University of Texas

Displaying 1-40 of 273 results

  • White Papers // Jan 2015

    KLOS: A High Performance Kernel-Less Operating System

    Operating systems provide services that are accessed by processes via mechanisms that involve a ring transition to transfer control to the kernel where the required function is performed. This has one significant drawback that every service call involves an overhead of a context switch where processor state is saved and...

    Provided By University of Texas

  • White Papers // Nov 2014

    Encoded Archival Description: Data Quality and Analysis

    In order to authenticate the meaning of collections and to preserve their evidentiary value, archivists create documents (finding aids) that describe the provenance and original order of the records. Metadata standards such as Encoded Archival Description (EAD) enable finding aids to be encoded, searched, and displayed online. However, recent research...

    Provided By University of Texas

  • White Papers // Jun 2013

    Graduates' Perception of Employment in SMEs and Large Enterprises

    This paper looks at non business (n = 66) and business graduates (n = 18) and compares their employment preference in Small and Medium sized Enterprises (SME) or Large Enterprises (LE). In pursuit, a questionnaire was developed measuring the perception of graduates as regards on the content of a job,...

    Provided By University of Texas

  • White Papers // Aug 2012

    Offloading in Heterogeneous Networks: Modeling, Analysis and Design Insights

    Pushing data traffic from cellular to Wi-Fi is an example of inter-Radio Access Technology (RAT) offloading. While this clearly alleviates congestion on the over-loaded cellular network, the ultimate potential of such offloading and its effect on overall system performance is not well understood. To address this, the authors develop a...

    Provided By University of Texas

  • White Papers // Jul 2012

    Frankenstein: Stitching Malware From Benign Binaries

    This paper proposes a new self-camouflaging malware propagation system, Frankenstein, that overcomes shortcomings in the current generation of metamorphic malware. Specifically, although mutants produced by current state-of-the-art metamorphic engines are diverse, they still contain many characteristic binary features that reliably distinguish them from benign software. Frankenstein forgoes the concept of...

    Provided By University of Texas

  • White Papers // Jun 2012

    New Proof Methods for Attribute-Based Encryption: Achieving Full Security Through Selective Techniques

    The authors develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full security. This deepens the relationship between the selective and full security models and provides a path for transferring the best qualities of...

    Provided By University of Texas

  • White Papers // May 2012

    Dependency Path Patterns as the Foundation of Access Control in Provenance-Aware Systems

    A unique characteristics of provenance data is that it forms a Directed Acyclic Graph (DAG) in accordance with the underlying causality dependencies between entities (acting users, action processes and data objects) involved in transactions. Data provenance raises at least two distinct security-related issues. One is how to control access to...

    Provided By University of Texas

  • White Papers // May 2012

    Tag-Based Information Flow Analysis for Document Classification in Provenance

    A crucial aspect of certain applications such as the ones pertaining to Intelligence domain or Health-care, is to manage and protect sensitive information effectively and efficiently. In this paper, the authors propose a tagging mechanism to track the flow of sensitive or valuable information in a provenance graph and automate...

    Provided By University of Texas

  • White Papers // May 2012

    AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing

    A means of reliably concealing ownership of cloud data without impeding computation over the data is presented and evaluated. This facilitates information privacy enforcement in cloud environments by withholding data ownership information from cloud nodes that compute using the data. As a result, nodes that have access to private data...

    Provided By University of Texas

  • White Papers // May 2012

    Dual Form Signatures: An Approach for Proving Security From Static Assumptions

    In this paper, the authors introduce the abstraction of Dual Form Signatures as a useful framework for proving security (existential unforgeability) from static assumptions for schemes with special structure that are used as a basis of other cryptographic protocols and applications. They describe the power of this framework by proving...

    Provided By University of Texas

  • White Papers // May 2012

    Hatman: Intra-Cloud Trust Management for Hadoop

    Data and computation integrity and security are major concerns for users of cloud computing facilities. Many production-level clouds optimistically assume that all cloud nodes are equally trustworthy when dispatching jobs; jobs are dispatched based on node load, not reputation. This increases their vulnerability to attack, since compromising even one node...

    Provided By University of Texas

  • White Papers // Apr 2012

    An Empirical Study of Supplementary Bug Fixes

    A recent study finds that errors of omission are harder for programmers to detect than errors of commission. While several change recommendation systems already exist to prevent or reduce omission errors during software development, there have been very few studies on why errors of omission occur in practice and how...

    Provided By University of Texas

  • White Papers // Apr 2012

    Towards Understanding the Fundamentals of Mobility in Cellular Networks

    Despite the central role of mobility in wireless networks, there are surprisingly few fundamental results on its properties. This paper aims to address this gap by proposing a new Random Way-Point (RWP) mobility model defined on the entire plane and applying it to analyze two key cellular network parameters: handover...

    Provided By University of Texas

  • White Papers // Apr 2012

    Vdiff: A Program Differencing Algorithm for Verilog Hardware Description Language

    During code review tasks, comparing two versions of a hardware design description using existing program differencing tools such as diff is inherently limited because these tools implicitly assume sequential execution semantics, while hardware description languages are designed to model concurrent computation. The authors designed a position-independent differencing algorithm to robustly...

    Provided By University of Texas

  • White Papers // Apr 2012

    BRACE: An Assertion Framework for Debugging Cyber-Physical Systems

    Developing Cyber-Physical Systems (CPS) is challenging because correctness depends on both logical and physical states, which are collectively difficult to observe. The developer often need to repeatedly rerun the system while observing its behavior and tweak the hardware and software until it meets minimum requirements. This process is tedious, error-prone,...

    Provided By University of Texas

  • White Papers // Apr 2012

    Extending Java for Android Programming

    Android is one of the most popular platforms for developing mobile applications. However, its framework relies on programming conventions and styles to implement framework-specific concepts like activities and intents, causing problems such as reliability, readability, understandability, and maintainability. The authors propose to extend Java to support Android framework concepts explicitly...

    Provided By University of Texas

  • White Papers // Feb 2012

    A-Serv: A Novel Architecture Providing Scalable Quality of Service

    QoS architectures define how routers process packets to ensure QoS service guarantees enforced. Existing QoS architectures such as Integrated Services (IntServ), Differentiated Services (DiffServ), and Dynamic Packet State (DPS) share one common property that the packet structure and the function of the routers are closely connected. Packets of one data...

    Provided By University of Texas

  • White Papers // Feb 2012

    Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes

    Prefix-Preserving Encryption (PPE) is an important type of encryption scheme, having a wide range of applications, such as IP addresses anonymization, prefix-matching search, and rang search. There are two issues in PPE schemes, security proof and single key requirement. Existing security proofs for PPE only reduce the security of a...

    Provided By University of Texas

  • White Papers // Feb 2012

    Decoupled Dynamic Cache Segmentation

    The Least Recently Used (LRU) replacement policy performs poorly in the Last-Level Cache (LLC) because temporal locality of memory accesses is filtered by first and second level caches. The authors propose a cache segmentation technique that dynamically adapts to cache access patterns by predicting the best number of not-yet-referenced and...

    Provided By University of Texas

  • White Papers // Jan 2012

    Identifying Failure-Inducing Combinations in a Combinatorial Test Set

    A t-way combinatorial test set is designed to detect failures that are triggered by combinations involving no more than t parameters. Assume that the authors have executed a t-way test set and some tests have failed. A natural question to ask is: what combinations have caused these failures? Identifying such...

    Provided By University of Texas

  • White Papers // Jan 2012

    Optimal Surface Deployment Problem in Wireless Sensor Networks

    Sensor deployment is a fundamental issue in a wireless sensor network, which often dictates the overall network performance. Previous studies on sensor deployment mainly focused on sensor networks on 2D plane or in 3D volume. In this paper, the authors tackle the problem of optimal sensor deployment on 3 surfaces,...

