liu.seSök publikationer i DiVA
Ändra sökning
Avgränsa sökresultatet
123 1 - 50 av 109
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Ardi, Shanai
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    A Model and Implementation of a Security plug-in for the Software Life Cycle2008Licentiatavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Currently, security is frequently considered late in software life cycle. It is often bolted on late in development, or even during deployment or maintenance, through activities such as add-on security software and penetration-and-patch maintenance. Even if software developers aim to incorporate security into their products from the beginning of the software life cycle, they face an exhaustive amount of ad hoc unstructured information without any practical guidance on how and why this information should be used and what the costs and benefits of using it are. This is due to a lack of structured methods.

    In this thesis we present a model for secure software development and implementation of a security plug-in that deploys this model in software life cycle. The model is a structured unified process, named S3P (Sustainable Software Security Process) and is designed to be easily adaptable to any software development process. S3P provides the formalism required to identify the causes of vulnerabilities and the mitigation techniques that address these causes to prevent vulnerabilities. We present a prototype of the security plug-in implemented for the OpenUP/Basic development process in Eclipse Process Framework. We also present the results of the evaluation of this plug-in. The work in this thesis is a first step towards a general framework for introducing security into the software life cycle and to support software process improvements to prevent recurrence of software vulnerabilities.

  • 2.
    Backofen, Rolf
    et al.
    Friedrich-Schiller-Universität Jena, Germany.
    Badea, Liviu
    National Institute for Research and Development in Informatics, Bucharest, Romania.
    Barahona, Pedro
    Universidade Nova de Lisboa, Portugal.
    Berndtsson, Mikael
    University of Skövde, Sweden.
    Burger, Albert
    Heriot-Watt University/MRC Human GeneticsUnit, Edinburgh, UK.
    Dawelbait, Gihan
    Technische Universität Dresden, Germany.
    Doms, Andreas
    Technische Universität Dresden, Germany.
    Fages, Francois
    INRIA Rocquencourt, Paris, France.
    Hotaran, Anca
    National Institute for Research and Development in Informatics, Bucharest, Romania.
    Jakoniené, Vaida
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Krippahl, Ludwig
    Universidade Nova de Lisboa, Portugal.
    Lambrix, Patrick
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    McLeod, Kenneth
    Heriot-Watt University/MRC Human GeneticsUnit, Edinburgh, UK.
    Nutt, Werner
    Heriot-Watt University/MRC Human GeneticsUnit, Edinburgh, UK.
    Olsson, Bjorn
    University of Skövde, Sweden.
    Schroeder, Michael
    Technische Universität Dresden, Germany.
    Schroiff, Anna
    University of Skövde, Sweden.
    Royer, Luc
    Technische Universität Dresden, Germany.
    Soliman, Sylvain
    INRIA Rocquencourt, Paris, France.
    Tan, He
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Tilivea, Doina
    National Institute for Research and Development in Informatics, Bucharest, Romania.
    Will, Sebastian
    Friedrich-Schiller-Universit¨at Jena, Germany.
    Requirements and specification of bioinformatics use cases2005Rapport (Övrigt vetenskapligt)
  • 3.
    Backofen, Rolf
    et al.
    Friedrich-Schiller-Universität Jena, Germany.
    Badea, Mike
    Victoria University of Manchester, UK.
    Barahona, Pedro
    Universidade Nova de Lisboa, Portugal.
    Badea, Liviu
    National Institute for Research and Development in Informatics, Bucarest, Romania.
    Bry, Francois
    Ludwig-Maximilians-Universität Munchen, Germany.
    Dawelbait, Gihan
    Technical University of Dresden, Germany.
    Doms, Andreas
    Technical University of Dresden, Germany.
    Fages, Francois
    INRIA Rocquencourt, France.
    Goble, Carol
    Victoria University of Manchester, UK.
    Henschel, Andreas
    Technical University of Dresden, Germany.
    Hotaran, Anca
    National Institute for Research and Development in Informatics, Bucarest, Romania.
    Huang, Bingding
    Technical University of Dresden, Germany.
    Krippahl, Ludwig
    Universidade Nova de Lisboa, Portugal.
    Lambrix, Patrick
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Nutt, Werner
    Heriot-Watt University, Edinburgh, UK.
    Schroeder, Michael
    Technical University of Dresden, Germany.
    Soliman, Sylvain
    INRIA Rocquencourt, France.
    Will, Sebastian
    Friedrich-Schiller-Universität Jena, Germany.
    Towards a Semantic Web for Bioinformatics2004Ingår i: Bioinformatics 2004,2004, 2004, s. 26-26Konferensbidrag (Övrigt vetenskapligt)
  • 4.
    Backofen, Rolf
    et al.
    Friedrich-Schiller-Universität Jena, Germany.
    Badea, Mike
    Victoria University of Manchester, UK.
    Burger, Albert
    Harriot-Watt University, Edinburgh, UK.
    Fages, Francois
    INRIA Rocquencourt, France.
    Lambrix, Patrick
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Nutt, Werner
    Harriot-Watt University, Edinburgh, UK.
    Schroeder, Michael
    Technical University of Dresden, Germany.
    Soliman, Sylvain
    NRIA Rocquencourt, France.
    Will, Sebastian
    Friedrich-Schiller-Universität Jena, Germany.
    State-of-the-art in Bioinformatics2004Rapport (Övrigt vetenskapligt)
  • 5.
    Backofen, Rolf
    et al.
    Friedrich-Schiller-Universität Jena, Germany.
    Mike, Badea
    Victoria University of Manchester, UK.
    Barahona, Pedro
    FCT-UNL, Lisbon.
    Burger, Albert
    Harriot-Watt University, Edinburgh, UK.
    Dawelbait, Gihan
    Technical University of Dresden, Germany.
    Doms, Andreas
    Technical University of Dresden, Germany.
    Fages, Francois
    INRIA Rocquencourt, France.
    Hotaran, Anca
    National Institute for Research and Development in Informatics, Romania.
    Jakoniené, Vaida
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Krippahl, Ludwig
    FCT-UNL, Lisbon.
    Lambrix, Patrick
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    McLeod, Kenneth
    Harriot-Watt University, Edinburgh, UK.
    Möller, Steffen
    Universität Rostock, Germany.
    Nutt, Werner
    Harriot-Watt University, Edinburgh, UK.
    Olsson, Björn
    University of Skövde, Sweden.
    Schroeder, Michael
    Technical University of Dresden, Germany.
    Soliman, Sylvain
    INRIA Rocquencourt, France.
    Tan, He
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Tilivea, Doina
    National Institute for Research and Development in Informatics, Romania.
    Will, Sebastian
    Friedrich-Schiller-Universität Jena, Germany.
    Usage of bioinformatics tools and identification of information sources2005Rapport (Övrigt vetenskapligt)
  • 6. Bonatti, Piero
    et al.
    Antoniu, Grigoris
    Baldoni, Matteo
    Baroglio, Cristina
    Duma, Claudiu
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Fuchs, Norbert
    Martelli, Alberto
    Nejdl, Wolfgang
    Olmedilla, Olmedilla
    Patti, Viviana
    Peer, Joachim
    Shahmehri, Nahid
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    The REWERSE View on Policies2005Ingår i: Semantic Web and Policy Workshop,2005, Proceedings of the Semantic Web and Policy Workshop: UMBC eBiquity , 2005, s. 21-Konferensbidrag (Refereegranskat)
  • 7. Bonatti, Piero
    et al.
    Duma, Claudiu
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Olmedilla, Daniel
    Shahmehri, Nahid
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    An Integration of Reputation-based and Policy-based Trust Management2005Ingår i: Semantic Web and Policy Workshop,2005, Proceedings of the Semantic Web and Policy Workshop: UMBC eBiquity , 2005, s. 136-Konferensbidrag (Refereegranskat)
  • 8.
    Bonatti, Piero
    et al.
    Universit¿a di Napoli.
    Shahmehri, Nahid
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Duma, Claudiu
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Olmedilla, Daniel
    Hannover University.
    Nejdl, Wolfgang
    Hannover University.
    Baldoni, Matteo
    Universit`a degli Studi di Torino.
    Baroglio, Cristina
    Universit`a degli Studi di Torino.
    Martelli, Alberto
    Universit`a degli Studi di Torino.
    Patti, Viviana
    Universit`a degli Studi di Torino.
    Coraggio, Paolo
    Universit¿a di Napoli .
    Antoniou, Grigoris
    Institute of Computer Science, FORTH, Greece .
    Peer, Joachim
    University of St. Gallen, Switzerland .
    E. Fuchs, Norbert
    University of Zurich, Switzerland .
    Rule-based Policy Specification: State of the Art and Future Work2004Rapport (Övrigt vetenskapligt)
  • 9. Brunette, Jr, Glenn M.
    et al.
    Schuba, Christoph
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Toward Systemically Secure IT Architectures2005Ingår i: Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises WETICE,2005, IEEE , 2005Konferensbidrag (Refereegranskat)
  • 10.
    Caronni, Germano
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Gupta, Amit
    Kumar, Sandeep
    Markson, Tom R.
    Schuba, Christoph
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Scott, Glenn
    Method and system for facilitating relocation of devices on a network2005Patent (Övrig (populärvetenskap, debatt, mm))
  • 11.
    Caronni, Germano
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Gupta, Amit
    Kumar, Sandeep
    Markson, Tom R.
    Schuba, Christoph
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Scott, Glenn C.
    System and method for separating addresses from the delivery scheme in a virtual private network2005Patent (Övrig (populärvetenskap, debatt, mm))
  • 12.
    Caronni, Germano
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Gupta, Amit
    Kumar, Sandeep
    Markson, Tom R.
    Schuba, Christoph
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Scott, Glenn C.
    Truly anonymous communications using supernets, with the provision of topology hiding2004Patent (Övrig (populärvetenskap, debatt, mm))
  • 13.
    Caronni, Germano
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Gupta, Amit
    Markson, Tom R.
    Kumar, Sandeep
    Schuba, Christoph
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Scott, Glenn C.
    Channel-Specific File System Views in a Private Network Using a Public Network Infrastructure2005Patent (Övrig (populärvetenskap, debatt, mm))
  • 14.
    Caronni, Germano
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Gupta, Amit
    Markson, Tom R.
    Kumar, Sandeep
    Schuba, Christoph
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Scott, Glenn C.
    Using multicast to provide ethernet-like communication behavior to selected peers on a network2005Patent (Övrig (populärvetenskap, debatt, mm))
  • 15.
    Caronni, Germano
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Weiler, NathalieETH Zürich .Shahmehri, NahidLinköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Proceedings of the Fourth IEEE International Conference on Peer-to-Peer Computing2004Proceedings (redaktörskap) (Övrigt vetenskapligt)
  • 16.
    Caronni, Germano
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Weiler, NathalieETH Zürich.Waldvogel, MarcelShahmehri, NahidLinköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Proceedings of the Fifth International Conference on Peer-to-Peer Computing2005Samlingsverk (redaktörskap) (Övrigt vetenskapligt)
  • 17.
    Chisalita, Ioan
    Linköpings universitet, Institutionen för datavetenskap, IISLAB. Linköpings universitet, Tekniska högskolan.
    Communication and Networking Techniques for Traffic Safety Systems2006Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Accident statistics indicate that every year a significant number of casualties and extensive property losses occur due to traffic accidents. Consequently, efforts are directed towards developing passive and active safety systems that help reduce the severity of crashes, or prevent vehicles from colliding with one another. To develop these systems, technologies such as sensor systems, computer vision and vehicular communication have been proposed. Safety vehicular communication is defined as the exchange of data between vehicles with the goal of providing in-vehicle safety systems with enough information to permit detection of traffic dangers. Inter-vehicle communication is a key safety technology, especially as a complement to other technologies such as radar, as the information it provides cannot be gathered in any other way. However, due to the specifics of the traffic environment, the design of efficient safety communication systems poses a series of major technical challenges.

