Due to the rapid growth of the network technologies, new form network attacks are emerging endlessly. Hence it has become very critical to protect computernetworks from malicious attackers who try to interrupt the fu...
详细信息
With the increase of the dynamics of networks interconnection, security issues became a critical point that needs to be considered. The widely adopted solution considers a mix of routers, switches, firewalls and virtu...
详细信息
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management system, R-Chain, where each peer maintain...
详细信息
With the proliferation of portable computing devices and ascending popularity of group-oriented computing, wireless ad hoc network multicasting remains a challenging research subject. While Virtual Multicast Backbone ...
详细信息
Grid replication service improves availability in terms of storing multiple data at the distributed locations, however there is not any economic scheme to decide the location of multiple replicas. In this paper, we in...
详细信息
The proceedings contain 30 papers. The special focus in this conference is on Trust Management. The topics include: The legal framework governing forensics in an online environment;a policy and domain services framewo...
ISBN:
(纸本)3540213120
The proceedings contain 30 papers. The special focus in this conference is on Trust Management. The topics include: The legal framework governing forensics in an online environment;a policy and domain services framework for grid computing and semantic web services;enhanced reputation mechanism for mobile ad hoc networks;incentives for honest participation in distributed trust management;history-based signature or how to trust anonymous documents;trading privacy for trust;supporting privacy in decentralized additive reputation systems;engineering trust based collaborations in a global computing environment;analysing the relationship between risk and trust;e-notebook middleware for accountability and reputation based trust in distributed data sharing communities;requirements engineering meets trust management;towards dynamic security perimeters for virtual collaborative networks;human experiments in trust dynamics;using trust in recommender systems;modeling controls for dynamic value exchanges in virtual organizations;analyzing correlation between trust and user similarity in online communities;trust development and management in virtual communities;managing internet-mediated community trust relations and trust mediation in knowledge management and sharing.
The proceedings contain 35 papers. The special focus in this conference is on Information security. The topics include: An abstract reduction model for computersecurity risk;remediation graphs for security patch mana...
ISBN:
(纸本)9781475780161
The proceedings contain 35 papers. The special focus in this conference is on Information security. The topics include: An abstract reduction model for computersecurity risk;remediation graphs for security patch management;security modelling for risk analysis;contrasting malicious Java applets by modifying the java virtual machine;meeting the global challenges of security incident response;security in globally distributed industrial information systems;a case for information ownership in ERP systems;interactive access control for web services;identity-based key infrastructures (IKI);compact modular arithmatic class library available on cellular phone and its application to secure electronic voting system;dependable security by twisted secret sharing;a language driven IDS for event and alert correlation;install-time vaccination of windows executables to defend against stack smashing attacks;eigenconnections to intrusion detection;a long-term trial of keystroke profiling using digraph, trigraph and keyword latencies;trusted computing, trusted third parties, and verified communications;supporting end-to-end security across proxies with multiple-channel SSL;a content-protection scheme for multi-layered reselling structure;an asymmetrie cryptography secure channel protocol for smart cards;improving seeure device insertion in Horne ad-hoc networks keyword latencies;spam filter analysis;collective signature for efficient authentication of xml documents;updating encrypted XML documents on untrusted machines;efficient simultaneous contract signing;DHCP authentication using certificates;extending systrace to empower applications;fast digital certificate revocation;managing anonymity while sharing knowledge to servers;security and differentiated hotspot services through policy-based management architecture and key management for secure multicast in hybrid satellite networks.
The proceedings contain 36 papers. The special focus in this conference is on Context-Aware Support for Mobile systems, Context-Aware Applications, networks, Service and Network Management. The topics include: Mobilit...
