Inter-domain Alliance Authentication Protocol Based on Blind Signature

Size: px
Start display at page:

Download "Inter-domain Alliance Authentication Protocol Based on Blind Signature"

Transcription

1 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) htt://ddoorg/04257/sa Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan Yu-an 2 Insttute of Comuter Communcaton Engneerng Zhengzhou Unversty of Lght Industry Zhengzhou Chna 2 School of Comuter Scence Technology Beng Insttute of Technology Beng 0008 Chna zhangqkun04@63com Abstract In large dstrbuted networks many comuters must be mutual coordnaton to comlete some works under the certan condtons these comuters may come from dfferent domans For ensurng secure cross domans to access resources among these comuters n dfferent domans ths aer rooses a mult-doman unon authentcaton rotocol The rotocol adots blnd sgnature to acheve mutual authentcaton among enttes n dfferent domans Ths scheme overcomes the comlety of certfcate transmsson the network bottlenecks n the scheme of PKI-based It can trace the entty dentty suorts two-way enttes anonymous authentcaton whch avod the authorty counterfetng ts member to access other doman s resources Analyss shows that ts advantages on securty communcaton-consumton Keywords: Inter-doman authentcaton; blnd sgnature; blnear grou Introducton Mult-doman allance authentcaton s needed n large networks whch servces access onts are located n multle domans In a dstrbuted network envronment where comanes nsttutons have ther own sharng resource n order to revent unauthorzed users to access these shared resources every nsttuton wll set u local certfcaton servce equment to rovde certfcaton servces when users access resources Therefore a relatvely ndeendent trust doman s formed n every nsttuton the users that n a doman trust ther certfcaton center the certfcaton center rovdes convenent authentcaton servce for local users to access shared resources However n the case of n a large number of dem servces such as the dems of cloud comutng users need anytme anywhere to access resources In ths case a sngle doman s unable to meet the needs of resource requests therefore t s need many domans mutual cooeraton to acheve ths requests For ths the requests of shared resource are not only from the nternal members of the doman but also from the other domans When the foregn enttes access to the resources n local doman there nvolve the scheme of mult-doman authentcaton The alcatons of cross-doman authentcaton n many felds such as the authentcaton among multle heterogeneous domans wthn a vrtual organzaton under the grd cloud comutng envronment [-2] the roamng access authentcaton under the envronment of wreless network etc[3-4] There are manly two cross-doman authentcaton frameworks under secfc envronments: one s authentcaton framework (such as Kerberos)[5-6]based on the symmetrc key system Ths scheme relates to the comlety of symmetrc key management key consultatons cannot deal wth the anonymous roblem effectvely The other s authentcaton framework based on ISSN: IJSIA Coyrght c 205 SERSC

2 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) tradtonal [7-9] The management of credentals under ublc key crytograhy s a heavy burden n ths scheme; secfcally the consumtons s caused by the constructon of credental aths the query of the status of credentals transfer of credentals It can also cause the network bottleneck of authentcaton center when under frequent crossdoman accesses References[0-2] roosed an dentty-based mult-doman authentcaton model whch s based on the trust of the authorty of the other sde t requres the key agreement arameters of all domans to be same ths have lmtatons t could not avod the authorty fakng members n ts doman to cross-doman access resources Reference [3-4] adot sgncryton to mlement the authentcaton when users access resource each other wthn the same doman t s confned to a sngle doman so t s dffcult to meet the needs of large-scale dstrbuted comutng Reference [6] etends the scheme of reference [5] make t to enable the members from the dfference domans to authentcate each other but the recondton of ths soluton s the hyothess that PKG of every doman s honest PKG ossesses the rvate keys of all the members wthn ts doman f PKG s malcous the truth dentty of user the confdental of rvate key could not be guaranteed The mult-doman authentcaton allance rotocol roosed n ths aer s desgned based on nter-doman sgnature n whch each nter-doman authentcaton centers do not have to set the same arameters for ther keys the members n a doman regster ther denttes wth blnd keys other than ther rvate keys to avod the authentcaton center fakng cheatng hs members to access resource from other domans At the same tme t has good anonymty t can trace enttes when there occurred dsute between two enttes for accessng resources t has a good defense for varous rotocol attacks mult-doman authentcaton rotocol urosed n the aer can acheve the features as follows: Correctness: a legal user n a doman can be vald verfed by all the users when they comute the authentcaton algorthm of the Cross-doman authentcaton rotocol Unforgeablty: t s nfeasble that a faked member generates an algorthm to ass a vald authentcaton by comutng even f the member s a server of a doman Anonymty: ecet the server of the doman t should be nfeasble that anyone determne the dentty of a rover by comutng Traceablty: the KMC of the doman can determne the dentty of any rover wthn ts doman Ant-attack: Cross-doman authentcaton rotocol should have etensve securty rovably secure Organzaton The rest of aer s organzed as follows: In Secton 2 we ntroduce the relatve knowledge of ths aer In Secton3 we defne the system model In Secton4 we roose the mult-doman sgnature scheme Then we resent mult-doman authentcaton rotocol based on mult-doman sgnature n Secton 5 We rovde securty analyss further analyze the eerment results erformance n Secton6 Fnally we conclude the aer n Secton 7 2 Prelmnares 2 Blnear Grou Frstly we gve the defnton of blnear ma assumng that G G2 G T are k multlcatve grous wth same rme order 2 k s the securty arameter let G g be generated by g G 2 g 2 be generated by g 2 the soluton of 98 Coyrght c 205 SERSC

