E. Sathiyamoorthy

Learn More
This paper is aimed at the stipulations which arise in the traditional online auctions as a result of various anomalies in the reputation and trust calculation mechanism. We try to improve the scalability and efficiency of the online auctions by providing efficient trust management methodology considering several factors into consideration. A comparison(More)
The Intrusion Detection System (IDS) deals with the huge amount of network data that includes redundant and irrelevant features causing slow training and testing procedure, higher resource usage and poor detection ratio. Feature selection is a vital preprocessing step in intrusion detection. Hence, feature selec-tion is an essential issue in intrusion(More)
The advent of semiconductors emerged day to day and lead us to the current trend of Cloud computing, which brings the information required to our life at our finger tips. The technology of today is getting expanded every day, especially in the management of EHR's. In order to provide high security for health care data we need a strong security mechanism for(More)
Security is a measure of protecting data during its transmission over a network. In the secured transmission scheme, the message will be encrypted using encryption algorithms which convert it into ciphertext where keys are playing the vital role in encryption and decryption process. Keys will be either secret one or public key. Since public key cryptosystem(More)
In the field of Network Security, Intrusion is the severe threat for various Networks. So an efficient Intrusion Detection System is required to detect the intrusions that are spread through the Network. The main idea of this paper is to reduce the average control path latency incurred between request and response of the system as well as the increasing the(More)
— In the past many researchers worked in developing trust management models in various disciplines such as E-Business, Multi-Agent Systems, Web Services, Grid Computing, P2P networks, Adhoc networks etc. These trust models are lacking in accurate computation and evaluation of trustworthiness for the Semantic web services. The trust level is measured with(More)
— The Service Level Agreement (SLA) is a document that defines and identifies the various services given by a service provider to its clients. SLA specifies the various metrics such as service availability, service efficiency, service throughput, etc. The manual Service Level Agreement is eliminated with the use of the middleware architecture which(More)