We present a programming notation aiming at protecting the secrecy of both host and agent data in global computing applications. The approach exploits annotations with sets of node addresses, called regions. A datum c...
详细信息
ISBN:
(纸本)9781581138122
We present a programming notation aiming at protecting the secrecy of both host and agent data in global computing applications. The approach exploits annotations with sets of node addresses, called regions. A datum can be annotated with a region that specifies the network nodes that are allowed to interact with it. Network nodes come equipped with two region annotations specifying the nodes that can send data and spawn processes over them. The language semantics guarantees that computation proceeds according to these region constraints. To minimize the overhead of runtime checks, a static compilation phase is exploited. The proposed approach is largely independent of a specific programming language;however, to put it in concrete form, here we focus on its integration within the process language μKLAIM. We prove that in compiled μKLAIM nets, data can be manipulated only by authorized users. We also give a more local formulation of this property, where only a subnet is compiled. Finally, we use our theory to model the secure behaviour of a UNIX-like multiuser system.
In this paper we introduce Semantic Web Spaces, a middleware for coordinating knowledge processes on the Semantic Web. Co-ordination is an important aspect of any type of interaction between computer agents, but we fi...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this paper we introduce Semantic Web Spaces, a middleware for coordinating knowledge processes on the Semantic Web. Co-ordination is an important aspect of any type of interaction between computer agents, but we find especially so on the Semantic Web in which the communication contains knowledge rather than data and correct inferences can only be made when the right knowledge is available at the right time. Because of this we have identified tuplespace computing as a relevant paradigm for agent communication on the Semantic Web and have prototypically realized a system based on a Linda-inspired coordination model and on core semantic technologies such as RDF, ontologies and reasoning. Copyright 2007 acm.
Jinni 2004 [1, 2, 3] (available from http ://***/Jinni) expresses various agent programming constructs in terms of an Object Oriented Logic Programming layer implemented on top of a Java-based Prolog compiler. The arc...
详细信息
ISBN:
(纸本)9781581139648
Jinni 2004 [1, 2, 3] (available from http ://***/Jinni) expresses various agent programming constructs in terms of an Object Oriented Logic Programming layer implemented on top of a Java-based Prolog compiler. The architecture provides a high degree of compositionality through the use of a small set of orthogonal programming language constructs. Copyright 2005 acm.
Despite the widespread use and adoption of cookies as the basis for web applications to keep state information, cookies present some design issues that are yet to be fully addressed. The fact that cookies are stored o...
详细信息
Despite the widespread use and adoption of cookies as the basis for web applications to keep state information, cookies present some design issues that are yet to be fully addressed. The fact that cookies are stored on client-side's memory means that they are tightly coupled to the machine that is interacting with the web server. Yet often, these cookies are initiated by web applications to identify user's preferences and identifications. As the user moves across different machines to access the same site, the information previously recorded is lost and the web application has no way of restoring the state, unless the user revisits the same client machine, where the original cookies were set. This paper presents a novel solution to address the need for cookies to be "mobile" by leveraging on smart card to manage cookies, with the benefit of mobility in a pocket. We describe the design and implementation of the CookiesCard framework that uses smart card as a secure and mobile storage media to manage personalized cookies, The article presents the development of the CookiesCard proxy that directly interacts with the smart card to provide cookies management, while acting as an intermediatary between the client browser and a web server.
Web applications are vulnerable to failures and low performance due to the large population of users and the widespread distribution of Internet. Transaction technology provides Web applications with high reliability ...
详细信息
ISBN:
(纸本)9781581138122
Web applications are vulnerable to failures and low performance due to the large population of users and the widespread distribution of Internet. Transaction technology provides Web applications with high reliability and improved performance. This paper presents a novel approach for the efficient commit processing of Web transactions. The proposed approach is based on the implementation of priority active network scheduling mechanism at each network node. It involves rigorous analysis of a network node with finite capacity to accommodate messages, bursty arrival process to represent incoming multi-class messages, and the employment of a priority scheduling mechanism to give preferential treatment to high priority messages. This analytical solution provides closed form expressions for calculating the queuing delay per class involved in the commit processing of Web transactions at each network node. The proposed approach significantly reduces the queuing delay for high priority messages such as commit, abort, and compensation of Web transactions. Consequently, performance of the commit processing of Web transactions is improved as response time of the nodes responsible for making decision is reduced.
