Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy

Size: px
Start display at page:

Download "Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy"

Transcription

1 P Publc Audng for Ensurng Cloud Daa Sorage Secury Wh Zero Knowledge Prvacy, Wang Shao-huP P, Chang Su-qnP P, Chen Dan-weP P, Wang Zh-weP College of Comuer, Nanjng Unversy of Poss and elecommuncaons, Nanjng 0046, Chna; Nework and Daa Secury Key Laboraory of Schuan Provnce Emal: Absrac In cloud sorage servce, clens uload her daa ogeher wh auhencaon nformaon o cloud sorage server o ensure he avalably and negry of clens' sored daa, cloud server(cs) mus rove o a verfer ha he s acually sorng all of he clen's daa unchanged And, enablng ublc audably for cloud sorage s of crcal morance o users wh consraned comung resources, who can resor o a hrd ary audor (PA) o check he negry of ousourced daa However, mos of he exsng roofs of rerevably schemes or roof of daa ossesson schemes do no consder daa rvacy roblem Zero knowledge rvacy requres PA or he adversary can no deduce any nformaon of he fle daa from audng sysem In hs aer, afer gvng a new consrucon of a recenly roosed cryograhc rmve named aggregaable sgnaure based broadcas (ASBB) encryon scheme, we resen an effcen ublc audng scheme wh zero knowledge rvacy he new scheme s as effcen as he scheme resened by Shacham and Waers whou consderng rvacy and s secure n he random oracle model Keywords: Cloud Comung, Cloud Sorage, Publc Audng, Zero-Knowledge Prvacy, Inegry Inroducon Recenly, cloud comung s recevng more and more aenons, from boh ndusral and academc communy Cloud comung searaes usage of I resources from her managemen and manenance, so ha users can focus on her core busness and leave he exensve manenance of I servces o cloud servce rovder However users of ousourced sorage are a he mercy of her sorage rovders for he connued avalably of her daa Even Amazon's S, he bes-known sorage servce, has exerenced sgnfcan downme Here we are consderng scenaros where users may have concerns of he negry and rvacy of her daa sored n he cloud sorage As users no longer hyscally ossess he sorage of her daa, radonal cryograhc rmves for he urose of daa secury roecon canno be drecly adoed In arcular, smly downloadng all he daa for s negry verfcaon s no a raccal soluon due o he exensveness n I/O and ransmsson cos across he nework In order o solve remoe negry checkng roblem n cloud sorage, a lo of works[-6] have been done focusng on varous condons of alcaon and aemng o acheve dfferen goals Among hese works, he mehods can be dvded as Proof of Daa Possesson( PDP ) and Proofs of Rerevably ( PoR ) PDP scheme, frs resened by Aenese e al [,6] are relaed roocols ha only deec a large amoun of corruon n ousourced daa her scheme ulzes he RSA-based homomorhc auhencaors for audng ousourced daa and suggess randomly samlng a few blocks of he fle However, he schemes have o se a ror bound on he number of auds and doesn' suor ublc aud ably Publc audably allows an exernal ary, n addon o he user hmself, o verfy he correcness of remoely sored daa Whle PoR scheme[], frs resened by Juels, s a challenge-resonse roocol ha enables a cloud rovder o demonsrae o a clen ha a fle s rerevable, e, recoverable whou any loss or corruon her scheme use so-checkng and errorcorrecng codes o ensure boh "ossesson" and "rerevably" of remoe daa fles Erway e al[8] was he frs o roose dynamc PDP scheme hey develoed a sk lss based mehod o enable rovable daa ossesson wh dynamc suor however, he effcency of her scheme remans n queson In [9], Wang e al rovded a dynamc archecure for ublc checkng

2 However, mos of hese schemes [,4,] do no consder he rvacy roecon of users daa agans exernal audors Indeed, cloud servce rovder may oenally reveal users daa o audors or adversares durng he audng From he ersecve of roecng daa rvacy, hs severe drawback grealy affecs he secury of hese roocols n Cloud Comung[5] Recenly Wang e al [6] resened wo rvacy-reservng ublc audng schemes for cloud sorage sysems based on Shacham and Waers scheme[4] In her frs scheme, he adversary can no deduce he daa from he audng sysem f he daa have hgh enroy, bu s no secure f he daa sored have low enroy, for he adversary can have a brue-force guess of he message offlne he second neffcen scheme hey resened can rovde zero knowledge rvacy wh much less effcency han [4], whch means he adversary has erfec zero knowledge from he audng sysem In hs aer, we ackle he roblem of zero knowledge rvacy-reservng ublc audng roblem for cloud sorage sysem o acheve he zero knowledge rvacy, we frs resen a new consrucon of a recenly roosed cryograhc rmve called aggregaable sgnaure based broadcas (ASBB for shor) encryon scheme[7] Based on hs new ASBB scheme, we roose a shor, effcen homomorhc ublc verfable scheme wh zero knowledge rvacy he new scheme s almos as effcen as he orgnal Shacham and Waers scheme[4] and s secure n he random oracle model he res of he aer s organzed as follows In Secon, we resen he relmnares and he buldng blocks relaed o hs aer; he defnon and secury requremens of ublc audng scheme for cloud sorage are revsed n secon ; In secon 4, we resen he dealed descron of our consrucons Secon 5 gves he secury and erformance analyss of he new scheme and concluson s gven n secon 6 Noaons and Buldng Blocks In hs secon, we gve a bref descrons of corresondng relmnares and buldng blocks ncludng blnear mas, comuaon hard roblems, ASBB schemes and knowledge roof sysem Blnear Ma and Hard roblems Defnon Blnear Ma Le G and G be mullcave cyclc grous of rme order Le g be a generaor of grou G A blnear ma s a ma e : G G G sasfyng: a b ab For any u, v G and a, b Z, e ( u, v ) = e( u, v) hs blneary mles ha for any u, u G, e ( u u, v) = e( u, v) e( u, v) here exss an effcenly comuable algorhm for comung e he ma should be non-rval, e, e s non-degenerae: e ( g, g) Some hard roblem assumons relaed o hs aer are resened as follows: a b Comuaonal Dffe-Hellman (CDH) Assumon: Gven g, g, g for unknown a, b Z, ab s hard o comue g a b c Decsonal Blnear Dffe-Hellman (DBDH) Assumons: Gven g, g, g, g for unknown abc a, b, c Z, s hard o dsngush he value = e( g, g) wh random number Z G Blnear Parng Assumon: Gven G, s generaor g, and he value of e( X, g) G, s hard o comue X G a b Blnear Dffe-Hellman Assumon: Gven g, g, g for unknown a b Z, for any random ab h g G, s hard o comue e ( h, g) Aggregaable Sgnaure-Based Broadcas Encryon, As o aggregaable Sgnaure-Based Broadcas(ASBB) Encryon scheme[7], he ublc key can be smulaneously used o verfy sgnaures and encry messages, and any vald sgnaure can be used o

3 decry cherexs under hs ublc key In [7], ASBB scheme s resened o desgn one round asymmerc grou key agreemen Mos sgnfcance of ASBB scheme s ha has key-homomorhc roery, whch means ha, gven wo sgnaures on he same message under wo secre keys, one can effcenly roduce a sgnaure of he same message under a new secre key derved from he orgnal wo keys he secury of an ASBB scheme ncororaes he sandard noon of secury for a sgnaure scheme, e, exsenal unforgeably under he chosen message aack (EUF-CMA)[8] and he secury as an encryon scheme In [7], Wu e al resened an effcen ASBB scheme based on blnear arngs, and he descron of he scheme s deced below: Publc arameers: Le (, G, G, e) ParGen ( λ ), and g s he generaor of G Le H :{0,} G be a cryograhc hash funcon he sysem arameers are ( g, H,, G, G, e) r Publc/secre keys: Selec a random r Z, X G \{ } Comue R = g, A = e( X, g) he ublc key s k = ( R, A) and he secre key s sk = ( r, X ) r Sgn: he sgnaure of any srng s {0,} under he ublc key ( R, A) s σ = XH ( s) Verfy: Gven a message-sgnaure ar ( s, σ ), he verfcaon equaon s e (σ, g) e( H( s), R) = A If he equaon holds, ouu o reresen ha σ s a vald sgnaure Oherwse ouu 0 and rejec he sgnaure Encryon: For a lanex m G, randomly selec and comue c = g c = R c = ma he cherex s ( c, c, c) Decryon: Afer recevng a cherex c, c, ) ( c ( s, σ ) can exrac he lanex as follow: m = c /( e( σ, c ) e( H ( s), c)) Knowledge Proof for Equaly of Dscree Logarhm Z,,, anyone wh a vald message-sgnaure ar In cryograhy, knowledge roof s an neracve roof n whch he rover succeeds n convncng a verfer ha he knows somehng he queson relaed o he aer s how o rove knowledge ha wo ublc daa have he same dscree logarhm whou revealng any oher nformaon abou hs value Le G and G be mullcave cyclc grous of rme order Le g be generaors of G and random value A G Gven wo ublc daa h G and R G, he rover should rove ha log g h = log A R = x, bu he can no leak any nformaon of x We ado he knowledge roof scheme resened n [9], whch s gven as follows: he rover chooses randomly s and comues: Z s s ( a, b) = ( g, A ), c = H ( a, b), r = s + cx where H ( ) s a secure hash funcon Prover sends a, b, r o he verfer r c r c he verfer frs comues c = H ( a, b), and acces he roof f g = ah, A = br Sysem Archecure and Secury Model In hs secon, we gve he defnons of cloud sorage ublc audng scheme and he corresondng secury requremens ncludng comleeness, soundness and rvacy We used he basc cloud sysem archecure whch s gven n [6] he cloud daa sorage servce nvolves hree dfferen enes, as llusraed n Fg : he cloud user, who has he oenal daa fles o be sored n he cloud; he cloud server (CS), whch s managed by he cloud servce rovder (CSP) o rovde daa sorage servce; he hrd ary audor (PA), who s rused o assess he cloud sorage servce relably on behalf of he cloud user uon reques

