Withthe rapid growth of database applications, wireless networking technology and mobile computing devices, there is a demand for processing mobile transactions in Mobile Ad-hoc Network (MANET) databases, so that mob...
详细信息
ISBN:
(纸本)9781605589008
Withthe rapid growth of database applications, wireless networking technology and mobile computing devices, there is a demand for processing mobile transactions in Mobile Ad-hoc Network (MANET) databases, so that mobile users can access and manipulate data anytime and anywhere. However, in order to guarantee timely and correct results for multiple concurrent transactions, concurrency control (CC) techniques become critical. Due to the characteristics of MANET databases, existing CC algorithms cannot work effectively. In this paper, we propose a CC algorithm called Sequential Order with Dynamic Adjustment (SODA) for MANET databases. In the design of SODA, the major characteristics of MANET databases are taken into consideration. SODA is based on optimistic CC to offer high concurrency and avoid unbounded blocking time, utilizes the sequential order of committed transactions to improve response time, and dynamically adjusts the sequential order of committed transactions to reduce aborts. the simulation results confirm that SODA has lower abort rate than other existing techniques.
Modern accesscontrolmodels, developed for protecting data from accesses across the Internet, require to verify the identity of users in order to make sure that users have the required permissions for accessing the d...
详细信息
ISBN:
(纸本)9781605588957
Modern accesscontrolmodels, developed for protecting data from accesses across the Internet, require to verify the identity of users in order to make sure that users have the required permissions for accessing the data. User's identity consists of data, referred to as identity attributes, that encode relevant-security properties of the users. Because identity attributes often convey sensitive information about users, they have to be protected. the Oblivious Commitment-Based Envelope (OCBE) protocols address the protection requirements of both users and service providers. the OCBE protocols makes it possible for a party, referred as sender, to send an encrypted message to a receiver such that the receiver can open the message if and only if its committed value satisfies a predicate and that the sender does not learn anything about the receiver's committed value. the possible predicates are comparison predicates =, ≠, >,
control signal networks in vehicles using dedicated communication cables such as twisted wires and fiber optics cables have been built in order to communicate between electronic control units (ECUs). However, there ar...
详细信息
the roll-out of next generation access networks is a complex process which depends not only on technical or commercial factors, but also on market conditions and regulatory decisions. the path adopted by the different...
详细信息
the roll-out of next generation access networks is a complex process which depends not only on technical or commercial factors, but also on market conditions and regulatory decisions. the path adopted by the different agents towards the new networks will not be homogeneous, neither about technologies and platforms, nor the commercial model or roll-out strategies. these elements will depend on expectations on investment recovery, competitive dynamics of different markets and specific issues confronted by the different agents. Withthe aim of addressing these issues from a techno-economic perspective, the Universidad Politécnica de Madrid, withthe collaboration of Telefónica, has developed a set of models called COSTA, which calculate the costs of rolling out next generation access networks for different platforms under different regulatory and geographic scenarios. the objective of this article is to present the COSTA model and the analysis of some aspects about the potential of competition among alternative access platforms for the roll-out of next generation access networks.
Currently, there is a convergence of three key factors in the global landscape that creates an opportunity for the research community to make fundamental contributions to improving the quality of life of every single ...
详细信息
ISBN:
(纸本)9781450300490
Currently, there is a convergence of three key factors in the global landscape that creates an opportunity for the research community to make fundamental contributions to improving the quality of life of every single citizen. Conversely, failure to recognize and act on this phenomenon may have disastrous effects on multiple levels. the first factor is the unprecedented focus and willingness to invest in the healthcare industry. the second factor is the fact that the prime directive of the healthcare sector, i.e. nothing interferes withthe delivery of care, has ramifications on every aspect of information technology used in this domain. the final factor is the recognition that patient empowerment and buy-in will be critical for the advance of health information technology. these factors highlight the fact that there are inherent assumptions in the existing accessmodelsthat render them ineffective and not applicable for long term use in the healthcare *** talk will highlight all these issues and challenge the research community to delve more the industry-specific constraints that require further innovation in the space; possibly necessitating a re-examination of the core assumptions in the field.
In the last few years, a number of spatial and spatio-temporal accesscontrolmodels have been developed especially in the framework of pervasive computing and location-aware applications. Yet, how useful and effectiv...
详细信息
ISBN:
(纸本)9781605585376
In the last few years, a number of spatial and spatio-temporal accesscontrolmodels have been developed especially in the framework of pervasive computing and location-aware applications. Yet, how useful and effective those models are in real applications is still to be proved. the goal of this panel is to discuss accesscontrol requirements in mobile applications, trying to link research to real business problematic.
We address some fundamental questions, which were raised by Atluri and Ferraiolo at SacmAT'08, on the prospects for and benefits of a meta-model of accesscontrol. We demonstrate that a meta-model for access contr...
详细信息
ISBN:
(纸本)9781605585376
We address some fundamental questions, which were raised by Atluri and Ferraiolo at SacmAT'08, on the prospects for and benefits of a meta-model of accesscontrol. We demonstrate that a meta-model for accesscontrol can be defined and that multiple accesscontrolmodels can be derived as special cases. An anticipated consequence of the contribution that we describe is to encourage researchers to adopt a meta-model view of accesscontrol rather than them developing the next 700 particular instances of accesscontrolmodels.
this panel discusses specific challenges in the usability of accesscontroltechnologies and new opportunities for research. the questions vary from "Why nobody, even experts, uses accesscontrol lists (ACLs)?&qu...
详细信息
ISBN:
(纸本)9781605585376
this panel discusses specific challenges in the usability of accesscontroltechnologies and new opportunities for research. the questions vary from "Why nobody, even experts, uses accesscontrol lists (ACLs)?" to "Shall accesscontrols (and corresponding languages) be totally embedded and invisible and never, ever seen by the users?" to "What should be the user-study methodology for accesscontrol systems?".
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existing roles to entitlements from newly dep...
详细信息
ISBN:
(纸本)9781605585376
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existing roles to entitlements from newly deployed applications is usually very high. In this paper, a learning-based approach to automate the provisioning process is proposed and its effectiveness is verified by real provisioning data. Specific learning issues related to provisioning are identified and relevant solutions are presented.
暂无评论