A Structure Preserving Database Encryption Scheme
|
|
- Luke Woods
- 8 years ago
- Views:
Transcription
1 A Structure Preservng Database Encryton Scheme Yuval Elovc, Ronen Wasenberg, Erez Shmuel, Ehud Gudes Ben-Guron Unversty of the Negev, Faculty of Engneerng, Deartment of Informaton Systems Engneerng, Postfach 653, 8405 Beer-Sheva, Israel {elovc, ronenwa, Ben-Guron Unversty of the Negev, Deartment of Comuter Scence, Postfach 653, 8405 Beer-Sheva, Israel Abstract. A new smle and effcent database encryton scheme s resented. The new scheme enables encrytng the entre content of the database wthout changng ts structure. In addton, the scheme suggests how to convert the conventonal database ndex to a secure ndex on the encryted database so that the tme comlexty of all queres s mantaned. No one wth access to the encryted database can learn anythng about ts content wthout havng the encryton ey. Introducton Database s an ntegral art of almost every nformaton system. Accordng to [] the ey features that databases roose are shared access, mnmal redundancy, data consstency, data ntegrty and controlled access. The case where databases hold crtcal and senstve nformaton s not rare, therefore an adequate level of rotecton to database content has to be rovded. Database securty methods can be dvded nto four layers []: hyscal securty [3], oeratng system securty [4, 5, 6], DBMS securty [7, 8, 9] and data encryton [0,, ]. The frst three layers alone are not suffcent to guarantee the securty of the database snce the database data s et n a readable form [3]. Anyone havng access to the database ncludng the DBA (Database Admnstrator), s caable of readng the data. In addton, the data s baced u frequently so access to the baced u data also needs to be controlled [4]. Moreover, a dstrbuted database system maes t harder to control the dsclosure of the data. Database encryton ntroduces an addtonal securty layer to the frst three layers mentoned above. It conceals the readable form of senstve nformaton even f the database s comromsed. Thus, anyone who manages to byass the conventonal database securty layers (e.g., an ntruder) or a DBA, s unable to read the senstve nformaton wthout the encryton ey. Furthermore, encryton can be used to mantan data ntegrty so that any unauthorzed changes of the data can easly be detected.
2 Database encryton can be mlemented at dfferent levels [4]: tables, columns, rows and cells. Encrytng the whole table, column or row entals the decryton of the whole table, column or row resectvely when a query s executed. Therefore, an mlementaton whch decryts only the data of nterest s referred. The database encryton scheme resented n [3] s based on the Chnese- Remnder theorem where each row s encryted usng dfferent sub-eys for dfferent cells. Ths scheme enables encryton at the level of rows and decryton at the level of cells. The database encryton scheme resented n [4] extends the encryton scheme resented n [3] by suortng multlayer access control. It classfes subjects and objects nto dstnct securty classes. The securty classes are ordered n a herarchy such that an object wth a artcular securty class can be accessed only by subjects n the same or a hgher securty class. In ths scheme, each row s encryted wth sub-eys accordng to the securty class of ts cells. One dsadvantage of both schemes s that the basc element n the database s a row and not a cell, thus the structure of the database needs to be changed. In addton, both schemes requre re-encrytng the whole row when a cell value s modfed. The conventonal way to rovde an effcent executon of database queres s by usng ndexes, but ndexes n an encryted database rase the queston of how to construct the ndex so that no nformaton about the database content s revealed [5, 6]. The ndexng scheme rovded n [7] s based on encrytng the whole row and assgnng a set dentfer to each value n ths row. When searchng a secfc value ts set dentfer s calculated and then assed to the server whch n turn returns to the clent a collecton of all rows wth values assgned to the same set. Fnally, the clent searches the secfc value n the returned collecton and retreves the desred rows. However, n ths scheme, equal values are always assgned to the same set, thus some nformaton s revealed when alyng statstcal attacs. The ndexng scheme rovded n [8] s based on constructng the ndex on the lantext values and encrytng each age of the ndex searately. Whenever a secfc age of the ndex s needed for rocessng a query, t s loaded nto memory and decryted. Snce the unform encryton of all ages s lely to rovde many cher breang clues, the ndexng scheme rovded n [9] suggests encrytng each ndex age usng a