Search For:

Displaying 1-50 out of 55 total
The Pudding of Trust
Found in: IEEE Intelligent Systems
By Steffen Staab, Bharat Bhargava, Leszek Lilien, Arnon Rosenthal, Marianne Winslett, Morris Sloman, Tharam S. Dillon, Elizabeth Chang, Farookh Khadeer Hussain, Wolfgang Nejdl, Daniel Olmedilla, Vipul Kashyap
Issue Date:September 2004
pp. 74-88
One current trend in intelligent systems is the issue of trust, which has appeared in many articles and recently some workshops. A big question is what kind of trust people want their computers to manage. This issue's essays examine different issues regard...
Measurements and Quality of Service Issues in Electronic Commerce Software
Found in: Application-Specific Software Engineering and Technology, IEEE Workshop on
By Anjali Bhargava, Bharat Bhargava
Issue Date:March 1999
pp. 26
The performance of network and communication software is a major concern for making the electronic commerce applications in a distributed environment a success. The quality of service in electronic commerce can generically be measured by convenience, priva...
Supporting Method Migration in a Distributed Object Database System: A Performance Study
Found in: Hawaii International Conference on System Sciences
By Shalab Goel, Bharat Bhargava, Yin-He Jiang
Issue Date:January 1996
pp. 31
We describe the model and implementation of two approaches for method execution in distributed object query processing. The first approach is the traditional data migration approach in which remote data accesses (if required) are made to compose an in-memo...
Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Nelcileno Virgilio Araujo De Souza,Ruy De Oliveira,Ed Wilson Tavares Ferreira,Valtemir Emerencio do Nascimento,Ailton Akira Shinoda,Bharat Bhargava
Issue Date:July 2013
pp. 271-276
Intrusions in computer networks have driven the development of various techniques for intrusion detection systems (IDSs). In general, the existing approaches seek two goals: high detection rate and low false alarm rate. The problem with such proposed solut...
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
Found in: IEEE Transactions on Dependable and Secure Computing
By Ahmet Burak Can,Bharat Bhargava
Issue Date:January 2013
pp. 14-27
Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other...
Extending Attack Graph-Based Security Metrics and Aggregating Their Application
Found in: IEEE Transactions on Dependable and Secure Computing
By Nwokedi Idika,Bharat Bhargava
Issue Date:January 2012
pp. 75-85
The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-...
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Found in: Reliable Distributed Systems, IEEE Symposium on
By Pelin Angin, Bharat Bhargava, Rohit Ranchal, Noopur Singh, Mark Linderman, Lotfi Ben Othmane, Leszek Lilien
Issue Date:November 2010
pp. 177-183
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP. In the traditional application-ce...
Protection of Identity Information in Cloud Computing without Trusted Third Party
Found in: Reliable Distributed Systems, IEEE Symposium on
By Rohit Ranchal, Bharat Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong Kang, Mark Linderman
Issue Date:November 2010
pp. 368-372
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant l...
A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation
Found in: Mobile Data Management, IEEE International Conference on
By Pelin Angin, Bharat Bhargava, Sumi Helal
Issue Date:May 2010
pp. 396-401
Context-awareness is a critical aspect of safe navigation especially for the blind and visually impaired in unfamiliar environments. Existing mobile devices for context-aware navigation fall short in many cases due to their dependence on specific infrastru...
The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation
Found in: Reliable Distributed Systems, IEEE Symposium on
By Yu Zhang, Bharat Bhargava, Philipp Hurni
Issue Date:September 2009
pp. 73-82
Self-propagating malware spreads over the network quickly and automatically. Malware propagation should be modeled accurately for fast detection and defense. State-of-the-art malware propagation models fail to consider a number of issues.First, the malware...
