- Browse by Date
Department of Computer Science
Permanent URI for this community
Browse
Browsing Department of Computer Science by Issue Date
Now showing 1 - 10 of 186
Results Per Page
Sort Options
Item Dependability and Security in Medical Information System(Springer Nature, 2007) Zou, Xukai; Dai, Yuan-Shun; Doebbeling, Bradley; Qi, Mingrui; Department of Computer and Information Science, School of ScienceMedical Information Systems (MIS) help medical practice and health care significantly. Security and dependability are two increasingly important factors for MIS nowadays. In one hand, people would be willing to step into the MIS age only when their privacy and integrity can be protected and guaranteed with MIS systems. On the other hand, only secure and reliable MIS systems would provide safe and solid medical and health care service to people. In this paper, we discuss some new security and reliability technologies which are necessary for and can be integrated with existing MISs and make the systems highly secure and dependable. We also present an implemented Middleware architecture which has been integrated with the existing VISTA/CPRS system in the U.S. Department of Veterans Affairs seamlessly and transparently.Item Secure Authentication in Heterogeneous Wireless Networks(Hindawi, 2008-04-03) Durresi, Arjan; Durresi, Mimoza; Barolli, Leonard; Computer and Information Science, School of ScienceThe convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G – WLAN user authentication.Item Networked Biomedical System for Ubiquitous Health Monitoring(Hindawi, 2008-11-20) Durresi, Arjan; Durresi, Mimoza; Merkoci, Arben; Barolli, Leonard; Computer and Information Science, School of ScienceWe propose a distributed system that enables global and ubiquitous health monitoring of patients. The biomedical data will be collected by wearable health diagnostic devices, which will include various types of sensors and will be transmitted towards the corresponding Health Monitoring Centers. The permanent medical data of patients will be kept in the corresponding Home Data Bases, while the measured biomedical data will be sent to the Visitor Health Monitor Center and Visitor Data Base that serves the area of present location of the patient. By combining the measured biomedical data and the permanent medical data, Health Medical Centers will be able to coordinate the needed actions and help the local medical teams to make quickly the best decisions that could be crucial for the patient health, and that can reduce the cost of health service.Item Advances in Mobile Communications and Computing(Hindawi, 2009) Durresi, Arjan; Denko, Mieso; Computer and Information Science, School of ScienceItem Advances in Wireless Networks(Hindawi, 2009-04-13) Durresi, Arjan; Denko, Mieso; Computer and Information Science, School of ScienceItem Tools for Performance Assessment of OLSR Protocol(Hindawi, 2009-04-29) Ikeda, Makoto; Barolli, Leonard; De Marco, Giuseppe; Yang, Tao; Durresi, Arjan; Xhafa, Fatos; Computer and Information Science, School of ScienceIn this paper, we evaluate the performance of Optimized Link State Routing (OLSR) protocol by experimental and simulation results. The experiments are carried out by using our implemented testbed and the simulations by using ns-2 simulator. We also designed and implemented a new interface for the ad-hoc network testbed in order to make more easier the experiments. The comparison between experimental and simulation results shows that for the same parameters set, in the simulation we did not notice any packet loss. On the other hand, in the experiments we experienced packet loss because of the environment effects and traffic interference.Item Simulating Real-Time Aspects of Wireless Sensor Networks(Springer Verlag, 2009-12-22) Pagano, Paolo; Chitnis, Mangesh; Lipari, Giuseppe; Nastasi, Christian; Liang, Yao; Computer and Information Science, School of ScienceWireless Sensor Networks (WSNs) technology has been mainly used in the applications with low-frequency sampling and little computational complexity. Recently, new classes of WSN-based applications with different characteristics are being considered, including process control, industrial automation and visual surveillance. Such new applications usually involve relatively heavy computations and also present real-time requirements as bounded end-to- end delay and guaranteed Quality of Service. It becomes then necessary to employ proper resource management policies, not only for communication resources but also jointly for computing resources, in the design and development of such WSN-based applications. In this context, simulation can play a critical role, together with analytical models, for validating a system design against the parameters of Quality of Service demanded for. In this paper, we present RTNS, a publicly available free simulation tool which includes Operating System aspects in wireless distributed applications. RTNS extends the well-known NS-2 simulator with models of the CPU, the Real-Time Operating System and the application tasks, to take into account delays due to the computation in addition to the communication. We demonstrate the benefits of RTNS by presenting our simulation study for a complex WSN-based multi-view vision system