Viewing security vulnerabilities as a specific type of software defect allows proven softwareengineering techniques for finding and fixing them to be used early in the development of the product. Finding and fixing t...
详细信息
Viewing security vulnerabilities as a specific type of software defect allows proven softwareengineering techniques for finding and fixing them to be used early in the development of the product. Finding and fixing these problems early (i.e. at the requirements or design phase) mil reduce the overall risk and cost of tee product. This article describes the application of a previously successful early life cycle software inspection approach (perspective-based reading [PBR]) to the problem of software security. Excerpts from this tailored approach are provided along with guidance on it use.
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that anonymity is no stronger than its weakest link, such proposals are only meaningful if one can ...
详细信息
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that anonymity is no stronger than its weakest link, such proposals are only meaningful if one can offer anonymity guarantees on the communication layer as well. ANODR - or anonymous on demand routing - is one of the leading proposals to deal with this issue. In this paper, we propose a novel technique to address the same problem, but at a lower cost. Our proposal, which we dub discount-ANODR, is built around the same set of techniques as ANODR is. Our proposal has the benefit of achieving substantially lower computation and communication complexities at the cost of a slight reduction of privacy guarantees. In particular, discount-ANODR achieves source anonymity and routing privacy. A route is "blindly generated" by the intermediaries on the path between an anonymous source and an identified destination. Route requests in discount-ANODR bear strong similarities to route requests in existing source routing protocols, with the limitation that intermediaries only know the destination of the request and the identity of the previous intermediary - but not whether the latter was the originator of the request. The response to a route request protects the compiled route by means of iterated symmetric encryption, drawing on how messages are prepared before being submitted to a typical synchronous mix network (or onion router). The communication of data subsequently uses such "route onions" to channel the packet to the intended destination. We do not use any key exchange, nor do we utilize public key operations at any time; consequently, we do not need to rely on any PKI, CRL or related constructions
This paper describes a replication conducted to compare the effectiveness of inspectors using Perspective Based Reading (PBR) to the effectiveness of inspectors using a checklist. The goal of this replication was to b...
详细信息
This paper presents a new dynamic slicing method, the modular monadic approach, which is based on modular monadic semantics. With the use of monad transformers, each representing a single notion of computation, the co...
详细信息
This paper presents a new dynamic slicing method, the modular monadic approach, which is based on modular monadic semantics. With the use of monad transformers, each representing a single notion of computation, the computation of program slicing can be abstracted as an entity that is independent of the language being analyzed, dynamic-slice monad transformer. Its definition and correctness proofs are provided in this paper. This paper also gives and illustrates dynamic slicing algorithm based on modular monadic semantics. The algorithm allows dynamic slices to be computed directly on abstract syntax, without recording an execution history or explicitly constructing intermediate structures, such as dependence graphs, in the corresponding monadic slicers. It is showed to be an appropriate approach to program slicing with excellent flexibility and modularity properties.
Considering the characteristics and location information of nodes in sensor networks, a modified directed transfer model of sensor networks and a new distributed data aggregation model based on area are proposed. On t...
详细信息
Considering the characteristics and location information of nodes in sensor networks, a modified directed transfer model of sensor networks and a new distributed data aggregation model based on area are proposed. On the basis of these new models, a novel mixed entropy data compression algorithm based on interval wavelet transforming is proposed for sensor network, according to the characteristics of data in sensor networks and the good performances of wavelet transforming in compression of the data stream. Theoretical analyses and simulation results show that, the above new methods can compress the data stream and reduce the energy costs of nodes in data transferring efficiently for sensor networks. So, it can prolong the lifetime of the whole networks to a greater degree when the above new methods are deployed with those traditional DC (data centric) routing algorithms such as DD (directed diffusion) protocol for sensor networks.
Wireless sensor networks often face the critical problem of maintaining the sufficient sensing coverage (QoS) at an application specific level while keeping a small number of nodes active at any time to save energy. T...
