Search results for "Data_MISCELLANEOUS"
showing 10 items of 31 documents
Stealthy Attacks in Cloud-Connected Linear Impulsive Systems
2018
This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.
Mapping the Other Side of Agency
2021
Schonau et al. (2021) put forward an “agency map” that brings together the so far underappreciated interrelation of responsibility, privacy, authenticity, and trust for the purpose of better unders...
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
2014
Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.
Self-establishing a Service Level Agreement within Autonomic Cloud Networking Environment
2014
International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). Several research works have been proposed for the SLA establishing in cloud computing, but not in cloud networking. In this paper, we propose an architecture for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and a …
A Structural $\mathcal{ SHOIN(D)}$ Ontology Model for Change Modelling
2013
This paper presents a complete structural ontology model suited for change modelling on \(\mathcal{ SHOIN(D)}\) ontologies. The application of this model is illustrated along the paper through the description of an ontology example inspired by the UOBM ontology benchmark and its evolution.
An Enhanced Authentication System for the JADE-S Platform
2004
Multi-agent systems require a set of security mechanism threats such as confidentiality, privacy, authentication, data integrity, access control. Authentication is the process of deducing which user has made a specific request in a multi-agent system. The goal of authentication is to allow legitimate system entities to process while denying illegitimate ones. The JADE-S platform requires that users must be authenticated, providing a username and password, in order to be able to perform actions on the platform. In this paper an enhanced user authentication system for the JADE-S platform, requiring user fingerprint in addition to the standard items, is outlined. Due to their uniqueness and im…
Recognition Of Polychromatic Test By Multi-Channel Correlation Filtering
1989
A wavelength-multichannel correlation technique based on matched filtering is proposed to identify a colour object with a non uniform colour distribution. The filters are matched to the object which is illuminated with different wavelengths. This correlation gives the information of colour distribution in addition to other information usually obtained from image recognition. The theoretical study of this technique, numerical simulations and discussion are presented.
Excel Table with differentially expressed genes parasite success and attack from Ant behaviour and brain gene expression of defending hosts depend on…
2019
Parasite success and attack no Attack
Comparison of SQL Servers
2010
Šajā darbā apskatīti Microsoft SQL 2000, Microsoft SQL 2005 un Microsoft SQL 2008 serveri, veikta to vispārīgā un ātrdarbības salīdzināšana. Rezultātā tika noskaidrots, ka vairākums gadījumos Microsft SQL 2008 ir ātrāks par abiem pārējiem Microsoft SQL serveriem un tā funkcionalitāte ievērojami palīdz SQL pieprasījumu veidošanā.