Abstract: This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security
Security Intelligence for Broadcast : Threat Analytics
β Scribed by Sumit Chakraborty
- Publisher
- Business Analytics Research Lab India
- Year
- 2012
- Tongue
- English
- Leaves
- 9
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Broadcast or multicast is one of the most fundamental
concepts in data communication and distributed cryptography. A
central entity wishes to broadcast a secret data stream to a
dynamically changing privileged subset of recipients in such a
way that non-members of the privileged class cannot learn the
secret. This work presents an Adaptively Secure Broadcast
Algorithm (ASBA) based on threats analytics and case based
reasoning. It defines the security intelligence of an adaptively
secure broadcast comprehensively with a novel concept. It
recommends a set of intelligent model checking moves for the
verification of security intelligence of broadcasting mechanism.
The algorithm is analyzed from the perspectives of security
intelligence, communication complexity, computational
intelligence and efficiency of mechanism. The computational
intelligence is associated with the complexity of broadcast
scheduling, verification of security intelligence of broadcasting
system, key management strategies and payment function
computation. The cost of communication depends on number of
agents and subgroups in the broadcasting group and complexity of
data. The algorithm is applicable to the analysis of intelligent
mechanisms in static and dynamic networks, auction or
combinatorial auction for e-market, digital content distribution
through computational advertising, cloud computing, radio and
digital TV broadcast, SCADA and sensor networks.
β¦ Table of Contents
The work is organized as follows. Section 1 starts with
introduction, the definition of the problem of adaptively secure
broadcast, research methodology and states contributions. It
reviews existing literature and analyzes the gaps. Section 2
presents adaptively secure broadcast algorithm (ASBA). Section 3
analyzes the algorithm from the perspectives of security
intelligence, computational and communication complexity and
efficiency of mechanism. Section 4 concludes the work.
π SIMILAR VOLUMES
Abstract: Broadcast or multicast is one of the most fundamental concepts in data communication distributed cryptography. A central entity wishes to broadcast a secret data stream to a dynamically changing privileged subset of recipients in such a way that non-members of the privileged class cannot l
<p><span>In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromised data and sufficient losses. Massive los
<p><span>Climate change, increasing population, food-versus-fuel economics, pandemics, etc. pose a threat to food security to unprecedented levels. It has fallen upon the practitioners of agriculture and technologists of the world to innovate and become more productive to address the multi-pronged f
<p>This is one of the very few books focused on analysis of multimedia data and newly emerging multimedia applications with an emphasis on security. The main objective of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technol
The <strong>Third Edition </strong>of <strong>Structured Analytic Techniques for Intelligence Analysis</strong> by Randolph H. Pherson and Richards J. Heuer Jr showcases sixty-six structured analytic techniquesβnine new to this editionβthat represent the most current best practices in intelligence,