4 Fg : he archecure of cloud daa sorage servce Defnon Publc Audng for Cloud Sorage A ublc audng scheme for cloud sorage s defned hrough hree algorhms: Keygen, Genag and Aud, whch behave as below: Keygen ( λ ) Gven secury arameer λ as nu, hs randomzed algorhm generaes scheme s ublc arameers and cloud users ublc/rvae key ar ( k, sk ) Genag ( sk, F) he randomzed algorhm akes user s secre key sk and daa fle F {0,} as nus, and roduces he auhencaon ags, whch conans nformaon on he fle beng sored and addonal secre nformaon encryed under he secre key sk he fle F and ag wll be sored n he CS Aud he randomzed audng algorhms can be defned as an neracve roocol ( CS ( k, F, ) PA ( k) ) for rovng fle negry Durng roocol execuon, PA(verfer), akng he ublc key k and some rocessed fle descron ha s ouu by Genag as nu, ssues an audng challenge o he cloud server And he CS (rover) wll derve a resonse message usng fle F sored and he fle ag as nus A he end of he roocol run, PA ouus, whch means ha he fle s sored unchanged on he cloud server; Oherwse ouus 0 We assume PA, who s n he busness of audng, s relable and ndeenden Whle CS s resumed o be oenally unrusworhy I may corru he fle-sysem n a fully Byzanne manner he cloud may aler or dro fle-sysem oeraons ransmed by he oral; may corru or erase fles We also assume ha CS has no ncenves o reveal her hosed daa o exernal ares because of some regulaons requremens herefore, he audor or adversary wll exrac he ousourced daa hrough he communcaon beween CS and PA he secury requremens of he ublc audng scheme for cloud sorage ncludng comleeness, soundness and rvacy he deal defnons are gven below: Defnon Comleeness Comleeness requres ha, for all key ars ( k, sk ) ouu by Keygen, for all fles M {0,} and ag ouu by Genag ( sk, M ), he PA wll always ouu when neracng wh he vald CS va audng algorhm: rob ( Aud( CS( k, M, ) PA( sk)) = ) = Defnon Soundness A ublc audng scheme s assumed o be sound f any cheang CS whou sorng he unchanged fle M can no convnce he PA We ulze he defnon of soundness resened n [4] whch s formulzed by he followng game beween an adversary A and a challenger C : Se he challenger generaes key ar ( k, sk ) by runnng algorhm Keygen ( λ ), and rovdes ublc key k o A Se he adversary can now nerac wh he challenger for some oracle queres I can make queres o Genag oracle, and for each query, he challenger chooses some fle M and comues Genag( sk, M ) Boh M and are reurned o he adversary In addon, he adversary can underake audng execuons wh he challenger In hese roocol execuons, he challenger lays he ar of he verfer and he adversary lays he ar of he rover Se he adversary generaes and sends he challenger some daa fle M and he challenger answers he corresondng ag hen he adversary changes he fle o M M and underakes

5 audng execuons wh he challenger: Aud( C( k) A( k, M, )) We say a cloud sorage ublc audng scheme s sound f he followng robably s neglgble: rob ( Aud( C( k) A( k, M, )) = ) Defnon 4 Zero-knowledge Prvacy Zero-knowledge rvacy means he adversary can oban zero knowledge nformaon of he fles daa sored from he audng scheme We formalze he defnon by he followng game beween he adversary A and he challenger C : Se and Se are almos he same as he ones n he defnon of soundness he dfference s n he roocol execuons, he challenger lays he ar of he rover, e CS, and he adversary lays he ar of he verfer, e PA Fnally, as o any new fle daa M whch s unknown o he adversary, he challenger frs roduces he ag ; hen he adversary wll underake audng execuons wh he challenger: Aud ( A ( k ) C ( k, M, )) We say a ublc audng scheme s zero-knowledge rvacy f for any funcon f on he fle M, he followng robably s neglgble: rob( A( k) : f ( M)) rob( A( k) C( k, M, ) : f ( M)) Here rob ( A( k) : f ( M)) means he robably ha he adversary guesses he value of f ( M) successfully whou any audng rocesson; and he laer robably rob( A( k) C( k, M, ) : f ( M)) means adversary guesses f ( M) hrough he audng scheme So he zero knowledge rvacy defnon ndcaes he adversary can no ge any more useful nformaon from he audng scheme o guess f M ) successfully 4 Our Consrucons ( In hs secon, we frs gve a new effcen consrucon of ASBB scheme ha has aggregaable roery; hen we resen a ublc audng scheme sasfyng zero knowledge rvacy based on he new ASBB scheme 4 A New Consrucon of ASBB Scheme he new roosed ASBB scheme s almos as effcen as he one resened n [7], and he deal descron of he scheme s as follow: λ Publc arameers: Le (, G, G, e) ParGen( ), and g s he generaor of G Le H :{0,} G be a cryograhc hash funcon he sysem arameers are ( g, H,, G, G, e) r Publc/Secre keys: Selec a random number r Z, X G \{ } Comue R = g, A = e( X, g) he ublc key k = ( R, A) and he secre key sk = ( r, X ) Sgn: o gve he sgnaure of any srng m Z under he ublc key k, frs choose randomly m r s {0,}, comue σ = X H( s), and he sgnaure s ( s, σ ) Verfy: Gven a message-sgnaure ar ( m, s, σ ), he verfcaon equaon s e, g) e( H ( s), R) = A ouu 0 and rejec he sgnaure Encryon: For any lanex ω G, selec a random number and comue c = g m (σ If he equaon holds, ouu o reresen ha sgnaure s vald; Oherwse Z, c = R, c = ωa he cherex s ( c, c, c) Decryon: Gven he cherex c, c, ), anyone wh a vald message-sgnaure ar ( c m ( m, s, σ ) can exrac he lanex as: ω = c /( e( σ, c ) e( H ( s), c)) We can reduce he secury of he new ASBB scheme o he secury of he scheme n [7] aken he sgnaure scheme as an examle, I s easy o see f he adversary can forge a vald sgnaure ( m, s, σ ) n he new scheme wh he ublc key ( R, A), he can forge a vald sgnaure ( s, σ m ) for he scheme

6 [7] wh he ublc key ( R m, A) Usng he same roof mehod n [7], we can conclude he followng heorem: heorem 4 Le G be a blnear grou of rme order, he followng clams hold: () he roosed ASBB scheme s aggregaable agans non-adave chosen message aacks n he random oracle model assumng he decson BDHE assumon holds n G ; () he roosed ASBB scheme s exsenally unforgeable under adave chosen-message aack and ndsngushable under chosen lanex aack n he random oracle model under he CDH and DBDH assumons 4 Publc Audng Scheme wh Zero-knowledge Prvacy In he followng, we resen he audng schemes wh zero-knowledge rvacy ulzng he new roosed ASBB scheme he mehod s easy o undersand Usng he new ASBB scheme, PA encrys arbrary message and sends he cherex as he challenge o CS, and CS can decry he cherex as he resonse only f he fle sored s n good condon he deal descron of he scheme s as follow: Keygen ( λ ) Le G and G be mullcave cyclc grous of rme order, and e : G G G be a blnear ma Le g be a generaor of G H ( ) s a secure ma-o-on hash funcon: { 0,} G, whch mas srngs unformly o G he sysem arameers are r ( g, H,, G, G, e) Cloud user selec a random number r, X G \{ } Comue R = g and A = e( X, g) he ublc key k = ( R, A) and he secre key sk = ( r, X ) Genag ( sk, F) Gven he daa fle F = { m } and each =,, n m Z, he user comues he m r auhencaor ag as σ = X H ( d ) G for each, where d s chosen by he user unformly a random from Z as he denfer of fle F Aud he neracve roof rocess beween PA and CS s roceeded as follows: Se o generae he challenge message for he audng, he PA frs cks randomly Z, c - elemen subse I = { s, s,, sc} [, n], and for each I, PA chooses a random number v hen he PA chooses a random number m G, and comues v c = g, c = R, c = A, c = m e( H ( d ), c ) I In addon, usng he mehod n [9], PA mus gve a roof of knowledge ha c and c have he equal dscree logarhms corresondng o g and A : POK{( g, A, c, c) : log g c = log A c} he fnal audng challenge s {(, v ) I, c, c, c, POK} Se Uon recevng he challenge, CS frs verfes wheher he roof POK s vald If s no vald, he audng fals; Oherwse CS comues: σ v = I σ, = v m, I I = = v B c e( X, g ) m hen CS decrys he message c and sends he lanex o PA as he resonse: m = c e( σ, c )) / B Z ( Se Afer recevng he message m, PA checks wheher m = m If hey are equal, PA acces he roof; Oherwse CS does no ass he audng roof he correcness of he above verfcaon equaon s elaboraed as follows, we relace H ( d ) wh H for convenence : v v r e(, c ) c = e(, g ) m e( H, g ) m r v v r σ = m e( ( X ( H ) ), g ) e( H, g ) σ mv I = m e X g = m e X g (, ) ( (, ) ) I 5 Performance and Secury mv = m B