    Provided By University of Texas

  • White Papers // Jan 2012

    Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security

    The authors present a new approach for creating chosen ciphertext secure encryption. The focal point of their work is a new abstraction that they call Detectable Chosen Ciphertext Security (DCCA). Intuitively, this notion is meant to capture systems that are not necessarily Chosen Ciphertext Attack (CCA) secure, but where they...

    Provided By University of Texas

  • White Papers // Jan 2012

    XML Query Routing in Structured P2P Systems

    This paper addresses the problem of data placement, indexing, and querying large XML data repositories distributed over an existing P2P service infrastructure. The authors' architecture scales gracefully to the network and data sizes, is fully distributed, fault tolerant and self-organizing, and handles complex queries efficiently, even those queries that use...

    Provided By University of Texas

  • White Papers // Jan 2012

    A Lightweight Algorithm for Causal Message Ordering in Mobile Computing Systems

    Causally ordered message delivery is a required property for several distributed applications particularly those that involve human interactions (such as teleconferencing and collaborative work). In this paper, the authors present an efficient protocol for causal ordering in mobile computing systems. This protocol requires minimal resources on mobile hosts and wireless...

    Provided By University of Texas

  • White Papers // Dec 2011

    Making Argument Systems for Outsourced Computation Practical (Sometimes)

    This paper describes the design, implementation, and evaluation of a system for performing verifiable outsourced computation. It has long been known that this problem can be solved in theory using Probabilistically Checkable Proofs (PCPs) coupled with modern cryptographic tools, and these solutions have wholly impractical performance, according to the conventional...

    Provided By University of Texas

  • White Papers // Nov 2011

    Heterogeneous Cellular Networks: From Theory to Practice

    The proliferation of internet-connected mobile devices will continue to drive growth in data traffic in an exponential fashion, forcing network operators to dramatically increase the capacity of their networks. To do this cost-effectively, a paradigm shift in cellular network infrastructure deployment is occurring away from traditional (expensive) high-power tower-mounted base...

    Provided By University of Texas

  • White Papers // Nov 2011

    Efficient Similarity Search Over Encrypted Data

    In recent years, due to the appealing features of cloud computing, large amount of data have been stored in the cloud. Although cloud based services offer many advantages, privacy and security of the sensitive data is a big concern. To mitigate the concerns, it is desirable to outsource sensitive data...

    Provided By University of Texas

  • White Papers // Nov 2011

    Leakage - Delay Tradeoff in Wide-Bit Nanoscale CMOS Adders

    The scaling of nanometer technology has had a major impact on the power dissipation of CMOS circuits. As transistor size decreases it has become apparent that leakage power is becoming a dominant fighting force against future technology. In this paper, the importance of static power consumption on the design of...

    Provided By University of Texas

  • White Papers // Nov 2011

    Insider Threat Detection Using Stream Mining and Graph Mining

    Evidence of malicious insider activity is often buried within large data streams, such as system logs accumulated over months or years. Ensemble-based stream mining leverages multiple classification models to achieve highly accurate anomaly detection in such streams even when the stream is unbounded, evolving, and unlabeled. This makes the approach...

    Provided By University of Texas

  • White Papers // Nov 2011

    Program Interferometry

    Modern microprocessors have many micro-architectural features. Quantifying the performance impact of one feature such as dynamic branch prediction can be difficult. On one hand, a timing simulator can predict the difference in performance given two different implementations of the technique, but simulators can be quite inaccurate. On the other hand,...

    Provided By University of Texas

  • White Papers // Nov 2011

    Functional Verification of Class Invariants in CleanJava

    In Cleanroom-style functional program verification, a program is viewed as a mathematical function from one program state to another, and the program is verified by comparing two functions, the implemented and the expected behaviors of a program. The technique requires a minimal mathematical background and supports forward reasoning, but it...

