Matej Trampus - Academia.edu (original) (raw)
Papers by Matej Trampus
Because of its object-oriented approach, extensibility and flexibility, COM can be effectively us... more Because of its object-oriented approach, extensibility and flexibility, COM can be effectively used for developing dynamic, component based, distributed applications. Using COM as a platform for building such applications, researchers and developers can concentrate on important issues specific to their applications instead of devoting a significant portion of their efforts to building supporting infrastructure. However, COM currently lacks support for
Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architectu... more Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architecture, typically without hierarchy. Often, flooding-based routing mechanisms are used for sending messages through the overlay (application level) network. Due to the limited scalability and high network load experiences, the paper suggests an improvement to reduce the traffic and overall performance: if a peer remembers recently forwarded answers, it may route the next query messages asking about the same contents only to the relevant neighbour, not to all of them. The routing simulations have shown promising results.
The IEEE Region 8 EUROCON 2003. Computer as a Tool.
... but also took 16% evaluated different working environments and tools suitable more the as the... more ... but also took 16% evaluated different working environments and tools suitable more the as the There was a modest for TDD-like agile iterative development 191. Students all correlation between time spent and achieved external quality. ...
Because of its object-oriented approach, extensibility and flexibility, COM can be effectively us... more Because of its object-oriented approach, extensibility and flexibility, COM can be effectively used for developing dynamic, component based, distributed applications. Using COM as a platform for building such applications, researchers and developers can concentrate on important issues specific to their applications instead of devoting a significant portion of their efforts to building supporting infrastructure. However, COM currently lacks support for
Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architectu... more Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architecture, typically without hierarchy. Often, flooding-based routing mechanisms are used for sending messages through the overlay (application level) network. Due to the limited scalability and high network load experiences, the paper suggests an improvement to reduce the traffic and overall performance: if a peer remembers recently forwarded answers, it may route the next query messages asking about the same contents only to the relevant neighbour, not to all of them. The routing simulations have shown promising results.
The IEEE Region 8 EUROCON 2003. Computer as a Tool.
... but also took 16% evaluated different working environments and tools suitable more the as the... more ... but also took 16% evaluated different working environments and tools suitable more the as the There was a modest for TDD-like agile iterative development 191. Students all correlation between time spent and achieved external quality. ...
The IEEE Region 8 EUROCON 2003. Computer as a Tool.
... Nato polje e APDU za kreiranje in zagon, nakar se program¥ ek lahko kadarkoli uporablja. Pr... more ... Nato polje e APDU za kreiranje in zagon, nakar se program¥ ek lahko kadarkoli uporablja. Program¥ ki (appleti) se obi¥ ajno na kartico naloijo in zaenejo med procesom personalizacije. Lastnik kartice varno shranjuje datoteke v preprost datote¥ ni sistem kartice. ...
The IEEE Region 8 EUROCON 2003. Computer as a Tool.
International Journal of Foundations of Computer Science, 2004
Content networks are overlay networks, enabling access to distributed contents on centralized ser... more Content networks are overlay networks, enabling access to distributed contents on centralized servers or individual computers. Since flooding-based routing scheme features poor scalability, we present a modification, which reduces the total network traffic while retaining the original efficiency. In choosy routing, as we call it, each node, while passing an answer, remembers which neighbor it came from. Subsequently repeated queries about the same content are forwarded only to that neighbor. This way, the network learns effective routes. The simulations on several topology types have shown the expected behavior, with up to three-fold reduction in the overall query traffic.
Proceedings International Parallel and Distributed Processing Symposium
We are interested in new ways of threats and attack on the e-commerce. The server side of e-comme... more We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is not true for the client side. End users are usually undereducated in the field of computer security. They use internet clients such as web browsers and e-mail programs to do their e-commerce business. Their platform that is used to run these programs can hardly be trusted. This paper focuses on the attacks on system and application infrastructure. Main idea of our approach is to take advantage of existing applications and attack them while they are executing. We analyze the steps that need to be taken in such attacks and point out the properties of the applications and execution environments that can be exploited. To demonstrate the findings, we present two case studies of such attacks. The first exploits a web browser which uses SSL (Secure Sockets Layer) and the second an email client which uses digital signatures. In both cases we are able to successfully perform the attack which escapes the end user's notice. In the final part of the paper we present possible defence against such attack together with our work on security enforcement system.
