Scalable and Secure Architecture for Digital Content Distribution

Size: px
Start display at page:

Download "Scalable and Secure Architecture for Digital Content Distribution"

Transcription

1 Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel Romana 2 V. Parvan Ave., Tmsoara, ROMANIA 9 Gh. Lazar Ave., Tmsoara, ROMANIA vbocan@dataman.ro mha.fagadar@alcatel.ro Abstract: Ths paper descrbes a scalable and secure archtecture for dgtal content dstrbuton. Our archtecture enables secure cooperaton between content provders whch share dstrbuton rghts, allowng a greater flexblty n realworld scenaros. Furthermore, the new archtecture s hghly scalable as t enables content provders to smultaneously servce several clents who request the same content. Index Terms scalable DRM, dgtal content, dstrbuton, redstrbuton, secure broadcast, cryptography, secret splttng. I. INTRODUCTION Dgtal content dstrbuton has become a wdely dscussed topc n the past years, due to the ncreasng popularty of the Internet and of the personal devces capable of playng dgtal multmeda content. More and more provders offer ther customers the possblty to access, for a fee, large on-lne databases of multmeda content whch they can download on ther personal devces. Due to ntegraton of technologes lke Bluetooth or W- F, personal devces have become capable of sharng nformaton among them n a pont-to-pont manner. Ths has opened the way to dgtal content redstrbuton, a process whch generates revenue loss by excludng the content provder from the data transfer. To preserve the dgtal content from llegal copyng and unauthorzed dstrbuton and to ensure that copyrght laws are respected, content provders have searched for new ways of mplementng secure dstrbuton systems, based on Dgtal Rghts Management (DRM) polces. The greatest challenge posed to such a system s to ensure that these polces are effectve even after the customer came nto the possesson of the dgtal content, especally when he attempts to redstrbute t to another user. The current approach to the above-mentoned problem has been to ntroduce the noton of complant devces, whch, by ther desgn, guarantee to respect the DRM polces assocated wth the multmeda content they are playng. For example, a complant devce wll refuse to share ts contents wth a non-complant devce, or to redstrbute the multmeda content to another complant devce f the assocated DRM polcy forbds t to do so. Systems whch allow dgtal content redstrbuton by enforcng the DRM polces at clent level on peer-to-peer networks have already been proposed [1]. However, they are not scalable, and present a vulnerablty to DoS attacks, whch may render them noperable. These systems also rely on the fact that each content provder has all the necessary rghts to dstrbute the multmeda content to ts customers, whch may not always be true n real stuatons. Such rghts may be dstrbuted among several content provders. In the present paper we propose a scalable dgtal content dstrbuton system, whch reles on secure broadcast for dstrbutng the dgtal content to several clents smultaneously. Thus the sever load s decreased consderably, whle mantanng the same degree of securty as n normal pont-to-pont connectons. We also propose a mechansm to remove the lmtaton of a sngle content provder whch has all the rghts over the dgtal content. In our archtecture, for a dgtal content, there may be several content provders whch share the dstrbuton rghts over that content, and a common consent s requred to dstrbute t. The paper s organzed n sx sectons, as follows. In Secton II we present the system archtecture and the partes nvolved n the dgtal content dstrbuton and redstrbuton. Secton III focuses on the cryptographc technques used to secure the communcaton between the system components. Secton IV descrbes the scalable dstrbuton of dgtal content n both cases: provder to clent and clent to clent, and how the technques presented n Secton III apply to our partcular case. Secton V analyzes the possble threats to ths system and fnally, Secton VI presents the advantages of the proposed soluton and draws the fnal conclusons. II. SYSTEM ARCHITECTURE The system archtecture, presented n Fg. 1, contans two major parts: The authorty and content dstrbuton part composed of one Master Content Provder and several authorzed Content Provders; The consumer network composed of Clents or Content Proxes. The partes nvolved n the dgtal content dstrbuton scheme are as follows:

