University of Peloponnese

Displaying 1-27 of 27 results

  • White Papers // Jan 2014

    Let SDN Be Your Eyes: Secure Forensics in Data Center Networks

    Discovering the causes of incorrect behavior in large networks is often difficult. This difficulty is compounded when some machines in the network are compromised, since these compromised machines may use deception or tamper with data to frustrate forensic analysis. Recently proposed forensic tools enable administrators to learn the causes of...

    Provided By University of Peloponnese

  • White Papers // Dec 2013

    Elliptic Curve Cryptography in Practice

    In this paper, the authors perform a review of Elliptic Curve Cryptography (ECC), as it is used in practice today, in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. They study four popular protocols that make use of this type of public-key cryptography: bitcoin, Secure...

    Provided By University of Peloponnese

  • White Papers // Aug 2013

    Distributed Time-Aware Provenance

    The ability to reason about changes in a distributed system's state enables network administrators to better diagnose protocol mis-configurations, detect intrusions, and pinpoint performance bottlenecks. The authors propose a novel provenance model called Distributed Time-aware Provenance (DTaP) that aids forensics and debugging in distributed systems by explicitly representing time, distributed...

    Provided By University of Peloponnese

  • White Papers // Aug 2013

    PROPOLIS: Provisioned Analysis of DataCentric Processes

    In this paper, the authors consider the analysis of data-centric process-based applications, namely applications that depend on an underlying database and whose control is guided by a finite state transition system. They observe that analysts of such applications often want to do more than analyze a specific instance of the...

    Provided By University of Peloponnese

  • White Papers // Jan 2013

    Throughput Guarantees Through Maximal Scheduling in Wireless Networks

    The authors address the question of providing throughput guarantees through distributed scheduling, which has remained an open problem for some time. They consider a simple distributed scheduling strategy, maximal scheduling, and prove that it attains a guaranteed fraction of the maximum throughput region in arbitrary wireless networks. The guaranteed fraction...

    Provided By University of Peloponnese

  • White Papers // Jan 2013

    A Scalable, Low-Overhead Rate Control Algorithm for Multirate Multicast Sessions

    In multi-rate multicasting, different users (receivers) within the same multicast group can receive service at different rates, depending on the user requirements and the network congestion level. Compared to unirate multicasting, this provides more flexibility to the user, and allows more efficient usage of the network resources. In this paper,...

    Provided By University of Peloponnese

  • White Papers // Dec 2012

    A Propagation Model for Provenance Views of Public/Private Workflows

    The authors explain the problem of concealing functionality of a proprietary or private module when provenance information is shown over repeated executions of a workflow which contains both public and private modules. They show that G-privacy cannot be achieved simply by combining solutions for individual private modules; data hiding must...

    Provided By University of Peloponnese

  • White Papers // Dec 2012

    Exploiting Metric Structure for Efficient Private Query Release

    The authors consider the problem of privately answering queries defined on databases which are collections of points belonging to some metric space. They give simple, computationally efficient algorithms for answering distance queries defined over an arbitrary metric. Distance queries are specified by points in the metric space, and ask for...

    Provided By University of Peloponnese

  • White Papers // Oct 2012

    Simple and Nearly Optimal Multi-Item Auctions

    The authors provide a Polynomial Time Approximation Scheme (PTAS) for the Bayesian optimal multiitem multi-bidder auction problem under two conditions. First, bidders are independent, have additive valuations and are from the same population. Second, every bidder's value distributions of items are independent but not necessarily identical Monotone Hazard Rate (MHR)...

    Provided By University of Peloponnese

  • White Papers // May 2012

    First Passage Time Problems With Applications to Synchronization

    First passage time problems arise in many fields, but few of them are explicitly solved. Motivated by an application to synchronization of clocks, this paper obtains the probability distribution for the first passage time for a Brownian motion with quadratic drift to exit from two constant barriers that are not...

    Provided By University of Peloponnese

  • White Papers // Mar 2012

    Reliable Client Accounting for P2P-Infrastructure Hybrids

    Content Distribution Networks (CDNs) have started to adopt hybrid designs, which employ both dedicated edge servers and resources contributed by clients. Hybrid designs combine many of the advantages of infrastructure based and Peer-To-Peer systems, but they also present new challenges. This paper identifies reliable client accounting as one such challenge....

