Imperial College London

DrNarankerDulay

Faculty of EngineeringDepartment of Computing

Reader in Computing Science
 
 
 
//

Contact

 

+44 (0)20 7594 8288n.dulay Website

 
 
//

Location

 

562Huxley BuildingSouth Kensington Campus

//

Summary

 

Publications

Publication Type
Year
to

189 results found

Heeps S, Sventek J, Dulay N, Filho AES, Lupu E, Sloman M, Strowes Set al., 2007, Dynamic ontology mapping for interacting autonomous systems, 2nd International Workshop on Self-Organizing Systems, Publisher: Springer, Pages: 255-263

With the emergence of mobile and ubiquitous computing environments, there is a requirement to enable collaborative applications between these environments. As many of these applications have been designed to operate in isolation, making them work together is often complicated by the semantic and ontological differences in the meta-data describing the data to be shared. Typical approaches to overcoming ontological differences require the presence of a third party administrator, an approach incompatible with autonomous systems. This paper presents an approach to automatic ontology mapping suitable for deployment in autonomous, interacting systems for a class of collaborative application. The approach facilitates the collaboration of application-level data collections by identifying areas of ontological conflict and using meta-data values associated with those collections to establish commonality. A music sharing application has been developed to facilitate the sharing of music between peers.

Conference paper

Dong C, Russello G, Dulay N, 2007, Privacy-preserving credential verification for non-monotonic trust management systems, 4th Intl Conf on Mathematical Methods, Models and Architectures for, Publisher: Springer, Pages: 171-186, ISSN: 1865-0929

Conference paper

Lupu E, Asmare E, Dulay N, Sloman Met al., 2007, Towards Self-managing Unmanned Autonomous Vehicles, Systems Engineering for Autonomous Systems Defence Technology Centre Conference, Edinburgh, UK

Conference paper

Russello G, Dong C, Dulay N, 2007, Trust Transfer in Distributed Systems, Privacy, Trust Management and Security

Conference paper

Russello G, Dong C, Dulay N, 2007, Authorization and conflict resolution for hierarchical domains, 8th IEEE Workshop on Policies for Distributed Systems and Networks, Publisher: IEEE Computer Society, Pages: 201-210

Conference paper

Russello G, Dong C, Dulay N, 2007, Enforcing Fine-grained Authorization Policies for Java Mobile Agents, Security in Networks and Distributed Systems

Conference paper

Thing V, Sloman M, Dulay N, 2007, Non-intrusive IP Traceback for DDoS Attacks, ACM symposium on Information, Computer and Communications Security, Singapore, Publisher: ACM, Pages: 371-373

The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiting network routers. Under attack conditions, route anomalies are detected by determining which routers have been used for unknown source addresses, in order to construct the attack graph. Results of simulation studies are presented. Our approach does not require changes to the Internet routers or protocols. Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. Our algorithm is simple and efficient, allowing for a fast traceback and the scheme is scalable due to the distribution of processing workload

Conference paper

Keoh SL, Twidle K, Pryce N, Schaeffer-Filho AE, Lupu E, Dulay N, Sloman M, Heeps S, Strowes S, Sventek J, Katsiri Eet al., 2007, Policy-based management for body-sensor networks, 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), Publisher: SPRINGER, Pages: 92-+, ISSN: 1680-0737

Conference paper

Keoh SL, Dulay N, Lupu E, Twidle K, Schaeffer-Filho AE, Sloman M, Heeps S, Strowes S, Sventek Jet al., 2007, Self-Managed Cell: A middleware for managing body-sensor networks, 4th Annual International Conference on Mobile and Ubiquitous Systems (MOBIQUITOUS 2007), Publisher: IEEE, Pages: 177-+

Conference paper

Asmare E, Dulay N, Lupu E, Sloman M, Calo S, Lobo Jet al., 2007, Secure dynamic community establishment in coalitions, IEEE Military Communications Conference (MILCOM 2007), Publisher: IEEE, Pages: 3105-+, ISSN: 2155-7578