    Provided By University of Texas

  • White Papers // Oct 2011

    An Optimized Scaled Neural Branch Predictor

    Conditional branch prediction remains one of the most important enabling technologies for high-performance microprocessors. A small improvement in accuracy can result in a large improvement in performance as well as a significant reduction in energy wasted on wrong-path instructions. Neural-based branch predictors have been among the most accurate in the...

    Provided By University of Texas

  • White Papers // Sep 2011

    Transmission Capacity of Ad-Hoc Networks With Multiple Antennas Using Transmit Stream Adaptation and Interference Cancelation

    The transmission capacity of an ad-hoc network is the maximum density of active transmitters per unit area, given an outage constraint at each receiver for a fixed rate of transmission. Assuming that the transmitter locations are distributed as a Poisson point process, this paper derives upper and lower bounds on...

    Provided By University of Texas

  • White Papers // Sep 2011

    Toward the Verification of a Simple Hypervisor

    Virtualization promises significant benefits in security, efficiency, dependability, and cost. Achieving these benefits depends upon the reliability of the underlying virtual machine monitors (hypervisors). This paper describes an ongoing project to develop and verify MinVisor, a simple but functional Type-I x86 hypervisor, proving protection properties at the assembly level using...

    Provided By University of Texas

  • White Papers // Sep 2011

    AOVis: A Model-Driven Multiple-Graph Approach to Program Fact Extraction for AspectJ/Java Source Code

    AspectJ reverse engineering and visualization remains a challenge at the architectural and design levels, with fewer tools available for reverse engineers compared to other languages such as Java. Prior work on AspectJ modeling focused on forward engineering or detailed-design reverse engineering, or required special instrumentation to identify cross-cutting relationships. Effective...

    Provided By University of Texas

  • White Papers // Sep 2011

    Supervised Learning for Insider Threat Detection Using Stream Mining

    Insider threat detection requires the identification of rare anomalies in contexts where evolving behaviors tend to mask such anomalies. This paper proposes and tests an ensemble-based stream mining algorithm based on supervised learning that addresses this challenge by maintaining an evolving collection of multiple models to classify dynamic data streams...

    Provided By University of Texas

  • White Papers // Sep 2011

    Building Malware Infection Trees

    "Dynamic analysis of malware is an ever evolving and challenging task. A Malware infection Tree (MiT) can assist in analysis by identifying processes and files related to a specific malware sample. In this paper, the authors propose an abstract approach to building a comprehensive MiT based on rules describing execution...

    Provided By University of Texas

  • White Papers // Aug 2011

    Remote Batch Invocation for SQL Databases

    Batch services are a new approach to distributed computation in which clients send batches of operations for execution on a server and receive hierarchical results sets in response. In this paper, the authors show how batch services provide a simple and powerful interface to relational databases, with support for arbitrary...

    Provided By University of Texas

  • White Papers // Aug 2011

    The CleanJava Language for Functional Program Verification

    Unlike Hoare-style program verification, functional program verification supports forward reasoning by viewing a program as a mathematical function from one program state to another and proving its correctness by essentially comparing two mathematical functions, the function computed by the program and its specification. Since it requires a minimal mathematical background...

    Provided By University of Texas

  • White Papers // Aug 2011

    A Tutorial on Functional Program Verification

    This paper gives a quick tutorial introduction to functional program verification. In functional program verification, a program is viewed as a mathematical function from one program state to another, and proving its correctness is essentially comparing two mathematical functions, the function computed by the program and the specification of the...

    Provided By University of Texas

  • White Papers // Nov 2011

    Leakage - Delay Tradeoff in Wide-Bit Nanoscale CMOS Adders

    The scaling of nanometer technology has had a major impact on the power dissipation of CMOS circuits. As transistor size decreases it has become apparent that leakage power is becoming a dominant fighting force against future technology. In this paper, the importance of static power consumption on the design of...

