Formalize the concept of trusted transactions. Trusted transactions are those transactions that do not violate credential or policy inconsistencies over the lifetime of the transaction. We then present a more general term, safe transactions, that identifies transactions that are both trusted and conform to the ACID properties of distributed database systems. We define several different […]
SYBIL-RESISTED TRUSTWORTHY SERVICE EVALUATION IN SERVICE-ORIENTED MOBILE SOCIAL NETWORKS
Trustworthy service evaluation (TSE) systems enable service providers or any third trusted authority to receive user feedback, known as service reviews or simply reviews, such as compliments and complaints about their services or products. In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile […]
CONTENT AND QUERYING VALUE BASED DOCUMENT ANNOTATION
Annotations are comments, notes, explanations, or other types of external remarks that can be attached to a Web document or to a selected part of a document. As they are external, it is possible to annotate any Web document independently, without needing to edit the document itself. From a technical point of view, annotations are […]
GENERAL BEHAVIORAL CHARACTERIZATION OF PROXIMITY MALWARE DETECTION IN DELAY TOLERANT NETWORK
Proximity malware based on the DTN model brings unique security challenges that are not present in the infrastructure model. In the infrastructure model, the cellular carrier centrally monitors networks for abnormalities; moreover, the resource scarcity of individual nodes limits the rate of malware propagation. Proximity malware exploits the opportunistic contacts and distributed nature of DTNs […]
SECURE DATA STORAGE USING DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION IN CLOUD
In this proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored […]
DEFENSE AND DETECTION OF BWDDOS ATTACK
A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. Bandwidth DDoS (BW DDoS) attacks disrupt […]
Detection of Bandwidth Distributed Denial of Service Attacks
BW-DDoS attacks are usually generated from a large number of compromised computers (zombies or pup-pets). BW-DDoS attackers use different techniques and different types of attacking agents. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. So far, BW-DDoS […]
RUNTIME PERFORMANCE EVALUATION OF RELATIONAL KEYWORD SEARCH TECHNIQUE
Keyword search on semi structured data (e.g., XML) and relational data differs considerably from traditional IR. A discrepancy exists between the data’s physical storage and a logical view of the information. Relational databases are normalized to eliminate redundancy, and foreign keys identify related information. Extending the keyword search paradigm to relational data has been an […]
BEHAVIORAL MALWARE DETECTION SCHEME TOWARDS GENERAL BEHAVIORAL CHARACTERIZATION IN DELAY TOLERANT NETWORK
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile or intrusive […]
BALANCING PERFORMANCE, ACCURACY AND PRECISION BASED ON TWO PHASE VALIDATION COMMIT PROTOCOL FOR SECURE CLOUD TRANSACTIONS
Recently the cloud computing paradigm has been receiving significant excitement and attention in the media and blogosphere. To some, cloud computing seems to be little more than a marketing umbrella, encompassing topics such as distributed computing, grid computing, utility computing, and software-as-a-service, that have already received significant research focus and commercial implementation. In this paper, […]
- « Previous Page
- 1
- …
- 13
- 14
- 15
- 16
- 17
- …
- 21
- Next Page »