Because of its object-oriented approach, extensibility and flexibility, COM can be effectively us... more Because of its object-oriented approach, extensibility and flexibility, COM can be effectively used for developing dynamic, component based, distributed applications. Using COM as a platform for building such applications, researchers and developers can concentrate on important issues specific to their applications instead of devoting a significant portion of their efforts to building supporting infrastructure. However, COM currently lacks support for
Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architectu... more Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architecture, typically without hierarchy. Often, flooding-based routing mechanisms are used for sending messages through the overlay (application level) network. Due to the limited scalability and high network load experiences, the paper suggests an improvement to reduce the traffic and overall performance: if a peer remembers recently forwarded answers, it may route the next query messages asking about the same contents only to the relevant neighbour, not to all of them. The routing simulations have shown promising results.
The IEEE Region 8 EUROCON 2003. Computer as a Tool.
... but also took 16% evaluated different working environments and tools suitable more the as the... more ... but also took 16% evaluated different working environments and tools suitable more the as the There was a modest for TDD-like agile iterative development 191. Students all correlation between time spent and achieved external quality. ...
Because of its object-oriented approach, extensibility and flexibility, COM can be effectively us... more Because of its object-oriented approach, extensibility and flexibility, COM can be effectively used for developing dynamic, component based, distributed applications. Using COM as a platform for building such applications, researchers and developers can concentrate on important issues specific to their applications instead of devoting a significant portion of their efforts to building supporting infrastructure. However, COM currently lacks support for
Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architectu... more Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architecture, typically without hierarchy. Often, flooding-based routing mechanisms are used for sending messages through the overlay (application level) network. Due to the limited scalability and high network load experiences, the paper suggests an improvement to reduce the traffic and overall performance: if a peer remembers recently forwarded answers, it may route the next query messages asking about the same contents only to the relevant neighbour, not to all of them. The routing simulations have shown promising results.
The IEEE Region 8 EUROCON 2003. Computer as a Tool.
... but also took 16% evaluated different working environments and tools suitable more the as the... more ... but also took 16% evaluated different working environments and tools suitable more the as the There was a modest for TDD-like agile iterative development 191. Students all correlation between time spent and achieved external quality. ...
The IEEE Region 8 EUROCON 2003. Computer as a Tool.
... Nato polje e APDU za kreiranje in zagon, nakar se program¥ ek lahko kadarkoli uporablja. Pr... more ... Nato polje e APDU za kreiranje in zagon, nakar se program¥ ek lahko kadarkoli uporablja. Program¥ ki (appleti) se obi¥ ajno na kartico naloijo in zaenejo med procesom personalizacije. Lastnik kartice varno shranjuje datoteke v preprost datote¥ ni sistem kartice. ...
The IEEE Region 8 EUROCON 2003. Computer as a Tool.
International Journal of Foundations of Computer Science, 2004
Content networks are overlay networks, enabling access to distributed contents on centralized ser... more Content networks are overlay networks, enabling access to distributed contents on centralized servers or individual computers. Since flooding-based routing scheme features poor scalability, we present a modification, which reduces the total network traffic while retaining the original efficiency. In choosy routing, as we call it, each node, while passing an answer, remembers which neighbor it came from. Subsequently repeated queries about the same content are forwarded only to that neighbor. This way, the network learns effective routes. The simulations on several topology types have shown the expected behavior, with up to three-fold reduction in the overall query traffic.
Proceedings International Parallel and Distributed Processing Symposium
We are interested in new ways of threats and attack on the e-commerce. The server side of e-comme... more We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is not true for the client side. End users are usually undereducated in the field of computer security. They use internet clients such as web browsers and e-mail programs to do their e-commerce business. Their platform that is used to run these programs can hardly be trusted. This paper focuses on the attacks on system and application infrastructure. Main idea of our approach is to take advantage of existing applications and attack them while they are executing. We analyze the steps that need to be taken in such attacks and point out the properties of the applications and execution environments that can be exploited. To demonstrate the findings, we present two case studies of such attacks. The first exploits a web browser which uses SSL (Secure Sockets Layer) and the second an email client which uses digital signatures. In both cases we are able to successfully perform the attack which escapes the end user's notice. In the final part of the paper we present possible defence against such attack together with our work on security enforcement system.