    Provided By University of Texas

  • White Papers // Sep 2011

    Building Malware Infection Trees

    "Dynamic analysis of malware is an ever evolving and challenging task. A Malware infection Tree (MiT) can assist in analysis by identifying processes and files related to a specific malware sample. In this paper, the authors propose an abstract approach to building a comprehensive MiT based on rules describing execution...

    Provided By University of Texas

  • White Papers // Jul 2001

    Product Costing And Pricing Under Long Term Capacity Commitment

    This white paper discusses about a model that is developed to analyze optimal product costing and pricing decisions when a firm must make long term commitments to some activity resource capacities. The problem is complex because of interactions between the initial capacity choices and adjustments in product costs and prices...

    Provided By University of Texas

  • White Papers // Feb 2007

    Sustainable IT Outsourcing Success: Let Enterprise Architecture Be Your Guide

    This paper explores the relationship between IT outsourcing and enterprise architecture. In an earlier paper which described four stages of architecture maturity (business silos, standardized technology, rationalized process, and business modularity). In this paper it is concluded that three different outsourcing arrangements support transitions from one stage to another. Firms...

    Provided By University of Texas

  • White Papers // May 2009

    Security Threat and Vulnerability Mitigation Patterns: A Case of Credit Card Theft Mitigation

    Most attacks on computer and software systems are caused by threats to known vulnerabilities. Part of the reason is that one needs a lot of knowledge in developing secure systems, but it is difficult to obtain sufficient knowledge and use it correctly as security incident reports and security standards are...

    Provided By University of Texas

  • White Papers // Jun 2009

    A Framework for Modeling Security Measures

    This paper introduces a framework that provides a model for describing security measures and their relative effectiveness as well as importance. This model enhances computer security training and educational curriculum by providing experimental data and analysis to educators and students. Business environments will benefit from this model by enabling more...

    Provided By University of Texas

  • White Papers // May 2009

    SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks

    Multihop wireless mesh networks are becoming a new attractive communication paradigm owing to their low cost and ease of deployment. Routing protocols are critical to the performance and reliability of wireless mesh networks. Traditional routing protocols send traffic along predetermined paths and face difficulties in coping with unreliable and unpredictable...

    Provided By University of Texas

  • White Papers // Apr 2009

    Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities

    As networked systems grow in complexity, they are increasingly vulnerable to Denial-of-Service (DoS) attacks involving resource exhaustion. A single malicious input of coma can trigger high-complexity behavior such as deep recursion in a carelessly implemented server, exhausting CPU time or stack space and making the server unavailable to legitimate clients....

    Provided By University of Texas

  • White Papers // Jan 2010

    PeterNet: A Free Space Optics Based BackHaul Architecture for Next Generation Cellular Networks

    There has been an increasing demand for bandwidth-intensive services in mobile devices, such as streaming video and music, which bring about a paradigm shift in wireless cellular network architectures. Although various coding and modulation schemes are being adopted to address these requirements, a critical area of modification is the existing...

    Provided By University of Texas

  • White Papers // Jul 2009

    Calculating, Creating, And Claiming Value In Business Markets: Status And Research Agenda

    B2B markets offer challenges that differ from those in B2C markets in addressing these issues (e.g., Anderson, Narus, and Narayandas 2009; Dwyer and Tanner 2008). These challenges stem from the fact that most B2B markets (relative to B2C markets) are characterized by a far fewer buyers who buy in much...

    Provided By University of Texas

  • White Papers // Jan 2010

    PeterNet : An Emergent Technology Based Radio Access Network Architecture for Next Generation Cellular Wireless Systems

    For next generation wireless cellular networks, the Radio Access Network (RAN) component is destined to evolve into a high-capacity, flexible and reconfigurable network architecture supporting smaller cell sites and newer technologies. Based on the well-known Petersen graph, in this paper the authors propose a RAN architecture, named PeterNet, that interconnects...

