Excess capacity (EC) is the unused capacity in a network. Excess capacity management techniques exploit the EC to improve the network performance. In this paper we propose EC management techniques that exploit EC to improve all the three performance metrics. EC management techniques differ in two respects: when connections are migrated from one protection scheme […]
Archives for January 2013
CIA Framework for Data Sharing in Cloud
In this paper we propose a novel approach, namely Cloud Information Accountability (CIA) framework, based on the notion of information accountability. Our proposed CIA framework provides end-to-end accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines […]
MLT-PPDM: Multi-Level Trust in Privacy Preserving Data Mining
In this paper, we address this challenge in enabling MLT-PPDM services. In particular, we focus on the additive perturbation approach where random Gaussian noise is added to the original data with arbitrary distribution, and provide a systematic solution. Through a one-to-one mapping, our solution allows a data owner to generate distinctly perturbed copies of its […]
A framework for managing and deriving events under uncertainty conditions IEEE Projects 2012
In this work, we present a generic framework for representing events and rules with uncertainty. We present a mechanism to construct the probability space that captures the semantics and defines the probabilities of possible worlds using an abstraction based on a Bayesian network. In order to improve derivation efficiency we employ two mechanisms: The first […]
A Distributed Access Control Architecture for Cloud Computing
We present distributed access control architecture for multitenant and virtualized environments. The design of this architecture is based on the principles from security management and software engineering. From a security management perspective, the goal is to meet cloud users’ access control requirements. From a software engineering perspective, the goal is to generate detailed specifications of […]
SPOT – Compromised machine detection
In this paper, we focus on the detection of the compromised machines in a network that are used for sending spam messages, which are commonly referred to as spam zombies. We develop the SPOT detection system to assist system administrators in automatically identifying the compromised machines in their networks. SPOT is designed based on a […]
Community anomaly detection system
Collaborative information systems (CISs) allow groups of users to communicate and cooperate over common tasks. CIS are increasingly relied upon to manage sensitive information. In this paper, we introduce a framework to detect anomalous insiders from the access logs of a CIS by leveraging the relational nature of system users as well as the meta-information […]
Multi Cloud: Cloud Computing Security
Single cloud provider is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud. In recent years, there has been a move towards “multiclouds”, “intercloud” or “cloud-of-clouds”. This paper focuses on the issues related to the data security aspect […]
Citation Parser using Sequent Alignment
Parsing citations is essential for integrating bibliographical information published on the Internet. Most citation management techniques are based on the assumption that we can correctly identify the main components of a citation, such as authors’ names, title, publication venue, date, and the number of pages. In this paper, we propose a sequence-alignment based citation parser, […]
D-AdaptOR : Distributed Adaptive Opportunistic Routing
In this paper propose a distributed adaptive opportunistic routing algorithm (d-AdaptOR) that minimizes the expected average per-packet cost for routing a packet from a source node to a destination. This is achieved by both sufficiently exploring the network using data packets and exploiting the best routing opportunities. This reinforcement learning framework allows for a low-complexity, […]