Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
详细信息
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited Traditional methods of database access control places great depen...
详细信息
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
详细信息
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future ...
详细信息
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future research to protect P2P networks. This paper presents a new incentive architecture- "Pyramid", whose idea first came out as a sales mode named "Pyramid Selling". By introducing this concept into P2P research, we believe the "magic" of encouraging sales in reality could also benefit the P2P world on encouraging cooperation. In particular, the paper describes in details the three layers of Pyramid’s hierarchical structure: fundamental infrastructure managing the peer organization and basic utilities, trade-based credit system supporting trust management and service charge and pyramid incentive mechanism encouraging cooperation of rational users. Model evaluation and discussion of the proposed pyramid incentive mechanism demonstrate its effectiveness in encouraging cooperation and discouraging non-cooperation respectively.
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
The water quality is the most vital factor in a successfully healthy aquaculture. After investigation by 415 fish disease cases and experiments, it is found that eutrophication and the pollutants of NH3, H 2S as well ...
详细信息
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the und...
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the underlying connectivity and routing protocols defined by MANET in order to perform resource discovery and access. This paper proposes a mobility-aware zoned routing protocol for MANET-MAFZP, which create zones in terms of the distance between each node to the Minimum ID node. Resort to the information provided by neighborhood nodes, our proposed protocol's request delay and control overhead is descend to O(2R). In addition, this protocol classifies the mobility pattern with neighbor node and reduces routing control overhead. Simulation results show that the protocol greatly decreased routing time and control overhead.
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great depe...
详细信息
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great dependence on the use application of statically defined views. In this paper, we propose the procedure by which current RDBMS can be transformed into their privacy-preserving equivalents. In addition, architectural for implementing P3P based on RDBMS is dissected and a server-centric implementation that reuses database querying technology is suggested
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adopting the network processor, a distribution algorithm based on protocol analysis has been realized. By delivering the captured data package to each detect node according to protocol types and then accomplishing the detection for data package through the collaboration of the detect nodes, the processing efficiency of the intrusion detection system has been improved as a whole.
暂无评论