Search For:

Displaying 1-50 out of 75 total
A Note on Trust-Enhanced Security
Found in: IEEE Security and Privacy
By Vijay Varadharajan
Issue Date:May 2009
pp. 57-59
With our ever-increasing reliance on a digital economy, most business and government activities now depend on networked information systems for their basic operation. Clearly, we're seeing a renewed urgency to get a better handle on capturing and reasoning...
 
Extending the Schematic Protection Model - I Conditional Tickets and Authentication
Found in: Security and Privacy, IEEE Symposium on
By Vijay Varadharajan, Claudio Calvelli
Issue Date:May 1994
pp. 213
The Schematic Protection Model, SPM, allows us to specify the protection structure of a system and gives an algorithm to reason about the transmission of privileges in the system. This paper extends the SPM model to include for conditional tickets and to p...
 
Internet Filtering
Found in: IEEE Security and Privacy
By Vijay Varadharajan
Issue Date:July 2010
pp. 62-65
Various governments have been considering mechanisms to filter out illegal or offensive Internet material. The accompanying debate raises a number of questions from a technical perspective. This article explores some of these questions, such as, what filte...
 
SBAC: Service Based Access Control
Found in: Engineering of Complex Computer Systems, IEEE International Conference on
By Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala
Issue Date:June 2009
pp. 202-209
In this paper we propose a dynamically invoked Service Based Access Control (SBAC) Model to efficiently deal with the Distributed Denial of Service (DDoS) attacks. The main idea of the SBAC is based on the observation that if the routers have information a...
 
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Sheikh Mahbub Habib,Vijay Varadharajan,Max Muhlhauser
Issue Date:July 2013
pp. 459-468
Trustworthy selection of cloud services has become a significant issue in emerging cloud marketplaces. As a consequence, the Cloud Security Alliance (CSA) has formulated a self-assessment framework for cloud providers to publish their cloud platform's secu...
 
Intrusion Detection Techniques for Infrastructure as a Service Cloud
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Udaya Tupakula,Vijay Varadharajan,Naveen Akku
Issue Date:December 2011
pp. 744-751
Today, cloud computing is one of the increasingly popular technology where the customer can use the resources of the cloud services providers to perform their tasks and only pay for the resources they use. The customer virtual machines in the cloud are vul...
 
Trust Relationship Modelling in E-commerce-Based Social Network
Found in: Computational Intelligence and Security, International Conference on
By Zaobin Gan, Juxia He, Qian Ding, Vijay Varadharajan
Issue Date:December 2009
pp. 206-210
In multi-agent-based e-commerce environments, like a social network, it is critical for buying agents to build trust with the selling agents in the virtual E-marketplaces so as to mitigate the possible harm inflicted by any dishonest sellers. However, trad...
 
Property Based Attestation and Trusted Computing: Analysis and Challenges
Found in: Network and System Security, International Conference on
By Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery
Issue Date:October 2009
pp. 278-285
Trusted computing attestation mechanism relies on hash measurements to realize remote party attestation in distributed systems. Property based attestation enables more meaningful attestation by abstracting low level binary values to high level security pro...
 
Trust Management for Web Services
Found in: Web Services, IEEE International Conference on
By Weiliang Zhao, Vijay Varadharajan
Issue Date:September 2008
pp. 818-821
In this paper, we propose a comprehensive trust management approach for web services that covers the analysis/modelling of trust relationships and the development of trust management layer in a consistent manner. The specific characteristics of trust relat...
 
A Novel Approach of Web Search Based on Community Wisdom
Found in: Internet and Web Applications and Services, International Conference on
By Weiliang Zhao, Vijay Varadharajan
Issue Date:June 2008
pp. 431-436
In this paper, we propose a novel approach for Websearch based on the statistical information of local setting data of web browsers in a community. The members of the community share their local setting data of browsers and this enables them to take advant...
 
Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens
Issue Date:December 2007
pp. 453-460
The concept of trusted computing technology is becoming significant in that such technologies are being increasingly available in PCs and mobile devices. With the advent of this technology, one can move from traditional user-only based trust management sys...
 
A Novel Security Risk Evaluation for Information Systems
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Zaobin Gan, Jiufei Tang, Ping Wu, Vijay Varadharajan
Issue Date:November 2007
pp. 67-73
Quantitative security risk evaluation of information sys- tems is increasingly drawing more and more attention. This paper extends the attack tree model, and proposes a new quantitative risk evaluation method .While the risk value of the leaf node (atomic ...
 
