Remzi Seker | University of Arkansas at Little Rock (original) (raw)

Papers by Remzi Seker

Research paper thumbnail of JigDFS for implementing secure container communities

Systems, Man and Cybernetics, …

... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash valu... more ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Impact of duty cycle variation on WSNs

… and Security (NTMS …, Jan 1, 2009

Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their applicat... more Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dynamical System approach to insider threat detection

… (SysCon), Jan 1, 2011

Bookmarks Related papers MentionsView impact

Research paper thumbnail of JiGdFs: a seCure distriButed FiLe systeM For MediCaL iMaGe arCHiVinG

Biomedical Engineering, Jan 1, 2011

The growth in use of medical imaging resulted in great challenges, such as handling, storing, ret... more The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Secure Distributed File System for Medical Image Archiving

… on Privacy, Security, Risk and Trust, Jan 1, 2010

Abstract The explosion of medical image usage in clinical and research domains brings us a great ... more Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Public Key Infrastructure

Network Security, Administration and …, Jan 1, 2011

Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an ale... more Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, “Air Raid, Pearl Harbor. This is Not a Drill!” A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of 4.5 Quality of Service in Packet-Switched Networks

Broadcasting and Optical …, Jan 1, 2006

4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter di... more 4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Scalable Role-based Group Key Agreement and Role Identification Mechanism

ieeexplore.ieee.org

Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human ... more Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of a lattice-based access control scheme

Systems, Man and …, Jan 1, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Container communities: Anti-tampering Wireless Sensor Network for global cargo security

Proceedings of the …, Jan 1, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact

Software Engineering Research and …, Jan 1, 2006

Abstract – The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Off-the-Record Instant Messaging for Group Conversation

… Reuse and Integration, Jan 1, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A component integration meta-framework using smart adapters

Proceedings of the 2004 …, Jan 1, 2004

Abstract Efforts to integrate independently developed software components, to a large extent, hav... more Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: “wiring”-level connectivity and semantic-level compatibility. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A role-based secure group communication framework

System of Systems …

Abstract—Building a secure group communication system is an active research topic. Several studie... more Abstract—Building a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Infrastructures for information technology systems

Systems, Man and Cybernetics, …, Jan 1, 2005

Abstract – The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A risk assessment model of embedded software systems

… Workshop, 2005. 29th Annual IEEE/NASA, Jan 1, 2005

Embedded systems are special purpose computer systems whose functions are implemented, controlled... more Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Phishing in the system of systems settings: Mobile technology

Systems, Man and …, Jan 1, 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Ontology for disaster mitigation and planning

Proceedings of the …, Jan 1, 2007

6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation ... more 6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Component-based software modeling based on shannon's information channels

R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For ... more R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Validity test for a set of nonlinear measures for short data length with reference to short-term heart rate variability signal

Journal of systems …, Jan 1, 2000

Bookmarks Related papers MentionsView impact

Research paper thumbnail of JigDFS for implementing secure container communities

Systems, Man and Cybernetics, …

... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash valu... more ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Impact of duty cycle variation on WSNs

… and Security (NTMS …, Jan 1, 2009

Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their applicat... more Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dynamical System approach to insider threat detection

… (SysCon), Jan 1, 2011

Bookmarks Related papers MentionsView impact

Research paper thumbnail of JiGdFs: a seCure distriButed FiLe systeM For MediCaL iMaGe arCHiVinG

Biomedical Engineering, Jan 1, 2011

The growth in use of medical imaging resulted in great challenges, such as handling, storing, ret... more The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Secure Distributed File System for Medical Image Archiving

… on Privacy, Security, Risk and Trust, Jan 1, 2010

Abstract The explosion of medical image usage in clinical and research domains brings us a great ... more Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Public Key Infrastructure

Network Security, Administration and …, Jan 1, 2011

Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an ale... more Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, “Air Raid, Pearl Harbor. This is Not a Drill!” A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of 4.5 Quality of Service in Packet-Switched Networks

Broadcasting and Optical …, Jan 1, 2006

4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter di... more 4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Scalable Role-based Group Key Agreement and Role Identification Mechanism

ieeexplore.ieee.org

Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human ... more Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of a lattice-based access control scheme

Systems, Man and …, Jan 1, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Container communities: Anti-tampering Wireless Sensor Network for global cargo security

Proceedings of the …, Jan 1, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact

Software Engineering Research and …, Jan 1, 2006

Abstract – The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Off-the-Record Instant Messaging for Group Conversation

… Reuse and Integration, Jan 1, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A component integration meta-framework using smart adapters

Proceedings of the 2004 …, Jan 1, 2004

Abstract Efforts to integrate independently developed software components, to a large extent, hav... more Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: “wiring”-level connectivity and semantic-level compatibility. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A role-based secure group communication framework

System of Systems …

Abstract—Building a secure group communication system is an active research topic. Several studie... more Abstract—Building a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Infrastructures for information technology systems

Systems, Man and Cybernetics, …, Jan 1, 2005

Abstract – The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A risk assessment model of embedded software systems

… Workshop, 2005. 29th Annual IEEE/NASA, Jan 1, 2005

Embedded systems are special purpose computer systems whose functions are implemented, controlled... more Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Phishing in the system of systems settings: Mobile technology

Systems, Man and …, Jan 1, 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Ontology for disaster mitigation and planning

Proceedings of the …, Jan 1, 2007

6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation ... more 6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Component-based software modeling based on shannon's information channels

R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For ... more R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Validity test for a set of nonlinear measures for short data length with reference to short-term heart rate variability signal

Journal of systems …, Jan 1, 2000

Bookmarks Related papers MentionsView impact