20,775 research outputs found

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    Mobile Life: A Research Foundation for Mobile Services

    Get PDF
    The telecom and IT industry is now facing the challenge of a second IT-revolution, where the spread of mobile and ubiquitous services will have an even more profound effect on commercial and social life than the recent Internet revolution. Users will expect services that are unique and fully adapted for the mobile setting, which means that the roles of the operators will change, new business models will be required, and new methods for developing and marketing services have to be found. Most of all, we need technology and services that put people at core. The industry must prepare to design services for a sustainable web of work, leisure and ubiquitous technology we can call the mobile life. In this paper, we describe the main components of a research agenda for mobile services, which is carried out at the Mobile Life Center at Stockholm University. This research program takes a sustainable approach to research and development of mobile and ubiquitous services, by combining a strong theoretical foundation (embodied interaction), a welldefined methodology (user-centered design) and an important domain with large societal importance and commercial potential (mobile life). Eventually the center will create an experimental mobile services ecosystem, which will serve as an open arena where partners from academia and industry can develop our vision an abundant future marketplace for future mobile servíces

    Mobile Online Gaming via Resource Sharing

    Full text link
    Mobile gaming presents a number of main issues which remain open. These are concerned mainly with connectivity, computational capacities, memory and battery constraints. In this paper, we discuss the design of a fully distributed approach for the support of mobile Multiplayer Online Games (MOGs). In mobile environments, several features might be exploited to enable resource sharing among multiple devices / game consoles owned by different mobile users. We show the advantages of trading computing / networking facilities among mobile players. This operation mode opens a wide number of interesting sharing scenarios, thus promoting the deployment of novel mobile online games. In particular, once mobile nodes make their resource available for the community, it becomes possible to distribute the software modules that compose the game engine. This allows to distribute the workload for the game advancement management. We claim that resource sharing is in unison with the idea of ludic activity that is behind MOGs. Hence, such schemes can be profitably employed in these contexts.Comment: Proceedings of 3nd ICST/CREATE-NET Workshop on DIstributed SImulation and Online gaming (DISIO 2012). In conjunction with SIMUTools 2012. Desenzano, Italy, March 2012. ISBN: 978-1-936968-47-

    Enabling scalability by partitioning virtual environments using frontier sets

    Get PDF
    We present a class of partitioning scheme that we have called frontier sets. Frontier sets build on the notion of a potentially visible set (PVS). In a PVS, a world is subdivided into cells and for each cell all the other cells that can be seen are computed. In contrast, a frontier set considers pairs of cells, A and B. For each pair, it lists two sets of cells (two frontiers), FAB and FBA. By definition, from no cell in FAB is any cell in FBA visible and vice versa. Our initial use of frontier sets has been to enable scalability in distributed networking. This is possible because, for example, if at time t0 Player1 is in cell A and Player2 is in cell B, as long as they stay in their respective frontiers, they do not need to send update information to each other. In this paper we describe two strategies for building frontier sets. Both strategies are dynamic and compute frontiers only as necessary at runtime. The first is distance-based frontiers. This strategy requires precomputation of an enhanced potentially visible set. The second is greedy frontiers. This strategy is more expensive to compute at runtime, however it leads to larger and thus more efficient frontiers. Network simulations using code based on the Quake II engine show that frontiers have significant promise and may allow a new class of scalable peer-to-peer game infrastructures to emerge

    Collective behavior and evolutionary games - An introduction

    Full text link
    This is an introduction to the special issue titled "Collective behavior and evolutionary games" that is in the making at Chaos, Solitons & Fractals. The term collective behavior covers many different phenomena in nature and society. From bird flocks and fish swarms to social movements and herding effects, it is the lack of a central planner that makes the spontaneous emergence of sometimes beautifully ordered and seemingly meticulously designed behavior all the more sensational and intriguing. The goal of the special issue is to attract submissions that identify unifying principles that describe the essential aspects of collective behavior, and which thus allow for a better interpretation and foster the understanding of the complexity arising in such systems. As the title of the special issue suggests, the later may come from the realm of evolutionary games, but this is certainly not a necessity, neither for this special issue, and certainly not in general. Interdisciplinary work on all aspects of collective behavior, regardless of background and motivation, and including synchronization and human cognition, is very welcome.Comment: 6 two-column pages, 1 figure; accepted for publication in Chaos, Solitons & Fractals [the special issue is available at http://www.sciencedirect.com/science/journal/09600779/56

    Technical alignment

    Get PDF
    This essay discusses the importance of the areas of infrastructure and testing to help digital preservation services demonstrate reliability, transparency, and accountability. It encourages practitioners to build a strong culture in which transparency and collaborations between technical frameworks are valued highly. It also argues for devising and applying agreed-upon metrics that will enable the systematic analysis of preservation infrastructure. The essay begins by defining technical infrastructure and testing in the digital preservation context, provides case studies that exemplify both progress and challenges for technical alignment in both areas, and concludes with suggestions for achieving greater degrees of technical alignment going forward
    corecore