3 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) dscrete logarthm over the e G G G : 2 T Blnear: For all the G G 2 G T has the followng roertes: u G v G 2 s hard e a b Z then s a comutable mang e( u v ) e( u v) e( u v) e( u v) a b ab 2 Non-degeneracy: There estsu G v G2 such that 3 Comutable: There s an effcent algorthm to comute for allu G v G2 Corollary: for all the u G u2 G v G2 then e( uu 2 v) e( u v) e( u2 v) Corollary2: for all the u v G2 then 22 Ga Dffe-Hellman grou We frst ntroduce the followng roblems n e( ( u) v) e( u ( v)) G G 2 [7] Defnton Dscrete Logarthm Problem (DLP): f gven u u v n v to fnd Defnton 2 Comutaton Dffe-Hellman Problem (CDHP): Gven a b Z n Z from ( g g g ) G a b ab for to comute g Defnton 3 Blnear Inverse Dffe-Hellman Problem (BIDHP):The BIDH roblem s gven g ag cg for some a c Z to comut a e( g g ) c Defnton 4 Modfed Blnear Inverse Dffe-Hellman Problem (MBIDHP): The BIDH roblem s gven g ag bg 23 Mult-Lnear Mang cg for some a b c Z to comute c a b e( g g ) Mult-lnear Dffe-hellman hyothess: Frstly gven the defnton of mult-lnear mang [2] Suose that the dscrete logarthm roblem of s hard Defnton 5: Let mang roertes: G m e: G G T G T s called m mult-lnearty: For any of e a g a g a g e g g g G G 2 be two grous of the same rme order The mult-lnear mang f t satsfes the followng a a2 a m Z aa 2 am ( 2 2 m m) ( 2 m) 2 Non-degeneracy: If g G s a generator of generator of G T any of g g2 gm G G then e ( g g g) there s s also a 3 Comutablty: For all u u2 um G there ets a effcent way to calculate e( u u2 u m) Defnton 6: Decsonal mult-lnear Dffe-Hellman(DMDH) roblem s that gven t s to determne f there g a g a g a m g G 2 ( ) m z e g g g aa 2 a s z G T Defnton 7: Hyothess of decsonal mult-lnear dffe-hellman s that solvng decsonal mult-lnear dffe-hellman roblem s dffcult That s to say that there cannot be a robablty olynomal tme algorthm whch can solve Dffe-Hellman roblem Coyrght c 205 SERSC 99

4 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) G G 2 are GDH grous f DDHP can be solved n olynomal tme but no We call olynomal tme an algorthm can solve CDHP DLP or BIDHP wth non-neglgble advantage wthn olynomal tme 3 The Mult-Doman Authentcaton Model In mult-doman authentcaton system the tye of authentcaton s chosen for each doman by them dems wthout need a unfed authentcaton model And nter-doman authentcaton should try to adot a common authentcaton way to acheve mult-doman access nteroerablty Ths mult-doman authentcaton system model s desgned n Fgure Allance Doman KMCA KMCB KMCC KMCA KMCB u un u un Doman A KMCC Doman B u u2 u3 Doman C Fgure Mult-Doman Authentcaton System Model In ths model the system s comosed by multle domans each doman s ndeendent autonomous Each doman conssts of a KMC (key management center) a number of members wthn the doman the doman authorty center are smlar to tradtonal CA (Certfcate Authorty) Every member n a doman not only rovdes ts resources for others but also access resources from others they consttute the resource allance In the case of collaboratve comutng the members of mutual cooeraton are not only from a doman but also from other domans for these members n each doman may need to cross-doman cooeraton KMC dstrbutes manages some keys of ther members wthn ts doman oen the ublc key of KMC n order to mutual vsts certfcaton When members on n a doman they need to regster wth ther true denttes for entty trackng 4 Mult-Doman Blnd Sgnature Scheme Suose generator of n e: G G T G G G 2 are multlcatve grous wth the same rme order e: G G G 2 g s a s an effcently comutable blnear mang s an effcently comutable mult-lnear mang h :{0} Z are hash functon h G Z : 0 T 200 Coyrght c 205 SERSC

