Scenario Analysis using Out-of-line Firewall Evaluation Framework.
Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007)
Scenario Analysis using Out-of-line Firewall Evaluation Framework
Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These a...
On the design of scalable pipelined broadcasting for mesh networks
Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
On the design of scalable pipelined broadcasting for mesh networks. In High Performance Computing Systems and Applications, 98-105. https://doi.org/10.1109/HPCSA.2002.1019140
Minimising the communication latency and achieving considerable scalability are of paramount importance when designing high performance broadcast algorithms. Many algorithms f...
A scalable broadcast algorithm for multiport meshes with minimum communication steps
Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2003)
A scalable broadcast algorithm for multiport meshes with minimum communication steps. In Proceedings of the Ninth International Conference on Parallel and Distributed Systems (ICPADS’02), 203-208. doi:10.1109/icpads.2002.1183400
Many broadcast algorithms have been proposed for the mesh over the past decade. However, most of these algorithms do not exhibit good scalability properties as the network siz...
A Performance Study of Path Based Multicast Communication Algorithms
Conference Proceeding
Al-Dubai, A., & Romdhani, I. (2006)
A Performance Study of Path Based Multicast Communication Algorithms. In International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2006), 245-250. doi:10.1109/parelec.2006.7
Multicast communication?s history has been driven by many schemes; however, a few have shown their efficiency on interconnection networks. Among these schemes, path based mult...
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things
Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)
Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015)
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), (1109-1117). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.166
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...
A scalable plane-based broadcast algorithm for 3D-Mesh networks
Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2002)
A scalable plane-based broadcast algorithm for 3D-Mesh networks. In Proceedings of the Eleventh Euromicro Conference on Parallel,Distributed and Network-Based Processing (Euro-PDP’03), 149-156. doi:10.1109/empdp.2003.1183581
Broadcast algorithms for wormhole–switched meshes
have been widely reported in the literature. However,
most of these algorithms handle broadcast in a sequential
manner and do...
On balancing traffic load in path-based multicast communication.
Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., & Mackenzie, L. (2002)
On balancing traffic load in path-based multicast communication. In SPECTS '03, 533-540
Multicast is the most primitive collective capability of any
message-passing network. It is itself central to many
important parallel applications in Science and
Engineering b...
An efficient path-based multicast algorithm for mesh networks
Conference Proceeding
Mackenzie, L., Ould-Khaoua, M., Al-Dubai, Y., Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2002)
An efficient path-based multicast algorithm for mesh networks. In Proceedings International Parallel and Distributed Processing Symposium, 283-290. doi:10.1109/ipdps.2003.1213509
This paper presents a new multicast path-based algorithm, referred to here as the qualified groups (QG for short), which can achieve a high degree of parallelism and low commu...
Who would you trust to identify you in accessing your health record?
Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...