University of Tuzla

Displaying 1-40 of 167 results

  • White Papers // Feb 2014

    Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM

    The authors present a novel mechanism that allows a client to securely outsource their private data to the cloud while at the same time to delegate to a third party the right to run certain algorithms on their data. The mechanism is privacy-preserving, meaning that the third party only learns...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    Security Risk Management in IT Small and Medium Enterprises

    Data breaches, security incidents and the threat landscape has been widely researched and documented. Different defence measures and policies, their effects and implications have also been researched extensively. However, most security research focuses on different sectors or on large companies. This research aims to map the prevalence of defence measures,...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    Simple and Efficient Searchable Symmetric Encryption with Application

    Searchable Symmetric Encryption (SSE) allows for data-confidentiality while allowing searches in the encrypted data. The researcher formulated strong security definitions for SSE schemes and constructed the first schemes that are secure in their model. Up to now, their schemes set the current state-of-the-art in SSE both in terms of security...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    Designing and Testing an Anonymous Face Recognition System

    In this paper, the authors contain a research in anonymous biometrics. It describes what basic components are needed to build anonymous face recognition and different options will be discussed. For example, they will take a look at the Viola-Jones object detection method. The algorithms eigenfaces, sherfaces and local binary patterns...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    Measurements for the Paranoid: The Effect of Encrypting Files in Cloud Storage

    Cloud storage is increasing in popularity and has been for years. People upload personal data in large quantities to the cloud without concerning themselves with safeguarding of that data. This paper focuses on the encryption of data and the synchronization of that data. Different synchronization techniques are researched to gain...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    Backbone Network Resources Consumed by DDoS Attacks

    DDoS attacks impose a serious threat to networks and other IT facilities. Various reports show many DDoS attacks occur each day. As a result, the authors expect DDoS attack traffic to be constantly present in high-speed, transit networks, such as Internet backbones, as opposed to end-user networks. For this reason,...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    A Multidimensional Database to Help Anticipate on Truck Arrival Time

    Each distribution center has a different solution to prepare itself for incoming trucks. Due to different circumstances trucks can arrive earlier or later than anticipated. It is very hard, or maybe even impossible, for distribution centers to predict the actual truck arrival times, when they don't know anything about the...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    Integrating XML Databases

    Uncertainty generated during a data integration process is often used to avoid information loss. This uncertainty could exist in the resulting data itself, but also in the generated mappings between databases. XML databases provide a flexible but structured way of saving data, which suits uncertain data well. This paper describes...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    General Impossibility of Group Homomorphic Encryption in the Quantum World

    Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation. Unfortunately, recent advances in quantum computation show that many of the existing schemes completely break down once quantum computers...

    Provided By University of Tuzla

  • White Papers // Oct 2013

    A More Efficient AES Threshold Implementation

    Threshold implementations provide provable security against first-order power analysis attacks for hardware and software implementations. Like masking, the approach relies on secret sharing but it differs in the implementation of logic functions. At Eurocrypt 2011 published the to date most compact threshold implementation of AES-128 encryption. Their paper shows that...

    Provided By University of Tuzla

  • White Papers // Jun 2013

    Cloud Computing Security Requirements and Solutions: A Systematic Literature Review

    Cloud Computing (CC) is an evolving term or paradigm, implying the use of configurable computing resources (hardware, software and network) with its purpose to offer a service to a consumer. By enabling ubiquitous, convenient, on-demand network access, its underlying business model contains at least two actors. A cloud provides a...

    Provided By University of Tuzla

  • White Papers // Jun 2013

    ReFlow: Reports on Internet Flow Data

    Network traffic statistics from operators can provide a good overview on world-wide network usage. In the past, internet2 provided statistics of traffic transferred in one of their networks. These statistics have been a valuable source of information for researchers and operators. However, internet2 discontinued this project in April 2010 and,...

    Provided By University of Tuzla

  • White Papers // Jun 2013

    Acceptance of BYOD Among Employees at Small to Medium-Sized Organizations

    BYOD is a trend among organizations in which employees use personal devices for their professional work. This causes a shift for employees, willing or not. Little is known about how employees perceive this new trend. Should organizations embrace BYOD or should they hold back for the sake of their employees?...

