1,186 Hits in 15.3 sec

Self-Adaptation and Secure Information Flow in Multiparty Structured Communications: A Unified Perspective

Ilaria Castellani, Mariangiola Dezani-Ciancaglini, Jorge A. Pérez
2014 Electronic Proceedings in Theoretical Computer Science  
More specifically, we propose a model of self-adaptive, multiparty communications with secure information flow guarantees.  ...  We present initial results on a comprehensive model of structured communications, in which self- adaptation and security concerns are jointly addressed.  ...  Dezani was also partially supported by MIUR PRIN Project CINA Prot. 2010LHT4KM and Torino University/Compagnia San Paolo Project SALT.  ... 
doi:10.4204/eptcs.162.2 fatcat:6q277opryfdjlbetu3z4ytykbi

Self-adaptation and secure information flow in multiparty communications

Ilaria Castellani, Mariangiola Dezani-Ciancaglini, Jorge A. Pérez
2016 Formal Aspects of Computing  
More specifically, we propose a model of multiparty, self-adaptive communications with access control and secure information flow guarantees.  ...  We present a comprehensive model of structured communications in which self-adaptation and security concerns are jointly addressed.  ...  This work was supported by COST Action IC1201 BETTY (Behavioural Types for Reliable Large-Scale Software Systems) via a Short-Term Scientific Mission grant (funding a visit of Pérez to Torino).  ... 
doi:10.1007/s00165-016-0381-3 fatcat:j4ex3cisqfgqbn6qaxh7oyyehy

Event-based run-time adaptation in communication-centric systems

Cinzia Di Giusto, Jorge A. Pérez
2016 Formal Aspects of Computing  
We provide soundness results for binary and multiparty protocols.  ...  We equip our model with a type system that ensures communication safety and consistency properties: while safety guarantees absence of run-time communication errors, consistency ensures that update actions  ...  We are grateful to Ilaria Castellani, Mariangiola Dezani-Ciancaglini, and to the anonymous reviewers, whose remarks and suggestions helped us much to improve the paper.  ... 
doi:10.1007/s00165-016-0377-z fatcat:dqiglmrt3ncovoc4bfepzx5xqi

Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions

Zitian Liao, Shah Nazir, Habib Ullah Khan, Muhammad Shafiq, Shehzad Chaudhry
2021 Security and Communication Networks  
Several existing approaches are available to solve the issues of security of components from different perspectives in general while security evaluation is specific.  ...  The use of such components in a newly developed software system can save effort, time, and many resources.  ...  adaptations were compared in this framework. e framework includes three perspectives that are life cycle, security, and adaptation. e evaluation illustrated that in each adaptation approach the monitor  ... 
doi:10.1155/2021/6677867 fatcat:4plhb5inyzdkpda4445u23govu

Can blockchain link the future?

Liang Qiao, Shuping Dang, Basem Shihada, Mohamed-Slim Alouini, Robert Nowak, Zhihan Lv
2021 Digital Communications and Networks  
Blockchain, as a representation of decentralized technology, has attracted attention with its unique characteristics, such as irrevocability and security.  ...  Subsequently, we analyze the current lack of consensus mechanism, fault tolerance, and block capacity of the blockchain, and the integration of blockchain into 5G/6G mobile communication.  ...  Because of a chain structure, blockchain is suitable for supply chain tracking. First, its multiparty common maintenance features build a trust mechanism among users.  ... 
doi:10.1016/j.dcan.2021.07.004 fatcat:nmeiewwy45akljm5ul24fkr24y

Decentralized transactive energy community in edge grid with positive buildings and interactive electric vehicles

Ying Wu, Yanpeng Wu, Josep M. Guerrero, Juan C. Vasquez
2022 International Journal of Electrical Power & Energy Systems  
A comprehensive survey of currently known projects and startups on blockchain-based transactive energy for cross-sector local community with buildings and electric vehicles is provided in the end with  ...  the discussion of the open challenges and future perspectives for this promising area. 2020 compared to a pre-COVID environment [2] .  ...  at the grid-edge for establishing self-sufficient communities [111] .  ... 
doi:10.1016/j.ijepes.2021.107510 fatcat:4u65l6hyu5hnbgjnvfccr64xoa

A Dynamic Recursive Unified Internet Design (DRUID)

Joe Touch, Ilia Baldine, Rudra Dutta, Gregory G. Finn, Bryan Ford, Scott Jordan, Dan Massey, Abraham Matta, Christos Papadopoulos, Peter Reiher, George Rouskas
2011 Computer Networks  
DRUID's architecture is based on a single recursive block that can adapt to support a variety of communication functions, including parameterized mechanisms for hard/soft state, flow and congestion control  ...  DRUID is based on the fundamental concept of recursion, enabling a simple and direct network architecture that unifies the data, control, management, and security aspects of the current Internet, leading  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1016/j.comnet.2010.12.016 fatcat:qzsdiy2yrrhbtkdsxrkznwachy


