving Virtual Machine Migration in Federated Cloud Environments

    Cloud federation is the future of the cloud computing. In such new emerging scenarios, the \"Hot\" and \"Cold\" migrations imply the movement of a virtual machine disk-image from a server placed in a cloud provider to a server placed in another one, with a consequent consumption of bandwidth and cloud...

    Provided By University of Memphis

  • White Papers // May 2013

    A Remote Attestation Approach for a Secure Virtual Machine Migration in Federated Cloud Environments

    Now-a-days, cloud computing is considered as a new charming technology, where new opportunities in ICT world are becoming real. Cloud is appealing many IT companies, but the largest business is in hand of big cloud operators. In the near future the scenario could change, and becoming much more complex even...

    Provided By University of Memphis

  • White Papers // May 2013

    Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication

    Cloud federation aims to cost-effective assets and resources optimization among heterogeneous environments where clouds can cooperate together with the goal of obtaining \"Unbounded\" computation resources, hence new business opportunities. This paper describes an architecture for the federation establishment, where clouds that need external resources ask to federated clouds the renting...

    Provided By University of Memphis

  • White Papers // May 2013

    How to Federate VISION Clouds Through SAML/Shibboleth Authentication

    Federation is currently finding a wide argumentation in Cloud Computing. The federation among cloud operators should allow new opportunities and businesses even making the role of SMEs crucial in these new scenarios. In this paper, the authors provide a solution on how to federate Storage Cloud providers, enabling the transparent...

    Provided By University of Memphis

  • White Papers // Jan 2014

    Delegation Across Storage Clouds: On-Boarding Federation as a Case Study

    As the volume of digital data rapidly increases, storage clouds are becoming a popular solution for both enterprise and personal data, and the number of storage cloud solutions is also increasing. However, these solutions do not yet deal with the need of customers for interoperability and data migration from one...

    Provided By University of Memphis

  • White Papers // Oct 2012

    SAaaS: a Framework for Volunteer-Based Sensing Clouds

    Cloud computing has emerged as a popular solution to provide cheap, elastic and easy access to computing and storage resources. However, a key drawback of current cloud solutions is that they do not include mechanisms for interaction with the physical world. This paper intends to contribute to the design of...

    Provided By University of Memphis

  • White Papers // Feb 2011

    An Approach for Security, Performance, and Generic Data Retrieval in RESERVOIR Clouds

    RESERVOIR is a Cloud service provider able to arrange virtual environments in order to provide on-demand Infrastructure-as-a-Services (IaaSs) to its clients. Typically, the RESERVOIR's clients use such services to deploy their own software platforms. However, clients need to logically identify both the entities related to their software platforms and the...

    Provided By University of Memphis