Fingerprinting of audio-visual content using digital watermarks is an effective means of determining the originators of unauthorized copies and fighting piracy in digital distribution networks. In particular, watermar...
详细信息
Fingerprinting of audio-visual content using digital watermarks is an effective means of determining the originators of unauthorized copies and fighting piracy in digital distribution networks. In particular, watermarks embedded within the content help trace the traitor responsible for the piracy. A group of users may, however, collude and collectively escape identification by creating an average of their individually watermarked copies that appears unwatermarked. We propose a novel collusion-resilience mechanism, wherein the host signal is warped randomly prior to watermarking. As each copy undergoes a distinctive warp, collusion through averaging either yields low-quality results or requires substantial computational resources to undo random warps. The proposed method is independent of the watermarking scheme used and does not impose any restrictions on the watermark signal that are required by some collusion resistant watermarking schemes. We demonstrate the effectiveness of this approach on digital images.
Automated meter reading, energy billing and energy management are applications that are based on and require remote access to control networks. Such applications are intrinsically linked to power-lines and as such sug...
详细信息
Automated meter reading, energy billing and energy management are applications that are based on and require remote access to control networks. Such applications are intrinsically linked to power-lines and as such suggest using the power distribution grid not only for energy transport but also as the communication medium. This paper describes a data acquisition and control system for energy distribution and consumption using power-lines and IP-based networks for communications. The primary application is meter reading with fine-grained resolution both in time and location of consumption. The paper describes the communication architecture and the services provided by the system and show how the peculiarities of especially the power-line communication influence the design of the interconnection between the two network types. security aspects of the system are also discussed.
Global networking is changing the way that we think about and perform computation. Network-based computing may link tens or hundreds of distributed devices, sensors and computing resources to support an application. T...
详细信息
Global networking is changing the way that we think about and perform computation. Network-based computing may link tens or hundreds of distributed devices, sensors and computing resources to support an application. Therefore, a critical challenge is how dynamically to discover and integrate these distributed services seamlessly for various applications. In this paper, many cutting-edge technologies including semantic Web, Web services, peer-to-peer network and content-based routing, are used to address this challenge. With these technologies, we propose a new framework for dynamic integration of distributed services. Moreover, a prototype system with basic capabilities is implemented as a proof-of-concept to demonstrate the potential of this framework and its constituent technologies in network-based computing.
Recent US regulations mandate the privacy and security of healthcare data at a level never previously contemplated. Our research group is developing a prototype healthcare IT system and medical data portal based upon ...
详细信息
Recent US regulations mandate the privacy and security of healthcare data at a level never previously contemplated. Our research group is developing a prototype healthcare IT system and medical data portal based upon a Web services approach. An authentication Web service manages trust levels, issues authorization tickets, and uses biometric devices to establish identity; an authorization Web service determines what data may be accessed, in what way, and by whom. Hospital administrators set access privileges for recursively-defined groups, subgroups, and individuals. All patient records and medical images are protected using AES encryption with 256-bit keys. Offnetwork entities such as pharmacies, insurance companies, and other medical service providers participate through a federated trust-sharing arrangement. Electronic prescriptions are transmitted securely to participating pharmacies and pick-up notifications are provided to the patient using the preferred notification method (email, alerts to a PDA, automated telephone call) stored in the patient's profile.
Rapid advances in networking, hardware, and middleware technologies are facilitating the development and deployment of grid applications, which are characterized, by their very high computing and resource requirements...
详细信息
Rapid advances in networking, hardware, and middleware technologies are facilitating the development and deployment of grid applications, which are characterized, by their very high computing and resource requirements. These applications and services have multiple, simultaneous end-to-end quality of service (QoS) requirements, such as delay guarantees, jitter guarantees, security, scalability, reliability and availability guarantees, and bandwidth and throughput guarantees. Moreover, these applications and services require secure, controlled, reliable, and guaranteed access to different types of resources, such as network bandwidth, computing power, and storage capabilities, available from multiple service providers. To support next-generation grid applications effectively, there is a need to simplify grid programming by developing a new grid middleware that raises the level of abstraction, and reduces the accidental complexities incurred, by programming at the grid infrastructure middleware level offered by existing grid middleware such as Globus, ICENI, and Legion. Moreover, the new grid middleware must ensure multiple end-to-end QoS properties simultaneously. The paper provides three contributions to the research on next generation grid middleware architecture that provides the above-mentioned properties. First, we describe how we are utilizing the standards-based CORBA distributed object computing and integration technology to design the next generation grid middleware, called Grid TAO (GriT) that complements and enhances existing low-level Grid middleware, such as Globus. Second, we describe how we are using the real-time, fault-tolerant, and data parallel CORBA features to implement GriT to provide the desired properties. Finally, we show how CORBA's platform and language independence features are used in GriT to resolve the portability and interoperability challenges faced, by current grid applications.
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our netwo...
详细信息
ISBN:
(纸本)0780373715
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our networks must be defended. To do this, the information that is being prodded by intrusion detection systems (IDS) must be gathered and then divided into its component parts such that the activity of individual attackers is made clear. Our approach to this involves the application of Bayesian methods to data being gathered from distributed IDS. With this we hope to improve the capabilities for early detection of distributed attacks against infrastructure and the detection of the preliminary phases of distributed denial of service attacks.
In this paper we argue that the traditional model of a mobile agent provides a poor programming structure. We base our argument on our experience since 1993 in building distributed applications and mobile agent platfo...
详细信息
ISBN:
(纸本)0769515495;0769515509
In this paper we argue that the traditional model of a mobile agent provides a poor programming structure. We base our argument on our experience since 1993 in building distributed applications and mobile agent platforms. We have observed that every distributed applications contain three distinct aspects, which we call function, mobility and managament. Separating an application into these three aspects and programming them separately affords great flexibility and leverage when designing mobile agent applications for distributed system management. Because of these observations, we have developed a programming model and a mobile agent system in which these three aspects are clearly separated.
The proceedings contains 96 papers. Topics discussed include distributedsystems, dependable networking, modeling and evaluation, software techniques, security and intrusion tolerance, software and system demonstratio...
详细信息
ISBN:
(纸本)0769515975
The proceedings contains 96 papers. Topics discussed include distributedsystems, dependable networking, modeling and evaluation, software techniques, security and intrusion tolerance, software and system demonstrations, consensus and failure detectors, hardware architecture and design, detection and correction, security and fault tolerance, modeling, simulation and evaluation tools, performance and dependability modeling, fault tolerant design and evaluation, measurement and evaluation, internet performance and dependability, modeling, measurement and analysis of distributedsystems.
A distributed system is no longer confined to a single administrative domain. Peer-to-peer applications and business-to-business e-commerce systems, for example, typically span multiple local-area and wide-area networ...
详细信息
ISBN:
(数字)9783540361084
ISBN:
(纸本)3540000739
A distributed system is no longer confined to a single administrative domain. Peer-to-peer applications and business-to-business e-commerce systems, for example, typically span multiple local-area and wide-area networks, raising issues of trust, security, and anonymity. This paper introduces a distributedsystems model with an explicit notion of. domain. that defines the scope of trust and local communication within a system. We introduce leader-election oracles that distinguish between common and distinct domains, encapsulating failure-detection information and leading to modular solutions and proofs. We show how Reliable Broadcast can be implemented in our domain-based model, we analyze the cost of communicating across groups, and we establish lower-bounds on the number of cross-domain messages necessary to implement Reliable Broadcast.
暂无评论