7,851 research outputs found
Secure Data Sharing With AdHoc
In the scientific circles, there is pressing need to form temporary and dynamic collaborations to share diverse resources (e.g. data, an access to services, applications or various instruments). Theoretically, the traditional grid technologies respond to this need with the abstraction of a Virtual Organization (VO). In practice its procedures are characterized by latency, administrative overhead and are inconvenient to its users.
We would like to propose the Manifesto for Secure Sharing. The main postulate is that users should be able to share data and resources by themselves without any intervention on the system administrator's side. In addition, operating an intuitive interface does not require IT skills.
AdHoc is a resource sharing interface designed for users willing to share data or computational resources within seconds and almost effortlessly. The AdHoc application is built on the top of traditional security frameworks, such as the PKI X.509 certificate scheme, Globus GSI, gLite VOMS and Shibboleth. It enables users rapid and secure collaboration
Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements
Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)
Federated Embedded Systems – a review of the literature in related fields
This report is concerned with the vision of smart interconnected objects, a vision that has attracted much attention lately. In this paper, embedded, interconnected, open, and heterogeneous control systems are in focus, formally referred to as Federated Embedded Systems. To place FES into a context, a review of some related research directions is presented. This review includes such concepts as systems of systems, cyber-physical systems, ubiquitous
computing, internet of things, and multi-agent systems. Interestingly, the reviewed fields seem to overlap with each other in an increasing number of ways
Distributed workload control for federated service discovery
The diffusion of the internet paradigm in each aspect of human life continuously fosters the widespread of new technologies and related services. In the Future Internet scenario, where 5G telecommunication facilities will interact with the internet of things world, analyzing in real time big amounts of data to feed a potential infinite set of services belonging to different administrative domains, the role of a federated service discovery will become crucial. In this paper the authors propose a distributed workload control algorithm to handle efficiently the service discovery requests, with the aim of minimizing the overall latencies experienced by the requesting user agents. The authors propose an algorithm based on the Wardrop equilibrium, which is a gametheoretical concept, applied to the federated service discovery domain. The proposed solution has been implemented and its performance has been assessed adopting different network topologies and metrics. An open source simulation environment has been created allowing other researchers to test the proposed solution
Secure Sharing of Tuple Spaces in Ad Hoc Settings
AbstractSecurity is emerging as a growing concern throughout the distributed computing community. Typical solutions entail specialized infrastructure support for authentication, encryption and access control. Mobile applications executing over ad hoc wireless networks present designers with a rather distinct set of security requirements. A totally open setting and limited resources call for lightweight and highly decentralized security solutions. In this paper we propose an approach that relies on extending an existing coordination middleware for mobility (Lime). The need to continue to offer a very simple model of coordination that assures rapid software development led to limiting extensions solely to password protected tuple spaces and per tuple access control. Password distribution and security are relegated to the application realm. Host level security is ensured by the middleware design and relies on standard support provided by the Java system. Secure interactions among agents across hosts are accomplished by careful exploitation of the interceptor pattern and the use of standard encryption. The paper explains the design strategy used to add security support in Lime and its implications for the development of mobile applications over ad hoc networks
London SynEx Demonstrator Site: Impact Assessment Report
The key ingredients of the SynEx-UCL software components are:
1. A comprehensive and federated electronic healthcare record that can be used to
reference or to store all of the necessary healthcare information acquired from a
diverse range of clinical databases and patient-held devices.
2. A directory service component to provide a core persons demographic database to
search for and authenticate staff users of the system and to anchor patient
identification and connection to their federated healthcare record.
3. A clinical record schema management tool (Object Dictionary Client) that enables
clinicians or engineers to define and export the data sets mapping to individual
feeder systems.
4. An expansible set of clinical management algorithms that provide prompts to the
patient or clinician to assist in the management of patient care.
CHIME has built up over a decade of experience within Europe on the requirements
and information models that are needed to underpin comprehensive multiprofessional
electronic healthcare records. The resulting architecture models have
influenced new European standards in this area, and CHIME has designed and built
prototype EHCR components based on these models. The demonstrator systems
described here utilise a directory service and object-oriented engineering approach,
and support the secure, mobile and distributed access to federated healthcare
records via web-based services.
The design and implementation of these software components has been founded on
a thorough analysis of the clinical, technical and ethico-legal requirements for
comprehensive EHCR systems, published through previous project deliverables and
in future planned papers.
The clinical demonstrator site described in this report has provided the solid basis
from which to establish "proof of concept" verification of the design approach, and a
valuable opportunity to install, test and evaluate the results of the component
engineering undertaken during the EC funded project. Inevitably, a number of
practical implementation and deployment obstacles have been overcome through
this journey, each of those having contributed to the time taken to deliver the
components but also to the richness of the end products.
UCL is fortunate that the Whittington Hospital, and the department of cardiovascular
medicine in particular, is committed to a long-term vision built around this work. That
vision, outlined within this report, is shared by the Camden and Islington Health
Authority and by many other purchaser and provider organisations in the area, and
by a number of industrial parties. They are collectively determined to support the
Demonstrator Site as an ongoing project well beyond the life of the EC SynEx
Project.
This report, although a final report as far as the EC project is concerned, is really a
description of the first phase in establishing a centre of healthcare excellence. New
EC Fifth Framework project funding has already been approved to enable new and
innovative technology solutions to be added to the work already established in north
London
A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions
Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs)
are able to complete a number of tasks in cooperation with each other without
need for human intervention. In recent years, UAVs, which are widely utilized
in military missions, have begun to be deployed in civilian applications and
mostly for commercial purposes. With their growing numbers and range of
applications, UAVs are becoming more and more popular; on the other hand, they
are also the target of various threats which can exploit various
vulnerabilities of UAV systems in order to cause destructive effects. It is
therefore critical that security is ensured for UAVs and the networks that
provide communication between UAVs. In this survey, we aimed to present a
comprehensive detailed approach to security by classifying possible attacks
against UAVs and flying ad hoc networks (FANETs). We classified the security
threats into four major categories that make up the basic structure of UAVs;
hardware attacks, software attacks, sensor attacks, and communication attacks.
In addition, countermeasures against these attacks are presented in separate
groups as prevention and detection. In particular, we focus on the security of
FANETs, which face significant security challenges due to their characteristics
and are also vulnerable to insider attacks. Therefore, this survey presents a
review of the security fundamentals for FANETs, and also four different routing
attacks against FANETs are simulated with realistic parameters and then
analyzed. Finally, limitations and open issues are also discussed to direct
future wor
A Taxonomy of Data Grids for Distributed Data Sharing, Management and Processing
Data Grids have been adopted as the platform for scientific communities that
need to share, access, transport, process and manage large data collections
distributed worldwide. They combine high-end computing technologies with
high-performance networking and wide-area storage management techniques. In
this paper, we discuss the key concepts behind Data Grids and compare them with
other data sharing and distribution paradigms such as content delivery
networks, peer-to-peer networks and distributed databases. We then provide
comprehensive taxonomies that cover various aspects of architecture, data
transportation, data replication and resource allocation and scheduling.
Finally, we map the proposed taxonomy to various Data Grid systems not only to
validate the taxonomy but also to identify areas for future exploration.
Through this taxonomy, we aim to categorise existing systems to better
understand their goals and their methodology. This would help evaluate their
applicability for solving similar problems. This taxonomy also provides a "gap
analysis" of this area through which researchers can potentially identify new
issues for investigation. Finally, we hope that the proposed taxonomy and
mapping also helps to provide an easy way for new practitioners to understand
this complex area of research.Comment: 46 pages, 16 figures, Technical Repor
- …