Robin L. Turner
2004 Journal of international wildlife law and policy  
I situate community-based nature tourism ventures in a broader political economic context.  ...  Like many other protected areas in Africa, contemporary dynamics in the Makuleke Region are a product of dispossession, forced removal, and conservation.  ...  not be assumed to have created a unified collectivity.  ... 
doi:10.1080/13880290490883232 fatcat:ypempj2q55aandccoeai2nxqdu

Combining behavioural types with security analysis

Massimo Bartoletti, Ilaria Castellani, Pierre-Malo Deniélou, Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Jovanka Pantovic, Jorge A. Pérez, Peter Thiemann, Bernardo Toninho, Hugo Torres Vieira
2015 Journal of Logical and Algebraic Methods in Programming  
Behavioural types, which extend data types by describing also the structured behaviour of programs, are a widely studied approach to the enforcement of correctness properties in communicating systems.  ...  This paper offers a unified overview of proposals based on behavioural types which are aimed at the analysis of security properties.  ...  Acknowledgments We acknowledge support from COST Action IC1201 Behavioural Types for Reliable Large-Scale Software Systems (BETTY) and we thank the members of BETTY working group on Security (WG2) for  ... 
doi:10.1016/j.jlamp.2015.09.003 fatcat:rm7xhow7svfifmi7scszrk6ipm

A Fast and Verified Software Stack for Secure Function Evaluation

José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
and oblivious transfer; and iii. transparent application integration and communications via FRESCO, an open-source framework for secure multiparty computation (MPC).  ...  We present a high-assurance software stack for secure function evaluation (SFE).  ...  We thank Pierre-Yves Strub for his role in the development of EasyCrypt.  ... 
doi:10.1145/3133956.3134017 dblp:conf/ccs/AlmeidaBBDGLP17 fatcat:zhm3hxw7prgrdmfm63dybrc5vu

Information, communication and social networks: the innovative role of telecentres in rural Nepal

Atma Ram Ghimire
2013 Innovation and Development  
Acknowledgements I am indebted to many people for their inspiration, support and guidance without which this research was not possible at this late stage of my career.  ...  I would like to acknowledge their valuable contribution in completing this research. First of all, I would like to offer my heartfelt thanks to my supervisors Prof. Tim Turpin  ...  , with better information flows and online communications.  ... 
doi:10.1080/2157930x.2012.721530 fatcat:fy362jimy5dj7cfkm2sanhinny

Edge Learning for B5G Networks with Distributed Signal Processing: Semantic Communication, Edge Computing, and Wireless Sensing [article]

Wei Xu, Zhaohui Yang, Derrick Wing Kwan Ng, Marco Levorato, Yonina C. Eldar, M'erouane Debbah
2022 arXiv   pre-print
In addition, from the viewpoint of information theory, we identify fundamental open problems of characterizing rate regions for communication networks supporting distributed learning-and-computing tasks  ...  Also, recent achievements of enabling techniques for the dual-functional design are surveyed with exemplifications from the mutual perspectives of "communications for learning" and "learning for communications  ...  In order to protect privacy, a secure multiparty computation algorithm was proposed for FL in [53] .  ... 
arXiv:2206.00422v1 fatcat:osp426emrngi3bvye6fmk7kqce


2021 2021 National Conference on Communications (NCC)  
However, with the programmability in a Turing complete language, came the possibility of bugs in smart contracts and thereby security vulnerabilities.  ...  In the final portion of the talk, we attempt to go beyond sparsity. In particular, we may try to find the DFT when more structural information on the spectral support is available.  ...  Just to give a perspective, think about self-driving cars. When, where, and how did we begin this journey and where are we now in this journey?  ... 
doi:10.1109/ncc52529.2021.9530194 fatcat:ahdw5ezvtrh4nb47l2qeos3dwq

Survey on Multi-Access Edge Computing for Internet of Things Realization

Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, Tarik Taleb
2018 IEEE Communications Surveys and Tutorials  
In this survey, we provide a holistic overview on the exploitation of MEC technology for the realization of IoT applications and their synergies.  ...  IoT is identified as a key use case of MEC, given MEC's ability to provide cloud platform and gateway services at the network edge.  ...  and communication trust, secure multiparty computation, user trust, and application trust.  ... 
doi:10.1109/comst.2018.2849509 fatcat:fnksr3dbqfakzfvnopyyxjdlfm

Design of an Interactive Two-Way Telemedicine Service System for Smart Home Care for the Elderly

Fang Li
2021 Journal of Healthcare Engineering  
The method uses a unified data format and adaptation process constraints to achieve centralized management of heterogeneous data from multiple sources, which provide a unified data support service for  ...  Secondly, a multiformat data adaptation method is designed for the problem that the data to be provided and processed are in various formats.  ...  At the same time, the gateway will standardize and adapt the valid data in the local database and carry out unified storage of platform data.  ... 
doi:10.1155/2021/6632865 pmid:33936578 pmcid:PMC8060097 fatcat:4g3tapnko5botcohmy7n27p67i
« Previous Showing results 1 — 15 out of 1,186 results