With the rapid development of virtualization technology, virtual machine (VM) is widely used by cloud computing – the more and more popular computing paradigm. Thus, in order to guarantee the security of cloud comput...
详细信息
With the rapid development of virtualization technology, virtual machine (VM) is widely used by cloud computing – the more and more popular computing paradigm. Thus, in order to guarantee the security of cloud computing, it is necessary to securely identify the kernel of VM, the software stack running on VM and the hardware platform which VM relies on. This paper designs a system of trusted connection based on virtual machine architecture and implements a system prototype. Our system not only can securely measure and identify the kernel of VM, the software stack running on VM and the hardware platform which VM relies on, but also can realize isolations to untrusted VMs. There are three main parts in our system: trusted chain, attestation and isolation. The experiments described in this paper prove that our system ensures trusted connection of VMs and achieves isolations to untrusted VMs. The performance of our system is also analyzed and evaluated. According to the analysis results, our system is practical in terms of performance.
Session identification is an important step in data processing of web log *** solve the defects in traditional session identification,an improved session identification algorithm was *** identifying specific users,a g...
详细信息
Session identification is an important step in data processing of web log *** solve the defects in traditional session identification,an improved session identification algorithm was *** identifying specific users,a great deal of frame pages were filtered,the relatively reasonable access time threshold for each page was made up according to contents of each page and all web structure and user's session sets were identified by this *** the algorithm was compared with the traditional methods of session identification by experiences,the higher rationality and effectiveness of it was proved.
the paper suggests a meta-ontology for C4ISR capability *** which,by taking advantage of the UML profile mechanism,the paper defines a domain-specific modeling language for C4ISR capability *** abstract syntax,concret...
详细信息
the paper suggests a meta-ontology for C4ISR capability *** which,by taking advantage of the UML profile mechanism,the paper defines a domain-specific modeling language for C4ISR capability *** abstract syntax,concrete syntax and formal semantic of the modeling language have been discussed in the paper.A case study of C4ISR architectural simulation modeling is provided to demonstrate the availability and applicability of the language.
SSL VPN is the simplest solution technology which can be used to access to enterprise resources by remote *** is no effective access control capacity in SSL VPN *** this paper,we use UCON model to build a set of fine-...
详细信息
SSL VPN is the simplest solution technology which can be used to access to enterprise resources by remote *** is no effective access control capacity in SSL VPN *** this paper,we use UCON model to build a set of fine-grain access control mechanism that is used for SSL VPN system to strengthen its safety performance.
With the rapid development of multimedia computer and network technology,network learning becomes *** network learning,the boundaries of the traditional teaching method are broken,different place and time opening lear...
详细信息
With the rapid development of multimedia computer and network technology,network learning becomes *** network learning,the boundaries of the traditional teaching method are broken,different place and time opening learning can be achieved,which increases the flexibility of learning *** present,many sports colleges and institutions have also established sport education resources database,which has applied in network ***,due to the particularity of physical education,physical teaching resources construction is still exist some *** on it,knowledge management technology is applied in this paper and physical teaching network resources are *** aim is to analysis physical education network resources characteristics and form standards to manage teaching resources effectively
This paper presents reports a design and development of the interactive map using Scalable Vector Graphics (SVG) that can be used to find the shortest path. Using our interactive map, the user will be able to set the ...
详细信息
This study aimed to focus on the outdoor performance ratio (PR) and the relationship between PR, module temperature and irradiance for (a-Si) and polycrystalline silicon (poly-Si) located in Thailand. The result of th...
详细信息
ISBN:
(纸本)9781424456062;9789746724913
This study aimed to focus on the outdoor performance ratio (PR) and the relationship between PR, module temperature and irradiance for (a-Si) and polycrystalline silicon (poly-Si) located in Thailand. The result of this study revealed that the PR of a-Si increased during the summer and reached the highest value in the rainy season. For a 3-year period investigation, average PR of a-Si showed higher values than the PR values at standard test condition (STC) and also higher than the PR of poly-Si. However, during winter, PR value of a-Si gradually decreased. The lowest PR value occurring in winter was lower than the highest value occurring in rainy season by 7.0%. In addition, during summer and rainy periods from 2006 to 2007, the PR value of a-Si degraded by approximately 0.5% whereas it declined by 2% from 2008 to 2009 in winter. Furthermore, the results also indicated that the PR value of poly-Si decreased when the temperature increased. In addition, both types of solar cell have the same behavior of Voc and Isc based on the influence of intensity and temperature.
The New Basel Capital Accord has firstly covered almost all risk sources including credit risk, market risk and operational risk etc. and embodied an outlook of complete risk management. In the past five years, state-...
详细信息
Lenovo Group puts priority on knowledge management .Successful experience of knowledge management of Lenovo Group mainly lies in that, firstly, Lenovo has established a set of practicable and effective flows to facili...
详细信息
More and more spatial data are used with the application and development of modern science and technique;therefore,obtaining the spatial knowledge becomes more and more important and *** tremendous amounts of spatial ...
详细信息
More and more spatial data are used with the application and development of modern science and technique;therefore,obtaining the spatial knowledge becomes more and more important and *** tremendous amounts of spatial and non-spatial data have been stored in large spatial *** are far beyond the human ability to interpret and analysis of them,which is urgently in need of spatial data mining to provide *** makes spatial data mining become a promising research *** the basic conceptions of spatial data mining,this paper introduced characteristics of spatial data,summarized the typical spatial data mining method in recent years,and analyzed the future research direction.
暂无评论