5 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 4 Allance Doman Key Agreement Suose there have n domans n the allance system all the doman negotate a ar of allance ublc/rvate keys Frstly each ( n) selects a numbers calculates g KMC then broadcasts to other KMC ( ) Z KMC ( n ) n romly n each Accordng to mult-lnear mang each KMC can comutes a ar of allance ublc/rvate keys The rocesses are as the follows: Each calculates the allance rvate wth the arameters g KMC 42 Blnd Sgnature Suose KMC s s sa ( n ) that sends by other numbers KMC KMC s the key management center of doman the ublc key s P g s where s Z D All the network system negotated allance ublc/rvate key ar s( member s y g u s rvate key s ID Z s the dentty of u u n the doman D the rvate key of sa The blnd sgnature s as follows: t Z KMC n the allance Pa ) Suose each the corresondng ublc key () Each KMC selects a numbers romly comutes then sent to all the members n ts doman (2) Each member of the doman receved the calculates the value then sent ( ) to ts (3) The value R s correct then KMC (4) ths way KMC t KMC ID KMC receved each member u then verfes the whether value can ensure that can regster wth KMC sends R to R s sent by sent messages u as regster key ( ID ) e( R a)? e( y P ) KAC y g t s sa calculates the s equaton If t s unque wthn that doman R y ID store ( ) for trackng u as the regster key All members of each doman regster n 5 Mult-Doman Authentcaton Protocol based on Blnd Sgnature In the multle domans networks to ensure secure access resource cross dfferent domans members from dfferent domans need to be authentcated each other In ths secton urosed a mult-doman allance authentcaton rotocol based on short sgnature whch enables drect authentcaton between members does not need the tcket transfer through the authentcaton center Let be two domans n the allance-doman resectvely the KMC are key management centers of resectvely The ublc/rvate key ar of KMC s ublc/rvate D 2 key ar of s ( s P) 2 2 KMC 2 D D 2 ( s P) the ublc/rvate key ar of allance-doman that all the KMC ( n) negotated s (sa Pa ) Suose u v are nternal members of D D 2 resectvely s the rvate key of u R s the regster key of u D Coyrght c 205 SERSC 20

6 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) y v g s the ublc key of y g u s the rvate key of v v R s the regster key of s the ublc key of When u want to access resource from the rocess of mult-doman authentcaton sesson key agreement are descrbed as follows: () u n doman D calculates ( sgn P R y ) to verfer v sgn y sgn P R y (2) after recevng the messages ( ) ver ( sgn ) KAC sends the ublc nformaton v wth ts rvate key v to calculates verfes whether ver y then verfes P s a ublc key of n the allance-doman whether doman D by whether the eressons (3) If by u ver ( sgn ) u y s a ublc key of a member that belongs to e( R a)? e( y P) e( R a) e( y P) s a member n the doman D then ublc nformaton ( sgn P R y ) to verfer u (4) after recevng the messages ( ) sgn P R ver ( sgn ) verfes whether key of KAC y ver y n the allance-doman whether belongs to doman D 2 by whether the eressons v v then s satsfacton can ensure ( sgn P R y ) are sent calculates sgn y u wth ts rvate key y u verfes whether sends the P to calculates s a ublc s a ublc key of a member that e( R Pa)? e( y P ) s satsfacton If v ver ( sgn ) v e( R Pa) e( y P ) u can ensure ( sgn P R y ) are sent by s a member n the doman system are successful 6 Performance Analyss 6 Correctness Analyss D 2 The cross authentcaton n the mult-doman In ths aer the mult-doman allance authentcaton rotocol s establshed based on blnd sgnature In order to ensure the safe authentcaton when the domans access resources each other the correctness of the sgnature must be ensured for frst tme: Theory : Each legal member n the doman can be authentcated successfully s Proof: snce g sa the roertes of the blnear arngs we have e( R Pa) e( g Pa)) e g s sa s sa sa) ( g ) e( g g ) e( g g ) s e( y P) Snce sgn s y we have u wth a legal regster key R D 202 Coyrght c 205 SERSC

