iNetSec 2009 - Open Research Problems in Network Security


Book Description

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular,as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse,these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hands.




Open Research Problems in Network Security


Book Description

This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds.




Advanced Security and Privacy for RFID Technologies


Book Description

"This book addresses security risks involved with RFID technologies, and gives insight on some possible solutions and preventions in dealing with these developing technologies"--




Crisis Management: Concepts, Methodologies, Tools, and Applications


Book Description

"This book explores the latest empirical research and best real-world practices for preventing, weathering, and recovering from disasters such as earthquakes or tsunamis to nuclear disasters and cyber terrorism"--Provided by publisher.




Building Next-Generation Converged Networks


Book Description

Supplying a comprehensive introduction to next-generation networks, Building Next-Generation Converged Networks: Theory and Practice strikes a balance between how and why things work and how to make them work. It compiles recent advancements along with basic issues from the wide range of fields related to next generation networks. Containing the contributions of 56 industry experts and researchers from 16 different countries, the book presents relevant theoretical frameworks and the latest research. It investigates new technologies such as IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) architectures, standards, mobility, and security. Presenting the material in a manner that entry-level readers can easily grasp the fundamentals, the book is organized into five parts: Multimedia Streaming—deals with multimedia streaming in networks of the future—from basics to more in-depth information for the experts Safety and Security in Networks—addresses the issues related to security, including fundamental Internet and cyber-security concepts that will be relevant in any future network Network Management and Traffic Engineering—includes coverage of mathematical modeling-based works Information Infrastructure and Cloud Computing—integrates information about past achievements, present conditions, and future expectations in information infrastructure-related areas Wireless Networking—touches on the various aspects of wireless networks and technologies The text includes coverage of Internet architectures and protocols, embedded systems and sensor networks, web services, Cloud technologies, and next-generation wireless networking. Reporting on the latest advancements in the field, it provides you with the understanding required to contribute towards the materialization of future networks. This book is suitable for graduate students, researchers, academics, industry practitioners working in the area of wired or wireless networking, and basically anyone who wants to improve his or her understanding of the topics related to next-generation networks.




Fog Computing for Healthcare 4.0 Environments


Book Description

This book provides an analysis of the role of fog computing, cloud computing, and Internet of Things in providing uninterrupted context-aware services as they relate to Healthcare 4.0. The book considers a three-layer patient-driven healthcare architecture for real-time data collection, processing, and transmission. It gives insight to the readers for the applicability of fog devices and gateways in Healthcare 4.0 environments for current and future applications. It also considers aspects required to manage the complexity of fog computing for Healthcare 4.0 and also develops a comprehensive taxonomy.




Context in Computing


Book Description

This volume explores how context has been and can be used in computing to model human behaviors, actions and communications as well as to manage data and knowledge. It addresses context management and exploitation of context for sharing experience across domains. The book serves as a user-centric guide for readers wishing to develop context-based applications, as well as an intellectual reference on the concept of context. It provides a broad yet deep treatment of context in computing and related areas that depend heavily on computing. The coverage is broad because of its cross-disciplinary nature but treats topics at a sufficient depth to permit a reader to implement context in his/her computational endeavors. The volume addresses how context can be integrated in software and systems and how it can be used in a computing environment. Furthermore, the use of context to represent the human dimension, individually as well as collectively is explained. Contributions also include descriptions of how context has been represented in formal as well as non-formal, structured approaches. The last section describes several human behavior representation paradigms based on the concept of context as its central representational element. The depth and breadth of this content is certain to provide useful as well as intellectually enriching information to readers of diverse backgrounds who have an interest in or are intrigued by using context to assist in their representation of the real world.




Blockchain Scalability and its Foundations in Distributed Systems


Book Description

This practical new book offers the distributed-computing fundamental knowledge for individuals to connect with one another in a more secure and efficient way than with traditional blockchains. These new forms of secure, scalable blockchains promise to replace centralized institutions to connect individuals without the risks of user manipulations or data extortions. The techniques taught herein consist of enhancing blockchain security and making blockchain scalable by relying on the observation that no blockchain can exist without solving the consensus problem. First, the state-of-the-art of consensus protocols are analyzed, hence motivating the need for a new family of consensus protocols offering strong (deterministic) guarantees. Second, a didactic series of classic blockchain vulnerabilities is presented to illustrate the importance of novel designs better suited for the adversarial environment of open networks. These cutting-edge solutions are illustrated through the Redbelly blockchain design, which solves a different problem from the classic Byzantine consensus problem of 1982 and which delivers—in the modern blockchain context—high performance at large scale. Topics and features: Covers the combination of security and distributed computing to devise the new generation of blockchains Shows how blockchain has shed new light on decades of research in distributed systems Provides instruction on the security needed by the industry to use blockchains in production Explains didactically the necessary ingredients to make blockchain efficient at large scale Helps fill the gap of knowledge in the highly demanded blockchain sector This unique volume contains the building blocks to design secure and scalable blockchains. As such, it is dedicated to developers, application designers, and computer scientists and requires only a minimal undergraduate level in mathematics and computer science. Vincent Gramoli is an Australian Research Council Future Fellow at the University of Sydney and the Chief Technology Officer of Redbelly Network. He teaches the Blockchain Scalability course on Coursera.




IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications


Book Description

IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organizations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organizations interested in carrying out research in IT policies.




Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing


Book Description

Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific communities. Although advancements such as computational power, storage, networking, and infrastructure have aided in making major progress in the implementation and realization of cloud-based systems, there are still significant concerns that need to be taken into account. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing aims to present insight into Cloud principles, examine associated methods and technologies, and investigate the use of service-oriented computing technologies. In addressing supporting infrastructure of the Cloud, including associated challenges and pressing issues, this reference source aims to present researchers, engineers, and IT professionals with various approaches in Cloud computing.