A Structure Preserving Database Encryption Scheme

Size: px
Start display at page:

Download "A Structure Preserving Database Encryption Scheme"

Transcription

1 A Structure Preservng Database Encryton Scheme Yuval Elovc, Ronen Wasenberg, Erez Shmuel, Ehud Gudes Ben-Guron Unversty of the Negev, Faculty of Engneerng, Deartment of Informaton Systems Engneerng, Postfach 653, 8405 Beer-Sheva, Israel {elovc, ronenwa, Ben-Guron Unversty of the Negev, Deartment of Comuter Scence, Postfach 653, 8405 Beer-Sheva, Israel Abstract. A new smle and effcent database encryton scheme s resented. The new scheme enables encrytng the entre content of the database wthout changng ts structure. In addton, the scheme suggests how to convert the conventonal database ndex to a secure ndex on the encryted database so that the tme comlexty of all queres s mantaned. No one wth access to the encryted database can learn anythng about ts content wthout havng the encryton ey. Introducton Database s an ntegral art of almost every nformaton system. Accordng to [] the ey features that databases roose are shared access, mnmal redundancy, data consstency, data ntegrty and controlled access. The case where databases hold crtcal and senstve nformaton s not rare, therefore an adequate level of rotecton to database content has to be rovded. Database securty methods can be dvded nto four layers []: hyscal securty [3], oeratng system securty [4, 5, 6], DBMS securty [7, 8, 9] and data encryton [0,, ]. The frst three layers alone are not suffcent to guarantee the securty of the database snce the database data s et n a readable form [3]. Anyone havng access to the database ncludng the DBA (Database Admnstrator), s caable of readng the data. In addton, the data s baced u frequently so access to the baced u data also needs to be controlled [4]. Moreover, a dstrbuted database system maes t harder to control the dsclosure of the data. Database encryton ntroduces an addtonal securty layer to the frst three layers mentoned above. It conceals the readable form of senstve nformaton even f the database s comromsed. Thus, anyone who manages to byass the conventonal database securty layers (e.g., an ntruder) or a DBA, s unable to read the senstve nformaton wthout the encryton ey. Furthermore, encryton can be used to mantan data ntegrty so that any unauthorzed changes of the data can easly be detected.

2 Database encryton can be mlemented at dfferent levels [4]: tables, columns, rows and cells. Encrytng the whole table, column or row entals the decryton of the whole table, column or row resectvely when a query s executed. Therefore, an mlementaton whch decryts only the data of nterest s referred. The database encryton scheme resented n [3] s based on the Chnese- Remnder theorem where each row s encryted usng dfferent sub-eys for dfferent cells. Ths scheme enables encryton at the level of rows and decryton at the level of cells. The database encryton scheme resented n [4] extends the encryton scheme resented n [3] by suortng multlayer access control. It classfes subjects and objects nto dstnct securty classes. The securty classes are ordered n a herarchy such that an object wth a artcular securty class can be accessed only by subjects n the same or a hgher securty class. In ths scheme, each row s encryted wth sub-eys accordng to the securty class of ts cells. One dsadvantage of both schemes s that the basc element n the database s a row and not a cell, thus the structure of the database needs to be changed. In addton, both schemes requre re-encrytng the whole row when a cell value s modfed. The conventonal way to rovde an effcent executon of database queres s by usng ndexes, but ndexes n an encryted database rase the queston of how to construct the ndex so that no nformaton about the database content s revealed [5, 6]. The ndexng scheme rovded n [7] s based on encrytng the whole row and assgnng a set dentfer to each value n ths row. When searchng a secfc value ts set dentfer s calculated and then assed to the server whch n turn returns to the clent a collecton of all rows wth values assgned to the same set. Fnally, the clent searches the secfc value n the returned collecton and retreves the desred rows. However, n ths scheme, equal values are always assgned to the same set, thus some nformaton s revealed when alyng statstcal attacs. The ndexng scheme rovded n [8] s based on constructng the ndex on the lantext values and encrytng each age of the ndex searately. Whenever a secfc age of the ndex s needed for rocessng a query, t s loaded nto memory and decryted. Snce the unform encryton of all ages s lely to rovde many cher breang clues, the ndexng scheme rovded n [9] suggests encrytng each ndex age usng a dfferent ey deendng on the age number. However, these schemes beng mlemented at the level of the oeratng system are not satsfactory. Assumng the ndex s mlemented as a B+-Tree, encrytng each of ts felds searately would reveal the orderng relatonsh between the chertext values. The ndexng scheme rovded n [5] suggests encrytng each node of the B+-Tree as a whole. However, snce references between the B+-Tree nodes are encryted together wth the ndex values, the ndex structure s concealed. In order to overcome the shortcomngs of exstng database encryton schemes, a new smle and effcent scheme for database encryton s roosed whch suggests how to encryt the entre content of the database wthout changng ts structure. Ths roerty allows the DBA to contnue managng the database wthout beng able to vew or manulate the database content. Moreover, anyone ganng access to the database can learn nothng about ts content wthout the encryton ey. The new scheme suggests how to construct a secure ndex on the encryted database so that the