7 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) ver ( sgn ) ( y ) ( y ) ( g ) y Thus the equaton e( R Pa) e( y P) ver y 62 Securty Analyss () Unforgeablty Any member allance-doman can not fake any other member Theory 2: any members u ( k) u k to access resource Proof: Assume that any member the resource from the member key u ' of u to send e( R a) e( y P) but s not ublshed even f ( sgn ' P R y ) u k do not know the rvate key be fal when v verfes u ' that s out of the allance-doman or n the u that n the domans u k v u k v n the doman to to acheve resource access D D wthn another doman ths can only rove that ver y ofu cannot forge other member fakes another member D can fake the dentty of member After recevng the messages u ' u to access Because the rvate u wth dentty v s a member n the doman therefore the verfcaton sgnature of verfes Therefore members that n the domans D cannot forge other member to access resource (2) Anonymty Proosed rotocol has the anonymty When two members access resources any member can only determne another member s a sole member n a certan doman but the dentty of the member can not be determned Theory3: When there two members access resources mutually can only determne that member u u u k s a sole member of a certan doman cannot be determned only hs u u v KMC the member through regstered dentty Proof: ) User u sends ublc nformaton ( ) whch doman by verfyng the equaton wth the ublc key v P u sgn P R y D e( R a) e( y P) n ths doman wth the ublc key v but the dentty can determne the dentty u ' D wll u ( k) ID of the ID of tov v determnes u from y u n the doman that 2) can only determne u s a sole member n the doman wth the ublc key y t can not be faked by others through verfcaton whether e( R a) e( y P) ver ybut does not know the dentty 63 Traceablty ID of the member u The tradtonal method to desgn a cross multle domans authentcaton rotocol based on trust scheme t s mractcal to let members to trust the KMC that s from dfferent domans Ths aer rovdes a relable certfcaton to trace llegal entty when the dsutes are occurred The traceablty s accordng to the verfer v to verfy the Coyrght c 205 SERSC 203

8 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) eresson e( R a) e( y P) then sends the messages ( ) to entty ensure the relatonsh among sgn P R y KMC R y ID u by the regstraton nformaton ( ) 7 Consumton Analyses KMC KMC n sgn P R y further to trace the dentty of Comutaton communcaton comlety are two mortant ndcators for evaluatng the erformance of rotocols The aer analyzed the latest research also comared the mult-doman authentcaton rotocol roosed n ths aer wth the latest research rograms n terms of comutaton comlety communcaton overhead We comared our scheme wth the lterature [8-9] n comutatonal comlety as shown n Table These several rograms are elltc curve ublc key crytosystem It s known that 024-bt keys n conventonal crytosystems offer the same level of securty as 60- bt keys n elltc curve crytograhy In artcular n the case of elltc curves we can assume that the echanged messages have sze only 60 bts snce only the coordnate s necessary for the comutaton of the ont ( y) We assume that the length of each communcaton unt s ml = 60 bts n these rograms Table Comlety Analyss of Cross-Doman Authentcated Protocols authentcated rotocols Number of eonentatons Number of arngs Number of scalar multlcatons Number of hash lterature ml [8] lterature ml [9] Ours scheme ml Number of sent And receved messages For more ntutve analyss of the energy consumton n each scheme the lterature [20] rovded a eerment that on a 33MHZ "Strong ARM" of mcrorocessor to erform a modular eonentaton arthmetc need to consume 9 mj to ure scalar multlcatons need to consume 88 mj To erform a Tate Parng comutaton need to consume 470 mj It uses a 00kbs transcever module to transmt a bt of nformaton need to consume 08 µj receve a bt of nformaton need to consume 75µJ as shown n Table 2 We assume that the energy consumton of hash calculaton s neglgble The total energy consumton comarson of these three rograms s shown n Fgure Table 2 Energy Costs for Comutaton Communcaton Comutaton cost of Modular Eonentaton 9 mj Comutaton cost of Scalar Multlcaton 88 mj Comutaton cost of Tate Parng 470 mj Communcaton cost for transmttng a bt 08 Communcaton cost for recevng a bt 75 DSA Sgnature 9 mj ECDSA Sgnature 88 mj DSA sgnature verfcaton mj ECDSA sgnature verfcaton 09 mj mj mj 204 Coyrght c 205 SERSC

9 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) The energy consumton s shown n Fgure the scheme of lterature[8] s the most n energy consumton ours s the mnmum n energy consumton the advantage of ours scheme s that any two enttes can mutual authentcate do key agreement drectly so t needn t the thrd-arty to take art n The cross-doman authentcaton scheme n lterature [8] lterature [9] when an entty wants to access resources from another entty n dfferent doman t must be checked by the thrd-arty so t s very comle Fgure Energy Consumton Analyss shows that ths rotocol s correct can defense attack effectvely s not to need to know the dentty of each other whch can acheve the effectve authentcaton good anonymous The entty can be tracked when there have dsute occurs The comutaton communcaton overhead s relatvely low It has a good securty 8 Concluson Mult-doman allance authentcaton s requred for securty n mult-doman network envronment The scheme of mult-doman allance authentcaton urosed n ths artcle can ensure the securty whle share the resource among multle domans The anonymty can rotect the rvacy of each entty each entty can access dfferent domans resources needless the nterventon of the key management center whch rovdes good fleblty It can avod the bottleneck roblem the comlety of the transfer tckets of the tradtonal attern based on PKI t can trace the enttes suorts two-way enttes anonymous authentcaton whch avod the doman certfcate authorty counterfetng ts member to access cross-doman resources Analyses show that ts advantages on securty communcaton-consumton Acknowledgements Ths work s suorted by Natonal Natural Scence Foundaton of Chna under Grant No ( ) the PhD Research Fund of the Zhengzhou Unversty of Lght Industry the Scence Technology Plan of Zhengzhou(No 3PPTGG4-5) the Scence Technque Research Program of Henan Educatonal Commttee (No 5A A520022) Natonal Hgh-tech R&D Program of Chna (863 Program) (Grant No 203AA0A22) Vol30 References Coyrght c 205 SERSC 205

10 Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) [] R Butler V Welch D Engert I Foster S Tuecke J Volmer C Kesselman A Natonal-Scale Authentcaton Infrastructure [J]IEEE Comuter(2000) Vol 33No [2] Z Qkun LYuanzhang S DaneT Yuan Allance-Authentcaton Protocol n Clouds Comutng Envronment Chna Communcatons(202) No [3] Q ZhangY Tan L Zhang R Wang A Combned Key Management Scheme nwreless Sensor Networks SENSOR LETTERS(20) Vol 9 No [4] J-S Lee C-C Chang P-Y Chang Chn-Chen Chang Anonymous authentcaton scheme for wreless communcatons Internatonal Journal of Moble Communcatons (2007) [5] Lv Chao L Hu M Janfeng N Ben Vulnerablty Analyss of Elltc Curve-Based RFID Protocol[J] Chna Communcatons(20) Vol 8 No [6] J Tang S Lu Z Gu C Lu J-L Gaudot Prefetchng n Moble Embedded System Can be Energy Effcent[J] IEEE Comuter Archtecture Letters (20) Vol 0 No 8- [7] P Hua An dentty-based authentcaton model for mult-moman[j] Chnese Journal of Comuters(2006) Vol 29 No [8] L Chen K HarrsonD SolderaN Smart Alcatons of multle trust authortes n arng based crytosystems[a]in Proceedngs of Infrastructure Securty[C]Berln: Srnger-Verlag(2002) [9] N McCullagh Paulo S L M Barreto A new two-arty dentty-based authentcated key agreement[ol] htt://cteseerst su edu/vewdoc/download? do= &re= re&tye=df [0] J Malone-Lee Identty-based sgncryton [OL] htt://erntacrorg/2002/098df [] L Xaomng Feng Dengguo An dentty-ba sed authentcaton model formult-doma n grds[j] Chnese Journal of Electroncs(2006) Vol 34 No [2] Z Longun Xa Ang Cross-doman authentcaton rotocol based on certfcate sgncryton n Iv6 Network[J] Internatonal Journal of Advancements n Comutng Technology(202) Vol 4 No234-4 [3] Boneh D Frankln M Identty based encryton from the Wel arng [J] SIAM Journal on Comutng(2003) Vol 32 No [4] W Zhang H ZhangB Zhang Yan Yang An Identty-Based Authentcaton Model for Mult-doman n Grd Envronment[C] Comuter Scence Software Engneerng(2008) No [5] L Xaomng F Dengguo An dentty-based authentcaton model for mult-doman grds [J] Chnese Journal of Electroncs(2006) Vol 34 No [6] C Lqun; L Hoon We; Y Guomn Cross-doman assword-based authentcated key echange revsted[j] ACM Transactons on Informaton System Securty(204) Vol [7] Q-k Zhang Y-A Tan Y-Z L X-La Zhang Cross-doman Allance Authentcaton Scheme Based on Blnear Grou Aled Mathematcs & Informaton Scences(204) Vol 8 No [8] L Xaomng F Dengguo An dentty-ba sed authentcaton model formult-doma n grds[j] Chnese Journal of Electroncs(2006) Vol 34 No [9] H Shen-Gang; Z L; Muhammad Ghulam A unon authentcaton rotocol of cross-doman based on blnear arng [J] Journal of Software(203) Vol 8 No [20] E Makr E Konstantnou Constant round grou key agreement rotocols: A comaratve study[j] comuters securty(20) No Authors Zhang Je assocate rofessor PhD Zhengzhou Unversty of Lght Industry Zhengzhou Chna Hs research nterests nclude nformaton securty crytograhy Zhang Qkun PhD Zhengzhou Unversty of Lght Industry Zhengzhou Chna Hs research nterests nclude nformaton securty crytograhy 206 Coyrght c 205 SERSC