    Provided By University of Tuzla

  • White Papers // Jun 2013

    Performance Analysis of a Lightweight Spam Restraining Method on the Sender Side

    A large part of email traffic on the Internet consists of spam. The mail servers of Internet Service Providers could receive a bad reputation as spam is send from them. A bad reputation may lead to legitimate email being blocked. Stopping spam at the receiver end will not solve this...

    Provided By University of Tuzla

  • White Papers // Jun 2013

    A Comparison of Fault-Tolerant Cloud Storage File Systems

    There are many cloud storage file systems that guarantee fault-tolerance. Implementation of fault-tolerance in a cloud storage file system is achieved in several different ways. This paper aims to find the benefits and drawbacks of existing fault-tolerant file systems by defining criteria on which fault-tolerant file systems can be graded....

    Provided By University of Tuzla

  • White Papers // Jun 2013

    A Comparison Between Centralized and Distributed Cloud Storage Data-Center Topologies

    The popularity and bandwidth usage of cloud storage services has increased rapidly in recent years. To provide users cloud storage with low synchronization latency, cloud storage providers are interested whether the performance of their data-center topology is efficient for their users and how they can improve it. It is not...

    Provided By University of Tuzla

  • White Papers // Jun 2013

    Detecting Reflection Attacks in DNS Flows

    DNS reflection attacks can be used as DDoS attacks capable of generating a high data output due to amplification. Detecting the targets of these attacks is therefore a crucial activity in order to avert it. Current detection approaches rely on deep packet inspection and therefore do not scale with today's...

    Provided By University of Tuzla

  • White Papers // Feb 2013

    Portable Memory Consistency for Software Managed Distributed Memory in Many-Core SoC

    Porting software to different platforms can require modifications of the application. One of the issues is that the targeted hardware supports another memory consistency model. As a consequence, the completion order of reads and writes in a multi-threaded application can change, which may result in improper synchronization. For example, a...

    Provided By University of Tuzla

  • White Papers // Feb 2013

    Random Access With Physical-Layer Network Coding

    Leveraging recent progress in compute-and-forward the authors propose an approach to random access that is based on physical-layer network coding: When packets collide, it is possible to recover a linear combination of the packets at the receiver. Over many rounds of transmission, the receiver can thus obtain many linear combinations...

    Provided By University of Tuzla

  • White Papers // Jan 2013

    Towards Anomaly Detection in SCADA Networks Using Connection Patterns

    A vital part of modern infrastructure is controlled by Supervisory Control And Data Acquisition (SCADA) net-works. Because SCADA systems are increasingly connected to the Internet, they become more exposed to security threats. Therefore it is even more important to investigate possible security measures to prevent attacks from happening. In some...

    Provided By University of Tuzla

  • White Papers // Jan 2013

    Opening Up the Sky: A Comparison of Performance-Enhancing Features in SkyDrive and Dropbox

    Cloud storage services are increasing in popularity and using a growing amount of bandwidth on the Internet. Insights on how much traffic is generated are needed for a number of reasons. Cloud storage providers are interested in serving their clients efficiently and effectively, and they want to know how their...

    Provided By University of Tuzla

  • White Papers // Jan 2013

    Browsing within a Multidimensional and Bidirectional Environment by Using a Hypergraph

    In this paper, the authors discuss the navigation efficiency and perceived usability of a multidimensional search browser compared to a one-dimensional search browser. The central question to be examined in this paper is if data can be browsed more time efficient with the former browser than with the latter and...

    Provided By University of Tuzla

  • White Papers // Jan 2013

    Aligning Application Architecture to the Business Context

    Alignment of application architecture to business architecture is a central problem in the design, acquisition and implementation of information systems in current large-scale information-processing organizations. Current research in architecture alignment is either too strategic or too software implementation-oriented to be of use to the practicing information systems architect. This paper...

    Provided By University of Tuzla

  • White Papers // Jan 2013

    Value-Based Business-IT Alignment in Networked Constellations of Enterprises

    Business-ICT alignment is the problem of matching ICT-services with the requirements of the business. In businesses of any significant size, business-ICT alignment is a hard problem, which is currently not solved completely. With the advent of networked constellations of enterprises, the problem gets a new dimension, because in such a...