    In this thesis we focus on the design and development of a safety communication system that provides support for active safety systems such as collision warning and collision avoidance. We begin by providing a method for designing the support system for active safety systems. Within our study, we investigate different safety aspects of traffic situations. For performing traffic investigations, we have developed ECAM, a temporal reasoning system for modeling and analyzing accident scenarios.

    Next, we focus on the communication system design. We investigate approaches that can be applied to implement safety vehicular communication, as well as design aspects of such systems, including networking techniques and transmission procedures. We then propose a new solution for vehicular communication in the form of a distributed communication protocol that allows the vehicles to organize themselves in virtual clusters according to their common interest in traffic safety. To disseminate the information used for organizing the network and for assessing dangers in traffic, we develop an anonymous context-based broadcast protocol. This protocol requires the receivers to determine whether they are the intended destination for sent messages based on knowledge about their current situation in traffic. This communication system is then augmented with a reactive operation mode, where warnings can be issued and forwarded by vehicles. A vehicular communication platform that provides an implementation framework for the communication system, and integrates it within a vehicle, is also proposed. Experiments have been conducted, under various conditions, to test communication performance and the system’s ability to reduce accidents. The results indicate that that the proposed communication system can efficiently provide the exchange of safety information between vehicles.

  • 18.
    Chisalita, Ioan
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Safety-oriented communication in mobile networks for vehicles2004Licentiatavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Accident statistics indicate that every year a large number of casualties and extensive property losses are recorded due to traffic accidents. Consequently, efforts are directed towards developing passive and active safety systems that help reducing the severity of crashes or prevent vehicles to collide with each other. Within the development of these systems, technologies such as sensor systems, computer vision and vehicular communication are considered of importance. Vehicular communication is defined as the exchange of data between vehicles, and is considered a key technology for traffic safety due to its ability to provide the vehicles with information that cannot be acquired using other means (e.g. radar and video systems). However, due to the current early stage in the development of in-vehicle safety systems, the applicability of communication for improving traffic safety is still an open issue. Furthermore, due to the specificity of the environment in which vehicles travel, the design of communication systems that provide an efficient exchange of safety-related data between vehicles poses a series of major technical challenges.

    In this thesis we focus on the development of a communication system that provides support for in-vehicle active safety systems such as collision warning and collision avoidance.

    We begin by studying the applicability of communication for supporting the development of effective active safety systems. Within our study, we investigate different safety aspects of traffic situations. For performing such investigations we develop ECAM, a temporal reasoning system for modeling and analyzing accident scenarios. This system gives us the possibility of analyzing relations between events that occur in traffic and their possible consequences. We use ECAM for analyzing the degree of accident prevention that can be achieved by applying crash countermeasures based on communication in specific traffic scenarios.

    By acknowledging the potential of communication for traffic safety, we further focus in the thesis on the design of a safety-oriented vehicular communication system. We propose a new solution for vehicular communication in the form of a distributed communication protocol that allows the vehicles to organize the network in an ad-hoc decentralized manner. For disseminating information, we develop an anonymous context-based broadcast protocol that requires the receivers to determine whether they are the intended destination of sent messages based on knowledge about their momentary situation in traffic. We further design a vehicular communication platform that provides an implementation framework for the communication system, and integrates it within a vehicle. Investigations of the communication performances, which evaluate metrics such as transmission delay, send errors, packet collisions and information filtering, indicate that the proposed vehicular communication system is able to provide a reliable and timely exchange of data between vehicles.