Adaptive Voice Spam Control with User Behavior Analysis
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Yan Bai, Xiao Su, Bharat Bhargava
Issue Date:June 2009
pp. 354-361
Spit (Spam over Internet Telephony), known as unsolicited bulk calls sent via VoIP networks, is a major problem that undermines the usability of VoIP.Countermeasures against spit face challenges in identifying and filtering spit in real time. A user behavi...
Found in: Distributed Computing Systems Workshops, International Conference on
By Bharat Bhargava, Leszek Lilien, Torsten Braun
Issue Date:June 2009
pp. 459
No summary available.
Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Bharat Bhargava, Ruy de Oliveira, Yu Zhang, Nwokedi C. Idika
Issue Date:June 2009
pp. 447-450
Since ad hoc networks rely on nodes cooperation to establish communication, malicious nodes can compromise the entire network. If they collaborate the devastation is even worse. Collaborative attacks may cause more devastating impacts on wireless environme...
Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach
Found in: Distributed Computing Systems Workshops, International Conference on
By Ed' Wilson Tavares Ferreira, Ruy de Oliveira, Gilberto Arantes Carrijo, Bharat Bhargava
Issue Date:June 2009
pp. 451-454
Wireless mesh network are very vulnerable to attacks by malicious users due to, mainly, the cooperation among their nodes. The methods for detection of attacks are grouped into two categories: analysis of anomalies and signatures. The former detects possib...
Self-Learning Disk Scheduling
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yu Zhang, Bharat Bhargava
Issue Date:January 2009
pp. 50-65
Performance of disk I/O schedulers is affected by many factors, such as workloads, file systems, and disk systems. Disk scheduling performance can be improved by tuning scheduler parameters, such as the length of read timers. Scheduler performance tuning i...
Tree-Based Data Broadcast in IEEE 802.15.4 and ZigBee Networks
Found in: IEEE Transactions on Mobile Computing
By Gang Ding, Zafer Sahinoglu, Philip Orlik, Jinyun Zhang, Bharat Bhargava
Issue Date:November 2006
pp. 1561-1574
This paper studies efficient and simple data broadcast in IEEE 802.15.4-based ad hoc networks (e.g., ZigBee). Since finding the minimum number of rebroadcast nodes in general ad hoc networks is NP-hard, current broadcast protocols either employ heuristic a...
Innovative Ideas in Privacy Research (Keynote Talk)
Found in: Database and Expert Systems Applications, International Workshop on
By Bharat Bhargava
Issue Date:September 2006
pp. 677-681
Privacy is fundamental to trusted collaboration and interactions to protect against malicious users and fraudulent activities. It is difficult to even impossible to preserve privacy in peer to peer large distributed system. In such networks, privacy is nee...
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks
Found in: Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on
By Biswajit Panja, Sanjay Kumar Madria, Bharat Bhargava
Issue Date:June 2006
pp. 384-393
In this paper, we describe group key management protocosl for hierarchical sensor networks where instead of using pre-deployed keys, each sensor node generates a partial key dynamically using a function. The function takes partial keys of its children as i...
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ahsan Habib, Dongyan Xu, Mikhail Atallah, Bharat Bhargava, John Chuang
Issue Date:July 2005
pp. 1010-1014
We design a Tree-based Forward Digest Protocol (TFDP) to verify data integrity in distributed media streaming for content distribution. Several challenges arise, including the timing constraint of streaming sessions, the involvement of multiple senders, an...
Anonymizing Web Services through a Club Mechanism with Economic Incentives
Found in: Web Services, IEEE International Conference on
By Mamata Jenamani, Leszek Lilien, Bharat Bhargava
Issue Date:June 2004
pp. 792
Preserving privacy during Web transactions is a major concern for individuals and organizations. One of the solutions proposed in the literature is to maintain anonymity through group cooperation during Web transactions. The lack of understanding of incent...
Peer-to-peer File-sharing over Mobile Ad hoc Networks
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Gang Ding, Bharat Bhargava
Issue Date:March 2004
pp. 104
Current peer-to-peer file-sharing systems mostly work on wired networks. Mobile ad hoc network is characterized as multi-hop wireless communications between mobile devices. In this paper, five routing approaches with different complexity are proposed to en...
Network Tomography-Based Unresponsive Flow Detection and Control
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Ahsan Habib, Bharat Bhargava
Issue Date:May 2003
pp. 258
To avoid a congestion collapse, network flows should adjust their sending rates. Adaptive flows adjust the rate, while unresponsive flows do not respond to congestion and keep sending packets. Unresponsive flows waste resources by taking their share of the...
Autonomous Transaction Processing Using Data Dependency in Mobile Environments
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Il Young Chung, Bharat Bhargava, Malika Mahoui, Leszek Lilien
Issue Date:May 2003
pp. 138
Transaction processing in mobile database systems faces new challenges to accommodate the limitations of mobile environments, such as frequent disconnections and low bandwidth. We propose a transaction processing protocol that increases the autonomy of cli...
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Yi Lu, Weichao Wang, Yuhui Zhong, Bharat Bhargava
Issue Date:March 2003
pp. 187
We investigate the performance issues of destination-sequenced distance vector (DSDV) and ad-hoc on-demand distance vector (AODV) routing protocols for mobile ad hoc networks. Four performance metrics are measured by varying the maximum speed of mobile hos...
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Weichao Wang, Yi Lu, Bharat Bhargava
Issue Date:March 2003
pp. 179
This paper compares the security properties of Ad Hoc On-demand Distance Vector (AODV) and Destination Sequence Distance Vector (DSDV) protocols, especially the difference caused by on-demand and proactive route queries. The on-demand route query enables t...
On Peer-to-Peer Media Streaming
Found in: Distributed Computing Systems, International Conference on
By Dongyan Xu, Mohamed Hefeeda, Susanne Hambrusch, Bharat Bhargava
Issue Date:July 2002
pp. 363
In this paper, we study a peer-to-peer media streaming system with the following characteristics: (1) its streaming capacity grows dynamically; (2) peers do not exhibit server-like behavior; (3) peers are heterogeneous in their bandwidth contribution; and ...
Global Scheduling for Flexible Transactions in Heterogeneous Distributed Database Systems
Found in: IEEE Transactions on Knowledge and Data Engineering
By Aidong Zhang, Marian Nodine, Bharat Bhargava
Issue Date:May 2001
pp. 439-450
<p><b>Abstract</b>—A heterogeneous distributed database environment integrates a set of autonomous database systems to provide global database functions. A flexible transaction approach has been proposed for the heterogeneous distributed ...
Design and Analysis of an Integrated Checkpointing and Recovery Scheme for Distributed Applications
Found in: IEEE Transactions on Knowledge and Data Engineering
By Bina Ramamurthy, Shambhu Upadhyaya, Bharat Bhargava
Issue Date:March 2000
pp. 174-186
<p><b>Abstract</b>—An integrated checkpointing and recovery scheme which exploits the low latency and high coverage characteristics of a concurrent error detection scheme is presented. Message dependency which is the main source of multis...
Data Consistency in Intermittently Connected Distributed Systems
Found in: IEEE Transactions on Knowledge and Data Engineering
By Evaggelia Pitoura, Bharat Bhargava
Issue Date:November 1999
pp. 896-915
<p><b>Abstract</b>—Mobile computing introduces a new form of distributed computation in which communication is most often intermittent, low-bandwidth, or expensive, thus providing only weak connectivity. In this paper, we present a replic...
An Adaptable Constrained Locking Protocol For High Data Contention Environments
Found in: Database Systems for Advanced Applications, International Conference on
By Shalab Goel, Bharat Bhargava, Sanjay Kumar Madria
Issue Date:April 1999
pp. 321
Multiversions of data are used in database systems to increase concurrency and to provide efficient recovery. Data versions improves the concurrency by allowing the concurrent execution of
Concurrency Control in Database Systems
Found in: IEEE Transactions on Knowledge and Data Engineering
By Bharat Bhargava
Issue Date:January 1999
pp. 3-16
<p><b>Abstract</b>—Ideas that are used in the design, development, and performance of concurrency control mechanisms have been summarized. The locking, time-stamp, optimistic-based mechanisms are included. The ideas of validation in optim...
