Asher Sinclair

Learn More
— The migration of web applications to Cloud computing platform has raised concerns about the privacy of sensitive data belonging to the consumers of cloud services. The traditional form of security tokens like username/password used to access cloud services are prone to phishing attacks and hence do not provide complete security. In this work we propose to(More)
Transport Layer Security (TLS) and its precursor Secure Sockets Layer (SSL) are the most widely deployed protocol to establish secure communication over insecure Internet Protocol (IP) networks. Providing a secure session layer on top of TCP, TLS is frequently the first defense layer encountered by adversaries who try to cause loss of confidentiality by(More)
Net-centric information spaces have become a necessary concept to support information exchange for tactical warfight-ing missions using a publish-subscribe-query paradigm. To support dynamic, mission-critical and time-critical operations , information spaces require quality of service (QoS)-enabled dissemination (QED) of information. This paper describes(More)
Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement of multiple service providers in a service request. The(More)
Publish-subscribe-based Information Management (IM) services provide a key enabling technology for net-centric operations. This paper describes technology for Quality of Service (QoS) and Internet-Protocol-based Airborne Networking features for IM services. Enhancing IM services with airborne networking features improves effectiveness in combined tactical(More)
Mobile peer-to-peer networks of aerial vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the(More)
Service-oriented architecture (SOA) middleware has emerged as a powerful and popular distributed We also discuss the design of several key QoS services and describe how QED's policy-driven approach bridges users to the underlying middleware and enables QoS control based on rich and meaningful context descriptions, including users, data types, client(More)
This paper presents a policy-driven approach to quality-of-service (QoS) management that works with existing service-oriented data dissemination middleware, such as the Java Messaging Service (JMS). Our approach includes services that (1) support specifying and enforcing the QoS preferences of individual clients, (2) mediate and aggregate QoS management on(More)