A. Gkoulalas-Divanis, Alessandro Pellegrini, P. D. Sanzo
{"title":"Message from the program chairs","authors":"A. Gkoulalas-Divanis, Alessandro Pellegrini, P. D. Sanzo","doi":"10.1109/NCA.2016.7778578","DOIUrl":"https://doi.org/10.1109/NCA.2016.7778578","url":null,"abstract":"164 papers were submitted to DSD 2014, from 50 countries. Slightly less than 50% were selected for oral presentation: 41 in the main track, and 40 in the conference Special Sessions. In addition, 22 papers were selected for poster presentation and 4 were invited to the Special Session dedicated to ongoing activity in European R&D projects in the DSD area. All selected papers were subject to a rigorous review process that averaged three reviews per paper, and were ranked and thresholded according to their scores, weighted by the reviewers confidence.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117330143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote: Evolving Systems for Situational Awareness","authors":"W. Strayer","doi":"10.1109/NCA.2016.7778582","DOIUrl":"https://doi.org/10.1109/NCA.2016.7778582","url":null,"abstract":"The most basic functions of any organism or organized unit requires understanding the environment. This is accomplished through sensing; for organisms, sensing is an evolved faculty. The same is true for military and first responder units such as squads, who are relying on more sophisticated sensing systems to gain greater situational awareness (SA) in order to more effectively and safely conduct their missions. Adding sensing to the squad, however, only solves part of the problem; there must be an appropriate communications system in place to make full use of the acquired SA information. This talk will explore the use of content-based networking solutions for efficiently distributing the SA information in a decentralized manner.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126968936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the steering committee and general chairs","authors":"D. Avresky, M. Vouk","doi":"10.1109/NCA.2016.7778577","DOIUrl":"https://doi.org/10.1109/NCA.2016.7778577","url":null,"abstract":"All research topics of IEEE NCA*, for more than one decade, have been contributing to the creation of the foundation of the Network/Cloud Computing research and application do domain. Now, Network/Cloud Computing is becoming the major mode of operation of the Information Technology Industry over the Internet. BIG Data, Software Defined Networks (SDN), Network Functions Virtualization (NFI), Internet of Things (IoT) have profound effect on the innovations and modern society. The challenge for Network Cloud Computing is to realize a true Internet of Things, a network capable of supporting potentially trillions of wireless connected devices and with overall bandwidth one thousand times higher that today's wireless networks. Current IT technologies are approaching their limits.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129669406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dishelt Francisco Torres Paz, Jorge Antonio Perez Espinoza, José Juan García-Hernández
{"title":"A Low-Complexity Fault-Tolerant Document Storage System","authors":"Dishelt Francisco Torres Paz, Jorge Antonio Perez Espinoza, José Juan García-Hernández","doi":"10.1109/NCA.2014.17","DOIUrl":"https://doi.org/10.1109/NCA.2014.17","url":null,"abstract":"Fault-tolerant systems are those that continue to work properly even when faults occur. Distributed systems for files storing are susceptibles to faults, these failures can lead to loss of files completely, for this reason, these systems require strategies for recovery from failures. In this paper, a low-complexity distributed system for storing files in the cloud with fault tolerance is proposed. Files are stored in blocks, dispersed in a set of 7 servers and the reconstruction process is carried out using any combination of 6 as the proposed model generates redundancy blocks using parity mechanisms. From the experimental results, the reliability, security, speed for dispersion, and reconstruction of the proposed system are shown.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"127 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yongmao Ren, Hualin Qian, E. Yuepeng, Jun Li, Jingguo Ge
{"title":"IPv4+6","authors":"Yongmao Ren, Hualin Qian, E. Yuepeng, Jun Li, Jingguo Ge","doi":"10.1109/NCA.2011.53","DOIUrl":"https://doi.org/10.1109/NCA.2011.53","url":null,"abstract":"The routing scalability and IP address exhaustion are two significant issues the current Internet faces. The \"locator/identifier (Loc/ID) split\" has become a well recognized design principle for future Internet architectures that make Internet routing more scalable. In this paper, a novel Loc/ID split routing and addressing architecture called IPv4+6 is proposed. It not only solves the routing scalability problem but also expands the IP address space. It is easy to deploy, which only needs to make simple changes on DNS and gateway router.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133631240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The +CAL Algorithm Language","authors":"L. Lamport","doi":"10.1109/NCA.2006.52","DOIUrl":"https://doi.org/10.1109/NCA.2006.52","url":null,"abstract":"Algorithms are different from programs and should not be described with programming languages. For example, algorithms are usually best described in terms of mathematical objects like sets and graphs instead of the primitive objects like bytes and integers provided by programming languages. Until now, the only simple alternative to programming languages has been pseudo-code. \u0000 \u0000+CAL is an algorithm language based on TLA+. A +CAL algorithm is automatically translated to a TLA+ specification that can be checked with the TLC model checker or reasoned about formally. +CAL makes pseudo-code obsolete.