Proceedings. Sixth IEEE Symposium on Computers and Communications最新文献

筛选
英文 中文
Trust-adapted enforcement of security policies in distributed component-structured applications 分布式组件结构化应用程序中安全策略的自信任实施
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935347
P. Herrmann, H. Krumm
{"title":"Trust-adapted enforcement of security policies in distributed component-structured applications","authors":"P. Herrmann, H. Krumm","doi":"10.1109/ISCC.2001.935347","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935347","url":null,"abstract":"Software component technology on the one hand supports the cost-effective development of specialized applications. On the other hand, however it introduces special security problems. Some major problems can be solved by the automated run-time enforcement of security policies. Each component is controlled by a wrapper which monitors the component's behavior and checks its compliance with the security behavior constraints of the component's employment contract. Since control functions and wrappers can cause substantial overhead, we introduce trust-adapted control functions where the intensity of monitoring and behavior checks depends on the level of trust, the component, its hosting environment, and its vendor have currently in the eyes of the application administration. We report on wrappers and a trust information service, outline the embedding security model and architecture, and describe a Java Bean based experimental implementation.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124380042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Formal validation of a multicast transport protocol 多播传输协议的正式验证
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935443
R. Abbou, A. Benkiran, J. Courtiat
{"title":"Formal validation of a multicast transport protocol","authors":"R. Abbou, A. Benkiran, J. Courtiat","doi":"10.1109/ISCC.2001.935443","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935443","url":null,"abstract":"The past years have seen the emergence of cooperative applications that require the exchange of high volumes of data among remote cooperating parties. With the purpose of providing a scalable communication solution for this kind of applications, multicast transport protocols have been proposed in the literature, because point to point communications lead to wasting too much bandwidth, in particular if one wants to guarantee a certain level of reliability. In this paper, we study a multicast transport protocol, scalable probabilistic reliable multicast (SPRM), and show how a formal description technique, RT-LOTOS, has been successfully applied to identify some flaws in this complex multi-parties protocol. It is shown how the same approach may also be used for performance evaluation, and we compare our results with other models based on queuing theory.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117329437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A simulation framework for mobile, location-dependent information access 一个用于移动、位置相关信息访问的仿真框架
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935422
Uwe Kubach, Mario Hegele, K. Rothermel
{"title":"A simulation framework for mobile, location-dependent information access","authors":"Uwe Kubach, Mario Hegele, K. Rothermel","doi":"10.1109/ISCC.2001.935422","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935422","url":null,"abstract":"With the increasing pervasiveness of mobile computing devices, the need to access information in mobile environments has grown rapidly. Consequently, many mechanisms, e.g. broadcast dissemination, hoarding, or specialized caching mechanisms have been developed to overcome the disadvantages of wireless communication systems, which are usually used to access the information. To evaluate such mechanisms a simulation tool is needed that simulates both the users' mobility and their information access patterns. Since most existing user models either model only the mobility or the information access, we developed a new model that covers both aspects. Based on this model, we realized a flexible framework that allows to simulate all aspects of a mobile information access.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127358218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of CDMA random access systems with heavy-tailed packet length distribution 具有重尾分组长度分配的CDMA随机接入系统性能分析
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935436
S. Özer, S. Papavassiliou, A. Akansu
{"title":"Performance analysis of CDMA random access systems with heavy-tailed packet length distribution","authors":"S. Özer, S. Papavassiliou, A. Akansu","doi":"10.1109/ISCC.2001.935436","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935436","url":null,"abstract":"This paper analyzes the performance of unslotted CDMA random access schemes with heavy-tailed packet length distribution. Most of the previous work cover the analysis of the system with Poisson process and for infinite population and infinite buffer size where the results mainly depend on the mean values of the traffic. We remove these assumptions and analyze the behavior of the system for the more general and realistic case of finite population, finite buffers and variable packet length. The emphasis is placed on the study of the effect of the heavy-tailed packet length on the system characteristics. Specifically, we show via analysis and simulation that even when the mean packet length is small the system can have bottlenecks due to the packet length characteristics, and therefore dynamic adaptation and control of the system is required.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131242562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A logic-based reasoning about PKI trust model 基于逻辑的PKI信任模型推理
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935353
H. Bakkali, Bahia Idrissi Kaitouni
{"title":"A logic-based reasoning about PKI trust model","authors":"H. Bakkali, Bahia Idrissi Kaitouni","doi":"10.1109/ISCC.2001.935353","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935353","url":null,"abstract":"Applications such those of electronic payment require the participants authentication and a privacy of crucial information. Public-key infrastructures (PKIs) are essential for providing them these security services in open networks like the Internet. We propose logic for reasoning about PKI trust models. Our formalism enables us to describe a trust model of a PKI with greater precision than the widely used graph. It also allows us to verify whether a model respond to the PKI objectives and under which conditions. These objectives generally concern statements about entitles beliefs with regard to public key authenticity and certification authorities (CAs) trustworthiness. The proposed formalism takes into account the number of intermediates that have participated in an entity belief and the constraints that can be the concern of certification practices or certificate policies of PKI's CAs. These constraints may influence the trust model suitability to applications with specific requirements.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple fault diagnostics for communicating nondeterministic finite state machines 通信不确定性有限状态机的多故障诊断
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935446
Rim Belhassine-Cherif, A. Ghedamsi
