Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJanuary 2006
Formal analysis of card-based payment systems in mobile devices
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 213–220To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-...
- ArticleJanuary 2006
Logcrypt: forward security and public verification for secure audit logs
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 203–211Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We build on prior work by showing how log creation can be separated from log ...
- ArticleJanuary 2006
Description of bad-signatures for network intrusion detection
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 175–182Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems normally use stochastic approaches or a rule-based system to detect ...
- ArticleJanuary 2006
Event sequence mining to develop profiles for computer forensic investigation purposes
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 145–153Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators can often be used to establish a view of regular usage patterns which can ...
- ArticleJanuary 2006
Modelling denial of service attacks on JFK with Meadows's cost-based framework
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 125–134We present the first detailed application of Meadows's cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an ...
-
- ArticleJanuary 2006
Redundant parallel data transfer schemes for the grid environment
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 71–78In this paper, we proposed dynamic co-allocation schemes for parallel data transfer in a grid environment, which copes up with highly inconsistent network performances of the servers. We have developed an algorithm using circular queue, with which, the ...
- ArticleJanuary 2006
Simulating a computational grid with networked animat agents
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 63–70Computational grids are now widespread, but their large-scale behaviour is still poorly understood. We report on some calculations of loading, scaling and utilisation behaviours of computational grids, based on simulations. We employ animat agents on a ...
- ArticleJanuary 2006
A template based static coalition protocol: a3P viGrid
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 55–62Problems such as resource and service discovery models, load balancing and scheduling, brokering are eminent in grid systems due to bottlenecks such as bandwidth and network traffic in the underlying communication infrastructures and their associated ...
- ArticleJanuary 2006
An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computing
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 33–39The conventional computing Grid has developed a service oriented computing architecture with a super-localresource management and scheduling strategy. This architecture is limited in modeling computer systems with highly dynamic and autonomous computing ...
- ArticleJanuary 2006
Improving resource utilisation in market oriented grid management and scheduling
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 25–31Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisation of large scale gridsystems requires the provision of mechanisms to share ...