This research paper from Purdue University presents a security architecture that protects both clients and services in distributed proxy-based computing. In this architecture, the service registers a signed authentication proxy with the directory. The client, after downloading a signed authentication proxy from the directory, verifies the signature on the proxy, authenticates itself to the service through the proxy, and receives a dedicated session proxy for the service over a secure channel. This paper also describes a Java-based toolkit that implements the security architecture. This toolkit enables developers to add security to Java RMI-based applications with minimal implementation effort.
With the IT workforce being affected by offshore outsourcing in a negative way it is inevitable that the university programs like CPT programs will be affected. The university needs to be a source for supplying industry the needs for an ever-changing workforce. Students need to provide with the skills that will allow them to get jobs in their chosen career path. This research paper will detail the change in focus in the CPT 180 course and overall how the curriculum is being transformed.
This paper presents an energy-efficient distributed clustering approach for ad-hoc sensor networks. The approach is hybrid: cluster heads are randomly selected based on their residual energy, and nodes join clusters such that communication cost is minimized. Based on this approach, the paper introduces the HEED protocol, which terminates in a constant number of iterations, independent of the network diameter. HEED operates in quasi-stationary networks where nodes are location-unaware and have equal significance.
A Command and Maintenance Environment (CME) that optimizes the instruction and maintenance process by integrating data, information, and logistics across the bases, battle ships, and battle groups will support all strategies for reducing the maintenance and manning burden throughout the fleet. As an important part of the Smart Ship Science and Technology Program of Navy, wireless/mobile networks have been deployed on battle ships to provide increased responsiveness, visibility, and accessibility of information to the commander and crew. But there are security risks that threaten the safety and efficiency of the system.