    Provided By University of Peloponnese

  • White Papers // Jan 2012

    Realizing Compositional Scheduling through Virtualization

    The authors present a co-designed scheduling framework and platform architecture that together support compositional scheduling of real-time systems. The architecture is built on the Xen virtualization platform, and relies on compositional scheduling theory that uses periodic resource models as component interfaces. They implement resource models as periodic servers and consider...

    Provided By University of Peloponnese

  • White Papers // Sep 2011

    The Dark Energy Survey Data Management System

    The Dark Energy Survey (DES) is a project with the goal of building, installing and exploiting a new 74 CCD- camera at the Blanco telescope, in order to study the nature of cosmic acceleration. The DES data management system has been designed for the processing, calibration and archiving of these...

    Provided By University of Peloponnese

  • White Papers // Sep 2011

    Towards the Effective Temporal Association Mining of Spam Blacklists

    IP blacklists are a well-regarded anti-spam mechanism that captures global spamming patterns. These properties make such lists a practical ground-truth by which to study email spam behaviors. Observing one blacklist for nearly a year-and-a-half, the authors collected data on roughly half a billion listing events. In this paper, that data...

    Provided By University of Peloponnese

  • White Papers // Jul 2011

    Fighting Cybercrime with Packet Attestation

    IP source addresses are often the only initial lead when investigating cybercrime in the Internet. Unfortunately, source addresses are easily forged, which can protect the culprits and lead to false accusations. The authors describe a new method for packet attestation in the Internet. Packet attestation establishes whether or not a...

    Provided By University of Peloponnese

  • White Papers // May 2011

    Mitigating Spam Using Spatio-Temporal Reputation

    In this paper, the authors present PREventive Spatio-Temporal Aggregation (PRESTA), a reputation model that combines spatial and temporal features to produce values that are behavior predictive and useful in partial-knowledge situations. To evaluate its effectiveness, they applied PRESTA in the domain of spam detection. Studying the temporal properties of IP...

    Provided By University of Peloponnese

  • White Papers // May 2011

    The Business Model: Recent Developments and Future Research

    In this paper, the authors provide a broad and multifaceted review of the received literature on business models in which the authors examine the business model concept through multiple subject matter lenses. The review reveals that scholars do not agree on what a business model is and that the literature...

    Provided By University of Peloponnese

  • White Papers // May 2011

    Maiorana-McFarland Functions With High Second-Order Nonlinearity

    The second-order non-linearity, and the best quadratic approximations, of Boolean functions are studied in this paper. The authors prove that cubic functions within the Maiorana-McFarland class achieve very high second order non-linearity, which is close to an upper bound that was recently proved by Carlet et al., and much higher...

    Provided By University of Peloponnese

  • White Papers // Apr 2011

    Passive Optical Network Design Optimization for Wireless Backhauling

    The increasing popularity of converged media services is promoting the deployment of a range of broadband networking technologies aiming at serving the increased bandwidth as well as service portability and user mobility demands. To optimally address the above requirements hybrid access network architectures coupling the benefits of optical (high capacity,...

    Provided By University of Peloponnese

  • White Papers // Mar 2011

    Sharing Work in Keyword Search Over Databases

    An important means of allowing non-expert end-users to pose ad hoc queries - whether over single databases or data integration systems - is through keyword search. Given a set of keywords, the query processor finds matches across different tuples and tables. It computes and executes a set of relational sub-queries...

    Provided By University of Peloponnese

  • White Papers // Nov 2010

    Having Your Cake and Eating It Too: Routing Security with Privacy Protections

    Internet Service Providers typically do not reveal details of their inter-domain routing policies due to security concerns, or for commercial or legal reasons. As a result, it is difficult to hold ISPs accountable for their contractual agreements. Existing solutions can check basic properties, e.g., whether route announcements correspond to valid...

