: Joaquim Filipe, Mohammad S. Obaidat
: E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006, Selected Papers
: Springer-Verlag
: 9783540707608
: 1
: CHF 61.70
:
: Internet
: English
: 381
: DRM
: PC/MAC/eReader/Tablet
: PDF

This book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ICETE 2006, held in Setúbal, Portugal, August 7-10, 2006. The 29 revised full papers presented were carefully reviewed and selected from 326 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.

Preface5
Organization6
Table of Contents13
PART I ICE-B16
Towards Automated Service Trading17
Introduction17
Conceptual Framework18
Trading20
Discovery20
Information21
Selection22
AgreementMaking22
Binding23
Related Work24
Conclusions and Future Work27
References28
SAGA: An Adaptive Infrastructure for Secure Available GRID on Ad-Hoc Networks29
Introduction29
Adaptive Infrastructure31
Adaptive Grid Behaviour33
Predictive Infrastructure Modification34
Reactive Infrastructure Modification34
Secure Infrastructure36
SAGA Application38
Conclusions40
References40
Variable Quantity Market Clearing Algorithms42
Introduction42
Preliminaries44
Model44
Goals44
Analysing Efficiency45
Quantity Clearing Algorithms46
Algorithm 146
Algorithm 247
Algorithm 348
Algorithm 448
Algorithm 548
Algorithm 649
Comparison49
Conclusions52
References53
Modeling the Dynamics of Social Networks54
Introduction54
System-Theoretic Framework56
When the Power Law?59
Modeling the Dynamics of Social Networks60
Experiment 160
Experiment 261
Discussion62
Conclusions64
References65
Reputation Management Service for Peer-to-Peer Enterprise Architectures66
Introduction66
Reputation Management in Role-Based Peergroups67
Analytical Model68
Four-Role Configuration Example70
Emulation Results72
Related Work74
Conclusions77
References77
A New Approach for the Trust Calculation in Social Networks78
Introduction78
Literature Review80
Trust Function81
Evaluation of the Yu Trust Function82
Modification of the Trust Function84
Results86
Conclusions89
References90
PART II SECRYPT92
Spoofed ARP Packets Detection in Switched LAN Networks93
Introduction93
Related Work94
Background95
ARP Protocol95
ARP Cache95
ARP Cache Poisoning Attack96
Static ARP Cache Update96
Dynamic ARP Cache Update96
The MiM Attack97
Detection of MiM Attack98
Detection of Hosts with Enabled IP Packet Routing98
Detection of ARP Cache Poisoning Attack100
The AntiMiM Application101
Network Performance Analysis102
Conclusions102
References103
Efficient All-or-Nothing Encryption Using CTR Mode104
Introduction104
All-or-Nothing Transforms105
Definitions105
Applications105
Constructions106
CTRT-CTR Encryption106
Package Transform106
CTR Transform107
CTRT-CTR Mode107
Latency Considerations108
Efficient All-or-Nothing Encryption109
Applications110
Proofs of Security111
Existing Security Results111
Security of AONT-CTR Encryption112
Security of Efficient AONT-CTR Encryption115
Conclusions116
References117
Proposals for Iterated Hash Functions119
Introduction119
Properties of Existing Constructions120
The Davies-Meyer Construction120
The