Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement to the federation with other clouds. Performance evaluation of Cloud Computing infrastructures is required to predict and quantify the cost-benefit of a strategy portfolio and the corresponding Quality of Service (QoS) […]
ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs
Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop-by-hop encryption or redundant traffic, either generate high cost or cannot provide full anonymity protection to data sources, destinations, and routes. The high […]
A generic framework for constructing encounter-based social Networks
In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality […]
Memory access virtualization to deal with stack buffer overflow attacks
In this paper we presented Memory access virtualization is a key mechanism we used to deal with stack buffer overflow attacks. The key technique of our solution is to virtualize memory accesses and move the vulnerable buffer into protected memory regions, which provides a fundamental and effective protection against recurrence of the same attack without […]
executing computations on untrusted machines in a trustworthy manner
We present sTile, a technique for building software systems that distribute large computations onto the cloud while providing guarantees that the cloud nodes cannot learn the computation’s private data. sTile is based on a nature-inspired, theoretical model of self-assembly. While sTile’s computational model is Turing universal, in this paper, we present a prototype implementation that […]
Facilitates systematic detection and resolution of XACML policy anomalies
In this paper, we represent an innovative policy anomaly analysis approach for Web access control policies, focusing on XACML (eXtensible Access Control Markup Language) policy.We introduce a policy based segmentation technique to accurately identify policy anomalies and derive effective anomaly resolutions, along with an intuitive visualization representation of analysis results. We also discuss a proof-of-concept […]
Authorization Security model conceived to secure access to Semantic repositories
Most semantic repositories are designed to manage semantic models but do not deal with access rights. As in the case of databases that are traditional, data stored inside a semantic database should be protected. by granting access to authorized users only. Semantic models help in achieving semantic interoperability among sources of data and applications. The […]
Detecting Distributed Reflection DoS Attacks based on Rank Correlation
DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be […]
Measuring Time required to compromise a computer system
In this paper three measurement methods – the time between compromises, the time to first compromise and the overall time to compromise .A frequent assumption in the domain of cyber security is that cyber intrusions follow the properties of a Poisson process, i.e., that the number of intrusions are well modeled by a Poisson distribution […]
Cloud oriented Content Delivery Network paradigm within a multi-provider Networked Cloud Environment
In this paper is placed on the introduction, design and assessment of a complete model and framework aiming specifically at the deployment of a Cloud oriented Content Delivery Network paradigm within a multi-provider Networked Cloud Environment. A hierarchical framework is proposed and evaluated towards an efficient and scalable solution of content distribution over a multi-provider […]
- « Previous Page
- 1
- …
- 55
- 56
- 57
- 58
- 59
- …
- 108
- Next Page »