We proposed a virtual device system to maximize user experience without real portable consumer electronic device before purchasing the product. The virtual device system can execute the entire software stack which is ...
详细信息
In current role-based systems, security officers handle assignments of users to roles. However, fully depending on this functionality may increase management efforts in a distributed environment because of the continu...
详细信息
ISBN:
(纸本)1581133502
In current role-based systems, security officers handle assignments of users to roles. However, fully depending on this functionality may increase management efforts in a distributed environment because of the continuous involvement from security officers. The emerging technology of role-based delegation provides a means for implementing RBAC in a distributed environment with empowerment of individual users. The basic idea behind a role-based delegation is that users themselves may delegate role authorities to other users to carry out some functions on behalf of the former. This paper presents a role-based delegation model called RDM2000 (role-based delegation model 2000), which is an extension of RBDM0 by supporting hierarchical roles and multi-step delegation. The paper explores different approaches for delegation and revocation. Also, a rule-based language for specifying and enforcing the policies based on RDM2000 is introduced.
Real-time multimedia applications are usually played back many times. For those applications, the distribution of actual execution time is no longer unknown from the second playback. In this paper, we propose a novel ...
详细信息
This paper presents an overview of Pragma, an adaptive runtime infrastructure capable of reactively and proactively managing and optimizing application execution using current system and application state, predictive ...
Novel quaternary half adder, full adder, and a carry-lookahead adder are introduced. The proposed circuits are static and operate in voltage-mode. Moreover, there is no current flow in steady states, and thus no stati...
详细信息
The transition to electric transportation demands efficient and cost-effective powertrains. Optimizing energy use is crucial for extending range and reducing expenses. However, comparing inverter and motor efficiency ...
详细信息
A software cloud is ready-made for software delivery or software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats...
详细信息
In this paper, we present a distributed locking protocol that enables multiple client nodes to simultaneously write their data to distinct data portions of a file, while providing the consistent view of client cached ...
详细信息
In this paper, we present a distributed locking protocol that enables multiple client nodes to simultaneously write their data to distinct data portions of a file, while providing the consistent view of client cached data, and conclude with an evaluation of the performance of our locking protocol on a Linux cluster.
This paper describes a data replication service for large-scale, data intensive applications whose results can be shared among geographically distributed scientists. We introduce two kinds of data replication techniqu...
详细信息
It is general process of client authentication for a user to gain authority by the user’s ID and password. But using client’s password is not always secure because of various security attacks of many opponents. In t...
详细信息
暂无评论