CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS). In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced ciphertexts without knowing anything about the original files. This technique has not been […]
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement to the federation with other clouds. Performance evaluation of Cloud Computing infrastructures is required to predict and quantify the cost-benefit of a strategy portfolio and the corresponding Quality of Service (QoS) […]
Measuring Time required to compromise a computer system
In this paper three measurement methods – the time between compromises, the time to first compromise and the overall time to compromise .A frequent assumption in the domain of cyber security is that cyber intrusions follow the properties of a Poisson process, i.e., that the number of intrusions are well modeled by a Poisson distribution […]
Website Structure Improvement through Facilitating Effective User Navigation
A primary reason is that the web developers’ understanding of how a website should be structured can be considerably different from that of the users. While various methods have been proposed to relink webpages to improve navigability using user navigation data, the completely reorganized new structure can be highly unpredictable, and the cost of disorienting […]
Wireless Sensor Networks Implementation In Trust Aware Routing Framework
To protect WSNs from the harmful attacks exploiting the replay of routing information, we have designed and implemented a robust trust-aware routing framework, TARF, to secure routing solutions in wireless sensor networks. The design of TARF centers on trustworthiness and energy efficiency. EnergyWatcher is responsible for recording the energy cost for each known neighbor, based […]
Exploiting Excess Capacity to Improve Robustness of WDM Mesh Networks
Excess capacity (EC) is the unused capacity in a network. Excess capacity management techniques exploit the EC to improve the network performance. In this paper we propose EC management techniques that exploit EC to improve all the three performance metrics. EC management techniques differ in two respects: when connections are migrated from one protection scheme […]
CIA Framework for Data Sharing in Cloud
In this paper we propose a novel approach, namely Cloud Information Accountability (CIA) framework, based on the notion of information accountability. Our proposed CIA framework provides end-to-end accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines […]
Detecting and Resolving Firewall Policy Anomalies
The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most […]
Capacity of Data Collection in Arbitrary Wireless Sensor Networks
Data collection is a fundamental function provided by wireless sensor networks. How to efficiently collect sensing data from all sensor nodes is critical to the performance of sensor networks. In this paper, we aim to understand the theoretical limits of data collection in a TDMA-based sensor network in terms of possible and achievable maximum capacity. […]
Risk-Aware Mitigation for MANET Routing Attacks
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically […]
- 1
- 2
- 3
- 4
- Next Page »