Secure Collaboration in Mediator-Free Environments

Size: px
Start display at page:

Download "Secure Collaboration in Mediator-Free Environments"

Transcription

1 Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA Elisa Betino Depatment of Compute Sciences and CERIAS Pudue Univesity West Lafayette, IN, USA Aif Ghafoo School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA ABSTRACT The intenet and elated technologies have made multidomain collaboations a eality Collaboation enables domains to effectively shae esouces; howeve it intoduces seveal secuity and pivacy challenges Managing secuity in the absence of a cental mediato is even moe challenging In this pape, we popose a distibuted secue inteopeability famewok fo mediato-fee collaboation envionments We intoduce the idea of secue access paths which enables domains to make localized access contol decisions without having global view of the collaboation We also pesent a path authentication technique fo poving path authenticity Futhemoe, we pesent both a poactive and on-demand path discovey algoithms that enable domains to secuely discove paths in the collaboation envionment Categoies and Subject Desciptos D46 [Secuity and Potection]: Access contols; H27 [Database Administation]: Secuity, integity, and potection Geneal Tems Design, Secuity, Theoy Keywods Decentalized Secue Inteopeability, Collaboation, Access Path, Path Discovey, Role Based Access Contol 1 INTRODUCTION The phenomenal gowth of the Intenet has enabled a globalization that has emoved baies between makets, oganizations and societies The Intenet has become integated into pactices of individuals, business, and govenments In such a connected wold, thee ae immense possibilities of collaboation in distibuted envionments Fo example, inteopeability has enabled companies to outsouce thei opeations oveseas to educe poduction and Pemission to make digital o had copies of all o pat of this wok fo pesonal o classoom use is ganted without fee povided that copies ae not made o distibuted fo pofit o commecial advantage and that copies bea this notice and the full citation on the fist page To copy othewise, to epublish, to post on seves o to edistibute to lists, equies pio specific pemission and/o a fee CCS 05, Novembe 7 11, 2005, Alexandia, Viginia, USA Copyight 2005 ACM /05/0011 $500 employment costs Futhemoe, inteopeability adds to the efficiency of companies by leveaging the use of existing esouces othe than einventing the wheel Even moe inteestingly, by migating pocesses acoss oganizational boundaies companies ae able to combine thei effots and become vitual entepises [1, 17] Last but not least inteopeability is essential to suppot adaptation and evolution in complex entepises [8] Such entepises [21] ae oganized accoding to units with vaying degees of coupling and autonomous coodination linking these units As such an entepise evolves to meet new demands, new inteopeation links acoss units may need to be established and existing links emoved Though inteopeability has seveal advantages and is cucial in the context of new dynamic collaboative applications and adaptive entepises, it intoduces seveal secuity and pivacy concens These concens have to be addessed to make such inteopeability techniques a viable tool in multidomain contexts In paticula, a domain epesents a coe element in a collaboating envionment A domain is a sepaate, autonomous entity that manages a goup of esouces, and has its own administation and access contol policies Because vey often domains need to collaboate to shae esouces, a key step in setting up such a collaboation among domains is epesented by the inteopeation of access contol policies Domains typically achieve inteopeation among thei access contol policies by intoducing coss mappings between these policies An impotant equiement is that such inteopeation of policies be secue; Gong and Qian [12], among othes, have shown that if inteopeation between access contol policies is not caefully established, secuity beaches may aise Secue inteopeability in a multidomain envionment is a challenging task even in the pesence of a tusted mediato managing secuity of such collaboation [12, 4, 7] It is much hade to handle secuity in a fully distibuted and dynamic inteopeation envionment whee domains join and leave in an adhoc manne and in the absence of a tusted mediato Howeve, we believe that the development of fully decentalized solutions tailoed to dynamic envionments is cucial to meet the secuity equiements of next-geneation entepises In this pape we develop such a solution We popose a distibuted famewok addessing both the secuity and autonomy equiements of domains in a mediato-fee inteopeation envionment In ou famewok the use s access histoy migates with the use s access equests to enable domains to make localized access contol decisions without 58