dfferent ey deendng on the age number. However, these schemes beng mlemented at the level of the oeratng system are not satsfactory. Assumng the ndex s mlemented as a B+-Tree, encrytng each of ts felds searately would reveal the orderng relatonsh between the chertext values. The ndexng scheme rovded n [5] suggests encrytng each node of the B+-Tree as a whole. However, snce references between the B+-Tree nodes are encryted together wth the ndex values, the ndex structure s concealed. In order to overcome the shortcomngs of exstng database encryton schemes, a new smle and effcent scheme for database encryton s roosed whch suggests how to encryt the entre content of the database wthout changng ts structure. Ths roerty allows the DBA to contnue managng the database wthout beng able to vew or manulate the database content. Moreover, anyone ganng access to the database can learn nothng about ts content wthout the encryton ey. The new scheme suggests how to construct a secure ndex on the encryted database so that the
3 tme comlexty of all queres s mantaned. Snce the database structure remans the same no changes are mosed on the queres. The remander of the aer s structured as follows: n secton the desred roertes of a database encryton scheme are outlned; n secton 3 the new database encryton scheme s llustrated; n secton 4 the desred roertes of a secure ndexng scheme are descrbed; n secton 5 a new ndexng scheme for the encryted database s roosed; n secton 6 erformance and mlementaton ssues are dscussed, and secton 7 resents our conclusons. The Desred Proertes of a Database Encryton Scheme Accordng to [3], a database encryton scheme should meet the followng requrements: ) The encryton scheme should ether be theoretcally or comutatonally secure (requre a hgh wor factor to brea t). ) Encryton and decryton should be fast enough so as not to degrade system erformance. 3) The encryted data should not have a sgnfcantly greater volume than the unencryted data. 4) Decryton of a record should not deend on other records. 5) Encrytng dfferent columns under dfferent eys should be ossble. 6) The encryton scheme should rotect aganst atterns matchng and substtuton of encryted values attacs. 7) Modfyng data by an unauthorzed user should be notced at decryton tme. 8) Recoverng nformaton from artal records (records where some cells have null values) should be the same as from full records. 9) The securty mechansm should be flexble and not ental any change n the structure of the database. A naïve aroach for database encryton s to encryt each cell searately but ths aroach has several drawbacs. Frst, two equal lantext values are encryted to equal chertext values. V ( V V V E E ) ( ) () Therefore, t s ossble, for examle, to collect statstcal nformaton as to how many dfferent values a secfed column currently has, and what are ther frequences. The same holds for the ablty to execute a jon oeraton between two tables and collect nformaton from the results. Second, t s ossble to swtch unnotced between two chertext values. Dfferent chertext values for equal lantext values can be acheved usng a olyalhabetc cher (e.g. Vernam). However, n ths soluton decryton of a record deends on other records and thus requrement 4 s volated. In the next secton a new database encryton scheme comlyng wth all the above requrements s resented.
4 3 A New Database Encryton Scheme The oston of a cell n the database s unque and can be dentfed usng the trlet that ncludes ts Table ID, Row ID, and Column ID. We wll refer to ths trlet as the cell coordnates. We suggest a new database encryton scheme where each database value s encryted wth ts unque cell coordnates. These coordnates are used n order to brea the correlaton between chertext and lantext values n an encryted database. The new scheme has two mmedate advantages. Frst, t elmnates substtuton attacs attemtng to swtch encryted values. Second, atterns matchng attacs attemtng to gather statstcs based on the database encryted values would fal. a) Table T before Encryton Row C b) Encryton of Table T Usng the Nave Aroach Row C 0 #$ ]{ &* 3 #$ 4 #$ 5 ^% 6 &* = c) Encryton of Table T Usng the New Scheme Row C 0!# :] &* 3 "/ 4 ~? 5 ^ 6 >\ 8 ){ 9 -+ Fg.. Database encryton usng two aroaches. Fgure llustrates database encryton usng two aroaches. Fgure a descrbes a database table (T) wth one data column (C). Fgure b descrbes encryton of table T usng the naïve aroach. Fgure c descrbes encryton of table T usng the new aroach where each cell s encryted wth ts cell coordnates. It s easy to see that equal lantext values n fgure a are encryted to dfferent chertext values n fgure c as oosed to the chertext values n fgure b.
