Asher Sinclair

Learn More
— The migration of web applications to Cloud computing platform has raised concerns about the privacy of sensitive data belonging to the consumers of cloud services. The traditional form of security tokens like username/password used to access cloud services are prone to phishing attacks and hence do not provide complete security. In this work we propose to(More)
Net-centric information spaces have become a necessary concept to support information exchange for tactical warfight-ing missions using a publish-subscribe-query paradigm. To support dynamic, mission-critical and time-critical operations , information spaces require quality of service (QoS)-enabled dissemination (QED) of information. This paper describes(More)
—Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement of multiple service providers in a service request. The(More)
Mobile peer-to-peer networks of aerial vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the(More)
Service-oriented architecture (SOA) middleware has emerged as a powerful and popular distributed We also discuss the design of several key QoS services and describe how QED's policy-driven approach bridges users to the underlying middleware and enables QoS control based on rich and meaningful context descriptions, including users, data types, client(More)
This paper presents a policy-driven approach to quality-of-service (QoS) management that works with existing service-oriented data dissemination middleware, such as the Java Messaging Service (JMS). Our approach includes services that (1) support specifying and enforcing the QoS preferences of individual clients, (2) mediate and aggregate QoS management on(More)
To bring the advantages of network-centric warfare to coalition warfighting, we must significantly improve our ability to quickly share critical information while still satisfying security requirements. Here, the authors explore a services-based approach to such information management. have recognized the advantages of net-centricity (known as(More)