University of Troms

Displaying 1-7 of 7 results

  • White Papers // Oct 2012

    The Spatial Real and Virtual Sound Stimuli Optimization for the Auditory BCI

    The paper presents results from a project aiming to create horizontally distributed surround sound sources and virtual sound images as auditory BCI (aBCI) stimuli. The purpose is to create evoked brain wave response patterns depending on attended or ignored sound directions. The authors propose to use a modified version of...

    Provided By University of Troms

  • White Papers // May 2012

    Delay-Bounded Sink Mobility in Wireless Sensor Networks

    This paper exploits sink mobility to prolong the network lifetime in Wireless Sensor Networks (WSNs) where the information delay caused by moving the sink should be bounded. The authors build a unified framework for analyzing this joint sink mobility and routing problem. They offer a mathematical modeling that is general...

    Provided By University of Troms

  • White Papers // Apr 2012

    A Certificateless Ordered Sequential Aggregate Signature Scheme Secure Against Super Adversaries

    Certificateless cryptosystem is a hybrid scheme of traditional PKI and ID-based scheme and has positive aspects of both of PKI and ID-based cryptosystem, i.e. solving key escrow problem and certificate management problem simultaneously. Cryptographic schemes constructed in such a hybrid setting, generally called certificateless setting, retain these positive aspects and...

    Provided By University of Troms

  • White Papers // Sep 2011

    Static Analysis Based Invariant Detection for Commodity Operating Systems

    The recent interest in runtime attestation requires modeling of a program's runtime behavior to formulate its integrity properties. In this paper, the authors study the possibility of employing static source code analysis to derive integrity models of a commodity operating systems kernel. They develop a precise and static analysis-based global...

    Provided By University of Troms

  • White Papers // Aug 2011

    Delegation Perspective of Practical Authorization Schemes

    Different authorization schemes for Internet applications have been proposed during the last years as solutions for the distributed authorization problem. Because delegation is a concept derived from authorization, this paper studies and put into perspective the delegation implications, issues and concepts that are derived from a number of those authorization...

    Provided By University of Troms

  • White Papers // Aug 2010

    BitVisor: A Thin Hypervisor for Enforcing I/O Device Security

    Virtual Machine Monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous components for providing virtual hardware devices and for sharing and protecting system resources among Virtual Machines (VMs), enlarging the code size of and reducing the reliability of the VMMs. This...

    Provided By University of Troms

  • White Papers // May 2009

    Update Maps - A New Abstraction for High-Throughput Batch Processing

    Key/value databases are popular abstractions for applications that require synchronous single-key look-ups. However, such databases invariably have a random I/O access pattern, which is inefficient on traditional storage media. To maximize throughput, an alternative is to rely on asynchronous batch processing of requests. As applications evolve, changing requirements with regard...

    Provided By University of Troms

  • White Papers // Oct 2012

    The Spatial Real and Virtual Sound Stimuli Optimization for the Auditory BCI

    The paper presents results from a project aiming to create horizontally distributed surround sound sources and virtual sound images as auditory BCI (aBCI) stimuli. The purpose is to create evoked brain wave response patterns depending on attended or ignored sound directions. The authors propose to use a modified version of...

    Provided By University of Troms

  • White Papers // Apr 2012

    A Certificateless Ordered Sequential Aggregate Signature Scheme Secure Against Super Adversaries

    Certificateless cryptosystem is a hybrid scheme of traditional PKI and ID-based scheme and has positive aspects of both of PKI and ID-based cryptosystem, i.e. solving key escrow problem and certificate management problem simultaneously. Cryptographic schemes constructed in such a hybrid setting, generally called certificateless setting, retain these positive aspects and...

    Provided By University of Troms

  • White Papers // Aug 2010

    BitVisor: A Thin Hypervisor for Enforcing I/O Device Security

    Virtual Machine Monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous components for providing virtual hardware devices and for sharing and protecting system resources among Virtual Machines (VMs), enlarging the code size of and reducing the reliability of the VMMs. This...

    Provided By University of Troms

  • White Papers // Aug 2011

    Delegation Perspective of Practical Authorization Schemes

    Different authorization schemes for Internet applications have been proposed during the last years as solutions for the distributed authorization problem. Because delegation is a concept derived from authorization, this paper studies and put into perspective the delegation implications, issues and concepts that are derived from a number of those authorization...

    Provided By University of Troms

  • White Papers // May 2009

    Update Maps - A New Abstraction for High-Throughput Batch Processing

    Key/value databases are popular abstractions for applications that require synchronous single-key look-ups. However, such databases invariably have a random I/O access pattern, which is inefficient on traditional storage media. To maximize throughput, an alternative is to rely on asynchronous batch processing of requests. As applications evolve, changing requirements with regard...

    Provided By University of Troms

  • White Papers // Sep 2011

    Static Analysis Based Invariant Detection for Commodity Operating Systems

    The recent interest in runtime attestation requires modeling of a program's runtime behavior to formulate its integrity properties. In this paper, the authors study the possibility of employing static source code analysis to derive integrity models of a commodity operating systems kernel. They develop a precise and static analysis-based global...

    Provided By University of Troms

  • White Papers // May 2012

    Delay-Bounded Sink Mobility in Wireless Sensor Networks

    This paper exploits sink mobility to prolong the network lifetime in Wireless Sensor Networks (WSNs) where the information delay caused by moving the sink should be bounded. The authors build a unified framework for analyzing this joint sink mobility and routing problem. They offer a mathematical modeling that is general...

    Provided By University of Troms