The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic models on their description texts to find prevalent vulnerability types and new trends semi-automatically. In our study of the 39,393 unique CVEs until the end of 2009, we identify the following trends, given here in the form of a weather forecast: PHP: declining, with occasional SQL injection...
The following topics are dealt: cyber engineering; human space computing; distributed networks; security and privacy; heterogeneous wireless networks; resource management; security in wireless systems; web services; web and mobile applications; data models and query processing; performance evaluation and testing; SOA and embedded systems; middleware; cloud computing; RFID; wireless sensor networks;...
With the popularity of voting systems in cyberspace, there is growing evidence that current voting systems can be manipulated by fake votes. This problem has attracted many researchers working on guarding voting systems in two areas: relieving the effect of dishonest votes by evaluating the trust of voters, and limiting the resources that can be used by attackers, such as the number of voters and...
Data grids provide such data-intensive applications with a large virtual storage framework with unlimited power. However, conventional scheduling algorithms for data grids are unable to meet the reputation service requirements of data-intensive applications. In this paper we address the problem of scheduling data-intensive jobs on data grids subject to reputation service constraints. Using the reputation-aware...
With the development of grid computing, economy models are invented and increasingly applied, however, that is under the assumption of both transaction parties are honest and trustworthy. In reality there is serious information asymmetry between the transaction participators. Information asymmetry may cause resource providers opportunistically exploit the information gap for resource consumers on...
Dissemination control is concerned with controlling electronic resources even after they have been delivered to a legitimate recipient. This paper proposes a secure resource dissemination system framework in which resource providers and recipients are interacted mutually in an anonymous, accountable, and trustworthy way, while security constraints on diverse resources can be continuously protected...
BitTorrent, one of the most popular content distribution protocols nowadays, has an identification generation scheme that is completely autonomous. Furthermore, BitTorrent uses a random mechanism to discover new peers. This leaves the system vulnerable to a sybil attack, by which an entity associates multiple identifications to itself in an attempt to fool the other peers that execute the agreed protocol...
Fair-share scheduling attempts to grant access to a resource based on the amount of ??share?? that a task possesses. It is widely used in places such as Internet routing, and recently, in the Linux kernel. Software performance engineering is concerned with creating responsive applications and often uses modeling to predict the behaviour of a system before the system is built. This work extends the...
An equivalent price based algorithm is proposed, which applies the combinatorial double auction and trust theories into grid resource allocation and pricing. Firstly the price adjusting function is designed, which maps the nodes' bid prices under various trust values into the equivalent prices under base trust degree. Then the grid resources are allocated and priced based on combinatorial double auction...
The following topics are dealt with: cloud computing; resource management; P2P networks; distributed storage; delay assurance; data security; wireless networks; QoS routing; TCP; and service management.
Workflow is a set of tasks which are systematized to achieve certain business goal(s), where the tasks run in a particular order under automatic control. Artifacts, collections of data items, are necessary for task (process) executions in a workflow. However, an execution may yield unexpected results due to improper artifact manipulation: e.g., activities miss artifact or artifact conflict occur at...
There are much collaboration and cooperation in the dynamic, multi-institutional virtual grid. Grid provides a good bridge between the resource users and the resource providers. Especially in the agent-based grid system, agents could provide services for the scheduling of applications that make grid resources better use. We have proposed a resource discovery mechanism with negotiation in grid environment...
With the converging of grid computing and Web service, grid has extended its territory from traditional computing grid to service-oriented grid, which is aiming to realize coordinated resource sharing and problem solving through service selection and composition. Therefore, selecting credible services for applications becomes a key issue in grid environment. Current research on trust inherits the...
The Flume system is an implementation of decentralized information flow control (DIFC) at the operating system level. Prior work has shown Flume can be implemented as a practical extension to the Linux operating system, allowing real Web applications to achieve useful security guarantees. However, the question remains if the Flume system is actually secure. This paper compares Flume with other recent...
The following topics are dealt with: circuit design; system design; information systems; Internet technology; artificial intelligence; software engineering education; service-oriented computing; information security; information privacy; wireless communication; sensor networks; mobile computing; mobile networking; software testing; high performance computing architecture; e-commerce; computer information...
Grid technologies enable large-scale sharing of resources within formal or informal consortia of individuals and/or institutions, usually called virtual organizations.In these settings, the discovery, characterization, management, and monitoring of resources, services, and computations can be challenging due to the considerable diversity, large numbers, dynamic behavior, and geographical distribution...
We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the Web or somebody's laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose...
The article presents comparison between different large object (LOB) storage methods currently supported by the Oracle database including Secure Files present in Oracle 11. Article focuses on performance of reading and writing large objects to the database.
Digital Rights Management ecosystem is composed of various participants, which adopt different security policies to meet their own security requirements, with a goal to achieve individual optimal benefits. However, from the perspective of the whole DRM-enabling contents industry, a simple adoption of several increasingly enhanced security policies does not necessarily implement an optimal benefit...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.