1,574 research outputs found

    Prevention of information harvesting in a cloud services environment

    Full text link
    We consider a cloud data storage involving three entities, the cloud customer, the cloud business centre which provides services, and the cloud data storage centre. Data stored in the data storage centre comes from a variety of customers and some of these customers may compete with each other in the market place or may own data which comprises confidential information about their own clients. Cloud staff have access to data in the data storage centre which could be used to steal identities or to compromise cloud customers. In this paper, we provide an efficient method of data storage which prevents staff from accessing data which can be abused as described above. We also suggest a method of securing access to data which requires more than one staff member to access it at any given time. This ensures that, in case of a dispute, a staff member always has a witness to the fact that she accessed data

    Function length as a tool for malware classification

    Full text link
    The proliferation of malware is a serious threat to computer and information systems throughout the world. Antimalware companies are continually challenged to identify and counter new malware as it is released into the wild. In attempts to speed up this identification and response, many researchers have examined ways to efficiently automate classification of malware as it appears in the environment. In this paper, we present a fast, simple and scalable method of classifying Trojans based only on the lengths of their functions. Our results indicate that function length may play a significant role in classifying malware, and, combined with other features, may result in a fast, inexpensive and scalable method of malware classification.<br /

    Fast recovery from node compromise in wireless sensor networks

    Full text link
    Wireless Sensor Networks (WSNs) are susceptible to a wide range of security attacks in hostile environments due to the limited processing and energy capabilities of sensor nodes. Consequently, the use of WSNs in mission critical applications requires reliable detection and fast recovery from these attacks. While much research has been devoted to detecting security attacks, very little attention has been paid yet to the recovery task. In this paper, we present a novel mechanism that is based on dynamic network reclustering and node reprogramming for recovering from node compromise. In response to node compromise, the proposed recovery approach reclusters the network excluding compromised nodes; thus allowing normal network operation while initiating node recovery procedures. We propose a novel reclustering algorithm that uses 2-hop neighbourhood information for this purpose. For node reprogramming we propose the modified Deluge protocol. The proposed node recovery mechanism is both decentralized and scalable. Moreover, we demonstrate through its implementation on a TelosB-based sensor network testbed that the proposed recovery method performs well in a low-resource WSN.<br /

    Engaging suppliers in electronic trading across industry sectors

    Full text link

    Unusual magnetic-field dependence of partially frustrated triangular ordering in manganese tricyanomethanide

    Full text link
    Manganese tricyanomethanide, Mn[C(CN)3]2, consists of two interpenetrating three-dimensional rutile-like networks. In each network, the tridentate C(CN)3- anion gives rise to superexchange interactions between the Mn2+ ions (S=5/2) that can be mapped onto the "row model" for partially frustrated triangular magnets. We present heat capacity measurements that reveal a phase transition at T_N = 1.18K, indicative of magnetic ordering. The zero-field magnetically ordered structure was solved from neutron powder diffraction data taken between 0.04 and 1.2 K. It consists of an incommensurate spiral with a temperature independent propagation vector Q=(2Q 0 0)=(+/-0.622 0 0), where different signs relate to the two different networks. This corresponds to (+/-0.311 +/-0.311 0) in a quasi-hexagonal representation. The ordered moment mu=3.3mu_B is about 2/3 of the full Mn2+ moment. From the values of T_N and Q, the exchange parameters J/k = 0.15 K and J'/J = 0.749 are estimated. The magnetic-field dependence of the intensity of the Bragg reflection, measured for external fields H||Q, indicates the presence of three different magnetic phases. We associate them with the incommensurate spiral (H < 13.5 kOe), an intermediate phase (13.5 kOe 16 kOe) proposed for related compounds. For increasing fields, Q continuously approaches the value 1/3, corresponding to the commensurate magnetic structure of the fully frustrated triangular lattice. This value is reached at H_c = 19 kOe. At this point, the field-dependence reverses and Q adopts a value of 0.327 at 26 kOe, the highest field applied in the experiment. Except for H_c, the magnetic ordering is incommensurate in all three magnetic phases of Mn[C(CN)3]2.Comment: accepted for publication in J. Phys.: Condens. Matte
    corecore