5 3. Encryton/Decryton n the New Scheme Let us defne: V - A lantext value located n table t, row r and column c. : ( N N N) N - a functon that generates a number based on the database coordnates. Enc - A functon whch encryts a lantext value wth ts coordnates. Enc ( V ) E ( V ( t, r, c)) () Where s the encryton ey and E s a symmetrc encryton functon (e.g. DES, AES). X - A chertext value located n table t, row r and column c. X Dec - A functon whch decryts a chertext value ( X ) and dscards ts coordnates. K Enc ( V ) (3) Dec ( X ) D ( X ) ( T, R, C) V (4) Where s the decryton ey and D s a symmetrc decryton functon. 3. Data Integrty Encryton ensures that a user not ossessng the encryton ey cannot modfy a chertext value and redct the change n the lantext value. Usually the range of vald lantext values s sgnfcantly smaller than the whole range of ossble lantext values. Thus, the robablty that an unauthorzed change to a chertext value would result n a vald lantext value s neglgble. Therefore, unauthorzed changes to chertext values are lely to be notced at decryton tme. Substtuton attacs as oosed to atterns matchng attacs can not be revented smly by usng encryton. In the new scheme, each value s encryted wth ts unque cell coordnates. Therefore, tryng to decryt a value wth dfferent cell coordnates (e.g. as a result of a substtuton attac) would robably result n an nvald lantext value. If the range of vald lantext values s not sgnfcantly smaller than the whole ossble range, or nvald lantext values cannot be dstngushed from vald lantext values, encryton has to be carred out as follows: Enc K ( V ) E ( V ( t, r, c)) (5)
6 Snce ( t, r, c) s concatenated to the lantext value before encryton, attemtng to change the chertext value or tryng to swtch two chertext values would result n a corruted ( t, r, c) after decryton. Obvously, concatenatng ( t, r, c) results n data exanson. 3.3 Scheme Analyss The new database encryton scheme satsfes the requrements mentoned n secton : ) The scheme securty reles on the securty of the encryton algorthm used. In order to reveal some database value t has to be decryted usng the correct ey. ) Encryton and decryton are fast oeratons and are mandatory n any database encryton scheme. The roosed mlementaton adds the overhead of a Xor oeraton and comutaton whch are neglgble comared to encryton. 3) Usng encryton algorthms such as DES or AES whch are based on encrytng blocs of data results n value exanson (n many cases ths exanson s neglgble). 4) The basc element of reference s a database cell. Oeratons on a cell do not deend on or have any effect on other cells. 5) The roosed scheme facltates subschema mlementaton. Snce each cell s encryted searately, each column can be encryted under a dfferent ey. 6) The new scheme revents atterns matchng attacs snce there s no correlaton between a lantext value and a chertext value (acheved by usng encryton) and there s no correlaton between chertext values (acheved by usng before encryton). Substtuton attacs are also revented as dscussed n secton 3.. 7) Unauthorzed manulaton on the encryted data wthout the encryton ey would be notced at decryton tme. (see secton 3.) 8) As the basc element of reference s a database cell, t s ossble to recover nformaton from artally comleted records (records wth null values) n the same way as t s recovered from full records. 9) The new scheme comles wth the structure reservng requrements as the basc element of reference s a database cell. 4 The Desred Proertes of a Secure Indexng Scheme An ndex s a data structure suortng effcent access to data and ndexes are frequently used n databases. Most commercal databases even create a default ndex on the rmary-ey columns. Most databases mlement ndexes usng a B+-Tree whch mlementaton s dscussed n secton 6.. Key management s dscussed n secton 6.3.
7 s a data structure mantanng an ordered set of values and suortng effcent oeratons on ths set such as search, nsert, udate and delete. A trval aroach whch constructs an ndex over the lantext values would reduce securty snce the lantext values are exosed. Another aroach would cona) An Index Constructed on Column C n Table T b) Table Reresentaton of the Index ID Struct. Data 0, , , , , , , c) Table T Row C Fg.. An examle of a database ndex. Fgure llustrates a database ndex whch s constructed on column C n table T and s mlemented as a B+-Tree. A grahcal reresentaton of the B+-Tree s gven n fgure a; a table reresentaton of the B+-Tree s gven n fgure b and table T s gven n fgure c. Fgure b sharens the searaton between the ndex structure and ts data. A secure ndex n an encryted database has to comly wth the followng requrements: ) No nformaton about the database lantext values can be learned from the ndex. ) The secure ndex should not reduce the effcency of data access. 3) The secure ndex should not reduce the effcency of nsert, udate and delete oeratons. 4) The secure ndex should not have a sgnfcantly greater volume than an ordnary ndex. 5) The secure ndex structure should not dffer from a standard ndex. In ths way, a DBA can manage the ndex wthout the encryton ey.