    Provided By University of Tuzla

  • White Papers // Jan 2013

    Multi-Perspective Requirements Engineering for Networked Business Systems: A Framework for Pattern Composition

    How business and software analysts explore, document, and negotiate requirements for enterprise systems is critical to the benefits their organizations will eventually derive. In this paper, the authors present a framework for analysis and redesign of networked business systems. It is based on libraries of patterns which are derived from...

    Provided By University of Tuzla

  • White Papers // Dec 2012

    Evaluating Third-Party Bad Neighborhood Blacklists for Spam Detection

    The distribution of malicious hosts over the IP address space is far from being uniform. In fact, malicious hosts tend to be concentrated in certain portions of the IP address space, forming the so called Bad Neighborhoods. This phenomenon has been previously exploited to filter spam by means of Bad...

    Provided By University of Tuzla

  • White Papers // Dec 2012

    Cloud Services for Learning Scenarios: Widening the Perspective

    The term \"Cloud computing\" does not primarily specify new types of core technologies but rather addresses features to do with integration, inter-operability and accessibility. Although not new, virtualization and automation are core features that characterize cloud computing. In this paper, the authors intend to explore the possibility of integrating cloud...

    Provided By University of Tuzla

  • White Papers // Nov 2012

    Synchronization and Matched Filtering in Time-Frequency Using the Sunflower Spiral

    Synchronization and matched filtering of signals in time dispersive, frequency dispersive and time-frequency dispersive channels are addressed in this paper. The 'Eigenfunctions' of these channels form the signal sets under investigation. While using channel-eigenfunctions is a first requirement for undistorted data transmission, a second necessity is to achieve good synchronization...

    Provided By University of Tuzla

  • White Papers // Aug 2012

    A Trust Ontology for Business Collaborations

    Now-a-days, the networks that enterprises operate in become increasingly complex. There are many reasons for this. Among others the authors can refer to more advanced user needs, upward tendency toward specialization, changing customer demands, higher customer satisfaction criteria, advancement in Information and Communication Technology (ICT), globalization of markets and manufacturing,...

    Provided By University of Tuzla

  • White Papers // Jul 2012

    Compute-and-Forward on Wireless Lattice Networks With Local Interference

    The capacity of a wireless lattice network with local interference is studied. In particular, the transport capacity under a multiple unicast traffic pattern is studied for a network of nodes placed on a hexagonal lattice. Different ways of handling broadcast and superposition lead to various communication models. In particular the...

    Provided By University of Tuzla

  • White Papers // Jun 2012

    How Can a Smartphone Application Help Increase Swift and Clear Communication in a Noisy Environment?

    In the Netherlands, several dramatic events at festivals made the news the last years. 'Sunset Grooves', a dance festival in the Hoek van Holland in the Netherlands, the police was attacked by a big crowd containing more than hundred people. This paper explores new ways of interaction and information gathering...

    Provided By University of Tuzla

  • White Papers // Jun 2012

    Evading DDoS Detection with Mimicry Attacks

    Distributed Denial of Service (DDoS) attacks are security attacks that prevent normal use of communication facilities. More and more DDoS attacks are occurring each day. Conventional DDoS attacks are typically based on flooding the server. Currently, other types of DDoS attacks have been observed, such as the mimicry DDoS attack....

    Provided By University of Tuzla

  • White Papers // Jun 2012

    Applying the Cloud Computing Model in LTE Based Cellular Systems

    As cloud computing emerges as the next novel concept in computer science, it becomes clear that the model applied in large data storage systems used to resolve issues coming forth from an increasing demand, could also be used to resolve the very high bandwidth requirements on access network, core network...

    Provided By University of Tuzla

  • White Papers // Jun 2012

    Endurability and Profitability Analysis of Collaborative Networks

    A collaborative network is a network consisting of a variety of autonomous actors (e.g. enterprises, organizations and people) that collaborate to better achieve common or compatible goals. A collaborative network starts with a contract and then the collaboration partners conduct business as described in the contract. Before engaging in such...

    Provided By University of Tuzla

  • White Papers // May 2012

    SRCR: A Novel MAC Protocol for Underwater Acoustic Networks With Concurrent Reservation

    Due to the high propagation delay and limited bandwidth of underwater acoustic channels, the design of Media Access Control (MAC) protocols for Underwater Acoustic Sensor Networks (UASNs) faces great challenges and opportunities. In this paper, the authors propose a novel handshaking-based MAC protocol, called as Sender and Receiver Concurrent Reservation...