  • 19.
    Chisalita, Ioan
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Shahmehri, Nahid
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    A context-based vehicular communication protocol2004Ingår i: IEEE Personal, Indoor and Mobile Radio Communication Symposium,2004, Barcelona, Spain: IEEE PIMRC , 2004, s. 2820-Konferensbidrag (Refereegranskat)
  • 20.
    Chisalita, Ioan
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Shahmehri, Nahid
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    A novel architecture for supporting vehicular communication2002Ingår i: IEEE 56th Vehicular Technology Conference, 2002, s. 1002-1006Konferensbidrag (Refereegranskat)
    Abstract [en]

    In today's world, traffic safety is a major problem. Traffic accidents result in more than half a million casualties each year and are associated with serious injuries and extensive material losses. Therefore, special attention is given to those technologies that can reduce the number and severity of road events. Inter-vehicle communication (IVC) and vehicle to road communication (VRC) are considered to have extensive potential for the development of efficient safety systems installed in vehicles. This paper proposes a novel, safety-oriented communication platform dedicated to supporting the exchange of safety-relevant information between traffic participants. The vehicular communication platform (VCP) aims to support a specific vehicular communication mechanism previously designed by the authors and briefly presented in the paper.

  • 21.
    Chisalita, Ioan
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Shahmehri, Nahid
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    A peer-to-peer approach to vehicular communication for the support of traffic safety applications2002Ingår i: 5th IEEE Conference on Intelligent Transportation Systems, 2002, s. 336-341Konferensbidrag (Refereegranskat)
    Abstract [en]

    More than half a million casualties are due to traffic accidents each year. Therefore, there is a high demand for innovative technologies focused on collision warning and collision avoidance. Among such technologies, the inter-vehicle communication and the vehicle-to-road communication are considered to have extensive potential for supporting the safety systems located within a vehicle. In this paper we propose a new approach to vehicular communication. We designed a safety-oriented vehicular communication, built around the concept of mobile ad-hoc peer-to-peer (P2P) networking. The merging between ad-hoc connectivity and P2P paradigm facilitates the development of a vehicular network characterized by self-organization, fault-tolerance, scalability, shareable resources and services, cooperation, cases of interconnection and cost efficiency. These characteristics recommend the communication proposed here as an efficient method for providing safety-relevant data for safety systems installed in vehicles.

  • 22.
    Chisalita, Ioan
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Shahmehri, Nahid
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    An In-Vehicle Approach for Improving Traffic Safety through GIS Utilization2002Ingår i: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. 2002, 2002Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper focuses on the utilization and integration of geographic information systems (GIS) oriented to tragic safety in vehicles. We have primarily analyzed the benefits of introducing GIS systems that support the driver and provide processed data to collision warning and collision avoidance systems located in vehicles. Further on, we have defined a set of information that is relevant for traffic safety and appropriate to be used within an in-vehicle GIS system. Based on these data, we propose in this paper a specific design for the GIS system. This system integrates the relevant data for traffic safety and takes into consideration the specific requirements of the vehicular domain. The integration of the GIS system within vehicles introduces a series of problems that are discussed in the paper.

  • 23.
    Chisalita, Ioan
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Shahmehri, Nahid
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    An in-vehicle approach for improving traffic safety through GIS utolization2002Ingår i: IEEE International Conference on Systems, Man and Cybernetics, 2002, s. 9-11Konferensbidrag (Refereegranskat)
  • 24.
    Chisalita, Ioan
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Shahmehri, Nahid
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Vehicular communication - A candidate technology for traffic safety2004Ingår i: 2004 IEEE International Conference on Systems, Man and Cybernetics,2004, IEEE SMC , 2004, s. 3903-Konferensbidrag (Refereegranskat)
  • 25.
    Chisalita, Ioan
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Shahmehri, Nahid
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Lambrix, Patrick
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Traffic accidents modeling and analysis using temporal reasonin2004Ingår i: ITSC 2004: 7TH INTERNATIONAL IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS, PROCEEDINGS, Institute of Electrical and Electronics Engineers (IEEE), 2004, s. 378-383Konferensbidrag (Refereegranskat)
    Abstract [en]

    Traffic accidents account for more than half a million casualties every year. The analysis of accidents helps identifying the elements that affect traffic conditions, the relationships between them, and how they may contribute to the occurrence of dangerous situations. In this paper we present a temporal reasoning system for modeling and analyzing various types of accident scenarios. The system is based on Event Calculus and was implemented using Prolog. We exemplify the use of the system by applying it for modeling and analyzing a rear-end accident scenario.

  • 26.
    Duma, Claudiu
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Security and Efficiency Tradeoffs in Multicast Group Key Management2003Licentiatavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    An ever-increasing number of Internet applications, such as content and software distribution, distance learning, multimedia streaming, teleconferencing, and collaborative workspaces, need efficient and secure multicast communication. However, efficiency and security are competing requirements and balancing them to meet the application needs is still an open issue.

    In this thesis we study the efficiency versus security requirements tradeoffs in group key management for multicast communication. The efficiency is in terms of minimizing the group rekeying cost and the key storage cost, while security is in terms of achieving backward secrecy, forward secrecy, and resistance to collusion.

    We propose two new group key management schemes that balance the efficiency versus resistance to collusion. The first scheme is a flexible category-based scheme, and addresses applications where a user categorization can be done based on the user accessibility to the multicast channel. As shown by the evaluation, this scheme has a low rekeying cost and a low key storage cost for the controller, but, in certain cases, it requires a high key storage cost for the users. In an extension to the basic scheme we alleviate this latter problem.

    For applications where the user categorization is not feasible, we devise a cluster-based group key management. In this scheme the resistance to collusion is measured by an integer parameter. The communication and the storage requirements for the controller depend on this parameter too, and they decrease as the resistance to collusion is relaxed. The results of the analytical evaluation show that our scheme allows a fine-tuning of security versus efficiency requirements at runtime, which is not possible with the previous group key management schemes.

  • 27.
    Ellqvist, Tommy
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Supporting Scientific Collaboration through Workflows and Provenance2010Licentiatavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Science is changing. Computers, fast communication, and  new technologies have created new ways of conducting research.  For  instance, researchers from different disciplines are processing and  analyzing scientific data that is increasing at an exponential rate.  This kind of research requires that the scientists have access to  tools that can handle huge amounts of data, enable access to vast  computational resources, and support the collaboration of large  teams of scientists. This thesis focuses on tools that help support  scientific collaboration.

    Workflows and provenance are two concepts that have proven useful in  supporting scientific collaboration.  Workflows provide a formal  specification of scientific experiments, and provenance offers a  model for documenting data and process dependencies.  Together, they  enable the creation of tools that can support collaboration through  the whole scientific life-cycle, from specification of experiments  to validation of results.  However, existing models for workflows  and provenance are often specific to particular tasks and tools.  This makes it hard to analyze the history of data that has been  generated over several application areas by different tools.  Moreover, workflow design is a time-consuming process and often  requires extensive knowledge of the tools involved and collaboration  with researchers with different expertise. This thesis addresses  these problems.

    Our first contribution is a study of the differences between two  approaches to interoperability between provenance models: direct  data conversion, and mediation. We perform a case study where we  integrate three different provenance models using the mediation  approach, and show the advantages compared to data conversion.  Our  second contribution serves to support workflow design by allowing  multiple users to concurrently design workflows. Current workflow  tools lack the ability for users to work simultaneously on the same  workflow.  We propose a method that uses the provenance of workflow  evolution to enable real-time collaborative design of workflows.  Our third contribution considers supporting workflow design by  reusing existing workflows. Workflow collections for reuse are  available, but more efficient methods for generating summaries of  search results are still needed. We explore new summarization  strategies that considers the workflow structure.

  • 28.
    Graham, Ross Lee
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Shahmehri, NahidLinköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Proceedings of the Second International Conference on Peer-to-Peer Computing2002Proceedings (redaktörskap) (Övrigt vetenskapligt)
  • 29.
    Hall, David
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Strömbäck, Lena
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Generation of Synthetic XML for Evaluation of Hybrid XML Systems2010Ingår i: Database Systems for Advanced Applications: 15th international conference, DASFAA 2010 International workshops: GDM, BenchmarX, MCIS, SNSMW, DIEW, UDM, Revised selected papers / [ed] Yoshikawa M, Meng X, Yumoto T, Ma Q, Sun L, Watanabe C, Heidelberg: Springer , 2010, s. 191-202Kapitel i bok, del av antologi (Övrigt vetenskapligt)
    Abstract [en]

    This book constitutes the workshop proceedings of the 14th International Conference on Database Systems for Advanced Applications, DASFAA 2009, held in Brisbane, Australia, in April 2009. The volume contains six workshops, each focusing on specific research issues that contribute to the main themes of the DASFAA conference: The First International Workshop on Benchmarking of XML and Semantic Web Applications (BenchmarkX'09); The Second International Workshop on Managing Data Quality in Collaborative Information Systems (MCIS'09); The 1st International Workshop on Data and Process Provenance (WDPP'09); The First International Workshop on Privacy-Preserving Data Analysis (PPDA'09); The First International Workshop on Mobile Business Collaboration (MBC'09); and the First Ph.D. Workshop.

