Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala Jun 2011

A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala

Cornerstone 3 Reports : Interdisciplinary Informatics

No abstract provided.


Scalable Capability-Based Authorization For High-Performance Parallel File Systems, Nicholas Mills May 2011

Scalable Capability-Based Authorization For High-Performance Parallel File Systems, Nicholas Mills

All Theses

As the size and scale of supercomputers continues to increase at an
exponential rate the number of users on a given supercomputer will
only grow larger. A larger number of users on a supercomputer places a
greater importance on the strength of information security. Nowhere is
this requirement for security more apparent than the file system, as
users expect their data to be protected from accidental or deliberate
modification.
In spite of the ever-increasing demand for more secure file system
access the majority of parallel file systems do not implement a robust
security protocol for fear it will negatively impact ...


Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo Apr 2011

Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo

Faculty Scholarship at Penn Law

Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital ...


A Secure And Reliable In-Network Collaborative Communication Scheme For Advanced Metering Infrastructure In Smart Grid, Yun Ye, Yi Qian, Hamid Sharif Jan 2011

A Secure And Reliable In-Network Collaborative Communication Scheme For Advanced Metering Infrastructure In Smart Grid, Yun Ye, Yi Qian, Hamid Sharif

Faculty Publications in Computer & Electronics Engineering (to 2015)

We consider various security vulnerabilities of deploying Advanced Metering Infrastructure (AMI) in smart grid, and explore the issues related to confidentiality for customer privacy and customer behavior as well as message authentication for meter reading and control messages. There are only a very few research work on AMI authentications, and no work exists on confidentiality for user privacy and user behavior, from the best of our knowledge. In this paper, we propose an in-network collaborative scheme to provide secure and reliable AMI communications in smart grid, with smart meters interconnected through a multihop wireless network. In this approach, an AMI ...


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2011

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘placed’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of iterated function systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher ...


Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong Dec 2010

Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong

Hong-Ning Dai

There are a number of studies on using directional antennas in wireless networks. Many of them concentrate on analyzing the theoretical capacity improvement by using directional antennas. Other studies focus on designing proper Medium Access Control (MAC) protocols to improve the practical network throughput. There are few works on the security improvement using directional antennas. In this paper, we explore the benefits of directional antennas in security improvements on both singlehop and multi-hop wireless networks. In particular, we found that using directional antennas in wireless networks can significantly reduce the eavesdropping probabilities of both single-hop transmissions as well as multi-hop ...