Conference paper

Lupu E, Dulay N, Sventek J, Sloman Met al., 2007, Autonomous pervasive systems and the policy challenges of a small world!, 8th IEEE International Workshop on Policies for Distributed Systems and Networks, Pages: 3-7

Pervasive systems are the subject of intensifying research efforts and their applications range from health monitoring and intelligent homes, to location aware services, unmanned vehicles and city-wide pervasive infrastructures. Although application-specific solutions have been proposed, their design has often raised additional challenges. This paper discusses the use of Autonomous Pervasive Systems as a fertile testbed for policy-based adaptation and for integrating techniques that span across conventional subject boundaries. Additionally, we present the Self- Managed Cell architectural pattern for realizing policy-driven Autonomous Pervasive Systems and discuss the design of the Ponder2 policy service.

Conference paper

Thing VLL, Sloman M, Dulay N, 2007, A survey of bots used for distributed denial of service attacks, 22nd International Information Security Conference, Publisher: SPRINGER, Pages: 229-240, ISSN: 1571-5736

In recent years, we have seen the arrival of Distributed Denial-of-Service (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting in attack tools becoming more powerful. Developing new techniques for detecting and responding to the latest DDoS attacks often entails using attack traces to determine attack signatures and to test the techniques. However, obtaining actual attack traces is difficult, because the high-profile organizations that are typically attacked will not release monitored data as it may contain sensitive information. In this paper, we present a detailed study of the source code of the popular DDoS attack bots, Agobot, SDBot, RBot and Spybot to provide an in-depth understanding of the attacks in order to facilitate the design of more effective and efficient detection and mitigation techniques.

Conference paper

Schaeffer A, Lupu E, Dulay N, Keoh SL, Twidle K, Sloman M, Heeps S, Strowes S, Sventek Jet al., 2007, Towards supporting interactions between self-managed cells, 1st IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007), Publisher: IEEE COMPUTER SOC, Pages: 224-233

Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback control-loops embedded in autonomous components. We have previously proposed the self-managed cell (SMC) as an architectural pattern for building ubiquitous applications, where a SMC consists of hardware and software components that form an autonomous administrative domain. SMCs may be realised at different scales, from. body-area networks for health monitoring, to an entire room or larger distributed settings. However to scale to larger systems, SMCs must collaborate with each other and federate or compose in larger SMC structures. This paper discusses requirements for interactions between SMCs and proposes key abstractions and protocols for realising peer-to-peer and composition interactions. These enable SMCs to exchange data, react to external events and exchange policies that govern their collaboration. Dynamically customisable interfaces are used for encapsulation and interaction mediation. Although the examples used here are based on healthcare scenarios, the principles and abstractions described in the paper are more generally applicable.

Conference paper

Dulay N, Dong C, 2006, Privacy Preserving Trust Negotiation for Pervasive Healthcare, Pervasive Computing Technologies for Healthcare

Conference paper

Pryce N, Huebscher M, Dulay N, 2006, Issues in Developing Ubicomp Applications on Symbian Phones, System Support for Future Mobile Computing Applications

Conference paper

Asmare EA, Dulay N, Kim H, Lupu EC, Sloman Met al., 2006, Management Architecture and Mission Specification for Unmanned Autonomous Vehicles, Systems Engineering for Autonomous Systems Defence Technology Centre Conference, Edinburgh, UK

Conference paper

Strowes S, Badr N, Dulay N, Heeps S, Lupu EC, Sloman M, Sventek Jet al., 2006, An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health, Intl. Workshop on Distributed Event-Based Systems

Conference paper

Bandara A, Lupu EC, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou Get al., 2006, Policy Refinement for DiffServ Quality of Service Management (2006), 9th IFIP/IEEE Intl. Symp. on Integrated Management (IM 2005), Publisher: IEEE

Conference paper

Charalambides M, Flegkas P, Pavlou G, Bandara A, Dulay N, Lupu EC, Rubio-Loyola J, Russo A, Sloman Met al., 2006, Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management (2006), IFIP/IEEE Network Operations and Management Symposium (NOMS 2006), Publisher: IEEE Computer Society

Conference paper

Charalambides M, Flegkas P, Pavlou G, Bandara A, Dulay N, Lupu EC, Rubio-Loyola J, Russo A, Sloman Met al., 2006, Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management (2006), IFIP/IEEE Network Operations and Management Symposium (NOMS 2006), Publisher: IEEE Computer Society

Conference paper

Bandara A, Lupu EC, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou Get al., 2006, Policy refinement for IP differentiated services Quality of Service management, IEEE Transactions on Network and Service Management, Vol: 3, Pages: 2-13, ISSN: 1932-4537

Policy-based management provides the ability to dynamically re-configure DiffServ networks such that desired Quality of Service (QoS) goals are achieved. This includes network provisioning decisions, performing admission control, and adapting bandwidth allocation dynamically. QoS management aims to satisfy the Service Level Agreements (SLAs) contracted by the provider and therefore QoS policies are derived from SLA specifications and the provider's business goals. This policy refinement is usually performed manually with no means of verifying that the policies written are supported by the network devices and actually achieve the desired QoS goals. Tool support is lacking and policy refinement has rarely been addressed in the literature. This paper extends our previous approach to policy refinement and shows how to apply it to the domain of DiffServ QoS management. We make use of goal elaboration and abductive reasoning to derive strategies that will achieve a given high-level goal. By combining these strategies with events and constraints, we show how policies can be refined, and what tool support can be provided for the refinement process using examples from the QoS management domain. The approach presented here can be used in other application domains such as storage area networks or security management.

Journal article

Huebscher MC, McCann JA, Dulay N, 2006, Fusing multiple sources of context data of the same context type, 1st International Conference on Hybrid Information Technology, Publisher: IEEE COMPUTER SOC, Pages: 406-+

Conference paper

Bandara A, Lupu EC, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou Get al., 2006, Policy Refinement for DiffServ Quality of Service Management (2006), e-Transactions on Network and Service Management, Vol: 2

Journal article

Dulay N, Lupu EC, Sloman M, Bacon J, Ingram D, Moody Ket al., 2005, CareGrid: Autonomous Trust Domains for Healthcare Applications

Journal article

Dulay N, Lupu EC, Sloman M, Bacon J, Ingram D, Moody Ket al., 2005, CareGrid: Autonomous Trust Domains for Healthcare Applications

Journal article

Dulay N, Heeps S, Lupu EC, Sharma O, Sloman M, Sventek Jet al., 2005, Autonomic Management for Ubiquitous e-Health Systems, UK e-Science Programme All Hands Meeting 2005 (AHM2005)

Conference paper

Sventek J, Badr N, Dulay N, Heeps S, Lupu EC, Sloman Met al., 2005, Self-Managed Cells and their Federation, Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA 05)

Conference paper

Charalambides M, Flegkas P, Pavlou G, Bandara A, Lupu EC, Russo A, Dulay N, Sloman M, Rubio-Loyola Jet al., 2005, Policy Conflict Analysis for Quality of Service Management (2005), 6th IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2005)

Conference paper

Sventek J, Badr N, Dulay N, Heeps S, Lupu EC, Sloman Met al., 2005, Self-Managed Cells and their Federation, Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA 05)

Conference paper

Yusuf S, Luk W, Sloman M, Dulay N, Lupu EC, Brown Get al., 2005, A combined hardware-software architecture for network flow analysis, Athens, International conference on engineering of reconfigurable systems and algorithms, 27 - 30 June 2005, Las Vegas, NV, Publisher: C S R e A Press, Pages: 149-155

Conference paper

This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.

Request URL: http://wlsprd.imperial.ac.uk:80/respub/WEB-INF/jsp/search-html.jsp Request URI: /respub/WEB-INF/jsp/search-html.jsp Query String: limit=30&id=00001746&person=true&page=4&respub-action=search.html