Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified vuln...
详细信息
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase ***,how to monitor the integrity of cloud execution environments is still a difficult *** this paper,a real-time dynam...
详细信息
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase ***,how to monitor the integrity of cloud execution environments is still a difficult *** this paper,a real-time dynamic integrity validation(DIV) framework is proposed to monitor the integrity of virtual machine based execution environments in the *** can detect the integrity of the whole architecture stack from the cloud servers up to the VM OS by extending the current trusted chain into virtual machine's architecture *** introduces a trusted third party(TTP) to collect the integrity information and detect remotely the integrity violations on VMs periodically to avoid the heavy involvement of cloud tenants and unnecessary information leakage of the cloud *** evaluate the effectiveness and efficiency of DIV framework,a prototype on KVM/QEMU is implemented,and extensive analysis and experimental evaluation are *** results show that the DIV can efficiently validate the integrity of files and loaded programs in real-time,with minor performance overhead.
In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers security and privacy...
详细信息
Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative...
详细信息
Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative impacts on underlying search strategies or local maximum exist. So we propose a dynamic symbolic execution (DSE) based framework combined with a path filtering algorithm and a new heuristic path search strategy, i.e., predictive path search, to achieve faster coverage-driven testing with lower testing cost. The empirical experiments (three open source projects and two industrial projects) show that our approach is effective and efficient. For the open source projects w.r.t branch coverage, our approach in average reduces 25.5% generated test cases and 36.3% solved constraints than the traditional DSE-based approach without path filtering. And the presented heuristic strategy, on the same testing budget, improves the branch coverage by 26.4% and 35.4% than some novel search strategies adopted in KLEE and CREST.
Data aggregation in wireless sensor networks is widely used to collect data in an energy efficient manner to eliminate redundant data transmission so that prolong the network lifetime. To meet the data aggregation nee...
详细信息
ISBN:
(纸本)9781479976164
Data aggregation in wireless sensor networks is widely used to collect data in an energy efficient manner to eliminate redundant data transmission so that prolong the network lifetime. To meet the data aggregation needs in wireless sensor networks, this paper proposes a novel multi-path routing algorithm, called EAD, to process in-network data aggregation. For each sensor on the routing paths, EAD evaluates its neighbors based on the residual energy, deviation angle and distance, and selects the k neighbors with the minimal evaluation costs as its forwarding nodes in order to balance energy consumption of the wireless sensor network on the premise of ensuring the reliability and performance. Simulation results show that EAD can effectively prolong network lifetime, reduce latency and ensure the reliability by adjusting the weight of each influencing factor.
This paper focuses on pedagogy for teaching acceptance testing to high school students in the context of the new New Zealand computer science standards. A review of resources that are currently available for teaching ...
详细信息
ISBN:
(纸本)9781450324557
This paper focuses on pedagogy for teaching acceptance testing to high school students in the context of the new New Zealand computer science standards. A review of resources that are currently available for teaching acceptance testing to high school students shows a major gap. In order to bridge that gap we have identified and evaluated resources that can be used to teach the concept to school students, have designed and evaluated an interactive tool to teach acceptance testing, and described a student project for the relevant New Zealand achievement standard.
One of the means to implement information flow policies is by using a cryptographic approach commonly referred to as key assignment schemes. In this approach, information is made publicly available to users but in an ...
详细信息
Recently software crowdsourcing has become an emerging area of softwareengineering. Few papers have pre- sented a systematic analysis on the practices of software crowdsourcing. This paper first presents an evaluatio...
详细信息
Recently software crowdsourcing has become an emerging area of softwareengineering. Few papers have pre- sented a systematic analysis on the practices of software crowdsourcing. This paper first presents an evaluation frame- work to evaluate software crowdsourcing projects with re- spect to software quality, costs, diversity of solutions, and competition nature in crowdsourcing. Specifically, competi- tions are evaluated by the min-max relationship from game theory among participants where one party tries to minimize an objective function while the other party tries to maximize the same objective function. The paper then defines a game theory model to analyze the primary factors in these min- max competition rules that affect the nature of participation as well as the software quality. Finally, using the proposed eval- uation framework, this paper illustrates two crowdsourcing processes, Harvard-TopCoder and AppStori. The framework demonstrates the sharp contrasts between both crowdsourc- ing processes as participants will have drastic behaviors in engaging these two projects.
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and publ...
详细信息
Due to the increasing volume of and interconnections between semantic datasets, it becomes a challenging task for novice users to know what are included in a dataset, how they can make use of them, and particularly, w...
详细信息
ISBN:
(纸本)9781450321020
Due to the increasing volume of and interconnections between semantic datasets, it becomes a challenging task for novice users to know what are included in a dataset, how they can make use of them, and particularly, what queries should be asked. In this paper we analyse several types of candidate insightful queries and propose a framework to generate such queries and identify their relations. To verify our approach, we implemented our framework and evaluated its performance with benchmark and real world datasets. Copyright 2013 ACM.
暂无评论