34 research outputs found

    Controlling Data in the Cloud: Outsourcing Computation without utsourcing Control.

    Get PDF
    ABSTRACT Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. In particular, we argue that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today

    Controlling Data in the Cloud: Outsourcing Computation without utsourcing Control.

    Get PDF
    ABSTRACT Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. In particular, we argue that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today

    Advancing human capabilities for water security: A relational approach

    Get PDF
    We argue that a relational water security framework informed by the capabilities approach offers new ways to consider politics and cultures of water. Each dimension allows us to better contextualize water security beyond just an object (H2O) to be secured for a certain population. Instead, the relational perspective demands a fuller consideration of the political structures and processes through which water is secured, with emphasis on the social relations of access as opposed to simply the politics around water supply. We also attend to cultural dimensions, such as the meanings of water and customary practices that are not easily captured by standardized metrics. By including these dimensions, we necessarily broaden analytical space to evaluate water security as a relational and dynamic process tied to lived experience rather than as solely parameterized conditions in relation to access, quality, or availability of water. We first move to explain our broader conceptualization of water security as linked to human capabilities, then explore in more detail the specific engagements with politics and culture in the sections that follow

    Efficient tracing of failed nodes in sensor networks

    No full text
    This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Copyright c○2002 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prio

    Graph-Based Authentication of Digital Streams

    No full text
    We consider the authentication of digital streams over a lossy network. The overall approach taken is graph-based, as this yields simple methods for controlling overhead, delay, and the ability to authenticate, while serving to unify many previously known hash- and MAC-based techniques. The loss pattern of the network is defined probabilistically, allowing both bursty and random packet loss to be modeled. Our authentication schemes are customizable by the sender of the stream; that is, within reasonable constraints on the input parameters, we provide schemes that achieve the desired authentication probability while meeting the input upper bound on the overhead per packet. In addition, we demonstrate that some of the shortcomings of previously known schemes correspond to easily identifiable properties of a graph, and hence, may be more easily avoided by taking a graph-based approach to designing authentication schemes
    corecore