2 needing to have a global view of the collaboation envionment We define a set of basic and extended path linking ules that enable domains to make access contol decisions We also povide a path authentication technique that ensues the authenticity of the use s access path as it popagates between domains Ou famewok povides both eactive and on-demand path discovey algoithms that enable uses to discove available secue access paths in the inteopeation envionment 11 Contibutions and Pape Oganization The contibutions in this pape can be summaized as follows: We pesent a mediato-fee collaboation envionment and discuss the secuity challenges in such an envionment We define access paths and pesent access path secuity equiements in a secue collaboation We povide a famewok fo enabling secue collaboation in a mediato-fee envionment, in which access contol decisions ae dependent on the use s access histoy in the collaboation envionment We discuss seveal secuity attacks that can be pefomed in a mediato-fee envionment, and povide mitigation techniques to such attacks The est of the pape is oganized as follows In Section 2 we eview the equiements of secue inteopeability, the maximal secue inteopeability and the dawbacks of the maximal secue inteopeability solution poposed by Li and Qian [12] We intoduce the mediato-fee collaboation envionment in Section 3 In Section 4 we pesent ou famewok fo secue collaboation in a mediato-fee envionment and define the notion of secue access path The equest execution stategy and path authentication module ae discussed in Sections 5 and 6, espectively The poactive and on-demand path discovey algoithms ae pesented on Section 7 Possible secuity attacks and mitigation techniques ae discussed in Section 8 The elated wok is pesented in Section 9 Concluding emaks ae added in Section 10 2 PRELIMINARIES In ou famewok, we assume that all the domains adopt a ole-based access contol (RBAC) model [10, 9] to model thei access contol policies The analysis pefomed in this pape and the famewok we have developed can still be applied when othe access contol models ae adopted We have chosen RBAC because it is suitable fo specifying the secuity equiements fo a wide ange of commecial, medical, govenment applications [23, 3] and moeove it is being standadized A domain that does not use RBAC as its access contol model can easily geneate an expot RBAC policy to join the collaboation In RBAC, pemissions ae associated with oles, and uses ae ganted membeship in appopiate oles, theeby acquiing the oles pemissions The access contol policy PO i fo domain i is modeled as a diected gaph G i = V i, A i whee the vetex set V i epesents oles and the acs set A i epesents the dominance elationship between oles Fo example, if ole 1 dominates 2, ( 2 1), then ( 1, 2) A i Thus a use acquiing ole 1 can acquie pemissions assigned to ole 2 by using the RBAC pemission inheitance popeties [6] Fo x, y V i an access ( x, y) is legal if and only if ( x, y) G + i whee G + i is the tansitive closue of G i = V i, A i We denote a legal access by ( x, y) A i 21 Secue Inteopeability In a collaboation involving n domains, in which the access contol policy of each domain i is modeled as a diected gaph G i = V i, A i, i = 1,, n, inteopeability is achieved by intoducing coss domain paiwise mappings between the n domains These mappings elate oles in diffeent domains, and ae epesented by a set of coss domain acs efeed to as the set F Solutions developed fo schema matching in the aea of heteogeneous database systems and moe ecently appoaches based on ontologies [19, 18] can be used fo geneating such links The details of such appoaches ae outside of the scope of this pape In the pesent wok we assume that the coss domain mappings ae selected by the administatos of the domains accoding to the inteopeability equiements of each system Futhemoe, the system administatos agee on a set of esticted accesses which is simila to negative authoizations adopted in seveal access contol Ë models The n esticted access is a binay elation R on i=1 Vi such that (u, v) R, u V i, v V j, and i j, whee these edges in R ae pohibited to exist duing inteopeation Given n domains G i = V i, A i, i = 1,, n, set of coss links F and a esticted access elation R, an inteopeation Q = n i=1v i, A Q, whee A Q is the esulting ac set A Q { n i=1a i F }, is secue accoding to Li Gong et al [12] if it satisfies all the following conditions: 1 A Q R = 2 u, v V i, (u, v) is legal in A i if and only if (u, v) is legal in A Q The fist equiement ensues that esticted access elation is honoed The second equiement ensues the following two popeties hold: Autonomy: It equies that any access pemitted with in an individual domain must also be pemitted unde secue inteopeation Secuity: It equies that any access denied within an individual domain must also be denied unde secue inteopeation 22 The Maximum Secue Inteopeation (MSI) Definition 1 Maximum Secue Inteopeability (MSI) Given n domains G i = V i, A i, i = 1,, n, a set of coss links F and a esticted access elation R, fo any positive intege K F, detemine whethe a secue solution Q = n i=1v i, A Q exists such that A Q = { n i=1a i S} whee S F and S K Simply, the MSI solution finds a maximal subset of the coss links set F such that the secue inteopeability is ensued The MSI solution inheently satisfies the autonomy equiement as A Q = { n i=1a i S} Taking a close look at the MSI solution we conclude it has the following dawbacks: NP-Completeness: Li Gong et al [12] showed a polynomial eduction of the Feedback Ac Set poblem, which is a known NP-complete poblem, to the 59

3 MSI poblem, thus poving that MSI is an NP-complete poblem Thus it is not pactical to solve the MSI poblem fo a lage numbe of collaboating domains Moeove, any pactical solution to this poblem would be based on heuistics and in such cases the geneated solutions ae appoximate and ae not guaanteed to be optimal Centalized Algoithm: The MSI poblem assumes full knowledge all domains access contol policies G i = V i, A i, i = 1,, n, and the sets F and R To solve the MSI poblem a global view of the system is equied A tusted mediato having the global view computes the subset of F that satisfies the constaints of MSI The mediato epesents a bottleneck and theefoe such solution is not scalable in distibuted envionments with a lage numbe of inteacting paties Static Solution: The MSI solution computed with n collaboating domains is optimal and secue fo these n domains; if howeve a domain decides to leave o join the collaboation, the MSI solution has to be ecomputed to ensue both optimality and secuity Futhemoe, the MSI solution should be ecomputed if a domain edits o updates its secuity policy This is not pactical in dynamic envionments in which domains ae equied to join and leave the inteopeation envionment tanspaently without the need fo delays and evocations of cuent coalitions Fainess Issue: The MSI solution esolves violations by emoving coss links fom F Howeve, in a violation seveal domains ae involved and the emoval of coss links will affect a subset of these domains The following example elaboates on the fainess issue Conside Figue 1 whee domains A, B and C ae collaboating Each domain has an access contol hieachy epesented as a gaph The coss links ae epesented by the dotted lines A use in domain A acquiing ole A1 could access ole A3 by accessing oles { B3, B1, C2, C1, A3 } which is clealy a secuity violation as A1 A3 Futhemoe, using a simila agument a use at B1 and C1 could access oles B3 and C2 espectively The MSI solution would emove one o moe coss links to beak such cycle Assume that the MSI solution emoves edge ( C1, A3 ); this solution eliminates the secuity violation but uses in domain C ae unable to access oles in domain A This solution is not fai as it esticts access by uses of domain C, wheeas ights of uses in othe domains ae not affected Fom the above discussion we conclude that the MSI solution is NP-Complete, equies a tusted mediato, is static, and moeove it is not fai to all the paticipating domains In the next sections we popose a secue technique which epesents a computationally simple, distibuted, dynamic solution, and ensues fainess to the paticipating domains 3 MEDIATOR-FREE SECURE COLLABORATION In this section we pesent the key notion of ou famewok, that is, the notion of mediato-fee secue collaboation envionment, which does not equie a mediato having A3 A2 A1 Domain A (Home) C2 C1 Domain C B2 B3 B1 Domain B Figue 1: Example of a violation in a multidomain envionment with thee domains The solid lines show the intenal access links, while the dotted lines show the inteopeation coss links F a global view in ode to ensue secue inteopeability Figue 2 shows both types of collaboation envionments To design a mediato-fee envionment we need to analyze the functions pefomed by the mediato, which include: MSI computation: Fom the global view the mediato computes the MSI solution, which geneates the optimal set of collaboation coss links between the domains Role Queying and Routing: By using the global view of the collaboation envionment the mediato is able to answe queies of the fom is 2 eachable fom 1? whee 1 and 2 ae in diffeent domains Futhemoe, the mediato can easily detemine paths between eachable oles in diffeent domains G 2 G 1 G n Mediato G 3 G 4 (a) Mediated G n-1 G 2 G 1 G n G 3 G 4 (b) Mediato-Fee G n-1 Figue 2: Collaboation envionment with and without a mediato A mediato-fee collaboation is a completely distibuted fom of collaboation In this envionment the domains have to collaboate in making access contol decisions to avoid violations In a mediato-fee envionment none of the collaboating domains has the global view of all the access contol policies; instead the domains view the collaboation envionment only though thei established coss links Enfocing secue inteopeability in such an envionment is a challenging task as it equies domains to collaboate in both shaing of esouces and making access contol decisions In a mediato-fee secue collaboation the mediato functions should be executed acoss the collaboating domains accoding to a distibuted stategy 60