for real-time event detection.Item Architecture for Mobile Heterogeneous Multi Domain Networks(Hindawi, 2010-04-01) Durresi, Arjan; Zhang, Ping; Durresi, Mimoza; Barolli, Leonard; Computer and Information Science, School of ScienceMulti domain networks can be used in several scenarios including military, enterprize networks, emergency networks and many other cases. In such networks, each domain might be under its own administration. Therefore, the cooperation among domains is conditioned by individual domain policies regarding sharing information, such as network topology, connectivity, mobility, security, various service availability and so on. We propose a new architecture for Heterogeneous Multi Domain (HMD) networks, in which one the operations are subject to specific domain policies. We propose a hierarchical architecture, with an infrastructure of gateways at highest-control level that enables policy based interconnection, mobility and other services among domains. Gateways are responsible for translation among different communication protocols, including routing, signalling, and security. Besides the architecture, we discuss in more details the mobility and adaptive capacity of services in HMD. We discuss the HMD scalability and other advantages compared to existing architectural and mobility solutions. Furthermore, we analyze the dynamic availability at the control level of the hierarchy.Item New Architecture for the Future Internet(Office of the Vice Chancellor for Research, 2010-04-09) Durresi, ArjanThe Internet is one of the most successful technological achievements of our time. The Internet mirrors and enhances all aspects of your lives, by creating unprecedented opportunities for advancing knowledge in all fields of human activities. However, the 21st century society's needs may not be met by the current trajectory of incremental changes to the current Internet. Therefore, the research community worldwide, well supported by corresponding funding agencies, is engaged in exploring new architectures for the future Internet. We are working on one of the collaborative projects to design a new Internet architecture. Our larger team includes multidisciplinary expertise of researchers from US and the world, from institutions such as Washington University in Saint Louis, Purdue University, Seikei University in Tokyo Japan, and Technical University of Catalonia Spain. Our research in this field focuses on various major requirements of the future Internet, including security, resilience, mobility, better manageability, economic viability and suitability for the needs of society. The today's Internet is marked by a number of serious security issues, including weak defenses against attacks on hosts, attacks that attempt to disrupt communications, attacks on availability (Denial of Service attacks), and attacks on the proper operation of applications. We are exploring approaches that will bring to the Internet concepts that have evolved in real life security. For example, in real life we use satisfying personal authentication mechanisms; our society's security is based on a strong legal system, various complementary agencies, compartmental division of tasks, including national borders and so on. Most of such concepts do not apply to the Internet today. Furthermore, the existing Internet architecture not only does not provide sufficient security, but worst, it empowers the attacking activities. We propose drastic changes, starting with strong authentication, and implementation of various layers of security, that will make the Internet a much more trustworthy and resilient system. The future Internet will be composed mostly of mobile nodes such as cell phones, PDAs, various types of sensors, and so on. Unfortunately, today's Internet is not equipped for mobility. We are exploring solutions that provide mobility service as an interplay among technical and economic factors. The practice has shown that many sound technical solutions have failed because of the lack of economic viability. Therefore, we extend the tradeoff among technical and economic aspects to all future Internet services. Furthermore, our architecture is policy based and its management is business oriented. Our architecture is flexible and open to future needs of society. This project is currently partially funded by NSF. We are looking forward to expand our collaborations and partnership in this research field.Item A New Approach for Cancelable Iris Recognition(Office of the Vice Chancellor for Research, 2010-04-09) Yang, Kai; Yan, Sui; Zhou, Zhi; Du, Yingzi; Zou, Xukai; Orr, ScottThe iris is a stable and reliable biometric for positive human identification. However, the traditional iris recognition scheme raises several privacy concerns. One’s iris pattern is permanently bound with him and cannot be changed. Hence, once it is stolen, this biometric is lost forever as well as all the applications where this biometric is used. Thus, new methods are desirable to secure the original pattern and ensure its revocability and alternatives when compromised. In this paper, we propose a novel scheme which incorporates iris features, noninvertible transformation and data encryption to achieve “cancelability” and at the same time increases iris recognition accuracy.