Learn More
— The migration of web applications to Cloud computing platform has raised concerns about the privacy of sensitive data belonging to the consumers of cloud services. The traditional form of security tokens like username/password used to access cloud services are prone to phishing attacks and hence do not provide complete security. In this work we propose to(More)
Transport Layer Security (TLS) and its precursor Secure Sockets Layer (SSL) are the most widely deployed protocol to establish secure communication over insecure Internet Protocol (IP) networks. Providing a secure session layer on top of TCP, TLS is frequently the first defense layer encountered by adversaries who try to cause loss of confidentiality by(More)
Progressive amyloid deposition in senile plaques and cortical blood vessels may play a central role in the pathogenesis of Alzheimer disease. We have used x-ray diffraction and electron microscopy to study the molecular organization and morphology of macromolecular assemblies formed by three synthetic peptides homologous to beta protein of brain amyloid:(More)
Net-centric information spaces have become a necessary concept to support information exchange for tactical warfight-ing missions using a publish-subscribe-query paradigm. To support dynamic, mission-critical and time-critical operations , information spaces require quality of service (QoS)-enabled dissemination (QED) of information. This paper describes(More)
Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement of multiple service providers in a service request. The(More)
Publish-subscribe-based Information Management (IM) services provide a key enabling technology for net-centric operations. This paper describes technology for Quality of Service (QoS) and Internet-Protocol-based Airborne Networking features for IM services. Enhancing IM services with airborne networking features improves effectiveness in combined tactical(More)
Mobile peer-to-peer networks of aerial vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the(More)
Service-oriented architecture (SOA) middleware has emerged as a powerful and popular distributed We also discuss the design of several key QoS services and describe how QED's policy-driven approach bridges users to the underlying middleware and enables QoS control based on rich and meaningful context descriptions, including users, data types, client(More)
Mammalian sex determination is a dynamic process involving balanced gene expression leading to the development of either a testis or an ovary. Candidate sex-determining genes have been identified through microarray-based studies of gonadal gene expression; however, few methods exist for validation. This study describes a new technique for transfecting(More)