详细信息
Wireless sensor networks often face the critical problem of maintaining the sufficient sensing coverage (QoS) at an application specific level while keeping a small number of nodes active at any time to save energy. To solve this problem, the relationship between the desired QoS requirement and the minimum number of active nodes is analyzed without the knowledge of location or directional information in the randomly deployed sensor networks. Based on the analytical results, an energy efficient and location-independent QoS (ELIQoS) protocol is proposed, which selects the minimum number of active nodes based on the nodes' energy without using any location information. Simulation and analysis study demonstrates that the ELIQoS protocol can not only reduce the network consumption and balance the energy dissipation among nodes, but can provide the desired QoS requirement effectively.
Enlightened by the behaviors of gregarious ant colonies, an artificial ant movement (AM) model and an adaptive ant clustering (AAC) algorithm for this model are presented. In the algorithm, each ant is treated as an a...
详细信息
Enlightened by the behaviors of gregarious ant colonies, an artificial ant movement (AM) model and an adaptive ant clustering (AAC) algorithm for this model are presented. In the algorithm, each ant is treated as an agent to represent a data object. In the AM model, each ant has two states: sleeping state and active state. In the algorithm AAC, the ant's state is controlled by both a function of the ant's fitness to the environment it locates and a probability function for the ants becoming active. By moving dynamically, the ants form different subgroups adaptively, and consequently the whole ant group dynamically self-organizes into distinctive and independent subgroups within which highly similar ants are closely connected. The result of data objects clustering is therefore achieved. This paper also present a method to adaptively update the parameters and the ants' local movement strategies which greatly improve the speed and the quality of clustering. Experimental results show that the AAC algorithm on the AM model is much superior to other ant clustering methods such as BM and LF in terms of computational cost, speed and quality. It is adaptive, robust and efficient, and achieves high autonomy, simplicity and efficiency. It is suitable for solving high dimensional and complicated clustering problems.
Temporal Petri nets can not only enhance the modeling and analyzing power of Petri nets, but compensate the shortcoming that Petri nets do not represent timing constraint. By means of temporal Petri nets, an online dy...
详细信息
Temporal Petri nets can not only enhance the modeling and analyzing power of Petri nets, but compensate the shortcoming that Petri nets do not represent timing constraint. By means of temporal Petri nets, an online dynamic stock trading system based on shared-variable distributed shared memory is adopted, and the requirements specification of the dynamic stock trading system is formally modeled and elegantly described by formulas containing the temporal operators.
SWENET, the Network Community for softwareengineering Education, is an NSF funded project to produce and organize high-quality materials supporting softwareengineering education. The project supports faculty members...
详细信息
In this paper a performance comparison of a variety of data preprocessing algorithms in remote sensing image classification is presented. These selected algorithms are principal component analysis (PCA)and three diffe...
详细信息
In this paper a performance comparison of a variety of data preprocessing algorithms in remote sensing image classification is presented. These selected algorithms are principal component analysis (PCA)and three different independent component analyses, ICA(Fast-ICA(Aapo Hyvarinen, 1999), Kernel-ICA(KCCA and KGV(Bach & Jordan, 2002)), EFFICA(Aiyou Chen & Peter Bickel,2003)). These algorithms were applied to a remote sensing imagery (1600×1197), obtained from Shunyi, Beijing. For classification, a MLC method is used for the raw and preprocessed data. The results show that classification with the preprocessed data have more confident results than that with raw data and among the preprocessing algorithms, ICA algorithms improve on PCA and EFFICA performs better than the others. The convergence of these ICA algorithms (for data points more than a million) are also studied, the result shows EFFICA converges much faster than the others. Furthermore, because EFFICA is a one-step maximum likelihood estimate (MLE) which reaches asymptotic Fisher efficiency (EFFICA), it computers quite small so that its demand of memory come down greatly, which settled the "out of memory" problem occurred in the other algorithms. In addition, a technological framework for combining results from different techniques is presented and it shows that further improvement is arrived.
暂无评论