    Provided By University of Peloponnese

  • White Papers // Jun 2010

    Business Model Innovation: Creating Value in Times of Change

    The authors highlight business model innovation as a way for general managers and entrepreneurs to create and appropriate value, especially in times of economic change. Business model innovation, which involves designing a modified or new activity system, relies on recombining the existing resources of a firm and its partners, and...

    Provided By University of Peloponnese

  • White Papers // Jul 2009

    Comparative Study of Demand Driven Routing Protocols Over Mobile Ad-Hoc Networks

    In this paper, the authors present a comparative study in a MANET environment. MANET is specifically characterized by high mobility of network nodes and frequent changes of direct visibility. High dynamicity affects the design and implementation of distributed applications by significantly increasing their complexity, to consider not only routing and...

    Provided By University of Peloponnese

  • White Papers // Feb 2009

    Performance Evaluation of Multicast Routing Over Multilayer Multistage Interconnection Networks

    Multilayer MINs have emerged mainly due to the increased need for routing capacity in the presence of multicast and broadcast traffic, their performance prediction and evaluation however has not been studied sufficiently insofar. In this paper, authors use simulation to evaluate the performance of multilayer MINs with switching elements of...

    Provided By University of Peloponnese

  • White Papers // Jul 2008

    Hierarchical Scheduling Framework for Virtual Clustering of Multiprocessors

    Scheduling of sporadic task systems on multiprocessor platforms is an area which has received much attention in the recent past. It is widely believed that finding an optimal scheduler is hard, and therefore most studies have focused on developing algorithms with good utilization bounds. These algorithms can be broadly classified...

    Provided By University of Peloponnese

  • White Papers // Nov 2007

    Challenges and Opportunities in Deeply Embedded Systems Security

    The advent of low-powered wireless networks of embedded devices has spurred the development of new applications at the interface between the real world and its digital manifestation. A distributed computing platform that can measure properties of the real world, formulate intelligent inferences, and instrument responses, requires a new class of...

    Provided By University of Peloponnese

  • White Papers // Jul 2006

    Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies

    There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rules must be respected by software used in these sectors. The regulatory statements are somewhat informal and must be interpreted carefully in...

    Provided By University of Peloponnese

  • White Papers // Aug 2013

    Distributed Time-Aware Provenance

    The ability to reason about changes in a distributed system's state enables network administrators to better diagnose protocol mis-configurations, detect intrusions, and pinpoint performance bottlenecks. The authors propose a novel provenance model called Distributed Time-aware Provenance (DTaP) that aids forensics and debugging in distributed systems by explicitly representing time, distributed...

    Provided By University of Peloponnese

  • White Papers // Aug 2013

    PROPOLIS: Provisioned Analysis of DataCentric Processes

    In this paper, the authors consider the analysis of data-centric process-based applications, namely applications that depend on an underlying database and whose control is guided by a finite state transition system. They observe that analysts of such applications often want to do more than analyze a specific instance of the...

    Provided By University of Peloponnese

  • White Papers // Jan 2013

    Throughput Guarantees Through Maximal Scheduling in Wireless Networks

    The authors address the question of providing throughput guarantees through distributed scheduling, which has remained an open problem for some time. They consider a simple distributed scheduling strategy, maximal scheduling, and prove that it attains a guaranteed fraction of the maximum throughput region in arbitrary wireless networks. The guaranteed fraction...

    Provided By University of Peloponnese

  • White Papers // Jan 2013

    A Scalable, Low-Overhead Rate Control Algorithm for Multirate Multicast Sessions

    In multi-rate multicasting, different users (receivers) within the same multicast group can receive service at different rates, depending on the user requirements and the network congestion level. Compared to unirate multicasting, this provides more flexibility to the user, and allows more efficient usage of the network resources. In this paper,...

    Provided By University of Peloponnese

  • White Papers // Jul 2011

    Fighting Cybercrime with Packet Attestation

    IP source addresses are often the only initial lead when investigating cybercrime in the Internet. Unfortunately, source addresses are easily forged, which can protect the culprits and lead to false accusations. The authors describe a new method for packet attestation in the Internet. Packet attestation establishes whether or not a...

