[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 8, Issue 6November 2011
Reflects downloads up to 10 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
An Entropy-Based Approach to Detecting Covert Timing Channels

The detection of covert timing channels is of increasing interest in light of recent exploits of covert timing channels over the Internet. However, due to the high variation in legitimate network traffic, detecting covert timing channels is a ...

research-article
A Numerical Method for the Evaluation of the Distribution of Cumulative Reward till Exit of a Subset of Transient States of a Markov Reward Model

Markov reward models have interesting modeling applications, particularly those addressing fault-tolerant hardware/software systems. In this paper, we consider a Markov reward model with a reward structure including only reward rates associated with ...

research-article
Autonomic Trust Management for a Component-Based Software System

Trust plays an important role in software systems, especially component-based systems in which components or their environments vary. This paper introduces an autonomic trust management solution for a component-based software system. We propose an ...

research-article
Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes

We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original ...

research-article
Fast Software Rejuvenation of Virtual Machine Monitors

As server consolidation using virtual machines (VMs) is carried out, software aging of virtual machine monitors (VMMs) is becoming critical. Since a VMM is fundamental software for running VMs, its performance degradation or crash failure affects all ...

research-article
Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets

Security policies are one of the most fundamental elements of computer security. Current security policy design is concerned with the composition of components in security systems and interactions among them. Consequently, in a modular specification and ...

research-article
On Reliable Dissemination in Wireless Ad Hoc Networks

Reliable broadcast is a basic service for many collaborative applications as it provides reliable dissemination of the same information to many recipients. This paper studies three common approaches for achieving scalable reliable broadcast in ad hoc ...

research-article
On the Complexity of Authorization in RBAC under Qualification and Security Constraints

In practice, assigning access permissions to users must satisfy a variety of constraints motivated by business and security requirements. Here, we focus on Role-Based Access Control (RBAC) systems, in which access permissions are assigned to roles and ...

research-article
On the Performance of Secure Vehicular Communication Systems

Vehicular communication (VC) systems are being developed primarily to enhance transportation safety and efficiency. Vehicle-to-vehicle communication, in particular, frequent cooperative awareness messages or safety beacons, has been considered over the ...

research-article
Probabilistic Model-Driven Recovery in Distributed Systems

Automatic system monitoring and recovery has the potential to provide effective, low-cost ways to improve dependability in distributed software systems. However, automating recovery is challenging in practice because accurate fault diagnosis is hampered ...

research-article
Three Improved Algorithms for Multipath Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission

In this paper, we propose a security model to capture active attacks against multipath key establishment (MPKE) in sensor networks. Our model strengthens previous models to capture more attacks and achieve essential security goals for multipath key ...

research-article
Fingerprinting RFID Tags

Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and small size that are driving the technology, a tag has limited computational capabilities ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.