2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW)

26-26 Sept. 2016

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2016, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1968 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Message from the WMCSP 2016 Workshop Co-Chairs

    Publication Year: 2016, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Message from the W-PSDS 2016 Workshop Co-Chairs

    Publication Year: 2016, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • SRDS 2016 Symposium Organizers

    Publication Year: 2016, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • WMCSP 2016 Workshop Organizers

    Publication Year: 2016, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • W-PSDS 2016 Workshop Organizers

    Publication Year: 2016, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • External Reviewers

    Publication Year: 2016, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • sKnock: Port-Knocking for Masses

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Port-knocking is the concept of hiding remote services behind a firewall which allows access to the services'listening ports only after the client has successfully authenticatedto the firewall. This helps in preventing scanners from learningwhat services are currently available on a host and also servesas a defense against zero-day attacks. Existing port-knockingimplementations are not scalable in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Access Control Model for Context-Aware Services Offloaded to Cloud Computing

    Publication Year: 2016, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Off loading context-aware services with intensive tasks to cloud computing infrastructures is useful. However, we have a problem resulting from differences between context-centric access control models for pervasive computing and subject-based access control models for cloud computing. To solve this problem, this paper proposes a location model for spatially specifying containment relationships of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comfort and Security Perception of Biometrics in Mobile Phones with Widespread Sensors

    Publication Year: 2016, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1011 KB) | HTML iconHTML

    Comfort and security perception are two key factorsto provide an adequate biometric solution. This article presentsthe results of an online survey about these characteristics in fourdifferent biometric modes implemented in mobile phones withwidespread sensors. Additionally, it presents the main concernsthat the use of these biometric modes generates in people, whichprovides a roadmap of additional... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Configurable Multibiometric System for Authentication at Different Security Levels Using Mobile Devices

    Publication Year: 2016, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    This work presents a configurable multibiometricsystem oriented to mobile devices which combines face, handand in-air signature biometrics to provide three different levelsof security. The number of traits involved in the authenticationincreases with the security strength, allowing the balance betweencomfort and accuracy according to the security requirements ofthe final application. In addition, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BioALeg - Enabling Biometric Authentication in Legacy Web Sites

    Publication Year: 2016, Page(s):25 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    The authentication of users in legacy web sites via mobile devices is still a challenging problem. Users are required to provide passwords, introducing several vulnerabilities: since strong passwords are hard to memorize, users often use weak passwords that are easy to break, and passwords can be intercepted by malware and stolen. In this paper we propose a novel architecture, named BioALeg, to su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SafeRegions: Performance Evaluation of Multi-party Protocols on HBase

    Publication Year: 2016, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    On-line applications and services are now a critical part of our everyday life. Using these services typically requires us to trust our personal or company's information to a large number of third-party entities. These entities enforce several security measures to avoid unauthorized accesses but data is still stored on common database systems that are designed without data privacy concerns in mind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ARM TrustZone for Secure Image Processing on the Cloud

    Publication Year: 2016, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Nowadays, offloading storage and processing capacity to cloud servers is a growing trend. This happens because high storage capacity and powerful processors are expensive, whilst cloud services provide a cheaper, ongoing, and reliable solution. The problem with cloud-based solutions is that servers are highly accessible through the Internet and therefore considerably exposed to hackers and malware... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thwarting Data Exfiltration by Repackaged Applications

    Publication Year: 2016, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Android applications are subject to repackaging attacks, where popular applications are modified, often by inserting malicious logic, re-signed, and then uploaded to an online store to be later on downloaded and installed by unsuspicious users. This paper presents a set of protocols for increasing trust in special-purpose Android applications, termed secured trusted applications, during communicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emusphere: Evaluating Planetary-Scale Distributed Systems in Automated Emulation Environments

    Publication Year: 2016, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    This paper presents Emusphere, an integrated emulation platform for the efficient evaluation of planetary-scale distributed systems. It allows system developers and architects to assess their systems in an environment that is able to provision any desired computation infrastructure, mimic realistic environmental conditions, and carry out arbitrary usage scenarios. Unlike existing testbeds which su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Have a Seat on the ErasureBench: Easy Evaluation of Erasure Coding Libraries for Distributed Storage Systems

    Publication Year: 2016, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    We present ErasureBench, an open-source framework to test and benchmark erasure coding implementations for distributed storage systems under realistic conditions. ErasureBench automatically instantiates and scales a cluster of storage nodes, and can seamlessly leverage existing failure traces. As a first example, we use ErasureBench to compare three coding implementations: a (10,4) Reed-Solomon (R... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive IP Mutation: A Proactive Approach for Defending against Worm Propagation

    Publication Year: 2016, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    IP address mutation is a proactive defense method that is used to reduce the risk of network attacks, especially to deal with the worm propagation attacks. However, previous work did not give much consideration to the negative effects that IP address mutation could bring to network performance. To be specific, there is a trade-off between network performance and security, which implies that when a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Convoy Effect in Atomic Multicast

    Publication Year: 2016, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Atomic multicast is a group communication primitive that allows disseminating messages to multiple distributed processes with strong ordering properties. As such, atomic multicast is a widely-employed tool to build large-scale systems, in particular when data is geo-distributed and/or replicated across multiple locations. However, all the most efficient atomic multicast algorithms suffer from a co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2016, Page(s): 73
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2016, Page(s): 74
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE