In this work, we present a generic framework for representing events and rules with uncertainty. We present a mechanism to construct the probability space that captures the semantics and defines the probabilities of possible worlds using an abstraction based on a Bayesian network. In order to improve derivation efficiency we employ two mechanisms: The first […]
A Distributed Access Control Architecture for Cloud Computing
We present distributed access control architecture for multitenant and virtualized environments. The design of this architecture is based on the principles from security management and software engineering. From a security management perspective, the goal is to meet cloud users’ access control requirements. From a software engineering perspective, the goal is to generate detailed specifications of […]
SPOT – Compromised machine detection
In this paper, we focus on the detection of the compromised machines in a network that are used for sending spam messages, which are commonly referred to as spam zombies. We develop the SPOT detection system to assist system administrators in automatically identifying the compromised machines in their networks. SPOT is designed based on a […]
Community anomaly detection system
Collaborative information systems (CISs) allow groups of users to communicate and cooperate over common tasks. CIS are increasingly relied upon to manage sensitive information. In this paper, we introduce a framework to detect anomalous insiders from the access logs of a CIS by leveraging the relational nature of system users as well as the meta-information […]
Multi Cloud: Cloud Computing Security
Single cloud provider is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud. In recent years, there has been a move towards “multiclouds”, “intercloud” or “cloud-of-clouds”. This paper focuses on the issues related to the data security aspect […]
Citation Parser using Sequent Alignment
Parsing citations is essential for integrating bibliographical information published on the Internet. Most citation management techniques are based on the assumption that we can correctly identify the main components of a citation, such as authors’ names, title, publication venue, date, and the number of pages. In this paper, we propose a sequence-alignment based citation parser, […]
D-AdaptOR : Distributed Adaptive Opportunistic Routing
In this paper propose a distributed adaptive opportunistic routing algorithm (d-AdaptOR) that minimizes the expected average per-packet cost for routing a packet from a source node to a destination. This is achieved by both sufficiently exploring the network using data packets and exploiting the best routing opportunities. This reinforcement learning framework allows for a low-complexity, […]
ABSM Protocol for Vehicular Ad Hoc Networks
Broadcasting is the task of sending a message from a source node to all other nodes in the network. It is frequently referred to also as data dissemination. The design of reliable and efficient broadcast protocols is a key enabler for the successful deployment of vehicular communication services. In this paper we develop the Acknowledged […]
Secure Cloud Storage System with Secure Data Forwarding
In this paper, we address the problem of forwarding data to another user by storage servers directly under the command of the data owner. We consider the system model that consists of distributed storage servers and key servers. We propose a new threshold proxy re-encryption scheme and integrate it with a secure decentralized code to […]
Protecting Source and Sink Location Privacy in Sensor Networks
Location privacy is very important, especially in hostile environments. Failure to protect such information can completely subvert the intended purposes of sensor network applications. A number of privacy-preserving routing techniques have been developed for sensor networks. However, most of them are designed to protect against an adversary only capable of eavesdropping on a limited portion […]
- « Previous Page
- 1
- …
- 63
- 64
- 65
- 66
- 67
- …
- 108
- Next Page »