670 Hits in 6.9 sec

Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service

Gian Paolo Jesi, David Hales, Maarten van Steen
2007 First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007)  
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system.  ...  However, such services can be defeated easily by malicious nodes executing "hub attacks" which distort the PSS such that all nodes in the network, ultimately, only gain access to malicious nodes.  ...  In other words, we present a fully decenralized Secure Peer Sampling Service (SPSS). Previously, we proposed a centralized SPSS approach and obtained good results [6] .  ... 
doi:10.1109/saso.2007.32 dblp:conf/saso/JesiHS07 fatcat:ieioskds7zealhl6iwitsggx7i

A Best-Effort Mechanism for Service Deployment in Contributory Computer Systems

Daniel Lázaro Iglesias, Joan Manuel Marquès Puig, Josep Jorba Esteve
2009 2009 International Conference on Complex, Intelligent and Software Intensive Systems  
In parallel to these advances, peer-to-peer (P2P) networks have become popular among Internet users and a growing field of research for developing distributed systems with desirable features like decentralization  ...  These mechanisms are decentralized, scalable and failure tolerant.  ...  The security of the decentralized mechanisms is high since nodes register in a number of nodes, and therefore cannot be hidden by a single malicious node.  ... 
doi:10.1109/cisis.2009.39 dblp:conf/cisis/IglesiasME09 fatcat:dne4c4z5y5c75prhabsmfxf4zy

Cryptocurrency: The Present and the Future Scenario

Anusha Ramkumar Kommuru, Aastha Gupta, Manvi Chauhan
2022 International Journal for Research in Applied Science and Engineering Technology  
It is dependent on a secure distributed ledger data structure for the transactions.  ...  Abstract: Cryptocurrency is a digital means of exchange of non-physical or digital currencies.  ...  The payment with Ripple assures an open-source, decentralized, and peer-to-peer network that supports seamless transactions.  ... 
doi:10.22214/ijraset.2022.43812 fatcat:4mw7aqumdnf5bkbazz6lm4j65u

Project Data Categorization, Adoption Factors, and Non-Functional Requirements for Blockchain Based Digital Twins in the Construction Industry 4.0

Benjamin Teisserenc, Samad Sepasgozar
2021 Buildings  
The paper also identifies key factors and non-functional requirements necessary for the adoption of BCDTs in a decentralized and sustainable CI 4.0.  ...  This is promising for CI 4.0 to embrace a paradigm shift towards decentralized ecosystems of united BCDTs where trust, collaboration, data sharing, information security, efficiency, and sustainability  ...  Secondly, as BCT offers a paradigm shift from the traditional centralized data silos towards decentralized peer-to-peer networks, it is crucial to identify the key factors affecting the transition towards  ... 
doi:10.3390/buildings11120626 fatcat:7ozrgh5xyvcdfcoqpz3o3ng25e

Blockchain Technology and Decentralized Governance: Is the State Still Necessary?

Marcella Atzori
2015 Social Science Research Network  
Blockchain Technology and Decentralized Governance: is the State The core technology of Bitcoin, the blockchain, has recently emerged as a disruptive innovation with a wide range of applications, potentially  ...  While technological utopians urge the demise of any centralized institution, this paper advocates the role of the State as a necessary central point of coordination in society, showing that decentralization  ...  In a white paper published in November 2008, Satoshi Nakamoto proposed Bitcoin as the first electronic payment system based on a decentralized peer-to-peer network, without the need for a trusted third  ... 
doi:10.2139/ssrn.2709713 fatcat:rcze6k4gnvaqvoey6re75xmbci

Byzantine Fault Tolerance in Distributed Machine Learning : a Survey [article]

Djamila Bouhata, Hamouma Moumen
2022 arXiv   pre-print
Byzantine failures are still difficult to tackle due to their unrestricted nature; as a result, the possibility of generating arbitrary data.  ...  We offer an illustrative description of techniques used in BFT in DML, with a proposed classification of BFTs approaches in the context of their basic techniques.  ...  So, it's interesting coming up with new solutions with these variants to create a more robust, reliable, and secure DML. 3.  ... 
arXiv:2205.02572v1 fatcat:h2hkcgz3w5cvrnro6whl2rpvby

Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network

Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai
2012 Journal of Networks  
The aim is to identify elements (e.g., links) to which extra network protection can be applied so that the impact of such failure events, in terms of the number of connections affected, is minimized.  ...  Session migration, a key issue in pervasive communications, is evaluated with a user-centric vision.  ...  Thomas Repantis and Vana Kalogeraki [6] propose a decentralized trust management middleware for ad-hoc, peer-to-peer systems, based on reputation.  ... 
doi:10.4304/jnw.7.1.88-100 fatcat:7atjgdr7hngvfjvvfibte6d3pm

Deliverable D3.7 Consolidated Projects Summary Report

Alasdair Reid, Matias Barberis Rami
2021 Zenodo  
The NGI Trust project aims to support the development of a human- centric Internet, by developing a stronger European ecosystem of researchers, innovators and technology developers in the field of privacy  ...  This report is part of a project that has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No.825618  ...  In effect, users have to trust the security component of a service before they turn attention to privacy.  ... 
doi:10.5281/zenodo.5767430 fatcat:w2lxzgxktretjcv7h4xotz7xaq