{"title":"Multiple fault diagnostics for communicating nondeterministic finite state machines","authors":"Rim Belhassine-Cherif, A. Ghedamsi","doi":"10.1109/ISCC.2001.935446","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935446","url":null,"abstract":"During the last decade, different methods were developed to produce optimized test sequences for detecting faults in, communication protocol implementations. However, the application of these methods gives only limited information about the location of detected faults. We propose a complementary step, which localizes the faults, once detected. It consists of a generalized diagnostic algorithm for the case where more than one fault may be present in the transitions of a system represented by communicating nondeterministic finite state machines, if existing faults are detected, this algorithm permits the generation of a minimal set of diagnoses, each of which is formed by a set of transitions suspected of being faulty. A simple example is used to demonstrate the functioning of the proposed diagnostic algorithm. The complexity of each step in the algorithm are calculated.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing the performance of mobile agent based network management applications 提高基于移动代理的网络管理应用程序的性能
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935411
A. Michalas, T. Kotsilieris, Stylianos Kalogeropoulos, George Kretsos, V. Loumos, M. Sidi
{"title":"Enhancing the performance of mobile agent based network management applications","authors":"A. Michalas, T. Kotsilieris, Stylianos Kalogeropoulos, George Kretsos, V. Loumos, M. Sidi","doi":"10.1109/ISCC.2001.935411","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935411","url":null,"abstract":"Mobile agent technology (MAT) seems to promising approach for achieving flexible and decentralised network management. A system independent mobile agent platform is used in order to control the roaming and downloading of the required management code, in the form of mobile agents, onto the network devices. A management task such as the configuration or monitoring of a specific QoS parameter related to a particular application may require that a mobile agent (MA) or a set of MAs should visit several network nodes. We present an approach for enhancing the performance of a mobile agent based network management system by monitoring and controlling the communication paths between the network management applications and the mobile agents. In particular we show that when a mobile agent should act on a set of nodes, the time required to perform a management task is decreased if for the sequence by which the nodes will be visited we take into account the workload on them, i.e. at any time to try to visit the less loaded ones.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134187261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Wireless resource management using genetic algorithm for mobiles equilibrium 利用遗传算法实现无线资源管理的移动均衡化
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935434
M. Moustafa, I. Habib, M. Naghshineh
{"title":"Wireless resource management using genetic algorithm for mobiles equilibrium","authors":"M. Moustafa, I. Habib, M. Naghshineh","doi":"10.1109/ISCC.2001.935434","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935434","url":null,"abstract":"We propose an algorithm for controlling mobile users transmitter power and information bit rate cooperatively in CDMA networks. The active component of this scheme is called genetic algorithm for mobiles equilibrium (GAME). Based an an evolutionary computational model, the base station tries to achieve an adequate equilibrium between its users. Thereof each mobile can send its traffic with a suitable power to support it over the different path losses and interference. In the mean time, its battery life is being preserved while limiting the interference seen by neighbors. This optimization is based on each user traffic, required signal quality, the channel characteristics and users spatial distribution. A significant enhancement in signal quality and power level has been noticed through several experiments.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Design and implementation of an adaptive burst spacer for effective-rate enforcement in ABR traffic 基于ABR流量的自适应突发间隔器的设计与实现
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935382
K. Satlas, J. Kamaras, Anthony Catsoulis, N. Mitrou
{"title":"Design and implementation of an adaptive burst spacer for effective-rate enforcement in ABR traffic","authors":"K. Satlas, J. Kamaras, Anthony Catsoulis, N. Mitrou","doi":"10.1109/ISCC.2001.935382","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935382","url":null,"abstract":"The available bit rate (ABR) service is being designed as a low-cost transport service over ATM networks, which will be using the bandwidth remaining available after servicing connections of another, high-priority class. The penalty paid is the lack of QoS guarantees in terms of transport delays figures. Thus, an adaptive shaping mechanism is necessary for the ABR connections at each multiplexing or switching stage for effective bandwidth enforcement and adjusting their traffic profiles according to the prevailing congestion conditions. An adaptive shaping mechanism related with the ABR service is analyzed and modeled on the basis of effective rates defined for the multiplexed connections. The traffic shaper is used to enforce the contracted effective rate for the ABR class and to allocate peak rates to the high priority class (burst spacer). The traffic shaper system is presented as an implementation perspective and specific ideas concerning its hardware realization are given.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encapsulation and marking of MPEG-4 video over IP differentiated services 基于IP差异化业务的MPEG-4视频封装与标记
Proceedings. Sixth IEEE Symposium on Computers and Communications Pub Date : 2001-07-03 DOI: 10.1109/ISCC.2001.935397
T. Ahmed, Guillaume Buridant, A. Mehaoua
{"title":"Encapsulation and marking of MPEG-4 video over IP differentiated services","authors":"T. Ahmed, Guillaume Buridant, A. Mehaoua","doi":"10.1109/ISCC.2001.935397","DOIUrl":"https://doi.org/10.1109/ISCC.2001.935397","url":null,"abstract":"Traditional IP networks offer users best-effort service. In this model, all user packets compete equally for network resources. Much attention is being given to developing IP QoS (quality of service), which allows network operators to offer differing levels of treatment to user packets. In this article, we investigate QoS interaction provisioning between MPEG-4 video applications and IP DiffServ networks. QoS interaction is performed through intelligent encapsulation and marking of MPEG-4 elementary streams (video, audio, signaling, scenes and object descriptors) on IP Diffserv's AF/EF per hop behavior. Our contribution to this issue is twofold: first, we analyze the different proposals for MPEG-4 encapsulation protocols over RTP/IP; and second, we propose and evaluate a video-oriented marking mechanism for IP Diffserv edge routers. A performance evaluation is carried through simulation using ns2.","PeriodicalId":147986,"journal":{"name":"Proceedings. Sixth IEEE Symposium on Computers and Communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信