    Provided By University of Tuzla

  • White Papers // May 2012

    Medium Usage Model for the Design of Dynamic Spectrum Management in ISM Bands

    This paper presents a new approach for dynamic spectrum management for heterogeneous wireless devices. Local congestion degrades the reliability of wireless applications in the License Exempt bands. This leads to the research questions: how to realize equal spectrum sharing between dissimilar systems, and how to improve the collective spectrum efficiency....

    Provided By University of Tuzla

  • White Papers // Apr 2012

    Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level

    In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a decision testing whether both identifiers are derived from the same biometric characteristic. Compared to an unprotected system, most...

    Provided By University of Tuzla

  • White Papers // Mar 2012

    Social and Location-Based Collaboration Mechanism to Manage Wireless Connectivity Context Data

    This paper addresses the challenge of design a feasible social-based mechanism to manage wireless mobile connectivity. In a previous work, the authors proposed a methodology to share connectivity experiences among mobile users inside on-line social networks. The aim was explore peoples social circles to enhance their wireless connectivity experiences e.g.,...

    Provided By University of Tuzla

  • White Papers // Mar 2012

    Cloud Computing Security Requirements: a Systematic Review

    Many publications have dealt with various types of security requirements in cloud computing but not all types have been explored in sufficient depth. It is also hard to understand which types of requirements have been under-researched and which are most investigated. This paper's goal is to provide a comprehensive and...

    Provided By University of Tuzla

  • White Papers // Mar 2012

    Preparing the Future Internet for Ad-Hoc Business Networks Support

    The generally agreed upon basic architecture for the Future Internet contains Internet of Things, Internet of Services, and Internet of Contents and Knowledge. The main contribution presented in this paper is an extension to this architecture, which includes three additional components, namely Business-specific Knowledge and Services, a Business Network Evaluator,...

    Provided By University of Tuzla

  • White Papers // Nov 2012

    Synchronization and Matched Filtering in Time-Frequency Using the Sunflower Spiral

    Synchronization and matched filtering of signals in time dispersive, frequency dispersive and time-frequency dispersive channels are addressed in this paper. The 'Eigenfunctions' of these channels form the signal sets under investigation. While using channel-eigenfunctions is a first requirement for undistorted data transmission, a second necessity is to achieve good synchronization...

    Provided By University of Tuzla

  • White Papers // Feb 2013

    Random Access With Physical-Layer Network Coding

    Leveraging recent progress in compute-and-forward the authors propose an approach to random access that is based on physical-layer network coding: When packets collide, it is possible to recover a linear combination of the packets at the receiver. Over many rounds of transmission, the receiver can thus obtain many linear combinations...

    Provided By University of Tuzla

  • White Papers // Jul 2012

    Compute-and-Forward on Wireless Lattice Networks With Local Interference

    The capacity of a wireless lattice network with local interference is studied. In particular, the transport capacity under a multiple unicast traffic pattern is studied for a network of nodes placed on a hexagonal lattice. Different ways of handling broadcast and superposition lead to various communication models. In particular the...

    Provided By University of Tuzla

  • White Papers // Oct 2009

    Practical Evaluation of Opportunistic Error Correction

    The authors have proposed a novel cross-layer scheme based on resolution adaptive ADCs and fountain codes for the OFDM systems to lower the power consumption in ADCs. The simulation results show that it saves more than 70% power consumption in ADCs comparing to the current IEEE 802.11a system. In this...

    Provided By University of Tuzla

  • White Papers // Oct 2009

    A Combined Spectrum Sensing and OFDM Demodulation Scheme

    Cognitive Radio is a promising new paradigm of radio spectrum access, in which unlicensed secondary users are allowed to transmit in licensed bands when the primary user is not using its spectrum. In order to gain acceptance by primary users a cognitive radio has to guarantee very low levels of...

    Provided By University of Tuzla

  • White Papers // Feb 2009

    Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols

    A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent the jammer from taking actions based on the content of the packets, but the...

