Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nebraska - Lincoln (18)
- Technological University Dublin (7)
- University of New Haven (6)
- Florida International University (5)
- Old Dominion University (4)
-
- University of Pennsylvania Carey Law School (3)
- Embry-Riddle Aeronautical University (2)
- Liberty University (2)
- Santa Clara University (2)
- Singapore Management University (2)
- Syracuse University (2)
- City University of New York (CUNY) (1)
- Edith Cowan University (1)
- Fordham University (1)
- Marshall University (1)
- Missouri University of Science and Technology (1)
- Pace University (1)
- Purdue University (1)
- Rochester Institute of Technology (1)
- San Jose State University (1)
- Tennessee State University (1)
- Texas A&M University-Commerce (1)
- University of Connecticut (1)
- University of Kentucky (1)
- University of Massachusetts Amherst (1)
- University of Mississippi (1)
- University of North Dakota (1)
- University of Texas at El Paso (1)
- Publication Year
- Publication
-
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (6)
- Electrical & Computer Engineering and Computer Science Faculty Publications (6)
- Dissertations (5)
- FIU Electronic Theses and Dissertations (5)
- Library Philosophy and Practice (e-journal) (4)
-
- All Faculty Scholarship (3)
- Faculty Publications (3)
- Computer Science and Engineering (2)
- Conference papers (2)
- Department of Electrical and Computer Engineering: Faculty Publications (2)
- Department of Electrical and Computer Engineering: Faculty Publications (to 2015) (2)
- Electrical & Computer Engineering Faculty Publications (2)
- Electrical Engineering and Computer Science - All Scholarship (2)
- Research Collection School Of Computing and Information Systems (2)
- Senior Honors Theses (2)
- VMASC Publications (2)
- CSE Technical Reports (1)
- Computer Science Faculty Publications (1)
- Computer Science Faculty Research (1)
- Computer Science Faculty Research & Creative Works (1)
- Computer Sciences and Electrical Engineering Faculty Research (1)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (1)
- Cornerstone 3 Reports : Interdisciplinary Informatics (1)
- Data (1)
- Department of Electrical Engineering and Computer Science - Daytona Beach (1)
- Departmental Technical Reports (CS) (1)
- Faculty and Student Publications (1)
- Honors Scholar Theses (1)
- Information Science Faculty Publications (1)
- Information Technology Services: Publications (1)
Articles 61 - 70 of 70
Full-Text Articles in Engineering
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
All Faculty Scholarship
This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
Conference papers
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘placed’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of iterated function systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …
A Secure And Reliable In-Network Collaborative Communication Scheme For Advanced Metering Infrastructure In Smart Grid, Yun Ye, Yi Qian, Hamid Sharif
A Secure And Reliable In-Network Collaborative Communication Scheme For Advanced Metering Infrastructure In Smart Grid, Yun Ye, Yi Qian, Hamid Sharif
Department of Electrical and Computer Engineering: Faculty Publications (to 2015)
We consider various security vulnerabilities of deploying Advanced Metering Infrastructure (AMI) in smart grid, and explore the issues related to confidentiality for customer privacy and customer behavior as well as message authentication for meter reading and control messages. There are only a very few research work on AMI authentications, and no work exists on confidentiality for user privacy and user behavior, from the best of our knowledge. In this paper, we propose an in-network collaborative scheme to provide secure and reliable AMI communications in smart grid, with smart meters interconnected through a multihop wireless network. In this approach, an AMI …
Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba
Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba
Dissertations
The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.
Although, the adoption …
Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen
Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen
CSE Technical Reports
This paper describes DSFS, a decentralized security system for large parallel file system. DSFS stores global access control lists (ACLs) in a centralized decisionmaking server and pushes pre-authorization lists (PALs) into storage devices. Thus DSFS allows users to flexibly set any access control policy for the global ACL or even change the global ACL system without having to upgrade the security code in their storage devices. With pre-authorization lists, DSFS enables a networkattached storage device to immediately authorize I/O, instead of demanding a client to acquire an authorization from a centralized authorization server at a crucial time. The client needs …
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
All Faculty Scholarship
The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …
Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi
Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi
Conference papers
New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose …
A Formal Specification In Jml Of The Java Security Package, Poonam Agarwal, Carlos E. Rubio-Medrano, Yoonsik Cheon, Patricia J. Teller
A Formal Specification In Jml Of The Java Security Package, Poonam Agarwal, Carlos E. Rubio-Medrano, Yoonsik Cheon, Patricia J. Teller
Departmental Technical Reports (CS)
The Java security package allows a programmer to add security features to Java applications. Although the package provides a complex application programming interface (API), its informal description, e.g., Javadoc comments, is often ambiguous or imprecise. Nonetheless, the security of an application can be compromised if the package is used without a concrete understanding of the precise behavior of the API classes and interfaces, which can be attained via formal specification. In this paper, we present our experiences in formally specifying the Java security package in JML, a formal behavior interface specification language for Java. We illustrate portions of our JML …
Attack-Resistant Location Estimation In Wireless Sensor Networks, Dongdang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Kevin Du
Attack-Resistant Location Estimation In Wireless Sensor Networks, Dongdang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Kevin Du
Electrical Engineering and Computer Science - All Scholarship
Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments has been mostly overlooked. Most of the existing localization protocols for sensor networks are vulnerable in hostile environments. The security of location discovery can certainly be enhanced by authentication. However, the possible node compromises and the fact that location determination uses certain physical features (e.g., received signal strength) of radio signals make authentication not as effective as in traditional security applications. This paper presents two methods to tolerate malicious attacks against range-based location discovery in sensor networks. The …
Information Security System Rating And Ranking, Rayford B. Vaughn Jr., Ambareen Sira, David A. Dampier
Information Security System Rating And Ranking, Rayford B. Vaughn Jr., Ambareen Sira, David A. Dampier
Computer Sciences and Electrical Engineering Faculty Research
The term assurance has been used for decades in trusted system development to express the notion of confidence in the strength of a specific system or system of systems. The unsolved problem that security engineers must struggle with is the adoption of measures or metrics that can reliably depict the assurance associated with a specific hardware and software architecture. This article reports on a recent attempt to focus needs in this area and suggests various categories of information assurance metrics that may be helpful to an organization that is deciding which set is useful for a specific application.