  • 30.
    Han, Lin
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Secure and scalable E-service software delivery2001Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    Due to the complexity of software and end-user operating environments, software management in general is not an easy task for end-users. In the context of e-service, what end-users buy is the service package. Generally speaking, they should not have to be concerned with how to get the required software and how to make it work properly on their own sites. On the other hand, service providers would not like to have their service-related software managed in a non-professional way, which might cause problems when providing services.

    E-service software delivery is the starting point in e-service software management. It is the functional foundation for performing further software management tasks, e.g., installation, configuration, activation, and so on. This thesis concentrates on how to deliver e-service software to a large number of geographically distributed end-users. Special emphasis is placed on the issues of efficiency (in terms of total transmission time and consumed resources), scalability (in terms of the number of end-users), and security (in terms of confidentiality and integrity). In the thesis, we propose an agent-based architectural model for e-service software delivery, aiming at automating involved tasks, such as registration, key management, and recipient status report collection. Based on the model, we develop a multicast software delivery system, which provides a secure and scalable solution to distributing software over publicly accessible networks. By supplying end-users with site information examination, the system builds a bridge towards further software management tasks. We also present a novel strategy for scalable multicast session key management in the context of software delivery, which can efficiently handle a dynamic reduction in group membership of up to 50% of the total. An evaluation is provided from the perspective of resource consumption due to security management activities. 

  • 31.
    Herzog, Almut
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Secure execution environment for Java electronic services2002Licentiatavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Private homes are becoming increasingly connected to the Internet in fast and reliable ways. These connections pave the way for networked services, i.e. services that gain their value through their connectivity. Examples of such electronic services (e-services) are services for remote control of household appliances, home health care or infotainment.

    Residential gateways connect the private home with the Internet and are the home access point and one execution platform for e-services. Potentially, a residential gateway runs e-services from multiple providers. The software environment of such a residential gateway is a Java execution environment where e-services execute as Java threads within the Java virtual machine. The isolation of these Java e-services from each other and from their execution environment is the topic of this thesis.

    Although the results of this thesis can be applied to most Java servers-e.g. Javaenabled web browsers, web servers, JXTA, JINI-this work focuses on e-services for the private home and their execution platform. Security for the private home as a prerequisite for end user acceptance is the motivation for this approach.

    This thesis establishes requirements that prevent e-services on the Java execution platform from harming other e-services on the same or other network nodes and that prevent e-services from harming their underlying execution environment. Some of the requirements can be fulfilled by using the existing Java sandbox for access control. Other requirements, concerned with availability of e-services and network nodes, need a modified Java environment that supports resource control and e-service-specific access control. While some of the requirements result in implementation guidelines for Java servers, and in particular for the e-service environment, other requirements have been implemented as a proof of concept. 

  • 32.
    Herzog, Almut
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Usable Security Policies for Runtime Environments2007Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    The runtime environments provided by application-level virtual machines such as the Java Virtual Machine or the .NET Common Language Runtime are attractive for Internet application providers because the applications can be deployed on any platform that supports the target virtual machine. With Internet applications, organisations as well as end users face the risk of viruses, trojans, and denial of service attacks. Virtual machine providers are aware of these Internet security risks and provide, for example, runtime monitoring of untrusted code and access control to sensitive resources.

    Our work addresses two important security issues in runtime environments. The first issue concerns resource or release control. While many virtual machines provide runtime access control to resources, they do not provide any means of limiting the use of a resource once access is granted; they do not provide so-called resource control. We have addressed the issue of resource control in the example of the Java Virtual Machine. In contrast to others’ work, our solution builds on an enhancement to the existing security architecture. We demonstrate that resource control permissions for Java-mediated resources can be integrated into the regular Java security architecture, thus leading to a clean design and a single external security policy.

    The second issue that we address is the usabilityhttps://www.diva-portal.org/liu/webform/form.jsp

    DiVA Web Form and security of the setup of security policies for runtime environments. Access control decisions are based on external configuration files, the security policy, which must be set up by the end user. This set-up is security-critical but also complicated and errorprone for a lay end user and supportive, usable tools are so far missing. After one of our usability studies signalled that offline editing of the configuration file is inefficient and difficult for end users, we conducted a usability study of personal firewalls to identify usable ways of setting up a security policy at runtime. An analysis of general user help techniques together with the results from the two previous studies resulted in a proposal of design guidelines for applications that need to set up a security policy. Our guidelines have been used for the design and implementation of the tool JPerM that sets the Java security policy at runtime. JPerM evaluated positively in a usability study and supports the validity of our design guidelines.

    Delarbeten
    1. An evaluation of Java application containers according to security requirements
    Öppna denna publikation i ny flik eller fönster >>An evaluation of Java application containers according to security requirements
    2005 (Engelska)Ingår i: Proceedings of the 14th IEEE International Workshops on Enabling Technologies, 2005, s. 178-183Konferensbidrag, Publicerat paper (Refereegranskat)
    Abstract [en]

    Web browsers, Web servers, Java application servers and OSGi frameworks are all instances of Java execution environments that tun more or less untrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java application containers. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java container. This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java containers for Java applications, applets, servlets, OSGi bundles, and Enterprise Java Beans. For comparison, the requirements are also examined for a C++ application.

    Nationell ämneskategori
    Teknik och teknologier
    Identifikatorer
    urn:nbn:se:liu:diva-14429 (URN)10.1109/WETICE.2005.18 (DOI)
    Tillgänglig från: 2007-04-27 Skapad: 2007-04-27 Senast uppdaterad: 2009-05-18
    2. Performance of the Java Security Manager
    Öppna denna publikation i ny flik eller fönster >>Performance of the Java Security Manager
    2005 (Engelska)Ingår i: Computers and Security, ISSN 0167-4048, Vol. 24, nr 3, s. 192-207Artikel i tidskrift (Refereegranskat) Published
    Abstract [en]

    The Java Security Manager is one major security feature of the Java programming language. However, in many Java applications the Security Manager is not enabled because it slows execution time. This paper explores the performance of the Java Security Manager in depth, identifies the permissions with the worst performance and gives advice on how to use the Security Manager in a more efficient way.

    Our performance test shows that the CPU execution time penalty varies between 5% and 100% per resource access statement. This extreme range is due to the fact that some resource accesses are costly (such as file and socket access) and therefore hide the performance penalty for the access control check almost completely. The time penalty is much more noticeable with access to main memory resources (such as Java objects).

    In order to achieve reasonable response times, it is of utmost importance to tune garbage collection because the Java Security Manager creates short-lived objects during its permission check. Also, the order of permissions in the policy file can be important.

