This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004.
The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections on algorithms and modeling; systems, protocols, and performance; transactions and information dissemination; internet query and retrieval; protocol and replica management; ontologies and services; systems analysis and modeling; tools and techniques; systems security; intrusion detection and access control; networks and security; secured systems design; and security services.
Author(s): Krithi Ramamritham (auth.), R. K. Ghosh, Hrushikesha Mohanty (eds.)
Series: Lecture Notes in Computer Science 3347
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 474
Tags: Programming Techniques; Computer Communication Networks; Software Engineering; Algorithm Analysis and Problem Complexity; Information Systems Applications (incl.Internet); Information Storage and Retrieval
Front Matter....Pages -
Taming the Dynamics of Disributed Data....Pages 1-1
Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster....Pages 50-59
Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric....Pages 60-64
A Scalable and Robust QoS Architecture for WiFi P2P Networks....Pages 65-74
NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity....Pages 75-84
Energy Efficient Cache Invalidation in a Disconnected Mobile Environment....Pages 85-95
An Efficient Data Dissemination Schemes for Location Dependent Information Services....Pages 96-105
A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts....Pages 106-116
A Nested Transaction Model for LDAP Transactions....Pages 117-126
Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks....Pages 127-134
An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems....Pages 135-144
Cybersecurity: Opportunities and Challenges....Pages 145-145
Data in Your Space....Pages 2-20
Enabling Technologies for Harnessing Information Explosion....Pages 21-21
Fair Leader Election by Randomized Voting....Pages 22-31
An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks....Pages 32-41
Distributed Balanced Tables: A New Approach....Pages 42-49
Vulnerabilities and Threats in Distributed Systems....Pages 146-157
A TNATS Approach to Hidden Web Documents....Pages 158-167
Querying XML Documents from a Relational Database in the Presence of DTDs....Pages 168-177
SAQI: Semantics Aware Query Interface....Pages 178-193
Hybrid-Chord: A Peer-to-Peer System Based on Chord....Pages 194-203
A Generic and Flexible Model for Replica Consistency Management....Pages 204-209
An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks....Pages 210-216
The Roles of Ontology and Metadata Registry for Interoperable Databases....Pages 217-226
DHL: Semantically Rich Dynamic and Active Hyperlinks....Pages 227-236
User-Class Based Service Acceptance Policy Using Cluster Analysis....Pages 237-242
Tools and Techniques for Multi-site Software Development....Pages 243-243
Specifying a Mobile Computing Infrastructure and Services....Pages 244-254
Generating a Prototype from a UML Model of System Requirements....Pages 255-265
A Type System for an Aspect Oriented Programming Language....Pages 266-272
Secure Requirements Elicitation Through Triggered Message Sequence Charts....Pages 273-282
Framework for Safe Reuse of Software Binaries....Pages 283-293
Supporting Partial Component Matching....Pages 294-303
A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs....Pages 304-309
Pattern Semantic Link: A Reusable Pattern Representation in MDA Context....Pages 310-317
Compatibility Test and Adapter Generation for Interfaces of Software Components....Pages 318-328
A Modern Graphic Flowchart Layout Tool....Pages 329-335
A Flexible Authorization Framework for E-Commerce....Pages 336-345
Efficient Algorithms for Intrusion Detection....Pages 346-352
Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection....Pages 353-362
Using Schemas to Simplify Access Control for XML Documents....Pages 363-368
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions....Pages 369-378
Implementing Consistency Checking in Correlating Attacks....Pages 379-384
LSAD: Lightweight SYN Flooding Attack Detector....Pages 385-390
UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks....Pages 391-399
Tracing Attackers with Deterministic Edge Router Marking (DERM)....Pages 400-409
Distributing Key Updates in Secure Dynamic Groups....Pages 410-419
Succinct and Fast Accessible Data Structures for Database Damage Assessment....Pages 420-429
A Secure Checkpointing Protocol for Survivable Server Design....Pages 430-440
MobiCoin: Digital Cash for M-Commerce....Pages 441-451
Cellular Automata: An Ideal Candidate for a Block Cipher....Pages 452-457
NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images....Pages 458-467
Improving Feature Selection in Anomaly Intrusion Detection Using Specifications....Pages 468-468
Towards Automatic Learning of Valid Services for Honeypots....Pages 469-469
Back Matter....Pages -