5,758 research outputs found

    50 years of isolation

    Get PDF
    The traditional means for isolating applications from each other is via the use of operating system provided “process” abstraction facilities. However, as applications now consist of multiple fine-grained components, the traditional process abstraction model is proving to be insufficient in ensuring this isolation. Statistics indicate that a high percentage of software failure occurs due to propagation of component failures. These observations are further bolstered by the attempts by modern Internet browser application developers, for example, to adopt multi-process architectures in order to increase robustness. Therefore, a fresh look at the available options for isolating program components is necessary and this paper provides an overview of previous and current research on the area

    A Taxonomy of Data Grids for Distributed Data Sharing, Management and Processing

    Full text link
    Data Grids have been adopted as the platform for scientific communities that need to share, access, transport, process and manage large data collections distributed worldwide. They combine high-end computing technologies with high-performance networking and wide-area storage management techniques. In this paper, we discuss the key concepts behind Data Grids and compare them with other data sharing and distribution paradigms such as content delivery networks, peer-to-peer networks and distributed databases. We then provide comprehensive taxonomies that cover various aspects of architecture, data transportation, data replication and resource allocation and scheduling. Finally, we map the proposed taxonomy to various Data Grid systems not only to validate the taxonomy but also to identify areas for future exploration. Through this taxonomy, we aim to categorise existing systems to better understand their goals and their methodology. This would help evaluate their applicability for solving similar problems. This taxonomy also provides a "gap analysis" of this area through which researchers can potentially identify new issues for investigation. Finally, we hope that the proposed taxonomy and mapping also helps to provide an easy way for new practitioners to understand this complex area of research.Comment: 46 pages, 16 figures, Technical Repor

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    Advanced Methods for Botnet Intrusion Detection Systems

    Get PDF

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Religion, Violence and Genocide: in Narratives of Survivors from the War in Bosnia and Herzegovina

    Get PDF
    The starting point of this study is the war that took place in northwestern Bosnia and Herzegovina in the 1990s. Serbian soldiers and police targeted their use of violent force directly against the civilian populations in northwestern Bosnia. In their quest to expel Bosniacs and Croats from this area, Serbian soldiers and police used mass executions, forced flight, systematic rape, and concentration camps. The aim of this study is analyzing the narratives of survivors of the war in northwestern Bosnia. The focus lies on analyzing interviewees’ description of war-time violence and also analyzing discursive patterns that contribute in constructing the phenomenon “war violence”. Analysis shows that the interpersonal interactions that caused the violence continue even after the violent situation is over. Recollections from perpetrators and those subjected to violence of the war do not exist only as verbal constructions in Bosnia of today. Stories about violent situations live their own lives after the war and continue being important to individuals and social life. The crimes committed in northwestern Bosnia are qualified as genocide according to indictments against former Serbian leaders Radovan Karadžić and Ratko Mladić. All interviewees in this study experienced and survived the war in northwestern Bosnia. These individuals have a present, ongoing relation with these communities: Some live there permanently, and some spend their summers in northwestern Bosnia. Institutions in the administrative entity Republika Srpska (to which northwestern Bosnia now belong administratively) deny genocide, and this approach to war-time events becomes a central theme in future, post-war analysis of the phenomena “war violence”, and “reconciliation”. Therefore, it is very important to analyze the political elite’s denial of the systematic acts of violence during the war that have been conveyed by the Hague Tribunal, the Court of Bosnia and Herzegovina on War Crime, and Bosnian media. The narratives in my empirical material seem to be influenced by (or coherent with) the rhetoric mediated in these fora. When informants emphasize extermination and the systematization of violence during the war, they produce and reproduce the image of a mutual struggle on a collective level. The aim of this struggle seems to be that the described acts of violence be recognized as genocide

    Feature-rich networks: going beyond complex network topologies.

    Get PDF
    Abstract The growing availability of multirelational data gives rise to an opportunity for novel characterization of complex real-world relations, supporting the proliferation of diverse network models such as Attributed Graphs, Heterogeneous Networks, Multilayer Networks, Temporal Networks, Location-aware Networks, Knowledge Networks, Probabilistic Networks, and many other task-driven and data-driven models. In this paper, we propose an overview of these models and their main applications, described under the common denomination of Feature-rich Networks, i. e. models where the expressive power of the network topology is enhanced by exposing one or more peculiar features. The aim is also to sketch a scenario that can inspire the design of novel feature-rich network models, which in turn can support innovative methods able to exploit the full potential of mining complex network structures in domain-specific applications
    • …
    corecore