Web container conforming to J2EE specification, which provides runtime environment for servlet and JSP and adopts best-effort service mode, has become an effective platform to deploy enterprise Web applications on Int...
详细信息
Web container conforming to J2EE specification, which provides runtime environment for servlet and JSP and adopts best-effort service mode, has become an effective platform to deploy enterprise Web applications on Internet. However, complex business Web applications require Web container to provide differentiated services that traditional Web container does not provide for requests from different clients according to role or payment etc. Some approaches such as admission control and priority scheduling have been applied to provide differentiated services for Web container, but they do not consider differentiated services in finer granularity so that they can only provide monotone and static strategy of differentiated services. To improve the deficiencies of traditional Web container, the requirement of differentiated services is analyzed and a differentiated service Web container (DSWC) based on self-management unit (SMU) is brought forward. In DSWC, process modules are encapsulated into SMUs, which are connected to compose a SMU chain. DSWC provides SMU-based and SMU chain-based differentiated services for requests according to SLA (service level agreement). At the same time, an adaptive strategy selection algorithm is also presented, which can adaptively select different strategies of differentiated services based on the dynamic environment. The experiments of prototype show DSWC can effectively provide differentiated services according to SLA for different type of requests.
Skipjack is a simple cipher, and one interesting feature is the use of two different types of rounds. These are referred to as A and B-rounds. Earlier researchers have studied the security of Skipjack against some att...
详细信息
Skipjack is a simple cipher, and one interesting feature is the use of two different types of rounds. These are referred to as A and B-rounds. Earlier researchers have studied the security of Skipjack against some attack methods, but they did not focus on pseudorandomness of the round-structure of Skipjack. In this paper, we discuss the pseudorandomness on the round-structure of Skipjack. We first point out six rounds A-Skipjack is not pseudorandom, and then prove seven rounds A-Skipjack is pseudorandom for any adversaries. Next we point out twelve rounds B-Skipjack is not pseudorandom, and prove fourteen rounds B-Skipjack is pseudorandom for any adversaries.
Severe vibration of underground structures may be induced under blast loads. According to the characteristics of the explosion-induced ground shock wave, a new-type damper, inverse control magneto-rheological(MR) da...
详细信息
Severe vibration of underground structures may be induced under blast loads. According to the characteristics of the explosion-induced ground shock wave, a new-type damper, inverse control magneto-rheological(MR) damper was designed to control the vibration, The high-frequency performance test of the MR damper was carried out on the small shaking table. It is shown that the performance can be modeled by use of the modified Bouc-Wen model, and the Parameters of the model keep stable in the range of 15--50 Hz.
An internetware application is composed by existing individual services, while transaction processing is a key mechanism to make the composition reliable. The existing research of transactional composite service (TCS...
详细信息
An internetware application is composed by existing individual services, while transaction processing is a key mechanism to make the composition reliable. The existing research of transactional composite service (TCS) depends on the analysis to composition structure and exception handling mechanism in order to guarantee the relaxed atomicity. However, this approach cannot handle some application-specific requirements and causes lots of unnecessary failure recoveries or even aborts. In this paper, we propose a relaxed transaction model, including system mode, relaxed atomicity criterion, static checking algorithm and dynamic enforcement algorithm. Users are able to define different relaxed atomicity constraint for different TCS according to application-specific requirements, including acceptable configurations and the preference order. The checking algorithm determines whether the constraint can be guaranteed to be satisfied. The enforcement algorithm monitors the execution and performs transaction management work according to the constraint. Compared to the existing work, our approach can handle complex application requirements, avoid unnecessary failure recoveries and perform the transaction management work automatically.
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante...
详细信息
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D rea-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support.
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the...
详细信息
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable.
S. Saeednia and H. Ghodosi proposed a self-certified group-oriented cryptosystem that allows the participants to decrypt the ciphertext themselves, and the participants' public keys are publicly certifiable. In th...
详细信息
S. Saeednia and H. Ghodosi proposed a self-certified group-oriented cryptosystem that allows the participants to decrypt the ciphertext themselves, and the participants' public keys are publicly certifiable. In this paper, a mistake is pointed out in S. Saeednia and H. Ghodosi's group-oriented cryptosystem. This mistake causes the cryptosystem to work incorrectly with a probability of 3/4. A modification is proposed to correct the mistake. The characteristics of the cryptosystem are preserved after the modification.
In this paper, we propose an identities(JD) based watermarking scheme for Java programs. In our scheme, the watermark is generated by participants' identities, embedded via the watermarked opaque predicates, and v...
详细信息
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,...
详细信息
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
暂无评论