7 In hs secon, we gve he erformance and secury analyss of our new zero-knowledge rvacy reservng ublc audng scheme, and we show ha our scheme can rovde soundness and zeroknowledge rvacy requremens 5 Performance Analyss Because he schemes resened by Wang eal[6] are based on Shacham and Waers[4], we comare new roosed scheme wh he orgnal scheme [4] whch does no consder rvacy roblem he comarson consss n sorage cos, communcaon cos and comuaon cos o make he comarson convenen, we suose n boh schemes, CS sores he same fle F and PA chooses he same I = { s, s,, sc} [, n], and v for each I Sorage Cos he number of he auhencaon ag n boh schemes s he same he ublc key of scheme [4] has grou numbers and he secre key has neger n Z ; whle he ublc key of our scheme has grou numbers and he secre key has grou number and neger Communcaon Cos In scheme [4], wha he PA sends s {(, v )} and CS needs o send back grou numbers and neger In our scheme wh zero knowledge rvacy, PA sends exra grou ABLE I COMPARISON OF NEW CONSRUCION WIH SCHEME IN [4] Sorage Commun caon Comua on New Scheme Scheme n [4] PK G G SK G+ I I PA {(, )} + 5G + I v {(, CS G G + I v )} PA BM + 5GE (Off-Lne) BM + GE CS BM + 6 GE GE numbers { c, c, c} and messages generaed by POK (ncludng grou numbers and neger accordng o [9]) exce for {(, v )}, and CS only needs o send back grou number, e he lanex Comuaon Cos Here we only coun he number of mos exensve cos comuaon ncludng blnear ma and grou exonenaon In scheme[4], he comuaon of PA ncludes blnear ma, grou exonenaon comuaon n he Se of audng hase, and CS needs o comue grou exonenaon; whle n our scheme, PA needs o comue blnear ma, 5 grou exonenaon n he Se of he audng hase, and CS should roceed blnear ma and 6 grou exonenaon comuaon he comarsons are lsed n he able, where G and I mean grou number and neger; GE and BM mean grou exonenaon and blnear ma comuaon resecvely From he comarson, we can see new scheme has a lle heaver communcaon overheads, and has more grou exonenaon comuaon han scheme [4] In fac, mos of he grou exonenaon comuaon of our scheme les n he knowledge roof scheme POK However, we can see he comuaon of PA n our scheme haens n Se o generae he challenge, so hese comuaon can be re-comue off-lne whch does no affec he audng scheme hus he me consumed n our scheme only ncludes abou blnear ma and 6 grou exonenaon comuaon Because comung a blnear ma can be sgnfcanly slower han comung an exonenaon, we can conclude ha our scheme s as effcen as Shacham and Waers scheme whou rvacy consderaon

8 5 Secury Analyss We show he new roosed scheme can rovde soundness and zero knowledge rvacy from he followng wo heorems heorem 5 If he sgnaure scheme used for fle ags s exsenally unforgeable and he comuaonal Dffe-Hellman roblem and Blnear Parng assumon are hard, hen f he cloud server does no ossess he secfc daa nac as s, he can no ass he aud hase wh nonneglgble robably Proof Afer recevng PA s challenge message {(, v ) I, c, c, c, POK}, CS has o comue v e( H ( d ), c ) o decry he cherex c as he resonse From he comuaonal Dffe- Hellman assumon, we know s hard o comue c from c and c So CS can no deduce v e( H ( d ), c ) drecly Now we rove f he adversary can chea he PA n he audng scheme, we can break he Blnear Parng assumon By he correcness of he scheme, we know he execed resonse ( σ, B) ha CS generaes mus sasfy: v B = e( X, g ) = e( σ, c ) e( H ( d ), c ) (4) I If he fle ha CS sores has been changed, we know here exs ( σ σ, B ) ha can ass he verfcaon equaon: ' v B = e( X, g ) = e( σ, c) e( H ( d ), c ) (5) I I follows from he verfcaon equaon ha ', or should conradc our assumon above From equaon (4) and (5), we can ge: ' B / B = e( X, g ) = e( σ / σ, c ) = e( σ / σ, g ) ' ') whch means X = σ /σ, e ( / ) ( X = σ σ hs oucome conradc he Blnear Parng assumon heorem 5 If he knowledge roof scheme for equaly of dscree logarhm n [9] s correc, he new ublc audng scheme can rovde zero knowledge rvacy Proof: As o any challenge {(, v ) I, c, c, c, POK}, messages c and c should have he same dscree logarhm corresondng o g and A because of he correcness of POK scheme So he resonse CS sendng back s: m r v r v c e(, c ) / c = c e( ( X H ), c ) c = c e( X, c ) e( ( H ), c ) c I σ / I / I where = v m I s easy o see f c and c have he same dscree logarhm corresondng o g and A, e ( X, c) mus equal o r v c, and he resonse can be smlfed as c e( ( H I ), c ), whch can be deermned by he adversary alone So he neracve audng communcaon does no leak any nformaon of he daa fle sored In fac, we can see any adversary can choose randomly {(, v )}, and cks random elemen Z, and comues: v c = g, c = R c = A c = m e(,, H ( d ), c ) I he manuscr ha he adversary ouus s {(, v ) I, c, c, c, m, POK}, whch has he dencal dsrbuon of he real neracon beween PA and CS ha s o say, he adversary can no ge any nformaon from he audng roof and he can ouu he manuscrs all by hmself 6 Concluson Secury and negry of daa are he major concerns of clen n he cloud sorage nework In hs aer, we ackle he rvacy roblem caused by he ublc audng scheme Afer resenng a new consrucon of ASBB scheme, we roose an effcen zero knowledge rvacy reservng ublc

9 audng scheme for daa sorage secury n cloud comung, e he adversary can no deduce any nformaon of he fle sored hrough he audng neracon beween CS and PA he new ublc audng scheme no only elmnaes he burden of cloud user from he edous and ossbly exensve audng ask, bu also allevaes he users fear of her ousourced daa leakage he new scheme has roughly he same effcency as he Shacham and Waers scheme whou consderng rvacy roblem In hs aer, we only consder he suaon ha cloud users do no change daa fle sored; whle n racce, cloud users may modfy, nser, add or delee her ousourced daa How o consruc zeroknowledge ublc audng scheme for dynamc daa sorage wll be consdered n he fuure Acknowledgmen hs work s suored by he Prory Academc Program Develomen of Jangsu Hgher Educaon Insuons (PAPD), Naonal Naural Scence Funds (Gran No60908) and Nanjng Unversy of Poss and elecommuncaons Funds (Gran NoNY0807) References [] M Enar, N Mahl, Gene Auhencaon and negry n ousourced daabases [J] ACM ransacons On Sorage 006, (): 07-8 [] G Aenese, R Burns, R Curmola, e al Provable daa ossesson a unrused sorescryology eprn Archve, Reor 007/0, 007 Onlne: h://ernacrorg/ Verson of 7 Dec 007; vsed 0 Feb 008 [] A Juels, B Kalsk Pors: roofs of rerevably for large fles[c] Proceedngs of CCS 007 Alexandra, VA, USA, [4] H Shacham, B Waers Comac roofs of rerevably [C] Proceedngs of ASIACRYP 008 Melbourne, Ausrala, [5] F Sebe, J Domngo-Ferrer, A Marnez-Ballese, e al Effcen Remoe Daa Possesson Checkng n Crcal Informaon Infrasrucures IEEE rans Knowledge and Daa Eng, [6] G Aenese, RD Pero, LV Mancn, e al Scalable and effcen rovable daa ossesson [C] Proceedngs of he 4h nernaonal conference on secury and rvacy n Communcaon neworks Isanbul, urkey: ACM, 008: [7] C Wang, Q Wang, K Ren, e al Ensurng daa sorage secury n cloud comung[c] Proceedngs of IW QoS 009, Charleson, Souh Carolna, USA, 009 [8] C Erway, A Kucu, C Paamanhou, e al Dynamc rovable daa ossesson [EB/OL] Cryology eprn Archve, Reor 008/4, 008 [9] Q Wang, C Wang, J L, e al Enablng ublc verfably and daa dynamcs for sorage secury n cloud comung[c] In Proc of ESORICS 09, San Malo, France, Se 009 Lecure Noes n Comuer Scence, 009, Volume 5789/009: [0] K D Bowers, A Juels, A Orea Proofs of rerevably: heory and mlemenaon[c] In: Proc of he 009 ACM Worksho on Cloud Comung Secury, CCSW 009, Co-Locaed wh he 6h ACM Comuer and Communcaons Secury Conf, CCS 009 New York: Assocaon for Comung Machnery, [] S Kamara, K Lauer Cryograhc Cloud Sorage[C] Lecure Noes n Comuer Scence Fnancal Cryograhy and Daa Secury Berln: Srnger, 00: 6-49 [] Z Hao, N Yu A mulle-relca remoe daa ossesson checkng roocol wh ublc verfably[a] Proc Second In' Daa, Prvacy and E-Commerce Sym (ISDPE '0), 00 [] Q Wang, C Wang, K Ren, W Lou, and J L Enablng ublc audably and daa dynamcs for sorage secury n cloud comung[j] IEEE ransacons on Parallel and Dsrbued Sysems, vol, no 5, , 0 [4] Q Zheng and S Xu Far and dynamc roofs of rerevably[c] In Proc s ACMM Conference on Daa and Alcaon Secury and Prvacy (CODASPY), 0 [5] M A Shah, M Baker, J C Mogul, and R Swamnahan Audng o kee onlne sorage servces hones[c] In Proc of HoOS 07, 007, -6