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge and

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Evaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling

Evaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling MultCraft Internatonal Journal of Engneerng, Scence and Technology Vol, o, 9, -4 ITERATIOAL JOURAL OF EGIEERIG, SCIECE AD TECHOLOGY wwwest-ngcom 9 MultCraft Lmted All rghts reserved Evaluaton of the nformaton

More information

Chapter 3: Dual-bandwidth Data Path and BOCP Design

Chapter 3: Dual-bandwidth Data Path and BOCP Design Chater 3: Dual-bandwdth Data Path and BOCP Desgn 3. Introducton The focus of ths thess s on the 4G wreless moble Internet networks to rovde data servces wthn the overlang areas of CDA2000-WLA networks.

More information

A Structure Preserving Database Encryption Scheme

A Structure Preserving Database Encryption Scheme A Structure Preservng Database Encryton Scheme Yuval Elovc, Ronen Wasenberg, Erez Shmuel, Ehud Gudes Ben-Guron Unversty of the Negev, Faculty of Engneerng, Deartment of Informaton Systems Engneerng, Postfach

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

A New Technique for Vehicle Tracking on the Assumption of Stratospheric Platforms. Department of Civil Engineering, University of Tokyo **

A New Technique for Vehicle Tracking on the Assumption of Stratospheric Platforms. Department of Civil Engineering, University of Tokyo ** Fuse, Taash A New Technque for Vehcle Tracng on the Assumton of Stratosherc Platforms Taash FUSE * and Ehan SHIMIZU ** * Deartment of Cvl Engneerng, Unversty of Toyo ** Professor, Deartment of Cvl Engneerng,

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

ADOPTION OF BIG DATA ANALYTICS IN HEALTHCARE: THE EFFICIENCY AND PRIVACY

ADOPTION OF BIG DATA ANALYTICS IN HEALTHCARE: THE EFFICIENCY AND PRIVACY ADOPTION OF BIG DATA ANALYTICS IN HEALTHCARE: THE EFFICIENCY AND PRIVACY He L, School of Economc Informaton Engneerng, Southwestern Unversty of Fnance and Economcs, Chengdu, Chna, olverlhe@gmalcom Jng

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Cross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing

Cross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing Internatonal Journal of Securty and Its Applcatons, pp.343-352 http://dx.do.org/10.14257/sa.2015.9.12.33 Cross-Doman Authorzaton Management Model for Mult- Levels Hybrd Cloud Computng L Na 1, Dong Yun-We

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS

PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS Software Analye PERFORMANCE ANALYSIS OF PARALLEL ALGORIHMS Felcan ALECU PhD, Unverty Lecturer, Economc Informatc Deartment, Academy of Economc Stude, Bucharet, Romana E-mal: alecu.felcan@e.ae.ro Abtract:

More information

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability nformaton Artcle Effcent Dynamc Integrty Verfcaton for Bg Data Supportng Users Revocablty Xnpeng Zhang 1,2, *, Chunxang Xu 1, Xaojun Zhang 1, Tazong Gu 2, Zh Geng 2 and Guopng Lu 2 1 School of Computer