2 A. Content Provders Content provders (CPs) are partes whch share the rghts to dstrbute the dgtal content to the consumer network. A consumer whch desres to receve the dgtal content wll ssue a request to a content provder whch, n turn wll subject the request to the approval of all the CPs whch share the dstrbuton rghts of the dgtal content. If all CPs approve the request, then the content provder wll send the dgtal content to the clent, otherwse t wll reject the request. redstrbute t. The requrements whch must be fulflled by such a complant devce are outlned n the Trusted Platform Module (TPM) specfcatons [4]. Each complant devce s endowed at manufacturng tme wth a par of keys: a publc key and a prvate key, whch t uses when exchangng nformaton wth a CP or another clent. The redstrbuton process, llustrated n Fg. 1 between clents A and D, takes place n accordance to the DRM polces assocated wth the content (e.g. the content may be redstrbuted only a lmted number of tmes and to a lmted number of complant devces). If DRM polces are not respected by the clent, the CP may revoke ts redstrbuton rghts, by usng the devce revocaton mechansm presented n [1]. D. Content Proxes Content proxes dfferentate from clents n the way that they are actng as relays between the CP and other customers. Any clent may become a content proxy f he desres to do so, by sgnalng ths ntent to the CP. Snce the multmeda content s encrypted, the proxy wll not be able to render t f not addressed to t drectly, but s able to forward the content to ts legtmate destnaton. In Fg. 1, Clent C has the role of content proxy and t dstrbutes the data to clents D and E, through secure broadcast. By makng use of content proxes, a CP can reduce ts server load sgnfcantly, snce clent requests for dgtal content can be servced by the proxy, wthout the nvolvement of content provders. The CP constantly montors proxy actvtes to make sure that they are n accordance wth the DRM polces. Fg. 1. The content dstrbuton system archtecture A sngle pece of dgtal content wll be broadcast to the clents who request t n a gven tme frame. Ths technque greatly reduces the load on the server by servcng several clents at a tme. B. Master Content Provder The Master Content Provder (MCP) represents the organzaton whch controls the actvty of all content provders (CP), and t s nvolved ndrectly n the content dstrbuton process. It can be regarded as the authorty whch supervses the request approval process between the content provders and generates sesson keys for ther actvtes. C. Clents Clents are complant devces whch have the rght to play the multmeda content receved from a content provder, and may optonally purchase the rghts to III. CRYPTOGRAPHIC TECHNIQUES Data transfers between the partes nvolved n the proposed content dstrbuton scheme take place on secure channels, protected by a seres of cryptographc methods, as follows: the cooperaton between the CPs s mplemented by usng the secret splttng technque [2] whle the CP to clent and proxy-to-clent data transfers are based on secure broadcast wth secure locks [3] generated usng the Chnese Remander Theorem [5]. A. Secret Splttng Technque As we prevously stated, the content provders may share dstrbuton rghts, n whch case they must all approve the clent requests. Therefore, the CPs must cooperate for each request approval, n a secure manner. The most secure way to make the CPs cooperate s to share a secret among them, by usng the secret splttng technque [2]. Ths way, no content provder can obtan the secret wthout the help of the other CPs wth whom t shares that secret.

