the proceedings contain 20 papers. the topics discussed include: a denotational model for Web services choreography;automated testing of description logic reasoners;a domain-specific language for application-level che...
ISBN:
(纸本)3540897364
the proceedings contain 20 papers. the topics discussed include: a denotational model for Web services choreography;automated testing of description logic reasoners;a domain-specific language for application-level checkpointing;data replication using experienced based trust in a data grid environment;back-edge heuristic for efficient data distribution in grid systems;Web users' personality traits analysis;a new approach for security in MPLS multicast networks;application for a secure fax system;forward-secure multi-signatures;modeling and analysis of mobility in MANeTs for distributed applications;scalability and route failure time of a hybrid protocol for identification of node-disjoint paths in mobile ad hoc networks;a strict priority based QoS-aware MAC protocol for mobile ad hoc networks;and QoS-aware dynamic source routing using diffserv principles.
Modern operating systems offer a large array of features in their network subsystems that support fine-grained access control, monitoring and accounting. Such features allow a system administrator to account and filte...
详细信息
ISBN:
(纸本)9780769530994
Modern operating systems offer a large array of features in their network subsystems that support fine-grained access control, monitoring and accounting. Such features allow a system administrator to account and filter outgoing network connections based on attributes such as the destination IP address and port number of the connection. Withthe increase in multi-user systems such as Grid Networks and Shared Web Hosting, the complexity of these tasks has increased. Current operating systems lack the ability to determine the intent of a network connection based on the connection's technical characteristics alone. this paper presents a new mechanism by which applications themselves are given the ability to pass meta information to the network subsystem, allowing it to take advantage of application specific data.
the proceedings contain 45 papers. the topics discussed include: synthetic environments for cooperative product design;cooperative design using Haptic interaction and 3D visualization;application of parallel programmi...
ISBN:
(纸本)3540880100
the proceedings contain 45 papers. the topics discussed include: synthetic environments for cooperative product design;cooperative design using Haptic interaction and 3D visualization;application of parallel programming in collaborative design;collaborative explorative data analysis applied in HTML;cooperative visualization of privacy risks;an ontology-based semantic cooperation framework for business processes;a framework for tolerance analysis in collaborative engineering mechanical design;peer-to-peer collaboration over XML documents;cooperative scenario building in environmental planning: agents, roles, architectures;towards a platform for cooperative creation of scientific publications;and a cooperative simulation framework for traffic and transportation engineering.
Trust is the main concern in securing web applications and it has to be implemented in every layer of application at the time of development. Building trust based on a proper model is an important step in designing a ...
详细信息
ISBN:
(纸本)9781902316581
Trust is the main concern in securing web applications and it has to be implemented in every layer of application at the time of development. Building trust based on a proper model is an important step in designing a secure web-based system. Such model should address users' sociological, economical, and personal expectations of trust in every layer of web applications. One approach is to make sure that data is transferred securely and trustable between the different parts of the application. Because of the importance of web services in modern web applications and the important role of message in it, our focus is in web service message security. In this approach, the original entity authentication is identified as the first step in establishing trust. Next, the security requirements for message level of web services are listed as the key principle of an effective security design and implementation of web applications. Moreover, threat analysis of web applications and their possible solutions lead to complete the proposed model. this paper analyzes the threats that can be related to the use of web services technology and its messaging system in a web application.
We present a novel infrastructure which allows the Web Service-Based Wireless Alarm Monitoring and data Acquisition System for Pharmaceutical Plants (WAMDAS) to be a more portable, reliable, secure and robust wireless...
详细信息
ISBN:
(纸本)9780769530994
We present a novel infrastructure which allows the Web Service-Based Wireless Alarm Monitoring and data Acquisition System for Pharmaceutical Plants (WAMDAS) to be a more portable, reliable, secure and robust wireless web service-based middleware system. this infrastructure provides a reliable alarm management mechanism that guarantees timely alarm delivery according with a defined configuration schema for alarms. Also it provides a functionality to help the availability of web services to respond the requests on time. Likewise, a Windows-based application module is provided to permit system administrators to dynamically configure all system information and parameters, as well as define the configuration scheme for alarm management. Furthermore, the device application was improved with a strong security mechanism to access the system, a mechanism to control the system usage, and a redesign of the user interface. We conducted an evaluation of the alarm services protocol;this evaluation shows that the alarm delivery time was optimized, and the alarm delivery process is more reliable and fault tolerant when using message queues instead of TCP/IP sockets.
the Public Key Encryption with Keyword Search Scheme (PEKS) was first proposed by Boneh et al. in 2004. this scheme solves the problem of searching on datathat is encrypted using a public key setting. Recently, Back ...