8 struct the ndex over the database chertext values. In ths aroach, executng equalty queres s ossble but executng range queres s a roblem. Ths aroach would exose the ndex to atterns matchng attacs snce equal lantext values are encryted to equal chertext values. Moreover, snce executng range queres s a roblem, Oracle does not suort encrytng ndexed data [0]. In the next secton, a new ndexng scheme whch overcomes the shortcomngs of exstng ndexng schemes s resented. 5 A New Database Indexng Scheme Several ndexng schemes for encryted databases were roosed [5, 8, 7, ] that fulfll most of the requrements descrbed n secton 4 but none reserve the ndex structure. We clam that there should be a searaton between data and structure. For examle, A DBA should be able to manage database ndexes wthout the need of decrytng ts values. We suggest a new database ndexng scheme whch reserves the ndex structure where each ndex value s the result of encrytng a lantext value n the database concatenated wth ts row-d. Ths ensures that there s no correlaton between the ndex values and the database chertext values 3. Furthermore, the ndex does not reveal the statstcs or order of the database values. 5. Index Constructon n the New Scheme In order to construct an ndex, a set of values and a functon determnng the order 4 of these values are needed. Let us defne: C - An encryted database column that was encryted as defned n secton 3.. C - The column obtaned from decrytng columnc : Dec ( x )C x C (6) Where Dec s the decryton functon defned n secton 3.. C - The column obtaned from encrytng values n C concatenated wth ther row-ds: E ( V r) C V C (7) 3 If the database s encryted as descrbed n secton 3., then should not be mlemented as( t, r, c) r snce there wll be a strong correlaton between the ndex values and the database encryted values. 4 Some ndexes requre only an equalty functon and not an order functon to be constructed. In ths case, the term "order" n ths secton can be relaced by the term "equalty".
9 Where s the encryton ey, E s an encryton functon and r s the row d. : C C - A functon whch decryts a value n C (usng ey ) and dscards ts row-d: ( x) Dscard( D ( x), r ) (8) Where s the decryton ey, D s a decryton functon, r s the row-d, r s the length of r n bts, and Dscard ( v, n) stands for dscardng the n rghtmost bts of v. R - The values n C are ordered by the relaton R : R - The values n ( x, y) R x, yc And( x y) (9) C are ordered by the relaton R : ( x, y) R x, yc And( ( x), ( y)) R (0) The new ndex wll be constructed based on the values n an order functon. a) Encryton of Table T n the New Scheme C, usng the relaton b) Encryton of the Index n the New Scheme R as Row C 0 ( 5000 ( T,0, E ( 500 ( T,, E ( 000 ( T,, E 3 ( 7500 ( T,3, E ID Struct. Data 0, E (5000 0) 3,4 E (500 ) 5,6 E (7500 3) 3 4 E (000 ) 4 5 E (500 ) 5 6 E (5000 0) 6 - E (7500 3) Fg. 3. Encryton n the new scheme. Fgure 3 llustrates encryton of the table and the ndex whch were llustrated n fgure usng the new schemes. Fgure 3a descrbes the encryton of the table n the new scheme where each cell s encryted wth ts coordnates. Fgure 3b descrbes the encryton of the ndex where each ndex value s the result of encrytng a database lantext value concatenated wth ts row-d. It s easy to see that the table and ndex structure are not changed by the encryton rocess.
10 5. Executng a Query n the New Scheme The followng SQL query llustrates the retreval of all rows n table T, whch ther values n column C are greater or equal to V: SELECT * FROM T WHERE T.C>=V () The followng seudo code llustrates the retreval of row-ds of rows whch answer the above query. The seudo code assumes that the ndex s mlemented as a bnary B+-Tree. INPUT: A table T, a column C and a value V. OUTPUT: A collecton of row-ds. X := getindex(t, C).getRootNode(); Whle X s not a leaf Do If X.getData().getValue()<V Then X := X.getRghtSonNode(); Else X := X.getLeftSonNode(); End If; End Whle; RESULT := ; Whle X.getData().getValue()<V Do X := X.getRghtSblngNode(); End Whle; Whle X s not null Do RESULT := RESULT{X.getData().getRowId()}; X := X.getRghtSblngNode(); End Whle; Return RESULT; Each node n the ndex whch s not a leaf has a left son node, a rght son node and a data whch stores a value. Each leaf n the ndex has a rght sblng node and a data whch stores a value and a row-d. In the new scheme the data n each ndex node s an encryton of a database value concatenated wth ts row-d. Thus, the functons getvalue() and getrowid() need to be gven a new mlementaton n order to suort the new ndexng scheme. However, the above seudo code stands wthout any change. 5.3 Index Integrty In the new scheme, a substtuton attac whch attemts to substtute ndex values can be carred out wthout beng notced at decryton tme. If t s ossble to mantan a unque oston for each value n the ndex, ths nd of attac can be elmnated usng