4 Request Pocessing Module Basic Path Linking Rules Extended Path Linking Rules Path Authentication Module Path Signatue Geneation Path Signatue Veification Path Discovey Module Poactive Path Discovey On-Demand Path Discovey Path Selection Figue 3: Modules of the mediato-fee secue inteopeability famewok The following assumptions apply to a mediato-fee envionment: 1 Each domain s fist pioity is to ensue that its secuity policy is not violated 2 Domains have limited infomation about the collaboation envionment Each domain is only equied to know its secuity policy, the coss links and esticted links in which it is involved 4 FRAMEWORK FOR SECURE MEDIATOR-FREE COLLABORATION In this section, we pesent ou famewok fo enabling secue collaboation in a mediato-fee envionment Ou famewok povides a secue inteopeability solution that pevents secuity violations as access equests ae being made Ou solution equies no complicated pepocessing, and allows the complete set of coss links to exist Futhemoe, it enables domains to make localized access contol decisions without the need fo the global view of the collaboation envionment These chaacteistics make ou solution vey suitable fo the enfocement of access contol in a mediatofee envionment Ou famewok utilizes the use s cuent access histoy duing the collaboation session to dynamically gant o deny futue access equests We efe to the use s access histoy as the use s access path, which is the sequence of oles acquied by the use duing the cuent session Ou poposed solution shaes the ideas of the Chinese Wall secuity policy [5], as the use s access histoy contols his futue accesses The basis of the Chinese Wall policy is that uses ae only allowed access to infomation which is do not conflict with any othe infomation that they have aleady accessed In this context, the use s access path epesents the use s session histoy and the use s view of the possible futue paths is dependent on his cuent access path 41 Famewok Oveview Ou famewok enables domains to make localized access contol decisions based on the use s access histoy in the collaboation envionment It is composed by the following majo modules (see Figue 3): M1 Request Pocessing Module: This module geneates and evaluates use access equests acoss domains M2 Path Authentication Module: Because the use path migates with the use equests, this module checks the authenticity of the eceived paths Also, this module geneates path signatues fo geneated equests M3 Path Discovey Module: This module enables uses esiding in a home domain to detemine which oles ae accessible in taget domains The above thee modules ae included in each domain The modules inteact with each othe to ensue the secuity of thei coesponding domains The detail of each module of ou famewok is discussed in detail in futhe sections As access paths constitute an impotant dimension in ou famewok, we define in what follows access paths and secue access path equiements 42 Access Paths in an Inteopeation Envionment In a use session we identify thee main types of domains, namely home, cuent and taget domains The home domain is the domain at which the use session stats The cuent domain is the domain fom which the use geneates access equests The taget domain is the domain to which the use is equesting access to When a use entes a domain the use is assigned an enty ole Similaly, when the use leaves a domain to access anothe domain the use is assigned an exit ole Note that the enty and exit oles may coincide Figue 4 shows the home, cuent and taget domains The enty and exit oles ae efeed to as E and X espectively, whee the use s access path in Figue 4 is P = { E H, X H,, E C } Definition 2 The use s access path is defined as the sequence of enty and exit oles acquied by a use duing a given session fom the home domain to the cuent domain E H X H Home Domain (H) E C X C Cuent Domain (C) E T Taget Domain (T) Figue 4: Types of domains, enty and exit oles The secue inteopeability equiements pesented by Li Gong et al [11] which wee mentioned in Section 21 ensue that all the possible paths in secue inteopeation do not 61