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks

A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks A Comrehensve Analyss of Bandwdth Reuest Mechansms n IEEE 802.6 Networks Davd Chuck, Kuan-Yu Chen and J. Morrs Chang Deartment of Electrcal and Comuter Engneerng Iowa State Unversty, Ames, Iowa 500, USA

More information

A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving

A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving A Novel Mult-factor Authentcated Key Exchange Scheme Wth Prvacy Preservng Dexn Yang Guangzhou Cty Polytechnc Guangzhou, Chna, 510405 yangdexn@21cn.com Bo Yang South Chna Agrcultural Unversty Guangzhou,

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Global innovative solutions You can rely on. www.calyon.com

Global innovative solutions You can rely on. www.calyon.com Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons

More information

Performance Management and Evaluation Research to University Students

Performance Management and Evaluation Research to University Students 631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton

More information

ThresPassport A Distributed Single Sign-On Service

ThresPassport A Distributed Single Sign-On Service ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna chenteru@software.ct.ac.cn, cqx@ct.ac.cn

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM

A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM 1 WEIZHI LIAO, 2 LINFU SUN 1 School of Electromechancal Engneerng, UESTC of Chna, Chengdu 610054, Chna 2 CAD Engneerng Center, Southwest JIAOTONG

More information

Dynamic Load Balancing of Parallel Computational Iterative Routines on Platforms with Memory Heterogeneity

Dynamic Load Balancing of Parallel Computational Iterative Routines on Platforms with Memory Heterogeneity Dynamc Load Balancng of Parallel Comutatonal Iteratve Routnes on Platforms wth Memory Heterogenety Davd Clare, Alexey Lastovetsy, Vladmr Rychov School of Comuter Scence and Informatcs, Unversty College

More information

Research Article Competition and Integration in Closed-Loop Supply Chain Network with Variational Inequality

Research Article Competition and Integration in Closed-Loop Supply Chain Network with Variational Inequality Hndaw Publshng Cororaton Mathematcal Problems n Engneerng Volume 2012, Artcle ID 524809, 21 ages do:10.1155/2012/524809 Research Artcle Cometton and Integraton n Closed-Loo Suly Chan Network wth Varatonal

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

The Pricing Strategy of the Manufacturer with Dual Channel under Multiple Competitions

The Pricing Strategy of the Manufacturer with Dual Channel under Multiple Competitions Internatonal Journal of u-and e-servce, Scence and Technology Vol.7, No.4 (04), pp.3-4 http://dx.do.org/0.457/junnesst.04.7.4. The Prcng Strategy of the Manufacturer wth Dual Channel under Multple Compettons

More information

Applied Research Laboratory. Decision Theory and Receiver Design

Applied Research Laboratory. Decision Theory and Receiver Design Decson Theor and Recever Desgn Sgnal Detecton and Performance Estmaton Sgnal Processor Decde Sgnal s resent or Sgnal s not resent Nose Nose Sgnal? Problem: How should receved sgnals be rocessed n order

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS PI. M. Yaghoubi Waskasi MYaghoubi@ece.ut.ac.ir. M. J. Yazdanpanah Yazdan@ut.ac.

A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS PI. M. Yaghoubi Waskasi MYaghoubi@ece.ut.ac.ir. M. J. Yazdanpanah Yazdan@ut.ac. A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS M. Yaghoub Waskas MYaghoub@ece.ut.ac.r M. J. Yazdananah Yazdan@ut.ac.r N. Yazdan Yazdan@ut.ac.r Control and Intellgent Processng Center

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Load Balancing of Parallelized Information Filters

Load Balancing of Parallelized Information Filters IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. XXX, NO. XX, XXXXXXX 2001 1 Load Balancng of Parallelzed Informaton Flters Nel C. Rowe, Member, IEEE Comuter Socety, and Amr Zaky, Member, IEEE

More information

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols

More information

A new anonymity-based protocol preserving privacy based cloud environment

A new anonymity-based protocol preserving privacy based cloud environment Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

A Prediction System Based on Fuzzy Logic

A Prediction System Based on Fuzzy Logic Proceedngs of the World Congress on Engneerng and Comuter Scence 2008 WCECS 2008, October 22-24, 2008, San Francsco, USA A Predcton System Based on Fuzzy Logc Vadeh.V,Monca.S, Mohamed Shek Safeer.S, Deeka.M

More information

Erasure Codes-based Storage-aware Protocol for Preserving Cloud Data under Correlation Failures

