The international Workshop for Autonomous System Safety (IWASS) is a joint effort by the B. John Garrick Institute for the Risk Sciences at the University of California Los Angeles (UCLA-GIRS) and the Norwegian Univer...
详细信息
Network operators gradually open their interfaces to formerly hidden services. This fosters the development of a new class of mobile applications that take into account user39;s location and presence information. Ho...
详细信息
ISBN:
(纸本)9780769527758;0769527752
Network operators gradually open their interfaces to formerly hidden services. This fosters the development of a new class of mobile applications that take into account user's location and presence information. However, this development also raises problems especially the lack of protection of privacy in location-based services. This paper proposes a service architecture that is aimed at overcoming some of the shortages of currently existing context-aware applications that make use of network providers services as well as existing mobile payment systems. We therefore introduce the combination of tickets together with a novel privacy enhancing mechanism that is based on the notion of pseudonyms. Compared to other privacy enhancing solutions our pseudonym mechanism can also be implemented on mobile devices that have some restrictions regarding resources like memory or processing power. Due to their flexibility tickets can be used for many different kinds of applications. One important aspect in this respect is the highly postulated pay-as-you-go model. We give an example of a transport ticket application and explain the message interaction patterns for the basic functionalities of the systems. regarding aspects like data and privacy protection. This example further shows how 3rd party application providers can build meaningful mobile applications that are accepted by users
Mobile devices are opening unprecedented opportunities to conduct various social science studies in unobtrusive, large-scale, and longitudinal fashions. Rich dataset captured by smartphones such as communication recor...
ISBN:
(纸本)9781450330473
Mobile devices are opening unprecedented opportunities to conduct various social science studies in unobtrusive, large-scale, and longitudinal fashions. Rich dataset captured by smartphones such as communication records, application use patterns and physical sensory readings, serve as basis to understand behavior of human being in depth. Also, crowdsourcing platforms and open-data policy of organizations are enabling scalable data collection and access to such data. Moreover, mobile devices can be used as gateways for real-time intervention and feedback. Such powerful capabilities can enable larger-scale and timely social studies in a cost-effective way beyond traditional study methods such as self-reports, interviews, surveys, and observations under laboratory settings, etc. Many exploratory works have proven that mobile phones are a promising computational platform upon which we plan, develop, and conduct various experimental studies related to social science disciplines.
This paper analysed several alternatives of blind digital signatures,an electronic electoral system in a distributed architecture environment,in view of the persistence of blind signature problems in electoral *** obj...
详细信息
This paper analysed several alternatives of blind digital signatures,an electronic electoral system in a distributed architecture environment,in view of the persistence of blind signature problems in electoral *** objective is to recognize and propose an alternative of a blind signature scheme to improve privacy,confidentiality for the voter,and to reduce any type of vulnerability with respect to the information of the *** deductive method was used to summarize the information of the scientific articles *** resulted in a blind signature prototype based on algorithms to mitigate the vulnerabilities of voter *** was concluded that,in order to guarantee privacy and confidentiality,several blind signature schemes must be implemented together to obtain the benefits of each of them and thus reduce the risks to which the voter's information is exposed in this process.
We propose OPTICS, a middleware that optimizes data transfer between the compute layer and the shared object storage in today’s cloud data processing systems. OPTICS implements four data in-teraction patterns to serv...
详细信息
We propose OPTICS, a middleware that optimizes data transfer between the compute layer and the shared object storage in today’s cloud data processing systems. OPTICS implements four data in-teraction patterns to serve a wide spectrum of application needs. Our solution enables synchronous and asynchronous data access from multiple clients and supports transfer of both object stor-age data and object references. As a result, OPTICS significantly reduces network overhead of large object movements. Operating as a client daemon in each compute node, OPTICS can be seam-lessly integrated into any shared-storage cloud architecture with an S3-compatible object storage backend.
This paper analyzed the security of a database considering the environment of distributed *** are several security mechanisms that are applied to the different types of data that are saved;this research identifies sev...
详细信息
This paper analyzed the security of a database considering the environment of distributed *** are several security mechanisms that are applied to the different types of data that are saved;this research identifies several problems for mitigating the security of a distributed *** objective is to define a basic scheme and an abstract algorithm through algorithms using flowchart techniques for a security process in a *** deductive method and the exploratory investigation were used to analyze the information of the articles of the *** resulted in a basic structure based on a three-level architecture,with 3 DES encryption algorithm applied to the request and response;SQL-based encryption for data processing;FPE encryption algorithm for storage in the database;the scheme was presented with its scope and possible limitations;and a prototype of an abstract algorithm expressed with flowchart techniques was *** was concluded that the basic scheme and abstract algorithm presented as an alternative to control access to resources,to provide improved security in a distributed database.
We address the problem of large-scale data integration, where the data sources are unknown at design time, are from autonomous organisations, and may evolve. Experiments are described involving a demonstrator system i...
详细信息
We address the problem of large-scale data integration, where the data sources are unknown at design time, are from autonomous organisations, and may evolve. Experiments are described involving a demonstrator system in the field of health services data integration within the UK. Current Web services technology has been used extensively and largely successfully in these distributed prototype systems. The work shows that Web services provide a good infrastructure layer, but integration demands a higher level "broker" architectural layer; the paper identifies eight specific requirements for such an architecture that have emerged from the experiments, derived from an analysis of shortcomings which are collectively due to the static nature of the initial prototype. The way in which these are being met in the current version in order to achieve a more dynamic integration is described.
The aim of this study is to design English intelligent translation system based on 3D visualisation technology. B/S architecture is adopted, with the core functions on the server side and users accessing them through ...
详细信息
ISBN:
(纸本)9798400716775
The aim of this study is to design English intelligent translation system based on 3D visualisation technology. B/S architecture is adopted, with the core functions on the server side and users accessing them through web browsers. Intuitive interactive experience is provided through 3D visualisation technology, and the system hierarchy and modular design improve maintainability. Advanced 3D rendering technology is used to display multi-dimensional data, and users perceive the translation process in the virtual environment. Experiments demonstrate that the system makes significant progress in improving user interaction experience and understanding of the translation process. This research provides practical ideas for the innovation of intelligent translation systems.
The design and implementation of a distributed, Operating System based, Blackboard Architecture for Real-Time control (DOSBART) is described. DOSBART demonstrates the outstanding applicability of AI languages and blac...
ISBN:
(纸本)9780897913720
The design and implementation of a distributed, Operating System based, Blackboard Architecture for Real-Time control (DOSBART) is described. DOSBART demonstrates the outstanding applicability of AI languages and blackboard techniques to the construction of versatile distributed real-time control frameworks. It provides a means to remotely and transparently execute operations on non-local objects, furnishing the ability to share data and blackboard structures transparently across a network of heterogeneous computers. It allows the simultaneous execution of all blackboard activities by utilizing the underlying operating system's multi-process functionality rather than its own scheduling mechanism. Architectural features are incorporated to deal with distributed real-time control issues such as interrupts, data dependencies, resource contention, activity control and I/O. Computation may occur in both process based and message based perspectives, and may be driven by a first order theorem prover that dynamically infers triggering events, by changes in demoned datums or by arbitrary predicates. The representational capabilities of the Common Lisp Object System (CLOS) were exploited to provide a rich set of base classes from which specific applications can be tailored. Lisp macro facilities support for multiple platforms.
Commercial banks have paid more and more attention to the development of intermediary business, traditional intermediary business systems.mostly adopt traditional client/server with two layers structure. This architec...
详细信息
Commercial banks have paid more and more attention to the development of intermediary business, traditional intermediary business systems.mostly adopt traditional client/server with two layers structure. This architecture suffers the following disadvantages: overload of client and server, poor scalability, difficulties in cross-platform and maintaining. The three-tier architecture based on the middleware tuxedo is introduced into intermediary business. The development methods based on middleware is described firstly. As an example of social insurance intermediary business, the business requirements and workflow are analyzed. Using datadependent routing and two-phase commit protocol, the system performance is optimized. The communication protocol and service dispatching method are proposed to achieve interaction with legacy systems. Finally, its efficiency has been proved by an example.
暂无评论