To distinguish the reliabilities of different resources is difficult in the grid environment. For the first time the signaling game theory is applied to the research on grid resource reliability, and a grid resource r...
详细信息
ISBN:
(纸本)0769523153
To distinguish the reliabilities of different resources is difficult in the grid environment. For the first time the signaling game theory is applied to the research on grid resource reliability, and a grid resource reliability model based on promise is proposed in this paper. The analyses and the emulation results indicate that the resource provider should abandon the cheating motivation voluntarily. The resource demander could make right decision without other nodes' recommendations, the calculation and communication is reduced remarkably. This is a new solution to the problem of distinguishing resources reliabilities in the grid environment.
In this paper we report on the current status of the GSI plug-in for gSOAP an open source solution to the problem of securing web services in grid environments.
ISBN:
(纸本)0769523153
In this paper we report on the current status of the GSI plug-in for gSOAP an open source solution to the problem of securing web services in grid environments.
In this paper, we present two techniques. The first technique called Privacy Sensitive information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and f...
详细信息
ISBN:
(纸本)0769523153
In this paper, we present two techniques. The first technique called Privacy Sensitive information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and false sensor data. The second technique protects privacy sensitive information from being revealed to an attacker through traffic analysis by using a combination of frequently changing pseudonyms and dummy traffic.
Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be...
详细信息
ISBN:
(纸本)0769523153
Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be lost during the discretization of the experimental data. Indeed, fuzzy boundaries between species and degrees of character development are commonly found in nature. Therefore, we proposed the fizzy perfect phylogeny model that extends the perfect phylogeny model to allow for a fuzzy membership of the characters. The properties of this model, such as uniqueness and backward compatibility, were then shown. We also showed how the fuzzy perfect phylogeny problem can be transformed to the perfect phylogeny problem in O(mv) time where m is the number of objects and v is the number of distinct value of characters. As a result, valuable information from the experimental data can be used without substantially increase the problem complex.
Mobile Commerce promises to deliver e-commerce services directly into the consumers' hands - anytime, anywhere - using wireless technologies. Applying mobile access to computing creates both tremendous commercial ...
详细信息
ISBN:
(纸本)0769523153
Mobile Commerce promises to deliver e-commerce services directly into the consumers' hands - anytime, anywhere - using wireless technologies. Applying mobile access to computing creates both tremendous commercial opportunities and complexity, which will make computing globally pervasive and ubiquitous. Customers prefer a choice in the channels through which they do business and the same applies to transactions as well. This paper reports on a project which explored the current state Of mobile financial transactions globally using Bluetooth as an enabling technology.
The security of identity authentication and key negotiate is an important foundation of WLAN (Wireless Local Area Network) security. We present a new authentication and key exchange protocol Wireless Key Exchange (WKE...
详细信息
In this paper, we propose a new Ontology-enabled Service Oriented Architecture (OSOA) for Pervasive computing that is built on Web Services architecture, and incorporates Universal Plug and Play (UPnP). OSOA aims to c...
详细信息
ISBN:
(纸本)0769523153
In this paper, we propose a new Ontology-enabled Service Oriented Architecture (OSOA) for Pervasive computing that is built on Web Services architecture, and incorporates Universal Plug and Play (UPnP). OSOA aims to combine context awareness and human-centric requirements related to ubiquitous computing with a new ontology-based approach to ad-hoc and goal-driven service composition.
Retrieval performance evaluation measures of information retrieval algorithm are the foundation of evaluating and improving information retrieval algorithm. In this paper precision and recall are analyzed mathematical...
详细信息
information retrieval (IR) systems offer a variety of interfaces and interaction modes. A given IR system's interface and interaction mode may not be optimal for a given accessing device/network pair or desired by...
详细信息
ISBN:
(纸本)0769523153
information retrieval (IR) systems offer a variety of interfaces and interaction modes. A given IR system's interface and interaction mode may not be optimal for a given accessing device/network pair or desired by a given user. In this paper we propose a set of attributes to characterize IR interfaces, interaction and presentation modes. We call a set of these bound attributes an information Navigation Profile (INP). We suggest the use of INPs in dynamic adaptation of IR interface, interaction and presentation modes by both origin and proxy servers.
The client puzzles have been proposed as an important mechanism in defendiug against distributed denial-of-service (DDoS) attacks. In this paper we propose a new IP layer client puzzles scheme, password puzzles (PP). ...
详细信息
ISBN:
(纸本)0769523153
The client puzzles have been proposed as an important mechanism in defendiug against distributed denial-of-service (DDoS) attacks. In this paper we propose a new IP layer client puzzles scheme, password puzzles (PP). In this scheme a puzzle issuer on the behalf of a receiver responds to requests with puzzles that a sender must solve before sending in any packet to a receiver We design two new puzzle types, hash-chain-reversal puzzles and multiple-hashchains-reversal puzzles, with which a sender is expected to reverse one (multiple) hash chain(s) and send in packets with valid passwords (i.e., solutions of puzzles) to the receiver Out- design achieves three Main properties. First, the PP scheme is able to generate puzzles with different difficulties flexibly for various clients. Second, a puzzle issuer is able to generate puzzles at a per-flow and per-packet basis. Third, the PP scheme is able to converge to be a "nonpuzzle " protocol.
暂无评论