Automated trust negotiation (ATN) is a new means to establish trust relationship through the mutual exchange of access control policy and credentials in the open and distributed environments. In ATN, access control po...
详细信息
Automated trust negotiation (ATN) is a new means to establish trust relationship through the mutual exchange of access control policy and credentials in the open and distributed environments. In ATN, access control policy plays a key role in protecting resources from unauthorized access. In practice, a policy may contain sensitive information, and its disclosure may cause damages. In order to protect the sensitive policy or its content, the policy is usually designed complex. Even worse, the policy may be self contradictory, which would lead the negotiation to fail. To solve such a problem, a new approach for checking policy consistency is proposed in the paper. In the approach, we analyze why the policy inconsistency happens and specify how to avoid it by simplifying a compound policy. Meanwhile, the approach is proved useful to hide policy by presenting some useful theorems to generate minimal policy set and credential set.
With the development of virtualization technology, it¿s desirable to deploy virtual machines to high performance clusters used for data centers. VNIX, developed in servicescomputingtechnology and systemlab, tr...
详细信息
With the development of virtualization technology, it¿s desirable to deploy virtual machines to high performance clusters used for data centers. VNIX, developed in servicescomputingtechnology and systemlab, tries to help cluster administrators to manage a large number of virtual machines (VMs) distributed on clusters. To reduce the complexity of virtualization management, VNIX provides a whole-set of tools for monitoring, deploying, controlling, and configuring virtual machines on clusters. In addition to those basic management functions, VNIX also offers a number of specialized tools for clustering VMs. Due to the complex dynamic environment in clusters, it¿s challenging to design such tools. In this paper, we present the design of VNIX, and we describe several use cases of managing VMs in clusters with VNIX. Such use cases illustrate various ways of using VNIX to simplify the management work and to improve resource utilization.
The most important concept of a market is price – the terms on which the trading objects (products or services) are exchanged. In an ideal market, the price is a reflection of the current state of the market, and the...
详细信息
ISBN:
(纸本)9781424432806
The most important concept of a market is price – the terms on which the trading objects (products or services) are exchanged. In an ideal market, the price is a reflection of the current state of the market, and therefore it should be dynamic. From the seller perspective, using an effective dynamic pricing strategy can make a difference between making a profit or loss in a makret. In a grid marketplace, the strategy is even more important given it is very dynamic and volatile nature. In this paper, we describe and review three different pricing strategies for the grid market: Demand-Response, Revenue-Response and Price-Maximizing strategy, and analyze their behavior in different market conditions using simulation approach. Our results show that two of the strategies are able to generate high revenue in various market conditions.
Virtual machine (VM) based logging-and-replay technology has attracted much attention for system security, fault tolerance, and debugging. However, so far there is not a replay system designed on virtual machine monit...
详细信息
Virtual machine (VM) based logging-and-replay technology has attracted much attention for system security, fault tolerance, and debugging. However, so far there is not a replay system designed on virtual machine monitor Xen. In this paper, XenLR presents the design and implementation of a logging tool for full system replay on Xen. To reduce the design complexity, XenLR is achieved on a lightweight VM mini OS. Our preliminary work dedicates to identify architectural non-deterministic events and record them compactly. XenLR does not modify the guest OS and only need to record the external inputs (keyboard input and time update on mini OS). The log data are saved in the privileged domain¿s file system through transmission channels. The experiments indicate that XenLR results in low time and space overhead. Overhead due to logging is imperceptible for interactive use. The log files grow at 1.4 MByte/day, so it causes litter space consumption for today¿s large capacity disk storage.
This paper describes a method using gridtechnology to improve traffic algorithm efficiency. The method cooperates traffic status estimation algorithm with gridtechnology. It collects and preprocesses massive real-ti...
详细信息
This paper describes a method using gridtechnology to improve traffic algorithm efficiency. The method cooperates traffic status estimation algorithm with gridtechnology. It collects and preprocesses massive real-time data of taxi global positioning system (GPS) as floating car data as well as geographic Information systems (GIS) data of Shanghai urban road network. Then, it adopts gridtechnology to deal with computation for the shortest time path algorithm on traffic status estimation in real time. The results of experiment prove that the gridtechnology can greatly improve the computing efficiency of traffic status estimation model.
