{"title":"Generate secure mobile agent by using SMS to protect Hosts","authors":"T. M. Ahmed","doi":"10.1109/AICCSA.2010.5586947","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586947","url":null,"abstract":"No doubt, the usages of mobile agent and mobile phone technologies are rapidly increased. The mobile agent has a promising room in the industry area. Unfortunately, this technology faces some security problems from mobile agents and hosts sides. This paper proposes a new model to protect Hosts (Service Providers) from malicious mobile agents. The main idea behind the model is to generate a secure mobile agent by using Short Message Service (SMS). The model guarantees that generated mobile agents are secured because the generation is completely isolated from mobile agents owners and no way to add any kind of malicious code in the mobile agents. The model defines a new format as language to be used in writing SMS called Mobile Agent Description Language. In addition, the link of the mobile agent system with mobile phone will spread the culture of using mobile computation.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127313852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A component and aspect-based platform for simulating Real-Time Databases","authors":"L. Baccouche, S. Limam","doi":"10.1109/AICCSA.2010.5586941","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586941","url":null,"abstract":"Applications like stock markets, embedded systems and telecommunications are becoming more demanding real-time database management systems. Research in the area of real-time databases leads to the development of sophisticated control algorithms and for testing these in different configurations we need a simulator framework that allows us to see how they behave for different transaction workloads. As a means for evaluating real-time database algorithms, we have developed RTDS, Real-Time Database Simulator, a Java simulator which is based on components and aspects. RTDS is fully configurable and has the ability of simulating a real-time database with differentiated services and distinct configurations.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117160593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for real time communication in sensor networks","authors":"M. Aalsalem, J. Taheri, Albert Y. Zomaya","doi":"10.1109/AICCSA.2010.5587046","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587046","url":null,"abstract":"The introduction of real time communication has created additional challenges in the wireless networks area with different communication constraints. Sensor nodes spend most of their lifetime functioning as a small router to deliver packets from one node to another until the packet reaches the sink. Since sensor networks represent a new generation of time-critical applications, it is often necessary for communication to meet real time constraints as well as other constrains. Nevertheless, research dealing with providing QoS guarantees for real time traffic in sensor networks is still in its infancy. This paper presents a novel packet delivery mechanism, namely Multiple Level Stateless Protocol (MLSP), as a real time protocol for sensor networks to guarantee the quality of traffic in wireless Sensor Networks. MLSP improves the packet loss rate and handles holes in sensor networks. This paper also introduces the k-limited polling model. This model is used in a sensor network by the implementation of two queues served according to a 2-limited polling model in a sensor node. Here, two different classes of traffic are considered and the exact packet delay for each corresponding class is calculated. The analytical results are validated through an extensive simulation study.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128268375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A design approach for numerical libraries in large scale distributed systems","authors":"N. Emad, O. Delannoy, Makarem Dandouna","doi":"10.1109/AICCSA.2010.5586951","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586951","url":null,"abstract":"Nowadays, large scale distributed systems gather thousands of nodes with hierarchical memory models. They are heterogeneous, volatile and geographically distributed. The efficient exploitation of such systems requires the conception and adaptation of appropriate numerical methods, the definition of new programming paradigms, new metrics for performance prediction, etc. The modern hybrid numerical methods are well adapted to this kind of systems. This is particularly because of their multi-level parallelism and fault tolerance property. However the programming of these methods for these architectures requires concurrent reuse of sequential and parallel code. But the currently existing numerical libraries aren't able to exploit the multi-level parallelism offered by theses methods. A few linear algebra numerical libraries make use of object oriented approach allowing modularity and extensibility. Nevertheless, those which offer modularity,sequential and parallel code reuse are almost non-existent. In this paper, we analyze the lacks in existing libraries and propose a design based on a component approach and the strict separation between computation operations, data management and communication control of an application. We present then an application of this design using YML scientific workflow environment (http://yml.prism.uvsq.fr/) jointly with the object oriented LAKe (Linear Algebra Kernel) library. Some numerical experiments on GRID5000 platform validate our approach and show its efficiency.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131117720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cluster based secure architecture for vehicular ad hoc networks","authors":"Tahani Gazdar, A. Belghith, A. Benslimane","doi":"10.1109/AICCSA.2010.5586996","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586996","url":null,"abstract":"In this paper, we propose a dynamic PKI for vehicular ad hoc networks aiming to distribute the role of the central certification authority (CA) among a set of dynamic chosen CAs. The election of dynamic CAs is based on a clustering algorithm where the cluster heads (CH) perform the role of CAs. The clustering process is based on both security and mobility. Furthermore, we define a new approach called the dynamic demilitarized zone (DDMZ) formed by confident nodes located at 1-hop from the CH of the same cluster and intended to perform the registration authorities (RA). Extensive simulations are conducted to evaluate the performance of our clustering algorithm and to investigate the impact of transmission range, speed of vehicles and inter vehicles distances on the stability of the security infrastructure.