A rapidly changing environment forces the workflow management systems to change their workflow processes ever more frequently. In order to improve the flexibility of workflow management systems, a dynamic workflow mod...
详细信息
We propose an efficient certificateless public key encryption (CL-PKE) scheme which is provably secure against chosen ciphertext attacks without random oracles. Our scheme is more computationally efficient than the ex...
详细信息
We propose an efficient certificateless public key encryption (CL-PKE) scheme which is provably secure against chosen ciphertext attacks without random oracles. Our scheme is more computationally efficient than the existing schemes and provides the shortest public key length compared to other existing CL-PKEs with random oracles. We also propose a practical self-generated-certificate encryption (SGC-PKE) scheme based on our CL-PKE scheme. One of merits of such cryptographic systems is that it can be applied to countermeasure "Denial-of-Decryption (DoD) Attacks" that is inherent in CL-PKE.
To make workflow processes more flexible, a dynamic generation approach tor workflow processes corresponding to an instance is presented in this study. An activity, a part of a workflow, is defined as an action based ...
详细信息
Reputation systems are very useful in large online communities in which users may frequently have the opportunity to interact with users with whom they have no prior experience. Recently, how to enhance the cooperativ...
详细信息
As a way to compose independent services together to fulfill a function, service composition is an important means for flexible and rapid information integration of complex distribution application in open and heterog...
详细信息
As a way to compose independent services together to fulfill a function, service composition is an important means for flexible and rapid information integration of complex distribution application in open and heterogeneous environment. Because the participating services may be failure or unavailable, how to guarantee the quality of service composition has become a challenging problem. A service composition model based on Timed Petri net (SCTPN) is proposed in this paper, which is capable of accurately capturing transaction behaviors and time constraints of services. The basic relationships and failure processing strategies between services are also characterized by SCTPN model. Based on states of the constructed SCTPN model, we propose the concepts of greatest concurrent set and transfer matrix to analyze reliability related properties of SCTPN model. Two simplification schemas are established to reduce the complexity of computation. Finally, three specific experiments are conducted to explain the effectiveness of proposed method.
The liveness of Petri net models of parallel programs is a very important property. The existing analysis techniques take Petri net models as a whole to study properties, which is subject to the state explosion proble...
详细信息
ISBN:
(纸本)9781424449934
The liveness of Petri net models of parallel programs is a very important property. The existing analysis techniques take Petri net models as a whole to study properties, which is subject to the state explosion problem. In this study, we decompose a parallel program's Petri net model into multiple process subnets to study liveness preservation instead of taking it as a whole, which thus mitigates efficiently the state explosion problem to some extent. In this paper, the liveness preservation relation between a MPINet and its process subnets is analyzed in detail. A necessary condition of keeping liveness of a MPINet composed of n live process subnets is given. And a class of CR-restricted MPINets is proposed. Liveness preservation can be efficiently verified based on only their net structures for CR-restricted MPINets.
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in c...
详细信息
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built from bilinear mappings on elliptic curves which need costly operations. Despite the investigation of certificateless public key encryption without pairings, certificateless signature without pairings received much less attention than what it deserves. In this paper, we present a concrete pairing-free certificateless signature scheme for the first time. Our scheme is more computationally efficient than others built from pairings. The new scheme is provably secure in the random oracle model assuming the hardness of discrete logarithm problem.
This paper proposes a simple yet capacity-approaching concatenation of a mixture of short memory length convolutional codes and simple rate-1 block code followed by either complex 1-dimensional (1-D) anti-Gray or Gray...
详细信息
This paper proposes a simple yet capacity-approaching concatenation of a mixture of short memory length convolutional codes and simple rate-1 block code followed by either complex 1-dimensional (1-D) anti-Gray or Gray mapping over multiple antenna channels with quadrature phase-shift keying (QPSK). By interpreting rate-1 code together with 1-D mapping as a multi-D mapping employed over multiple transmit antennas, the error performance is analyzed in two regions, the error-floor and turbo pinch-off regions. In the former one, a tight union bound and design criterion on the asymptotic performance are first derived, which provide an useful tool to predict the error performance. Based on the design criterion, an optimal rate-1 code for each 1-D mapping is then constructed to achieve the best asymptotic performance. In the turbo pinch-off area, by using extrinsic information transfer (EXIT) chart, the most suitable mixed codes are selected for both symmetric and asymmetric antenna setups. It is demonstrated that the simple concatenation scheme can achieve near-capacity. Furthermore, its error performance is comparable to that obtained by using well-designed irregular low-density parity-check (LDPC) and repeat accumulate (RA) codes, and thereby, outperforms a scheme employing a parallel concatenated turbo code.
The clinical symptoms of metabolic disorders during neonatal period are often not apparent, if not treated early irreversible damages such as mental retardation may occur, even death. Therefore, practicing newborn scr...
详细信息
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud reso...
详细信息
ISBN:
(纸本)9781424446469;9780769537559
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud resource provider has to decide on how to allocate his scarce resources in order to maximize his profit. The application of bid price control for evaluating incoming service requests is a common approach for capacity control in network revenue management. In this paper we introduce a customized version of the concept of self-adjusting bid prices and apply it to the area of cloud computing. Furthermore, we perform a simulation in order to test the efficiency of the proposed model.
暂无评论