P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great depe...
详细信息
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great dependence on the use application of statically defined views. In this paper, we propose the procedure by which current RDBMS can be transformed into their privacy-preserving equivalents. In addition, architectural for implementing P3P based on RDBMS is dissected and a server-centric implementation that reuses database querying technology is suggested
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adopting the network processor, a distribution algorithm based on protocol analysis has been realized. By delivering the captured data package to each detect node according to protocol types and then accomplishing the detection for data package through the collab.ration of the detect nodes, the processing efficiency of the intrusion detection system has been improved as a whole.
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid calculation is an important research subject. In this paper, some technique and strategy of allopatric isomeric backup in grid calculation environment are researched by comparing and analyzing the existing technique of database allopatric backup, a remote-data copy method is presented, a remote-data disaster dump system and a allopatric isomeric data Disaster Recovery tool are designed and implemented based on interlayer.
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The proposed architecture possesses several desirable emerging properties that enable it to provide an improved level of security for grid computing systems..
Self-organization feature mapping (SOFM) networks have strong ability for self-learning and self-adaptive. According to the characteristics of human thought, this paper constructed a kind of combined criterion, which ...
详细信息
Self-organization feature mapping (SOFM) networks have strong ability for self-learning and self-adaptive. According to the characteristics of human thought, this paper constructed a kind of combined criterion, which may be used to guide the learning of self-organization feature mapping network. Then this paper presents subsection algorithm, amalgamation algorithm and dynamical adaptive algorithm for SOFM networks so as to solve a kind of problems of classification rule mining. Finally, a practical example shows its flexibility and practicability.
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) togethe...
详细信息
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) together. By introducing generalized computing into knowledge management, this paper presents a kind of knowledge decision-making model, and a kind of control model of enterprise knowledge flow.
暂无评论