{"title":"Using Stochastic Game Theory to Compute the Expected Behavior of Attackers","authors":"K. Sallhammar, S. J. Knapskog, B. Helvik","doi":"10.1109/SAINTW.2005.116","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.116","url":null,"abstract":"This paper presents ongoing work on using stochastic game theory as a mathematical tool for computing the expected behavior of attackers. The possible use of the Nash Equilibrium as a part of the transition probabilities in state transition models is defined and motivated. To demonstrate the approach, a simple example of an attack against a computer network is modelled and analyzed.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121895324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Matrix Pattern Compliant Strong Stochastic Bound","authors":"A. Bušić, J. Fourneau","doi":"10.1109/SAINTW.2005.44","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.44","url":null,"abstract":"Stochastic bounds are a promising method to analyze QoS requirements. Indeed it is sufficient to prove that a bound of the real performance satisfies the guarantee. However, the time and space complexity issues are not well understood so far. We propose a new algorithm to derive a strong stochastic bound of a Markov chain, using a matrix pattern specifing the structural properties a bounding matrix should comply with. Thus we can obtain a simpler Markov chain bounding for which the numerical computation of the steady-state solution is easier.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"26 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114131363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context Awareness in Future Life Scenarios: Impact on Service Provisioning Platforms","authors":"S. Gessler, Miquel Martin, S. Weiss","doi":"10.1109/SAINTW.2005.45","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.45","url":null,"abstract":"Looking at future life scenarios we discover that personal communication devices are expected to play a central role in the organization of the user’s life, enabling him to access any information he needs at any time, and taking what action which is useful in his specific situation. This will be done by taking individual preferences and context information into account. Still, these scenarios most often do not outline the impact on the technology platform behind. In this paper we picked up the example of service portals as a simple, well introduced aspect of service provisioning and describe how the enrichment through context awareness will bring us one step closer to those future life scenarios.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Influence of Traffic Self-Similarity on QoS Mechanisms","authors":"J. Domańska, A. Domanski, T. Czachórski","doi":"10.1109/SAINTW.2005.113","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.113","url":null,"abstract":"We investigate the influence of stochastic features (self-similarity, long range autocorrelation) of the input traffic on the performance of some QoS mechanisms. We model the impact of input traffic characteristics on queue distributions and packet loss probability observed at leaky bucket mechanism, at fixed priority scheduling of packets and on the RED queue. The results confirm a strong influence of self-similarity on the behaviour of these mechanisms.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129569293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application on Interactive Media to Support the Activity in Cultural Community","authors":"T. Hamada, J. Ueda, N. Okude","doi":"10.1109/SAINTW.2005.35","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.35","url":null,"abstract":"We learn many things in our daily life through experiences by using our bodies. To earn practical knowledge, it is important to actually practice the activity and to interact with people of same interests. In this paper, by introducing our product, we will show the availability of an interacting media focused on the user's activity to support him expand his practical experience.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Approach for Auction Based Markets","authors":"J. Mäkiö, Ilka Weber","doi":"10.1109/SAINTW.2005.82","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.82","url":null,"abstract":"Designing and conceptualizing electronic auction systems is a complex task dependent on human, economic, and technical factors. In this paper, we propose a way to simplify that design task and reduce complexity. Using the two software engineering approaches \"abstraction\" and \"divide and conquer\" we show how these approaches can be mapped into auction design. The \"abstraction\" approach leads to a process template that can be parameterized; the \"divide and conquer\" approach leads to a component based definition of electronic auctions. Both approaches are unified within a \"market modeling language (MML)\" which provides the design of auction based electronic markets.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115597200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. J. G. Clemente, Gabriel López Millán, Jesús D. Jiménez Re, G. Pérez, A. Gómez-Skarmeta
{"title":"Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks","authors":"F. J. G. Clemente, Gabriel López Millán, Jesús D. Jiménez Re, G. Pérez, A. Gómez-Skarmeta","doi":"10.1109/SAINTW.2005.50","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.50","url":null,"abstract":"Security is considered as a key service in IP networks. This is equally true for IPv4- and IPv6-based networks, and for them the IPsec protocol was defined to provide security at the network layer. IPsec can be used in different scenarios, being the VPN the most widely used. However, IPsec-based VPNs are experiencing important limitations mainly because they are usually based on information manually configured, and the integration with PKI-related services is still under definition and is far from being mature. This is especially true in IPv6 networks where IPsec is defined as a mandatory component to be implemented in all stacks and PKI services in these networks are just starting to be designed and deployed. This paper describes how IPsec-based VPNs can be dynamically deployed in an IPv6 network as the one designed in the Euro6IX EU IST project. Such dynamicity is provided using a new management paradigm based on security policies.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. D. Flora, Oriana Riva, S. Russo, K. Raatikainen
{"title":"A Pattern-Oriented Approach to Enhance Context Infrastructures","authors":"C. D. Flora, Oriana Riva, S. Russo, K. Raatikainen","doi":"10.1109/SAINTW.2005.16","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.16","url":null,"abstract":"A plethora of context infrastructures have been developed to support the deployment of context-aware systems. Unfortunately, it is not easy to re-use the design principles adopted in a certain context infrastructure in order to leverage some characteristics of another one, as such principles are often hidden into the infrastructure and not independently explicated. The aim of this work is to propose a methodology to develop a pattern language for context-infrastructures and promote the re-usability of proved techniques to support context-awareness. We describe the proposed methodology with respect to a specific requirement, that is to ensure the interoperability among context-sensitive entities. We specifically define a design pattern to reach this goal, namely the Context Matcher pattern, and we show how to apply such pattern to an existing infrastructure in order to leverage its interoperability.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Easing the Transition to IPv6","authors":"M. Díaz, J. Palet","doi":"10.1109/SAINTW.2005.61","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.61","url":null,"abstract":"This paper presents the \"auto-transition\" concept which tries to ensure that any network device can obtain IPv6 connectivity at any time and whatever network is attached to, even if such network is connected to Internet only with IPv4. The algorithm looks for the best possible transition mechanism according to performance criteria as well as the scenario where the device is located. By implementing such auto-transition algorithm in either or both end-nodes or middle-boxes (CPEs) users could always obtain IPv6 connectivity with no human intervention. The document do not actually provides a complete solution, just an evaluation of the problem and the requirements towards a future documented solution.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architectures of Future Services and Applications for the Mobile User","authors":"B. Mrohs, S. Steglich","doi":"10.1109/SAINTW.2005.36","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.36","url":null,"abstract":"Although advanced mobile infrastructures exist for many years in developed countries, developers of mobile services for 3G and beyond systems can still not rely on an architecture that provides a common set of functionalities to make full use of the mobile environment. This paper presents essential building blocks of architectures for future services and applications for the mobile user. These building blocks are a starting point towards the definition of an environment supporting personalization, context awareness, user interface adaptation and miscellaneous functionalities that support the service developer in realizing ubiquitous mobile services.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}