Trust modeling in social tagging of multimedia content

Tagging in online social networks is very popular these days, as it facilitates search and retrieval of multimedia content.
Continue Reading

Learn to Personalized Image Search from the Photo Sharing Websites.

Increasingly developed social sharing websites like Flickr and Youtube allow users to create, share, annotate, and comment medias.
Continue Reading

Client-side Load Balancer using Cloud

Web applications' traffic demand fluctuates widely and unpredictably. The common practice of provisioning a fixed capacity.
Continue Reading

Ensuring Data Storage Security in Cloud Computing

Several trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology.
Continue Reading

Agent-Based Urban Transportation Systems

Agent-based traffic management systems can use the autonomy, mobility, and adaptability of mobile agents to deal with dynamic traffic environments.
Continue Reading

Improving Utilization of Infrastructure Clouds

A key advantage of infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources.
Continue Reading

Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds

Infrastructure as a Service (IaaS) cloud computing has transform the way we think of acquiring resources by introducing a simple change.
Continue Reading

Secure and Practical Outsourcing of Linear Programming in Cloud Computing

Cloud Computing has great potential of providing robust computational power to the society at reduced cost.
Continue Reading

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges.
We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architecture and presenting one of its key.
Continue Reading

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage

Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration
Continue Reading

Cloud Data Production for Masses

Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service
Continue Reading

Reliable Re-encryption in Unreliable Clouds

A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users.
Continue Reading

Ensuring Distributed Accountability for Data Sharing in the Cloud

Cloud computing enables highly scalable services to be easily consumed over the internet on an as-needed basis.
Continue Reading

Costing of Cloud Computing Services A Total Cost of Ownership Approach

The use of Cloud Computing Services appears to offer significant cost advantages. Particularly start-up companies benefit from these advantages.
Continue Reading

Cloud Computing Security: From Single to Multi-Clouds

The use of cloud computing has increased rapidly in many organizations.
Continue Reading

Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs).
Continue Reading

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks

We Consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network.
Continue Reading

Bandwidth recycling in IEEE 802.16 Networks

IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS).
Continue Reading

Throughput Optimization in Mobile Backbone Networks.

This paper describes new algorithms for throughput optimization in a mobile backbone network.
Continue Reading

A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks.

Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals.
Continue Reading

Fast Data Collection in Tree-Based Wireless Sensor Networks.

We first consider time scheduling on a single frequency channel with the aim of minimizing the number of time slots.
Continue Reading

The Server Reassignment Problem for Load Balancing in Structured Peer to Peer Systems

Application-layer peer-to-peer (P2P) networks are considered to be the most important development for next-generation Internet infrastructure. For these systems to be effective, load balancing among the peers is critical.
Continue Reading

Efficient and Secured content processing using cooperative intermediaries

Content services such as content filtering and transcoding  adapt contents to meet system requirements, display capacities, or user preferences.
Continue Reading

Optimal state allocation for multicast communication with explicit forwarding

Scalable and adaptive multicast forwarding mechanism based on explicit multicast.
Continue Reading

Hybrid Scheduling of Dynamic Task Graphs with Selective Duplication for Multiprocessors under Memory and Time Constraints

Hybrid scheduling methodology for task graphs to multiprocessor embedded systems.
Continue Reading

Dectecting Malicious Packet Losses

We consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets.
Continue Reading

Multi-path Dissemination in Regular Mesh Topologies

Mesh topologies are important for large-scale peer-to-peer systems that use low-power transceivers.
Continue Reading

Full-Information Lookups for Peer-to-Peer Overlays

Most peer-to-peer lookup schemes keep a small amount of routing state per node, typically logarithmic in the number of overlay nodes.
Continue Reading

Cooperative Caching in Wireless P2P Networks Design, Implementation, and Evaluation

Some recent studies have shown that cooperative cache can improve the system performance in wireless P2Pnetworks such as ad hoc networks and mesh networks.
Continue Reading

Correlation-Based Traffic Analysis Attacks on Anonymity Networks

We address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks.
Continue Reading

A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming

Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distribution.
Continue Reading

Layered Approach Using Conditional Random Fields for Intrusion Detection.

Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic.
Continue Reading

Analysis on Credit Card Fraud Detection Methods.

Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud.
Continue Reading

A Competitive Study of Cryptography Techniques over Block Cipher.

The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography.
Continue Reading

Towards Situational Awareness of Large-Scale Botnet Probing Events.

Botnets dominate today's attack landscape. In this work, we investigate ways to analyze collections of malicious probing.
Continue Reading

Online Intrusion Alert Aggregation with Generative Data Stream Modeling.

Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts-produces by low-level intrusion detection systems, firewalls, etc.
Continue Reading

RITAS: Services for Randomized Intrusion Tolerance

Randomized agreement protocols have been around for more than two decades.
Continue Reading

Modeling and Detection of Camouflaging Worm.

Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet.
Continue Reading

Nymble Blocking Misbehaving Users in Anonymizing Networks.

Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server.
Continue Reading

SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks.

Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays.
Continue Reading

Ensuring Distributed Accountability for Data Sharing in the Cloud

Cloud computing enables highly scalable services to be easily consumed over the internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate.
Continue Reading

DoubleGuard: Detecting Intrusions In Multi-tier Web Applications

Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere.
Continue Reading

Online Modeling of Proactive Moderation System for Auction Fraud Detection

We consider the problem of building online machine-learned models for detecting auction frauds in e-commence web sites.
Continue Reading

Packet-Hiding Methods for Preventing Selective Jamming Attacks.

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.
Continue Reading

Risk-Aware Mitigation for MANET Routing Attacks.

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure.
Continue Reading

Effective Navigation of Query Results Based on Concept Hierarchies.

Search queries on biomedical databases, such as PubMed, often return a large number of results, only a small subset of which is relevant to the user.
Continue Reading

Ranking Spatial Data by Quality Preferences

A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood.
Continue Reading

The CoQUOS Approach to Continuous Queries in Unstructured Overlays

The current peer-to-peer (P2P) content distribution systems are constricted by their simple on-demand content discovery mechanism.
Continue Reading

Extended XML Tree Pattern Matching: Theories and Algorithms

As business and enterprises generate and exchange XML data more often, there is an increasing need for efficient processing of queries on XML data.
Continue Reading

Organizing User Search Histories

Users are increasingly pursuing complex task-oriented goals on the web, such as making travel arrangements, managing finances, or planning purchases.
Continue Reading

Multiparty Access Control for Online Social Networks Model and Mechanisms

Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of internet users.
Continue Reading

Ranking Model Adaptation for Domain-Specific Search.

With the explosive emergence of vertical search domains, applying the broad-based ranking model directly to different domains is no longer desirable.
Continue Reading

Efficient Extended Boolean Retrieval.

Extended Boolean retrieval (EBR) models were proposed nearly three decades ago, but have had little practical impact, despite their significant advantages compared to either ranked keyword or pure Boolean retrieval.
Continue Reading

Slicing A New Approach to Privacy Preserving Data Publishing.

Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing.
Continue Reading