5 violate the access contol policy of each domain and that both the coss links set F and the esticted access set R ae honoed Hee we pesent the notion of secue access path Definition 3 Let P = { 1, 2,, n} be an access path, whee i < j implies that ole i was acquied befoe j Moeove, let Domain( i) denotes the domain of ole i P is secue if it satisfies the following conditions: C1 Fo all i < j and i, j P, if Domain( i) = Domain( j) then j i C2 Fo all i, i+1 P, if Domain( i) Domain( i+1) then ( i, i+1) F C3 Fo all i < j and i, j P, ( i, j) R Condition C1 ensues that oles acquied fom the same domain ae acquied accoding to the domain s ole hieachy This ensues that the access contol policies of the domains included in the path ae not violated Conditions C2 and C3 ensue that sets F and R ae honoed The use s access path is attached to use equests to enable domains to make localized access contol decisions This is analogous to souce outing techniques fo limited bandwidth wieless senso netwoks [14, 13] in which the oute fom souce to destination is attached to the packet to enable outing of the packet Thus, including path infomation is an acceptable assumption; in the following sections we pesent techniques to limit the size of the access path 5 REQUEST PROCESSING MODULE In a mediato-fee collaboation envionment each domain has a limited view of the collaboation envionment meaning that each domain has a complete knowledge of its own access contol policy, that is, the coss links and the esticted access links in which it is involved Let F T F and R T R be the coss links and esticted access links that the taget domain T is involved in An access equest fom anothe domain includes the equested ole, and the use s cuent access path Given this limited infomation the taget domain can decide whethe to eject o accept the access equest In such an envionment each domain is mainly concened with ensuing that its access contol policy is not violated By veifying the following basic path linking ules a taget domain is able to secuely gant o evoke a equest Definition 4 The basic path linking ules: Let P be a secue path, X C the exit ole in the cuent domain, E T the equested ole in the taget domain The taget domain must veify the following conditions in ode to gant access to the equested ole: L1 ( X C, E T ) F T L2 Fo all P, (, E T ) R T L3 Fo all P, if Domain() = T then E T The next theoem poves that the basic path linking ules assue the secuity of the computed path if all the conditions L1 3 ae veified befoe a link is added to the path Note that is the concatenation opeato Theoem 1 Let P i be a secue path, and P i+1 = P i E T be an updated path that satisfies the basic path linking ules Then P i+1 is also a secue path Poof, The initial path P i = ( 1, 2,, n) is secue, whee 1 = E H, 2 = X H and n = X C efe to Figue 4 We poceed using a poof by contadiction Assume to the contay that the new path P i+1 is not secue afte satisfying all the basic path linking ules If this is the case, then a violation exists in path P i+1 = P i E T This violation can be due to P i o ( X C, E T ) o ( k, E T ), whee k P i, 1 k n Since P i is the initial path and it is assumed to be secue then it cannot contain a violation Rule L1 checks that ( X C, E T ) F T and Rule L2 ensues that ( X C, E T ) R T thus this link cannot be the cause of the violation We ae now left with only links ( k, E T ); howeve ule L2 ensues that such links ae not in the R T and ule L3 checks the integity of adding such links and insues that the odeing among the oles in the domain s intenal oles hieachy is not violated; thus these links cannot esult in secuity violations In this case as all the possible links that could lead to a violation have been poven to be secue afte veifying the basic path linking ules which contadicts ou assumption and thus path P i+1 can only be a secue path Note that the basic linking ules applied by the taget domain ae based on the taget domain access policy, the educed coss link and esticted sets F T and R T, and the use s access path Thus, the taget domain is able to make secue access contol decisions without a global view of the collaboation envionment All the computations pefomed to execute ules L1-3 ae computationally simple opeations and can be computed in polynomial time Futhemoe, the basic linking ules do not emove any coss links and thus the solution is fai to all the domains in the collaboation envionment 51 Extended Path Linking Rules In addition to the basic path linking ules, the extended ules povide moe constaints on the use s access path Such constaints ae useful fo secuing many applications with special path equiements The esticted access elation R is only capable of epesenting simple binay mutual exclusion constaints of the fom ( 1, 2) stating that oles 1 and 2 must not be accessed by the same use in the same session Othe path estictions ae desiable fo cetain applications Cadinality and SoD constaints ae cucial fo secuing many applications in a commecial envionment Many eseaches have highlighted the impotance and use of cadinality and SoD constaints in RBAC models [10, 9, 16] Howeve, no one has addessed the these constaints in the context of a multidomain collaboative envionment A moe geneal type of such constaints equies that no use be a membe of t o moe oles in a set of m oles { 1, 2, m} in a given session [16] Assuming the use s access path is P, then this type of constaint can easily be checked by veifying that P { 1, 2,, m} t, whee x denotes the cadinality of the set x Cadinality constaints ae constaints on the size of the access path A cadinality constaint of the fom P Pmax bounds the numbe of oles acquied in a session to a numbe Pmax of oles Odeing constaints enfoce conditions on the ode accoding to which the oles have to be acquied Such con- 62