3 tme comlexty of all queres s mantaned. Snce the database structure remans the same no changes are mosed on the queres. The remander of the aer s structured as follows: n secton the desred roertes of a database encryton scheme are outlned; n secton 3 the new database encryton scheme s llustrated; n secton 4 the desred roertes of a secure ndexng scheme are descrbed; n secton 5 a new ndexng scheme for the encryted database s roosed; n secton 6 erformance and mlementaton ssues are dscussed, and secton 7 resents our conclusons. The Desred Proertes of a Database Encryton Scheme Accordng to [3], a database encryton scheme should meet the followng requrements: ) The encryton scheme should ether be theoretcally or comutatonally secure (requre a hgh wor factor to brea t). ) Encryton and decryton should be fast enough so as not to degrade system erformance. 3) The encryted data should not have a sgnfcantly greater volume than the unencryted data. 4) Decryton of a record should not deend on other records. 5) Encrytng dfferent columns under dfferent eys should be ossble. 6) The encryton scheme should rotect aganst atterns matchng and substtuton of encryted values attacs. 7) Modfyng data by an unauthorzed user should be notced at decryton tme. 8) Recoverng nformaton from artal records (records where some cells have null values) should be the same as from full records. 9) The securty mechansm should be flexble and not ental any change n the structure of the database. A naïve aroach for database encryton s to encryt each cell searately but ths aroach has several drawbacs. Frst, two equal lantext values are encryted to equal chertext values. V ( V V V E E ) ( ) () Therefore, t s ossble, for examle, to collect statstcal nformaton as to how many dfferent values a secfed column currently has, and what are ther frequences. The same holds for the ablty to execute a jon oeraton between two tables and collect nformaton from the results. Second, t s ossble to swtch unnotced between two chertext values. Dfferent chertext values for equal lantext values can be acheved usng a olyalhabetc cher (e.g. Vernam). However, n ths soluton decryton of a record deends on other records and thus requrement 4 s volated. In the next secton a new database encryton scheme comlyng wth all the above requrements s resented.

4 3 A New Database Encryton Scheme The oston of a cell n the database s unque and can be dentfed usng the trlet that ncludes ts Table ID, Row ID, and Column ID. We wll refer to ths trlet as the cell coordnates. We suggest a new database encryton scheme where each database value s encryted wth ts unque cell coordnates. These coordnates are used n order to brea the correlaton between chertext and lantext values n an encryted database. The new scheme has two mmedate advantages. Frst, t elmnates substtuton attacs attemtng to swtch encryted values. Second, atterns matchng attacs attemtng to gather statstcs based on the database encryted values would fal. a) Table T before Encryton Row C b) Encryton of Table T Usng the Nave Aroach Row C 0 #$ ]{ &* 3 #$ 4 #$ 5 ^% 6 &* = c) Encryton of Table T Usng the New Scheme Row C 0!# :] &* 3 "/ 4 ~? 5 ^ 6 >\ 8 ){ 9 -+ Fg.. Database encryton usng two aroaches. Fgure llustrates database encryton usng two aroaches. Fgure a descrbes a database table (T) wth one data column (C). Fgure b descrbes encryton of table T usng the naïve aroach. Fgure c descrbes encryton of table T usng the new aroach where each cell s encryted wth ts cell coordnates. It s easy to see that equal lantext values n fgure a are encryted to dfferent chertext values n fgure c as oosed to the chertext values n fgure b.

