20,775 research outputs found
Game Theory Meets Network Security: A Tutorial at ACM CCS
The increasingly pervasive connectivity of today's information systems brings
up new challenges to security. Traditional security has accomplished a long way
toward protecting well-defined goals such as confidentiality, integrity,
availability, and authenticity. However, with the growing sophistication of the
attacks and the complexity of the system, the protection using traditional
methods could be cost-prohibitive. A new perspective and a new theoretical
foundation are needed to understand security from a strategic and
decision-making perspective. Game theory provides a natural framework to
capture the adversarial and defensive interactions between an attacker and a
defender. It provides a quantitative assessment of security, prediction of
security outcomes, and a mechanism design tool that can enable
security-by-design and reverse the attacker's advantage. This tutorial provides
an overview of diverse methodologies from game theory that includes games of
incomplete information, dynamic games, mechanism design theory to offer a
modern theoretic underpinning of a science of cybersecurity. The tutorial will
also discuss open problems and research challenges that the CCS community can
address and contribute with an objective to build a multidisciplinary bridge
between cybersecurity, economics, game and decision theory
Mobile Life: A Research Foundation for Mobile Services
The telecom and IT industry is now facing the challenge of a second IT-revolution, where the
spread of mobile and ubiquitous services will have an even more profound effect on commercial
and social life than the recent Internet revolution. Users will expect services that are unique and
fully adapted for the mobile setting, which means that the roles of the operators will change, new
business models will be required, and new methods for developing and marketing services have
to be found. Most of all, we need technology and services that put people at core. The industry
must prepare to design services for a sustainable web of work, leisure and ubiquitous technology
we can call the mobile life. In this paper, we describe the main components of a research agenda
for mobile services, which is carried out at the Mobile Life Center at Stockholm University. This
research program takes a sustainable approach to research and development of mobile and
ubiquitous services, by combining a strong theoretical foundation (embodied interaction), a welldefined
methodology (user-centered design) and an important domain with large societal
importance and commercial potential (mobile life). Eventually the center will create an
experimental mobile services ecosystem, which will serve as an open arena where partners from
academia and industry can develop our vision an abundant future marketplace for future mobile servíces
Mobile Online Gaming via Resource Sharing
Mobile gaming presents a number of main issues which remain open. These are
concerned mainly with connectivity, computational capacities, memory and
battery constraints. In this paper, we discuss the design of a fully
distributed approach for the support of mobile Multiplayer Online Games (MOGs).
In mobile environments, several features might be exploited to enable resource
sharing among multiple devices / game consoles owned by different mobile users.
We show the advantages of trading computing / networking facilities among
mobile players. This operation mode opens a wide number of interesting sharing
scenarios, thus promoting the deployment of novel mobile online games. In
particular, once mobile nodes make their resource available for the community,
it becomes possible to distribute the software modules that compose the game
engine. This allows to distribute the workload for the game advancement
management. We claim that resource sharing is in unison with the idea of ludic
activity that is behind MOGs. Hence, such schemes can be profitably employed in
these contexts.Comment: Proceedings of 3nd ICST/CREATE-NET Workshop on DIstributed SImulation
and Online gaming (DISIO 2012). In conjunction with SIMUTools 2012.
Desenzano, Italy, March 2012. ISBN: 978-1-936968-47-
Enabling scalability by partitioning virtual environments using frontier sets
We present a class of partitioning scheme that we have called frontier sets. Frontier sets build on the notion of a potentially visible set (PVS). In a PVS, a world is subdivided into cells and for each cell all the other cells that can be seen are computed. In contrast, a frontier set considers pairs of cells, A and B. For each pair, it lists two sets of cells (two frontiers), FAB and FBA. By definition, from no cell in FAB is any cell in FBA visible and vice versa.
Our initial use of frontier sets has been to enable scalability in distributed networking. This is possible because, for example, if at time t0 Player1 is in cell A and Player2 is in cell B, as long as they stay in their respective frontiers, they do not need to send update information to each other.
In this paper we describe two strategies for building frontier sets. Both strategies are dynamic and compute frontiers only as necessary at runtime. The first is distance-based frontiers. This strategy requires precomputation of an enhanced potentially visible set. The second is greedy frontiers. This strategy is more expensive to compute at runtime, however it leads to larger and thus more efficient frontiers.
Network simulations using code based on the Quake II engine show that frontiers have significant promise and may allow a new class of scalable peer-to-peer game infrastructures to emerge
Collective behavior and evolutionary games - An introduction
This is an introduction to the special issue titled "Collective behavior and
evolutionary games" that is in the making at Chaos, Solitons & Fractals. The
term collective behavior covers many different phenomena in nature and society.
From bird flocks and fish swarms to social movements and herding effects, it is
the lack of a central planner that makes the spontaneous emergence of sometimes
beautifully ordered and seemingly meticulously designed behavior all the more
sensational and intriguing. The goal of the special issue is to attract
submissions that identify unifying principles that describe the essential
aspects of collective behavior, and which thus allow for a better
interpretation and foster the understanding of the complexity arising in such
systems. As the title of the special issue suggests, the later may come from
the realm of evolutionary games, but this is certainly not a necessity, neither
for this special issue, and certainly not in general. Interdisciplinary work on
all aspects of collective behavior, regardless of background and motivation,
and including synchronization and human cognition, is very welcome.Comment: 6 two-column pages, 1 figure; accepted for publication in Chaos,
Solitons & Fractals [the special issue is available at
http://www.sciencedirect.com/science/journal/09600779/56
Technical alignment
This essay discusses the importance of the areas of
infrastructure and testing to help digital preservation services
demonstrate reliability, transparency, and accountability. It
encourages practitioners to build a strong culture in which
transparency and collaborations between technical frameworks
are valued highly. It also argues for devising and applying
agreed-upon metrics that will enable the systematic analysis of
preservation infrastructure. The essay begins by defining
technical infrastructure and testing in the digital preservation
context, provides case studies that exemplify both progress and
challenges for technical alignment in both areas, and concludes
with suggestions for achieving greater degrees of technical
alignment going forward
- …