详细信息
ISBN:
(纸本)9783540692942
the Public Key Encryption with Keyword Search Scheme (PEKS) was first proposed by Boneh et al. in 2004. this scheme solves the problem of searching on datathat is encrypted using a public key setting. Recently, Back et al. proposed a Secure Channel Free Public Key Encryption with Keyword Search (SCF-PEKS) scheme that removes the secure channel for sending trapdoors. they later proposed another improved PEKS scheme that integrates with a public key encryption (PKE) scheme, called PKE/PEKS. In this paper, we present off-line keyword guessing attacks on SCF-PEKS and PKE/PEKS schemes. We demonstrate that outsider adversaries that capture the trapdoors sent in a public channel can reveal encrypted keywords by performing off-line keyword guessing attacks. While, insider adversaries can perform the attacks regardless the trapdoors sent in a public or secure channel.
An embedded gateway serving for the communication between Ethernet and the heterogeneous multilayer interfaces is put forward in this paper. Based on the analysis of the common application requirements in multi-indust...
详细信息
ISBN:
(纸本)9780769532882
An embedded gateway serving for the communication between Ethernet and the heterogeneous multilayer interfaces is put forward in this paper. Based on the analysis of the common application requirements in multi-industry, the functions of this system are planned Collaborative design is adopted in the routing gateway. the models of hardware and software are presented in detail. In the scheme of hardware, S3C44b0X based on ARM7TDMI is used as the core of the gateway, the primary/backup ports based on ENC28J60 are introduced to improve the reliability of communication, and the TL16C554A is selected to extend serial ports. mu C/OS-II has been transplanted in the Embedded Platform, so the subsequent development and the maintainability have been advanced. Routing protocol integrating I/O data, frame data and pack-age data from the heterogeneous multilayer interfaces is designed and realized. Multi-application scene equipments are implemented by the routing communication gateway.
Road congestion and traffic-related pollution have a large, negative social and economic impact, and we believe many of these problems can be reduced through investment in monitoring, distribution and processing of tr...
详细信息
Road congestion and traffic-related pollution have a large, negative social and economic impact, and we believe many of these problems can be reduced through investment in monitoring, distribution and processing of traffic information. this paper outlines how our on-going work on the TIME project (transport information monitoring environment) provides a solution, using traffic sensor systems and the design and development of an open and decentralised software framework. We also discuss how we address the privacy and security implications of the increased use of sensors and data processing.
An RFID system consists of an RFID reader, a server connected to a database, and RFID tags attached to the objects needed to be identified. We are interested in the case where two tags are needed to be simultaneously ...
详细信息
An RFID system consists of an RFID reader, a server connected to a database, and RFID tags attached to the objects needed to be identified. We are interested in the case where two tags are needed to be simultaneously scanned in a readerpsilas field, for which many protocols have been proposed in literature. they however are all insecure for the special case, where an adversary, acting as a reader, can penetrate the server and access data stored in the server. In this paper, we propose a protocol to remedy this problem for two-tag environment. In addition, it can be extended to more-than-two-tag environment without much increasing total amount of time to scan all the tags.
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. the protocol applies a branching diagnostic program with classific...
详细信息
ISBN:
(纸本)9781595937032
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. the protocol applies a branching diagnostic program with classification labels in the leaves to the user's attribute vector. the user learns only the label assigned by the program to his vector;the diagnostic program itself remains secret. the program's owner does not learn anything. Our construction is significantly more efficient than those obtained by direct application of generic secure multi-party computation techniques. We use our protocol to implement a privacy-preserving version of the Clarify system for software fault diagnosis, and demonstrate that its performance is acceptable for many practical scenarios.
暂无评论