The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to resolving the key escrow problem and public key authentication problem, certificateless public key cryptography has drawn many attentions from numerous scholars and experts in recent years and becomes a hotspot for cryptography research. Most recently, the scholars of He and Du proposed a forward secure certificateless proxy blind signature scheme. Through the security analysis on the forward...
With the wide application of cloud computing, cloud computing security issues are now becoming more and more popular. By analyzing the security of information resources sharing in cloud computing environment, this paper discusses the technical, political and social issues of security protection.
Nowadays industrial control devices are crucial for infrastructure-critical systems such as factories, power plants, and water treatment facilities. Devices with IP addresses are visible on the Internet and they connect cyber space and physical world. The first step in protecting devices from attackers is a deep understanding of the devices' characteristics in the cyber space. In this paper, we take...
Network protocol classification plays an important role in modern network security and fine-grained management architectures. The state-of-the-art network protocol classification methods aim to take the advantages of flow statistical features and machine learning techniques. However the classification performance is severely affected by limited supervised information and unknown network protocols...
Proxy Mobile IPv6(PMIPv6) [1], as one of the most promising technologies for the next generation IP network, has attracted much attention in academia and industry. As an extension of PMIPv6, localized routing optimization can improve the performance of local communication greatly. However, recent study on localized routing optimizations only focus on singleaccess scenario, while the multi-access scenario...
Scientific workflows normally consist of multiple applications acquiring and transforming data, running data intensive analyses and visualizing the results for scientific discovery. In this paper, we present our application of Service-Oriented Architecture (SOA) to compose and deploy systems biology workflows. In developing this application, our solution uses MeDICi a middleware framework built on...
Infrastructure as a Service (IaaS) is the most common and fundamental type of cloud computing. It provides on-demand rent and access to virtual machine and storage. In this type of cloud computing, infrastructure service suppliers and users form a resource market. In this paper, we present a cost-based resource scheduling paradigm in cloud computing by leveraging market theory to schedule compute...
State-of-the-art scientific instruments and simulations routinely produce massive datasets requiring intensive processing to disclose key features of the artifact or model under study. Scientists commonly call these data-processing pipelines, which are structured according to the pipe and-filter architecture pattern.1 Different stages typically communicate using files; each stage is an executable...
Delay Tolerant Mobile Sensor Network (DTMSN) is the network for pervasive information gathering. Traditional data information gathering approaches may not fit for DTMSN for its intermittent connectivity. This paper proposes an Activity Based Data gathering protocol (ABD). In DTMSN, activity of different sensors may vary since they are attached to different entities, the message replicated by the active...
With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart Meter, public security, intelligent building and so on. Because of its huge market prospects, Internet of Things has been paid close attention by several governments all over the world, which is regarded as the third wave...
In this paper, we investigate the modeling and verification of real time systems using a case study on transmission protocol, CSMA/CD. Modeling and verification of real time systems is hot research topic which has practical implications. Such systems are considered as mission critical, as its correctness within timed constraints are of great importance. Through modeling and verifying CSMA/CD protocol...
In SOA, Reputation-Based Trust (RBT) mechanism is applied to achieve trust management. RBT enables services to assess the trust level of other services based on the reputation accumulated from user recommendations. A key challenge to apply RBT is to prevent the strategic behavior of users when they provide recommendations - they might give unfair ratings to benefit themselves. In this paper, we propose...
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, security surveillance, and disaster management. In this paper, we report the design and implementation of Quality-aware Voice Streaming (QVS) for wireless sensor networks. QVS is built upon SenEar, a new sensor hardware platform...
Currently transferring streaming media over Internet has become a hot research topic. But much more attentions are paid on applications of RTSP rather than its security. With the rapid development of RTSP applications, the security issues will become a bottleneck in the future. In this paper, we detailed analyze the attacks against RTSP, such as malicious eavesdropping /modifying /terminating stream...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.