The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and enforcement on resource-constrained an...
详细信息
The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and enforcement on resource-constrained and occasionally connected devices. Software vendors are, however, still applying old usage rights models to a platform where application rights will be specified, managed and distributed in new and different ways. The characteristics of pervasive environments, such as occasional connectivity, require the introduction of more flexible usage rights models, such as audit-based model, that do not assume the availability of network connections. In this paper we describe a pervasive application rights management architecture for both desktop and mobile applications that provides an integrated platform for the specification, generation, delivery, and management of application usage rights based on Web services standards. We also introduce flexible usage rights models required by pervasive environments that can be embedded in target applications using aspect-oriented technology.
Recent advances in P2P lookup overlays provide an appealing solution for distributed search without relying on a single database server. In addition to performing resource discovery, these P2P substrates also offer me...
详细信息
The concept of linear-time verification with an inherent fairness condition has been studied under the names approximate satisfaction, satisfaction up to liveness, and satisfaction within fairness in several publicati...
详细信息
ISBN:
(纸本)9728865228
The concept of linear-time verification with an inherent fairness condition has been studied under the names approximate satisfaction, satisfaction up to liveness, and satisfaction within fairness in several publications. Even though proving the general applicability of the approach, reasonably efficient algorithms for inherently fair linear-time verification (IFLTV) are lacking. This paper bridges the gap between the theoretical foundation of IFLTV and its practical application, presenting a model-checking algorithm based on a structural analysis of the synchronous product of the system and property (Büchi) automata.
Mobile ad-hoc networks (MANETs) comprise computer nodes which communicate over wireless links without any central control. Therefore, they must be able to make fully autonomous security decisions. This introduces new ...
详细信息
Mobile ad-hoc networks (MANETs) comprise computer nodes which communicate over wireless links without any central control. Therefore, they must be able to make fully autonomous security decisions. This introduces new security challenges that existing security models and mechanisms do not adequately address (Campbell, 2002). In this paper we present a trust-based security system that deals with the specific challenges of MANETs by combining decentralised security management and context-aware computing. With this combination, our trust-based security system can establish appropriate trust levels for every situation.
We present in this paper a unit testing framework for network configurations which verifies that the configuration meets prior defined requirements of the networks behavior. This framework increases the trust in the c...
ISBN:
(纸本)9728865228
We present in this paper a unit testing framework for network configurations which verifies that the configuration meets prior defined requirements of the networks behavior. This framework increases the trust in the correctness, security and reliability of a networks configuration. Our testing framework is based on a behavioral simulation approach as it is used in hardware design [1]. The unit testing framework is part of the SNSF VeriNeC project [2].
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details related to the exchange and negotiatio...
详细信息
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details related to the exchange and negotiation of authorization credentials have not received similar attention. Existing solutions like SSL/TLS and IPsec have limitations that minimize their applicability. In this paper we propose a new protocol, the authorization exchange protocol (AXP), that provides a modular and extensible solution to this problem. It is situated between the application and the network layers acting as an authorization middleware component and handles the process of transmitting and receiving service access requests and replies, along with the credentials that are required to support them. In order to allow its use in securing delay sensitive applications, AXP has been designed to work over unreliable datagram transport protocols. We also present a case study and evaluate the performance of our proposal.
The personalization is an important topic for the Web industry. It consists in providing the capabilities to accommodate Web applications to user's requirements such as defining preferences on the execution of the...
详细信息
ISBN:
(纸本)9728865201
The personalization is an important topic for the Web industry. It consists in providing the capabilities to accommodate Web applications to user's requirements such as defining preferences on the execution of the application, associating the provided application to a specific terminal, specifying or modifying QoS parameters, and so on. The contribution of this paper is to present a solution to ensure an advanced Web application personalization by focusing on the middleware level rather than the application level. We provide an enhanced architecture to personalize Web applications using the EJB technology. An implementation using JOnAS environment is presented. It has the advantage to adapt and/or reconfigure Web application's behavior at runtime according to the user's specific needs.
Ravenscar-Java is a subset of Java (augmented by the real-time specification for Java) targeted at high-integrity real-time systems. It has recently been extended to support multiple applications of mixed criticality ...
详细信息
Ravenscar-Java is a subset of Java (augmented by the real-time specification for Java) targeted at high-integrity real-time systems. It has recently been extended to support multiple applications of mixed criticality on the same Java platform. A two level scheduling model is used to achieve temporal isolation between applications. This paper presents the general schedulability analysis for the approach, describes how the approach can be implemented using standard real-time POSIX facilities, illustrates how the analysis can be modified to take into account the implementation, and uses the prototype implementation to evaluate the accuracy of the analysis models.
Engineering a large software project involves tracking the impact of development and maintenance changes on the software performance. An approach for tracking the impact is regression benchmarking, which involves auto...
详细信息
Engineering a large software project involves tracking the impact of development and maintenance changes on the software performance. An approach for tracking the impact is regression benchmarking, which involves automated benchmarking and evaluation of performance at regular intervals. Regression benchmarking must tackle the nondeterminism inherent to contemporary computersystems and execution environments and the impact of the nondeterminism on the results. On the example of a fully automated regression benchmarking environment for the mono open-source project, we show how the problems associated with nondeterminism can be tackled using statistical methods.
Recent cybersecurity incidents suggest that Internet worms can spread so fast that in-time human-mediated reaction is not possible, and therefore initial response to cyberattacks has to be automated. The first step to...
详细信息
Recent cybersecurity incidents suggest that Internet worms can spread so fast that in-time human-mediated reaction is not possible, and therefore initial response to cyberattacks has to be automated. The first step towards combating new unknown worms is to be able to detect and identify them at the first stages of their spread. In this paper, we present a novel method for detecting new worms based on identifying similar packet contents directed to multiple destination hosts. We evaluate our method using real traffic traces that contain real worms. Our results suggest that our approach is able to identify novel worms while at the same time the generated false alarms reach as low as zero percent.
暂无评论