6 staints ae elevant in the context of wokflow systems [3], in which cetain oles should be acquied befoe othes oles can be activated 6 PATH AUTHENTICATION The access path is attached to the use s equests as it migates acoss domains A technique is equied to ensue that this path is authentic and has not been tampeed with The authentication scheme poposed is based on a signatue that is geneated by all the domains included in the access path The authentication scheme should peseve both the path contents and the odeing Each domain i has a pivate key e i and a public key d i The path signatue is computed as the use equest is sent fom the cuent domain to the taget domain Fo a use cuently in domain i and equesting access to a taget domain i + 1 the cuent path is P i = { E 1, X 1,, E i, X i }, whee E k and X k, k = 1,, i, ae the enty and exit oles in domain k espectively The signatue SP i of path P i is computed as follows: SP i = SIGNei (SP i 1 h( E i X i i + 1)) if i 1 seed if i = 0 whee is the concatenation opeato, Ä is the XOR opeato, seed is a andom numbe geneated by the home domain which is included in the path infomation, h() is a secue one-way hash function, and SIGN K(M) is a signatue function that uses key K to sign message M The signatue is geneated using modula exponentiation simila to techniques used in RSA signatues [22] Domain i aleady has the signatue SP i 1 of path P i 1, thus domain i can easily compute SP i as E i, X i, i + 1 and e i ae known by domain i The path signatue SP i is signed using the pivate key e i thus this signatue cannot be foged The signatue function has the following popety: SIGN di (SIGN ei (M)) = M Pesented with P i, SP i and the seed the taget domain i + 1 can easily veify the path signatue by pefoming the following opeation: SIGN di (SP i) h( E i X i i + 1) = SP i 1, fo i 1 The taget domain can easily check the authenticity of a path P i by ecusively computing the above equation and compaing SP 0 with the seed Note that the signatue veification is pefomed using the public key infomation of the involved domains; thus the veification does not equie contacting the involved domains 7 PATH DISCOVERY Coss links ae the main enables of collaboation Domains ae able to collaboate with neighboing domains though the established collaboation coss links Neighboing domains ae single hop collaboations as they only involve two domains Single hop collaboations ae easy to achieve and initiate as domains aleady have full knowledge of thei established coss links One the othe hand, in ode to collaboate though multi-hop collaboations domains need to build one o moe candidate access paths to taget domains To enable domains to discove available multi-hop collaboations a distibuted path discovey algoithm is equied The discovey algoithm enables domains in an inteopeation envionment to discove paths to oles in othe domains, whethe eachable though one o moe intemediate domains Futhemoe, the discoveed paths should follow the path linking ules to ensue the discoveed path(s) secuity In this section, we pesent two path discovey algoithms, poactive and on-demand path discovey algoithms 71 Poactive Path Discovey The poactive path discovey algoithm computes the paths fom the oles in cuent domain to oles in othe domains a pioi Each domain geneates and maintains a ole outing table, which is a patial map of the collaboation envionment epesenting the view with espect to the cuent domain Neighboing domains exchange peiodic discovey updates via coss links indicating eachable domains though these links Note that coss link elated to domain i can be divided into outgoing and incoming coss links, efeed to by F O i and F I i espectively, whee F O i F I i = F i The peiodic messages ae sent by domains on thei incoming coss links Figue 5(a) shows the diection of the peiodic discovey updates in an example collaboation envionment The content of the peiodic message is chosen by the advetising domain to indicate paths to oles accessible though the coss link ove which the message is sent To avoid loops, paths that include the domain to which the update message is to be sent ae dopped o tuncated Fo example in Figue 5(a) the update message sent fom domain B to domain A acoss ( A3, B1 ) will epot the oles eachable via B1 in all domains othe than domain A, this clealy avoids loops To avoid infinitely gowing paths, a cadinality constaint should be set on the path length; the path length could be limited to double the numbe of estimated collaboating domains The poactive path discovey algoithm is simila to link state outing; howeve, thee ae seveal diffeences Fo example, in a collaboation envionment coss links ae not necessaily bidiectional and outing metics ae not necessaily based on distance instead on highe level logic dictated by the coss links and the domain hieachies To ensue the authenticity of the epoted paths, a path signatue is computed based on technique simila to the path authentication scheme discussed in Section 6 Howeve, the path signatue is computed in the evese diection, fom the taget domain to the home domain, as the path is discoveed fom taget to home The advantage of a poactive path discovey is that when a domain needs to collaboate with a taget domain, the path is aleady available and thus thee is no latency Futhemoe, this technique is eactive to collaboation envionment changes such as changes in the coss links, domain policies, and the enty o exit of collaboating domains The disadvantage is that some paths may neve be used duing the collaboation peiod Anothe poblem is that the dissemination of path infomation will peiodically consume netwok bandwidth 72 On-Demand Path Discovey The on-demand path discovey algoithm computes paths fom the oles in the cuent domain to oles in a taget domain only when such path is needed Neighboing domains do not exchange peiodic path message updates; instead simple Hello messages ae sent between domains that shae coss links to announce that the link is still alive When a home domain needs to establish a path to a cetain ole in a 63

