No abstract available.
UK e-Science pilot project DAME: context, lessons learned & future
In November 2000 funding of 213M was made available for a new UK e-Science programme, with allocations to programmes within each of the UKs Research Councils. Also a Core e-Science Programme was formed as a cross-Council activity to develop and broker ...
Intelligent cache management for data grid
Data grid is a composition of different services for accessing and manipulating data in a distributed environment. One of the major problems is high access time of remote queries in the data grid. In this paper we present a scheme for data cache ...
A portal for grid-enabled physics
This paper presents the motivation for development and implementation of a computational portal for the processing of astrophysical and high energy physics data on global Grids. The requirements for the portal, its design, and choices leading to the ...
Grid computing in Europe: from research to deployment
Grid Computing has, over the past few years, matured sufficiently to make it a viable solution for real-world problems. However, there are many different toolkits today that allow to build a Grid environment. And while this wealth of different solutions ...
Grendel: a bioinformatics web service-based architecture for accessing HPC resources
Bioinformatics is an important application area for grid computing. Bioinformatics applications exported over a grid have the potential to facilitate transparent access to high performance computing (HPC) resources to a range of stakeholders. These ...
G2-P2P: a fully decentralised fault-tolerant cycle-stealing framework
Existing cycle-stealing frameworks are generally based on simple client-server or hierarchical style architectures. G2:P2P moves cycle-stealing into the "pure" peer-to-peer (P2P), or fully decentralised arena, removing the bottleneck and single point of ...
A dynamic job grouping-based scheduling for deploying applications with fine-grained tasks on global grids
Although Grids have been used extensively for executing applications with compute-intensive jobs, there exist several applications with a large number of lightweight jobs. The overall processing undertaking of these applications involves high overhead ...
Integrating the MACHO data-set with the virtual observatory
A Virtual Observatory (VO) provides enhanced distributed access to online astronomical data-sets, and frequently incorporates data processing and visualisation facilities. Almost all critical aspects of data-grid research and technology are encountered ...
A simple virtual organisation model and practical implementation
The development of Grid middleware, such as the Globus Toolkit version 2, reached a level of maturity and stability in which it was possible to create widely distributed resource Grids. Within the last few years various experiences have arisen from the ...
An implementation of interactive jobs submission for grid computing portals
The Globus Toolkit has been widely used as middleware in Grid computing environments. Java CoG, Web Service and Portlet help to build Grid computing portals easily and productively. Many Grid Portals can provide a customizable interface allowing ...
A survey of watermarking techniques for non-media digital objects (invited talk)
The vast majority of the literature on watermarking has dealt with media such as images, video, and audio - all of which are ultimately destined for consumption by the human perceptual system. There has recently been growing interest in watermarking non-...
A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters
Semi-fragile watermark fragile to malicious modifications while robust to incidental manipulations is drawing many attentions in image authentication. However, watermark security has not received enough attention yet. Lifting scheme can construct second ...
Recovery of watermark using differential affine motion estimation
Digital watermarking techniques have been proposed to protect the copyright of multimedia data. Robustness against geometric distortion is one of the most important issues to be solved to increase the robustness of digital image watermarking systems. ...
Performance factors analysis of a wavelet-based watermarking method
The essential performance metrics of a robust watermark include robustness, imperceptibility, watermark capacity and security. In addition, computational cost is important for practicality. Wavelet-based image watermarking methods exploit the frequency ...
Trust requirements in identity management
Identity management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of identity management, serves to verify claims about holding specific identities. ...
Copyright conundrum: liability of ISPs for online copyright infringement
As digital rights holders become increasingly proactive in asserting their rights against infringers, Internet service providers ("ISPs") are more frequently becoming embroiled in online copyright infringement disputes. ISPs have, in turn, become ...
The impact of DRMs on personal use expectations and fair dealing rights
This study undertakes a review of fair dealing provisions in Australian copyright law and compares our fair dealing rights with the fair use rights under American law. It examines the impact of eight DRM systems providing music and films online on users' ...
DRM, trusted computing and operating system architecture
Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of decrypted digital content and the license enforcement mechanisms themselves is possible. This is difficult to achieve on an ...
Translation of rights expressions
Digital Rights Management (DRM) is concerned with the controlled distribution and usage of digital works in order to prevent unauthorized usage of digital content. A significant component of a DRM system is a well-defined language for expressing the ...
Characterizing dynamics of information leakage in security-sensitive software process
Minimizing information leakage is a crucial problem in DRM software development processes, where security information (e.g., device keys and S-BOX of CPRM systems) must be rigorously managed.This paper presents a method to evaluate the risk of ...
Countermeasures for attacks on satellite TV cards using open receivers
Digital content providers seek to restrict usage by implementing conditional access. One such scenario is the security aspects of digital video broadcast (DVB-S). There has been a history of attacks on this technology to circumvent any security measures ...
Applying web oriented technologies to implement an adaptive spread spectrum watermarking procedure and a flexible DRM platform
The advances in multimedia technologies have created opportunities for Internet pirates, who can copy multimedia documents and illegally distribute them, thus violating the legal rights of document owners or web content providers. Such a situation is an ...
Remote revocation of smart cards in a private DRM system
We describe a DRM smartcard-based scheme in which content access requests are not linked to a user's identity or smartcard, and in which compromised cards can be revoked without the need to communicate with any card (whether revoked or not). The scheme ...
Comparison of texts streams in the presence of mild adversaries
Text sifting is a method of quickly and securely identifying documents for database searching, copy detection, duplicate email detection and plagiarism detection. A small amount of text is extracted from a document using hash functions and is used as the ...
Index Terms
- Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44