2,435 research outputs found

    A Typing Discipline for Hardware Interfaces

    Get PDF
    Modern Systems-on-a-Chip (SoC) are constructed by composition of IP (Intellectual Property) Cores with the communication between these IP Cores being governed by well described interaction protocols. However, there is a disconnect between the machine readable specification of these protocols and the verification of their implementation in known hardware description languages. Although tools can be written to address such separation of concerns, the tooling is often hand written and used to check hardware designs a posteriori. We have developed a dependent type-system and proof-of-concept modelling language to reason about the physical structure of hardware interfaces using user provided descriptions. Our type-system provides correct-by-construction guarantees that the interfaces on an IP Core will be well-typed if they adhere to a specified standard

    A Typing Discipline for Hardware Interfaces (Artifact)

    Get PDF
    Modern Systems-on-a-Chip (SoC) are constructed by composition of IP (Intellectual Property) Cores with the communication between these IP Cores being governed by well described interaction protocols. However, there is a disconnect between the machine readable specification of these protocols and the verification of their implementation in known hardware description languages. Although tools can be written to address such a separation of concerns, such tooling is often hand written and used to check hardware designs a posteriori. We have developed a dependent type-system and proof-of-concept modelling language to reason about the physical structure of hardware interfaces respective to user provided descriptions. Our type-system provides correct-by-construction guarantees that the interfaces on an IP Core will be well-typed if they adhere to a specified standard

    Developing a user-cordial online retrieval model strategy to access extension educational materials from a north central region database

    Get PDF
    There is concern that the Cooperative Extension Service (CES) is not implementing electronic communication technologies rapidly enough to effectively compete with other information providers. Anxiety regarding electronic information-accessing strategies must be overcome with appropriate orientation and training so their use becomes routine. Extension personnel need an efficient, easy-to-use method of accessing online data-base in order to comply with the CES mission of assisting people in improving their lives. The purpose of this study was to extend the existing North Central Region Educational Materials Project (NCREMP) information search system by developing an online search strategy that is an easily-used tool for Extension personnel seeking information from electronic sources, and to examine characteristics that promote positive adoption of electronic communication systems among Extension workers. QUERRI is intended to serve as a model for future design of online search strategies relevant to CES professionals;A descriptive approach of a qualitative nature was taken in developing the search strategy. The study was concerned with conditions and practices currently existing in CES--the restructuring that is going on, attitudes held by Extension employees toward electronic information technology, expectations in the usage of such technology, and the effects these expectations have induced. Areas investigated prior to development of the search model were: (1) The level of awareness and use of the NCREMP data-base among CES personnel. (2) The use of online searching systems. (3) The degree of familiarity and acceptance of computer use and computer-based information searching strategies among CES staff;A conceptual framework was formulated before development of the search model that attempted to simulate the intuitive reasoning processes used by an individual in need of information for a specific purpose. The chief emphasis in development of the search model was in ease of use. A questionnaire distributed to CES personnel showed evidence of a lack of awareness of the NCREMP search service, and low understanding of how to search online data-bases. Selected responses helped to focus scripting of menus and Help screens on user-cordiality to ensure positive adoption and implementation of the search model

    Generating Private Recommendation System Using Multiple Homomorphic Encryption Scheme

    Get PDF
    The recommender system is important tool in online application to generate the recommendation services. Recommendations are generated by collecting the data from users need; online services access the user’s profiles for generating useful recommendations. Privacy sensitive data is used for to collect the data. Collaborative filtering technique gives privacy for sensitive data if data is misused by other service providers or leaked. Existing system uses Paillier encryption algorithm & DGK algorithm to secure user data from malicious third party as well as to protect the private data against service provider but system is more complex and inefficient. Proposed system protects the privacy of user using encrypting the sensitive data. The system uses multiple homomorphic algorithms to secure user data from service providers. The system is used to protect the confidential data of user against the service provider while providing online services. Encrypting private data is recommended and process on data to generate recommendations. To construct efficient system that does not require the active participation of the user. The experiment shows that the result that provide the security by hiding the personal data of user from third party DOI: 10.17762/ijritcc2321-8169.15076

    Grassroots Flash: A Payment System for Grassroots Cryptocurrencies

    Full text link
    The goal of grassroots cryptocurrencies is to provide a foundation with which local digital economies can emerge independently of each other and of global digital platforms and global cryptocurrencies; can form and grow without initial capital or external credit; can trade with each other; and can gradually merge into a global digital economy. Grassroots cryptocurrencies turn mutual trust into liquidity and thus could be a powerful means for 'banking the unbanked'. Grassroots cryptocurrencies have not been provided yet with a payment system, which is the goal of this paper. Here, we present Grassroots Flash, a payment system for grassroots cryptocurrencies that employs the blocklace -- a DAG-like counterpart of the blockchain data structure. We analyze its security (safety, liveness, and privacy) and efficiency, prove that it is indeed grassroots