10 [6] C Wang, SS-M Chow, Q Wang, K Ren and WJ Lou Prvacy-Preservng Publc Audng for Secure Cloud Sorage h://ernacrorg/009/579df [7] Wu, Q, Mu, Y, Suslo, W, Qn, B, Domngo-Ferrer, J: Asymmerc Grou Key Agreemen[C] In: Joux, A (ed) EUROCRYP 009 LNCS, vol 5479, 5-70 Srnger, Hedelberg (009) [8] S Goldwasser, S Mcal, R Rves A Dgal Sgnaure Scheme Secure agans Adave Chosenmessage Aacks [J] SIAM J Comung 7(), 8-08 (988) [9] D Chaum, P Pederson Walle daabases wh observers [C] EF Brchell(Ed): Advances n Cryology- CRYPO 9, LNCS 740, 89-05, 99

A binary powering Schur algorithm for computing primary matrix roots

A binary powering Schur algorithm for computing primary matrix roots Numercal Algorhms manuscr No. (wll be nsered by he edor) A bnary owerng Schur algorhm for comung rmary marx roos Federco Greco Bruno Iannazzo Receved: dae / Acceed: dae Absrac An algorhm for comung rmary

More information

How To Calculate Backup From A Backup From An Oal To A Daa

How To Calculate Backup From A Backup From An Oal To A Daa 6 IJCSNS Inernaonal Journal of Compuer Scence and Nework Secury, VOL.4 No.7, July 04 Mahemacal Model of Daa Backup and Recovery Karel Burda The Faculy of Elecrcal Engneerng and Communcaon Brno Unversy

More information

Spline. Computer Graphics. B-splines. B-Splines (for basis splines) Generating a curve. Basis Functions. Lecture 14 Curves and Surfaces II

Spline. Computer Graphics. B-splines. B-Splines (for basis splines) Generating a curve. Basis Functions. Lecture 14 Curves and Surfaces II Lecure 4 Curves and Surfaces II Splne A long flexble srps of meal used by drafspersons o lay ou he surfaces of arplanes, cars and shps Ducks weghs aached o he splnes were used o pull he splne n dfferen

More information

Linear Extension Cube Attack on Stream Ciphers Abstract: Keywords: 1. Introduction

Linear Extension Cube Attack on Stream Ciphers Abstract: Keywords: 1. Introduction Lnear Exenson Cube Aack on Sream Cphers Lren Dng Yongjuan Wang Zhufeng L (Language Engneerng Deparmen, Luo yang Unversy for Foregn Language, Luo yang cy, He nan Provnce, 47003, P. R. Chna) Absrac: Basng

More information

Temporal and Spatial Distributed Event Correlation for Network Security

Temporal and Spatial Distributed Event Correlation for Network Security Temoral and Saal Dsrbued Even Correlaon for Nework Secury Guofe Jang, Member, IEEE and George Cybenko, Fellow, IEEE Absrac - Comuer neworks roduce large amoun of evenbased daa ha can be colleced for nework

More information

MORE ON TVM, "SIX FUNCTIONS OF A DOLLAR", FINANCIAL MECHANICS. Copyright 2004, S. Malpezzi

MORE ON TVM, SIX FUNCTIONS OF A DOLLAR, FINANCIAL MECHANICS. Copyright 2004, S. Malpezzi MORE ON VM, "SIX FUNCIONS OF A DOLLAR", FINANCIAL MECHANICS Copyrgh 2004, S. Malpezz I wan everyone o be very clear on boh he "rees" (our basc fnancal funcons) and he "fores" (he dea of he cash flow model).

More information

An Optimisation-based Approach for Integrated Water Resources Management

An Optimisation-based Approach for Integrated Water Resources Management 20 h Euroean Symosum on Comuer Aded Process Engneerng ESCAPE20 S Perucc and G Buzz Ferrars (Edors) 2010 Elsever BV All rghs reserved An Omsaon-based Aroach for Inegraed Waer Resources Managemen Songsong

More information

Trading volume and stock market volatility: evidence from emerging stock markets

Trading volume and stock market volatility: evidence from emerging stock markets Invesmen Managemen and Fnancal Innovaons, Volume 5, Issue 4, 008 Guner Gursoy (Turkey), Asl Yuksel (Turkey), Aydn Yuksel (Turkey) Tradng volume and sock marke volaly: evdence from emergng sock markes Absrac

More information

Methodology of the CBOE S&P 500 PutWrite Index (PUT SM ) (with supplemental information regarding the CBOE S&P 500 PutWrite T-W Index (PWT SM ))

Methodology of the CBOE S&P 500 PutWrite Index (PUT SM ) (with supplemental information regarding the CBOE S&P 500 PutWrite T-W Index (PWT SM )) ehodology of he CBOE S&P 500 PuWre Index (PUT S ) (wh supplemenal nformaon regardng he CBOE S&P 500 PuWre T-W Index (PWT S )) The CBOE S&P 500 PuWre Index (cker symbol PUT ) racks he value of a passve

More information

Capacity Planning. Operations Planning

Capacity Planning. Operations Planning Operaons Plannng Capacy Plannng Sales and Operaons Plannng Forecasng Capacy plannng Invenory opmzaon How much capacy assgned o each producon un? Realsc capacy esmaes Sraegc level Moderaely long me horzon

More information

COMPETING ADVERTISING AND PRICING STRATEGIES FOR LOCATION-BASED COMMERCE

COMPETING ADVERTISING AND PRICING STRATEGIES FOR LOCATION-BASED COMMERCE COMPTING ADVRTISING AND PRICING STRATGIS FOR LOCATION-BASD COMMRC Nng-Yao Pa, Insue of Informaon Managemen Naonal Chao Tung Unversy, Tawan, krssy.a@msa.hne.ne Yung-Mng L, Insue of Informaon Managemen Naonal

More information

A Model for Time Series Analysis

A Model for Time Series Analysis Aled Mahemaal Senes, Vol. 6, 0, no. 5, 5735-5748 A Model for Tme Seres Analyss me A. H. Poo Sunway Unversy Busness Shool Sunway Unversy Bandar Sunway, Malaysa ahhn@sunway.edu.my Absra Consder a me seres

More information

GUIDANCE STATEMENT ON CALCULATION METHODOLOGY

GUIDANCE STATEMENT ON CALCULATION METHODOLOGY GUIDANCE STATEMENT ON CALCULATION METHODOLOGY Adopon Dae: 9/28/0 Effecve Dae: //20 Reroacve Applcaon: No Requred www.gpssandards.org 204 CFA Insue Gudance Saemen on Calculaon Mehodology GIPS GUIDANCE STATEMENT

More information

The Virtual Machine Resource Allocation based on Service Features in Cloud Computing Environment

The Virtual Machine Resource Allocation based on Service Features in Cloud Computing Environment Send Orders for Reprns o reprns@benhamscence.ae The Open Cybernecs & Sysemcs Journal, 2015, 9, 639-647 639 Open Access The Vrual Machne Resource Allocaon based on Servce Feaures n Cloud Compung Envronmen

More information

(Im)possibility of Safe Exchange Mechanism Design

(Im)possibility of Safe Exchange Mechanism Design (Im)possbly of Safe Exchange Mechansm Desgn Tuomas Sandholm Compuer Scence Deparmen Carnege Mellon Unversy 5 Forbes Avenue Psburgh, PA 15213 sandholm@cs.cmu.edu XaoFeng Wang Deparmen of Elecrcal and Compuer

More information

Template-Based Reconstruction of Surface Mesh Animation from Point Cloud Animation

Template-Based Reconstruction of Surface Mesh Animation from Point Cloud Animation Temlae-Based Reconsrucon of Surface Mesh Anmaon from Pon Cloud Anmaon Sang Il Park and Seong-Jae Lm In hs aer, we resen a mehod for reconsrucng a surface mesh anmaon sequence from on cloud anmaon daa.