3 Consderng a secret message M of length m and a group of n secret sharers, desgnated P 1, P 2,..., P n, the secret can be splt among the n sharers as follows: 1) Frst, a number of n-1 random bt strngs of length m, R 1, R 2,..., R n-1 are generated. 2) The message M s encrypted, resultng the secret S Κ. = M R1 R2 Rn 1 3) The secret S s dstrbuted to P 1, R 1 s dstrbuted to P 2, R 2 to P 3 and so on, up to R n-1 whch s dstrbuted to P n. It s obvous that the only way to obtan the secret M s by XOR-ng together the peces dstrbuted among the secret sharers. The sharers themselves need not even know who receved S, and who receved the random strngs R. Ths makes the secret splttng technque absolutely secure. In our case, consderng that the dstrbuton scheme contans one MCP and a number of n CPs: CP 1, CP 2,..., CP n, whch share the dstrbuton rghts for the dgtal content, the secret splttng technque works as follows: 1) CP receves a clent request. 2) If CP accepts the request, t asks the MCP, whch s the trusted authorty, to create and dstrbute a secret message M among all the CPs. 3) The MCP generates the secret message M, known only to hmself, splts t n n peces, and shares t among all CPs, by usng the secret sharng technque. 4) CP forwards the clent request to all the other CPs. 5) If a CP agrees to the clent request, t wll share ts part of the secret to CP, otherwse t wll send an empty strng of bytes nstead. 6) Based on the answers from the rest of the secret sharers, CP wll attempt to reconstruct the message M, whch wll be sent to the MCP for valdaton. Only f all the other CPs agreed wth the requests, CP wll be able to reconstruct the message M. 7) The MCP wll compare the message decrypted by CP to the orgnal message M, and f they match, t wll authorze CP to dstrbute the dgtal content to the clent, otherwse t wll nstruct t to reject the request. B. Usng the Chnese Remnder Theorem to generate secure locks A prevous research on dgtal content dstrbuton [1] requred that for each request the CP encrypts the content usng the publc key of the clent whch made the request. A number of n clents requestng content from the CP wll requre n content encryptons, even f the content may be the same for all clents. Ths places a serous burden on the system that servces ncomng requests and therefore represents a scalablty lmtaton. In order to reduce the server load, we propose that the CP use secure broadcastng technques to send the data to all clents whch requested t. In ths case, the dgtal content s encrypted only once, usng an encryptng sesson key known only to the CP, and sent along wth a decryptng sesson key to the clents. To make sure that only legtmate clents can obtan the decryptng key, a secure lock s needed to protect t. The lock can be removed only by the legtmate clents and s generated by applyng a technque known as the Chnese Remander Theorem (CRT) [3]: Let C be a group of n clents C 1, C 2,..., C n servced by a CP, each havng a par of keys e (secret) and d (publc), and N 1, N 2,..., N n a set of n postve ntegers that are mutually prme and publcly known n the system. From the group C, a subset of k clents (k 2) request the same dgtal content from the CP. If we furthermore consder a set of k postve ntegers R 1, R 2,..., R k, the CRT theorem states that the system of congruences: X R1 (mod N1) X R2(mod N 2 ) Λ X R k (mod N k ) has a common soluton X, gven by equaton (2): where: = 1 (1) k L X = ( R f )mod L (2) N L 1 f mod N (3) N k wth L beng defned as N. = For our proposed scheme, the CP wll generate a par of sesson keys, e s and d S, and encrypt the dgtal content only once, usng e S. The CP wll also generate the R 1, R 2,..., R k numbers by encodng the decryptng sesson key d S wth the publc encryptng key e of each requester, as follows: R = Enc d ). e ( S The secure lock X s obtaned by solvng the equaton system (1), and sent to the clents along wth the encrypted dgtal content. Each clent from the group whch requested the dgtal content can obtan R from the receved lock X, accordng to equaton system (1), and by decryptng t wth ts prvate key d, can obtan d S. Once a clent has d S, t can decrypt the multmeda content and use t accordng to ts assocated DRM polcy. From the technque descrbed above, t can be seen that the lock cannot be broken by llegtmate clents. Even f such a clent obtans a remander R, t cannot extract d S, as t does not posses the prvate key d of the legtmate clent. Therefore, ths method s secure.