    Nyckelord
    Java; Performance; Security; Security Manager; Access controller; Permission; Policy; CPU execution time
    Nationell ämneskategori
    Teknik och teknologier
    Identifikatorer
    urn:nbn:se:liu:diva-14430 (URN)10.1016/j.cose.2004.08.006 (DOI)
    Tillgänglig från: 2007-04-27 Skapad: 2007-04-27
    3. Using the Java sandbox for resource control
    Öppna denna publikation i ny flik eller fönster >>Using the Java sandbox for resource control
    2002 (Engelska)Ingår i: Proceedings of the 7th Nordic Workshop on Secure IT Systems (NordSec’02), 2002, s. 135-147Konferensbidrag, Publicerat paper (Övrigt vetenskapligt)
    Nyckelord
    Java, security, resource control
    Nationell ämneskategori
    Teknik och teknologier
    Identifikatorer
    urn:nbn:se:liu:diva-14431 (URN)
    Tillgänglig från: 2007-04-27 Skapad: 2007-04-27 Senast uppdaterad: 2009-05-19
    4. A usability study of security policy management
    Öppna denna publikation i ny flik eller fönster >>A usability study of security policy management
    2006 (Engelska)Ingår i: Security and Privacy in Dynamic Environments. Proceedings of the 21st International Information Security Conference (IFIP TC-11) (SEC’06), 2006, s. 296-306Konferensbidrag, Publicerat paper (Övrigt vetenskapligt)
    Abstract [en]

    The Java Security Manager is one major security feature of the Java programming language. However, in many Java applications the Security Manager is not enabled because it slows execution time. This paper explores the performance of the Java Security Manager in depth, identifies the permissions with the worst performance and gives advice on how to use the Security Manager in a more efficient way.

    Our performance test shows that the CPU execution time penalty varies between 5% and 100% per resource access statement. This extreme range is due to the fact that some resource accesses are costly (such as file and socket access) and therefore hide the performance penalty for the access control check almost completely. The time penalty is much more noticeable with access to main memory resources (such as Java objects).

    In order to achieve reasonable response times, it is of utmost importance to tune garbage collection because the Java Security Manager creates short-lived objects during its permission check. Also, the order of permissions in the policy file can be important.

    Nyckelord
    Java; Performance; Security; Security Manager; Access controller; Permission; Policy; CPU execution time
    Nationell ämneskategori
    Teknik och teknologier
    Identifikatorer
    urn:nbn:se:liu:diva-14432 (URN)10.1007/0-387-33406-8_25 (DOI)
    Konferens
    21st International Information Security Conference (IFIP TC-11) (SEC’06)
    Tillgänglig från: 2007-04-27 Skapad: 2007-04-27 Senast uppdaterad: 2014-06-24
    5. User help techniques for usable security
    Öppna denna publikation i ny flik eller fönster >>User help techniques for usable security
    2007 (Engelska)Ingår i: Proceedings of the 1st Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT’07) ACM Press, Boston, MA, USA, New York: ACM , 2007Kapitel i bok, del av antologi (Övrigt vetenskapligt)
    Abstract [en]

    There are a number of security-critical applications such as personal firewalls, web browsers and e-mail clients, whose users have little or no security knowledge and are easily confused, even frustrated by menus, messages or dialog boxes that deal with security issues.

    While there are evaluations of existing applications and proposals for new approaches or design guidelines for usable security applications, little effort has been invested in determining how applications can help users in security decisions and security tasks. The purpose of this work is to analyse conventional and security-specific user help techniques with regard to their usefulness in supporting lay users in security applications.

    We analyse the following help techniques: online documentation, context-sensitive help, wizards, assistants, safe staging and social navigation, and complement these with the tempting alternative of built-in, hidden security. Criteria for the analysis are derived from the type of user questions that can arise in applications and from definitions of when a security application can be called usable.

    Designers of security applications can use our analysis as general recommendations for when and how to use and combine user help techniques in security applications, but they can also use the analysis as a template. They can instantiate the template for their specific application to arrive at a concrete analysis of which user help techniques are most suitable in their specific case.

    Ort, förlag, år, upplaga, sidor
    New York: ACM, 2007
    Nyckelord
    on-line help, safe staging, social navigation, usable security, user help, wizard
    Nationell ämneskategori
    Datavetenskap (datalogi)
    Identifikatorer
    urn:nbn:se:liu:diva-14433 (URN)10.1145/1234772.1234787 (DOI)1-59593-635-6 (ISBN)
    Anmärkning

    Article No. 11

    Tillgänglig från: 2007-04-27 Skapad: 2007-04-27 Senast uppdaterad: 2018-01-13Bibliografiskt granskad
    6. Usability and security of personal firewalls
    Öppna denna publikation i ny flik eller fönster >>Usability and security of personal firewalls
    2007 (Engelska)Ingår i: New Approaches for Security, Privacy and Trust in Complex Environments, Springer Berlin/Heidelberg, 2007, s. 37-48Kapitel i bok, del av antologi (Övrigt vetenskapligt)
    Abstract [en]

    Effective security of a personal firewall depends on (1) the rule granularity and the implementation of the rule enforcement and (2) the correctness and granularity of user decisions at the time of an alert. A misconfigured or loosely configured firewall may be more dangerous than no firewall at all because of the user’s false sense of security. This study assesses effective security of 13 personal firewalls by comparing possible granularity of rules as well as the usability of rule set-up and its influence on security.

    In order to evaluate usability, we have submitted each firewall to use cases that require user decisions and cause rule creation. In order to evaluate the firewalls’ security, we analysed the created rules. In addition, we ran a port scan and replaced a legitimate, network-enabled application with another program to assess the firewalls’ behaviour in misuse cases. We have conducted a cognitive walkthrough paying special attention to user guidance and user decision support.

    We conclude that a stronger emphasis on user guidance, on conveying the design of the personal firewall application, on the principle of least privilege and on implications of default settings would greatly enhance both usability and security of personal firewalls.

    Ort, förlag, år, upplaga, sidor
    Springer Berlin/Heidelberg, 2007
    Serie
    IFIP International Federation for Information Processing, ISSN 1571-5736, E-ISSN 1861-2288 ; Vol 232
    Nationell ämneskategori
    Datavetenskap (datalogi)
    Identifikatorer
    urn:nbn:se:liu:diva-14434 (URN)10.1007/978-0-387-72367-9_4 (DOI)978-0-387-72366-2 (ISBN)978-0-387-72367-9 (ISBN)
    Tillgänglig från: 2007-04-27 Skapad: 2007-04-27 Senast uppdaterad: 2018-02-20Bibliografiskt granskad
    7. Usable set-up of runtime security policies
    Öppna denna publikation i ny flik eller fönster >>Usable set-up of runtime security policies
    2007 (Engelska)Ingår i: Information Management & Computer Security, ISSN 0968-5227, Vol. 15, nr 5, s. 394-407Artikel i tidskrift (Refereegranskat) Published
    Abstract [en]

    Purpose: This paper aims to present concrete and verified guidelines for enhancing the usability and security of software that delegates security decisions to lay users and captures these user decisions as a security policy.

    Design/methodology/approach: This work is an exploratory study. The authors hypothesised that existing tools for runtime set-up of security policies are not sufficient. As this proved true, as shown in earlier work, they apply usability engineering with user studies to advance the state-of-the-art.

    Findings: Little effort has been spent on how security policies can be set up by the lay users for whom they are intended. This work identifies what users want and need for a successful runtime set-up of security policies.

    Practical implications: Concrete and verified guidelines are provided for designers who are faced with the task of delegating security decisions to lay users.

    Originality/value: The devised guidelines focus specifically on the set-up of runtime security policies and therefore on the design of alert windows.

    Nyckelord
    Business policy, Data security, Internet, Java
    Nationell ämneskategori
    Datavetenskap (datalogi)
    Identifikatorer
    urn:nbn:se:liu:diva-14435 (URN)10.1108/09685220710831134 (DOI)
    Anmärkning

    Special Issue of Information Management & Computer Security: Selected Papers from the HAISA 2007 Symposium.

    Tillgänglig från: 2007-04-27 Skapad: 2007-04-27 Senast uppdaterad: 2018-01-13
    8. An ontology of information security
    Öppna denna publikation i ny flik eller fönster >>An ontology of information security
    2007 (Engelska)Ingår i: International Journal of Information Security and Privacy, ISSN 1930-1650, Vol. 1, nr 4, s. 1-23Artikel i tidskrift (Refereegranskat) Published
    Abstract [en]

    We present a publicly available, OWL-based ontology of information security which models assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be used as a general vocabulary, roadmap, and extensible dictionary of the domain of information security. With its help, users can agree on a common language and definition of terms and relationships. In addition to browsing for information, the ontology is also useful for reasoning about relationships between its entities, for example, threats and countermeasures. The ontology helps answer questions like: Which countermeasures detect or prevent the violation of integrity of data? Which assets are protected by SSH? Which countermeasures thwart buffer overflow attacks? At the moment, the ontology comprises 88 threat classes, 79 asset classes, 133 countermeasure classes and 34 relations between those classes. We provide the means for extending the ontology, and provide examples of the extendibility with the countermeasure classes ‘memory protection’ and ‘source code analysis’. This article describes the content of the ontology as well as its usages, potential for extension, technical implementation and tools for working with it.