    Provided By University of Texas

  • White Papers // Jan 2010

    IP Address Assignment in a Mobile Ad Hoc Network

    A Mobile Ad Hoc NETwork (MANET) consists of a set of identical mobile nodes communicating with each other via wireless links. The network's topology may change rapidly and unpredictably. Such networks may operate in a stand-alone fashion, or may be connected to the larger Internet. In traditional networks, hosts rely...

    Provided By University of Texas

  • White Papers // Jan 2010

    Energy Consumption in Wireless Sensor Networks Using GSP

    One of the main design issues for a sensor network is conservation of the energy available at each sensor node. The authors propose to deploy multiple, mobile base stations to prolong the lifetime of the sensor network. They split the lifetime of the sensor network into equal periods of time...

    Provided By University of Texas

  • White Papers // Sep 2010

    Depot: Cloud Storage With Minimal Trust

    The paper describes the design, implementation, and evaluation of Depot, a cloud storage system that minimizes trust assumptions. Depot tolerates buggy or malicious behavior by any number of clients or servers, yet it provides safety and liveness guarantees to correct clients. Depot provides these guarantees using a two-layer architecture. First,...

    Provided By University of Texas

  • White Papers // Dec 2009

    Edge-Based Cloud Computing as a Feasible Network Paradigm

    The term edge based cloud computing refers to a network of edge systems that provide the services currently provided by data center clouds. In this paper the authors present modifications to MRPerf, an existing tool used to simulate MapReduce in data center clouds, enabling it to simulate Hadoop MapReduce jobs...

    Provided By University of Texas

  • White Papers // Jan 2011

    Lightweight Distributed Selective Re-Execution and Its Implications for Value Speculation

    In this paper, the authors describe a lightweight protocol to support selective re-execution on the TRIPS processor. The protocol permits multiple waves of speculation to be traversing a dataflow graph simultaneously and in any order, with a cleanup "Commit" wave propagating as well to determine completion of a group of...

    Provided By University of Texas

  • White Papers // Jul 2009

    Transfer Learning From Minimal Target Data by Mapping Across Relational Domains

    A central goal of transfer learning is to enable learning when training data from the domain of interest is limited. Yet, work on transfer across relational domains has so far focused on the case where there is a significant amount of target data. This paper bridges this gap by studying...

    Provided By University of Texas

  • White Papers // Feb 2010

    Understanding Transactional Memory Performance

    This paper introduces Syncchar, a novel method and tool for reasoning about the performance of transactional memory. The authors have validated Syncchar's performance predictions and demonstrated its usefulness in guiding performance tuning on the TxLinux kernel. This paper also presents a detailed characterization of how the whole system, including architecture,...

    Provided By University of Texas

  • White Papers // Aug 2010

    POET: A Scripting Language for Applying Parameterized Source-to-Source Program Transformations

    The authors present POET, a scripting language designed for applying advanced program transformations to code in arbitrary programming languages as well as building ad-hoc translators between these languages. The authors have used POET to support a large number of compiler optimizations, including loop interchange, parallelization, blocking, fusion/ fission, strength reduction,...

    Provided By University of Texas

  • White Papers // Apr 2010

    Automated Programmable Code Transformation for Portable Performance Tuning

    The authors present a framework which uses POET, an interpreted code transformation language, to effectively combine programmable control from developers, advanced optimizations by compilers, and flexible empirical tuning of optimizations to achieve portable high performance for scientific computing. The authors have extended ROSE, a C/C++/Fortran source-to-source compiler, to automatically analyze...

    Provided By University of Texas

  • White Papers // Feb 2009

    Auction Pricing: A Case Study Assessing The Price Elasticity Of Demand Based On Supply And The Revenue Equivalence Theorem

    This paper addresses the price elasticity of demand related to various categories of goods sold within the consignment auction-marketing environment. An actual ongoing non-traditional business organization specializing in the nation-wide distribution of merchandise via consignment auctions provides data for this case study. Originally developed and initiated in 1993 in response...