More information

Genetic Algorithm with Range Selection Mechanism for Dynamic Multiservice Load Balancing in Cloud-Based Multimedia System

Genetic Algorithm with Range Selection Mechanism for Dynamic Multiservice Load Balancing in Cloud-Based Multimedia System ISSN : 2347-8446 (Onlne) Inernaonal Journal of Advanced Research n Genec Algorhm wh Range Selecon Mechansm for Dynamc Mulservce Load Balancng n Cloud-Based Mulmeda Sysem I Mchael Sadgun Rao Kona, II K.Purushoama

More information

An Architecture to Support Distributed Data Mining Services in E-Commerce Environments

An Architecture to Support Distributed Data Mining Services in E-Commerce Environments An Archecure o Suppor Dsrbued Daa Mnng Servces n E-Commerce Envronmens S. Krshnaswamy 1, A. Zaslavsky 1, S.W. Loke 2 School of Compuer Scence & Sofware Engneerng, Monash Unversy 1 900 Dandenong Road, Caulfeld

More information

Lecture 40 Induction. Review Inductors Self-induction RL circuits Energy stored in a Magnetic Field

Lecture 40 Induction. Review Inductors Self-induction RL circuits Energy stored in a Magnetic Field ecure 4 nducon evew nducors Self-nducon crcus nergy sored n a Magnec Feld 1 evew nducon end nergy Transfers mf Bv Mechancal energy ransform n elecrc and hen n hermal energy P Fv B v evew eformulaon of

More information

Multiple Periodic Preventive Maintenance for Used Equipment under Lease

Multiple Periodic Preventive Maintenance for Used Equipment under Lease Mulle Perodc Prevenve Manenance or Used Equmen under ease Paarasaya Boonyaha, Jarumon Jauronnaee, Member, IAENG Absrac Ugradng acon revenve manenance are alernaves o reduce he used equmen alures rae whch

More information

Anomaly Detection in Network Traffic Using Selected Methods of Time Series Analysis

Anomaly Detection in Network Traffic Using Selected Methods of Time Series Analysis I. J. Compuer Nework and Informaon Secury, 2015, 9, 10-18 Publshed Onlne Augus 2015 n MECS (hp://www.mecs-press.org/) DOI: 10.5815/jcns.2015.09.02 Anomaly Deecon n Nework Traffc Usng Seleced Mehods of

More information

MULTI-WORKDAY ERGONOMIC WORKFORCE SCHEDULING WITH DAYS OFF

MULTI-WORKDAY ERGONOMIC WORKFORCE SCHEDULING WITH DAYS OFF Proceedngs of he 4h Inernaonal Conference on Engneerng, Projec, and Producon Managemen (EPPM 203) MULTI-WORKDAY ERGONOMIC WORKFORCE SCHEDULING WITH DAYS OFF Tar Raanamanee and Suebsak Nanhavanj School

More information

Guidelines and Specification for the Construction and Maintenance of the. NASDAQ OMX Credit SEK Indexes

Guidelines and Specification for the Construction and Maintenance of the. NASDAQ OMX Credit SEK Indexes Gudelnes and Specfcaon for he Consrucon and Manenance of he NASDAQ OMX Cred SEK Indexes Verson as of Aprl 7h 2014 Conens Rules for he Consrucon and Manenance of he NASDAQ OMX Cred SEK Index seres... 3

More information

Cooperative Distributed Scheduling for Storage Devices in Microgrids using Dynamic KKT Multipliers and Consensus Networks

Cooperative Distributed Scheduling for Storage Devices in Microgrids using Dynamic KKT Multipliers and Consensus Networks Cooperave Dsrbued Schedulng for Sorage Devces n Mcrogrds usng Dynamc KK Mulplers and Consensus Newors Navd Rahbar-Asr Yuan Zhang Mo-Yuen Chow Deparmen of Elecrcal and Compuer Engneerng Norh Carolna Sae

More information

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge and

More information

The Rules of the Settlement Guarantee Fund. 1. These Rules, hereinafter referred to as "the Rules", define the procedures for the formation

The Rules of the Settlement Guarantee Fund. 1. These Rules, hereinafter referred to as the Rules, define the procedures for the formation Vald as of May 31, 2010 The Rules of he Selemen Guaranee Fund 1 1. These Rules, herenafer referred o as "he Rules", defne he procedures for he formaon and use of he Selemen Guaranee Fund, as defned n Arcle

More information

Optimization of Nurse Scheduling Problem with a Two-Stage Mathematical Programming Model

Optimization of Nurse Scheduling Problem with a Two-Stage Mathematical Programming Model Asa Pacfc Managemen Revew 15(4) (2010) 503-516 Opmzaon of Nurse Schedulng Problem wh a Two-Sage Mahemacal Programmng Model Chang-Chun Tsa a,*, Cheng-Jung Lee b a Deparmen of Busness Admnsraon, Trans World

More information

Case Study on Web Service Composition Based on Multi-Agent System

Case Study on Web Service Composition Based on Multi-Agent System 900 JOURNAL OF SOFTWARE, VOL. 8, NO. 4, APRIL 2013 Case Sudy on Web Servce Composon Based on Mul-Agen Sysem Shanlang Pan Deparmen of Compuer Scence and Technology, Nngbo Unversy, Chna PanShanLang@gmal.com

More information

RESOLUTION OF THE LINEAR FRACTIONAL GOAL PROGRAMMING PROBLEM

RESOLUTION OF THE LINEAR FRACTIONAL GOAL PROGRAMMING PROBLEM Revsa Elecrónca de Comuncacones y Trabajos de ASEPUMA. Rec@ Volumen Págnas 7 a 40. RESOLUTION OF THE LINEAR FRACTIONAL GOAL PROGRAMMING PROBLEM RAFAEL CABALLERO rafael.caballero@uma.es Unversdad de Málaga

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Revision: June 12, 2010 215 E Main Suite D Pullman, WA 99163 (509) 334 6306 Voice and Fax

Revision: June 12, 2010 215 E Main Suite D Pullman, WA 99163 (509) 334 6306 Voice and Fax .3: Inucors Reson: June, 5 E Man Sue D Pullman, WA 9963 59 334 636 Voce an Fax Oerew We connue our suy of energy sorage elemens wh a scusson of nucors. Inucors, lke ressors an capacors, are passe wo-ermnal

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

HEDGING METHODOLOGIES IN EQUITY-LINKED LIFE INSURANCE. Alexander Melnikov University of Alberta, Edmonton e-mail: melnikov@ualberta.

HEDGING METHODOLOGIES IN EQUITY-LINKED LIFE INSURANCE. Alexander Melnikov University of Alberta, Edmonton e-mail: melnikov@ualberta. HDGING MHODOLOGI IN QUIY-LINKD LIF INURANC Aleander Melnkov Unversy of Alera dmonon e-mal: melnkov@ualera.ca. Formulaon of he Prolem and Inroducory Remarks. he conracs we are gong o sudy have wo yes of

More information

COASTAL CAROLINA COMMUNITY COLLEGE

COASTAL CAROLINA COMMUNITY COLLEGE 20152016 BULLETI N Foradd onal nf or ma onpl easev s :h p: / / www. coas al car ol na. edu/ academ cs/ webs es/ f r e/ COASTAL CAROLINA COMMUNITY COLLEGE Equal Educaon Opporuny and Equal Employmen Opporuny

More information

HAND: Highly Available Dynamic Deployment Infrastructure for Globus Toolkit 4

HAND: Highly Available Dynamic Deployment Infrastructure for Globus Toolkit 4 HAND: Hghly Avalable Dynamc Deploymen Infrasrucure for Globus Toolk 4 L Q 1, Ha Jn 1, Ian Foser,3, Jarek Gawor 1 Huazhong Unversy of Scence and Technology, Wuhan, 430074, Chna quck@chnagrd.edu.cn; hjn@hus.edu.cn

More information

Network Effects on Standard Software Markets: A Simulation Model to examine Pricing Strategies

Network Effects on Standard Software Markets: A Simulation Model to examine Pricing Strategies Nework Effecs on Sandard Sofware Markes Page Nework Effecs on Sandard Sofware Markes: A Smulaon Model o examne Prcng Sraeges Peer Buxmann Absrac Ths paper examnes sraeges of sandard sofware vendors, n

More information

Effects of Terms of Trade Gains and Tariff Changes on the Measurement of U.S. Productivity Growth *

Effects of Terms of Trade Gains and Tariff Changes on the Measurement of U.S. Productivity Growth * Effecs of Terms of Trade Gans and Tarff Changes on he Measuremen of U.S. Producvy Growh * Rober C. Feensra Unversy of Calforna-Davs and NBER Benjamn R. Mandel Federal Reserve Bank of New York Marshall

More information

INTERNATIONAL JOURNAL OF STRATEGIC MANAGEMENT

INTERNATIONAL JOURNAL OF STRATEGIC MANAGEMENT IJSM, Volume, Number, 0 ISSN: 555-4 INTERNATIONAL JOURNAL OF STRATEGIC MANAGEMENT SPONSORED BY: Angelo Sae Unversy San Angelo, Texas, USA www.angelo.edu Managng Edors: Professor Alan S. Khade, Ph.D. Calforna

More information

Oblique incidence: Interface between dielectric media

Oblique incidence: Interface between dielectric media lecrmagnec Felds Oblque ncdence: Inerface beween delecrc meda Cnsder a planar nerface beween w delecrc meda. A plane wave s ncden a an angle frm medum. The nerface plane defnes he bundary beween he meda.

