Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communication (2)
- Communication Technology and New Media (2)
- Computer Law (2)
- Computer Sciences (2)
- Computer and Systems Architecture (2)
-
- Digital Communications and Networking (2)
- Law (2)
- Physical Sciences and Mathematics (2)
- Social and Behavioral Sciences (2)
- Business (1)
- Business Law, Public Responsibility, and Ethics (1)
- Communications Law (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- E-Commerce (1)
- Internet Law (1)
- Mass Communication (1)
- Privacy Law (1)
- Public Affairs, Public Policy and Public Administration (1)
- Science and Technology Law (1)
- Science and Technology Policy (1)
- Science and Technology Studies (1)
- Theory and Algorithms (1)
- Institution
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala
A Web Application For Financial Trading Simulation, Li-Chiou Chen, Lixin Tao, Padma Kadiyala
Cornerstone 3 Reports : Interdisciplinary Informatics
No abstract provided.
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
All Faculty Scholarship
This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
Conference papers
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘placed’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of iterated function systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …
A Secure And Reliable In-Network Collaborative Communication Scheme For Advanced Metering Infrastructure In Smart Grid, Yun Ye, Yi Qian, Hamid Sharif
A Secure And Reliable In-Network Collaborative Communication Scheme For Advanced Metering Infrastructure In Smart Grid, Yun Ye, Yi Qian, Hamid Sharif
Department of Electrical and Computer Engineering: Faculty Publications (to 2015)
We consider various security vulnerabilities of deploying Advanced Metering Infrastructure (AMI) in smart grid, and explore the issues related to confidentiality for customer privacy and customer behavior as well as message authentication for meter reading and control messages. There are only a very few research work on AMI authentications, and no work exists on confidentiality for user privacy and user behavior, from the best of our knowledge. In this paper, we propose an in-network collaborative scheme to provide secure and reliable AMI communications in smart grid, with smart meters interconnected through a multihop wireless network. In this approach, an AMI …