Cloud computing is computing in which large groups of remote servers are networked to allow the centralized data storage, and online access to computer services or resources. Clouds can be classified as public, private or hybrid. We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In […]
MEASURING THE RISK OF UNKNOWN VULNERABILITIES USING K-ZERO DAY SAFETY NETWORK SECURITY METRICS
we propose a novel network security metric, k-zero day safety, to address this issue. Roughly speaking, instead of attempting to measure which un-known vulnerabilities are more likely to exist, we start with the worst case assumption that this is not measurable. Our metric then simply counts how many zero-day vulnerabilities are required to compromise a […]
PREDICTIVE ACK BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM
Traffic redundancy stems from common end-users’ activities, such as repeatedly accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar information items (documents, data, Web, and video). TRE is used to eliminate the transmission of redundant content and, there-fore, to significantly reduce the network cost. In most common TRE solutions, both the sender […]
MULTILEVEL INTER- RELATIONSHIP GRAPH FOR KEYWORD QUERY ROUTING
Conventional keyword search engines are restricted to a given data model and cannot easily adapt to unstructured, semi-structured or structured data. Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over […]
KEYWORD QUERY ROUTING FOR KEYWORD SEARCH OVER A LINKED DATA SOURCES
This abstract proposed to identify data sources that contain results to a keyword query. The goal is to produce routing plans, which can be used to compute results from multiple sources. Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to […]
COLLABORATIVE ADAPTIVE DATA SHARING PLATFORM FOR FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE
We propose Collaborative Adaptive Data Sharing platform (CADS), which is an “annotate-as-you-create” infrastructure that facilitates fielded data annotation. A key contribution of our system is the direct use of the query workload to direct the annotation process, in addition to examining the content of the document. A large number of organizations today generate and share […]
DEFENSE AND DETECTION OF BWDDOS ATTACK
A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. Bandwidth DDoS (BW DDoS) attacks disrupt […]
LOCATION-BASED SEARCH QUERIES USING EXPLOITING SERVICE SIMILARITY FOR PRIVACY PRESERVING
LBS include services to identify a location of a person or object, such as discovering the nearest banking cash machine (a.k.a. ATM) or the whereabouts of a friend or employee. LBS include parcel tracking and vehicle tracking services. LBS can include mobile commerce when taking the form of coupons or advertising directed at customers based […]
SERVICE SIMILARITY EXPLOITING IN LBS QUERIES FOR PRIVACY
Location-based services (LBS) are a general class of computer program-level services that use location data to control features. As such LBS is an information service and has a number of uses in social networking today as an entertainment service, which is accessible with mobile devices through the mobile network and which uses information on the […]
TWO-PHASE VALIDATION COMMIT PROTOCOL BASED SECURE CLOUD TRANSACTIONS
Formalize the concept of trusted transactions. Trusted transactions are those transactions that do not violate credential or policy inconsistencies over the lifetime of the transaction. We then present a more general term, safe transactions, that identifies transactions that are both trusted and conform to the ACID properties of distributed database systems. We define several different […]
- « Previous Page
- 1
- …
- 12
- 13
- 14
- 15
- 16
- …
- 21
- Next Page »