More information

HEURISTIC ALGORITHM FOR SINGLE RESOURCE CONSTRAINED PROJECT SCHEDULING PROBLEM BASED ON THE DYNAMIC PROGRAMMING

HEURISTIC ALGORITHM FOR SINGLE RESOURCE CONSTRAINED PROJECT SCHEDULING PROBLEM BASED ON THE DYNAMIC PROGRAMMING Yugoslav Journal o Operaons Research Volume 19 (2009) Number 2, 281-298 DOI:10.2298/YUJOR0902281S HEURISTIC ALGORITHM FOR SINGLE RESOURCE CONSTRAINED PROJECT SCHEDULING PROBLEM BASED ON THE DYNAMIC PROGRAMMING

More information

MODEL-BASED APPROACH TO CHARACTERIZATION OF DIFFUSION PROCESSES VIA DISTRIBUTED CONTROL OF ACTUATED SENSOR NETWORKS

MODEL-BASED APPROACH TO CHARACTERIZATION OF DIFFUSION PROCESSES VIA DISTRIBUTED CONTROL OF ACTUATED SENSOR NETWORKS MODEL-BASED APPROACH TO CHARACTERIZATION OF DIFFUSION PROCESSES IA DISTRIBUTED CONTROL OF ACTUATED SENSOR NETWORKS Kevn L. Moore and YangQuan Chen Cener for Self-Organzng and Inellgen Sysems Uah Sae Unversy

More information

CLoud computing has recently emerged as a new

CLoud computing has recently emerged as a new 1 A Framework of Prce Bddng Confguraons for Resource Usage n Cloud Compung Kenl L, Member, IEEE, Chubo Lu, Keqn L, Fellow, IEEE, and Alber Y. Zomaya, Fellow, IEEE Absrac In hs paper, we focus on prce bddng

More information

PerfCenter: A Methodology and Tool for Performance Analysis of Application Hosting Centers

PerfCenter: A Methodology and Tool for Performance Analysis of Application Hosting Centers PerfCener: A Mehodology and Tool for Performance Analyss of Applcaon Hosng Ceners Rukma P. Verlekar, Varsha Ape, Prakhar Goyal, Bhavsh Aggarwal Dep. of Compuer Scence and Engneerng Indan Insue of Technology

More information

COASTAL CAROLINA COMMUNITY COLLEGE

COASTAL CAROLINA COMMUNITY COLLEGE Eme r ge nc ymanage me n BULLETI N20152016 Foradd onal nf or ma on,pl eas ev s h p: c oas al c ar ol na. edu ac adem c s webs es ep COASTAL CAROLINA COMMUNITY COLLEGE Equal Educaon Opporuny and Equal Employmen

More information

A Heuristic Solution Method to a Stochastic Vehicle Routing Problem

A Heuristic Solution Method to a Stochastic Vehicle Routing Problem A Heursc Soluon Mehod o a Sochasc Vehcle Roung Problem Lars M. Hvaum Unversy of Bergen, Bergen, Norway. larsmh@.ub.no Arne Løkkeangen Molde Unversy College, 6411 Molde, Norway. Arne.Lokkeangen@hmolde.no

More information

Wilmar Deliverable D6.2 (b) Wilmar Joint Market Model Documentation. Peter Meibom, Helge V. Larsen, Risoe National Laboratory

Wilmar Deliverable D6.2 (b) Wilmar Joint Market Model Documentation. Peter Meibom, Helge V. Larsen, Risoe National Laboratory Rsø-R-1552(EN) Wlmar Delverable D6.2 (b) Wlmar Jon Marke Model Documenaon Peer Mebom, Helge V. Larsen, Rsoe Naonal Laboraory Rüdger Barh, Heke Brand, IER, Unversy of Sugar Chrsoph Weber, Olver Voll, Unversy

More information

Structural jump-diffusion model for pricing collateralized debt obligations tranches

Structural jump-diffusion model for pricing collateralized debt obligations tranches Appl. Mah. J. Chnese Unv. 010, 54): 40-48 Srucural jump-dffuson model for prcng collaeralzed deb oblgaons ranches YANG Ru-cheng Absrac. Ths paper consders he prcng problem of collaeralzed deb oblgaons

More information

Comparative Study of Multicast Authentication Schemes with Application to Wide-Area Measurement System

Comparative Study of Multicast Authentication Schemes with Application to Wide-Area Measurement System Comparave Sudy of Mulcas Auhencaon Schemes wh Applcaon o Wde-Area Measuremen Sysem Yee We Law Deparmen of EEE The Unversy of Melbourne Ausrala ywlaw@unmelbeduau Slaven Marusc Deparmen of EEE The Unversy

More information

12/7/2011. Procedures to be Covered. Time Series Analysis Using Statgraphics Centurion. Time Series Analysis. Example #1 U.S.

12/7/2011. Procedures to be Covered. Time Series Analysis Using Statgraphics Centurion. Time Series Analysis. Example #1 U.S. Tme Seres Analyss Usng Sagraphcs Cenuron Nel W. Polhemus, CTO, SaPon Technologes, Inc. Procedures o be Covered Descrpve Mehods (me sequence plos, auocorrelaon funcons, perodograms) Smoohng Seasonal Decomposon

More information

APPLICATION OF CHAOS THEORY TO ANALYSIS OF COMPUTER NETWORK TRAFFIC Liudvikas Kaklauskas, Leonidas Sakalauskas

APPLICATION OF CHAOS THEORY TO ANALYSIS OF COMPUTER NETWORK TRAFFIC Liudvikas Kaklauskas, Leonidas Sakalauskas The XIII Inernaonal Conference Appled Sochasc Models and Daa Analyss (ASMDA-2009) June 30-July 3 2009 Vlnus LITHUANIA ISBN 978-9955-28-463-5 L. Sakalauskas C. Skadas and E. K. Zavadskas (Eds.): ASMDA-2009

More information

Market-Clearing Electricity Prices and Energy Uplift

Market-Clearing Electricity Prices and Energy Uplift Marke-Clearng Elecrcy Prces and Energy Uplf Paul R. Grbk, Wllam W. Hogan, and Susan L. Pope December 31, 2007 Elecrcy marke models requre energy prces for balancng, spo and shor-erm forward ransacons.

More information

Currency Exchange Rate Forecasting from News Headlines

Currency Exchange Rate Forecasting from News Headlines Currency Exchange Rae Forecasng from News Headlnes Desh Peramunelleke Raymond K. Wong School of Compuer Scence & Engneerng Unversy of New Souh Wales Sydney, NSW 2052, Ausrala deshp@cse.unsw.edu.au wong@cse.unsw.edu.au

More information

A robust optimisation approach to project scheduling and resource allocation. Elodie Adida* and Pradnya Joshi

A robust optimisation approach to project scheduling and resource allocation. Elodie Adida* and Pradnya Joshi In. J. Servces Operaons and Informacs, Vol. 4, No. 2, 2009 169 A robus opmsaon approach o projec schedulng and resource allocaon Elode Adda* and Pradnya Josh Deparmen of Mechancal and Indusral Engneerng,

More information

RISK-BASED REPLACEMENT STRATEGIES FOR REDUNDANT DETERIORATING REINFORCED CONCRETE PIPE NETWORKS

RISK-BASED REPLACEMENT STRATEGIES FOR REDUNDANT DETERIORATING REINFORCED CONCRETE PIPE NETWORKS RISK-BASED REPLACEMENT STRATEGIES FOR REDUNDANT DETERIORATING REINFORCED CONCRETE PIPE NETWORKS Bryan Adey, Olivier Bernard 2 and Bruno Gerard 2 Division of Mainenance and Safey, Faculy of Archiecure,

More information

Social security, education, retirement and growth*

Social security, education, retirement and growth* Hacenda P úblca Espa ñola / Revsa de Econom ía P úblca, 198-(3/2011): 9-36 2011, Insuo de Esudos Fscales Socal secury, educaon, reremen and growh* CRUZ A. ECHEVARR ÍA AMAIA IZA** Unversdad del Pa ís Vasco

More information

CALCULATION OF OMX TALLINN

CALCULATION OF OMX TALLINN CALCULATION OF OMX TALLINN CALCULATION OF OMX TALLINN 1. OMX Tallinn index...3 2. Terms in use...3 3. Comuaion rules of OMX Tallinn...3 3.1. Oening, real-ime and closing value of he Index...3 3.2. Index

More information

THE IMPACT OF UNSECURED DEBT ON FINANCIAL DISTRESS AMONG BRITISH HOUSEHOLDS. Ana del Río and Garry Young. Documentos de Trabajo N.