    Provided By University of Peloponnese

  • White Papers // Mar 2012

    Reliable Client Accounting for P2P-Infrastructure Hybrids

    Content Distribution Networks (CDNs) have started to adopt hybrid designs, which employ both dedicated edge servers and resources contributed by clients. Hybrid designs combine many of the advantages of infrastructure based and Peer-To-Peer systems, but they also present new challenges. This paper identifies reliable client accounting as one such challenge....

    Provided By University of Peloponnese

  • White Papers // May 2011

    The Business Model: Recent Developments and Future Research

    In this paper, the authors provide a broad and multifaceted review of the received literature on business models in which the authors examine the business model concept through multiple subject matter lenses. The review reveals that scholars do not agree on what a business model is and that the literature...

    Provided By University of Peloponnese

  • White Papers // Jun 2010

    Business Model Innovation: Creating Value in Times of Change

    The authors highlight business model innovation as a way for general managers and entrepreneurs to create and appropriate value, especially in times of economic change. Business model innovation, which involves designing a modified or new activity system, relies on recombining the existing resources of a firm and its partners, and...

    Provided By University of Peloponnese

  • White Papers // Jul 2006

    Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies

    There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rules must be respected by software used in these sectors. The regulatory statements are somewhat informal and must be interpreted carefully in...

    Provided By University of Peloponnese

  • White Papers // Nov 2010

    Having Your Cake and Eating It Too: Routing Security with Privacy Protections

    Internet Service Providers typically do not reveal details of their inter-domain routing policies due to security concerns, or for commercial or legal reasons. As a result, it is difficult to hold ISPs accountable for their contractual agreements. Existing solutions can check basic properties, e.g., whether route announcements correspond to valid...

    Provided By University of Peloponnese

  • White Papers // Sep 2011

    The Dark Energy Survey Data Management System

    The Dark Energy Survey (DES) is a project with the goal of building, installing and exploiting a new 74 CCD- camera at the Blanco telescope, in order to study the nature of cosmic acceleration. The DES data management system has been designed for the processing, calibration and archiving of these...

    Provided By University of Peloponnese

  • White Papers // Dec 2013

    Elliptic Curve Cryptography in Practice

    In this paper, the authors perform a review of Elliptic Curve Cryptography (ECC), as it is used in practice today, in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. They study four popular protocols that make use of this type of public-key cryptography: bitcoin, Secure...

    Provided By University of Peloponnese

  • White Papers // Nov 2007

    Challenges and Opportunities in Deeply Embedded Systems Security

    The advent of low-powered wireless networks of embedded devices has spurred the development of new applications at the interface between the real world and its digital manifestation. A distributed computing platform that can measure properties of the real world, formulate intelligent inferences, and instrument responses, requires a new class of...

    Provided By University of Peloponnese

  • White Papers // May 2011

    Mitigating Spam Using Spatio-Temporal Reputation

    In this paper, the authors present PREventive Spatio-Temporal Aggregation (PRESTA), a reputation model that combines spatial and temporal features to produce values that are behavior predictive and useful in partial-knowledge situations. To evaluate its effectiveness, they applied PRESTA in the domain of spam detection. Studying the temporal properties of IP...

    Provided By University of Peloponnese

  • White Papers // Sep 2011

    Towards the Effective Temporal Association Mining of Spam Blacklists

    IP blacklists are a well-regarded anti-spam mechanism that captures global spamming patterns. These properties make such lists a practical ground-truth by which to study email spam behaviors. Observing one blacklist for nearly a year-and-a-half, the authors collected data on roughly half a billion listing events. In this paper, that data...

    Provided By University of Peloponnese

  • White Papers // Mar 2011

    Sharing Work in Keyword Search Over Databases

    An important means of allowing non-expert end-users to pose ad hoc queries - whether over single databases or data integration systems - is through keyword search. Given a set of keywords, the query processor finds matches across different tuples and tables. It computes and executes a set of relational sub-queries...

    Provided By University of Peloponnese

  • White Papers // Jan 2014

    Let SDN Be Your Eyes: Secure Forensics in Data Center Networks

    Discovering the causes of incorrect behavior in large networks is often difficult. This difficulty is compounded when some machines in the network are compromised, since these compromised machines may use deception or tamper with data to frustrate forensic analysis. Recently proposed forensic tools enable administrators to learn the causes of...