5 3. Encryton/Decryton n the New Scheme Let us defne: V - A lantext value located n table t, row r and column c. : ( N N N) N - a functon that generates a number based on the database coordnates. Enc - A functon whch encryts a lantext value wth ts coordnates. Enc ( V ) E ( V ( t, r, c)) () Where s the encryton ey and E s a symmetrc encryton functon (e.g. DES, AES). X - A chertext value located n table t, row r and column c. X Dec - A functon whch decryts a chertext value ( X ) and dscards ts coordnates. K Enc ( V ) (3) Dec ( X ) D ( X ) ( T, R, C) V (4) Where s the decryton ey and D s a symmetrc decryton functon. 3. Data Integrty Encryton ensures that a user not ossessng the encryton ey cannot modfy a chertext value and redct the change n the lantext value. Usually the range of vald lantext values s sgnfcantly smaller than the whole range of ossble lantext values. Thus, the robablty that an unauthorzed change to a chertext value would result n a vald lantext value s neglgble. Therefore, unauthorzed changes to chertext values are lely to be notced at decryton tme. Substtuton attacs as oosed to atterns matchng attacs can not be revented smly by usng encryton. In the new scheme, each value s encryted wth ts unque cell coordnates. Therefore, tryng to decryt a value wth dfferent cell coordnates (e.g. as a result of a substtuton attac) would robably result n an nvald lantext value. If the range of vald lantext values s not sgnfcantly smaller than the whole ossble range, or nvald lantext values cannot be dstngushed from vald lantext values, encryton has to be carred out as follows: Enc K ( V ) E ( V ( t, r, c)) (5)

6 Snce ( t, r, c) s concatenated to the lantext value before encryton, attemtng to change the chertext value or tryng to swtch two chertext values would result n a corruted ( t, r, c) after decryton. Obvously, concatenatng ( t, r, c) results n data exanson. 3.3 Scheme Analyss The new database encryton scheme satsfes the requrements mentoned n secton : ) The scheme securty reles on the securty of the encryton algorthm used. In order to reveal some database value t has to be decryted usng the correct ey. ) Encryton and decryton are fast oeratons and are mandatory n any database encryton scheme. The roosed mlementaton adds the overhead of a Xor oeraton and comutaton whch are neglgble comared to encryton. 3) Usng encryton algorthms such as DES or AES whch are based on encrytng blocs of data results n value exanson (n many cases ths exanson s neglgble). 4) The basc element of reference s a database cell. Oeratons on a cell do not deend on or have any effect on other cells. 5) The roosed scheme facltates subschema mlementaton. Snce each cell s encryted searately, each column can be encryted under a dfferent ey. 6) The new scheme revents atterns matchng attacs snce there s no correlaton between a lantext value and a chertext value (acheved by usng encryton) and there s no correlaton between chertext values (acheved by usng before encryton). Substtuton attacs are also revented as dscussed n secton 3.. 7) Unauthorzed manulaton on the encryted data wthout the encryton ey would be notced at decryton tme. (see secton 3.) 8) As the basc element of reference s a database cell, t s ossble to recover nformaton from artally comleted records (records wth null values) n the same way as t s recovered from full records. 9) The new scheme comles wth the structure reservng requrements as the basc element of reference s a database cell. 4 The Desred Proertes of a Secure Indexng Scheme An ndex s a data structure suortng effcent access to data and ndexes are frequently used n databases. Most commercal databases even create a default ndex on the rmary-ey columns. Most databases mlement ndexes usng a B+-Tree whch mlementaton s dscussed n secton 6.. Key management s dscussed n secton 6.3.

7 s a data structure mantanng an ordered set of values and suortng effcent oeratons on ths set such as search, nsert, udate and delete. A trval aroach whch constructs an ndex over the lantext values would reduce securty snce the lantext values are exosed. Another aroach would cona) An Index Constructed on Column C n Table T b) Table Reresentaton of the Index ID Struct. Data 0, , , , , , , c) Table T Row C Fg.. An examle of a database ndex. Fgure llustrates a database ndex whch s constructed on column C n table T and s mlemented as a B+-Tree. A grahcal reresentaton of the B+-Tree s gven n fgure a; a table reresentaton of the B+-Tree s gven n fgure b and table T s gven n fgure c. Fgure b sharens the searaton between the ndex structure and ts data. A secure ndex n an encryted database has to comly wth the followng requrements: ) No nformaton about the database lantext values can be learned from the ndex. ) The secure ndex should not reduce the effcency of data access. 3) The secure ndex should not reduce the effcency of nsert, udate and delete oeratons. 4) The secure ndex should not have a sgnfcantly greater volume than an ordnary ndex. 5) The secure ndex structure should not dffer from a standard ndex. In ths way, a DBA can manage the ndex wthout the encryton ey.

