Krithi Ramamritham (auth.), R. K. Ghosh, Hrushikesha Mohanty (eds.)3540240756, 9783540240754, 9783540305552
The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections on algorithms and modeling; systems, protocols, and performance; transactions and information dissemination; internet query and retrieval; protocol and replica management; ontologies and services; systems analysis and modeling; tools and techniques; systems security; intrusion detection and access control; networks and security; secured systems design; and security services.
Table of contents :
Front Matter….Pages –
Taming the Dynamics of Disributed Data….Pages 1-1
Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster….Pages 50-59
Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric….Pages 60-64
A Scalable and Robust QoS Architecture for WiFi P2P Networks….Pages 65-74
NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity….Pages 75-84
Energy Efficient Cache Invalidation in a Disconnected Mobile Environment….Pages 85-95
An Efficient Data Dissemination Schemes for Location Dependent Information Services….Pages 96-105
A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts….Pages 106-116
A Nested Transaction Model for LDAP Transactions….Pages 117-126
Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks….Pages 127-134
An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems….Pages 135-144
Cybersecurity: Opportunities and Challenges….Pages 145-145
Data in Your Space….Pages 2-20
Enabling Technologies for Harnessing Information Explosion….Pages 21-21
Fair Leader Election by Randomized Voting….Pages 22-31
An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks….Pages 32-41
Distributed Balanced Tables: A New Approach….Pages 42-49
Vulnerabilities and Threats in Distributed Systems….Pages 146-157
A TNATS Approach to Hidden Web Documents….Pages 158-167
Querying XML Documents from a Relational Database in the Presence of DTDs….Pages 168-177
SAQI: Semantics Aware Query Interface….Pages 178-193
Hybrid-Chord: A Peer-to-Peer System Based on Chord….Pages 194-203
A Generic and Flexible Model for Replica Consistency Management….Pages 204-209
An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks….Pages 210-216
The Roles of Ontology and Metadata Registry for Interoperable Databases….Pages 217-226
DHL: Semantically Rich Dynamic and Active Hyperlinks….Pages 227-236
User-Class Based Service Acceptance Policy Using Cluster Analysis….Pages 237-242
Tools and Techniques for Multi-site Software Development….Pages 243-243
Specifying a Mobile Computing Infrastructure and Services….Pages 244-254
Generating a Prototype from a UML Model of System Requirements….Pages 255-265
A Type System for an Aspect Oriented Programming Language….Pages 266-272
Secure Requirements Elicitation Through Triggered Message Sequence Charts….Pages 273-282
Framework for Safe Reuse of Software Binaries….Pages 283-293
Supporting Partial Component Matching….Pages 294-303
A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs….Pages 304-309
Pattern Semantic Link: A Reusable Pattern Representation in MDA Context….Pages 310-317
Compatibility Test and Adapter Generation for Interfaces of Software Components….Pages 318-328
A Modern Graphic Flowchart Layout Tool….Pages 329-335
A Flexible Authorization Framework for E-Commerce….Pages 336-345
Efficient Algorithms for Intrusion Detection….Pages 346-352
Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection….Pages 353-362
Using Schemas to Simplify Access Control for XML Documents….Pages 363-368
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions….Pages 369-378
Implementing Consistency Checking in Correlating Attacks….Pages 379-384
LSAD: Lightweight SYN Flooding Attack Detector….Pages 385-390
UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks….Pages 391-399
Tracing Attackers with Deterministic Edge Router Marking (DERM)….Pages 400-409
Distributing Key Updates in Secure Dynamic Groups….Pages 410-419
Succinct and Fast Accessible Data Structures for Database Damage Assessment….Pages 420-429
A Secure Checkpointing Protocol for Survivable Server Design….Pages 430-440
MobiCoin: Digital Cash for M-Commerce….Pages 441-451
Cellular Automata: An Ideal Candidate for a Block Cipher….Pages 452-457
NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images….Pages 458-467
Improving Feature Selection in Anomaly Intrusion Detection Using Specifications….Pages 468-468
Towards Automatic Learning of Valid Services for Honeypots….Pages 469-469
Back Matter….Pages –
Reviews
There are no reviews yet.