    Provided By University of Tuzla

  • White Papers // Nov 2011

    Mobile Cloud Computing - Open Issues and Solutions

    In this paper, the authors describe a research in the area of mobile cloud computing. Cloud computing can be considered as a model that can provide network access to a shared pool of resources, such as storage and computing power, that can be rapidly provisioned and released with minimal management...

    Provided By University of Tuzla

  • White Papers // Jan 2011

    Taxonomy of Cloud Computing Services

    Cloud computing is a highly discussed topic, and many big players of the software industry are entering the development of cloud services. Several companies want to explore the possibilities and benefits of cloud computing, but with the amount of cloud computing services increasing quickly, the need for a taxonomy framework...

    Provided By University of Tuzla

  • White Papers // Mar 2012

    Cloud Computing Security Requirements: a Systematic Review

    Many publications have dealt with various types of security requirements in cloud computing but not all types have been explored in sufficient depth. It is also hard to understand which types of requirements have been under-researched and which are most investigated. This paper's goal is to provide a comprehensive and...

    Provided By University of Tuzla

  • White Papers // Jan 2013

    Aligning Application Architecture to the Business Context

    Alignment of application architecture to business architecture is a central problem in the design, acquisition and implementation of information systems in current large-scale information-processing organizations. Current research in architecture alignment is either too strategic or too software implementation-oriented to be of use to the practicing information systems architect. This paper...

    Provided By University of Tuzla

  • White Papers // Jun 2009

    Converging on Business-IT Alignment Best Practices: Lessons Learned from a Dutch Cross-Governmental Partnership

    An empirical study that explores business-IT alignment processes in a Dutch cross-governmental partnership is summarized in this paper. The aim of the study was to identify processes that contribute to improve such alignment. This study represents a continuation of previous validation efforts that helped the users to confirm the business-IT...

    Provided By University of Tuzla

  • White Papers // Nov 2010

    Comparison of MANET Routing Protocols in Different Traffic and Mobility Models

    Routing protocol election in MANET (Mobile Ad Hoc NETwork) is a great challenge, because of its frequent topology changes and routing overhead. This paper compares performances of three routing protocols: Destination Sequenced Distance Vector (DSDV), Ad Hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR), based on results analysis...

    Provided By University of Tuzla

  • White Papers // Mar 2009

    Energy Consumption in Coded Queues for Wireless Information Exchange

    The authors show the close relation between network coding and queuing networks with negative and positive customers. They use this relation to obtain bounds on the energy consumption in a wireless information exchange setting using network coding. They consider the problem where two nodes in a wireless network need to...

    Provided By University of Tuzla

  • White Papers // Jan 2012

    On the "Near-Universal Proxy" Argument for Theoretical Justification of Information-Driven Sensor Management

    In sensor management applications, sometimes it may be difficult to find a goal function that meaningfully represents the desired qualities of the estimate, such as when the people do not have a clear performance metric or when the computation cost of the goal function is prohibitive. An alternative is to...

    Provided By University of Tuzla

  • White Papers // Jul 2011

    A Theoretical Look at Information-Driven Sensor Management Criteria

    In sensor management, the usefulness of information theoretic measures seems to be validated by a large number of empirical studies, but theoretical justification presented until so far, both for selection of the measure and for the use of information-driven sensor management itself, still seems inconclusive, conflicting, or debatable. In this...

    Provided By University of Tuzla

  • White Papers // May 2012

    SRCR: A Novel MAC Protocol for Underwater Acoustic Networks With Concurrent Reservation

    Due to the high propagation delay and limited bandwidth of underwater acoustic channels, the design of Media Access Control (MAC) protocols for Underwater Acoustic Sensor Networks (UASNs) faces great challenges and opportunities. In this paper, the authors propose a novel handshaking-based MAC protocol, called as Sender and Receiver Concurrent Reservation...

    Provided By University of Tuzla

  • White Papers // May 2012

    Medium Usage Model for the Design of Dynamic Spectrum Management in ISM Bands

    This paper presents a new approach for dynamic spectrum management for heterogeneous wireless devices. Local congestion degrades the reliability of wireless applications in the License Exempt bands. This leads to the research questions: how to realize equal spectrum sharing between dissimilar systems, and how to improve the collective spectrum efficiency....