    Provided By University of Peloponnese

  • White Papers // Jul 2008

    Hierarchical Scheduling Framework for Virtual Clustering of Multiprocessors

    Scheduling of sporadic task systems on multiprocessor platforms is an area which has received much attention in the recent past. It is widely believed that finding an optimal scheduler is hard, and therefore most studies have focused on developing algorithms with good utilization bounds. These algorithms can be broadly classified...

    Provided By University of Peloponnese

  • White Papers // Feb 2009

    Performance Evaluation of Multicast Routing Over Multilayer Multistage Interconnection Networks

    Multilayer MINs have emerged mainly due to the increased need for routing capacity in the presence of multicast and broadcast traffic, their performance prediction and evaluation however has not been studied sufficiently insofar. In this paper, authors use simulation to evaluate the performance of multilayer MINs with switching elements of...

    Provided By University of Peloponnese

  • White Papers // May 2011

    Maiorana-McFarland Functions With High Second-Order Nonlinearity

    The second-order non-linearity, and the best quadratic approximations, of Boolean functions are studied in this paper. The authors prove that cubic functions within the Maiorana-McFarland class achieve very high second order non-linearity, which is close to an upper bound that was recently proved by Carlet et al., and much higher...

    Provided By University of Peloponnese

  • White Papers // Jul 2009

    Comparative Study of Demand Driven Routing Protocols Over Mobile Ad-Hoc Networks

    In this paper, the authors present a comparative study in a MANET environment. MANET is specifically characterized by high mobility of network nodes and frequent changes of direct visibility. High dynamicity affects the design and implementation of distributed applications by significantly increasing their complexity, to consider not only routing and...

    Provided By University of Peloponnese

  • White Papers // Apr 2011

    Passive Optical Network Design Optimization for Wireless Backhauling

    The increasing popularity of converged media services is promoting the deployment of a range of broadband networking technologies aiming at serving the increased bandwidth as well as service portability and user mobility demands. To optimally address the above requirements hybrid access network architectures coupling the benefits of optical (high capacity,...

    Provided By University of Peloponnese

  • White Papers // Oct 2012

    Simple and Nearly Optimal Multi-Item Auctions

    The authors provide a Polynomial Time Approximation Scheme (PTAS) for the Bayesian optimal multiitem multi-bidder auction problem under two conditions. First, bidders are independent, have additive valuations and are from the same population. Second, every bidder's value distributions of items are independent but not necessarily identical Monotone Hazard Rate (MHR)...

    Provided By University of Peloponnese

  • White Papers // May 2012

    First Passage Time Problems With Applications to Synchronization

    First passage time problems arise in many fields, but few of them are explicitly solved. Motivated by an application to synchronization of clocks, this paper obtains the probability distribution for the first passage time for a Brownian motion with quadratic drift to exit from two constant barriers that are not...

    Provided By University of Peloponnese

  • White Papers // Dec 2012

    Exploiting Metric Structure for Efficient Private Query Release

    The authors consider the problem of privately answering queries defined on databases which are collections of points belonging to some metric space. They give simple, computationally efficient algorithms for answering distance queries defined over an arbitrary metric. Distance queries are specified by points in the metric space, and ask for...

    Provided By University of Peloponnese

  • White Papers // Dec 2012

    A Propagation Model for Provenance Views of Public/Private Workflows

    The authors explain the problem of concealing functionality of a proprietary or private module when provenance information is shown over repeated executions of a workflow which contains both public and private modules. They show that G-privacy cannot be achieved simply by combining solutions for individual private modules; data hiding must...

    Provided By University of Peloponnese

  • White Papers // Jan 2012

    Realizing Compositional Scheduling through Virtualization

    The authors present a co-designed scheduling framework and platform architecture that together support compositional scheduling of real-time systems. The architecture is built on the Xen virtualization platform, and relies on compositional scheduling theory that uses periodic resource models as component interfaces. They implement resource models as periodic servers and consider...

    Provided By University of Peloponnese