8 struct the ndex over the database chertext values. In ths aroach, executng equalty queres s ossble but executng range queres s a roblem. Ths aroach would exose the ndex to atterns matchng attacs snce equal lantext values are encryted to equal chertext values. Moreover, snce executng range queres s a roblem, Oracle does not suort encrytng ndexed data [0]. In the next secton, a new ndexng scheme whch overcomes the shortcomngs of exstng ndexng schemes s resented. 5 A New Database Indexng Scheme Several ndexng schemes for encryted databases were roosed [5, 8, 7, ] that fulfll most of the requrements descrbed n secton 4 but none reserve the ndex structure. We clam that there should be a searaton between data and structure. For examle, A DBA should be able to manage database ndexes wthout the need of decrytng ts values. We suggest a new database ndexng scheme whch reserves the ndex structure where each ndex value s the result of encrytng a lantext value n the database concatenated wth ts row-d. Ths ensures that there s no correlaton between the ndex values and the database chertext values 3. Furthermore, the ndex does not reveal the statstcs or order of the database values. 5. Index Constructon n the New Scheme In order to construct an ndex, a set of values and a functon determnng the order 4 of these values are needed. Let us defne: C - An encryted database column that was encryted as defned n secton 3.. C - The column obtaned from decrytng columnc : Dec ( x )C x C (6) Where Dec s the decryton functon defned n secton 3.. C - The column obtaned from encrytng values n C concatenated wth ther row-ds: E ( V r) C V C (7) 3 If the database s encryted as descrbed n secton 3., then should not be mlemented as( t, r, c) r snce there wll be a strong correlaton between the ndex values and the database encryted values. 4 Some ndexes requre only an equalty functon and not an order functon to be constructed. In ths case, the term "order" n ths secton can be relaced by the term "equalty".

9 Where s the encryton ey, E s an encryton functon and r s the row d. : C C - A functon whch decryts a value n C (usng ey ) and dscards ts row-d: ( x) Dscard( D ( x), r ) (8) Where s the decryton ey, D s a decryton functon, r s the row-d, r s the length of r n bts, and Dscard ( v, n) stands for dscardng the n rghtmost bts of v. R - The values n C are ordered by the relaton R : R - The values n ( x, y) R x, yc And( x y) (9) C are ordered by the relaton R : ( x, y) R x, yc And( ( x), ( y)) R (0) The new ndex wll be constructed based on the values n an order functon. a) Encryton of Table T n the New Scheme C, usng the relaton b) Encryton of the Index n the New Scheme R as Row C 0 ( 5000 ( T,0, E ( 500 ( T,, E ( 000 ( T,, E 3 ( 7500 ( T,3, E ID Struct. Data 0, E (5000 0) 3,4 E (500 ) 5,6 E (7500 3) 3 4 E (000 ) 4 5 E (500 ) 5 6 E (5000 0) 6 - E (7500 3) Fg. 3. Encryton n the new scheme. Fgure 3 llustrates encryton of the table and the ndex whch were llustrated n fgure usng the new schemes. Fgure 3a descrbes the encryton of the table n the new scheme where each cell s encryted wth ts coordnates. Fgure 3b descrbes the encryton of the ndex where each ndex value s the result of encrytng a database lantext value concatenated wth ts row-d. It s easy to see that the table and ndex structure are not changed by the encryton rocess.

10 5. Executng a Query n the New Scheme The followng SQL query llustrates the retreval of all rows n table T, whch ther values n column C are greater or equal to V: SELECT * FROM T WHERE T.C>=V () The followng seudo code llustrates the retreval of row-ds of rows whch answer the above query. The seudo code assumes that the ndex s mlemented as a bnary B+-Tree. INPUT: A table T, a column C and a value V. OUTPUT: A collecton of row-ds. X := getindex(t, C).getRootNode(); Whle X s not a leaf Do If X.getData().getValue()<V Then X := X.getRghtSonNode(); Else X := X.getLeftSonNode(); End If; End Whle; RESULT := ; Whle X.getData().getValue()<V Do X := X.getRghtSblngNode(); End Whle; Whle X s not null Do RESULT := RESULT{X.getData().getRowId()}; X := X.getRghtSblngNode(); End Whle; Return RESULT; Each node n the ndex whch s not a leaf has a left son node, a rght son node and a data whch stores a value. Each leaf n the ndex has a rght sblng node and a data whch stores a value and a row-d. In the new scheme the data n each ndex node s an encryton of a database value concatenated wth ts row-d. Thus, the functons getvalue() and getrowid() need to be gven a new mlementaton n order to suort the new ndexng scheme. However, the above seudo code stands wthout any change. 5.3 Index Integrty In the new scheme, a substtuton attac whch attemts to substtute ndex values can be carred out wthout beng notced at decryton tme. If t s ossble to mantan a unque oston for each value n the ndex, ths nd of attac can be elmnated usng

