The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the number of people who interact on social networks increases, and coupled with the greater capability made available within our computational devices, there is the potential to establish “Social Clouds”—a resource sharing infrastructure that enable people who have trust relationships to come together to share computational/ data services within a community. Social clouds can also provide the...
This paper considers the event-triggered leader-follower tracking control for interconnected systems. Unlike the large body of existing work, here we consider systems which are physically coupled with uncertain norm-bounded coupling between the subsystems. We propose a model based event-triggered tracking control strategy and an event triggering rule with a time-dependent threshold which guarantees...
Design is recognized as a key engineering activity, and engineering is a fundamental part of science education at the K-12 level. However, it is difficult to assess student designs when the range of “correct” answers is wide. Feedback in the form of assessment helps students learn from a design activity and can direct students along the pathway of improvement. The purpose of this paper is to develop...
Indicating its own position is an important ability for a mobile wireless node. As a matter of fact, it is a key enabler for future applications in fields as diverse as routing, security, logistics, entertainment and so on. This position can be computed in many different ways. In a protocol-based approach to positionning, the foundation of this localisation service is the ranging protocol. In this...
This paper presents an incremental formal modeling of the Simple Text Oriented Messaging Protocol (STOMP) using Event-B method. STOMP is a simple text-oriented protocol, similar to HTTP. It provides an interoperable wire format so that STOMP clients can communicate with any STOMP message broker to provide easy and widespread messaging interoperability among many languages and platforms. In this paper...
This paper deals with logical cryptanalysis of hash functions. They are commonly used to check data integrity and to authenticate protocols. These functions compute, from an any-length message, a fixed-length bit string, usually named digest. This work defines an experimental framework, that allows, thanks to the propositional formalism, to study cryptosystems at the bit level through corresponding...
Online transactions require a fundamental relationship between users and resource providers (e.g., retailers, banks, social media networks) built on trust; both users and providers must believe the person or organization they are interacting with is who they say they are. Yet with each passing year, major data breaches and other identity-related cybercrimes become a daily way of life, and existing...
Computer and network systems are consistently exposed to security threats, making their management even more complex. The management of known vulnerabilities plays a crucial role for ensuring their safe configurations and preventing security attacks. However, this activity should not generate new vulnerable states. In this paper we present a novel approach for autonomously assessing and remediating...
Classical Fault Attacks often require the ability to encrypt twice the same plaintext, in order to get one or several pairs of correct and faulty cipher texts corresponding to the same message. This observation led some designers to think that a randomized mode of operation may be sufficient to protect block cipher encryption against this kind of threat. In this paper, we consider the case where the...
Over the years the Internet became the primary means of communication, many companies use it as basis for their services. However, the current Internet does not guarantee Quality of Service, emerging the concept of network virtualization as the basis for the Future Internet. A common strategy used by companies is to define a Service Level Agreement (SLA) with their respective Internet Service Providers...
This paper deals with the design and the simulation of decentralized artificial intelligent systems (multiagent systems) in the context of distributed automation and decentralized control systems. It presents an original tool and its interesting modular and customizable physical model of a house.
As research on developing assertion languages for the AMS domain gains in momentum, it is increasingly being felt that extensions of existing assertion languages like PSL and SVA into the AMS domain are not adequate for expressing the analog design intent. This is largely due to the intricacy of the analog behavioral intent which cannot be captured purely in terms of logic. In this paper we show that...
Human conversation is the best example of loosely coupled distributed communication known to man. This study specifically considers those parts of the human conversation that show evidence of dynamism and attempts to model these parts with the objective of translating the knowledge of conversational dynamics into the domain of computerised distributed systems. The discipline of metaphorical modelling...
We study the composition of security protocols when protocols share secrets such as keys. We show (in a Dolev-Yao model) that if two protocols use disjoint cryptographic primitives, their composition is secure if the individual protocols are secure, even if they share data. Our result holds for any cryptographic primitives that can be modeled using equational theories, such as encryption, signature,...
Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we examine the general question of when two agents can create a shared secret. Namely, given an equational theory describing the cryptographic operators available, is there a protocol that allows the agents to establish a shared secret?...
An attacker that can identify messages as coming from the same source, can use this information to build up a picture of targets' behaviour, and so, threaten their privacy. In response to this danger, unlinkable protocols aim to make it impossible for a third party to identify two runs of a protocol as coming from the same device. We present a framework for analysing unlinkability and anonymity in...
Simulation-based techniques are the defacto standard for the verification of industrial designs. Since verification effort takes about 70% of the time of the design phase, it is important to expedite the simulation process in order to reduce the overall verification effort. Modeling-based techniques play an important role towards achieving the speed-up by expediting many subtasks of the overall verification...
Thanks to pervasive environment, users can remotely have access to various resources and services within their public or private living space. Consequently, several security and privacy issues are raised especially due to the wireless access used to get services and to the privacy aspect that could be involved. To securely deploy these services in multiple smart spaces, we propose a secured service...
A key requirement for a distributed collaborative application is that all participants see the same copy of a shared window-object at different points in time (WYSIWIS). This is needed to maintain a cohesive view of the problem. We recognize that user actions are generated based on their understanding of the context of the problem, where context is defined in terms global view of the shared window...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.