7 A 1 B 1 Coss Links Path Discovey Messages A 2 A 3 D 2 D 1 D 3 B 2 C 1 C 2 C 3 (a) Poactive Path Discovey A 1 B 1 Coss Links Path Discovey Requests A 2 A 3 D 2 D 1 D 3 B 2 C 1 C 2 C 3 (b) On-demand Path Discovey Figue 5: Examples of poactive and on-demand path discovey taget domain, a path equest message is geneated by the home domain and is sent on its outgoing coss links Upon eceiving the path equest message, the eceiving domain pefoms a path evaluation based on the basic path linking ules If the path is accepted, the domain updates the path and esends the equest though its coss link excluding the coss links that involve domains aleady included in the path This ensues that the path is loop fee and educes the numbe of esent equests Figue 5(b) shows an example of a on-demand path discovey initiated by domain A to detemine oles eachable at domain D fom ole A3 The solid aows show the path discovey messages; note that domains B does not fowad the equest on the coss link ( B2, A1 ) as domain A is in the computed path Also, note that domain D does not fowad the equest on the coss link ( D3, B2 ) as domain B is in the computed path Figue 6 shows the algoithm executed when a domain j eceives a path equest fom a neighboing domain Afte sending the path equest the home domain waits fo a timeout peiod of T max If no eply aives fom the taget domain then this means thee ae no secue paths fom home domain to the taget domain The value of T max is assigned based on the numbe of collaboating domains The path authenticity is ensued by using the path signatue scheme discussed in Section 6 as the path equest message takes the path taken by the actual access equest The majo advantage of on-demand path discovey is that it saves netwok bandwidth because it limits the amount of bandwidth consumed in the exchange of path discovey infomation by maintaining paths to only those taget domains to which the domains need to collaboate with The home domain could include constaints on the equested path, to futhe educe the path discovey taffic Fo example, the equest could include a list of domains that should o should not be included in the path discovey On-demand path discovey also obviates the need fo disseminating path discovey infomation peiodically, o flooding such infomation wheneve a coss link changes o when a domain leaves o joins the collaboation envionment The pimay poblem with on-demand path discovey is the lage latency at the beginning of the collaboation caused by popagation of the path equest message 73 Path Selection Both path discovey algoithms could etun multiple secue paths between the home and taget domains The home domain, selects one path accoding to a selection citeia The selection citeia is based on the path popeties which include: Path length: The path having the shotest length in tems of the numbe of visited domains is selected Visited domains: Select the path that contains a cetain set of domains o visits domains accoding to a cetain sequence Composite domain eputation: Domains could be given eputation metics and the path eputation is computed using the domains included in the path, and the path having the highest eputation be selected 8 SECURITY ANALYSIS In this section we discuss some secuity attacks that could be pefomed in a mediato-fee collaboation envionment Moeove, we show that ou secue famewok is esilient to these attacks Path Couption The access path is one of the main elements equied when making access contol decisions A malicious domain may attempt to alte the access path by emoving o adding enties to the 64

8 Input: Request = (Taget Domain T, Path P, Path Signatue SP) aiving to domain j fom domain i via coss link ( X i, E j ) Algoithm: 1 Check Path signatue SP, if invalid dop equest, End 2 Check the Path linking ules on P and link ( X i, E j ), if insecue path then dop equest, End 3 If P > Pmax then dop equest, End 4 If domain j is equal to the taget domain T (a) Update path P new = P E j (b) Geneate path signatue SP new = SIGN ej (SP h( E j )) (c) Send Path Request Reply =(P new, SP new) to Home domain in P 5 Fo all coss links L = ( X j, E k ) F O j and ( E j, X j ) A j and domain k DP, (a) Update path P new = P E j X j (b) Geneate path signatue SP new (c) Send Request = (Taget Domain T, P new, SP new) to domain k 6 End Figue 6: Algoithm executed by domain j upon eceiving a path equest cuent access path The path couption could be divided into two types of attacks, namely path insetion and deletion The path insetion attack is pefomed by an attacke in an attempt to inset a domain in the path Given P i = {1 E, 1 X,, i E, i X }, the attacke attempts to change it by inseting oles y E, y X in the path sting, P i = { 1 E, 1 X,, k E, k X, y E, y X, k+1, E k+1, X, i E, i X } Figue 7(b) shows such an attack The attacke is unable to geneate the signatue of the new path SP i as this equies the geneation of new signatues SP j, k j i and this equies the knowledge of the secet keys e j, fo k j i This shows that this path cannot be authenticated by the attacke The path deletion attack is pefomed by an attacke in an attempt to delete a domain in the path Given P i = {1 E, 1 X,, i E, i X } the attacke attempts to change it by deleting oles E k, X k in the path sting, P i = { E 1, X 1,, E k 1, X k 1, E k+1, X k+1,, E i, X i } Figue 7(c) shows such an attack The attacke is unable to geneate the signatue of the new path SPi as this equies the geneation of new signatues SPj, j {k 1, k + 1,, i}, which equies the knowledge of the coesponding secet keys This shows that this path cannot be authenticated by the attacke Note that othe types of attacks such as path eodeing ae not possible because the attacke cannot pove the authenticity of such path Anothe type of attack in which domains in the collaboation collude to foge an access path, in this case two o moe domains agee to povide coss links which did not exist Howeve, if these coss links only involve the colluding domains then this cannot be an attack because both domains ageed to povide such coss link If the coss links involve domains othe than the colluding domains, then this is easily detected fom the path signatue and when the path linking ules ae executed (a) Oiginal Path P y 4 (b) Path Insetion Attack (c) Path Deletion Attack Figue 7: Types of path couption attacks Path Replay Attacks An attacke could captue a equest submitted duing a valid session and ty to eplay such a equest This attack is not possible as fo each session a new seed is used to authenticate the path and thus the captued equest will have an old seed Denial of Sevice An attacke would equest a ole via a path that contains a loop P = { 1, 2,, n, 1, 2, } and epeat such equests infinitely to incease the path size infinitely Such an attack can be easily dealt with by intoducing a bound on the pemissible path size, which is basically the path cadinality constaint mentioned in Section 51, and the pemissible path size can be set to double the numbe of domains pesent in the collaboation Violations of the Resticted Relation R In this attack a malicious domain involved in a esticted ac- 65