11 a technque smlar to the one roosed n secton 3 where each value s encryted wth ts unque oston. a) Mantanng Data Integrty of Table T Row C 0 E ( 5000 ( T,0, E ( 500 ( T,, E ( 000 ( T,, 3 E ( 7500 ( T,3, b) Mantanng Data Integrty of the Index ID Struct. Data 0, E (5000 0) 3,4 E (500 ) 5,6 E (7500 ) 3 4 E ((000, ) 3) 4 5 E ((500,) 4) 5 6 E ((5000, 0) 5) 6 - E ((7500, 3) 6) Fg. 4. Mantanng data ntegrty. Fgure 4 llustrates data ntegrty mantenance of the table and the ndex whch were llustrated n fgure. Fgure 4a descrbes data ntegrty mantenance of the table as suggested n secton 3.. Fgure 4b descrbes data ntegrty mantenance of the ndex where each ndex value s concatenated to ts unque oston n the ndex (ID) and then encryted. We argue that wthout changng the ndex structure and affectng ts effcency, mantanng a unque oston for each value n the ndex s not a trval matter. 5.4 Scheme Analyss The new ndex mlementaton on an ordered set of values s dentcal to the ordnary ndex mlementaton. The only dfferences between the ordnary ndex and the new one are the set of values and the order functon defned on them. The new ndex comles wth the requrements mentoned n secton 4: ) Snce the values n the ndex are encryted and unque (acheved by concatenatng row-d) there s no correlaton between them as to the column chertext values, or the column lantext values. Therefore, no nformaton s revealed on the database data by the new ndex. ) The order functon s mlemented n a tme comlexty of O () snce decryton and dscardng bts are mlemented n a tme comlexty of O (). Therefore, data access usng the roosed ndex s as effcent as wth an ordnary ndex. 3) Determnng the order of two values s mlemented n a tme comlexty of O (). Therefore, the delete oeraton s as effcent as n an ordnary ndex. En-
12 crytng a new value s mlemented n a tme comlexty of O (), thus the effcency of nsert and udate oeratons s not changed. 4) Each value n the new ndex s a result of encrytng a database lantext value concatenated wth ts row-d, therefore the sace added for each node n the new ndex s fxed. Thus, the ndex sace comlexty remans the same. 5) The new ndex structure remans the same and only ts data s modfed. Thus, any admnstratve wor on the ndex can be carred out wthout the need of decrytng the ndex values. 6 Performance and Imlementaton Issues Imlementng the new schemes requres careful consderaton. Several erformance and mlementaton ssues are dscussed n ths secton. 6. Stable Cell Coordnates The roosed scheme assumes that cell coordnates are stable. That s, nsert, udate and delete oeratons do not change the coordnates of exstng cells. However, f a database reorganzaton rocess changes cell coordnates, all affected cells are to be re-encryted wth ther new coordnates and the ndex udated resectvely. A naïve mlementaton whch uses the row number n the table as the row-d, roves to be lmted n ths resect as row numbers are affected by nsert and delete oeratons. In the Oracle database, for examle, cell coordnates are stable. 6. Imlementng a Secure Functon As defned n secton 3., the values n the database are encryted as follows: Enc K ( V ) E ( V ( t, r, c)) () A secure mlementaton of would generate dfferent numbers for dfferent coordnates: t, r, c ) ( t, r, c ) ( t, r, c ) ( t, r, ) (3) ( c Unfortunately, generatng a unque number for each database coordnates may result n consderable data exanson. An alternatve mlementaton reducng the data exanson may result n collsons. Assume that there are two cells, whch generates two equal values for ther coordnates: t, r, c, t, r, c (4) [( t, r, c ) ( t, r, c )] [ ( t, r, c ) ( t, r, c )]
13 It s ossble to substtute the chertext values of these cells ( x tr c and x trc ) wthout beng corruted at decryton tme. If t s dffcult to fnd two cells such as those mentoned above, ths nd of attac can be revented. Ths can be acheved by usng a collson free hash functon. 6.3 Key Management Databases contan nformaton of dfferent senstvty degrees that have to be selectvely shared between a large numbers of users. The roosed scheme facltates subschema mlementaton snce each column can be encryted wth a dfferent ey. Encrytng each column wth a dfferent ey, results n a large number of eys for each legtmate user. However, usng the aroach roosed n [] can reduce the number of eys. It s suggested n [] how the smallest elements whch can be encryted usng the same ey accordng to the access control olcy can be found. Thus, the eys are generated accordng to the access control olcy n order to ee ther number mnmal. Ths aroach can be ncororated n the roosed scheme n order to encryt sets of columns wth the same ey n accordance wth the database access control olcy. 6.4 Performance In the new scheme, all conventonal algorthms reman the same snce the structure of the database remans the same. Ths ensures that the only overhead of the new scheme s that of encryton and decryton oeratons. 7. Conclusons In ths aer, a new structure reservng scheme for database encryton has been resented. In the new scheme, each database cell s encryted wth ts unque oston and ths guarantees that atterns matchng and substtuton attacs cannot succeed, thus, guaranteeng nformaton confdentalty and data ntegrty. A new database ndexng scheme that does not reveal any nformaton on the database lantext values was roosed. In the new scheme ndex values are encryted wth a unque number (the row-d of the database value) n order to elmnate atterns matchng attacs and any correlaton between ndex and database values. Ensurng ndex ntegrty s ossble f an ndex oston can be attached to each ndex value by smly usng a technque smlar to the one used for table encryton. The new schemes do not mose any changes on the database structure, thus enablng a DBA to manage the encryted database as any other non-encryted database. Furthermore, mlementng the new scheme n exstng alcatons does not ental modfyng the queres.