4 IV. SCALABLE DISTRIBUTION OF DIGITAL CONTENT The content dstrbuton process can be splt nto two parts: The content provder CP dstrbutes the content and ts assocated lcenses to clents (C 1 ) The clent (C 1 ) redstrbutes the content to another clent (C 2 ). Let s ntroduce some notatons: e A /d A the publc/prvate key par of entty A [D]e A data D encrypted under publc key of A [D]d A data D sgned wth the prvate key of A [D] K data D encrypted usng a symmetrc key K h(d) a collson-free hash functon h appled on data D A. Content Provder (CP) dstrbutes content to clents In ths part, the content provder (CP 1 ) dstrbutes the dgtal content M and assocated rghts R to the clents (C ) wth permsson from other content provders (CP 2,, CP n ) and under the supervson of the master content provder (MCP). (1) C 1, C 2,, C n CP 1 : request content (2) C 1, C 2,, C n CP 1 : mutual authentcaton (3) CP 1 CP 2,, CP n, MCP: agreement upon dstrbuton rghts (4) C 1, C 2,, C n CP 1 : payment (optonal) (5) CP 1 C 1, C 2,, C n : [M] K, [K] es, X, η, δ, Λ The content provder wats for ncomng requests and servces them at certan ntervals. Smlar requests are grouped together n step (1) and servced n the same tme n order the soluton to scale by decreasng the server load. In step (2), the content provder and the clents authentcate each other. Unlke the archtecture descrbed n [1], we do not perform payment at ths stage as the content provder that receved the requests s not yet authorzed by the peers to dstrbute the content. In step (3), the content provders agree upon authorzng the content provder who receved the requests and n step (4) the payment s performed. In step (5), the content provder generates the secret lock X, encrypts the content M wth a one-tme symmetrc key K, encrypts K wth the sesson key e S and then sends the encrypted content along wth the lock X, rghts η, metadata δ and the content lcense Λ. The rghts η s a quantty that descrbes how the content s to be handled by complant devces and the metadata δ assocated wth the content (name of the artst, the album, the song ttle, bt rate, etc.). The content lcense Λ s defned as: Λ = [h(m, η, δ, X)] dcp The purpose of Λ s to certfy that the clent has been granted rghts η wth respect to content M. Rghts η can be represented usng authorzaton and access polcy languages such as XACML [6] and XrML [7]. The great advantage of our archtecture s that t s hghly scalable. When certan content s hghly demanded, several dfferent clents may request t almost smultaneously. The content provder wats for a short tme so that several requests accumulate, and then wth a sngle encrypton operaton t servces all clents. B. Clents redstrbute content The rghts η orgnally granted by the content provder may allow the clent C 1 to redstrbute the content to another clent C 2, followng the protocol below (smlar to [1]): (1) C 2 C 1 : request content (2) C 2 C 1 : mutual authentcaton (3) C 1 C 2 : [M] K, [K ] ec2, η, η, δ, Λ, Λ (4) C 2 C 1 : check δ, payment (optonal) (5) C 2 C 1 : φ C 2 starts the transacton n step (1) by requestng a partcular content tem. In step (2), the two partes authentcate each other usng ther publc/prvate key pars. If the authentcaton s successful, C 1 decrypts the content of the requested tem, generates a temporary symmetrc key K and encrypts the content wth ths key. The K key s then encrypted wth C 2 s publc key. C 1 then sends the new encrypted content, the sesson key K encrypted wth C 2 s publc key, the orgnal rghts η and the new rghts η granted to C 2. Also, C 1 sends the orgnal lcense Λ and the new lcense Λ, defned as follows: Λ = [h(e 1, e 2, M, η, δ, X)] dc1 In step (4), C 2 verfes C 1 s sgnature on the new lcense Λ and valdates η and M usng the orgnal Λ lcense. C 2 also makes sure that the η lcense can be derved from η and also checks δ for the type of content beng dstrbuted. If all checks succeed, C 2 approves the transacton n step (5), sendng C 1 a recept φ, defned as: φ = [h(e C1, e CP, [M] K, δ, η ] dc2 The recept φ represents an acknowledgement from C 2 that t receved the content M wth the rghts η. C. Content dstrbuton and relayng schema In ths secton we provde a hgh level schematc of the content dstrbuton archtecture, as llustrated n Fg. 2:

5 6) The proxy wll forward the encrypted message to each of the requestng clents. If an llegtmate clent requests ths message, t wll not be able to use t due to the protecton provded by the secure broadcast protocol. Fg. 2. Scalable dstrbuton of dgtal content 1) A content provder CP receves, n a gven tme frame a number of N requests (marked wth REQ n Fg. 2) for the same dgtal content. The CP wll subject these requests to the approval of the other CPs whch share the rghts over that dgtal content, by usng the secret splttng technque presented n Secton III. If the requests are granted, CP wll obtan a unque par <e S, d S > of sesson keys from the MCP. 2) The CP creates the sent-out message as descrbed n the prevous paragraph then sends t to all N clents who requested t, usng the secure broadcast wth secure lock method (SBC) [3] descrbed n Secton III. When a clent receves the message, t wll send an acknowledgement (ACK) message to the CP. 3) The CP checks f all N clents receved the message. If there are clents who responded wth a NAK (n our case clents N-1 and N) or when the server s under hgh load, CP wll send the orgnal message to one or more regstered content proxes, and delegate the task of dstrbutng t to ths proxy (step DLG n Fg. 2). If there s a regstered proxy among the clents who successfully receved the message, the CP wll skp ths step and go drectly to step 4. 4) CP nforms the clents whch have not receved the message that the proxy selected n step 3 contans a copy of the broadcasted message. From ths pont forward, CP wll not be nvolved any more n the dstrbuton of the dgtal content. 5) The clents notfed by the CP n step 4 wll request the broadcasted message from the content proxy. As stated n prevous sectons, the proxy stores the already encrypted verson of the message n a transparent manner, and s not able to decrypt t f t s not among the legtmate recevers. V. THREATS The proposed archtecture ntroduces a number of threats, some of whch beng shared wth exstng DRM archtecture and some beng new. Whle a full dscusson on the threats on DRM systems s beyond the scope of ths paper, we wll brefly outlne them. One of the most wdespread threats s tamperng wth the complant devce or the tamper-resstant module nsde. Good tamper-resstance s dffcult to acheve [8, 9] so we can assume that securty s effectve aganst all but the most determned attacker. Cryptographc technques are hardly a threat today as attackers are smart enough to attack the weakest pont. Content redstrbuton and collaboraton between content provders are all target ponts for attackers and a whole new lot of attacks are possble: Content masqueradng durng the redstrbuton process. Ths may happen when a clent receves a lesser value content than the one requested or a proxy clent replaces the content to be further dstrbuted. Snce devces are susceptble to falure, they allow backng up the lcenses and the content to unsecured meda. Ths can lead to untrusted storage backup attacks. Crcumvented devces are able to remove the securty mechansms that protect the dgtal content and therefore they can llegally dstrbute the content. Detectng and solatng crcumvented devces s essental to the health of a DRM system. Because of the desgn f the content provder collaboraton protocol, the compromse of a sngle provder leads to total falure of the content dstrbuton. If a sngle content provder msbehaves t s very dffcult to be excluded from the decsonal process. Unlke other systems that deal wth expensve operatons (.e. publc key cryptography), our archtecture s less susceptble to denal of servce attacks as the task of dstrbutng the content can be delegated the cooperatng clents. DoS attacks are nonetheless possble so a number of ways to mtgate such threats are possble [10, 11]. VI. CONCLUSION AND FUTURE WORK Dgtal Rghts Management systems are typcally used by provders to restrct the ways consumers use the content. In ths paper we proposed an archtecture that matches close to