11 a technque smlar to the one roosed n secton 3 where each value s encryted wth ts unque oston. a) Mantanng Data Integrty of Table T Row C 0 E ( 5000 ( T,0, E ( 500 ( T,, E ( 000 ( T,, 3 E ( 7500 ( T,3, b) Mantanng Data Integrty of the Index ID Struct. Data 0, E (5000 0) 3,4 E (500 ) 5,6 E (7500 ) 3 4 E ((000, ) 3) 4 5 E ((500,) 4) 5 6 E ((5000, 0) 5) 6 - E ((7500, 3) 6) Fg. 4. Mantanng data ntegrty. Fgure 4 llustrates data ntegrty mantenance of the table and the ndex whch were llustrated n fgure. Fgure 4a descrbes data ntegrty mantenance of the table as suggested n secton 3.. Fgure 4b descrbes data ntegrty mantenance of the ndex where each ndex value s concatenated to ts unque oston n the ndex (ID) and then encryted. We argue that wthout changng the ndex structure and affectng ts effcency, mantanng a unque oston for each value n the ndex s not a trval matter. 5.4 Scheme Analyss The new ndex mlementaton on an ordered set of values s dentcal to the ordnary ndex mlementaton. The only dfferences between the ordnary ndex and the new one are the set of values and the order functon defned on them. The new ndex comles wth the requrements mentoned n secton 4: ) Snce the values n the ndex are encryted and unque (acheved by concatenatng row-d) there s no correlaton between them as to the column chertext values, or the column lantext values. Therefore, no nformaton s revealed on the database data by the new ndex. ) The order functon s mlemented n a tme comlexty of O () snce decryton and dscardng bts are mlemented n a tme comlexty of O (). Therefore, data access usng the roosed ndex s as effcent as wth an ordnary ndex. 3) Determnng the order of two values s mlemented n a tme comlexty of O (). Therefore, the delete oeraton s as effcent as n an ordnary ndex. En-

12 crytng a new value s mlemented n a tme comlexty of O (), thus the effcency of nsert and udate oeratons s not changed. 4) Each value n the new ndex s a result of encrytng a database lantext value concatenated wth ts row-d, therefore the sace added for each node n the new ndex s fxed. Thus, the ndex sace comlexty remans the same. 5) The new ndex structure remans the same and only ts data s modfed. Thus, any admnstratve wor on the ndex can be carred out wthout the need of decrytng the ndex values. 6 Performance and Imlementaton Issues Imlementng the new schemes requres careful consderaton. Several erformance and mlementaton ssues are dscussed n ths secton. 6. Stable Cell Coordnates The roosed scheme assumes that cell coordnates are stable. That s, nsert, udate and delete oeratons do not change the coordnates of exstng cells. However, f a database reorganzaton rocess changes cell coordnates, all affected cells are to be re-encryted wth ther new coordnates and the ndex udated resectvely. A naïve mlementaton whch uses the row number n the table as the row-d, roves to be lmted n ths resect as row numbers are affected by nsert and delete oeratons. In the Oracle database, for examle, cell coordnates are stable. 6. Imlementng a Secure Functon As defned n secton 3., the values n the database are encryted as follows: Enc K ( V ) E ( V ( t, r, c)) () A secure mlementaton of would generate dfferent numbers for dfferent coordnates: t, r, c ) ( t, r, c ) ( t, r, c ) ( t, r, ) (3) ( c Unfortunately, generatng a unque number for each database coordnates may result n consderable data exanson. An alternatve mlementaton reducng the data exanson may result n collsons. Assume that there are two cells, whch generates two equal values for ther coordnates: t, r, c, t, r, c (4) [( t, r, c ) ( t, r, c )] [ ( t, r, c ) ( t, r, c )]

