Do you want to publish a course? Click here

Framework for Managing Threshold Cryptography in Distributed Network Environments

إطار عمل لإدارة التعمية العتبية في البيئات الشبكية الموزعة

983   0   23   0 ( 0 )
 Publication date 2012
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

An increasingly common requirement in distributed network environments is the need to distribute security mechanisms across several network components. This includes both cryptographic key distribution and cryptographic computation. Most proposed security mechanisms are based on threshold cryptography, which allows a cryptographic computation to be shared amongst network components in such a way that a threshold of active components are required for the security operation to be successfully enabled. Although there are many different proposed techniques available, we feel that the practical issues that determine both what kind of technique is selected for implementation and how it is implemented are often glossed over. In this paper we thus establish a new framework for network security architects to apply when considering adoption of such mechanisms. This framework identifies the critical design decisions that need to be taken into account and is intended to aid both design and implementation. As part of this framework we propose a taxonomy of management models and application environments. We also demonstrate the utility of the framework by applying it to a VPN environment.

References used
Y. Desmedt and Y. Frankel. "Threshold Cryptosystems," Advances in Cryptology: Crypto ’89, Lecture Notes in Computer Science, 435 (1990) 307–315
B. Blakley, ”Safeguarding Cryptographic Keys”, Proceedings AFIPS 1979 National Computer Conference, pp. 313-317. June 1979
A. Shamir. ”How to share a secret”, ”Comm. ACM, 22(11), (1979), pp. 612-613. November 1979
rate research

Read More

In this work, we consider the problem of designing secure and efficient federated learning (FL) frameworks for NLP. Existing solutions under this literature either consider a trusted aggregator or require heavy-weight cryptographic primitives, which makes the performance significantly degraded. Moreover, many existing secure FL designs work only under the restrictive assumption that none of the clients can be dropped out from the training protocol. To tackle these problems, we propose SEFL, a secure and efficient federated learning framework that (1) eliminates the need for the trusted entities; (2) achieves similar and even better model accuracy compared with existing FL designs; (3) is resilient to client dropouts.
A Mobile Ad hoc Network (MANET) is a network of wireless mobile devices deployed without the aid of any pre-existing infrastructure or centralized administration.
accessing its resources, a single model can’t be adapted in every company. The main idea of this work is to develop a new model that depends on both RBAC and ABAC models so we can benefit from both systems advantages. We propose a hybrid access cont rol model (AARBAC) which is a new access control model that uses the RBAC model and extends it with the ABAC model.
Abstract Common grounding is the process of creating and maintaining mutual understandings, which is a critical aspect of sophisticated human communication. While various task settings have been proposed in existing literature, they mostly focus on c reating common ground under a static context and ignore the aspect of maintaining them overtime under dynamic context. In this work, we propose a novel task setting to study the ability of both creating and maintaining common ground in dynamic environments. Based on our minimal task formulation, we collected a large-scale dataset of 5,617 dialogues to enable fine-grained evaluation and analysis of various dialogue systems. Through our dataset analyses, we highlight novel challenges introduced in our setting, such as the usage of complex spatio-temporal expressions to create and maintain common ground. Finally, we conduct extensive experiments to assess the capabilities of our baseline dialogue system and discuss future prospects of our research.
Morality plays an important role in social well-being, but people's moral perception is not stable and changes over time. Recent advances in natural language processing have shown that text is an effective medium for informing moral change, but no at tempt has been made to quantify the origins of these changes. We present a novel unsupervised framework for tracing textual sources of moral change toward entities through time. We characterize moral change with probabilistic topical distributions and infer the source text that exerts prominent influence on the moral time course. We evaluate our framework on a diverse set of data ranging from social media to news articles. We show that our framework not only captures fine-grained human moral judgments, but also identifies coherent source topics of moral change triggered by historical events. We apply our methodology to analyze the news in the COVID-19 pandemic and demonstrate its utility in identifying sources of moral change in high-impact and real-time social events.

suggested questions

comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا