The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
This paper describes an integration of a Head Related Transfer Function (HRTF)-based 3D sound convolution engine into the open-source VoIP conferencing software Mumble. Our system allows to virtually place audio contributions of conference participants to different positions around a listener, which helps to overcome the problem of identifying active speakers in an audio conference. Furthermore, using...
IP-based Wireless Sensor Networks (IP-based WSNs) combine IPv6 technology with WSNs to create a global sensor network infrastructure. However, wireless radio access and Internet connectivity make end-to-end security urgently needed by security critical WSN applications. Transport Layer Security (TLS) is considered as a suitable solution to ensure such security. However, the certificate-based mechanism...
Although many studies proved that it was possible to embed application servers on a chip with limited resources, security considerations were generally marginalized. Due to their frontal position, application servers are subject to an increasing number of threats. These vulnerabilities are actually ignored in most cases mainly because of cost constraints. This paper introduces the concept of Secure...
With the repaid development of multi-media and network, information are generated and spread quickly than before. The industry is expected to meet the needs by producing high performance CPU and high-density disk. But dramatic increase in energy requirements becomes a new challenging. Energy and human cost become the major parts of data center. More and more vendor provides efficiency products, such...
Shibboleth, a growing popular solution to Single Sign-On (SSO), can simplify the user's operation process and reduce the resource provider's overhead. The multi-level security of Shibboleth has become a topic of concern. The basic Shibboleth infrastructure was introduced based on the current SSO solutions. Then we summarized the BLP model, which is considered the basic security axiom in our work....
Distributed systems are employed in countless applications such as information systems, robotics, etc. Lack of central control makes the design of such systems a challenging task because of possible unwanted behavior at runtime, commonly known as emergent behavior. Developing a methodology to detect emergent behavior in the pre-implementation stages of the software development life-cycle of distributed...
The Media Switch is an end-to-end total solution deployed in data center, broadband central offices, and customer premises. The Architecture is designed to fit the common WAN network hierarchy with high reliability and scalability. The systems that reside in the data center are Media Asset Management System, Media Acquisition Control System, Subscriber Management System, Billing System, Content Management...
Due to some security issues of varieties of mobile access technologies, we need a new supporting infrastructure that can be able to support more efficient and secure ways to authenticate users and devices arises. To meet this goal, in view of current security issues of mobile terminals, we analyzed the idea of trusted computing, describe the user authentication model of TCG(Trusted Computing Group)...
The primary role of network access control is to decide on the validity of user's identity accepted into the networks and authorization accessed to the particular resource so that users conforming to their established access polices achieve predefined services. This paper presents a specific scenario which supports quality of service (QoS) in network domain. The QoS access rules are based not only...
User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing...
Rich media application enables plenty of interactive, information-rich services to enhance end user's viewing experience. In current standards released for such service, only one rendering space is defined to handle multiple types of content belonging to the same service. However, a new trend is to assign more than one terminal device to render rich media application in a cooperative way inside a...
This paper investigates vehicle health monitoring system (VHMS) on electric wheel truck. VHMS is connected with the control system of the electric wheel truck. It has local real-time system clock, mass size nonvolatile memory, and several interfaces such as Universal Serial Bus (USB), RS-232 and Ethernet for data transmission and download communication. Using General Packet Radio Service (GPRS) module,...
This paper describes a new botnet that we have discovered at the beginning of December 2009. Our Net Flow-based network monitoring system reported an increasing amount of Telnet scanning probes. Tracing back to a source we have identified world wide infected DSL modems and home routers. Nowadays, various vendors use Linux in this kind of devices. A further investigation has shown that most of deployed...
As compared to live peer-to-peer (P2P) streaming, modern P2P video-on-demand (VoD) systems have brought much larger volumes of videos and more interactive controls to the Internet users. As the increase of bitrate of the videos and the full VCR controls of P2P VoD, the behavior “buffering” motivates us to design different schedule and service strategies for peers, to improve the playback performance,...
Network coding is known to provide increased throughput and reduced delay for communications over networks. In this paper we propose a peer-to-peer video streaming system that exploits network coding in order to achieve low start-up delay, high streaming rate, and high resiliency to peers' dynamics. In particular, we introduce the concept of random multicast trees as overlay topology. This topology...
This paper discusses stream media application server from stripe size, RAID algorithm and block size. According to the characteristics, we design and set up stream media application server which has excellent performance.
Monitoring large chunks of unused IP address space yields interesting observations and useful results. However, the volume and diversity of the collected data makes the extraction of information a challenging task. Additionally, the maintenance of the monitoring infrastructure is another demanding and time-consuming effort. To overcome these problems, we present several visualization techniques that...
According to the low efficiency of system testing, the longer test cycle, the single form of the test results, no standardized documents of tested results and other drawbacks of the traditional penetration testing system, this paper design and implement of an XML-based penetration testing system. The system uses SNMP, PING, Telnet and other ways to explore resource, is based on OVAL, CVE to assess...
We consider small cell networks and study the impact of user mobility. Assuming Poisson call arrivals at random positions with random velocities, we discuss the characterization of handovers at the boundaries. We derive explicit expressions for call block and call drop probabilities using tools from spatial queuing theory. We also derive expressions for the average virtual server held up time. These...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.