Computational results for the microwave heating patterns in singlefed multimode empty and loaded cavities are presented in this paper. Combined Finite Difference Time Domain (FDTD) and Finite Volume (FV) methods are u...
详细信息
ISBN:
(纸本)9781581138122
Computational results for the microwave heating patterns in singlefed multimode empty and loaded cavities are presented in this paper. Combined Finite Difference Time Domain (FDTD) and Finite Volume (FV) methods are used to solve the equations that describe the electromagnetic field and heat transfer in the processed samples, The coupling between the two schemes is through a change in dielectric properties which are assumed to be temperature dependent. The model takes into account the changing effect of the load's properties on the electric field and modal patterns. A study of the modes and their corresponding field pattern inside a resonant cavity is presented computationally using the FDTD solver. The coupled algorithm is then used to investigate heat distribution by observing the occurrence of resonant conditions which are responsible for achieving high heating levels.
A number of asymmetrical payment methods have been developed to enable mobile users to buy goods online by charging them to their mobile phone bills by their network operators. It has been recognized that these method...
详细信息
A number of asymmetrical payment methods have been developed to enable mobile users to buy goods online by charging them to their mobile phone bills by their network operators. It has been recognized that these methods must be used in conjunction with the security services of authentication and non-repudiation of the origin of the request(s) sent from a mobile user so as to prevent fraudulent actions by the network operator or any other entities. This paper presents a novel joint-signature scheme that can be used as one of the security primitives to address the above security services. The scheme enables a mobile user to securely and efficiently instruct his/er network operator for m-payment related actions. It is based on the use of the one-way hash function and traditional digital signature method, but in a collaborative manner with the network operator. The joint-signature scheme achieves the same security services as those by a traditional digital signature scheme, i.e. message origin authentication, message integrity and non-repudiation of origin, but offers lower computational cost for the mobile user. In addition, it imposes lower communication cost in comparison with proxy/server-aided signature schemes.
Data that can conceptually be viewed as tree structures abounds in domains such as bio-informatics, web logs, XML databases and multi-relational databases. Besides structural information such as nodes and edges, tree ...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Data that can conceptually be viewed as tree structures abounds in domains such as bio-informatics, web logs, XML databases and multi-relational databases. Besides structural information such as nodes and edges, tree structured data also often contains attributes, that represent properties of nodes. Current algorithms for finding frequent patterns in structured data, do not take these attributes into account, and hence potentially useful information is neglected. We present FAT-miner, an algorithm for frequent pattern discovery in tree structured data with attributes. To illustrate the applicability of FAT-miner, we use it to explore the properties of good and bad loans in a well-known multi-relational financial database. Copyright 2007 acm.
Access control in mobile and pervasive computing is a complex issue, with many aspects relating to the establishment, management, and enforcement of methods and policies that allow mobile devices to share resources wi...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Access control in mobile and pervasive computing is a complex issue, with many aspects relating to the establishment, management, and enforcement of methods and policies that allow mobile devices to share resources with each other. Communication between mobile devices can arise spontaneously, involve the sharing of few resources between heterogeneous platforms, and only need to be maintained for a short time. Additionally, the devices often communicate with each other a single time, and have no pre-shared secret or a priori knowledge of the other device. In this paper we propose a secure solution for providing controlled access to local resources in mobile and pervasive computing environments. Our solution incorporates demonstrative verification of security credentials, a key-based capability delegation, and easy to use access control features in order to provide simple access with low maintenance costs. It is particularly designed for one-time-only communication between mobile-to-mobile or mobile-to-kiosk devices. Copyright 2007 acm.
Runtime monitoring is performed during system execution to detect whether the system's behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Runtime monitoring is performed during system execution to detect whether the system's behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be monitored in event calculus - a formal temporal first order language. Following an investigation of how this framework could be used to monitor security requirements, in this paper we propose patterns for expressing three basic types of such requirements, namely confidentiality, integrity and availability. These patterns aim to ease the task of specifying confidentiality, integrity and availability requirements in monitorable forms by non-expert users. The paper illustrates the use of these patterns using examples of an industrial case study. Copyright 2007 acm.
暂无评论