IoT Security: Problems and a Centralized Adaptive Approach as a Solution

2021 Journal of Strategic Innovation and Sustainability  
This has left a huge hole in the security of these smart devices and your home that is using them.  ...  In this paper, we have proposed a centralized system that runs specialized software to be a secure middleman for all of these data connections to travel through.  ...  "Blockchain is a database ledger that stores registry of assets and transactions across a peer to peer (P2P) network."  ... 
doi:10.33423/jsis.v16i3.4443 fatcat:qqhneirumnaz3aiw3flot5yh5y

Humanode Whitepaper: You are [not] a bot [article]

Dato Kavazi, Victor Smirnov, Sasha Shilina, MOZGIII, MingDong Li, Rafael Contreras, Hardik Gajera, Dmitry Lavrenov, the Humanode Core
2021 arXiv   pre-print
Humanode combines different technological stacks to achieve a decentralized, secure, scalable, efficient, consistent, immutable, and sustainable financial network: 1) a bio-authorization module based on  ...  module as a blockchain layer 4) a cost-based fee system 5) a Vortex decentralized autonomous organization (DAO) governing system 6) a monetary policy and algorithm, Fath, where monetary supply reacts  ...  Key generation First, we sample random elements as follows: • sample s from the Gaussian distribution χ • take a random p 1 ∈ R q and the error e sampled from χ.  ... 
arXiv:2111.13189v1 fatcat:6pc4nj46sjdkvketwydvwh2ulu

Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges [article]

Sukhpal Singh Gill, Shreshth Tuli, Minxian Xu, Inderpreet Singh, Karan Vijay Singh, Dominic Lindsay, Shikhar Tuli, Daria Smirnova, Manmeet Singh, Udit Jain, Haris Pervaiz, Bhanu Sehgal, Sukhwinder Singh Kaila (+4 others)
2019 arXiv   pre-print
In order to understand current and future challenges of such system, there is a need to identify key technologies enabling future applications.  ...  Cloud computing plays a critical role in modern society and enables a range of applications from infrastructure to social media.  ...  For instance, a smart gateway collecting samples from a pacemaker can increase its sample prior to a heart attack, detected via pre-processing at the fog layer [22] , [25] , [29] .  ... 
arXiv:1911.01941v1 fatcat:seyqgzhqk5cwfdaav2dcjpv254

Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI [article]

Caroline Hillier
2022 arXiv   pre-print
The threat hunting lifecycle is a complex atmosphere that requires special attention from professionals to maintain security.  ...  This paper is a collection of recent work that gives a holistic view of the threat hunting ecosystem, identifies challenges, and discusses the future with the integration of artificial intelligence (AI  ...  malicious samples [54] .  ... 
arXiv:2204.11076v1 fatcat:jc3bghaiungxxlta5itgjnla2a

A global omics data sharing and analytics marketplace: Case study of a rapid data COVID-19 pandemic response platform [article]

Ibrahim Farah, Giada Lalli, Darrol Baker, Axel Schumacher
2020 medRxiv   pre-print
Based on the precision medicine platform Shivom, a novel and secure data sharing and data analytics marketplace, we developed a versatile pandemic preparedness platform that allows healthcare professionals  ...  However, although the COVID-19 pandemic has created a tidal wave of data, most patient data is siloed, not easily accessible, and due to low sample size, largely not actionable.  ...  What is needed is a platform that can store data in a secure, anonymized, and impenetrable manner with the goal of preventing malicious attacks or unauthorized access.  ... 
doi:10.1101/2020.09.28.20203257 fatcat:y2joa5ktwzdzznz4ughegq4nrq

A Sociology of Hackers

Tim Jordan, Paul Taylor
1998 Sociological Review  
Third, an exploration of the community's construction of a boundary, albeit fluid, between itself and its other, the computer security industry, is provided.  ...  Finally, a conclusion that rejects any pathologisation of hackers is offered.  ...  We became aware of John Howard's work too late for inclusion in this analysis (Howard, 1997) . 10 Academic (39.5%), commercial (41%), public service organisations (2.5%), other (14%) and some combination  ... 
doi:10.1111/1467-954x.00139 fatcat:tmoa7547qjdrlmdfrss32mmjfe

Workers and Intelligentsia in Late Imperial Russia: Realities, Representations, Reflections

Heather Hogan, Reginald E. Zelnik
2000 American Historical Review  
The result is a fascinating and detailed account of social and cultural transformation in a key period of Russian -and world -history.  ...  This volume, a collaboration of American, Russian, and West European scholars, illuminates the creation and complex dynamics of the Russian industrial working class from its peasant origins in the mid-nineteenth  ...  (false) sense of security as well as a shelter from the winter cold.  ... 
doi:10.2307/2651589 fatcat:pfw3rdfttvev5hbtsrbgwr3gqe
« Previous Showing results 1 — 15 out of 670 results