THE IMPACT OF UNSECURED DEBT ON FINANCIAL DISTRESS AMONG BRITISH HOUSEHOLDS. Ana del Río and Garry Young. Documentos de Trabajo N. THE IMPACT OF UNSECURED DEBT ON FINANCIAL DISTRESS AMONG BRITISH HOUSEHOLDS 2005 Ana del Río and Garry Young Documenos de Trabajo N.º 0512 THE IMPACT OF UNSECURED DEBT ON FINANCIAL DISTRESS AMONG BRITISH

More information

Boosting for Learning Multiple Classes with Imbalanced Class Distribution

Boosting for Learning Multiple Classes with Imbalanced Class Distribution Boosng for Learnng Mulple Classes wh Imbalanced Class Dsrbuon Yanmn Sun Deparmen of Elecrcal and Compuer Engneerng Unversy of Waerloo Waerloo, Onaro, Canada y8sun@engmal.uwaerloo.ca Mohamed S. Kamel Deparmen

More information

Inter-domain Alliance Authentication Protocol Based on Blind Signature

Inter-domain Alliance Authentication Protocol Based on Blind Signature Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan

More information

A Background Layer Model for Object Tracking through Occlusion

A Background Layer Model for Object Tracking through Occlusion A Background Layer Model for Obec Trackng hrough Occluson Yue Zhou and Ha Tao Deparmen of Compuer Engneerng Unversy of Calforna, Sana Cruz, CA 95064 {zhou,ao}@soe.ucsc.edu Absrac Moon layer esmaon has

More information

DEPARTMENT OF ECONOMETRICS AND BUSINESS STATISTICS. Exponential Smoothing for Inventory Control: Means and Variances of Lead-Time Demand

DEPARTMENT OF ECONOMETRICS AND BUSINESS STATISTICS. Exponential Smoothing for Inventory Control: Means and Variances of Lead-Time Demand ISSN 440-77X ISBN 0 736 094 X AUSTRALIA DEPARTMENT OF ECONOMETRICS AND BUSINESS STATISTICS Exponenal Smoohng for Invenory Conrol: Means and Varances of Lead-Tme Demand Ralph D. Snyder, Anne B. Koehler,

More information

Using Cellular Automata for Improving KNN Based Spam Filtering

Using Cellular Automata for Improving KNN Based Spam Filtering The Inernaonal Arab Journal of Informaon Technology, Vol. 11, No. 4, July 2014 345 Usng Cellular Auomaa for Improvng NN Based Spam Flerng Faha Bargou, Bouzane Beldjlal, and Baghdad Aman Compuer Scence

More information

Secure and Efficient Proof of Storage with Deduplication

Secure and Efficient Proof of Storage with Deduplication Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono qzheng@cs.utsa.edu Shouhua Xu Department of Computer Scence Unversty of Texas

More information

Pedro M. Castro Iiro Harjunkoski Ignacio E. Grossmann. Lisbon, Portugal Ladenburg, Germany Pittsburgh, USA

Pedro M. Castro Iiro Harjunkoski Ignacio E. Grossmann. Lisbon, Portugal Ladenburg, Germany Pittsburgh, USA Pedro M. Casro Iro Harjunkosk Ignaco E. Grossmann Lsbon Porugal Ladenburg Germany Psburgh USA 1 Process operaons are ofen subjec o energy consrans Heang and coolng ules elecrcal power Avalably Prce Challengng

More information

XPFCP : An extended Particle Filter for tracking multiple and dynamic objects in complex environments *

XPFCP : An extended Particle Filter for tracking multiple and dynamic objects in complex environments * XPFCP : An exended Parcle Fler for rackng mulle and dynamc objecs n comlex envronmens * Mara Marrón, Juan C. García, Mguel A. Soelo, Davd Fernández and Danel Pzarro Dearmen of Elecroncs. Unversy of Alcalá

More information

THEORETICAL STUDY ON PIPE OF TAPERED THICKNESS WITH AN INTERNAL FLOW TO ESTIMATE NATURAL FREQUENCY

THEORETICAL STUDY ON PIPE OF TAPERED THICKNESS WITH AN INTERNAL FLOW TO ESTIMATE NATURAL FREQUENCY Inernaonal Journal of Mechancal Engneerng and Technology (IJMET) Volue 7, Issue, March-Arl 6,., Arcle ID: IJMET_7 Avalable onlne a h://www.aee.co/ijmet/ssues.as?jtye=ijmet&vtye=7&itye= Journal Iac Facor

More information

Optimal portfolio allocation with Asian hedge funds and Asian REITs

Optimal portfolio allocation with Asian hedge funds and Asian REITs Omal orfolo allocaon wh Asan hedge funds and Asan ehan Höch HVB-Insue for Mahemacal Fnance echnsche Unversä München German E-mal: hoech@ma.um.de ah Hwa Ng Drecor Rsk Managemen Insue Naonal Unvers of ngaore

More information

An Ensemble Data Mining and FLANN Combining Short-term Load Forecasting System for Abnormal Days

An Ensemble Data Mining and FLANN Combining Short-term Load Forecasting System for Abnormal Days JOURNAL OF SOFTWARE, VOL. 6, NO. 6, JUNE 0 96 An Ensemble Daa Mnng and FLANN Combnng Shor-erm Load Forecasng Sysem for Abnormal Days Mng L College of Auomaon, Guangdong Unversy of Technology, Guangzhou,

More information

The Transport Equation

The Transport Equation The Transpor Equaion Consider a fluid, flowing wih velociy, V, in a hin sraigh ube whose cross secion will be denoed by A. Suppose he fluid conains a conaminan whose concenraion a posiion a ime will be

More information

An Anti-spam Filter Combination Framework for Text-and-Image Emails through Incremental Learning

An Anti-spam Filter Combination Framework for Text-and-Image Emails through Incremental Learning An An-spam Fler Combnaon Framework for Tex-and-Image Emals hrough Incremenal Learnng 1 Byungk Byun, 1 Chn-Hu Lee, 2 Seve Webb, 2 Danesh Iran, and 2 Calon Pu 1 School of Elecrcal & Compuer Engr. Georga

More information

Event Based Project Scheduling Using Optimized Ant Colony Algorithm Vidya Sagar Ponnam #1, Dr.N.Geethanjali #2

Event Based Project Scheduling Using Optimized Ant Colony Algorithm Vidya Sagar Ponnam #1, Dr.N.Geethanjali #2 Inernaonal Journal of Compuer Trends and Technology (IJCTT) Volume 18 Number 6 Dec 2014 Even Based Projec Schedulng Usng Opmzed An Colony Algorhm Vdya Sagar Ponnam #1, Dr.N.Geehanjal #2 1 Research Scholar,

More information

Scientific Ontology Construction Based on Interval Valued Fuzzy Theory under Web 2.0

Scientific Ontology Construction Based on Interval Valued Fuzzy Theory under Web 2.0 JOUNAL OF SOFTWAE, VOL. 8, NO. 8, AUGUST 2013 1835 Scenfc Onology Consrucon Based on Inerval Valued Fuzzy Theory under Web 2.0 Na Xue, Sulng Ja, Jnxng Hao and Qang Wang School of Economcs and Managemen,

More information

HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD

HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD Journal of Appled Mahemacs and Compuaonal Mechancs 3, (), 45-5 HEAT CONDUCTION PROBLEM IN A TWO-LAYERED HOLLOW CYLINDER BY USING THE GREEN S FUNCTION METHOD Sansław Kukla, Urszula Sedlecka Insue of Mahemacs,

More information

Cost- and Energy-Aware Load Distribution Across Data Centers

Cost- and Energy-Aware Load Distribution Across Data Centers - and Energy-Aware Load Dsrbuon Across Daa Ceners Ken Le, Rcardo Banchn, Margare Maronos, and Thu D. Nguyen Rugers Unversy Prnceon Unversy Inroducon Today, many large organzaons operae mulple daa ceners.

More information

Proceedings of the 2008 Winter Simulation Conference S. J. Mason, R. R. Hill, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds.

Proceedings of the 2008 Winter Simulation Conference S. J. Mason, R. R. Hill, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. Proceedngs of he 008 Wner Smulaon Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. DEMAND FORECAST OF SEMICONDUCTOR PRODUCTS BASED ON TECHNOLOGY DIFFUSION Chen-Fu Chen,

More information

Provable Ownership of File in De-duplication Cloud Storage

Provable Ownership of File in De-duplication Cloud Storage 1 Provable Ownershi of File in De-dulication Cloud Storage Chao Yang, Jian Ren and Jianfeng Ma School of CS, Xidian University Xi an, Shaanxi, 710071. Email: {chaoyang, jfma}@mail.xidian.edu.cn Deartment

More information

WHAT ARE OPTION CONTRACTS?

