Abstract-Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP.In the traditional application-centric Identity Management (IDM) model, each application keeps trace of identities of the entities that use it. In cloud computing, entities may have multiple accounts associated with different SPs, or one SP. Sharing PIIs of the same entity across services along with associated attributes can lead to mapping of PIIs to the entity.We propose an entity-centric approach for IDM in the cloud. The approach is based on: (1) active bundles-each including a payload of PII, privacy policies and a virtual machine that enforces the policies and uses a set of protection mechanisms to protect themselves; (2) anonymous identification to mediate interactions between the entity and cloud services using entity's privacy policies.The main characteristics of the approach are: it is independent of third party, gives minimum information to the SP and provides ability to use identity data on untrusted hosts.
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. AFRL-IF-RS-TP-2006-8 SPONSOR/MONITOR'S ACRONYM(S) 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES)Air ABSTRACTTo effectively enhance service availability, this paper proposes a redundancy configuration for a database unit residing in a command and control (C2) system that supports air operations. The results of modeling, supervisory control, and performance analysis of the database unit are presented. The unit is modeled as a closed Markovian queuing network. State variable feedback is used to implement the functions of restoration and routing upon the identification of the failure of one of the database servers in the unit. Several control policies are evaluated in terms of the resulting mean time to unit failure, the steady state availability, the expected response time, and the service overhead of the database unit. Abstract -To effectively enhance service availability, this paper proposes a redundancy configuration for a database unit residing in a command and control (C2) system that supports air operations. The results of modeling, supervisory control, and performance analysis of the database unit are presented. The unit is modeled as a closed Markovian queuing network. State variable feedback is used to implement the functions of restoration and routing upon the identification of the failure of one of the database servers in the unit. Several control policies are evaluated in terms of the resulting mean time to unit failure, the steady state availability, the expected response time, and the service overhead of the database unit.
Abstract-Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of "users" represents a danger of multiple, collaborative threats.In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (SPs). Sharing sensitive identity information (that is, Personally Identifiable information or PII) along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, tantamount to privacy loss.Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Available solutions use trusted third party (TTP) in identifying entities to SPs. The solution providers do not recommend the usage of their solutions on untrusted hosts.We propose an approach for IDM, which is independent of TTP and has the ability to use identity data on untrusted hosts. The approach is based on the use of predicates over encrypted data and multi-party computing for negotiating a use of a cloud service. It uses active bundle-which is a middleware agent that includes PII data, privacy policies, a virtual machine that enforces the policies, and has a set of protection mechanisms to protect itself. An active bundle interacts on behalf of a user to authenticate to cloud services using user's privacy policies.
Unmanned aerial vehicles are becoming prevalent in tactical networks as they are proving to be an extremely flexible platform for a variety of applications. Increasingly, UAVs need to cooperate with each other in order to perform complex tasks such as target monitoring and prosecution, information gathering and processing, and delivery between disconnected portions of the network. However, UAV cooperation in tactical scenarios represents a major challenge from both the coordination and communication perspectives. In fact, cooperating UAVs must achieve a high degree of coordination in order to accomplish complex tasks in a dynamic and uncertain environment. In turn, as UAVs interact with other entities, the effective coordination of multiple-UAV operations requires specific support in terms of efficient communication protocols and mechanisms exploiting UAVs as mobile assets that facilitate and hasten critical information flows. This article presents a series of considerations and lessons learned that we have collected in our experience with multiple- UAV coordination and communications in tactical edge networks, and discusses some of the main components of a middleware we specifically designed to support multiple-UAV operations
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.