17,545 research outputs found

    EVEREST IST - 2002 - 00185 : D23 : final report

    Get PDF
    Deliverable pĂșblic del projecte europeu EVERESTThis deliverable constitutes the final report of the project IST-2002-001858 EVEREST. After its successful completion, the project presents this document that firstly summarizes the context, goal and the approach objective of the project. Then it presents a concise summary of the major goals and results, as well as highlights the most valuable lessons derived form the project work. A list of deliverables and publications is included in the annex.Postprint (published version

    ALT-C 2010 - Conference Proceedings

    Get PDF

    Design and implementation of the node identity internetworking architecture

    Get PDF
    The Internet Protocol (IP) has been proven very flexible, being able to accommodate all kinds of link technologies and supporting a broad range of applications. The basic principles of the original Internet architecture include end-to-end addressing, global routeability and a single namespace of IP addresses that unintentionally serves both as locators and host identifiers. The commercial success and widespread use of the Internet have lead to new requirements, which include internetworking over business boundaries, mobility and multi-homing in an untrusted environment. Our approach to satisfy these new requirements is to introduce a new internetworking layer, the node identity layer. Such a layer runs on top of the different versions of IP, but could also run directly on top of other kinds of network technologies, such as MPLS and 2G/3G PDP contexts. This approach enables connectivity across different communication technologies, supports mobility, multi-homing, and security from ground up. This paper describes the Node Identity Architecture in detail and discusses the experiences from implementing and running a prototype

    A review of High Performance Computing foundations for scientists

    Full text link
    The increase of existing computational capabilities has made simulation emerge as a third discipline of Science, lying midway between experimental and purely theoretical branches [1, 2]. Simulation enables the evaluation of quantities which otherwise would not be accessible, helps to improve experiments and provides new insights on systems which are analysed [3-6]. Knowing the fundamentals of computation can be very useful for scientists, for it can help them to improve the performance of their theoretical models and simulations. This review includes some technical essentials that can be useful to this end, and it is devised as a complement for researchers whose education is focused on scientific issues and not on technological respects. In this document we attempt to discuss the fundamentals of High Performance Computing (HPC) [7] in a way which is easy to understand without much previous background. We sketch the way standard computers and supercomputers work, as well as discuss distributed computing and discuss essential aspects to take into account when running scientific calculations in computers.Comment: 33 page

    Towards a Framework for Preserving Privacy in VANET

    Get PDF
    Vehicular Ad-hoc Network (VANET) is envisioned as an integral part of the Intelligent Transportation Systems as it promises various services and benefits such as road safety, traffic efficiency, navigation and infotainment services. However, the security and privacy risks associated with the wireless communication are often overlooked. Messages exchanged in VANET wireless communication carry inferable Personally Identifiable Information(PII). This introduces several privacy threats that could limit the adoption of VANET. The quantification of these privacy threats is an active research area in VANET security and privacy domains. The Pseudonymisation technique is currently the most preferred solution for critical privacy threats in VANET to provide conditional anonymous authentication. In the existing literature, several Pseudonym Changing Schemes(PCS) have been proposed as effective de-identification approaches to prevent the inference of PII. However, for various reasons, none of the proposed schemes received public acceptance. Moreover, one of the open research challenges is to compare different PCSs under varying circumstances with a set of standardized experimenting parameters and consistent metrics. In this research, we propose a framework to assess the effectiveness of PCSs in VANET with a systematic approach. This comprehensive equitable framework consists of a variety of building blocks which are segmented into correlated sub-domains named Mobility Models, Adversary Models, and Privacy Metrics. Our research introduces a standard methodology to evaluate and compare VANET PCSs using a generic simulation setup to obtain optimal, realistic and most importantly, consistent results. This road map for the simulation setup aims to help the research \& development community to develop, assess and compare the PCS with standard set of parameters for proper analysis and reporting of new PCSs. The assessment of PCS should not only be equitable but also realistic and feasible. Therefore, the sub-domains of the framework need coherent as well as practically applicable characteristics. The Mobility Model is the layout of the traffic on the road which has varying features such as traffic density and traffic scenarios based on the geographical maps. A diverse range of Adversary Models is important for pragmatic evaluation of the PCSs which not only considers the presence of global passive adversary but also observes the effect of intelligent and strategic \u27local attacker\u27 placements. The biggest challenge in privacy measurement is the fact that it is a context-based evaluation. In the literature, the PCSs are evaluated using either user-oriented or adversary-oriented metrics. Under all circumstances, the PCSs should be assessed from both user and adversary perspectives. Using this framework, we determined that a local passive adversary can be strong based on the attacking capabilities. Therefore, we propose two intelligent adversary placements which help in privacy assessment with realistic adversary modelling. When the existing PCSs are assessed with our systematic approach, consistent models and metrics, we identified the privacy vulnerabilities and the limitations of existing PCSs. There was a need for comprehensive PCS which consider the context of the vehicles and the changing traffic patterns in the neighbourhood. Consequently, we developed a Context-Aware \& Traffic Based PCS that focuses on increasing the overall rate of confusion for the adversary and to reduce deterministic information regarding the pseudonym change. It is achieved by increasing the number of dynamic attributes in the proposed PCS for inference of the changing pattern of the pseudonyms. The PCS increases the anonymity of the vehicle by having the synchronized pseudonym changes. The details given under the sub-domains of the framework solidifies our findings to strengthen the privacy assessment of our proposed PCS