    Provided By University of Tuzla

  • White Papers // Mar 2012

    Social and Location-Based Collaboration Mechanism to Manage Wireless Connectivity Context Data

    This paper addresses the challenge of design a feasible social-based mechanism to manage wireless mobile connectivity. In a previous work, the authors proposed a methodology to share connectivity experiences among mobile users inside on-line social networks. The aim was explore peoples social circles to enhance their wireless connectivity experiences e.g.,...

    Provided By University of Tuzla

  • White Papers // May 2010

    A Database Approach to Information Retrieval: The Remarkable Relationship Between Language Models and Region Models

    In this paper, the authors unify two quite distinct approaches to information retrieval: region models and language models. Region models were developed for structured document retrieval. They provide a well-defined behaviour as well as a simple query language that allows application developers to rapidly develop applications. Language models are particularly...

    Provided By University of Tuzla

  • White Papers // Jan 2011

    GEM: A Distributed Goal Evaluation Algorithm for Trust Management

    Trust management is an approach to access control in distributed systems where access decisions are based on policy statements issued by multiple principals and stored in a distributed manner. In trust management, the policy statements of a principal can refer to other principals' statements; thus, the process of evaluating an...

    Provided By University of Tuzla

  • White Papers // Jun 2013

    Cloud Computing Security Requirements and Solutions: A Systematic Literature Review

    Cloud Computing (CC) is an evolving term or paradigm, implying the use of configurable computing resources (hardware, software and network) with its purpose to offer a service to a consumer. By enabling ubiquitous, convenient, on-demand network access, its underlying business model contains at least two actors. A cloud provides a...

    Provided By University of Tuzla

  • White Papers // May 2008

    Configurations of External SME Characteristics to Explain Differences in Innovation Performance

    As SMEs need to focus on core competences for efficiency matters, they need to cooperate with external partners to compensate for other competences and resources. This is especially the case in the field of new product development, where SMEs face specific problems compared to large firms. Recognizing the increasing importance...

    Provided By University of Tuzla

  • White Papers // Feb 2014

    Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM

    The authors present a novel mechanism that allows a client to securely outsource their private data to the cloud while at the same time to delegate to a third party the right to run certain algorithms on their data. The mechanism is privacy-preserving, meaning that the third party only learns...

    Provided By University of Tuzla

  • White Papers // Sep 2011

    A Cuckoo's Egg in the Malware Nest On-the-fly Signature-Less Malware Analysis, Detection, and Containment for Large Networks

    Avatar is a new architecture devised to perform on-the-y malware analysis and containment on ordinary hosts; that is, on hosts with no special setup. The idea behind Avatar is to inject the suspected malware with a specially crafted piece of software at the moment that it tries to download an...

    Provided By University of Tuzla

  • White Papers // Dec 2007

    Run-time Spatial Mapping of Streaming Applications to a Heterogeneous Multi-Processor System-on-Chip (MPSOC)

    In this paper, the authors present an algorithm for the run-time mapping of streaming applications onto a MPSOC. Such a mapping has to allocate sufficient resources to the application before the application can start. For embedded and/or energy-constrained devices, it is important that this allocation is done such that as...

    Provided By University of Tuzla

  • White Papers // Aug 2011

    A RESTful Proxy and Data Model for Linked Sensor Data

    The vision of a digital earth calls for more dynamic information systems, new sources of information, and stronger capabilities for their integration. Sensor networks have been identified as a major information source for the digital earth, while semantic web technologies have been proposed to facilitate integration. So far, sensor data...

    Provided By University of Tuzla

  • White Papers // Jul 2011

    Internet Bad Neighborhoods: The Spam Case

    A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over the world, there is evidence that most of the malicious hosts are, in fact, concentrated in small fractions of the IP address...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    Security Risk Management in IT Small and Medium Enterprises

    Data breaches, security incidents and the threat landscape has been widely researched and documented. Different defence measures and policies, their effects and implications have also been researched extensively. However, most security research focuses on different sectors or on large companies. This research aims to map the prevalence of defence measures,...

    Provided By University of Tuzla

  • White Papers // Jun 2010

    Security Architectures in V2V and V2I Communication

    Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication systems are promising for increasing road capacity, avoiding accidents, providing web or entertainment services, and other applications. This paper discusses several proposed security architectures to solve the current problems in securing communication between vehicles. Through an analysis of the literature,...