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132523911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application-Aware Reliability and Security: The Trusted ILLIAC Approach","authors":"R. Iyer","doi":"10.1109/NCA.2006.15","DOIUrl":"https://doi.org/10.1109/NCA.2006.15","url":null,"abstract":"Security and reliability are the key attributes in building highly trusted systems. System security violations (e.g., unauthorized privileged access or the compromising of data integrity) and reliability failures can be caused by hardware problems (transient or intermittent), software bugs, resource exhaustion, environmental conditions, or any complex interaction among these factors. To build a truly trustworthy system, the designer must find ways to mitigate (avoid and tolerate) against accidental errors and malicious attacks. Trusted ILLIAC ^1 is a reliable and secure clustercomputing platform being built at the University of Illinois Coordinated Science Laboratory (CSL) and Information Trust Institute (ITI), involving faculty from Electrical and Computer Engineering and Computer Science Departments. Trusted ILLIAC is intended to be a large, demonstrably trustworthy cluster-computing system to support what is variously referred to as on-demand/utility computing or adaptive enterprise computing. Such systems require that a significant number of applications co-exist and share hardware/software resources using a variety of containment boundaries. Current solutions aim at providing hardware and software solutions that can only be described as a one-size-fits-all approaches. Todays environments are complex, expensive to implement, and nearly impossible to validate. The challenge is to provide an application-specific level of reliability and security in a totally transparent manner, while delivering optimal performance. A promising approach lies in developing a new set of application-aware methods that provide customized levels of trust (specified by the application) enforced using an integrated approach involving reprogrammable hardware, enhanced compiler methods to extract security and reliability properties, and the support of configurable operating system and middleware. Our approach is to demonstrate such a set of integrated techniques that span entire system hierarchy: processor hardware, operating system, middleware, and application.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114333765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges in Managing Complexity: Autonomic Computing","authors":"A. Ganek","doi":"10.1109/NCA.2006.17","DOIUrl":"https://doi.org/10.1109/NCA.2006.17","url":null,"abstract":"Summary form only given. This paper explores the issues faced by enterprises in managing the complexity of information technology as well as progress in emerging autonomic technologies to address them. The paper considers the balance between technology automation and IT processes and human interactions with the management of technology. Recent trends in system management architecture, tools, and standards would be described and promising areas of research highlighted","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experience with some Principles for Building an Internet-Scale Reliable System","authors":"Mike Afergan","doi":"10.1109/NCA.2006.24","DOIUrl":"https://doi.org/10.1109/NCA.2006.24","url":null,"abstract":"Summary form only given. We discuss the design methodology used to achieve commercial-quality reliability in the Akamai content delivery network. The network consists of 15,000+ servers in 1,100+ networks and spans 65+ countries. Despite the scale of the Akamai CDN and the unpredictable nature of the underlying Internet, we seek to build a system of extremely high reliability. We present some simple principles we use to assure high reliability, and illustrate their application. As there is some similarity-in-spirit between our implementation and recent trends in the research literature, we hope that sharing our experiences would be of value to a broad community","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123941286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services","authors":"G. Torrellas","doi":"10.1109/NCA.2004.1347810","DOIUrl":"https://doi.org/10.1109/NCA.2004.1347810","url":null,"abstract":"One of the main objectives of a truly user-friendly information security architecture is to focus on advanced security assessment procedures technologies enabling cost-effective interchange across e-commerce security services and more natural interfaces to security services. The recently launched Information Security project at Mexican Oil Institute is rightly in that direction and the work addresses basically, security assessment technologies and its use in the key sector of e-business and electronic commerce. In particular, we are developing SAMARA (secure architecture multi-agent systems risk assessment) platform in order to adding a flexible quality of services security requirements (QoSSR) to all stages of the information security cycle, including security assessment management systems (SAMS) content generation and maintenance, automated translation and interpretation and enhancing the natural interactivity and usability of the security services with unconstrained security policy input. On the knowledge engineering side, the SAMARA ontologies provide a consensual representation of the secure electronic commerce field in three typical domains (CRM - customer relationship management, e-mail transactions, e-business transactions) allowing the exchanges independently of the security policy of the end user, the security services, or the content provider. This work concentrates on architectural issues, while the used security assessment procedures processing approaches has been developed in other author's papers.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123355649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}