The broadcast nature of the wireless medium (the so-called wireless broadcast advantage) is exploited in cooperative fashion. The wireless transmission between a transmitter-receiver pair can be received and processed at neighboring nodes for performance gain, rather than be considered as the interference traditionally. Network coding, which combines several packets together for transmission, is very helpful […]
Two-Phase Validation Commit Protocol for Secure Cloud Transaction
This work proposes a Two-Phase Validation Commit (2PVC) protocol that ensures that a transaction is safe by checking policy, credential, and data consistency during transaction execution. This paper defines several different levels of policy consistency constraints and corresponding enforcement approaches that guarantee the trustworthiness of transactions executing on cloud servers. 2PVC can be used to […]
RISK OF UNKNOWN VULNERABILITIES MEASUREMENT USING K-ZERO DAY SAFETY
This metric then simply counts how many zero-day vulnerabilities are required to compromise a network asset. A larger count will indicate a relatively more secure network, because the likelihood of having more unknown vulnerabilities all available at the same time, applicable to the same network, and exploitable by the same attacker, will be lower. It […]
DISTRIBUTED FILE SYSTEMS MODELING FOR SYSTEMATIC AND PRACTICAL PERFORMANCE ANALYSIS FRAMEWORK
Performance analysis is an important concern in the distributed system research area. Researchers have made a lot effort to evaluate, model, and analyze distributed systems for computing intensive or data intensive applications. There exist well-known evaluation benchmarks (e.g., LINPACK, mpiBLAST) for computing paradigms. In this paper, we propose a systematic and practical performance analysis framework, […]
SERVICE-ORIENTED MOBILE SOCIAL NETWORKS USING SYBIL-RESISTED TSE
Mobile social networking is social networking where individuals with similar interests converse and connect with one another through their mobile phone and/or tablet. In this paper, propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, […]
ABE AND ABS SCHEME FOR DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS
Cloud computing is computing in which large groups of remote servers are networked to allow the centralized data storage, and online access to computer services or resources. Clouds can be classified as public, private or hybrid. We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In […]
MEASURING THE RISK OF UNKNOWN VULNERABILITIES USING K-ZERO DAY SAFETY NETWORK SECURITY METRICS
we propose a novel network security metric, k-zero day safety, to address this issue. Roughly speaking, instead of attempting to measure which un-known vulnerabilities are more likely to exist, we start with the worst case assumption that this is not measurable. Our metric then simply counts how many zero-day vulnerabilities are required to compromise a […]
PREDICTIVE ACK BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM
Traffic redundancy stems from common end-users’ activities, such as repeatedly accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar information items (documents, data, Web, and video). TRE is used to eliminate the transmission of redundant content and, there-fore, to significantly reduce the network cost. In most common TRE solutions, both the sender […]
MULTILEVEL INTER- RELATIONSHIP GRAPH FOR KEYWORD QUERY ROUTING
Conventional keyword search engines are restricted to a given data model and cannot easily adapt to unstructured, semi-structured or structured data. Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over […]
KEYWORD QUERY ROUTING FOR KEYWORD SEARCH OVER A LINKED DATA SOURCES
This abstract proposed to identify data sources that contain results to a keyword query. The goal is to produce routing plans, which can be used to compute results from multiple sources. Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to […]
- « Previous Page
- 1
- …
- 14
- 15
- 16
- 17
- 18
- …
- 24
- Next Page »