6 real-world scenaros where several content provders share the rght over a sngle pece of content. Our archtecture s hghly scalable as t enables smultaneous servcng of several clents that request the same content by usng secure broadcastng and enables clents to become proxes n order to decrease the load on the central server. Our archtecture s also capable of preservng the rghts of the dstrbuted content even when redstrbuted from clent to clent, provded that certan requrements are met on the clent devce. Currently we are workng on addng resstance to denal of servce attacks to the archtecture and devsng some gudelnes for real-world mplementaton. We are also workng on performance metrcs of the archtecture. REFERENCES [1] S. K. Nar, B. C. Popescu, C. Gamage, B. Crspo and A. S. Tanenbaum, Enablng DRM preservng Dgtal Content Redstrbuton, 7 th Internatonal IEEE Conference on E-Commerce Technology, 2005 [2] Bruce Schneer, Appled Cryptography, John Wley & Sons, 1996, pag. 70 [3] G.-H. Chou and W.-T. Chen, Secure Broadcastng Usng the Secure Lock, IEEE Trans. Software Eng., vol. 15, no. 8, pp , August [4] Trusted Computng Group, Trusted Computng Platform Allance Man Specfcaton, October 2003, Verson 1.2, [5] Erc W. Wessten, Chnese Remander Theorem. From MathWorld - A Wolfram Web Resource, [6] extensble Access Control Markup Language (XACML), [7] XrML: extensble Rghts Markup Language, [8] R. Anderson, M. Kuhn, Tamper Resstance A Cautonary Note, Proceednggs of the 2 nd Usenx Workshop on Electronc Commerce, pages 1-11, November [9] Andrew Huang, Keepng Secrets n Hardware: the Mcrosoft XBox TM Case Study, May 2002, [10] Valer Bocan, Threshold Puzzles. The Evoluton of DoS-Resstant Authentcaton, CONTI Perodca Poltehnca, Transacton on Automatc Control and Computer Scence Vol. 49 (63), 2004, ISSN X, [11] Valer Bocan, Mha Fagadar-Cosma, Adaptve Threshold Puzzles, EUROCON The Internatonal Conference on "Computer as a tool", Belgrade, Serba and Montenegro, %20Adaptve%20Threshold%20Puzzles.pdf

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

ThresPassport A Distributed Single Sign-On Service

ThresPassport A Distributed Single Sign-On Service ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna chenteru@software.ct.ac.cn, cqx@ct.ac.cn

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Yi Mu and Vijay Varadharajan. School of Computing and IT, University of Western Sydney, Nepean, PO Box 10, Kingswood, N.S.W.

Yi Mu and Vijay Varadharajan. School of Computing and IT, University of Western Sydney, Nepean, PO Box 10, Kingswood, N.S.W. Anonymous Internet Credt Cards Y Mu and Vjay Varadharajan School of Computng and IT, Unversty of Western Sydney, Nepean, PO Box 10, Kngswood, N.S.W. 2747, Australa Emal: fymu,vjayg@ct.nepean.uws.edu.au

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

Some literature also use the term Process Control

Some literature also use the term Process Control A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com

More information

3C-Auth: A New Scheme for Enhancing Security

3C-Auth: A New Scheme for Enhancing Security Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

RUHR-UNIVERSITÄT BOCHUM

RUHR-UNIVERSITÄT BOCHUM RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty

More information

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Scalability of a Mobile Cloud Management System

Scalability of a Mobile Cloud Management System Scalablty of a Moble Cloud Management System Roberto Bfulco Unversty of Napol Federco II roberto.bfulco2@unna.t Marcus Brunner NEC Laboratores Europe brunner@neclab.eu Peer Hasselmeyer NEC Laboratores

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

A Certified Email Protocol using Key Chains

A Certified Email Protocol using Key Chains A Certfed Emal Protocol usng Key Chans J. Cederqust SQIG-IT and IST, TULsbon, Portugal M. Torab Dasht CWI, Amsterdam, The Netherlands S. Mauw Unversty of Luxembourg, Luxembourg Abstract Ths paper ntroduces

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and

More information

www.olr.ccli.com Introducing Online Reporting Your step-by-step guide to the new online copy report Online Reporting

www.olr.ccli.com Introducing Online Reporting Your step-by-step guide to the new online copy report Online Reporting Onlne Reportng Introducng Onlne Reportng www.olr.ccl.com Your step-by-step gude to the new onlne copy report Important nformaton for all lcence holders No more software to download Reportng as you go...