    Evaluation of the Union Learning Fund in year 3

    Get PDF

    Radio Spectrum and the Disruptive Clarity OF Ronald Coase.

    Get PDF
    In the Federal Communications Commission, Ronald Coase (1959) exposed deep foundations via normative argument buttressed by astute historical observation. The government controlled scarce frequencies, issuing sharply limited use rights. Spillovers were said to be otherwise endemic. Coase saw that Government limited conflicts by restricting uses; property owners perform an analogous function via the "price system." The government solution was inefficient unless the net benefits of the alternative property regime were lower. Coase augured that the price system would outperform the administrative allocation system. His spectrum auction proposal was mocked by communications policy experts, opposed by industry interests, and ridiculed by policy makers. Hence, it took until July 25, 1994 for FCC license sales to commence. Today, some 73 U.S. auctions have been held, 27,484 licenses sold, and 52.6billionpaid.Thereformisatextbookexampleofeconomicpolicysuccess.WeexamineCoase‘sseminal1959paperontwolevels.First,wenotetheimportanceofitsanalyticalsymmetry,comparingadministrativetomarketmechanismsundertheassumptionofpositivetransactioncosts.Thisfundamentalinsighthashadenormousinfluencewithintheeconomicsprofession,yetisoftenlostincurrentanalyses.Thisanalyticalinsighthaditsbeginninginhisacclaimedearlyarticleonthefirm(Coase1937),andcontinuedintohissubsequenttreatmentofsocialcost(Coase1960).Second,weinvestigatewhyspectrumpolicieshavestoppedwellshortofthepropertyrightsregimethatCoaseadvocated,consideringrent−seekingdynamicsandtheemergenceofnewtheorieschallengingCoase‘spropertyframework.Oneconclusioniseasilyrendered:competitivebiddingisnowthedefaulttoolinwirelesslicenseawards.Byruleofthumb,about52.6 billion paid. The reform is a textbook example of economic policy success. We examine Coase‘s seminal 1959 paper on two levels. First, we note the importance of its analytical symmetry, comparing administrative to market mechanisms under the assumption of positive transaction costs. This fundamental insight has had enormous influence within the economics profession, yet is often lost in current analyses. This analytical insight had its beginning in his acclaimed early article on the firm (Coase 1937), and continued into his subsequent treatment of social cost (Coase 1960). Second, we investigate why spectrum policies have stopped well short of the property rights regime that Coase advocated, considering rent-seeking dynamics and the emergence of new theories challenging Coase‘s property framework. One conclusion is easily rendered: competitive bidding is now the default tool in wireless license awards. By rule of thumb, about 17 billion in U.S. welfare losses have been averted. Not bad for the first 50 years of this, or any, Article appearing in Volume II of the Journal of Law & Economics.
    • 

    corecore