ISBN:
(纸本)3540234233
The proceedings contain 36 papers. The special focus in this conference is on Context-Aware Support for Mobile systems, Context-Aware Applications, networks, Service and Network Management. The topics include: Mobility prediction for mobile agent-based service continuity in the wireless internet;development methodology for location-aware mobile agent;building policy-based context aware applications for mobile environments;contextware research challenges in ambient networks;a mobile portal model based on reflective middleware and mobile agents;configuration management for networked reconfigurable embedded devices;a programmable network enabling content adaptation;agents technology extended with mobile devices;agent migration as an optional service in an extendable agent toolkit architecture;remote database administration in mobile computational environments;framework for mobile agents on computer grid environments;negotiation process for resource allocation in grid using a multi-agent system;a probabilistic transmission control scheme for low power consumption in sensor networks;ambient networks management challenges and approaches;scalability, security technologies and mobile applications;detecting and proving manipulation attacks in mobile agent systems;a mobile agent security scheme for the creation of virtual enterprises;a mobile agent-based programmable hybrid intrusion detection system;a secure framework for user privacy in heterogeneous location networks;on the performance of distributed search by mobile agents;introducing ip domain flexible middleware stacks for multicast multimedia distribution in heterogeneous environments;design of a tourist driven bandwidth determined multimodal mobile presentation system and identifying and documenting test patterns from mobile agent design patterns.
Peer-to-peer(P2P) networking has come to a family of technologies and techniques for organizing distributed applications, which takes advantage of resources available at the Internet edges. In this paper, we propose a...
详细信息
Peer-to-peer(P2P) networking has come to a family of technologies and techniques for organizing distributed applications, which takes advantage of resources available at the Internet edges. In this paper, we propose an innovative P2P system architecture, called CBRBrain, to implement the content based routing (CBR) service over the backbone routers instead of at the terminal hosts. Hence CBRBrain avoids some drawbacks in previous P2P systems and significantly improves the efficiency and security. Data locating process is easily implemented on CBRBrain by associating a hashed key with each data item and storing the (key, address) pair in routers. The cost for topology update is neglectful since the routers is almost static in Internet and the topology is not affected by the frequent joining and leaving of hosts at all. The traffic generated by CBRBrain system over Internet is also expected to be significantly smaller compared with other P2P systems. The logical topology of CBRBrain backbone can be any self-routing structure to enable the content based routing service. In the paper, we recommend to construct the underlying logical topology based on the pseudo-balanced de Bruijn graph, since it has many nice properties such as bounded degrees, low diameters and fault tolerance. As an illustration, we describe the mechanism of P2P file sharing application under CBRBrain architecture. Our work is a first step to build an intelligent backbone of the next generation Internet, and to facilitate the emergence of various intelligent applications over Internet, besides P2P file sharing.
The proceedings contain 27 papers. The special focus in this conference is on Testing, Performance, and M/E-Commerce. The topics include: Formal analysis of the internet open trading protocol;life-cycle e-commerce tes...
ISBN:
(纸本)9783540302339
The proceedings contain 27 papers. The special focus in this conference is on Testing, Performance, and M/E-Commerce. The topics include: Formal analysis of the internet open trading protocol;life-cycle e-commerce testing with OO-TTCN-3;specification of autonomous agents in e-commerce systems;an approach for assessment of electronic offers;a decomposition based approach for design of supply aggregation and demand aggregation exchanges;a construction kit for modeling the security of m-commerce applications;a minimal market model in ephemeral markets;a process-oriented approach towards structured market modelling;formal specification of symbolic-probabilistic systems;a bounded true concurrency process algebra for performance evaluation;branching time equivalences for interactive Markov chains;system contents versus system delay for discrete-time queueing systems with renewal arrivals;adaptive fuzzy queue management and congestion avoidance in TCP/AQM networks;modeling and analysis of dual block multithreading;performance evaluation of a snap-based grid resource broker;an analytical design of a practical replication protocol for distributedsystems;modelling a decentralised peer-to-peer emergency medical application;integrating system performance engineering into mascot methodology through discrete-event simulation;modeling and testing agent systems based on statecharts and generation of integration tests for self-testing components.
暂无评论