9 cess elation does not hono such elations In such a case this domain gives access to a use that violates the esticted access elation R This attack is easily detected by the neighboing domain, as such ole access will be ecoded in the use s access path Futhemoe, violating the esticted access elation will only diectly affect the secuity of the malicious domain Thus domains that do not abide by the path linking ules cause secuity violations to thei own secuity policies 9 RELATED WORK The poblem of secue inteopeation in a multi-domain envionment has been addessed in [11, 4] In paticula, Li Gong et al [11] chaacteized the popeties that must be satisfied to compose a global secue policy They poposed the maximal secue inteopeability poblem and detemined its complexity to be NP-Complete In all such appoaches a tusted thid paty that has a global view of the collaboation envionment is equied to pefom the secue policy composition and integation Dawson et al [7] pesented a mediato based appoach to povide secue inteopeability fo heteogeneous databases This appoach assumes a mandatoy access contol policy, such as the Bell LaPadula [2] policy, which is not flexible and not applicable in many commecial applications Futhemoe, all access equests go though the cental mediato which has a global view of the collaboation envionment This appoach is thus not appopiate fo a dynamic distibuted envionment Othe appoaches elated to centalized database collaboation have been poposed in [20, 15, 24, 25] Also these appoaches have limited applicability because assume a centalized global view of the systems to be inteopeated 10 CONCLUSIONS In this pape, we have pesented a mediato-fee collaboation envionment in which domains collaboate in making localized access contol decisions We pesented a famewok to enable collaboation in such an envionment whee domains collaboate secuely without needing a tusted mediato and without needing a global view of the collaboation envionment In ou famewok the use s access path is used to povide domains with enough infomation to make secue access contol decisions using both basic and extended path linking ules We also povided a path authentication scheme that ensues that the path is not tampeed with as it popagates between domains Futhemoe, we have povided poactive and on-demand path discovey algoithms that enable domains to discove available multi-hop collaboations We also analyzed seveal secuity attacks that could be pefomed and showed how ou famewok can easily handle such attacks 11 ACKNOWLEDGMENTS The eseach of Mohamed Shehab and Aif Ghafoo has been suppoted by the sponsos of the Cente fo Education and Reseach in Infomation Assuance and Secuity (CERIAS) at Pudue Univesity, and the National Science Foundation unde NSF Gant IIS The eseach by Elisa Betino was suppoted in pat by the NSF unde the Poject The Design and Use of Digital Identities, by an IBM Fellowship, and by the sponsos of CERIAS at Pudue Univesity 12 REFERENCES [1] H Afsamanesh, C Gaita, and L Hetzbege Vitual Entepises and Fedeated Infomation Shaing In DEXA 98: Poceedings of the 9th Intenational Confeence Database and Expet Systems Applications, pages , Aug 1998 [2] D Bell and L LaPadula Secue Compute Systems: Mathematical Foundations Technical Repot MTR-2547, 1, Mach 1973 [3] E Betino, E Feai, and V Atlui The Specification and Enfocement of Authoization Constaints in Wokflow Management Systems ACM Tansactions on Infomation and Systems Secuity, 2(1):65 104, Feb 1999 [4] P Bonatti, M Sapino, and V Subahmanian Meging Heteogenous Secuity Odeings Jounal of Compute Secuity, 5(1):3 29, 1997 [5] D Bewe and M Nash The Chinese Wall Secuity Policy In Poceedings of IEEE Symposium on Secuity and Pivacy, pages , 1989 [6] J Campton On Pemissions, Inheitance and Role Hieachies In CCS 03: Poceedings of the 10th ACM confeence on Compute and communications secuity, pages ACM Pess, Oct 2003 [7] S Dawson, S Qian, and P Samaati Poviding Secuity and Inteopeation of Heteogeneous Systems Distibuted Paallel Databases, 8(1): , 2000 [8] A Desai and N Awad Special Issue on Adaptive Complex Entepises Communications of ACM, 48(5), May 2005 [9] D Feaiolo, D Kuhn, and R Chandamouli Role-Based Access Contol Atech House, Ap 2003 [10] D Feaiolo, R Sandhu, S Gavila, D Kuhn, and R Chandamouli Poposed NIST Standad fo Role-Based Access Contol ACM Tansactions on Infomation and Systems Secuity, 4(3): , Aug 2001 [11] L Gong and X Qian The Complexity and Composability of Secue Inteopeation In Poceedings of IEEE Symposium on Secuity and Pivacy, pages IEEE Compute Society, 1994 [12] L Gong and X Qian Computational Issues in Secue Inteopeation IEEE Tansaction on Softwae and Engineeing, 22(1), Jan 1996 [13] Y Hu, A Peig, and D Johnson Aiadne: A Secue On-demand Routing Potocol fo Adhoc Netwoks In MobiCom 02: Poceedings of the 8th annual intenational confeence on Mobile computing and netwoking, pages ACM Pess, Sept 2002 [14] D Johnson, D Maltz, and J Boch DSR: The Dynamic Souce Routing Potocol fo Multihop Wieless Adhoc Netwoks Ad hoc netwoking, pages , 2001 [15] D Jonsche and K Dittich An Appoach fo Building Secue Database Fedeations In VLDB 94: Poceedings of the 20th Intenational Confeence on Vey Lage Data Bases, pages 24 35, Santiago de Chile, Chile, Sept 1994 Mogan Kaufmann 66

10 [16] N Li, Z Bizi, and M Tipunitaa On Mutually Exclusive Roles and Sepaation of Duty In CCS 04: Poceedings of ACM Confeence on Compute and Communications Secuity, Oct 2004 [17] H Ludwig, C Bussle, M Shan, and P Gefen Coss-Oganisational Wokflow Management and Co-odination In WACC 99: Poceedings of the Wokshop on Coss-Oganisational Wokflow Management and Co-odination, Feb 1999 [18] J Madhavan, P Benstein, A Doan, and A Halevy Copus-Based Schema Matching In ICDE 05: Poceedings of the Twenty Fist Intenational Confeence on Data Engineeing, Apil 2005 [19] J Madhavan and A Halevy Composing Mappings Among Data Souces In VLDB 2003 : Poceedings of the Twenty Ninth Intenational Confeence on Vey Lage Databases, 2003 [20] M Mogensten, T Lunt, B Thuaisingham, and D Spoone Secuity Issues in Fedeated Database Systems: Panel Contibutions In Results of the IFIP WG 113 Wokshop on Database Secuity V, pages Noth-Holland, 1992 [21] R Ramnath and D Landsbegen IT-Enabled Sense-and-Respond Stategies in Complex Public Oganizations Communications of ACM, 48(5):58 64, May 2005 [22] R Rivest, A Shami, and L Adleman A Method fo Obtaining Digital Signatues and Public-Key Cyptosystems Communications of the ACM, 21(2): , Feb 1978 [23] R Sandhu, E Coyne, H Feinstein, and C Youman Role-Based Access Contol Models IEEE Compute, 29(2):38 47, Feb 1996 [24] S Vimecati and P Samaati Authoization Specification and Enfocement in Fedeated Database Systems Jounal of Compute Secuity, 5(2): , 1997 [25] G Wiedehold, M Bilello, and C Donahue Web Implementation of a Secuity Mediato fo Medical Databases In Poceedings of the IFIP TC11 WG113 Eleventh Intenational Confeence on Database Secuty XI, pages 60 72, London, UK, UK, 1998 Chapman & Hall, Ltd 67

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Access Control Mechanisms for Inter-organizational Workflow

Access Control Mechanisms for Inter-organizational Workflow Access Contol Mechanisms fo Inte-oganizational Wokflo Myong H. Kang, Joon S. Pak and Judith N. Fosche Naval Reseach Laboatoy Infomation Technology Division 4555 Ovelook Ave. Washington, DC 20375 {mkang,

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

IBM Optim Query Tuning Offerings Optimize Performance and Cut Costs

IBM Optim Query Tuning Offerings Optimize Performance and Cut Costs IBM Optim Quey Tuning Offeings Optimize Pefomance and Cut Costs Saghi Amisoleymani Solution Achitect Integated Data Management amisole@us.ibm.com June 9, 2010 Disclaime Copyight IBM Copoation [cuent yea].

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

User Group testing report

User Group testing report Use Goup testing epot Deliveable No: D6.10 Contact No: Integated Poject No. 506723: SafetyNet Aconym: SafetyNet Title: Building the Euopean Road Safety Obsevatoy Integated Poject, Thematic Pioity 6.2 Sustainable

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

A General Characterization of Representing and Determining Fuzzy Spatial Relations

A General Characterization of Representing and Determining Fuzzy Spatial Relations 7 The Intenational Aab Jounal of Infomation Technolog A Geneal Chaacteization of Repesenting and Detemining Fuzz Spatial Relations Lui Bai and Li Yan 2 College of Infomation Science and Engineeing, Notheasten

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

An Identification Protocol based the secure USB

An Identification Protocol based the secure USB An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3 A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering Fuzz Constaint-ased Routing lgoithm fo Taffic Engineeing Junaid. Khan and Hussein M. lnuweii Depatment of Electical & Compute Engineeing, 2356 Main Mall, Univesit of itish Columbia, Vancouve,.C. Canada,

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

RBAC Tutorial. Brad Spengler Open Source Security, Inc. Locaweb

RBAC Tutorial. Brad Spengler Open Source Security, Inc. Locaweb RBAC Tutoial Bad Spengle Open Souce Secuity, Inc. Locaweb - 2012 Oveview Why Access Contol? Goals Achitectue Implementation Lookup example Subject example Questions/Requests Why Access Contol? Access Contol

More information

Automation Testing Frameworks for SharePoint application

Automation Testing Frameworks for SharePoint application Intenational Jounal of Compute Sciences and Engineeing Open Access Reseach Pape Volume-3, Issue-11 E-ISSN: 2347-2693 Automation Testing Famewoks fo ShaePoint application Madhu Dande 1 *, Neelima Galla

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

TCBAC: An Access Control Model for Remote Calibration System

TCBAC: An Access Control Model for Remote Calibration System JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 339 TCBAC: An Access Contol Model fo Remote Calibation System Zhuokui Wu School of Mechanical & Automotive Engineeing, South China Univesity of Technology,

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Journal of Network and Computer Applications

Journal of Network and Computer Applications Jounal of Netwok and Compute Applications 34 (211) 135 142 Contents lists available at ScienceDiect Jounal of Netwok and Compute Applications jounal homepage: www.elsevie.com/locate/jnca Optimization of

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System

A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System A Caching Algoithm using Evolutionay Game Theoy in a File-Shaing System Masahio Sasabe Cybemedia Cente Osaka Univesity 1-32 Machikaneyama-cho, Toyonaka-shi Osaka 56-43, Japan m-sasabe@cmc.osaka-u.ac.jp

More information

Hierarchical Region Mean-Based Image Segmentation

Hierarchical Region Mean-Based Image Segmentation Hieachical Region Mean-Based Image Segmentation Slawo Wesolkowski and Paul Fieguth Systems Design Engineeing Univesity of Wateloo Wateloo, Ontaio, Canada, N2L-3G1 s.wesolkowski@ieee.og, pfieguth@uwateloo.ca

More information

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems Achievable Catalog Size in Pee-to-Pee Video-on-Demand Systems Yacine Boufkhad, Fabien Mathieu, Fabien De Montgolfie, Diego Peino, Lauent Viennot To cite this vesion: Yacine Boufkhad, Fabien Mathieu, Fabien

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information