26 research outputs found
Protocol Based Interaction in Component-Based Software Systems.
In Component-based development, assembling components into systems is the major activity. Therefore, Components must be integrated through well-defined infrastructure. This paper presents a framework for composing component-based systems based on message-pattern interaction among the components; it also presents protocol-based rules to govern messages exchanges
A Framework For Dynamic Updating In Component-Based Software Systems.
This paper presents DPICS framework for composing component-based software system that can be modified at runtime. It is based on message pattern interaction between system’s components, which facilitates adding, removing, or replacing a component while the whole system is running
Dependencies Management in Dynamically Updateable Component-Based System.
Component-based software systems achieve their functionalities through interaction between their components. Analyzing the dependencies between systems components is an essential task in system reconfiguration. This paper discusses dependencies analysis significance when updating component-based system dynamically. It presents a service-based matrix model and nested graph as approaches to capture components' dependencies; it discusses using
dependencies analysis for safe dynamic updating in component-based software systems
Toward Pure Componentware
Componentware seems to be a promising methodology for software development in order to cope with software
complexity. With componentware, the software development is shifted from building everything from scratch into just assembling existing components
Determining The Black-Box Component's Failure.
Many papers propose different approaches to evaluate the reliability of black-box components based on component's success. This paper determines or evaluates component's
reliability based on its failure. Since even reliable components might fail, we argue that component's acquirer should evaluate the component's reliability based on its failure and not on its success- In this paper we propose a new approach towards determining the component's failure. Both the operational profile and the appropriate test cases are needed to support our approach
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
Most of the intrusion detection sensors suffer from
the high rate offake alerts that the sensor produce
Modified honey encryption scheme for encoding natural language message
Conventional encryption schemes are susceptible to brute-force attacks. This is because bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a ciphertext and tries to decrypt the message by brute-forcing with an incorrect key can filter out some of the combinations of the decrypted message by observing that some of the sequences are a combination of characters which are distributed non-uniformly and form no plausible meaning. Honey encryption (HE) scheme was proposed to curtail this vulnerability of conventional encryption by producing ciphertexts yielding valid-looking, uniformly distributed but fake plaintexts upon decryption with incorrect keys. However, the scheme works for only passwords and PINS. Its adaptation to support encoding natural language messages (e-mails, human-generated documents) has remained an open problem. Existing proposals to extend the scheme to support encoding natural language messages reveals fragments of the plaintext in the ciphertext, hence, its susceptibility to chosen ciphertext attacks (CCA). In this paper, we modify the HE schemes to support the encoding of natural language messages using Natural Language Processing techniques. Our main contribution was creating a structure that allowed a message to be encoded entirely in binary. As a result of this strategy, most binary string produces syntactically correct messages which will be generated to deceive an attacker who attempts to decrypt a ciphertext using incorrect keys. We evaluate the security of our proposed scheme
Image Encrytion Using Block Based Transformation Algorithm
Encryption is used to securely transmit data in
open networks. Each type of data has its own features, therefore
different techniques should be used to protect confidential
image data from unauthorized access. Most of the available
encryption algorithms are mainly used for textual data and may
not be suitable for multimedia data such as images. In this
paper, we introduce a block-based transformation algorithm
based on the combination of image transformation and a well
known encryption and decryption algorithm called Blowfish.
The original image was divided into blocks, which were
rearranged into a transformed image using a transformation
algorithm presented here, and then the transformed image was
encrypted using the Blowfish algorithm. The results showed
that the correlation between image elements was significantly
decreased by using the proposed technique. The results also
show that increasing the number of blocks by using smaller
block sizes resulted in a lower correlation and higher entrop
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for the anonymization and diversification of data
The Agent Pattern Driven Business Engineering (APBDE) approach enabled business-based systems
Agent design patterns form a new methodology used to improve the development of software agents. Agent design patterns can help by capturing solutions to common problems in agent design [Lange and Oshima, 1998].Agent design patterns are applied in different systems such as knowledge management systems, real-time systems, and network management systems. Agent design patterns for
business-based systems, aim to support different ecommerce paradigms business-to-business (B2B) and
business-to-consumer (B2C).In this paper, we developed an approach for extracting agent-based design patterns for B2C e-commerce to improve business-based processes.This approach is called an Agent Pattern Driven Business Engineering (APDBE).Based on this approach, we derived two agent-based commerce design patterns namely,
the De-coupler Design Pattern (DecDP), and the Dynamic Design Pattern (DynDP). These design patterns are used to support selling/buying-based processes in e-commerce domain