    Provided By University of Texas

  • White Papers // May 2010

    Foreign Portfolio Investment Inflows To The United States: The Impact Of Investor Risk Aversion And US Stock Market Performance

    This paper examines the relationship of net foreign portfolio investment inflows, namely corporate bonds and stocks, to two pull factors; investor risk aversion and the US stock market. Using a vector autoregressive model, we find that positive shocks to the stock market elicit an insignificant response to the net corporate...

    Provided By University of Texas

  • White Papers // Apr 2009

    Images Of Europeans: In-Group Trust And Support For European Integration

    Prior research on citizen support for European integration does not consider how individuals' evaluations of European nationalities are associated with support. This paper fills this gap by developing a political cohesion model based on social identity theory. The author claims that the probability of supporting integration increases with greater levels...

    Provided By University of Texas

  • White Papers // Dec 2010

    Vertical Specialization, Intermediate Tariffs, And The Pattern Of Trade: Assessing The Role Of Tariff Liberalization To U.S.

    How important are intermediate tariffs in determining trade patterns? Empirical work measuring the impact of tariff liberalization most commonly focuses on the effects of barriers imposed by importers, but exporter trade policy should also matter when exports are produced with imported intermediates. Guided by extensions of the Eaton and Kortum...

    Provided By University of Texas

  • White Papers // Jan 2011

    Enhancing Both Network and User Performance for Networks Supporting Best Effort Traffic

    With a view on improving user perceived performance on networks supporting best effort flows, e.g., multimedia/data file transfers, the authors propose a family of bandwidth allocation criteria that depends on the residual work of on-going transfers. Analysis and simulations show that allocating bandwidth in this fashion can significantly improve the...

    Provided By University of Texas

  • White Papers // Sep 2010

    Identity-Based Encryption Secure Against Selective Opening Attack

    The authors present the first Identity-Based Encryption (IBE) schemes that are proven secure against Selective Opening Attack (SOA). This means that if an adversary, given a vector of ciphertexts, adaptively corrupts some fraction of the senders, exposing not only their messages but also their coins, the privacy of the unopened...

    Provided By University of Texas

  • White Papers // Mar 2010

    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption

    In this paper, the authors present two fully secure functional encryption schemes. The first result is a fully secure Attribute-Based Encryption (ABE) scheme. Previous constructions of ABE were only proven to be selectively secure. They achieve full security by adapting the dual system encryption methodology recently introduced by Waters and...

    Provided By University of Texas

  • White Papers // Aug 2009

    Goal-Oriented Security Threat Mitigation Patterns: A Case of Credit Card Theft Mitigation

    Most attacks on computer and software systems are caused by threats to known vulnerabilities. Part of the reason is that it is difficult to possess necessary broad and deep knowledge of security related strategic knowledge to choose mitigating solutions suitable for a specific application or organization. This paper presents three...

    Provided By University of Texas

  • White Papers // Apr 2011

    Dynamic Focusing of Awareness in Fuzzy Control Systems

    Adaptive fuzzy logic control systems with Gaussian membership functions are described. A systematic simulation study of 'Dynamic focusing of awareness' in fuzzy logic control systems is provided. This study shows how the final steady-state values of the membership functions change in response to varying initial membership functions, changing desired trajectory,...

    Provided By University of Texas

  • White Papers // Nov 2010

    How to Leak on Key Updates

    In the continual memory leakage model, security against attackers who can repeatedly obtain leakage is achieved by periodically updating the secret key. This is an appealing model which captures a wide class of side-channel attacks, but all previous constructions in this model provide only a very minimal amount of leakage...