14 References. Date, C.J.: An Introducton to Database Systems. Vol., Ffth Edton. Addson Wesley, Massachusetts (990). Fernandez, E.B., Summers, R.C. and Wood C.: Database Securty and Integrty. Addson- Wesley, Massachusetts, (980) 3. Coer, J.A.: Comuter & Communcaton Securty: Strateges for the 990s. McGraw- Hll, New Yor (989) 4. Conway, R.W., Maxwell, W.L. and Morgan, H.L.: On the mlementaton of securty measures n nformaton systems. Communcatons of the ACM 5(4) (97) Graham, G.S. and Dennng, P.J.: Protecton - Prncles and ractce. Proc. Srng Jt. Comuter Conf., Vol. 40, AFIPS 47-49, Montrale, N.J. (97) 6. Hwang, M.S. and Yang, W.P.: A new dynamc access control scheme based on subjectobject-lst. Data and Knowledge Engneerng 4() (994) Garvey, C. and Wu, A.: ASD-Vews. Proc. IEEE Symosum on Securty and Prvacy, Oaland, Calforna (988) Lunt, T.F., Dennng, D.E., Schell, R.R., Hecman, M. and Shocley, W.R.: The SeaVew securty model. IEEE Trans. on Software Engneerng, SE-6(6) (990) Stachour, P.D. and Thurasngham, B.: Desgn of LDV: A multlevel secure relatonal database management system, IEEE Trans. on Knowledge and Data Engneerng () (990) Natonal Bureau of Standards. Data Encryton Standard. FIPS, NBS (977). Rvest, R.L., Shamr, A. and Adleman, L.: A method for obtanng dgtal sgnatures and ublc ey crytosystems. Communcatons of the ACM () (978) 0-6. Smd, M.E. and Branstad, D.K.: The data encryton standard: ast and future. Proc. IEEE 76(5) (988) Davda, G.I., Wells, D.L., and Kam, J.B.: A Database Encryton System wth Subeys. ACM Trans. Database Syst. 6 (98) Mn-Shang, H. and We-Pang, Y.: Multlevel secure database encryton wth subeys. Data and Knowledge Engneerng (997) Daman, E., De Catan dvmercat, S., Jajoda, S., Parabosch, S. and Samarat, P.: Balancng Confdentalty and Effcency n Untrusted Relatonal DBMSs. CCS 03, Washngton (003) Dennng, D.E.: Crytograhy and Data Securty. Addson-Wesley, Massachusetts (98) 7. Hacgümüs, H., Iyer, B., L, C., and Mehrotra, S.: Executng SQL over encryted data n the database-servce-rovder model. In Proc. of the ACM SIGMOD 00, Madson, Wsconsn, USA (00) 8. Iyer, B., Mehrotra, S., Myletun, E., Tsud, G. and Wu, Y.: A Framewor for Effcent Storage Securty n RDBMS. E. Bertno et al. (Eds.): EDBT 004, LNCS 99 (004) Bouganm, L. and Pucheral, P.: Ch-secured data access: Confdental data on untrusted servers. In Proc. of the 8th Internatonal Conference on Very Large Data Bases, Hong Kong, Chna (00) Database Encryton n Oracle9. An Oracle Techncal Whte Paer (00). Bayer, R. and Metzger, J.K.: On the Encherment of Search Trees and Random Access Fles. ACM Trans Database Systems, Vol. (976) Bertno, E. and Ferrar, E.: Secure and Selectve Dssemnaton of XML Documents. ACM Transactons on Informaton and System Securty Vol. 5 No. 3 (00) Hwang, M.S. and Yang, W.P.: A two-hase encryton scheme for enhancng database securty. J. Systems and Software 3() (995) 57-65
A Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
More informationChosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge and
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationA New Technique for Vehicle Tracking on the Assumption of Stratospheric Platforms. Department of Civil Engineering, University of Tokyo **
Fuse, Taash A New Technque for Vehcle Tracng on the Assumton of Stratosherc Platforms Taash FUSE * and Ehan SHIMIZU ** * Deartment of Cvl Engneerng, Unversty of Toyo ** Professor, Deartment of Cvl Engneerng,
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationLoad Balancing of Parallelized Information Filters
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. XXX, NO. XX, XXXXXXX 2001 1 Load Balancng of Parallelzed Informaton Flters Nel C. Rowe, Member, IEEE Comuter Socety, and Amr Zaky, Member, IEEE
More informationDynamic Load Balancing of Parallel Computational Iterative Routines on Platforms with Memory Heterogeneity
Dynamc Load Balancng of Parallel Comutatonal Iteratve Routnes on Platforms wth Memory Heterogenety Davd Clare, Alexey Lastovetsy, Vladmr Rychov School of Comuter Scence and Informatcs, Unversty College
More informationInter-domain Alliance Authentication Protocol Based on Blind Signature
Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationEfficient Computation of Optimal, Physically Valid Motion
Vol. xx No. xx,.1 5, 200x 1 Effcent Comutaton of Otmal, Physcally Vald Moton Anthony C. Fang 1 and Nancy S. Pollard 2 1 Deartment of Comuter Scence, Natonal Unversty of Sngaore 2 Robotcs Insttute, Carnege
