Personal context information is important to enable context-aware applications in pervasive spaces. As privacy, many investigators have pointed out that it must be in the controllable state by using personal privacy p...
详细信息
Personal context information is important to enable context-aware applications in pervasive spaces. As privacy, many investigators have pointed out that it must be in the controllable state by using personal privacy policy. The long term objective of this research was to extract privacy policy from personal context information database with machine learning method. A context-aware telephone system was designed to collect data, learn policy and examine the accuracy of policy. In the step of PDA simulation, the results showed that the method was possible to make suitable decision for telephone communication in consideration of privacy protection. In order to further validate the proposed privacy protection method, the pervasive space was designed and implemented to get more real data about using context-aware telephone. At the step of pervasive space simulation, we design and code the prototype of context-aware telephone system from the view of softwareengineering.
software architecture design is an important stage in the whole software development lifecycle. Yet non-functional requirements (NFRs) have been afflicted architects for a long time and how to efficiently design and a...
详细信息
software architecture design is an important stage in the whole software development lifecycle. There are so many various concerns at architecture level which relate to all kinds of stakeholders and describe the all f...
详细信息
An improved model based on Kohonen neural network, called Self-Organizing Map neural network with two winners (SOM2W), is applied to assess stock companies in this paper. In addition, in order to improve the precision...
详细信息
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the aid of a trusted third party in case o...
详细信息
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the aid of a trusted third party in case of a dispute. In this paper, the key security objectives of ASW protocol - fairness, effectiveness and timeliness - have been verified using a probabilistic model checking tool, PRISM. First, the security objectives of ASW protocol have been defined with probabilistic equations. The roles of the participants (i.e., the originator and the responder) and the trusted third party have been modeled in PRISM code. The security objectives of ASW protocol have been expressed using a temporal logic, PCTL. The PCTL expressions are analogous to the probabilistic equations that we have developed to define the security objectives. Next, the model is analyzed using these PCTL expressions, and different outputs have been observed. The outputs confirm the fairness of the ASW protocol. Moreover, the effectiveness and the timeliness of the protocol are also established. Hence, the key security properties of ASW protocol have been verified.
We model the Sum and Product Riddle inpublic announcement logic, which is interpreted on an epistemic Kripke model. The model is symbolically represented as a finite state program with n agents. A model checking metho...
详细信息
In this paper, the physical mechanisms of transcapillary exchange of the living organism are investigated. Laboratory animals are the object of this investigation, and original laser and electrophysiological methods a...
详细信息
In this paper, the physical mechanisms of transcapillary exchange of the living organism are investigated. Laboratory animals are the object of this investigation, and original laser and electrophysiological methods are used as experimental tools.
A capacity using covert channel mitigation method (CUCCMM) was proposed. This method uses capacity as metric for channel danger measure according to trusted computer system evaluation criteria (TCSEC) and multiple pro...
详细信息
A capacity using covert channel mitigation method (CUCCMM) was proposed. This method uses capacity as metric for channel danger measure according to trusted computer system evaluation criteria (TCSEC) and multiple probabilities based protocol selection policy (MPBPSP) to guide die application of secure concurrency control protocol. The algorithms of channel's capacity measure and policy's parameter computing are also presented. Experimental results show that CUCCMM implements the restriction criterion on channel's capacity effectively and accurately, and the MPBPSP significantly decreases the influence of restriction operation on real-time performance.
The independence of services in service oriented architectures allows different providers to provide different business functionalities. As services can be used independently from each other the requirements engineer ...
详细信息
The independence of services in service oriented architectures allows different providers to provide different business functionalities. As services can be used independently from each other the requirements engineer is able to quickly align the requirements closely to the current service provision. The organisation, which achieves this close alignment benefits optimally from the current service provision. In this paper we propose a requirements engineering approach based on goal model comparison, which allows finding services for given requirements and which facilitates the adjustment of requirements to current service provision. The approach rests on the idea of describing requirements and services with Tropos goal models and to use model comparison techniques to find services and to adjust the requirements to fit these services.
暂无评论