WHAT ARE OPTION CONTRACTS? WHAT ARE OTION CONTRACTS? By rof. Ashok anekar An oion conrac is a derivaive which gives he righ o he holder of he conrac o do 'Somehing' bu wihou he obligaion o do ha 'Somehing'. The 'Somehing' can be

More information

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE R.REVATHI # PG Scholar #, Bharathiyar Institute Of Engineering for Women, Deviyakurichi, Salem(DT) India

More information

MODELING OF A CANTILEVER BEAM FOR PIEZOELECTRIC ENERGY HARVESTING

MODELING OF A CANTILEVER BEAM FOR PIEZOELECTRIC ENERGY HARVESTING MODELING OF A CANTILEVER BEAM FOR PIEZOELECTRIC ENERGY HARVESTING Andreza Tangerno Mneo, Mere Perera de Souza Braun, Hélo Aarecdo Navarro, Paulo Sérgo Varoo Dearameno de Engenhara Mecânca, Escola de Engenhara

More information

The impact of unsecured debt on financial distress among British households

The impact of unsecured debt on financial distress among British households The mpac of unsecured deb on fnancal dsress among Brsh households Ana Del-Río* and Garr Young** Workng Paper no. 262 * Banco de España. Alcalá, 50. 28014 Madrd, Span Emal: adelro@bde.es ** Fnancal Sabl,

More information

Index Mathematics Methodology

Index Mathematics Methodology Index Mahemacs Mehodology S&P Dow Jones Indces: Index Mehodology Ocober 2015 Table of Conens Inroducon 4 Dfferen Varees of Indces 4 The Index Dvsor 5 Capalzaon Weghed Indces 6 Defnon 6 Adjusmens o Share

More information

ROCK clustering algorithm based on the P system with active membranes

ROCK clustering algorithm based on the P system with active membranes Yuzhen Zhao Xyu Lu Wenng Wang ROCK cluserng algorhm based on he P sysem wh acve membranes YUZHEN ZHAO XIYU LIU WENPING WANG School of Managemen Scence and Engneerng Shandong Normal Unversy Jnan Shandong

More information

The Performance of Seasoned Equity Issues in a Risk- Adjusted Environment?

The Performance of Seasoned Equity Issues in a Risk- Adjusted Environment? The Performance of Seasoned Equy Issues n a Rsk- Adjused Envronmen? Allen, D.E., and V. Souck 2 Deparmen of Accounng, Fnance and Economcs, Edh Cowan Unversy, W.A. 2 Erdeon Group, Sngapore Emal: d.allen@ecu.edu.au

More information

Levy-Grant-Schemes in Vocational Education

Levy-Grant-Schemes in Vocational Education Levy-Gran-Schemes n Vocaonal Educaon Sefan Bornemann Munch Graduae School of Economcs Inernaonal Educaonal Economcs Conference Taru, Augus 26h, 2005 Sefan Bornemann / MGSE Srucure Movaon and Objecve Leraure

More information

A STUDY ON THE CAUSAL RELATIONSHIP BETWEEN RELATIVE EQUITY PERFORMANCE AND THE EXCHANGE RATE

A STUDY ON THE CAUSAL RELATIONSHIP BETWEEN RELATIVE EQUITY PERFORMANCE AND THE EXCHANGE RATE A STUDY ON THE CAUSAL RELATIONSHIP BETWEEN RELATIVE EQUITY PERFORMANCE AND THE EXCHANGE RATE The Swedsh Case Phlp Barsk* and Magnus Cederlöf Maser s Thess n Inernaonal Economcs Sockholm School of Economcs

More information

II. IMPACTS OF WIND POWER ON GRID OPERATIONS

II. IMPACTS OF WIND POWER ON GRID OPERATIONS IEEE Energy2030 Alana, Georga, USA 17-18 November 2008 Couplng Wnd Generaors wh eferrable Loads A. Papavaslou, and S. S. Oren UC Berkeley, eparmen of Indusral Engneerng and Operaons esearch, 4141 Echeverry

More information

Ground rules. Guide to the calculation methods of the FTSE Actuaries UK Gilts Index Series v1.9

Ground rules. Guide to the calculation methods of the FTSE Actuaries UK Gilts Index Series v1.9 Ground rules Gude o he calculaon mehods of he FTSE Acuares UK Gls Index Seres v1.9 fserussell.com Ocober 2015 Conens 1.0 Inroducon... 4 1.1 Scope... 4 1.2 FTSE Russell... 5 1.3 Overvew of he calculaons...

More information

SHIPPING ECONOMIC ANALYSIS FOR ULTRA LARGE CONTAINERSHIP

SHIPPING ECONOMIC ANALYSIS FOR ULTRA LARGE CONTAINERSHIP Journal of he Easern Asa Socey for Transporaon Sudes, Vol. 6, pp. 936-951, 2005 SHIPPING ECONOMIC ANALYSIS FOR ULTRA LARGE CONTAINERSHIP Chaug-Ing HSU Professor Deparen of Transporaon Technology and Manageen

More information

Kalman filtering as a performance monitoring technique for a propensity scorecard

Kalman filtering as a performance monitoring technique for a propensity scorecard Kalman flerng as a performance monorng echnque for a propensy scorecard Kaarzyna Bjak * Unversy of Souhampon, Souhampon, UK, and Buro Informacj Kredyowej S.A., Warsaw, Poland Absrac Propensy scorecards

More information

Attribution Strategies and Return on Keyword Investment in Paid Search Advertising

Attribution Strategies and Return on Keyword Investment in Paid Search Advertising Arbuon Sraeges and Reurn on Keyword Invesmen n Pad Search Adversng by Hongshuang (Alce) L, P. K. Kannan, Sva Vswanahan and Abhshek Pan * December 15, 2015 * Honshuang (Alce) L s Asssan Professor of Markeng,

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Towards a Trustworthy and Controllable Peer- Server-Peer Media Streaming: An Analytical Study and An Industrial Perspective

Towards a Trustworthy and Controllable Peer- Server-Peer Media Streaming: An Analytical Study and An Industrial Perspective Towards a Trusworhy and Conrollable Peer- Server-Peer Meda Sreamn: An Analycal Sudy and An Indusral Perspecve Zhja Chen, Hao Yn, Chuan n, Xuenn u, Yan Chen* Deparmen of Compuer Scence & Technoloy, *Deparmen

More information

t φρ ls l ), l = o, w, g,

t φρ ls l ), l = o, w, g, Reservor Smulaon Lecure noe 6 Page 1 of 12 OIL-WATER SIMULATION - IMPES SOLUTION We have prevously lsed he mulphase flow equaons for one-dmensonal, horzonal flow n a layer of consan cross seconal area

More information

Ground rules. FTSE Global Bonds Index Series v1.7

Ground rules. FTSE Global Bonds Index Series v1.7 Ground rules FTSE Global Bonds Index Seres v.7 fserussell.com Ocober 205 Conens.0 Inroducon... 3 2.0 Managemen responsbles... 7 3.0 Elgble of secures... 9 4.0 rce sources... 5.0 erodc Change o he orfolos...

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

A Real-time Adaptive Traffic Monitoring Approach for Multimedia Content Delivery in Wireless Environment *

A Real-time Adaptive Traffic Monitoring Approach for Multimedia Content Delivery in Wireless Environment * A Real-e Adapve Traffc Monorng Approach for Muleda Conen Delvery n Wreless Envronen * Boonl Adpa and DongSong Zhang Inforaon Syses Deparen Unversy of Maryland, Balore Couny Balore, MD, U.S.A. bdpa1@ubc.edu,

More information

Auxiliary Module for Unbalanced Three Phase Loads with a Neutral Connection

Auxiliary Module for Unbalanced Three Phase Loads with a Neutral Connection CODEN:LUTEDX/TEIE-514/1-141/6 Indusral Elecrcal Engneerng and Auomaon Auxlary Module for Unbalanced Three Phase Loads wh a Neural Connecon Nls Lundsröm Rkard Sröman Dep. of Indusral Elecrcal Engneerng

More information

A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting*

A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting* journal of compuer and sysem scences 55, 119139 (1997) arcle no. SS971504 A Decson-heorec Generalzaon of On-Lne Learnng and an Applcaon o Boosng* Yoav Freund and Rober E. Schapre - A6 Labs, 180 Park Avenue,

More information

Cooperative Random Walk for Pipe Network Layout Optimization

Cooperative Random Walk for Pipe Network Layout Optimization Inernaonal Journal of Aled Engneerng Research ISSN 0973-4562 Volume 11, Number 4 (2016) 2839-2847 Research Inda Publcaons. h://www.rublcaon.com Cooerave Random Walk for Pe Nework Layou Omzaon Sefan Ivć*

More information

RISK MONITORING OF FIXED INCOME PORTFOLIOS

RISK MONITORING OF FIXED INCOME PORTFOLIOS UNIVERSITÉ PARIS I PANTHÉON-SORBONNE M Ingénere du Rsque Sécalé Professonnelle - Fnance Shela ROSEMBERG RISK MONITORING OF FIXED INCOME PORTFOLIOS Analyss of Wlshre Axom Facor Model Dae: 6 h, Seember 008

More information