    Nationell ämneskategori
    Datavetenskap (datalogi)
    Identifikatorer
    urn:nbn:se:liu:diva-14436 (URN)10.4018/jisp.2007100101 (DOI)
    Tillgänglig från: 2007-04-27 Skapad: 2007-04-27 Senast uppdaterad: 2018-01-13
  • 33.
    Herzog, Almut
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Lind, Leili
    Linköpings universitet, Institutionen för medicinsk teknik, Medicinsk informatik. Linköpings universitet, Tekniska högskolan.
    Network solutions for home health care applications2003Ingår i: Technology and Health Care, ISSN 0928-7329, E-ISSN 1878-7401, Vol. 11, nr 2, s. 77-87Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The growing number of the elderly in industrialised countries is increasing the pressure on respective health care systems. This is one reason for recent trends in the development and expansion of home health care organisations. With Internet access available to everyone and the advent of wireless technologies, advanced telehomecare is a possibility for a large proportion of the population.

    In the near future, one of the authors plans to implement a home health care infrastructure for patients with congestive heart failure and patients with chronic obstructive pulmonary disease. The system is meant to support regular and ad-hoc measurements of medical parameters in patient homes and transmission of measurement data to the home health care provider.

    In this paper we look at network technologies that connect sensors and input devices in the patient home to a home health care provider. We consider wireless and Internet technologies from functional and security-related perspectives and arrive at a recommendation for our system.

    Security and usability aspects of the proposed network infrastructures are explored with special focus on their impact on the patient home.

  • 34.
    Herzog, Almut
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Shahmehri, Nahid
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    An evaluation of Java application containers according to security requirements2005Ingår i: Proceedings of the 14th IEEE International Workshops on Enabling Technologies, 2005, s. 178-183Konferensbidrag (Refereegranskat)
    Abstract [en]

    Web browsers, Web servers, Java application servers and OSGi frameworks are all instances of Java execution environments that tun more or less untrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java application containers. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java container. This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java containers for Java applications, applets, servlets, OSGi bundles, and Enterprise Java Beans. For comparison, the requirements are also examined for a C++ application.

  • 35.
    Herzog, Almut
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Shahmehri, Nahid
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Performance of the Java Security Manager2005Ingår i: Computers and Security, ISSN 0167-4048, Vol. 24, nr 3, s. 192-207Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The Java Security Manager is one major security feature of the Java programming language. However, in many Java applications the Security Manager is not enabled because it slows execution time. This paper explores the performance of the Java Security Manager in depth, identifies the permissions with the worst performance and gives advice on how to use the Security Manager in a more efficient way.

    Our performance test shows that the CPU execution time penalty varies between 5% and 100% per resource access statement. This extreme range is due to the fact that some resource accesses are costly (such as file and socket access) and therefore hide the performance penalty for the access control check almost completely. The time penalty is much more noticeable with access to main memory resources (such as Java objects).

    In order to achieve reasonable response times, it is of utmost importance to tune garbage collection because the Java Security Manager creates short-lived objects during its permission check. Also, the order of permissions in the policy file can be important.

  • 36.
    Herzog, Almut
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Shahmehri, Nahid
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Problems Running Untrusted Services as Java Threads2005Ingår i: International Workshop on Certification and Security in Inter-Organizational E-Services CSES04,2004, New York, NY, U.S.A: Springer , 2005, s. 19-Konferensbidrag (Refereegranskat)
  • 37.
    Herzog, Almut
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Shahmehri, Nahid
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Using the Java sandbox for resource control2002Ingår i: Proceedings of the 7th Nordic Workshop on Secure IT Systems (NordSec’02), 2002, s. 135-147Konferensbidrag (Övrigt vetenskapligt)
  • 38.
    Jakoniene, Vaida
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Lambrix, Patrick
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Monitoring performance and access to biological databases2002Ingår i: 3rd swedish annual workshop in bioinformatics for PhD students and Postdocs, 2002Konferensbidrag (Övrigt vetenskapligt)
  • 39.
    Jakoniene, Vaida
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Nilsson, Roland
    Proceedings of the Fourth Swedish Bioinformatics Workshop for PhD students and PostDocs2003Proceedings (redaktörskap) (Övrigt vetenskapligt)
  • 40.
    Jakoniené, Vaida
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    A study in integrating multiple biological data sources2005Licentiatavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Life scientists often have to retrieve data from multiple biological data sources to solve their research problems. Although many data sources are available, they vary in content, data format, and access methods, which often vastly complicates the data retrieval process. The user must decide which data sources to access and in which order, how to retrieve the data and how to combine the results - in short, the task of retrieving data requires a great deal of effort and expertise on the part of the user.

    Information integration systems aim to alleviate these problems by providing a uniform (or even integrated) interface to biological data sources. The information integration systems currently available for biological data sources use traditional integration approaches. However, biological data and data sources have unique properties which introduce new challenges, requiring development of new solutions and approaches.

    This thesis is part of the BioTrifu project, which explores approaches to integrating multiple biological data sources. First, the thesis describes properties of biological data sources and existing systems that enable integrated access to them. Based on the study, requirements for systems integrating biological data sources are formulated and the challenges involved in developing such systems are discussed. Then, the thesis presents a query language and a high-level architecture for the BioTrifu system that meet these requirements. An approach to generating a query plan in the presence of alternative data sources and ways to integrate the data is then developed. Finally, the design and implementation of a prototype for the BioTrifu system are presented.

  • 41.
    Jakoniené, Vaida
    et al.
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Lambrix, Patrick
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    Implementation of a System for Integrated Access to Biological Data Sources2004Ingår i: Bioinformatics 2004,2004, 2004, s. 44-44Konferensbidrag (Övrigt vetenskapligt)
  • 42.
    Jakonienė, Vaida
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Integration of Biological Data2006Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    Data integration is an important procedure underlying many research tasks in the life sciences, as often multiple data sources have to be accessed to collect the relevant data. The data sources vary in content, data format, and access methods, which often vastly complicates the data retrieval process. As a result, the task of retrieving data requires a great deal of effort and expertise on the part of the user. To alleviate these difficulties, various information integration systems have been proposed in the area. However, a number of issues remain unsolved and new integration solutions are needed.

    The work presented in this thesis considers data integration at three different levels. 1) Integration of biological data sources deals with integrating multiple data sources from an information integration system point of view. We study properties of biological data sources and existing integration systems. Based on the study, we formulate requirements for systems integrating biological data sources. Then, we define a query language that supports queries commonly used by biologists. Also, we propose a high-level architecture for an information integration system that meets a selected set of requirements and that supports the specified query language. 2) Integration of ontologies deals with finding overlapping information between ontologies. We develop and evaluate algorithms that use life science literature and take the structure of the ontologies into account. 3) Grouping of biological data entries deals with organizing data entries into groups based on the computation of similarity values between the data entries. We propose a method that covers the main steps and components involved in similarity-based grouping procedures. The applicability of the method is illustrated by a number of test cases. Further, we develop an environment that supports comparison and evaluation of different grouping strategies.

    The work is supported by the implementation of: 1) a prototype for a system integrating biological data sources, called BioTRIFU, 2) algorithms for ontology alignment, and 3) an environment for evaluating strategies for similarity-based grouping of biological data, called KitEGA.

