The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on security of data exchange and supervisory control according to IEC 61850. The existing security measures standardized by IEC 62351 are described and compared with similar systems that are widely used in industry automation, i.e. the OPC Unified Architecture. These security measures are not sufficient because they cover the communication only and do not respect the contained data,...
Thespis is a middleware that innovatively leverages the Actor model to implement causal consistency over an industry-standard database, whilst abstracting complexities for application developers behind a REST open-protocol interface. Our evaluation considers correctness, performance and scalability aspects. We also run empirical experiments using YCSB to show the efficacy of the approach for a variety...
Specifying a Management Plane for the Software-Defined Networking (SDN) architecture is essential for monitoring, configuring and handling computer networks. Diverse solutions have proposed it but they share some shortcomings: incomplete representations of SDN elements, few human readable languages for managing networks, no communication management aimed at Internet Engineering and absence of supporting...
Push technology has become an essential part of many web applications that require near real-time notification. The Hypertext Transfer Protocol (HTTP) is widely used for exchanging information between clients and servers. The growth of the Internet of Things (IoT) and the expansion/penetration of Internet access to new areas have resulted in the ever-rapidly increasing number of Internet users. Consequently,...
Aiming at providing united control of multi-domain optical networks orchestration, we design the Federated Platform based on Open Network Operating System (ONOS). Our implementation includes adding and extending modules in ONOS to provide the global view of multi-domain networks and support cross-domain end-to-end services by communicating with the individual domain controllers through RESTCONF protocol...
SSL/TLS protocol is widely used for secure web applications (i.e., HTTPS). Classifying encrypted SSL/TLS based applications is an important but challenging task for network management. Traditional traffic classification methods are incapable of accomplishing this task. Several recently proposed approaches that focused on discriminating defining fingerprints among various SSL/TLS applications have...
P2P-based social networking services are severely challenged by churn and the lack of reliable service providers, especially considering the high frequency of posts and profile updates of their users. Improved consistency and data availability shall facilitate better acceptance, which in turn will enhance privacy, an inherent benefit of this class of systems. We present Lilliput, a P2P storage primitive...
Delegated authorization protocols have become wide-spread to implement Web applications and services, where some popular providers managing people identity information and personal data allow their users to delegate third party Web services to access their data. In this paper, we analyze the risks related to untrusted providers not behaving correctly, and we solve this problem by proposing the first...
In industrial automation systems, deploying the well-established automation pyramid model is best practice. However, the trend to massively distributed systems, which are foreseen to co-operate using standardized protocols and common semantics, shows the limits of these traditional approaches. In order to enable for Industry 4.0 compliant solutions, appropriate means for scalable internetworking have...
Problems at the intersection of vision and language are of significant importance both as challenging research questions and for the rich set of applications they enable. However, inherent structure in our world and bias in our language tend to be a simpler signal for learning than visual modalities, resulting in models that ignore visual information, leading to an inflated sense of their capability...
Integrated environmental modelling (IEM) couples interdependent environmental models and data together to solve complex environmental problems. There are two major modelling frameworks for IEM: component based framework, and service oriented framework. This paper suggests to take the best of both to couple modelling components and services together. The result is a hybrid method to leverage Open Modelling...
Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network operations needed to operate, control and manage large-scale multi-domain, multi-layer and multi-vendor TE networks, so as to facilitate network programmability, automation, efficient resource sharing. This paper provides scalable telemetry streaming mechanisms that describe Key Performance Indicator (KPI) telemetry...
As Building Information Modelling (BIM) becomes prominent in the construction industry, many contract protocols have been developed to facilitate the implementation of BIM. However, most of the protocols have been developed to accommodate procurement methods such as the traditional and design and build project delivery system. None of the protocols is developed to facilitate the BIM implementation...
Traffic classification plays an important and basic role in network management and cyberspace security. With the widespread use of encryption techniques in network applications, encrypted traffic has recently become a great challenge for the traditional traffic classification methods. In this paper we proposed an end-to-end encrypted traffic classification method with one-dimensional convolution neural...
Multiple parties observing correlated data seek to recover each other’s data and attain omniscience. To that end, they communicate interactively over a noiseless broadcast channel - each bit transmitted over this channel is received by all the parties. We give a universal interactive communication protocol, termed the recursive data exchange protocol (RDE), which attains omniscience for any sequence...
This paper presents a novel framework for privacy aware collaborative information sharing for data classification. Data holders participating in this information sharing system, for global benefits are interested to model a classifier on whole dataset, but are ready to share their own table of data if a certain amount of privacy is guaranteed. To address this issue, we propose a privacy mechanism...
Variety of data has led to the fall of the "One size fits all" paradigm in databases. Applications now store data in multiple data representations, rather than just storing the data in a single relational database. However, applications only provide consistency semantics at the boundaries of a single datastore, corresponding to specific representation. This can lead to semantically inconsistent...
This work studies the problem of MPC decentralization - that is, identifying a set of computing nodes to securely and efficiently execute the multi-party computation protocol (MPC) over a sensitive dataset. To balance between underdecentralization with high risk and over-decentralization with high cost, our unique approach is to add social-awareness, that is, the MPC protocol, running over a social...
Recent empirical evidence from research on temporal networks has shown that the time constraints imposed on individual interactions are crucial for understanding the generic structure and dynamics of networks. A desirable but challenging task is sampling the waiting time distribution (WTD) associated with their internal interactions, a defining feature that reflects the added time dimension of temporal...
We propose AccountTrade, a set of accountable protocols, for big data trading among dishonest consumers. To secure the big data trading environment, our protocols achieve book-keeping ability and accountability against dishonest consumers who may misbehave throughout the dataset transactions. Specifically, we study the responsibilities of the consumers in the dataset trading and design AccountTrade...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.