2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)最新文献

筛选
英文 中文
Using Stochastic Game Theory to Compute the Expected Behavior of Attackers 利用随机博弈论计算攻击者的预期行为
K. Sallhammar, S. J. Knapskog, B. Helvik
{"title":"Using Stochastic Game Theory to Compute the Expected Behavior of Attackers","authors":"K. Sallhammar, S. J. Knapskog, B. Helvik","doi":"10.1109/SAINTW.2005.116","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.116","url":null,"abstract":"This paper presents ongoing work on using stochastic game theory as a mathematical tool for computing the expected behavior of attackers. The possible use of the Nash Equilibrium as a part of the transition probabilities in state transition models is defined and motivated. To demonstrate the approach, a simple example of an attack against a computer network is modelled and analyzed.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121895324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
A Matrix Pattern Compliant Strong Stochastic Bound 矩阵模式兼容强随机界
A. Bušić, J. Fourneau
{"title":"A Matrix Pattern Compliant Strong Stochastic Bound","authors":"A. Bušić, J. Fourneau","doi":"10.1109/SAINTW.2005.44","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.44","url":null,"abstract":"Stochastic bounds are a promising method to analyze QoS requirements. Indeed it is sufficient to prove that a bound of the real performance satisfies the guarantee. However, the time and space complexity issues are not well understood so far. We propose a new algorithm to derive a strong stochastic bound of a Markov chain, using a matrix pattern specifing the structural properties a bounding matrix should comply with. Thus we can obtain a simpler Markov chain bounding for which the numerical computation of the steady-state solution is easier.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"26 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114131363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Context Awareness in Future Life Scenarios: Impact on Service Provisioning Platforms 未来生活场景中的情境感知:对业务发放平台的影响
S. Gessler, Miquel Martin, S. Weiss
{"title":"Context Awareness in Future Life Scenarios: Impact on Service Provisioning Platforms","authors":"S. Gessler, Miquel Martin, S. Weiss","doi":"10.1109/SAINTW.2005.45","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.45","url":null,"abstract":"Looking at future life scenarios we discover that personal communication devices are expected to play a central role in the organization of the user’s life, enabling him to access any information he needs at any time, and taking what action which is useful in his specific situation. This will be done by taking individual preferences and context information into account. Still, these scenarios most often do not outline the impact on the technology platform behind. In this paper we picked up the example of service portals as a simple, well introduced aspect of service provisioning and describe how the enrichment through context awareness will bring us one step closer to those future life scenarios.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Influence of Traffic Self-Similarity on QoS Mechanisms 流量自相似度对QoS机制的影响
J. Domańska, A. Domanski, T. Czachórski
{"title":"The Influence of Traffic Self-Similarity on QoS Mechanisms","authors":"J. Domańska, A. Domanski, T. Czachórski","doi":"10.1109/SAINTW.2005.113","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.113","url":null,"abstract":"We investigate the influence of stochastic features (self-similarity, long range autocorrelation) of the input traffic on the performance of some QoS mechanisms. We model the impact of input traffic characteristics on queue distributions and packet loss probability observed at leaky bucket mechanism, at fixed priority scheduling of packets and on the RED queue. The results confirm a strong influence of self-similarity on the behaviour of these mechanisms.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129569293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Application on Interactive Media to Support the Activity in Cultural Community 运用互动媒体支持文化社区活动
T. Hamada, J. Ueda, N. Okude
{"title":"Application on Interactive Media to Support the Activity in Cultural Community","authors":"T. Hamada, J. Ueda, N. Okude","doi":"10.1109/SAINTW.2005.35","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.35","url":null,"abstract":"We learn many things in our daily life through experiences by using our bodies. To earn practical knowledge, it is important to actually practice the activity and to interact with people of same interests. In this paper, by introducing our product, we will show the availability of an interacting media focused on the user's activity to support him expand his practical experience.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Approach for Auction Based Markets 基于拍卖的市场建模方法
J. Mäkiö, Ilka Weber
{"title":"Modeling Approach for Auction Based Markets","authors":"J. Mäkiö, Ilka Weber","doi":"10.1109/SAINTW.2005.82","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.82","url":null,"abstract":"Designing and conceptualizing electronic auction systems is a complex task dependent on human, economic, and technical factors. In this paper, we propose a way to simplify that design task and reduce complexity. Using the two software engineering approaches \"abstraction\" and \"divide and conquer\" we show how these approaches can be mapped into auction design. The \"abstraction\" approach leads to a process template that can be parameterized; the \"divide and conquer\" approach leads to a component based definition of electronic auctions. Both approaches are unified within a \"market modeling language (MML)\" which provides the design of auction based electronic markets.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115597200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks IPv6网络中基于ipsec的vpn动态发放策略管理系统的部署
F. J. G. Clemente, Gabriel López Millán, Jesús D. Jiménez Re, G. Pérez, A. Gómez-Skarmeta
{"title":"Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks","authors":"F. J. G. Clemente, Gabriel López Millán, Jesús D. Jiménez Re, G. Pérez, A. Gómez-Skarmeta","doi":"10.1109/SAINTW.2005.50","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.50","url":null,"abstract":"Security is considered as a key service in IP networks. This is equally true for IPv4- and IPv6-based networks, and for them the IPsec protocol was defined to provide security at the network layer. IPsec can be used in different scenarios, being the VPN the most widely used. However, IPsec-based VPNs are experiencing important limitations mainly because they are usually based on information manually configured, and the integration with PKI-related services is still under definition and is far from being mature. This is especially true in IPv6 networks where IPsec is defined as a mandatory component to be implemented in all stacks and PKI services in these networks are just starting to be designed and deployed. This paper describes how IPsec-based VPNs can be dynamically deployed in an IPv6 network as the one designed in the Euro6IX EU IST project. Such dynamicity is provided using a new management paradigm based on security policies.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Pattern-Oriented Approach to Enhance Context Infrastructures 面向模式的增强上下文基础结构的方法
C. D. Flora, Oriana Riva, S. Russo, K. Raatikainen
{"title":"A Pattern-Oriented Approach to Enhance Context Infrastructures","authors":"C. D. Flora, Oriana Riva, S. Russo, K. Raatikainen","doi":"10.1109/SAINTW.2005.16","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.16","url":null,"abstract":"A plethora of context infrastructures have been developed to support the deployment of context-aware systems. Unfortunately, it is not easy to re-use the design principles adopted in a certain context infrastructure in order to leverage some characteristics of another one, as such principles are often hidden into the infrastructure and not independently explicated. The aim of this work is to propose a methodology to develop a pattern language for context-infrastructures and promote the re-usability of proved techniques to support context-awareness. We describe the proposed methodology with respect to a specific requirement, that is to ensure the interoperability among context-sensitive entities. We specifically define a design pattern to reach this goal, namely the Context Matcher pattern, and we show how to apply such pattern to an existing infrastructure in order to leverage its interoperability.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Easing the Transition to IPv6 简化向IPv6的过渡
M. Díaz, J. Palet
{"title":"Easing the Transition to IPv6","authors":"M. Díaz, J. Palet","doi":"10.1109/SAINTW.2005.61","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.61","url":null,"abstract":"This paper presents the \"auto-transition\" concept which tries to ensure that any network device can obtain IPv6 connectivity at any time and whatever network is attached to, even if such network is connected to Internet only with IPv4. The algorithm looks for the best possible transition mechanism according to performance criteria as well as the scenario where the device is located. By implementing such auto-transition algorithm in either or both end-nodes or middle-boxes (CPEs) users could always obtain IPv6 connectivity with no human intervention. The document do not actually provides a complete solution, just an evaluation of the problem and the requirements towards a future documented solution.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Architectures of Future Services and Applications for the Mobile User 面向移动用户的未来服务和应用架构
B. Mrohs, S. Steglich
{"title":"Architectures of Future Services and Applications for the Mobile User","authors":"B. Mrohs, S. Steglich","doi":"10.1109/SAINTW.2005.36","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.36","url":null,"abstract":"Although advanced mobile infrastructures exist for many years in developed countries, developers of mobile services for 3G and beyond systems can still not rely on an architecture that provides a common set of functionalities to make full use of the mobile environment. This paper presents essential building blocks of architectures for future services and applications for the mobile user. These building blocks are a starting point towards the definition of an environment supporting personalization, context awareness, user interface adaptation and miscellaneous functionalities that support the service developer in realizing ubiquitous mobile services.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信