Efficient distributed path computation on RDF knowledge graphs using partial evaluation

2021 ◽  
Author(s):  
Qaiser Mehmood ◽  
Muhammad Saleem ◽  
Alokkumar Jha ◽  
Mathieu d’Aquin
2021 ◽  
pp. 274-289
Author(s):  
Jiao Xing ◽  
Baozhu Liu ◽  
Jianxin Li ◽  
Farhana Murtaza Choudhury ◽  
Xin Wang

2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


Author(s):  
Sangita Solanki ◽  
Raksha Upadhyay ◽  
Uma Rathore Bhatt

Cloud-integrated wireless optical broadband (CIW) access networks inheriting advantages of cloud computing, wireless and optical access networks have a broad prospect in the future. Due to failure of components like OLT level, ONU level, link or path failure and cloud component level in CIW, survivability is becoming one of the important issues. In this paper, we have presented cloud-integrated wireless-optical broadband access network with survivability using integer linear programming (ILP) model, to minimize the number of cloud components while providing maximum backup paths. Hence, we have proposed protection through cloud-integrated wireless router to available ONUs (PCIWRAO). So, evaluated the backup path computation. We have considered ONU level failure in which the affected traffic is transferred through wireless routers and cloud component to the available ONUs using Manhattan distance algorithm. Simulation results show different configurations for different number of routers and cloud components illustrating available backup path when ONU fails.


2019 ◽  
Vol 62 (8) ◽  
pp. 36-43 ◽  
Author(s):  
Natasha Noy ◽  
Yuqing Gao ◽  
Anshu Jain ◽  
Anant Narayanan ◽  
Alan Patterson ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document