Search results for "Data_MISCELLANEOUS"

showing 10 items of 31 documents

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

2018

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…

0209 industrial biotechnologyClass (computer programming)Authenticationbusiness.industryComputer scienceDistributed computingData_MISCELLANEOUS020208 electrical & electronic engineeringAutonomous agentCyber-physical systemCloud computing02 engineering and technologyFunction (mathematics)Security robotics distributed control and estimation020901 industrial engineering & automationControl theoryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringbusinessComputer Science::Cryptography and Security
researchProduct

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct

Mapping the Other Side of Agency

2021

Schonau et al. (2021) put forward an “agency map” that brings together the so far underappreciated interrelation of responsibility, privacy, authenticity, and trust for the purpose of better unders...

03 medical and health sciences0302 clinical medicinebusiness.industryGeneral NeuroscienceData_MISCELLANEOUSAgency (sociology)060301 applied ethics06 humanities and the artsPublic relations0603 philosophy ethics and religionbusinessPsychology030217 neurology & neurosurgeryAJOB Neuroscience
researchProduct

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks

2014

Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.

Authenticationbusiness.industryComputer scienceAuthentication protocolNetwork Access ControlData_MISCELLANEOUSChallenge–response authenticationEncryptionbusinessAKAComputer network2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Self-establishing a Service Level Agreement within Autonomic Cloud Networking Environment

2014

International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). Several research works have been proposed for the SLA establishing in cloud computing, but not in cloud networking. In this paper, we propose an architecture for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and a …

Cloud computing security[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE/IFIPbusiness.industryComputer scienceQuality of service[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Data_MISCELLANEOUSQoSCloud computingComputer securitycomputer.software_genreService-level agreement[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Cloud testingAutonomic Cloud NetworkingData as a serviceArchitectureSLAbusinesscomputerDrawbackComputer network
researchProduct

A Structural $\mathcal{ SHOIN(D)}$ Ontology Model for Change Modelling

2013

This paper presents a complete structural ontology model suited for change modelling on \(\mathcal{ SHOIN(D)}\) ontologies. The application of this model is illustrated along the paper through the description of an ontology example inspired by the UOBM ontology benchmark and its evolution.

Computer sciencebusiness.industryComputer Science::Information RetrievalData_MISCELLANEOUS02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Ontology020201 artificial intelligence & image processingComputingMethodologies_GENERALArtificial intelligencebusinesscomputerNatural language processing
researchProduct

An Enhanced Authentication System for the JADE-S Platform

2004

Multi-agent systems require a set of security mechanism threats such as confidentiality, privacy, authentication, data integrity, access control. Authentication is the process of deducing which user has made a specific request in a multi-agent system. The goal of authentication is to allow legitimate system entities to process while denying illegitimate ones. The JADE-S platform requires that users must be authenticated, providing a username and password, in order to be able to perform actions on the platform. In this paper an enhanced user authentication system for the JADE-S platform, requiring user fingerprint in addition to the standard items, is outlined. Due to their uniqueness and im…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSData_MISCELLANEOUSFingerprintsJADE-SSecurityAuthentication SystemsMulti-Agent Systems
researchProduct

Recognition Of Polychromatic Test By Multi-Channel Correlation Filtering

1989

A wavelength-multichannel correlation technique based on matched filtering is proposed to identify a colour object with a non uniform colour distribution. The filters are matched to the object which is illuminated with different wavelengths. This correlation gives the information of colour distribution in addition to other information usually obtained from image recognition. The theoretical study of this technique, numerical simulations and discussion are presented.

CorrelationWavelengthDistribution (mathematics)business.industryData_MISCELLANEOUSComputer visionArtificial intelligenceObject (computer science)businessMulti channelMathematicsSPIE Proceedings
researchProduct

Excel Table with differentially expressed genes parasite success and attack from Ant behaviour and brain gene expression of defending hosts depend on…

2019

Parasite success and attack no Attack

Data_MISCELLANEOUSHardware_INTEGRATEDCIRCUITSHardware_PERFORMANCEANDRELIABILITY
researchProduct

Comparison of SQL Servers

2010

Šajā darbā apskatīti Microsoft SQL 2000, Microsoft SQL 2005 un Microsoft SQL 2008 serveri, veikta to vispārīgā un ātrdarbības salīdzināšana. Rezultātā tika noskaidrots, ka vairākums gadījumos Microsft SQL 2008 ir ātrāks par abiem pārējiem Microsoft SQL serveriem un tā funkcionalitāte ievērojami palīdz SQL pieprasījumu veidošanā.

DatorzinātneData_MISCELLANEOUSInformationSystems_DATABASEMANAGEMENT
researchProduct