The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, robust exponential consensus problems of multi-agent systems with switching topologies and communication delays are investigated by using Lyapunov-Krasovskii functions. A neighbor-based protocol is introduced, based on which the closed-loop system is transformed into a reduced-order form. Sufficient conditions in terms of a matrix inequality are given which guarantee robust exponential...
Current network protocol binary software testing methods cannot discover serious vulnerabilities in deep states. This article introduces a novel method based on multi-packet symbolic execution, which can drive the software to deep states, to test the whole network protocol binary software stacks. This article also presents a prototype system, S2EProtocol-multi, upon Selective Symbolic Execution (S2E)...
Traditional symbolic execution for testing software focuses on exploring the paths of the program. However, for stateful network protocol, this method is hard to explore all the protocol states. This paper proposes a novel method based on model-guided symbolic execution, which can associate the program paths with the protocol states and utilize the protocol model to guide the test to explore interesting...
The vulnerabilities existing in network protocol implementations are difficult to detect. The main reason is that the state space of complex protocol binary software is too large to explore. This paper proposes a novel approach that leverages selective symbolic execution to test network protocol binary software directly, which confines symbolic execution in the secure-sensitive area. This paper also...
This paper proposes an explicit adaptive algorithm to solve the problem of heterogeneous dynamic synchronization of multi-agent uncertain systems. Different from the existing works, the proposed algorithm depends on less control parameters and achieves zero synchronization error between the agents of heterogeneous uncertain dynamic networks and virtual target. By introducing appropriate assumptions,...
Different from the typical networks, the sensor nodes have limited capacity for computing, storing and communicating in wireless sensor networks. So it is a hot topic to reduce the energy consumption and prolong the lifetime of wireless sensor networks. Based on this, in order to reduce the energy consumption when the wireless sensor network management operation is running, a new encoding rule- Reduced...
The fine-grained flow level measurement is getting increasing demand in recent years. Though it fails to be a generic solution for its biased sampling, NetFlow is promising for its compatibility with major routers and its convenience to perform direct flow level measurement of both IPv4 and IPv6 traffic. Traditional flow level measurement systems based on NetFlow are mostly centralized and each of...
An aggregated privacy-preserving identity verification scheme is proposed for composite Web services. It aggregates multiple component providers' interactions of identity verification to a single one involving the user. Besides, it protects users from privacy disclosure through the adoption of zero-knowledge of proof of knowledge. This approach can dramatically reduce the computation time, independently...
Geo-information network service has become more and more popular; however the practical application of vector data service is rare used. The main reasons are as follows: firstly, with the variety of vector data formats, the general format conversion cannot be applied data shared services; Secondly, Existing vector data service interface standard (such as WFS) is too simple, which doesn't meet the...
Multi-tenant SaaS software as one of the application pattern in Cloud Computing delivers software thourgh Web to the users by rhe service manner. So, it can reduce the cost of users, and reduce the cost of the maintainess and management by providers. The first problem that must be considered is how to provide the most appropriate tenant to the user according to the business request from the user in...
The Network Configuration Protocol (NETCONF) is a new network Management Protocol which becomes more and more widely used in network management area. To make NETCONF much safer, we extend the extensible Access Control Markup Language(XACML) access control mechanism and implement it on our NETCONF network management system-BUPT-NEP. We use subtree filtering expression to represent resource instead...
NETCONF is a new standard network configuration protocol. For further research we have developed an open experimental platform for NETCONF protocol, BUPT-NEP (BUPT NETCONF Experimental Platform). Moreover, based on the experimental platform some significant technologies, such as data filtering, data storage and so on, are considered. This paper gives a detailed introduction of the tree data model...
NETCONF, a new network management protocol, was released in 2006 which has overcome the weaknesses of SNMP. In the NETCONF protocol, it proposed a new mechanism subtree filtering, which allows an application to select particular XML subtrees. With the Subtree Filtering, specifically information of XML can be filtered out as a XML subtree. However, since the Subtree Filtering depends on the parsing...
NETCONF is a new protocol as the network becomes more and more complexity, which has a better capability administering lots of devices. However, the large scale network brings some trouble for implementing access control especially when administers need to deploy or update policies on each devices. In this regard, the architecture of centralized access control proxy server based on NETCONF is focused,...
SaaS (software as a service), the new software application pattern has got wide attraction in both industry and academia. But transaction processing is a problem that prevents SaaS from wide spreading. To solve the problem, this paper proposes A business level compensation mechanism for multitenancy SaaS application transaction processing. The mechanism supports flexible and customizable transaction...
NETCONF is a new network management protocol, based on the XML encoding method, which was proposed by IETF in 2006. It aims to overcome the shortcomings of SNMP predominantly used for configuration tasks at present. In the NETCONF protocol, subtree filtering mechanism and XPath capability is defined, both used to allow a client to select particular XML subtrees of the data model of the server. In...
In order to improve the flexibility of template based service composition, we develop a service composition approach. This approach adds evolutions of business patterns to the template based service composition to generate new business patterns if there is no available appropriate pattern towards user's request. Three evolution ways are proposed, including: application evolution, refinement evolution...
Wireless sensor networks (WSNs) have promised us a new monitoring and controlling model over the distributed computing environment. Network management in WSNs becomes extremely important and vital in order to keep the whole network and application work properly. This paper summarizes the uniqueness of network management protocol for WSN, provide an overview analysis of several current existed protocols,...
As multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet, the research of the multicast key management is becoming a hot issue. Firstly, we analyze the n-party GDH.2 multicast key management protocol and point out that it has the following flaws: lack of certification, vulnerability to man-in-the-middle attacks, and a single-point...
In 2006, the IETF released its latest effort, NETCONF, a brand new network management protocol, which is based on the XML encoding method. The NETCONF protocol is thought to be able to meet the requirement of configuration management which SNMP fails to do well. The NETCONF protocol also performs better in other fields such as the efficiency, more flexible operations, etc. But, as a new protocol,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.