Traversing network address translation (NAT) for peer-to-peer (P2P) communication has become a hot topic recently. Compared to UDP, establishing TCP connections for hosts behind different NATs is more complex. Thus, m...
详细信息
Traversing network address translation (NAT) for peer-to-peer (P2P) communication has become a hot topic recently. Compared to UDP, establishing TCP connections for hosts behind different NATs is more complex. Thus, many TCP-based applications do not address TCP traversal through NATs. Some solutions suggest using delegates to relay all communications, or tunneling TCP over UDP. However, they require a big reform to network architecture, or using a nonstandard TCP/IP stack. In this paper, we present a novel idea called TCPBridge. TCPBridge converts TCP traversal to UDP traversal without modifying any binaries of the TCP-based applications. Our design can be integrated with those P2P applications which have not solved TCP traversal problem, and extends them to support direct communications between NAT hosts. It deals with the problem of TCP traversal, so as to improve the usability of applications. We have implemented TCPBridge in several existing P2P systems. Statistics prove that TCPBridge is scalable and robust, and we believe it will benefit many other existing P2P applications.
The research about the interaction between grid environments and users is becoming popular. Many scientists propose the integration for Web 2.0 technologies and gridcomputing. In this paper, we propose a flexible Web...
详细信息
The research about the interaction between grid environments and users is becoming popular. Many scientists propose the integration for Web 2.0 technologies and gridcomputing. In this paper, we propose a flexible Web-based framework for grid applications - WAGA, which tries to bridge the gap between grid middleware and grid applications. WAGA provides a WYSIWYG (what you see is what you get) way for the programming for grid applications by adopting participation, interaction and sharing features of Web 2.0 technology. With WAGA, a grid user is able to use the grid resources and to develop grid applications without understanding the underlying complexity of grids. WAGA is composed with a Web GUI (called WAGA-designer) and someWeb-based APIs. WAGA-designer is used by grid users to develop application-based Web portal, and the WebAPIs are used by the WAGA-designer. The use case study shows that WAGA is flexible for grid users, and the performance evaluation shows that WAGA works with high efficiency.
This paper proposes a novel parallel data transfer mechanism to improve the performance of data transfer in grid environment. It utilizes the servers distributed in gridsystem and selects some of them as the proxy se...
详细信息
This paper proposes a novel parallel data transfer mechanism to improve the performance of data transfer in grid environment. It utilizes the servers distributed in gridsystem and selects some of them as the proxy servers. It introduces the method of how to select the proxy server. Then data are divided into several parts and sent through the selected proxy servers with different physical links. By that, it can effectively improve the performance of data transfer.
Text categorization is the process of assigning documents to a set of previously fixed categories. It is widely used in many data-oriented management applications. Many popular algorithms for text categorization have ...
详细信息
ISBN:
(纸本)9780769533162
Text categorization is the process of assigning documents to a set of previously fixed categories. It is widely used in many data-oriented management applications. Many popular algorithms for text categorization have been proposed, such as Naive Bayes, k-Nearest Neighbor (k-NN), Support Vector Machine (SVM). However, those classification approaches do not perform well in every case, for example, SVM can not identify categories of documents correctly when the texts are in cross zones of multi-categories, k-NN cannot effectively solve the problem of overlapped categories borders. In this paper, we propose an approach named as Multi-class SVM-kNN (MSVM-kNN) which is the combination of SVM and k-NN. In the approach, SVM is first used to identify category borders, then k-NN classifies documents among borders. MSVM-kNN can overcome the shortcomings of SVM and k-NN and improve the performance of multi-class text classification. The experimental results show MSVM-kNN performs better than SVM or kNN.
This article consists of a collection of slides from the author's conference presentation. It is concluded that unrealistic targets are endemic to a highly visible project managed by executives disconnected from t...
详细信息
This article consists of a collection of slides from the author's conference presentation. It is concluded that unrealistic targets are endemic to a highly visible project managed by executives disconnected from the engineers doing the real work.
暂无评论