13 It s ossble to substtute the chertext values of these cells ( x tr c and x trc ) wthout beng corruted at decryton tme. If t s dffcult to fnd two cells such as those mentoned above, ths nd of attac can be revented. Ths can be acheved by usng a collson free hash functon. 6.3 Key Management Databases contan nformaton of dfferent senstvty degrees that have to be selectvely shared between a large numbers of users. The roosed scheme facltates subschema mlementaton snce each column can be encryted wth a dfferent ey. Encrytng each column wth a dfferent ey, results n a large number of eys for each legtmate user. However, usng the aroach roosed n [] can reduce the number of eys. It s suggested n [] how the smallest elements whch can be encryted usng the same ey accordng to the access control olcy can be found. Thus, the eys are generated accordng to the access control olcy n order to ee ther number mnmal. Ths aroach can be ncororated n the roosed scheme n order to encryt sets of columns wth the same ey n accordance wth the database access control olcy. 6.4 Performance In the new scheme, all conventonal algorthms reman the same snce the structure of the database remans the same. Ths ensures that the only overhead of the new scheme s that of encryton and decryton oeratons. 7. Conclusons In ths aer, a new structure reservng scheme for database encryton has been resented. In the new scheme, each database cell s encryted wth ts unque oston and ths guarantees that atterns matchng and substtuton attacs cannot succeed, thus, guaranteeng nformaton confdentalty and data ntegrty. A new database ndexng scheme that does not reveal any nformaton on the database lantext values was roosed. In the new scheme ndex values are encryted wth a unque number (the row-d of the database value) n order to elmnate atterns matchng attacs and any correlaton between ndex and database values. Ensurng ndex ntegrty s ossble f an ndex oston can be attached to each ndex value by smly usng a technque smlar to the one used for table encryton. The new schemes do not mose any changes on the database structure, thus enablng a DBA to manage the encryted database as any other non-encryted database. Furthermore, mlementng the new scheme n exstng alcatons does not ental modfyng the queres.

14 References. Date, C.J.: An Introducton to Database Systems. Vol., Ffth Edton. Addson Wesley, Massachusetts (990). Fernandez, E.B., Summers, R.C. and Wood C.: Database Securty and Integrty. Addson- Wesley, Massachusetts, (980) 3. Coer, J.A.: Comuter & Communcaton Securty: Strateges for the 990s. McGraw- Hll, New Yor (989) 4. Conway, R.W., Maxwell, W.L. and Morgan, H.L.: On the mlementaton of securty measures n nformaton systems. Communcatons of the ACM 5(4) (97) Graham, G.S. and Dennng, P.J.: Protecton - Prncles and ractce. Proc. Srng Jt. Comuter Conf., Vol. 40, AFIPS 47-49, Montrale, N.J. (97) 6. Hwang, M.S. and Yang, W.P.: A new dynamc access control scheme based on subjectobject-lst. Data and Knowledge Engneerng 4() (994) Garvey, C. and Wu, A.: ASD-Vews. Proc. IEEE Symosum on Securty and Prvacy, Oaland, Calforna (988) Lunt, T.F., Dennng, D.E., Schell, R.R., Hecman, M. and Shocley, W.R.: The SeaVew securty model. IEEE Trans. on Software Engneerng, SE-6(6) (990) Stachour, P.D. and Thurasngham, B.: Desgn of LDV: A multlevel secure relatonal database management system, IEEE Trans. on Knowledge and Data Engneerng () (990) Natonal Bureau of Standards. Data Encryton Standard. FIPS, NBS (977). Rvest, R.L., Shamr, A. and Adleman, L.: A method for obtanng dgtal sgnatures and ublc ey crytosystems. Communcatons of the ACM () (978) 0-6. Smd, M.E. and Branstad, D.K.: The data encryton standard: ast and future. Proc. IEEE 76(5) (988) Davda, G.I., Wells, D.L., and Kam, J.B.: A Database Encryton System wth Subeys. ACM Trans. Database Syst. 6 (98) Mn-Shang, H. and We-Pang, Y.: Multlevel secure database encryton wth subeys. Data and Knowledge Engneerng (997) Daman, E., De Catan dvmercat, S., Jajoda, S., Parabosch, S. and Samarat, P.: Balancng Confdentalty and Effcency n Untrusted Relatonal DBMSs. CCS 03, Washngton (003) Dennng, D.E.: Crytograhy and Data Securty. Addson-Wesley, Massachusetts (98) 7. Hacgümüs, H., