A DOS-based POset implementation
نویسنده
چکیده
In this paper, we describe and discuss a DOS based POset (i.e. Partially Ordered Set) implementation. We begin with a short review of previous results on POset based protection. We then describe implementation details of POset based protection under DOS. Next we discuss management tools used to implement and control the protection system. Then we describe the problems encountered in integration into existing DOS environments and how automation is used to resolve these problems and keep management complexity low. Finally, we summarize results, draw conclusions, and describe further work.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملQuerying Hierarchical Data in Very Large Databases
Hierarchical data, such as Partially Ordered Set (POSET) is tremendously used in relational databases, especially in data mining and data warehouse based-applications. Unfortunately, SQL (Structured Query Language) does not effectively support hierarchical data structure to manage this sort of data, for example, in Oracle, a CONNECT BY operator is used to query data organized into trees, howeve...
متن کاملResearch of SIP DoS Defense Mechanism Based on Queue Theory
The SIP is becoming the core of multimedia communication network through the IP, based on which the 3G network has been operated in our country. The easy implementation, high destruction and hard tracking against attacking source which are the characters of DoS attack cause the great security threat to SIP. Focusing on the research on defense mechanisms of DoS attacks in SIP protocol, this pape...
متن کاملStopIt: Mitigating DoS Flooding Attacks from Multi-Million Botnets
This paper presents the design and implementation of a filter-based DoS defense system (StopIt) and a comparison study on the effectiveness of filters and capabilities. Central to the StopIt design is a novel closed-control, open-service architecture: any receiver can use StopIt to block the undesired traffic it receives, yet the design is robust to various strategic attacks from millions of bo...
متن کاملModeling Poset Convex Subsets
A subset S of a poset (partially ordered set) is convex if and only if S contains every poset element which is between any two elements in S. Poset convex subsets arise in applications that involve precedence constraints, such as in project scheduling, production planning, and assembly line balancing. We give a strongly polynomial time algorithm which, given a poset and element weights (of arbi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 10 شماره
صفحات -
تاریخ انتشار 1991