Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer and Systems Architecture (3)
- Digital Communications and Networking (3)
- Communication (2)
- Communication Technology and New Media (2)
- Computer Law (2)
-
- Computer Sciences (2)
- Law (2)
- Physical Sciences and Mathematics (2)
- Social and Behavioral Sciences (2)
- Business (1)
- Business Law, Public Responsibility, and Ethics (1)
- Communications Law (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- E-Commerce (1)
- Electrical and Computer Engineering (1)
- Internet Law (1)
- Mass Communication (1)
- Privacy Law (1)
- Public Affairs, Public Policy and Public Administration (1)
- Science and Technology Law (1)
- Science and Technology Policy (1)
- Science and Technology Studies (1)
- Systems and Communications (1)
- Theory and Algorithms (1)
- Institution
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala
A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala
Cornerstone 3 Reports : Interdisciplinary Informatics
No abstract provided.
Scalable Capability-Based Authorization For High-Performance Parallel File Systems, Nicholas Mills
Scalable Capability-Based Authorization For High-Performance Parallel File Systems, Nicholas Mills
All Theses
As the size and scale of supercomputers continues to increase at an
exponential rate the number of users on a given supercomputer will
only grow larger. A larger number of users on a supercomputer places a
greater importance on the strength of information security. Nowhere is
this requirement for security more apparent than the file system, as
users expect their data to be protected from accidental or deliberate
modification.
In spite of the ever-increasing demand for more secure file system
access the majority of parallel file systems do not implement a robust
security protocol for fear it will negatively impact …
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
All Faculty Scholarship
This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
Conference papers
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘placed’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of iterated function systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …
A Secure And Reliable In-Network Collaborative Communication Scheme For Advanced Metering Infrastructure In Smart Grid, Yun Ye, Yi Qian, Hamid Sharif
A Secure And Reliable In-Network Collaborative Communication Scheme For Advanced Metering Infrastructure In Smart Grid, Yun Ye, Yi Qian, Hamid Sharif
Department of Electrical and Computer Engineering: Faculty Publications (to 2015)
We consider various security vulnerabilities of deploying Advanced Metering Infrastructure (AMI) in smart grid, and explore the issues related to confidentiality for customer privacy and customer behavior as well as message authentication for meter reading and control messages. There are only a very few research work on AMI authentications, and no work exists on confidentiality for user privacy and user behavior, from the best of our knowledge. In this paper, we propose an in-network collaborative scheme to provide secure and reliable AMI communications in smart grid, with smart meters interconnected through a multihop wireless network. In this approach, an AMI …
Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong
Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong
Hong-Ning Dai
There are a number of studies on using directional antennas in wireless networks. Many of them concentrate on analyzing the theoretical capacity improvement by using directional antennas. Other studies focus on designing proper Medium Access Control (MAC) protocols to improve the practical network throughput. There are few works on the security improvement using directional antennas. In this paper, we explore the benefits of directional antennas in security improvements on both singlehop and multi-hop wireless networks. In particular, we found that using directional antennas in wireless networks can significantly reduce the eavesdropping probabilities of both single-hop transmissions as well as multi-hop …