More information

SEVERAL trends are opening up the era of Cloud

SEVERAL trends are opening up the era of Cloud 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student Member, IEEE, Ku Ren, Member, IEEE, Nng Cao, Student Member, IEEE, and Wenjng Lou, Senor

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing 1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

SEVERAL trends are opening up the era of Cloud

SEVERAL trends are opening up the era of Cloud IEEE Transactons on Cloud Computng Date of Publcaton: Aprl-June 2012 Volume: 5, Issue: 2 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student

More information

Account Transfer and Direct Rollover

Account Transfer and Direct Rollover CED0105 Amerprse Fnancal Servces, Inc. 70100 Amerprse Fnancal Center Mnneapols, MN 55474 Account Transfer and Drect Rollover Important: Before fnal submsson to the Home Offce you wll need a Reference Number.

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Understanding the physical and economic consequences of attacks on control systems

Understanding the physical and economic consequences of attacks on control systems I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( 2 0 0 9 ) 7 3 8 3 avalable at www.scencedrect.com journal homepage: www.elsever.com/locate/jcp

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Fast degree elevation and knot insertion for B-spline curves

Fast degree elevation and knot insertion for B-spline curves Computer Aded Geometrc Desgn 22 (2005) 183 197 www.elsever.com/locate/cagd Fast degree elevaton and knot nserton for B-splne curves Q-Xng Huang a,sh-mnhu a,, Ralph R. Martn b a Department of Computer Scence

More information

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7 DISCLOSURES The Dsclosures set forth below may affect the accounts you have selected wth Bank Leum USA. Read these dsclosures carefully as they descrbe your rghts and oblgatons for the accounts and/or

More information

Fast Variants of RSA

Fast Variants of RSA Fast Varants of RSA Dan Boneh dabo@cs.stanford.edu Hovav Shacham hovav@cs.stanford.edu Abstract We survey three varants of RSA desgned to speed up RSA decrypton. These varants are backwards compatble n

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensurng Data Storage Securty n Cloud Computng Cong Wang, Qan Wang, and Ku Ren Department of ECE Illnos Insttute of Technology Emal: {cwang, qwang, kren}@ece.t.edu Wenjng Lou Department of ECE Worcester

More information

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Managing Resource and Servent Reputation in P2P Networks

Managing Resource and Servent Reputation in P2P Networks Managng Resource and Servent Reputaton n P2P Networks Makoto Iguch NTT Informaton Sharng Platform Laboratores guch@sl.ntt.co.jp Masayuk Terada NTT DoCoMo Multmeda Laboratores te@mml.yrp.nttdocomo.co.jp

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9

More information

MyINS: A CBR e-commerce Application for Insurance Policies

MyINS: A CBR e-commerce Application for Insurance Policies Proceedngs of the 5th WSEAS Internatonal Conference on E-ACTIVITIES, Vence, Italy, November 20-22, 2006 373 MyINS: A CBR e-commerce Applcaton for Insurance Polces SITI SORAYA ABDUL RAHMAN, AZAH ANIR NORMAN

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Multitone Electronics Plc. delivering certainty

Multitone Electronics Plc. delivering certainty Multtone Electroncs Plc Multtone Electroncs Plc, Multtone House, Shortwood Copse Lane, Basngstoke, Hampshre, RG23 7NL Tel: +44 (0)1256 320292 Fax: +44 (0)1256 462 643 Emal: nfo@multtone.com Web: www.multtone.com

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Global innovative solutions You can rely on. www.calyon.com

Global innovative solutions You can rely on. www.calyon.com Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons

More information

National Security Agency Information Assurance Directorate

National Security Agency Information Assurance Directorate Natonal Securty Agency Informaton Assurance Drectorate Net-Centrc Enterprse Servces (NCES) Profle of Web Servce Securty: Smple Object Access Protocol (SOAP) Message Securty (WSSE) 02 MAY 2008 Prepared

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1 A set of tools for buldng PostgreSQL dstrbuted databases n bomedcal envronment. M. Cavaller, R. Prudentno, U. Pozzol, G. Ren IRCCS E. Medea, Bosso Parn (LC), Italy. E-mal: gren@bp.lnf.t Abstract PostgreSQL

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of

More information