    Delarbeten
    1. Towards transparent access to multiple biological databanks
    Öppna denna publikation i ny flik eller fönster >>Towards transparent access to multiple biological databanks
    2003 (Engelska)Ingår i: Proceedings of the first Asia-Pacific Bioinformatics Conference, Adelaide, Australia, 2003, Vol. 33, s. 53-60Konferensbidrag, Publicerat paper (Refereegranskat)
    Abstract [en]

    Nowadays, biologists use a number of large biological databanks to find relevant information for their research. Users of these databanks face a number of problems. One problem is that users are required to have good knowledge about the contents, implementations and conceptual models of many databanks to be able to ask precise and relevant questions. Further, the terminology that is used in the different databanks may be different. Also, when asking complex queries to multiple databanks, users need to construct a query plan on their own possibly leading to poor performance or not even obtaining results. To alleviate these problems we define an architecture for systems that deal with these problems by allowing for a transparent and integrated way to query the multiple sources. The contribution of this paper is threefold. First, we describe a study of current biological databanks. Then, we propose a base query language that contains operators that should be present in any query language for biological databanks. Further, we present an architecture for a system supporting such a language and providing integrated access to the highly distributed and heterogeneous environment of biological databanks.

    Nationell ämneskategori
    Teknik och teknologier
    Identifikatorer
    urn:nbn:se:liu:diva-14032 (URN)
    Tillgänglig från: 2006-09-28 Skapad: 2006-09-28 Senast uppdaterad: 2015-02-18
    2. Information integration systems for biological data source requirements and opportunities
    Öppna denna publikation i ny flik eller fönster >>Information integration systems for biological data source requirements and opportunities
    2006 (Engelska)Rapport (Övrig (populärvetenskap, debatt, mm))
    Nationell ämneskategori
    Datavetenskap (datalogi)
    Identifikatorer
    urn:nbn:se:liu:diva-14033 (URN)
    Tillgänglig från: 2006-09-28 Skapad: 2006-09-28 Senast uppdaterad: 2018-01-13
    3. Ontology-based integration for bioinformatics
    Öppna denna publikation i ny flik eller fönster >>Ontology-based integration for bioinformatics
    2005 (Engelska)Ingår i: Proceedings of the VLDB Workshop on Ontologies-bases techniques for DataBases and Information Systems - ODBIS, 2005, s. 55-58Konferensbidrag, Publicerat paper (Refereegranskat)
    Abstract [en]

    Information integration systems support researchers in bioinformatics to retrieve data from multiple biological data sources. In this paper we argue that the current approaches should be enhanced by ontological knowledge. We identify the dierent types of ontological knowledge that are available on the Web and propose an approach to use this knowledge to support integrated access to multiple biological data sources. We also show that current ontology-based integration approaches only cover parts of our approach.

     

    Nationell ämneskategori
    Teknik och teknologier
    Identifikatorer
    urn:nbn:se:liu:diva-14034 (URN)
    Konferens
    Workshop on Ontologies-bases techniques for DataBases and Information Systems - ODBIS
    Tillgänglig från: 2006-09-28 Skapad: 2006-09-28 Senast uppdaterad: 2015-02-18
    4. Alignment of Biomedical Ontologies using Life Science Literature
    Öppna denna publikation i ny flik eller fönster >>Alignment of Biomedical Ontologies using Life Science Literature
    Visa övriga...
    2006 (Engelska)Ingår i: KDLL: International Workshop on Knowledge Discovery in Life Science LIterature Knowledge Discovery in Life Science Literature PAKDD 2006 International Workshop, KDLL 2006, Singapore, April 9, 2006. Proceedings / [ed] Eric G. Bremer, Jörg Hakenberg, Eui-Hong (Sam) Han, Daniel Berrar and Werner Dubitzky, Berlin/Heidelberg: Springer, 2006, s. 1-17Konferensbidrag, Publicerat paper (Refereegranskat)
    Abstract [en]

    This book constitutes the refereed proceedings of the International Workshop on Knowledge Discovery in Life Science Literature, KDLL 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006).

    The 12 revised full papers presented together with two invited talks were carefully reviewed and selected for inclusion in the book. The papers cover all topics of knowledge discovery in life science data such as text mining, identification and retrieval of documents, passage retrieval, co-reference resolution, extraction of life science entities or relationships from large collections, automated characterization of biological, biomedical and biotechnological entities and processes, extraction and characterization of more complex patterns and interaction networks, automated generation of text summaries, automated construction, expansion and curation of ontologies for different domains, and construction of controlled vocabularies.

    Ort, förlag, år, upplaga, sidor
    Berlin/Heidelberg: Springer, 2006
    Serie
    Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 3886
    Nationell ämneskategori
    Datavetenskap (datalogi)
    Identifikatorer
    urn:nbn:se:liu:diva-14035 (URN)10.1007/11683568_1 (DOI)000237198800001 ()978-3-540-32809-4 (ISBN)3-540-32809-2 (ISBN)
    Konferens
    KDLL: International Workshop on Knowledge Discovery in Life Science LIterature Knowledge Discovery in Life Science Literature PAKDD 2006 International Workshop, KDLL 2006, Singapore, April 9, 2006
    Tillgänglig från: 2006-09-28 Skapad: 2006-09-28 Senast uppdaterad: 2018-11-27Bibliografiskt granskad
    5. A Method for Similarity-Based Grouping of Biological Data
    Öppna denna publikation i ny flik eller fönster >>A Method for Similarity-Based Grouping of Biological Data
    2006 (Engelska)Ingår i: DILS: International Workshop on Data Integration in the Life Sciences Data Integration in the Life Sciences Third International Workshop, DILS 2006, Hinxton, UK, July 20-22, 2006. Proceedings / [ed] Ulf Leser, Felix Naumann, Barbara Eckman, Springer Berlin/Heidelberg, 2006, s. 136-151Konferensbidrag, Publicerat paper (Refereegranskat)
    Abstract [en]

    Similarity-based grouping of data entries in one or more data sources is a task underlying many different data management tasks, such as, structuring search results, removal of redundancy in databases and data integration. Similarity-based grouping of data entries is not a trivial task in the context of life science data sources as the stored data is complex, highly correlated and represented at different levels of granularity. The contribution of this paper is two-fold. 1) We propose a method for similarity-based grouping and 2) we show results from test cases. As the main steps the method contains specification of grouping rules, pairwise grouping between entries, actual grouping of similar entries, and evaluation and analysis of the results. Often, different strategies can be used in the different steps. The method enables exploration of the influence of the choices and supports evaluation of the results with respect to given classifications. The grouping method is illustrated by test cases based on different strategies and classifications. The results show the complexity of the similarity-based grouping tasks and give deeper insights in the selected grouping tasks, the analyzed data source, and the influence of different strategies on the results.

    Ort, förlag, år, upplaga, sidor
    Springer Berlin/Heidelberg, 2006
    Serie
    Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 4075
    Serie
    Lecture Notes in Bioinformatics ; 4075
    Nationell ämneskategori
    Teknik och teknologier
    Identifikatorer
    urn:nbn:se:liu:diva-14036 (URN)10.1007/11799511_13 (DOI)000239622300011 ()978-3-540-36595-2 (ISBN)978-3-540-36593-8 (ISBN)
    Konferens
    DILS: International Workshop on Data Integration in the Life Sciences Data Integration in the Life Sciences Third International Workshop, DILS 2006, Hinxton, UK, July 20-22, 2006.
    Tillgänglig från: 2006-09-28 Skapad: 2006-09-28 Senast uppdaterad: 2018-11-27Bibliografiskt granskad
    6. Tool for Evaluating Strategies for Grouping of Biological Data
    Öppna denna publikation i ny flik eller fönster >>Tool for Evaluating Strategies for Grouping of Biological Data
    2007 (Engelska)Ingår i: Journal of Integrative Bioinformatics, ISSN 1613-4516, Vol. 4, nr 3Artikel i tidskrift (Refereegranskat) Published
    Abstract [en]

    During the last decade an enormous amount of biological data has been generated and techniques and tools to analyze this data have been developed. Many of these tools use some form of grouping and are used in, for instance, data integration, data cleaning, prediction of protein functionality, and correlation of genes based on microarray data. A number of aspects influence the quality of the grouping results: the data sources, the grouping attributes and the algorithms implementing the grouping procedure. Many methods exist, but it is often not clear which methods perform best for which grouping tasks. The study of the properties, and the evaluation and the comparison of the different aspects that influence the quality of the grouping results, would give us valuable insight in how the grouping procedures could be used in the best way. It would also lead to recommendations on how to improve the current procedures and develop new procedures. To be able to perform such studies and evaluations we need environments that allow us to compare and evaluate different grouping strategies. In this paper we present a framework, KitEGA, for such an environment, and present its current prototype implementation. We illustrate its use by comparing grouping strategies for classifying proteins regarding biological function and isozymes.

