作者:
Wei WeiAdrian TangOSI Laboratory
Computer Science and Telecommunications Program University of Missouri at Kansas City Kansas City MO
Because of the heterogeneity and the distributed nature of integrated network management, a good approach to understand the managed objects by syntax/semantics on the remote managed systems can significantly improve t...
ISBN:
(纸本)9780897915588
Because of the heterogeneity and the distributed nature of integrated network management, a good approach to understand the managed objects by syntax/semantics on the remote managed systems can significantly improve the performance of management applications. In this paper, we describe an X.500 prototype to provide the directory services to support integrated network management. Four directory services are described: partial name resolution, abstract syntax resolution, navigation of Management Information Base, and access control to managed objects.
User authentication and access control are both necessary mechanisms for data protection in a computer system. Traditionally, they are implemented in different modules. In this paper, a new solution is presented to pr...
详细信息
User authentication and access control are both necessary mechanisms for data protection in a computer system. Traditionally, they are implemented in different modules. In this paper, a new solution is presented to provide user authentication and access control in a single module to avoid any possible security breach between these two protection mechanisms. The secret information required for the whole system is minimised and the difficulty of password comprising increased to improve system security. More importantly, with time complexity of implementation almost equivalent to that found in the normal public key based password authentication schemes and limited extra storage space, both user authentication and access control can be achieved at the same time.
A divide-and-conquer approach for the presumed minimal solution to the Reve's puzzle, the Tower of Hanoi with four pegs, leadsto a simple structure of the solution. In particular, it allows an easy, iterative algo...
详细信息
A divide-and-conquer approach for the presumed minimal solution to the Reve's puzzle, the Tower of Hanoi with four pegs, leadsto a simple structure of the solution. In particular, it allows an easy, iterative algorithm – for the three-peg problem –to be extended to four pegs.
This paper describes a software authentication technique based on the public key cryptography for information integrity. The software provider can use a secret key to sign any released program and the user can verify ...
详细信息
作者:
Medhi, D.Center for Telecomputing Research
Computer Science Telecommunications Program University of Missouri - Kansas City 5100 Rockhill Road Kansas CityMO64110 United States
We present a unified framework for telecommunications switched traffic and transmission facility network design for survivability. This design is considered for backbone nonhierarchical teletraffic networks with dynam...
In the absence of systematic techniques to detect the existence of computer viruses, preventing suspicious software from entering the system at the initial point of entry appears to be the best method to protect compu...
ISBN:
(纸本)9780897914727
In the absence of systematic techniques to detect the existence of computer viruses, preventing suspicious software from entering the system at the initial point of entry appears to be the best method to protect computing resources against attacks of computer viruses. Currently, software is distributed primarily by diskettes instead of online transmission. Diskettes are more susceptible to modification and masquerading while on-line transmission usually follows proper user/message authentication. A software authentication system is proposed which does not require a mutually trusted center of both software vendors and users, or users' interaction with any key center. Vendors assume responsibility by signing released software and users verify the authenticity of received software before using it. Through such an authentication process, users eliminate the risk of running “unlicensed” or modified programs, thus eliminating the possibility of virus infections.
We present a unified model to compute various performance measures when a mixture of multi-slot traffic streams is offered on a trunk group of an integrated digital network under various bandwidth control schemes. Whe...
ISBN:
(纸本)9780897914727
We present a unified model to compute various performance measures when a mixture of multi-slot traffic streams is offered on a trunk group of an integrated digital network under various bandwidth control schemes. When we considered a bandwidth reservation scheme based on traditional trunk reservation and a variation called partial bandwidth reservation, we have observed that the performance criteria themselves has significant impact in deciding which reservation scheme to use and at what level to use.
This paper presents the initial investigation of a highly parallel architecture that can be used as an Intelligent Network Translation and Registration Platform (INTARP). The INTARP architecture is deterministic and u...
ISBN:
(纸本)9780897914727
This paper presents the initial investigation of a highly parallel architecture that can be used as an Intelligent Network Translation and Registration Platform (INTARP). The INTARP architecture is deterministic and uses a hyper-switch as well as bus connections to pass messages. Threads through the multiprocessing pipelines are maintained by service definitions of the call procedures on “anchor processors”. The processes call procedures distributed over “sequencing processors”. INTARP is being prototyped using the inMOS, family of transputers. Unlike other architectures designed for the Intelligent Network, INTARP is designed specifically to minimize the post dial delay (PDD) the architecture contributes to circuit switch call processing. Unmanaged PDD in the Intelligent Network can lead to higher call abandonments. PDD also increase trunk and port capitalization due to the greater call holding time in peripheral processors prior to information transfer. The INTARP architecture is evaluated using a simulation model. Translation, PCN Registration and Calling Card services have been implemented on the simulation model and the performance of the architecture is inferred from the performance of the simulation studies.
In a binary tree type local area network (LAN) protocol, the number of probe slots (K) needed for contention resolution, when M out of N terminals are contending for the bus access depends not only on the value of M b...
ISBN:
(纸本)9780897914727
In a binary tree type local area network (LAN) protocol, the number of probe slots (K) needed for contention resolution, when M out of N terminals are contending for the bus access depends not only on the value of M but also on the pattern of the active terminals, i.e., where the physical addresses of the active terminals are located in the logical binary tree structure. The value of M depends on the traffic intensity and increases with the packet arrival *** this paper, we develop simple mathematical models for the upper and lower bounds on K as a function of M, with N as a parameter taking into account the above active terminal patterns. The models developed are useful in determining the maximum and minimum transmission frame durations for the performance evaluation of binary type LAN protocols and other reservation type LAN protocols which employ binary tree type probing algorithm. In the case of integrated traffic, when frame duration is to be fixed, the model will enable to optimize bandwidth allocation to different types of traffic.
The simulator designed by the author provides a new design paradigm for simulating large-scale telecommunications systems. It is based on C and CSIM and has the features of dynamic memory allocation, modular design, i...
详细信息
暂无评论