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"404 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131473998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control for continuous-time Markovian Jumps Linear Systems associated with a finite number of jump times","authors":"C. Nespoli","doi":"10.1109/AICCSA.2010.5586975","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586975","url":null,"abstract":"The continuous-time Markov Jump Linear Systems (MJLS) are defined as a family of linear systems with randomly jumping parameters governed by a continuous-time Markov jump process and usually used to described systems subject to failures or changes in structure. The MJLS have been studied extensively since the work of Krasovskii and Lidskii [1]. Regarding stability conditions, optimal control problems and applications, see for instance [2], [4], [5], [6] and the references therein. In particular, a significant effort has been devoted to the Jump Linear Quadratic (JLQ) optimal control problem. Under the assumption that the process state is available to the controller, the solution of JLQ control problem was developed in [2] and [3], [4], [5] for finite and infinite horizon cases, respectively.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125262130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic barriers implementation in Bayesian-based bow tie diagrams for risk analysis","authors":"Ahmed Badreddine, N. B. Amor","doi":"10.1109/AICCSA.2010.5587003","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587003","url":null,"abstract":"Bow tie diagrams have become popular methods in risk analysis and safety management. This tool describes graphically, in the same scheme, the whole scenario of an identified risk and its respective preventive and protective barriers. The major problem with bow tie diagrams is that they remain limited by their technical level and by their restriction to a graphical representation of different scenario without any consideration to the dynamic aspect of real systems. Recently we have proposed a new Bayesian approach to construct bow tie diagrams for risk analysis [1]. This approach learns the bow tie structure from real data and improves them by adding a new numerical component allowing us to model in a more realistic manner the system behavior. In this paper we propose to extend this approach by adding the barriers implementation in order to construct the whole bow ties. To this end we will use the numerical component, previously defined in the learning phase, and the analytic hierarchical process (AHP).","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125611921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The open Capacitated Arc Routing Problem: Complexity and algorithms","authors":"Paulo Morelato França, F. Usberti, A.L.M. França","doi":"10.1109/AICCSA.2010.5586978","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586978","url":null,"abstract":"The Capacitated Arc Routing Problem (CARP) [1] is a well-known combinatorial optimization problem in which, given an undirected graph G(V ;E) with non-negative costs and demands associated to the edges, we have M identical vehicles with capacity D that must traverse all edges with positive demand. The vehicles must start and finish their tours at a depot node, without transgressing their capacity. The objective is to search for a solution of minimum cost. The CARP was shown to be NP-hard [1], which means that an exact polynomial algorithm for this problem is most unlikely. Nevertheless, there are several heuristics that tackle this problem and which perform very well in most cases. Some of these are path-scanning [2], [3], augment-merge [1], augment-insert [4], among other heuristics [5], [6]. Even better solutions were obtained through meta-heuristics such as the tabu search [7], as well as a genetic algorithm [8], a hybrid tabu-scatter search algorithm [9], and a guided local search [10]. There is also an exact algorithm for the CARP based upon a branch-and-bound strategy [11] which, however, can solve only small size instances (up to 20 required edges). Furthermore, there are algorithms that can determine upper and lower bounds for the CARP [12].","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient sender authentication and signing of multicast streams over lossy channels","authors":"Hamdi Eltaief, H. Youssef","doi":"10.1109/AICCSA.2010.5586962","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586962","url":null,"abstract":"Multicast communication is becoming the basis for a growing number of applications. Therefore, securing multicast communication is a strategic requirement for effective deployment of large scale business multi-party applications. One of the main issues in securing multicast communication is the source authentication service. We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. In this paper we present an efficient multicast source authentication mechanism based on a multi-layer connected chain structure. Our mechanism tolerates packet loss and guarantees non-repudiation of multicast origin. Simulation results show significant improvements over mechanisms in the same category.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-agent based decision mechanism for incident reaction in telecommunication network","authors":"C. Bonhomme, C. Feltus, D. Khadraoui","doi":"10.1109/AICCSA.2010.5587036","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587036","url":null,"abstract":"The paper provides a global architectural and decision support solution for a reaction after alert detection mechanisms in the frame of information systems security applied to telecom infrastructures. Therefore, the architecture is developed in a distributed perspective and is composed of three basic layers: the low level that constitutes the interface between the architecture and the infrastructure. The intermediate level that is responsible of correlating the alerts coming from different domains of the infrastructure and to deploy the reaction actions. The architecture is elaborated using a MAS associated to the OntoBayes model for decision mechanism. This model helps agents to make decisions according to preference values and is built upon ontology based knowledge sharing, Bayesian networks based uncertainty management and influence diagram. The major novelty of this Decision Support System is the layered view of the infrastructure thanks to MAS architecture, which enables the decision making with different levels of knowledge.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132458412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}