    Nationell ämneskategori
    Teknik och teknologier Datavetenskap (datalogi) Bioinformatik (beräkningsbiologi)
    Identifikatorer
    urn:nbn:se:liu:diva-14037 (URN)10.2390/biecoll-jib-2007-83 (DOI)
    Tillgänglig från: 2006-09-28 Skapad: 2006-09-28 Senast uppdaterad: 2018-01-13
  • 43.
    Johansson, Magnus
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    NetworkPerf: A tool for the investigation of TCP/IP network performance at Saab Transpondertech2009Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    To detect network changes and network troubles, Transpondertech needs a tool that can make network measurements.

    The purpose of this thesis has been to find measurable network properties that best reflect the status of a network, to find methods to measure these proerties and to implement these methods in one single tool. The resulting tool is called NetworkPerf and can measure the following network properties: availability, round-trip delay, delay variation, number of hops, intermediate hosts, available bandwidth, available ports, and maximum allowed packet size. Together, these properties give a good picture of the status of a network connection.

    The thesis also presents the methods used for meassuring these properties in the tool.

  • 44.
    Jönsson, Arne
    et al.
    Linköpings universitet, Institutionen för datavetenskap. Linköpings universitet, Tekniska högskolan.
    Strömbäck, Lena
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Robust Interaction through Partial Interpretation and Dialogue Management,1998Ingår i: Proceedings of Coling-ACL'98, Montrèal, Canada, 1998Konferensbidrag (Refereegranskat)
  • 45.
    Karresand, Martin
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Completing the Picture: Fragments and Back Again2008Licentiatavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Better methods and tools are needed in the fight against child pornography. This thesis presents a method for file type categorisation of unknown data fragments, a method for reassembly of JPEG fragments, and the requirements put on an artificial JPEG header for viewing reassembled images. To enable empirical evaluation of the methods a number of tools based on the methods have been implemented.

    The file type categorisation method identifies JPEG fragments with a detection rate of 100% and a false positives rate of 0.1%. The method uses three algorithms, Byte Frequency Distribution (BFD), Rate of Change (RoC), and 2-grams. The algorithms are designed for different situations, depending on the requirements at hand.

    The reconnection method correctly reconnects 97% of a Restart (RST) marker enabled JPEG image, fragmented into 4 KiB large pieces. When dealing with fragments from several images at once, the method is able to correctly connect 70% of the fragments at the first iteration.

    Two parameters in a JPEG header are crucial to the quality of the image; the size of the image and the sampling factor (actually factors) of the image. The size can be found using brute force and the sampling factors only take on three different values. Hence it is possible to use an artificial JPEG header to view full of parts of an image. The only requirement is that the fragments contain RST markers.

    The results of the evaluations of the methods show that it is possible to find, reassemble, and view JPEG image fragments with high certainty.

  • 46.
    Kindborg, Mikael
    et al.
    Linköpings universitet, Institutionen för datavetenskap, MDI - Interaction and Service Design Research Group. Linköpings universitet, Tekniska högskolan.
    Åberg, Johan
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Shahmehri, Nahid
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    A lightweight agent framework for interactive multi-agent applications1999Ingår i: Proceedings of Fourth International Conference on the Practical Application of Intelligent Agents and Multi-Agents, 1999, 1, s. 123-142Konferensbidrag (Refereegranskat)
    Abstract [en]

    Usability issues are traditionally associated with user interfaces rather than with agent frameworks. We argue that the metaphors and models used in a framework will affect the thinking of the developer, and will influence the application design. Therefore, usability is of central importance for successful software development, and for reducing development and maintenance costs. We discuss the design and implementation of a lightweight agent framework for interactive multi-agent applications. A lightweight framework is advantageous for distributed interactive applications, for instance applications running on hand-held devices with limited memory. The design is based on minimalism and simplicity. We present the results from a usability study of the framework, where issues such as learnability and attitude have been evaluated. The study shows that minimalist design principles are useful for achieving understandable and navigable frameworks.

  • 47.
    Köhn, Dagmar
    et al.
    Institute for Computer Science Universität Rostock.
    Strömbäck, Lena
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    A method for Semi-automatic Standard Integration in Systems Biology2008Ingår i: Database and Expert Systems Applications,2008 / [ed] Bhowmick, Sourav S., Küng, Josef, Wagner, Roland, Heidelberg, Germany: Springer , 2008, s. 745-752Konferensbidrag (Refereegranskat)
    Abstract [en]

    The development of standards for biological pathways has led to a huge amount of model data stored in a variety of different formats represented in XML (e. g. SBML) or OWL (e. g. BioPAX). As a result, there is an urgent need for the conversion of data between different formats, especially between XML and OWL data. The fact that that transformation is hard to realize hampers the integration of data in the area. Addressing this problem, the following article proposes a general, semi-automatic solution by suggesting the transformation of XML Schema based data into an OWL format. The general solution presented here will support biologists by offering them a way to query data of any format and as well compare different data files or schemas to each other using OWL as a common format for matching and providing a backwards transformation to XML Schema. The paper presents a first architectural approach and its prototype implementation. The evaluation showed that the approach is promising.

  • 48.
    Köhn, Dagmar
    et al.
    Rostock Universität.
    Strömbäck, Lena
    Linköpings universitet, Tekniska högskolan. Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem.
    A schema matching architecture for the bioinformatics domain2006Ingår i: Winter Simulation Conference,2006, New York: ACM , 2006Konferensbidrag (Refereegranskat)
  • 49.
    Lambrix, Patrick
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    Jakoniene, Vaida
    Linköpings universitet, Institutionen för datavetenskap, IISLAB - Laboratoriet för intelligenta informationssystem. Linköpings universitet, Tekniska högskolan.
    A databank knowledge base for the integration of biological databanks2002Ingår i: Bioinformatics, 2002Konferensbidrag (Övrigt vetenskapligt)
  • 50.
    Lambrix, Patrick
    et al.
    Linköpings universitet, Institutionen för datavetenskap, IISLAB. Linköpings universitet, Tekniska högskolan.
    Jakoniené, Vaida
    Linköpings universitet, Institutionen för datavetenskap, IISLAB. Linköpings universitet, Tekniska högskolan.
    Towards transparent access to multiple biological databanks2003Ingår i: Proceedings of the first Asia-Pacific Bioinformatics Conference, Adelaide, Australia, 2003, Vol. 33, s. 53-60Konferensbidrag (Refereegranskat)
    Abstract [en]

    Nowadays, biologists use a number of large biological databanks to find relevant information for their research. Users of these databanks face a number of problems. One problem is that users are required to have good knowledge about the contents, implementations and conceptual models of many databanks to be able to ask precise and relevant questions. Further, the terminology that is used in the different databanks may be different. Also, when asking complex queries to multiple databanks, users need to construct a query plan on their own possibly leading to poor performance or not even obtaining results. To alleviate these problems we define an architecture for systems that deal with these problems by allowing for a transparent and integrated way to query the multiple sources. The contribution of this paper is threefold. First, we describe a study of current biological databanks. Then, we propose a base query language that contains operators that should be present in any query language for biological databanks. Further, we present an architecture for a system supporting such a language and providing integrated access to the highly distributed and heterogeneous environment of biological databanks.

123 1 - 50 av 109
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf