207 research outputs found
Recommended from our members
Trust Model for Optimized Cloud Services
Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or give less importance to uncertainty linked with the evidence. In this paper, we propose an uncertainty model and define our approach to compute opinion for cloud service providers. Using subjective logic operators along with the computed opinion values, we propose mechanisms to calculate the reputation of cloud service providers. We evaluate and compare our proposed model with existing reputation models
Recommended from our members
Opinion Model Based Security Reputation Enabling Cloud Broker Architecture
Recommended from our members
E-mail address categorization based on semantics of surnames
Surname (family name) analysis is used in geography to understand population origins, migration, identity, social norms and cultural customs. Some of these are supposedly evolved over generations. Surnames exhibit good statistical properties that can be used to extract information in names data set such as automatic detection of ethnic or community groups in names. An e-mail address, often contains surname as a substring. This containment may be full or partial. An e-mail address categorization based on semantics of surnames is the objective of this paper. This is achieved in two phases. First phase deals with surname representation and clustering. Here, a vector space model is proposed where latent semantic analysis is performed. Clustering is done using the method called averagelinkage method. In the second phase, an email is categorized as belonging to one of the categories (discovered in first phase). For this, substring matching is required, which is done in an efficient way by using suffix tree data structure. We perform experimental evaluation for the 500 most frequently occurring surnames in India and United Kingdom. Also, we categorize the e-mail addresses that have these surnames as substrings
Towards Transparency of IoT Message Brokers
In this paper we propose an ontological model for documenting provenance of MQTT message brokers to enhance the transparency of interactions between IoT agents
Recommended from our members
Using Digital Traces for User Profiling: the Uncertainty of Identity Toolset
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to distinct groups or classes have potential applications in targeted services, online fraud detection, extensive social sorting, and cyber-security. This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. More specifically, in this paper we discuss the design and implementation of two tools of the framework. The Twitter Geographic Profiler tool builds a map of the ethno-cultural communities of a person's friends on Twitter social media service. The E-mail Address Profiler tool identifies the probable identities of individuals from their e-mail addresses and maps their geographical distribution across the UK. To this end, this paper presents a framework for profiling the digital traces of individuals
Recommended from our members
Android Security: A Survey of Issues, Malware Penetration, and Defenses
Smartphones have become pervasive due to the availability of office applications, Internet, games, vehicle guidance using location-based services apart from conventional services such as voice calls, SMSes, and multimedia services. Android devices have gained huge market share due to the open architecture of Android and the popularity of its application programming interface (APIs) in the developer community. Increased popularity of the Android devices and associated monetary benefits attracted the malware developers, resulting in big rise of the Android malware apps between 2010 and 2014. Academic researchers and commercial antimalware companies have realized that the conventional signature-based and static analysis methods are vulnerable. In particular, the prevalent stealth techniques, such as encryption, code transformation, and environment-aware approaches, are capable of generating variants of known malware. This has led to the use of behavior-, anomaly-, and dynamic-analysis-based methods. Since a single approach may be ineffective against the advanced techniques, multiple complementary approaches can be used in tandem for effective malware detection. The existing reviews extensively cover the smartphone OS security. However, we believe that the security of Android, with particular focus on malware growth, study of antianalysis techniques, and existing detection methodologies, needs an extensive coverage. In this survey, we discuss the Android security enforcement mechanisms, threats to the existing security enforcements and related issues, malware growth timeline between 2010 and 2014, and stealth techniques employed by the malware authors, in addition to the existing detection methods. This review gives an insight into the strengths and shortcomings of the known research methodologies and provides a platform, to the researchers and practitioners, toward proposing the next-generation Android security, analysis, and malware detection techniques
Recommended from our members
Novel concept of multi-channel fiber optic surface plasmon resonance sensor
A novel multi-channel fiber optic surface plasmon resonance (SPR) sensor is reported. The sensing structure consists of a single-mode optical fiber, covered with a thin gold layer, which supports a surface plasmon (SP), and a Bragg grating. The Bragg grating induces coupling between the forward-propagating fundamental core mode and the back-propagating SP-cladding mode. As the SP-cladding modes are highly sensitive to changes in the refractive index of the surrounding medium, the changes can be accurately measured by spectroscopy of these hybrid modes. Multichannel capability is achieved by employing a sequence of Bragg gratings of different periods and their reading via the wavelength division multiplexing. Theoretical analysis and optimization based on the coupled-mode theory (CMT) is carried out and performance characteristics of the sensor are determined
Interacting Growth Walk - a model for hyperquenched homopolymer glass?
We show that the compact self avoiding walk configurations, kinetically
generated by the recently introduced Interacting Growth Walk (IGW) model, can
be considered as members of a canonical ensemble if they are assigned random
values of energy. Such a mapping is necessary for studying the thermodynamic
behaviour of this system. We have presented the specific heat data for the IGW,
obtained from extensive simulations on a square lattice; we observe a broad
hump in the specific heat above the -point, contrary to expectation.Comment: 4 figures; Submitted to PR
- …