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationMonitoring Network Traffic to Detect Stepping-Stone Intrusion
Montorng etork Traffc to Detect Steng-Stone Intruson Janhua Yang, Byong Lee, Stehen S. H. Huang Deartment of Math and Comuter Scence, Bennett College E-mal: {jhyang, blee }@bennett.edu Deartment of Comuter
More informationLearning User's Scheduling Criteria in a Personal Calendar Agent!
Learnng User's Schedulng Crtera n a Personal Calendar Agent! Shh-ju Ln and Jane Yung-jen Hsu Deartment of Comuter Scence and Informaton Engneerng Natonal Tawan Unversty 1 Sec 4 Roosevelt Road, Tae, 106
More informationA NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS PI. M. Yaghoubi Waskasi MYaghoubi@ece.ut.ac.ir. M. J. Yazdanpanah Yazdan@ut.ac.
A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS M. Yaghoub Waskas MYaghoub@ece.ut.ac.r M. J. Yazdananah Yazdan@ut.ac.r N. Yazdan Yazdan@ut.ac.r Control and Intellgent Processng Center
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationChapter 3: Dual-bandwidth Data Path and BOCP Design
Chater 3: Dual-bandwdth Data Path and BOCP Desgn 3. Introducton The focus of ths thess s on the 4G wreless moble Internet networks to rovde data servces wthn the overlang areas of CDA2000-WLA networks.
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationSection 5.4 Annuities, Present Value, and Amortization
Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationA Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks
A Comrehensve Analyss of Bandwdth Reuest Mechansms n IEEE 802.6 Networks Davd Chuck, Kuan-Yu Chen and J. Morrs Chang Deartment of Electrcal and Comuter Engneerng Iowa State Unversty, Ames, Iowa 500, USA
More informationAn Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement
An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence
More informationA Probabilistic Theory of Coherence
A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want
More informationDesigning A Secure Index For An En encrypted Database
Designing Secure Indexes for Encrypted Databases Erez Shmueli 1, Ronen Waisenberg 1, Yuval Elovici 1, and Ehud Gudes 2 1 Ben-Gurion University of the Negev, Faculty of Engineering, Department of Information
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L,QanWang, Cong Wang,NngCao,KuRen, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc Insttute
More informationScalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
More informationPERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS
Software Analye PERFORMANCE ANALYSIS OF PARALLEL ALGORIHMS Felcan ALECU PhD, Unverty Lecturer, Economc Informatc Deartment, Academy of Economc Stude, Bucharet, Romana E-mal: alecu.felcan@e.ae.ro Abtract:
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationAnalysis and Modeling of Buck Converter in Discontinuous-Output-Inductor-Current Mode Operation *
Energy and Power Engneerng, 3, 5, 85-856 do:.436/ee.3.54b63 Publshed Onlne July 3 (htt://www.scr.org/journal/ee) Analyss and Modelng of Buck Converter n Dscontnuous-Outut-Inductor-Current Mode Oeraton
More informationResearch of concurrency control protocol based on the main memory database
Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationApplied Research Laboratory. Decision Theory and Receiver Design
Decson Theor and Recever Desgn Sgnal Detecton and Performance Estmaton Sgnal Processor Decde Sgnal s resent or Sgnal s not resent Nose Nose Sgnal? Problem: How should receved sgnals be rocessed n order
More informationSoftware project management with GAs
Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationIDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS
IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationEfficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
More informationA Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationEvaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling
MultCraft Internatonal Journal of Engneerng, Scence and Technology Vol, o, 9, -4 ITERATIOAL JOURAL OF EGIEERIG, SCIECE AD TECHOLOGY wwwest-ngcom 9 MultCraft Lmted All rghts reserved Evaluaton of the nformaton
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationA Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
More informationFrom Selective to Full Security: Semi-Generic Transformations in the Standard Model
An extended abstract of ths work appears n the proceedngs of PKC 2012 From Selectve to Full Securty: Sem-Generc Transformatons n the Standard Model Mchel Abdalla 1 Daro Fore 2 Vadm Lyubashevsky 1 1 Département
