Peer-to-peer (P2P) system can support service for lots of end users with little hardware investment, which suits for the efforts to lower down the service cost for multiplayer online games (MOG). In this paper, we int...
详细信息
Peer-to-peer (P2P) system can support service for lots of end users with little hardware investment, which suits for the efforts to lower down the service cost for multiplayer online games (MOG). In this paper, we introduce PKTown, a P2P middleware inserted into Star Craft and the network layer. PKTown captures all packets generated by Star Craft. We apply application layer multicast (ALM) to transmit the broadcast packets through overlay network. PKTown extends the LAN game experiences to players belong to different LAN. We design a k-regular random overlay network based on game specific requirements analysis. No change is made on binary code of Star Craft. Preliminary test results show that PKTown works well and supports other MOG in the same way. Our contribution is to provide a new game experience method with little hardware investment.
Grid computing emerges as an effective technology to couple geographically distributed resources and solve large-scale computational problems in wide area networks. There are several popular grid platforms, such as UN...
详细信息
ISBN:
(纸本)9780769530482;0769530486
Grid computing emerges as an effective technology to couple geographically distributed resources and solve large-scale computational problems in wide area networks. There are several popular grid platforms, such as UNICORE and Globus Toolkit. Many famous grid projects are constructed with these platforms, each of which manages different distributed resources. In order to aggregate resources managed by different grid platforms, it is necessary to implement the interoperation among these grid platforms. Security interoperation is one of key issues for the interoperation. CGSP (ChinaGrid Support Platform) and VEGA are two popular grid platforms in China. To achieve security interoperation between these two platforms, four mapping policies, including user-user mapping, user-agora mapping, role-user mapping, role-agora mapping, are proposed in this paper. The security interoperation process is proposed based on SAML specification and the mapping policies. We also analyze the flexibility of mapping policies and the security of the interoperation process.
Grid computing is becoming more and more attractive for coordinating large-scale heterogeneous resource sharing and problem solving. Of particular interest for effective grid computing is a software provisioning mecha...
详细信息
Grid computing is becoming more and more attractive for coordinating large-scale heterogeneous resource sharing and problem solving. Of particular interest for effective grid computing is a software provisioning mechanism. We propose a highly available dynamic deployment infrastructure, HAND, based on the Java Web services core of Globus toolkit 4. HAND provides capability, availability, and extensibility for dynamic deployment of Java Web services in dynamic grid environments. We identify the factors that have impact to dynamic deployment in static and dynamic environments. We also present the design, analysis, implementation, and evaluation of two different approaches to dynamic deployment (service level and container level), and examine the performance of alternative data transfer protocol for service implementations. Our results demonstrate that HAND can deliver significantly improved availability and performance relative to other approaches
It now becomes a trend to implement the interconnections between resources as well as services in ubiquitous systems. Attribute-based authorization mechanisms, protocols and systems are gaining in popularity, such as ...
详细信息
It now becomes a trend to implement the interconnections between resources as well as services in ubiquitous systems. Attribute-based authorization mechanisms, protocols and systems are gaining in popularity, such as SAML, XACML, Shibboleth, etc. However, their management efficiency could be further improved. The Role-based Access Control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. However, RBAC is still not flexible enough to address various application scenarios in ubiquitous systems. We propose a new architecture for access control in ubiquitous systems that impose attribute and status constraints on the RBAC model, which can significantly enhance the generality and flexibility of authorization by integrating the advantages of RBAC and attributed- based access control models. Moreover, the state mechanism proposed in this architecture captures the states of the authorization elements so as to reflect the outcomes of the authorization control. Finally, we analyze the flexibility and generality of this architecture in ubiquitous systems.
In Grid, it is an important strategy that using multicast to realize the large-scale information resource sharing. However, it is very difficult to ensure the security of multicast. In this paper, based on the basic p...
详细信息
In Grid, it is an important strategy that using multicast to realize the large-scale information resource sharing. However, it is very difficult to ensure the security of multicast. In this paper, based on the basic principles of the centralized key distributed strategy and the distributed key distribution strategy, according to the multicast mechanism in Grid, considering the dynamic factors of multicast members, we present the member hierarchy method for key distribution, the member discovery protocol, the clustering protocol and the key distribution strategy, thus constituting the key distribution strategy of security multicast in Grid. In order to validate the feasibility and the availability of this strategy, a simulation experiment is done. The results show that it is feasible and efficient to ensure the security multicast in Grid.
In this paper a new approach for building networked embedded software is presented. The approach is based on the composition of reusable components with the addition of a perspective contract principle for modeling no...
详细信息
In this paper a new approach for building networked embedded software is presented. The approach is based on the composition of reusable components with the addition of a perspective contract principle for modeling non-functional properties. Nonfunctional properties are an important aspect of networked embedded software, and this is why they are modeled separately. As such, the component view presented here differs from traditional component based views, where focus is laid on the functional part. The ideas discussed in the paper have been implemented in a tool. This tool enables the construction of networked embedded software by means of components and perspective contracts. Currently, a queuing network based algorithm that considers all non-functional properties together performs a static analysis on the perspective contracts before execution of the application
暂无评论