    Method of Determining Trust and Protection of Personal Data in Social Networks

    Get PDF
    The analysis of parameters of social networks (information transfer to other users, traffic density, probability of network construction) is carried out.  Three variants of solving the equation near the steady state of the system are considered.  The protection of personal data increases from the growing factors of trust in information.Mathematical modeling of the dependence of personal data protection on trust is performed. The results obtained in the article showed that the protection of personal data is directly proportional to the reliability and trust, with constant security parameters.  The protection of personal data increases with the growth of trust parameters

    Ex-AS-CRED Method for Inter Domain Routing of BGP

    Get PDF
    Border Gateway Protocol (BGP) acts as a main part of the global infrastructure. Attacks against BGP are increasing and severity. Many of the security mechanisms based on public key cryptography suffer from performance, trust model and other different issues. In this paper we are presenting the new method for solving the security and trust issues in BGP protocol traffic. The recently presented approach is AS-CRED which works on reputation and alert service which not only detect anomalous BGP updates, but also provides a quantitative view of AS tendencies to perpetrate anomalous behavior. The AS-CRED was basically based on the term of credit score. From the practical results, the proposed AS-CRED was efficient for solving the trust issues in complex world of finance which includes the huge amount of entities as well as highly uncertain interactions. However, this limitation of AS-CRED is that prediction approach of future anomalous behavior needs to improve with more accuracy. In this paper we presenting the new method called Ex-AS-CRED [Ex-Extended] with aim of adding the more descriptive AS behaviors and hence the final information of AS reputation is used for prediction of invalid behaviors of BGP. DOI: 10.17762/ijritcc2321-8169.16044

    Mobile Cloud Computing

    Get PDF
    Cloud registering can be viewed as a model that gives system access to an imparted pool of assets, such as Storage and computing power, which can be rapidly provisioned and released with minimal management effort. This paper portrays an examination action in the region of portable cloud registering. It highlights diverse open issues which are related with the portable utilization of cloud processing. By making a list of criteria for those issues, diverse arrangements are compared against each other. the solutions discussed in this paper concentrate on diverse parts of cloud processing in relationship with portable utilization. Each of the exhibited arrangements offers atleast one satisfactory approach for one of the open issues that are related with the portable utilization of cloud processing assets. By consolidating the diverse existing approaches it would be possible to create an answer that covers most of the issues currently identified

    Performance Evaluation of Routing Protocols in Wireless Sensor Networks

    Get PDF
    The growing field of information technology enhanced the capabilities of the wireless communication. The large usage of WSN in the various fields of the real world is scaling with the wide variety of roles for wireless sensor network performance is challenging tasks. The issues of performance in the wireless sensor networks in many literatures, yet more studies are being done on the performance because the user and application needs are keep increasing,to encounter the challenges of the performance issues are studied here by digging out the routing protocols performance in WSN. To conduct the study and analysis on performance of WSN protocols the there are various performance metrics used for the evaluation of performance in WSN. This study will be carried out to come up with the simulation experiments over the directed diffusion (DD) and LEACH routing protocols in terms of energy consumption, congestion and reliability in the wireless sensor networks (WSN) environment with the low power consumptions. The simulation experiments in this study are based on the reliability, delay and other constraints to compare the speed, reliability and electricity saving data communication in the wireless sensor networks (WSN). The discussion of the conducted simulation experiments describes the steps which are pertaining to the protocols and tradeoffs and complexity of the data traffic for the efficiency. The NS2 simulation is used for the simulation based experiments for performance of wireless sensor network (WSN) communications which is demonstrating the comparative effectiveness of the routing protocols in the recent concepts. The results of the simulation are lightening the ways for the minimization of the delay and enhancement in the reliability issues in wireless sensor networks (WSN)

    Portable TPM based user Attestation Architecture for Cloud Environments

    Get PDF
    Cloud computing is causing a major shift in the IT industry. Research indicates that the cloud computing industry segment is substantial and growing enormously. New technologies have been developed, and now there are various ways to virtualize IT systems and to access the needed applications on the Internet, through web based applications. Users, now can access their data any time and at any place with the service provided by the cloud storage. With all these benefits, security is always a concern. Even though the cloud provides accessing the data stored in cloud storage in a flexible and scalable manner, the main challenge it faces is with the security issues. Thus user may think it2019;s not secure since the encryption keys are managed by the software, therefore there is no attestation on the client software integrity. The cloud user who has to deploy in the reliable and secure environment should be confirmed from the Infrastructure as a Service (IaaS) that it has not been corrupted by the mischievous acts. Thus, the user identification which consists user ID and password can also be easily compromised. Apart from the traditional network security solutions, trusted computing technology is combined into more and more aspects of cloud computing environment to guarantee the integrity of platform and provide attestation mechanism for trustworthy services. Thus, enhancing the confidence of the IaaS provider. A cryptographic protocol adopted by the Trusted Computing Group enables the remote authentication which preserves the privacy of the user based on the trusted platform. Thus we propose a framework which defines Trusted Platform Module (TPM), a trusted computing group which proves the secure data access control in the cloud storage by providing additional security. In this paper, we define the TPMbased key management, remote client attestation and a secure key share protocol across multiple users. Then we consider some of the challenges with the current TPM based att
    • …
    corecore