The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has achieved great development both in academic and industry communities due to the fact that it relieves the burden of data storage and data management. However, data stored in the cloud may suffer from malicious use by cloud service providers. Therefore, exploring an efficient search technique for encrypted data is extremely urgent. This paper focuses on semantic search and preferred...
Cloud storage supplies enormous convenience for numerous companies and individuals to manage their data. However, data owners lose ultimately physical control of their data, which introduces many potential safety hazards in the cloud storage environment. Many scholars have made studies on the security problem of cloud storage data. To solve the problem, we propose a secure audit scheme supporting...
Context recovery can improve the efficiency of web service replacement. In order to solve the problem that when to do service context migration, this paper proposes an algorithm of context migration timing judgment which is based on the initial state, real time availability and availability changes of web service. According to this algorithm, we can determine whether to do service context migration...
Recently, most DDoS attacks and other acts of online crime are facilitated by botnets. To be well prepared for botnet-based attacks, we should know the botnet that could be developed by attackers in the near future. In this paper, we propose a framework for hybrid structure P2P botnet based on Chord. We organize some super bots into the same virtual node to improve the network stability. We also design...
In recent years, botnets have become a significant threat, drawing the attention of computer security practitioners and researchers. As the extensive use of peer-to-peer (P2P) technology, P2P structured botnets have gradually emerged as a new advanced form of botnets. In this paper, we analyze the features of this new type botnet and evaluate effectiveness of various botnets defense strategies. However,...
Network is an inevitable trend in the development of Geographic Information System (GIS). Silverlight, as a cross-browser, cross-platform plug-in, can bring the next generation based. NET-media experiences and rich interactive applications for the network, and provides new method of performance for the new generation of WebGIS development. With the research of Silverlight and REST technology, this...
In order to solve the lack of intelligence and server overload problem that exits in the traditional Ajax engine, a new Ajax engine based on the browser caching mechanism named SCFE (Smart Client Flow Engine) is proposed. It separates business logic layer from data access layer, and transfers business logic layer and the relevant data to the client catch to implement. The theory and the practice prove...
For the traditional surveillance system with the weakness of over-reliance on monitor environment, poor mobility and so on, this paper proposed a monitoring scheme based on android smart phone terminal. By collecting and processing data at server, sending data to smart phone terminal via socket, it reaches the purpose of monitoring the target site anywhere and anytime under the coverage of wireless...
At present, the education plays an important role in the reformation of prisoner. This paper proposes a solution to help to educate and reform the prisoner, and designs a prisoner education system using remote audio and video based on it. This system implements the education to the prisoner by audio and video conversation, law documents and can obtain the prisoner's psychological feedbacks in a short...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.