The Design of A Rule-based and Event-driven Trust Management Framework
Found in: E-Business Engineering, IEEE International Conference on
By Yan Wang, Kwei-Jay Lin, Duncan S. Wong, Vijay Varadharajan
Issue Date:October 2007
pp. 97-104
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. From the point view of customers or service clients, the trust status of the se...
 
Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications
Found in: Wireless Broadband and Ultra Wideband Communications, International Conference on
By Venkat Balakrishnan, Vijay Varadharajan, Uday Tupakula, Marie Elisabeth Gaup Moe
Issue Date:August 2007
pp. 29
Recently several techniques that provide different degree of anonymity have been proposed for wired and wireless communication. Although, the recently proposed techniques are successful in achieving high degree of anonymity, there are some disadvantages as...
 
Role-based Recommendation and Trust Evaluation
Found in: E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on
By Yan Wang, Vijay Varadharajan
Issue Date:July 2007
pp. 278-288
In general, in most trust evaluation systems, the evaluation of a target party under investigation relies on the trust ratings from responding peers/parties who have direct interactions with the target party. This involves recommendations and the trust eva...
 
Mobile Agent and Web Service Integration Security Architecture
Found in: Service-Oriented Computing and Applications, IEEE International Conference on
By Junqi Zhang, Yan Wang, Vijay Varadharajan
Issue Date:June 2007
pp. 172-179
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally provides a platform for deploying mobile agent technology. Therefore, the in...
 
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Venkat Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula
Issue Date:May 2007
pp. 27-33
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustworthiness within the limitations of the network, or introduce additional probl...
 
A New Security Scheme for Integration of Mobile Agents and Web Services
Found in: Internet and Web Applications and Services, International Conference on
By Junqi Zhang, Yan Wang, Vijay Varadharajan
Issue Date:May 2007
pp. 43
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless mobile devices. A mobile agent is a composition of computer software and data w...
 
A Hybrid Trust Model for Enhancing Security in Distributed Systems
Found in: Availability, Reliability and Security, International Conference on
By Ching Lin, Vijay Varadharajan
Issue Date:April 2007
pp. 35-42
We propose a hybrid trust model for enhancing security in distributed applications by combining the
 
Trust Based Risk Management for Distributed System Security - A New Approach
Found in: Availability, Reliability and Security, International Conference on
By Ching Lin, Vijay Varadharajan
Issue Date:April 2006
pp. 6-13
Security measures alone are not sufficient for counteracting malicious behaviors in distributed systems. The new trend is to use economical models (mainly game-theoretic models) to characterize such malicious behaviors in the security context with the aim ...
 
Short Paper: Fellowship in Mobile Ad hoc Networks
Found in: Security and Privacy for Emerging Areas in Communications Networks, International Conference on
By Venkatesan Balakrishnan, Vijay Varadharajan
Issue Date:September 2005
pp. 225-227
Security issues are paramount in mobile ad hoc networks even more so than in wired networks. Though there have been many works in the recent years on secure routing protocols for mobile ad hoc networks still ad hoc networks are prone to specific attacks su...
 
A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments
Found in: Intelligent Agent Technology, IEEE / WIC / ACM International Conference on
By Yan Wang, Vijay Varadharajan
Issue Date:September 2005
pp. 88-94
<p>In agent based e-commerce applications, it is challengeable to employ one mobile agent to complete all transactions including payments due to the security consideration. In this paper, we propose a new agent-assisted secure payment protocol, which...
 
Evaluating the Performance and Scalability of Web Application Systems
Found in: Information Technology and Applications, International Conference on
By Zao-Bin Gan, Deng-Wen Wei, Vijay Varadharajan
Issue Date:July 2005
pp. 111-114
In recent years, the Internet and World Wide Web have grown rapidly and become an important medium of software applications. Quality issues concerning Web Application Systems (WAS) are attracting growing attention and becoming an important research area fo...
 
Trust2: Developing Trust in Peer-to-Peer Environments
Found in: Services Computing, IEEE International Conference on
By Yan Wang, Vijay Varadharajan
Issue Date:July 2005
pp. 24-34
<p>In peer-to-peer (P2P) environments, a peer needs to interact with unknown peers for the services provided. This requires the trust evaluation prior to and posterior to interactions. This paper presents Trust2: a novel and dynamic peer trust evalua...
 
Trust Enhanced Security for Mobile Agents
Found in: E-Commerce Technology, IEEE International Conference on
By Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi
Issue Date:July 2005
pp. 231-238
This paper presents a new approach for mobile agent security - trust enhanced security and develops MobileTrust - a novel trust management architecture to support the trust enhanced security solutions for mobile agent applications. In this new approach we ...
 
Efficient TTP-Free Mental Poker Protocols
Found in: Information Technology: Coding and Computing, International Conference on
By Weiliang Zhao, Vijay Varadharajan
Issue Date:April 2005
pp. 745-750
Zhao et al proposed an efficient mental poker protocol which did not require using a Trusted Third Party(TTP). The protocol is efficient and suitable for any number of players but it introduces a security flaw. In this paper, we propose two mental poker pr...
 
Designing Secure Wireless Mobile Ad Hoc Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Venkatesan Balakrishnan, Vijay Varadharajan
Issue Date:March 2005
pp. 5-8
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured through a newly designed protocol, which deploys cryptographic mechanisms ove...
 
Two-Phase Peer Evaluation in P2P E-Commerce Environments
Found in: e-Technology, e-Commerce, and e-Services, IEEE International Conference on
By Yan Wang, Vijay Varadharajan
Issue Date:April 2005
pp. 654-657
This paper presents a novel hybrid two-phase peer evaluation model for P2P e-commerce systems, which consists of both peer trust evaluation and peer offer evaluation. Meanwhile, the peer trust evaluation phase consists of two phases: peer transaction trust...
 
A Trust based Access Control Framework for P2P File-Sharing Systems
Found in: Hawaii International Conference on System Sciences
By Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Watters
Issue Date:January 2005
pp. 302c
Peer-to-peer (P2P) file sharing systems have become popular as a new paradigm for information exchange. However, the decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, ...
   
Enhancing Grid Security with Trust Management
Found in: Services Computing, IEEE International Conference on
By Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi
Issue Date:September 2004
pp. 303-310
Recently, trust has been recognized as an important factor for Grid computing security. In this paper, we develop a trust management architecture for trust enhanced Grid security incorporating a novel trust model which is capable of capturing various types...
 
Authorization Service for Web Services and its Implementation
Found in: Web Services, IEEE International Conference on
By Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens
Issue Date:June 2004
pp. 774
In this paper, we introduce the authorization issues for Web Services. We introduce the authorization service provided by Microsoft? .NET MyServices and then briefly describe our proposed modifications and extensions to the authorization service. We discus...
 
Secure Distributed Location Management Scheme for Mobile Hosts
Found in: Local Computer Networks, Annual IEEE Conference on
By Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
Issue Date:November 2001
pp. 296
With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such situations, the issues of location management for mobile hosts are becoming increasingly significant. D...
 
A Distributed Location Management Scheme for Mobile Hosts
Found in: Parallel and Distributed Systems, International Conference on
By Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
Issue Date:June 2001
pp. 0297
Abstract: With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such situations, the issues of location management for mobile hosts are becoming increasingly sign...
 
Secure Multicast Extensions for Mobile Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
Issue Date:October 1999
pp. 106
There has been a considerable interest shown in the area of mobility. With the advent of powerful portable devices such as laptop and palmtop there is a growing trend amongst users to go the nomadic way. This implies that a user can get access to any servi...
 
A Logic For State Transformations in Authorization Policies
Found in: Computer Security Foundations Workshop, IEEE
By Yun Bai, Vijay Varadharajan
Issue Date:June 1997
pp. 173
No summary available.
 
On the Security of Tenant Transactions in the Cloud
Found in: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom)
By Vijay Varadharajan,Udaya Tupakula
Issue Date:December 2013
pp. 525-530
Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, the attackers can also use the cloud infrastructure for hosting malicious services and generating different types of attacks. In this ...
 
Securing Mobile Devices from DoS Attacks
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Udaya Tupakula,Vijay Varadharajan
Issue Date:December 2013
pp. 34-41
Today mobile devices are increasingly being used to access data services in addition to the voice communications. However such devices have limited resources to enforce strong security measures and hence they are easily vulnerable to attacks. In this paper...
 
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Lan Zhou,Vijay Varadharajan,Michael Hitchens
Issue Date:July 2013
pp. 560-569
There has been a recent trend in storing data in cloud due to the increasing amount of users' data and associated benefits such as on-demand access and scalability. Role-based access control (RBAC) provides a flexible way for data owners to manage and shar...
 
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Aarthi Krishna,Vijay Varadharajan,Nathan Tarr
Issue Date:July 2013
pp. 517-524
Authorisation systems play a vital role in protecting access to resources in distributed systems. Traditionally, authorisation is performed at the user level to determine whether a user has the necessary privileges to access a requested resource. However, ...
 
Trust Enhanced Security Architecture for Detecting Insider Threats
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Udaya Tupakula,Vijay Varadharajan
Issue Date:July 2013
pp. 552-559
Attacks on the organization networks can be classified as external and internal attacks. For the purpose of this paper we consider that external attacks are generated by the attackers or from hosts outside the organization, and internal attacks are generat...
 
Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Lan Zhou,Vijay Varadharajan,Michael Hitchens
Issue Date:June 2012
pp. 714-721
There has been an increasing trend towards outsourcing data to the cloud to cope with the massive increase in the amount of data. Hence trusted enforcement of access control policies on outsourced data in the cloud has become a significant issue. In this p...
 
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Huawei Zhao,Jiankun Hu,Jing Qin,Vijay Varadharajan,Haishan Wan
Issue Date:June 2012
pp. 706-713
Many wireless sensor networks (WSNs) consist of a large number of distributed sensor nodes that are batteries powered, vulnerable to tampering, and equipped with limited computational capabilities and memory. These characteristics render WSNs facing many s...
 
TREASURE: Trust Enhanced Security for Cloud Environments
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Vijay Varadharajan,Udaya Tupakula
Issue Date:June 2012
pp. 145-152
Today, cloud computing is one of the popular technologies. In addition to this, most of the hardware that is being shipped today is equipped with the TPM which can be used for realization of trusted platforms. Recently several TPM attestation techniques su...
 
Techniques for Analysing PDF Malware
Found in: Asia-Pacific Software Engineering Conference
By Caglar Ulucenk,Vijay Varadharajan,Venkat Balakrishnan,Udaya Tupakula
Issue Date:December 2011
pp. 41-48
Today, PDF is one of the widely used applications for sharing documents. Some of the important factors for the popular use of the PDF application are due to its platform independency and rich digital offerings such as ability to include multimedia files, d...
 
TVDSEC: Trusted Virtual Domain Security
Found in: Utility and Cloud Computing, IEEE Internatonal Conference on
By Udaya Tupakula,Vijay Varadharajan
Issue Date:December 2011
pp. 57-64
Virtualisation is one of the important technologies for the realisation of cloud computing. A Virtual Machine Monitor (VMM) is an additional software layer which has complete control on the physical resources and enables to run multiple operating systems o...
 
TVLAN: Trusted and Virtualised Local Area Networks
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Udaya Tupakula,Vijay Varadharajan
Issue Date:November 2011
pp. 606-612
Today most of the desktops, laptops are being shipped with the TPM and Virtualisation technology is widely being deployed. On the other hand, we are witnessing an increasing number of zero day attacks. Our analysis confirms that Local Area Networks are hig...
 
A Hybrid Trust Model for Authorisation Using Trusted Platforms
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Aarthi Krishna,Vijay Varadharajan
Issue Date:November 2011
pp. 288-295
Authorisation systems play a vital role in protecting access to resources in distributed systems. Traditionally, authorisation is performed at the user level to determine whether a user has the necessary privileges to access a requested resource. However, ...
 
Security Techniques for Beyond 3G Wireless Mobile Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Udaya Tupakula,Vijay Varadharajan,Sunil Kumar Vuppala
Issue Date:October 2011
pp. 136-143
Significant developments in the recent times have led to an increasing use of mobile devices such as smart phones in accessing Internet services and applications over wireless networks. In this paper, we propose a security architecture for counteracting de...
 
Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Mohammad Sayad Haghighi,Kamal Mohamed-pour,Vijay Varadharajan
Issue Date:October 2011
pp. 117-122
Instances of batch traffic can be seen in many applications. A set of sensors around the source of a sudden event which try to report it to the cluster head, and energy conserving MAC protocols in hierarchical networks with sleep-awake schedules which lead...
 
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar
Issue Date:December 2010
pp. 484-491
In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sensor nodes, cluster heads and a base station arranged hie...
 
 1  2 Next >>