-
Chapter and Conference Paper
A Research Agenda Towards Culturally Aware Information Systems
Our world is not homogeneous in nature, it has multiple languages, ethnic groups, culture, beliefs, and varying perceptions of things. There is development towards catering experiences based on these varying d...
-
Chapter and Conference Paper
WIP - SKOD: A Framework for Situational Knowledge on Demand
Extracting relevant patterns from heterogeneous data streams poses significant computational and analytical challenges. Further, identifying such patterns and pushing analogous content to interested parties ac...
-
Chapter and Conference Paper
Secure Data Exchange and Data Leakage Detection in an Untrusted Cloud
In service-oriented architecture, services can communicate and share data amongst themselves. It is necessary to provide role-based access control for data. In addition, data leakages made by authorized insid...
-
Chapter and Conference Paper
Protecting PLM Data Throughout Their Lifecycle
Enterprises operate in a global economy with their operations dispersed across internal processes and external partners. Product Lifecycle Management (PLM) systems play a significant role in modern product dev...
-
Chapter and Conference Paper
A Case for Societal Digital Security Culture
Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of our lives. Security vulnerabilities in these systems ...
-
Chapter and Conference Paper
Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection
Recently, considerable research work have been conducted towards finding fast and accurate pattern classifiers for training Intrusion Detection Systems (IDSs). This paper proposes using the so called Fuzzy ART...
-
Chapter and Conference Paper
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity
The difficulty associated with breaching an enterprise network is commensurate with the security of that network. A security breach, or a security policy violation, occurs as a result of an attacker successful...
-
Chapter and Conference Paper
Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations
In this paper, we report some experiments and observations to make browsing of images more adaptable using small devices. We highlight the usability of such an alternative in mobile e-commerce and bandwidthcon...
-
Chapter and Conference Paper
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and threats. They are: using fault ...
-
Chapter and Conference Paper
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities
This paper presents the design of a new middleware which provides support for trust and accountability in distributed data sharing communities. One application is in the context of scientific collaborations. M...
-
Chapter and Conference Paper
Fraud Formalization and Detection
A fraudster can be an impersonator or a swindler. An impersonator is an illegitimate user who steals resources from the victims by “taking over” their accounts. A swindler is a legitimate user who intentionall...
-
Chapter and Conference Paper
Authorization Based on Evidence and Trust*
Develo** authorization mechanisms for secure information access by a large community of users in an open environment is challenging. Current research efforts grant privilege to a user based on her objective ...
-
Chapter and Conference Paper
An Algorithm for Building User-Role Profiles in a Trust Environment1
A good direction towards building secure systems that operate efficiently in large-scale environments (like the World Wide Web) is the deployment of Role Based Access Control Methods (RBAC). RBAC architectures...
-
Chapter and Conference Paper
PartJoin:An Efficient Storage and Query Execution for Data Warehouses
The performance of OLAP queries can be improved drastically if the warehouse data is properly selected and indexed. The problems of selecting and materializing views and indexing data have been studied extensi...
-
Chapter
Data and Transaction Management in a Mobile Environment
The mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in the area of mobile databas...
-
Chapter
A Taxonomy of Data Managements Via Broadcasting in Mobile Computing
Data management for distributed computing has spawned a variety of research work and commercial products. At the same time, recent technical advances in the development of portable computing devices and the ra...
-
Chapter and Conference Paper
Design and Implementation of a Python-Based Active Network Platform for Network Management and Control
Active networks can provide lightweight solutions for network management- related tasks. Specific requirements for these tasks have to be met, while at the same time several issues crucial for active networks ...
-
Chapter
Tune Retrieval in the Multimedia Library
Musical scores are traditionally retrieved by title, composer or subject classification. Just as multimedia computer systems increase the range of opportunities available for presenting musical information, so...
-
Chapter and Conference Paper
Security in Data Warehousing
Data warehouse [2, 4, 5, 6] is an integrated repository derived from multiple source (operational and legacy) databases. The data warehouse is created by either replicating the different source data or transformi...
-
Chapter and Conference Paper
Data Organization Issues for Location-Dependent Queries in Mobile Computing
We consider queries which originate from a mobile unit and whose result depends on the location of the user who initiates the query. Example of such a query is How many people are living in the region I am curren...