Active Gateway: A Facility for Video Conferencing Traffic Control
Found in: Computer Software and Applications Conference, Annual International
By Shunge Li, Bharat Bhargava
Issue Date:August 1997
pp. 308
This paper describes our work of applying active network technology to video conferencing (VC) research. We present the architecture and features of an application-level facility, called active gateway, for video conferencing traffic and quality of service...
Multi-pass Transmission Policy: An Effective Method of Transmitting Large Multimedia Objects in the Wide-Area Network
Found in: Computer Software and Applications Conference, Annual International
By Sheng-Yih Wang, Bharat Bhargava
Issue Date:August 1997
pp. 382
Multimedia objects such as audio, video and images are usually very large in size and often used in time-critical applications. The traditional method of transmitting these large objects over a WAN is to use TCP because of the high loss rate of IP datagram...
Communication Facilities for Distributed Transaction-Processing Systems
Found in: Computer
By Enrique Mafla, Bharat Bhargava
Issue Date:August 1991
pp. 61-66
<p>The study of communication designs in the context of the Raid system, a robust and adaptable distributed database system for transaction processing, is discussed. Related research work on local interprocess communication, remote interprocess commu...
Clinical information system (CIS) for ambulatory care
Found in: Managing Requirements Knowledge, International Workshop on
By Clement McDonald, Bharat Bhargava, David Jervis
Issue Date:May 1975
pp. 749
No summary available.
A Computational Dynamic Trust Model for User Authorization
Found in: IEEE Transactions on Dependable and Secure Computing
By Yuhui Zhong,Bharat Bhargava,Yi Lu,Pelin Angin
Issue Date:February 2014
pp. 1
Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for user aut...
Private Anonymous Messaging
Found in: 2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS)
By Ruchith Fernando,Bharat Bhargava,Mark Linderman
Issue Date:October 2012
pp. 430-435
Messaging systems where a user maintains a set of contacts and broadcasts messages to them is very common. We address the problem of a contact obtaining a message that it missed, from other contacts of the user while maintaining anonymity of all parties in...
An End-to-End Security Auditing Approach for Service Oriented Architectures
Found in: 2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS)
By Mehdi Azarmi,Bharat Bhargava,Pelin Angin,Rohit Ranchal,Norman Ahmed,Asher Sinclair,Mark Linderman,Lotfi Ben Othmane
Issue Date:October 2012
pp. 279-284
Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-...
Error Resilient Video Transmission over Wireless Networks
Found in: Software Technologies for Future Embedded Systems, IEEE Workshop on
By Gang Ding, Halima Ghafoor, Bharat Bhargava
Issue Date:May 2003
pp. 31
An error resilient architecture for video transmission over mobile wireless networks is presented. Radio link layer, transport layer, and application layer are combined to deal with high error rate in wireless environments. The algorithms for both sender a...
Secured Web Access
Found in: Digital Libraries: Research and Practice, Kyoto International Conference on
By Mukesh Mohania, Vijay Kumar, Yahiko Kambayashi, Bharat Bhargava
Issue Date:November 2000
pp. 182
In this paper we discuss various secured web access schemes using dynamic and static approaches. In a static approach the access environment, that is, set of authorized users, the mode of access, their access rights, etc., are predefined. This approach is ...
Secure and efficient access to outsourced data
Found in: Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09)
By Bharat Bhargava, Rodney Owens, Weichao Wang, Zhiwei Li
Issue Date:November 2009
pp. 55-66
Providing secure and efficient access to large scale outsourced data is an important component of cloud computing. In this paper, we propose a mechanism to solve this problem in owner-write-users-read applications. We propose to encrypt every data block wi...