Erasure Codes-based Storage-aware Protocol for Preserving Cloud Data under Correlation Failures Internatonal Journal of Grd Dstrbuton Computng, pp.5-26 http://dx.do.org/0.4257/gdc.205.8.2. Erasure Codes-based Storage-aware Protocol for Preservng Cloud Data under Correlaton Falures Zhqang Ruan and

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Analysis and Modeling of Buck Converter in Discontinuous-Output-Inductor-Current Mode Operation *

Analysis and Modeling of Buck Converter in Discontinuous-Output-Inductor-Current Mode Operation * Energy and Power Engneerng, 3, 5, 85-856 do:.436/ee.3.54b63 Publshed Onlne July 3 (htt://www.scr.org/journal/ee) Analyss and Modelng of Buck Converter n Dscontnuous-Outut-Inductor-Current Mode Oeraton

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

JCM_VN_AM003_ver01.0 Sectoral scope: 03

JCM_VN_AM003_ver01.0 Sectoral scope: 03 Sectoral scoe: 03 Jont Credtng Mechansm Aroved Methodology VN_AM003 Imrovng the energy effcency of commercal buldngs by utlzaton of hgh effcency equment A. Ttle of the methodology Imrovng the energy effcency

More information

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer

More information

Auditing Cloud Service Level Agreement on VM CPU Speed

Auditing Cloud Service Level Agreement on VM CPU Speed Audtng Cloud Servce Level Agreement on VM CPU Speed Ryan Houlhan, aojang Du, Chu C. Tan, Je Wu Department of Computer and Informaton Scences Temple Unversty Phladelpha, PA 19122, USA Emal: {ryan.houlhan,

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Optimal maintenance of a production-inventory system with continuous repair times and idle periods

Optimal maintenance of a production-inventory system with continuous repair times and idle periods Proceedngs o the 3 Internatonal Conerence on Aled Mathematcs and Comutatonal Methods Otmal mantenance o a roducton-nventory system wth contnuous rear tmes and dle erods T. D. Dmtrakos* Deartment o Mathematcs

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

A Generalized Temporal and Spatial Role-Based Access Control Model

A Generalized Temporal and Spatial Role-Based Access Control Model 92 JOURNAL OF NETWORKS, VOL. 5, NO. 8, AUGUST 200 A Generalzed Temporal Spatal Role-Based Access Control Model + Natonal Central Polce Unverst/ Depart. of Informaton Management, Taouan, Tawan E-mal: swang@mal.cpu.edu.tw

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

A High-confidence Cyber-Physical Alarm System: Design and Implementation

A High-confidence Cyber-Physical Alarm System: Design and Implementation A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Monitoring Network Traffic to Detect Stepping-Stone Intrusion

Monitoring Network Traffic to Detect Stepping-Stone Intrusion Montorng etork Traffc to Detect Steng-Stone Intruson Janhua Yang, Byong Lee, Stehen S. H. Huang Deartment of Math and Comuter Scence, Bennett College E-mal: {jhyang, blee }@bennett.edu Deartment of Comuter

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Ants Can Schedule Software Projects

Ants Can Schedule Software Projects Ants Can Schedule Software Proects Broderck Crawford 1,2, Rcardo Soto 1,3, Frankln Johnson 4, and Erc Monfroy 5 1 Pontfca Unversdad Católca de Valparaíso, Chle FrstName.Name@ucv.cl 2 Unversdad Fns Terrae,

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Keywords: Tourism, Mobile Learning, Quality Management, Security

Keywords: Tourism, Mobile Learning, Quality Management, Security M-TOURIM EDUCATION FOR FUTURE QUALITY MANAGEMENT ABTRACT Ion Ivan 1 Aln Zamfrou 2 Toursm s the man ncome source of revenue n GDP n many countres. For 2012 the relatve contrbuton of toursm n GDP n Croata

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Joint Dynamic Radio Resource Allocation and Mobility Load Balancing in 3GPP LTE Multi-Cell Network

Joint Dynamic Radio Resource Allocation and Mobility Load Balancing in 3GPP LTE Multi-Cell Network 288 FENG LI, LINA GENG, SHIHUA ZHU, JOINT DYNAMIC RADIO RESOURCE ALLOCATION AND MOBILITY LOAD BALANCING Jont Dynamc Rado Resource Allocaton and Moblty Load Balancng n 3GPP LTE Mult-Cell Networ Feng LI,

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

3C-Auth: A New Scheme for Enhancing Security

3C-Auth: A New Scheme for Enhancing Security Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan

More information