    Provided By University of Texas

  • White Papers // Mar 2011

    Deterministic Public-Key Encryption Revisited

    One of the maxims of modern cryptography is that "Randomness is needed for good encryption," meaning the encryption algorithm of a scheme that should be randomized. Such an encryption scheme is called probabilistic. Indeed, probabilistic encryption is necessary to meet the fundamental notion of semantic security introduced by Goldwasser and...

    Provided By University of Texas

  • White Papers // Jul 2010

    On the Insecurity of Parallel Repetition for Leakage Resilience

    A fundamental question in leakage-resilient cryptography is: Can leakage resilience always be amplified by parallel repetition? It is natural to expect that if people have leakage-resilient primitive tolerating nl bits of leakage, they can take n copies of it to form a system tolerating nl bits of leakage. In this...

    Provided By University of Texas

  • White Papers // Jul 2009

    Position Paper for Workshop on Future Directions in Cyber-Physical Systems Security

    Cyber-Physical System (CPS) security presents new problems inasmuch as cyber-physical systems are different from either information systems (IS) or Physical Control Systems (PCS) in that there are interactions between the information processing elements and the physical control elements that neither IS nor PCS alone may incur. In computational terms, CPS...

    Provided By University of Texas

  • White Papers // Mar 2011

    Modeling and Analysis of K-Tier Downlink Heterogeneous Cellular Networks

    Cellular networks are in a major transition from a carefully planned set of large tower-mounted BaseStations (BSs) to an irregular deployment of heterogeneous infrastructure elements that often additionally includes micro, pico, and femtocells, as well as distributed antennas. In this paper, the authors develop a tractable, flexible, and accurate model...

    Provided By University of Texas

  • White Papers // Feb 2011

    A Tractable Approach to Coverage and Rate in Cellular Networks

    Cellular networks are usually modeled by placing the base stations on a grid, with mobile users either randomly scattered or placed deterministically. These models have been used extensively but suffer from being both highly idealized and not very tractable, so complex system-level simulations are used to evaluate coverage/outage probability and...

    Provided By University of Texas

  • White Papers // Sep 2010

    Two-Way Transmission Capacity of Wireless Ad-Hoc Networks

    The transmission capacity of an ad-hoc network is the maximum density of active transmitters per unit area, given an outage constraint at each receiver for a fixed rate of transmission. Most prior work on finding the transmission capacity of ad-hoc networks has focused only on one-way communication where a source...

    Provided By University of Texas

  • White Papers // Jan 2011

    Practical Utilities for Monitoring Multicast Service Availability

    Monitoring has become one of the key issues for the successful deployment of IP multicast in the Internet. During the last decade, several tools and systems have been developed to monitor several different characteristics of IP multicast. In this paper, the authors focus on one specific monitoring task: monitoring end-to-end...

    Provided By University of Texas

  • White Papers // Mar 2011

    Downlink SDMA With Limited Feedback in Interference-Limited Wireless Networks

    The tremendous capacity gains promised by Space Division Multiple Access (SDMA) depend critically on the accuracy of the transmit channel state information. In the broadcast channel, even without any network interference, it is known that such gains collapse due to interstream interference if the feedback is delayed or low rate....

    Provided By University of Texas

  • White Papers // May 2009

    On the Secrecy Rate of Interference Networks Using Structured Codes

    This paper shows that structured transmission schemes are a good choice for secret communication over interference networks with an eavesdropper. Structured transmission is shown to exploit channel asymmetries and thus perform better than randomly generated codebooks for such channels. For a class of interference channels, the authors show that an...

    Provided By University of Texas

  • White Papers // May 2010

    Translating First-Order Causal Theories Into Answer Set Programming

    Nonmonotonic causal logic became a basis for the semantics of several expressive action languages. Norman McCain and Paolo Ferraris showed how to embed propositional causal theories into logic programming, and this work paved the way to the use of answer set solvers for answering queries about actions described in causal...

    Provided By University of Texas