Personalized recommendation is one of the most effective methods to solve the problem of information overloading. As many real existing systems in nature, a recommendation system can also be considered as a complex ne...
详细信息
For the lack of safety and reliability of the information in the cloud computing environment, in order to create a more flexible and adaptable security mechanism, the combination of cloud computing and credible concep...
详细信息
Under the current cloud computing environment, a reasonable and practicable access control strategy is needed, which is a guarantee to protect cloud computing suppliers to provide services and many cloud users access ...
详细信息
In this paper, we propose a new implementation of a failure detector. The implementation uses a dual model of heartbeat and interaction. First, the heartbeat model is adopted to shorten the detection time, if the dete...
详细信息
The data availability in large-scale cloud storage has been increasing by means of data *** provide cost-effective availability, minimize the response time of applications and make load balancing for cloud storage, a ...
详细信息
ISBN:
(纸本)9781479957286
The data availability in large-scale cloud storage has been increasing by means of data *** provide cost-effective availability, minimize the response time of applications and make load balancing for cloud storage, a new replica placement policy with bidding thought is *** policy combines the own characteristics of replica and factors of bidding mode(e.g, bidding time, bidding standard, bidding price etc.) and starts replica bidding activity when the file data availability cannot meet the given *** placement is based on capacity and accessing probability of data *** experimental results show that our policy has a better performance in both load balance and response time comparing to the static replica policy and CDRM scheme.
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presente...
详细信息
ISBN:
(纸本)9781479954599
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presented. The method aims at providing the necessary data support to build the behavior pattern library for investigation. The records of the user's browsing history are collected to be analyzed. The obtained original data are pretreated to transactional data which are suitable for association rule mining. Frequent browsing time and frequent web browsing sequences are obtained from the transactional data by Apriori algorithm. The mining results are helpful for identification and recognition of anonymous or suspicious web browsing behavior patterns.
Certificateless signature eliminates the need of certificates in traditional public key signature and solves the inherent key escrow problem in identity-based signature. Therefore, it is an important secure requiremen...
详细信息
ISBN:
(纸本)9781509001897
Certificateless signature eliminates the need of certificates in traditional public key signature and solves the inherent key escrow problem in identity-based signature. Therefore, it is an important secure requirement to solve key escrow problem in certificateless signature scheme, i.e., certificateless signature scheme should to resist the malicious but passive KGC attack. key-insulated signature reduces the endangerment of private key leakage. Recently, Chen et al. propose a certificateless key-insulated signature scheme, and give the security proof in the standard model. In this paper, we give a security analysis of Chen et al.'s scheme. Our analysis reveals that Chen et al.'s scheme is vulnerable to the malicious-but-passive KGC attack.
The present study proposes a dynamic replica management strategy based on Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) in the cloud storage system. The replica management strategy includes t...
详细信息
In this paper, a new algorithm named Adaptive Weighted Label Propagation (AWLP) which explores the complementary property among subpatterns from the same face image is proposed for local matching based face recognitio...
详细信息
暂无评论