Key distribution and update for secure inter-group multicast communication
Found in: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05)
By Bharat Bhargava, Weichao Wang
Issue Date:November 2005
pp. 43-52
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both intra and inter group multicast traffic must be protected by secret keys. We pr...
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks
Found in: Proceedings of the 4th ACM workshop on Wireless security (WiSe '05)
By Bharat Bhargava, Jiejun Kong, Mario Gerla, Rajive Bagrodia, Weichao Wang, Zhengrong Ji
Issue Date:September 2005
pp. 87-96
Under-Water Sensor Networking (UWSN) is a novel network paradigm that is being proposed to explore, monitor and protect the oceans. The unique characteristics of the aquatic environment, namely huge propagation delay, absence of GPS signaling, floating nod...
A simulation study on multi-rate mobile ad hoc networks
Found in: Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (PE-WASUN '04)
By Bharat Bhargava, Gang Ding, Xiaoxin Wu
Issue Date:October 2004
pp. 91-98
This paper studies the performance of a multi-rate mobile ad hoc network (MANET) using an extended ns-2 simulator. A link adaptation algorithm is developed and tested. The multi-rate control algorithm is based on the channel access mechanism for IEEE 802.1...
Visualization of wormholes in sensor networks
Found in: Proceedings of the 2004 ACM workshop on Wireless security (WiSe '04)
By Bharat Bhargava, Weichao Wang
Issue Date:October 2004
pp. 51-60
Several protocols have been proposed to defend against wormholes in ad hoc networks by adopting positioning devices, synchronized clocks, or directional antennas. In this paper, we propose a mechanism, MDS-VOW, to detect wormholes in a sensor network. MDS-...
A fast MPEG video encryption algorithm
Found in: Proceedings of the sixth ACM international conference on Multimedia (MULTIMEDIA '98)
By Bharat Bhargava, Changgui Shi
Issue Date:September 1998
pp. 81-88
This paper addresses the problem of how to automatically generate visual representations of recorded histories of distributed multimedia collaborations. The work reported here focuses mainly on what we consider to be an innovative approach to this problem,...
A view-based approach to relaxing global serializability in a multidatabase system
Found in: Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing (PODC '95)
By Aidong Zhang, Bharat Bhargava, Evaggelia Pitoura
Issue Date:August 1995
pp. 265
In [4] a randomized algorithm for mutual exclusion with bounded waiting, employing a logarithmic sized shared variable, was given. Saias and Lynch [5] pointed out that the adversary scheduler postulated in the above paper can observe the behavior of proces...
Re-evaluating indexing schemes for nested objects
Found in: Proceedings of the third international conference on Information and knowledge management (CIKM '94)
By Bharat Bhargava, Xiangning Liu, Yin-he Jiang
Issue Date:November 1994
pp. 439-446
Performance is a major issue in the acceptance of object-oriented database management systems (OODBMS). The nested index and path index schemes have been criticized for their heavy costs and poor handling of update operations. This paper re-evaluates three...
Building information systems for mobile environments
Found in: Proceedings of the third international conference on Information and knowledge management (CIKM '94)
By Bharat Bhargava, Evaggelia Pitoura
Issue Date:November 1994
pp. 371-378
It is expected that in the near future, tens of millions of users will have access to distributed information systems through wireless connections. The technical characteristics of the wireless medium and the resulting mobility of both data resources and d...
Ensuring relaxed atomicity for flexible transactions in multidatabase systems
Found in: Proceedings of the 1994 ACM SIGMOD international conference on Management of data (SIGMOD '94)
By Aidong Zhang, Bharat Bhargava, Marian Nodine, Omran Bukhres
Issue Date:May 1994
pp. 303-312
Global transaction management requires cooperation from local sites to ensure the consistent and reliable execution of global transactions in a distributed database system. In a heterogeneous distributed database (or multidatabase) environment, various loc...
 1  2 Next >>