University of Oran

Displaying 1-6 of 6 results

  • White Papers // Feb 2013

    Towards Secure Provenance-Based Access Control in Cloud Environments

    As organizations become increasingly reliant on cloud computing for servicing their data storage requirements, the need to govern access control at finer granularities becomes particularly important. This challenge is increased by the lack of policy supporting data migration across geographic boundaries and through organizations with divergent regulatory policies. In this...

    Provided By University of Oran

  • White Papers // Oct 2012

    Buddyguard: A Buddy System for Fast and Reliable Detection of IP Prefix Anomalies

    Due to operational malpractice or security attacks, an IP prefix (i.e., a block of IP addresses) can undergo many types of routing anomalies. Perhaps the most well-known of such anomalies is prefix hijacking, where an attacker hijacks traffic meant to reach the legitimate user of a prefix. Anomalies can also...

    Provided By University of Oran

  • White Papers // Dec 2011

    Memory-Efficient Garbled Circuit Generation for Mobile Devices

    Secure Function Evaluation (SFE) on mobile devices, such as Smartphones, creates compelling new applications such as privacy-preserving bartering. Generating custom garbled circuits on Smartphones, however, is infeasible for all but the most trivial problems due to the high memory overhead incurred. In this paper, the authors develop a new methodology...

    Provided By University of Oran

  • White Papers // Dec 2010

    Consistency Management of Replicas in Wireless Grid Environment

    In a wireless network, a user has the possibility of remaining link while moving in a more or less spread geographical perimeter, it is the reason for which they intend to sometimes speak about "Mobility". The wireless Grid represent a new type of network of distribution of means linking up...

    Provided By University of Oran

  • White Papers // Mar 2010

    Temporal Deductive Verification of Basic ASM Models

    Abstract State Machines (ASMs, for short) provide a practical new computational model which has been applied in the area of software engineering for systems design and analysis. However, reasoning about ASM models occurs, not within a formal deductive system, but basically in the classical informal proofs style of mathematics. Several...

    Provided By University of Oran

  • White Papers // Jun 2009

    A Consistency Protocol Multi-Layer for Replicas Management in Large Scale Systems

    Large scale systems such as computational Grid is a distributed computing infrastructure that can provide globally available network resources. The evolution of information processing systems in Data Grid is characterized by a strong decentralization of data in several fields whose objective is to ensure the availability and the reliability of...

    Provided By University of Oran

  • White Papers // Dec 2011

    Memory-Efficient Garbled Circuit Generation for Mobile Devices

    Secure Function Evaluation (SFE) on mobile devices, such as Smartphones, creates compelling new applications such as privacy-preserving bartering. Generating custom garbled circuits on Smartphones, however, is infeasible for all but the most trivial problems due to the high memory overhead incurred. In this paper, the authors develop a new methodology...

    Provided By University of Oran

  • White Papers // Jun 2009

    A Consistency Protocol Multi-Layer for Replicas Management in Large Scale Systems

    Large scale systems such as computational Grid is a distributed computing infrastructure that can provide globally available network resources. The evolution of information processing systems in Data Grid is characterized by a strong decentralization of data in several fields whose objective is to ensure the availability and the reliability of...

    Provided By University of Oran

  • White Papers // Dec 2010

    Consistency Management of Replicas in Wireless Grid Environment

    In a wireless network, a user has the possibility of remaining link while moving in a more or less spread geographical perimeter, it is the reason for which they intend to sometimes speak about "Mobility". The wireless Grid represent a new type of network of distribution of means linking up...

    Provided By University of Oran

  • White Papers // Mar 2010

    Temporal Deductive Verification of Basic ASM Models

    Abstract State Machines (ASMs, for short) provide a practical new computational model which has been applied in the area of software engineering for systems design and analysis. However, reasoning about ASM models occurs, not within a formal deductive system, but basically in the classical informal proofs style of mathematics. Several...

    Provided By University of Oran

  • White Papers // Feb 2013

    Towards Secure Provenance-Based Access Control in Cloud Environments

    As organizations become increasingly reliant on cloud computing for servicing their data storage requirements, the need to govern access control at finer granularities becomes particularly important. This challenge is increased by the lack of policy supporting data migration across geographic boundaries and through organizations with divergent regulatory policies. In this...

    Provided By University of Oran

  • White Papers // Oct 2012

    Buddyguard: A Buddy System for Fast and Reliable Detection of IP Prefix Anomalies

    Due to operational malpractice or security attacks, an IP prefix (i.e., a block of IP addresses) can undergo many types of routing anomalies. Perhaps the most well-known of such anomalies is prefix hijacking, where an attacker hijacks traffic meant to reach the legitimate user of a prefix. Anomalies can also...

    Provided By University of Oran