Wireless sensor networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications in national security, surveillance, healthcare, ar...
详细信息
ISBN:
(纸本)9781450321099
Wireless sensor networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications in national security, surveillance, healthcare, area/target monitoring, and many more. In this paper we use patterns to present an abstract view of the structure and general architecture of a wireless sensor network. Using a sensor network pattern makes the design of such a network simpler and more convenient, and can facilitate their integration with the rest of the IT system when applicable. The security aspects of a wireless sensor network are also addressed. Copyright 2011 ACM.
We present here a misuse pattern, Spoofing Web Services. A misuse pattern describes how a misuse is performed from the point of view of the attacker, what system units it uses and how, provides ways of stopping the at...
详细信息
ISBN:
(纸本)9781450321099
We present here a misuse pattern, Spoofing Web Services. A misuse pattern describes how a misuse is performed from the point of view of the attacker, what system units it uses and how, provides ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and provides forensic information. This pattern is useful for designers and developers of web services, who can then avoid these situations following the prescriptions of the pattern. This pattern could also be a guide to know what happened and to correct the corresponding vulnerabilities that led to the attack. A web service spoofing misuse tries to impersonate the identity of a user, and then with the user's credentials makes requests in his name, with the intention of accessing a specific web service. Copyright 2011 ACM.
Cloud Computing is a new computing structure that allows providers to deliver services on demand by means of virtualization. We are studying some security attacks in cloud computing by describing them in the form of m...
详细信息
ISBN:
(纸本)9781450321099
Cloud Computing is a new computing structure that allows providers to deliver services on demand by means of virtualization. We are studying some security attacks in cloud computing by describing them in the form of misuse patterns. A misuse pattern describes how an information misuse is performed from the point of view of the attacker. It defines the environment where the attack is performed, how the attack is performed, countermeasures to stop it, and how to find forensic information to trace the attack once it happens. We are building a catalog of misuse patterns and we present here two of them: Resource Usage Monitoring (complete) and Malicious Virtual Machine Creation (partially). We discuss also the value of having such a catalog. Copyright 2011 ACM.
The proceedings contain 20 papers. The topics discussed include: why capturing business knowledge with patterns provides;a quest for what drives patterns - an epistemological approach to the underlying structure of pa...
ISBN:
(纸本)9781450321099
The proceedings contain 20 papers. The topics discussed include: why capturing business knowledge with patterns provides;a quest for what drives patterns - an epistemological approach to the underlying structure of patterns;patterns and knowledge management;centering process case study;pattern cards game;applying idioms for synchronization mechanisms. synchronizing communication components for the hypercube sorting problem;selection of metrics for predicting the appropriate application of design patterns;applying design patterns for communication components. communicating CSE components for the two-dimensional wave equation;implementing patterns with annotations;towards a collection of refactoring patterns based on code clone categorization;and two security patterns: least privilege and security logger and auditor.
Design patterns are known for their usefulness to solve recurrent problems. Design patterns are a way of transmitting knowledge and experience by using proven, high quality solutions. A problem that emerges when using...
详细信息
ISBN:
(纸本)9781450321099
Design patterns are known for their usefulness to solve recurrent problems. Design patterns are a way of transmitting knowledge and experience by using proven, high quality solutions. A problem that emerges when using design patterns is that it is not clear how to measure the impact that has its application on the source code. The relationships between metrics and design patterns is not clear. We propose an experiment for measuring the usefulness of metrics and their success in predicting correct usage of design patterns. With this experiment we will explore which metrics capture best the relationship of design patterns quality of the source code. By using those metrics we will make predictions about the correct usage of the design patterns. In this experiment the selected metrics were not a good predictor, however it is a starting point to explore more metrics and their relationships with design patterns. Copyright 2011 ACM.
J.G. Frazer's "The Golden Bough" is a historical tome. It tried systematic explanation about the rituals, the myths, and the habits in the primitive society. I made summary using the structure of a patte...
详细信息
In this paper, we describe the centering process from pattern Language turning into Project Language through the process. The centering process is introduced by Christopher Alexander and Hiroshi Nakano. The centering ...
详细信息
ISBN:
(纸本)9781450321099
In this paper, we describe the centering process from pattern Language turning into Project Language through the process. The centering process is introduced by Christopher Alexander and Hiroshi Nakano. The centering process is useful in software, requirement engineering, management, community planning and so on. Copyright 2011 ACM.
A method to make game design pattern language is explained. The method is iteration cycle process that one game design pattern is supposed to game-fun-community via web-media such as twitter, and the pattern is refine...
详细信息
ISBN:
(纸本)9781450321099
A method to make game design pattern language is explained. The method is iteration cycle process that one game design pattern is supposed to game-fun-community via web-media such as twitter, and the pattern is refined through reflecting their opinions. Finally it changes more refined patterns and many examples reported by the community show the correctness of the pattern. Here not only the method but also the six examples of game design pattern language are presented. Copyright 2011 ACM.
Stencil computations, involving operations over the elements of an array, are a common programming pattern in scientific computing, games, and image processing. As a programming pattern, stencil computations are highl...
详细信息
Recently we often use SNS such as Twitter or Facebook to discuss about a particular topics online. We use "hashtag" to demostrate the topic of a tweet, thus we can share the opinion about the topic. We use &...
详细信息
ISBN:
(纸本)9781450321099
Recently we often use SNS such as Twitter or Facebook to discuss about a particular topics online. We use "hashtag" to demostrate the topic of a tweet, thus we can share the opinion about the topic. We use "like!" button to demostrate our feeling of a comment, thus our consent will be visualized. We use such technics to enact discussion smoothly. In some cases, we use online communication system such as SNS or BBS to discuss online within their own organization. In this paper we call such discussion using social media or online communication system as "online discussion". The authors have some experiences to hold such online discussion event in our organization. Thus we tried to compose a pattern language to summarize our knowledge obtained from the online discusson event. Copyright 2011 ACM.
暂无评论