Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future ...
详细信息
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future research to protect P2P networks. This paper presents a new incentive architecture- "Pyramid", whose idea first came out as a sales mode named "Pyramid Selling". By introducing this concept into P2P research, we believe the "magic" of encouraging sales in reality could also benefit the P2P world on encouraging cooperation. In particular, the paper describes in details the three layers of Pyramid’s hierarchical structure: fundamental infrastructure managing the peer organization and basic utilities, trade-based credit system supporting trust management and service charge and pyramid incentive mechanism encouraging cooperation of rational users. Model evaluation and discussion of the proposed pyramid incentive mechanism demonstrate its effectiveness in encouraging cooperation and discouraging non-cooperation respectively.
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the und...
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the underlying connectivity and routing protocols defined by MANET in order to perform resource discovery and access. This paper proposes a mobility-aware zoned routing protocol for MANET-MAFZP, which create zones in terms of the distance between each node to the Minimum ID node. Resort to the information provided by neighborhood nodes, our proposed protocol's request delay and control overhead is descend to O(2R). In addition, this protocol classifies the mobility pattern with neighbor node and reduces routing control overhead. Simulation results show that the protocol greatly decreased routing time and control overhead.
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great depe...
详细信息
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great dependence on the use application of statically defined views. In this paper, we propose the procedure by which current RDBMS can be transformed into their privacy-preserving equivalents. In addition, architectural for implementing P3P based on RDBMS is dissected and a server-centric implementation that reuses database querying technology is suggested
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adopting the network processor, a distribution algorithm based on protocol analysis has been realized. By delivering the captured data package to each detect node according to protocol types and then accomplishing the detection for data package through the collaboration of the detect nodes, the processing efficiency of the intrusion detection system has been improved as a whole.
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid calculation is an important research subject. In this paper, some technique and strategy of allopatric isomeric backup in grid calculation environment are researched by comparing and analyzing the existing technique of database allopatric backup, a remote-data copy method is presented, a remote-data disaster dump system and a allopatric isomeric data Disaster Recovery tool are designed and implemented based on interlayer.
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The proposed architecture possesses several desirable emerging properties that enable it to provide an improved level of security for grid computing systems..
Self-organization feature mapping (SOFM) networks have strong ability for self-learning and self-adaptive. According to the characteristics of human thought, this paper constructed a kind of combined criterion, which ...
详细信息
Self-organization feature mapping (SOFM) networks have strong ability for self-learning and self-adaptive. According to the characteristics of human thought, this paper constructed a kind of combined criterion, which may be used to guide the learning of self-organization feature mapping network. Then this paper presents subsection algorithm, amalgamation algorithm and dynamical adaptive algorithm for SOFM networks so as to solve a kind of problems of classification rule mining. Finally, a practical example shows its flexibility and practicability.
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) togethe...
详细信息
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) together. By introducing generalized computing into knowledge management, this paper presents a kind of knowledge decision-making model, and a kind of control model of enterprise knowledge flow.
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet. A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobj...
详细信息
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet. A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobjective genetic algorithm, after the related work is reviewed. The contribution lies on that the selection process of such routing is treated with multiobjective optimization. Different quality criterions in IP network are taken into account for multicast communications. A set of routing trees is generated to approximate the Pareto front of multicast problem. Multiple trees can be selected from the final set of nondominated solutions, and applied to obtain a good overall link cost and balance traffic distribution according to some simulation results.
暂无评论