The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the Internet becoming the dominant channel for business and life, web proxies are also increasingly used for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets.,,,,In this paper, using thousands of web proxy URLs crawled, we performed a large-scale study on the DOM (Document Object Model) structure features...
Cloud storage service has been increasing in popularity as cloud computing plays an important role in the IT domain. Users can be relieved of the burden of storage and computation, by outsourcing the large data files to the cloud servers. However, from the cloud service providers' point of view, it is wise to utilize the data deduplication techniques to reduce the costs of running large storage system...
Aiming to reduce the user's computational overhead and tackle the attribute revocation issue, an attribute-based encryption scheme supporting decryption outsourcing and attribute revocation is proposed in this paper. The proposed scheme outsources some decryption computational tasks to a cloud server such that the computational overhead on the user is simple and constant. We also propose an efficient...
Computer-system logs often contain high volumes of interesting, useful information, and are an important data source for network security analysis. In this paper, we propose a distributed log stream processing system consisting of three main parts: log collection module, log transmission module and log statistics module. The system uses several open source technologies, not only supports multi-source...
Under the outfield condition, Portable Maintenance Aids (PMA) combined with Interactive Electronic Technical Manual (IETM) can assist maintenance personnel in doing maintenance training and fault diagnosis, which has an important research value. PMA-based IETM system is mostly developed by Client/Server (C/S) model. The systems based on C/S model are poor in compatibility, high in development cost...
Network traces are one of the most exhaustive data sources for the forensic investigation of computer security incidents. Recent advances in capturing the network traces techniques have facilitated the forensic processing, including the reconstruction. Unfortunately, off-line web-downloading chain reconstruction could not meet the demands for real time processing. Furthermore, the packets in prior...
Software defined networks provide new opportunities for automating the process of network debugging. Many tools have been developed to verify the correctness of network configurations on the control plane. However, due to software bugs and hardware faults of switches, the correctness of control plane may not readily translate into that of data plane. To bridge this gap, we present VeriDP, which can...
As IT organizations are pursuing database High Availability (HA) solutions to ensure and protest critical commercial data, the challenge is to leverage the three-fold key dimensions: cost, performance and availability. A successful solution needs to integrate Database Management System (DBMS) seamlessly with back-end storage and offer good performance and customer data protection. Through extensively...
A system architecture with high-density general purpose graphic processing unit (GPGPU) is emerging as a promising solution that can offer high compute performance and performance-per-watt for building cluster supercomputers. The raw compute power of these heterogeneous systems greatly exceeds the current prevailing homogenous systems, motivating their rapid adoption. These heterogeneous systems do...
With the rapid growth of Internet, the amount of malicious codes is exploding. Some security software vendors provide new cloud-based safeguard software for client users. These software, as part of Internet ware, consist of many modules with different functions and Internet behaviors. The Trojan scanning module, for instance, is based on cloud scanning function, which is achieved by collecting a large...
Reliability is a critical concern in the provision and placement of web services. A breakdown of service would seriously reduce customers' satisfaction, and thus harm the revenue of service providers. To maintain a high reliability, the common approach is deploying multiple service instances across different physical servers. This would inevitably raise another concern of energy consumption. Thus,...
TCP is widely used in the communications between servers in data centers. However, TCP has scaling limit that its ability to provide fair sharing at bottleneck link is reduced as the number of competing flows increases. Such limit is common in current data center networks and causes unfairness among TCP flows on a small time scale. The unfairness would add unpredictable delay to short flows, which...
More and more data centers are built using commodity TCP/IP and Ethernet networks because of their low cost and ease-of-use. But TCP would experience catastrophic throughput collapse in a communication pattern, termed "Incast", where multiple senders simultaneously send data to a receiver. This phenomenon potentially arises in many typical applications, such as distributed storage, Map Reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.