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationA Prediction System Based on Fuzzy Logic
Proceedngs of the World Congress on Engneerng and Comuter Scence 2008 WCECS 2008, October 22-24, 2008, San Francsco, USA A Predcton System Based on Fuzzy Logc Vadeh.V,Monca.S, Mohamed Shek Safeer.S, Deeka.M
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationSection 5.3 Annuities, Future Value, and Sinking Funds
Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationProvably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
More informationSupporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol
Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationOptimal maintenance of a production-inventory system with continuous repair times and idle periods
Proceedngs o the 3 Internatonal Conerence on Aled Mathematcs and Comutatonal Methods Otmal mantenance o a roducton-nventory system wth contnuous rear tmes and dle erods T. D. Dmtrakos* Deartment o Mathematcs
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More information8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
More informationA Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
More informationRUHR-UNIVERSITÄT BOCHUM
RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty
More informationWeb Object Indexing Using Domain Knowledge *
Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct
More information+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationSearch Efficient Representation of Healthcare Data based on the HL7 RIM
181 JOURNAL OF COMPUTERS, VOL. 5, NO. 12, DECEMBER 21 Search Effcent Representaton of Healthcare Data based on the HL7 RIM Razan Paul Department of Computer Scence and Engneerng, Bangladesh Unversty of
More informationTools for Privacy Preserving Distributed Data Mining
Tools for Prvacy Preservng Dstrbuted Data Mnng hrs lfton, Murat Kantarcoglu, Jadeep Vadya Purdue Unversty Department of omputer Scences 250 N Unversty St West Lafayette, IN 47907-2066 USA (clfton, kanmurat,
More informationTowards an Effective Personalized Information Filter for P2P Based Focused Web Crawling
Journal of Comuter Scence (1): 97-103, 006 ISS 1549-3636 006 Scence Publcatons Towards an Effectve Personalzed Informaton Flter for PP Based Focused Web Crawlng Fu Xang-hua and Feng Bo-qn Deartment of
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationEfficient Dynamic Integrity Verification for Big Data Supporting Users Revocability
nformaton Artcle Effcent Dynamc Integrty Verfcaton for Bg Data Supportng Users Revocablty Xnpeng Zhang 1,2, *, Chunxang Xu 1, Xaojun Zhang 1, Tazong Gu 2, Zh Geng 2 and Guopng Lu 2 1 School of Computer
More informationPriv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks
Prv-Code: Preservng Prvacy Aganst Traffc Analyss through Networ Codng for Multhop Wreless Networs Zhguo Wan, Ka Xng, Yunhao Lu MOE Key Lab for Informaton System Securty, School of Software, Tsnghua Natonal
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationA Dynamic Energy-Efficiency Mechanism for Data Center Networks
A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,
More informationMulti-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationLIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
More informationA Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
More informationVembu StoreGrid Windows Client Installation Guide
Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on
More informationwww.engineerspress.com Neural Network Solutions for Forward Kinematics Problem of Hybrid Serial-Parallel Manipulator
www.engneersress.com World of Scences Journal ISSN: 307-307 Year: 03 Volume: Issue: 8 Pages: 48-58 Aahmad Ghanbar,, Arash ahman Deartment of Mechancal Engneerng, Unversty of Tabrz, Tabrz, Iran School of
More informationSome literature also use the term Process Control
A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationAdaptive Load Balancing of Parallel Applications with Multi-Agent Reinforcement Learning on Heterogeneous Systems
Adatve Load Balancng of Parallel Alcatons wth Mult-Agent Renforcement Learnng on Heterogeneous Systems Johan PAREN, Kata VERBEECK, Ann NOWE, Krs SEENHAU COMO, VUB Brussels, Belgum Emal: ohan@nfo.vub.ac.be,
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationSecure and Efficient Proof of Storage with Deduplication
Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono qzheng@cs.utsa.edu Shouhua Xu Department of Computer Scence Unversty of Texas
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More information