A particular challenge associated with Grid computing, that of ensuring dependable operation of Grid computing is discussed. The dependability discussed encompasses a broad collection of possible attributes, including...
详细信息
ISBN:
(纸本)0769515975
A particular challenge associated with Grid computing, that of ensuring dependable operation of Grid computing is discussed. The dependability discussed encompasses a broad collection of possible attributes, including, availability, reliability, security, and timely execution. This paper aims to bring together the perspectives of individuals working in different communities to identify issues and challenges that remain to be solved to make dependable Grid computing a reality.
The proceedings contain 130 papers. The topics discussed include: an adaptive maintenance of hierarchical structure in ad hoc networks and its evaluation;assuring message delivery in mobile ad hoc networks with packet...
ISBN:
(纸本)0769515886
The proceedings contain 130 papers. The topics discussed include: an adaptive maintenance of hierarchical structure in ad hoc networks and its evaluation;assuring message delivery in mobile ad hoc networks with packet erasure recovery;spy: a method to secure clients for network services;enhancing the security of block ciphers with the aid of parallel substitution box construction;quantifying effect of network latency and clock drift on time-driven key sequencing;reducing the cost of the critical path in secure multicast for dynamic groups;extended minimal routing in 2-D meshes with faulty blocks;service oriented communication technology for achieving assurance;modeling of train control system and a method of assurance evaluation;adaptive checkpointing for time warp technique with a limited number of checkpoints;and step-by-step system construction technique with assurance technology - evaluation measure for step-by-step system construction.
security policy system defines the basic rules and strategies for information securitysystems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network securitysystems and the corresponding applications...
详细信息
The proceedings contain 23 papers. The special focus in this conference is on Biometrics, Identification, Authentication, Analysis Process, Mobile networks and System Design. The topics include: Biometric authenticati...
ISBN:
(纸本)3540443096
The proceedings contain 23 papers. The special focus in this conference is on Biometrics, Identification, Authentication, Analysis Process, Mobile networks and System Design. The topics include: Biometric authentication in infrastructure security;denial of access in biometrics-based authentication systems;a novel approach to proactive password checking;dynamic provision of up-to-date identity information;a model enabling law compliant privacy protection through the selection and evaluation of appropriate security controls;authentication and authorization of mobile clients in public data networks;vulnerability assessment simulation for information infrastructure protection;an architectural style for development of secure software;a new infrastructure for user tracking prevention and privacy protection in internet shopping;different smartcard-based approaches to physical access control;protocol engineering applied to formal analysis of securitysystems;plausible deniability using automated linguistic stegonagraphy;a practical distributed authorization system for GARA and design of a VPN software solution integrating TCP and UDP services.
In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commercial transactions. After a brief introduction to ...
详细信息
This research focuses on developing a practical distributed data mining process to extract the high-level information (knowledge) from low-level data that stored in massive databases or data warehouses over the networ...
详细信息
The proceedings contain 27 papers. The special focus in this conference is on Service Management, Management of Wireless Multimedia, Bandwidth Sharing Protocols and distributed Video Architectures. The topics include:...
ISBN:
(纸本)3540442715
The proceedings contain 27 papers. The special focus in this conference is on Service Management, Management of Wireless Multimedia, Bandwidth Sharing Protocols and distributed Video Architectures. The topics include: A QoS network management system for robust and reliable multimedia services;federated accounting management system architecture for multimedia service usage management;policy-based quality of service and security management for multimedia services on IP networks in the RTIPA project;formal modeling of service session management;network requirement for management of multimedia over wireless channel;agile systems manager for enterprise wireless networks;streaming media congestion control using bandwidth estimation;signaling protocol for session-aware popularity-based resource allocation;a scalable video server using intelligent network attached storage;on proxy-caching mechanisms for cooperative video streaming in heterogeneous environments;remote multicast monitoring using the RTP MIB;active technology as an efficient approach to control diffserv networks;efficient implementation of packet scheduling algorithm on high speed programmable network processors;distributed dynamic capacity contracting;fair stateless aggregate traffic marking using active queue management techniques;a dynamic marking scheme of assured service for alleviating unfairness among service level agreements;dynamic QoS adaptation using COPS and network monitoring feedback;a management framework for service personalization;efficient access using hierarchical WML decks for multimedia services under wireless and mobile networks and low-weight congestion control for multi-sender applications.
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our netwo...
详细信息
ISBN:
(纸本)0780373715
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our networks must be defended. To do this, the information that is being provided by intrusion detection systems (IDS) must be gathered and then divided into its component parts such that the activity of individual attackers is made clear. Our approach to this involves the application of Bayesian methods to data being gathered from distributed IDS. With this we hope to improve the capabilities for early detection of distributed attacks against infrastructure and the detection of the preliminary phases of distributed denial of service attacks.
The proceedings contain 35 papers. The special focus in this conference is on From Theory to Practice in Multi-Agent systems. The topics include: Network services in context of pervasive mobile internet;on ban logics ...
ISBN:
(纸本)3540433708
The proceedings contain 35 papers. The special focus in this conference is on From Theory to Practice in Multi-Agent systems. The topics include: Network services in context of pervasive mobile internet;on ban logics for industrial security protocols;some aspects of theoretical foundations of a neural agent training process;personalized automated recharge of prepaid mobile phones;multi-agent system for flexible manufacturing systems management;automata-based multi-agent model as a tool for constructing real-time intelligent control systems;a resource manager for multi agent systems in smart spaces;software development kit for multi-agent systems design and implementation;formal semantics for behavioural substitutability of agent components;a modelling environment for mind and matter aspects of intentional behaviour;temporal languages for simulation and analysis of the dynamics within an organisation;syntactic pattern recognition-based agents for real-time expert systems;towards requirements analysis for autonomous agent behaviour;an improved q-learning algorithm using synthetic pheromones;organisations in the particular class of multi-agent systems;an acquaintance model-based coalition formation multi-agent system;efficient model checking of causal-knowledge protocols;model of cooperation in multi-agent systems with fuzzy coalitions;learning collective behaviour from local interactions;multi-agent architecture for knowledge fusion from distributed sources;universal formal model of collective intelligence and its iq measure;a programming language for coordinating group actions and optimization of resource allocation in distributed production networks.
Time-driven key sequencing (TKS) is a key management technique that synchronizes the session key used by a set of communicating principals based on time of day. This relatively low cost method of session key synchroni...
详细信息
Time-driven key sequencing (TKS) is a key management technique that synchronizes the session key used by a set of communicating principals based on time of day. This relatively low cost method of session key synchronization has been used in specialized distributedsystems with low-end communicating devices where sessions are sparse and each session spans a short time period comprising a small number of messages. In this paper, we describe how TKS may be useful in several scenarios involving high speed computernetworks. More importantly, we present a performance model of TKS and conduct a detailed analysis to determine the impact of clock drift and network latency on the required key refresh rate. We give the exact conditions for determining the range of adequate key refresh rates, and demonstrate that the derived conditions are sufficient to ensure that data are both protected and deliverable. Interestingly, these conditions may be used to obtain a key refresh rate that can tolerate a maximum amount of clock drift after other parameters in the system are fixed.
暂无评论