    Provided By University of Tuzla

  • White Papers // Jan 2006

    Peer to Peer Security

    With the increasing popularity of peer-to-peer networks, new problems arise. One of those problems is the security of such networks. In the area of peer-to-peer security there are five goals: availability, file authenticity, anonymity, access control and fair trading [RiMo04]. The solutions that try to achieve these goals can be...

    Provided By University of Tuzla

  • White Papers // Jan 2008

    Security Issues and Proposed Solutions Concerning Authentication and Authorization for WiMAX (IEEE 802.16e)

    The latest development in wireless metropolitan area networks is IEEE 802.16, also known as WiMAX (Worldwide Interoperability for Microwave Access) [IEEE04] [IEEE06] [Hos06]. This new standard brings the user higher range and speeds compared to 802.11 (WLAN, wireless local area network). In this paper, a research is described analyzing the...

    Provided By University of Tuzla

  • White Papers // Jun 2011

    IPv6 Security: Transition from IPv4 to IPv6

    Because of the transition from IPv4 to IPv6 and certain differences between both IP versions, there are quite some possible security issues. In this paper, the authors try to find how the security of networks is affected by this transition. For this paper, they made a questionnaire to inquire about...

    Provided By University of Tuzla

  • White Papers // Jan 2011

    GSM Security

    In this paper, the authors will give a general overview over the state of GSM security and the practicality of an attack on the A5/1 algorithm used for encrypting 2G GSM communication. They give a general introduction to the development of GSM; afterwards they present their research questions and the...

    Provided By University of Tuzla

  • White Papers // Feb 2007

    Networking Issues in Mobile RFID

    Radio Frequency IDentification (RFID) is a way of remotely storing and/or retrieving data from small objects, the so called RFID tags. These tags contain antennae to receive and respond to queries. Mobile RFID is an extension of ordinary RFID. In this field there exist some security/privacy and reader collisions issues....

    Provided By University of Tuzla

  • White Papers // Jan 2012

    Flow-Based Detection of SSH Intrusion Attempts

    In recent years, computer networks have experienced substantial growth in terms of both size and speed. This situation has caused a strain on the capabilities of traditional network security monitoring systems, where hardware requirements for basic monitoring capabilities increase sharply with network size due to the sheer amount of data...

    Provided By University of Tuzla

  • White Papers // Jun 2008

    Detection of Network Scan Attacks Using Flow Data

    Current Network Scan Detection Systems (NSDS), usually implement detection schemes which depend on the ability to analyze every single network packet in detail. In order to scale NSDS to high speed networks, processing gigabits every second, a different approach is required since packet level inspection is no longer feasible. In...

    Provided By University of Tuzla

  • White Papers // Jan 2014

    Simple and Efficient Searchable Symmetric Encryption with Application

    Searchable Symmetric Encryption (SSE) allows for data-confidentiality while allowing searches in the encrypted data. The researcher formulated strong security definitions for SSE schemes and constructed the first schemes that are secure in their model. Up to now, their schemes set the current state-of-the-art in SSE both in terms of security...

    Provided By University of Tuzla

  • White Papers // Jun 2006

    RFID Privacy Issues in the Security and Recovery of Goods

    Radio Frequency IDentification (RFID) is identification of a tag that currently can be used to identify objects within a maximum range of 100 meters. This paper provides an overview of current research and proposed solutions related to privacy issues with radio frequency identification. The solutions will be related to the...

    Provided By University of Tuzla

  • White Papers // Jan 2006

    An Approach to Full User Data Integrity Protection in UMTS Access Networks

    During development of the UMTS security standard, 3GPP had to take various constraining aspects, like bandwidth and limited hardware, into account, so there were compromises made in security. One such compromise is the absence of a full user-data integrity protection mechanism. In this paper, an approach is made to a...

    Provided By University of Tuzla

  • White Papers // Jun 2006

    Authentication in Web Services

    As the internet is growing all over the world and the need to exchange data is becoming more important, the need of web services to support the data exchange is growing as well. Every year, increasing numbers of companies are using web services to connect their applications and provide themselves...

    Provided By University of Tuzla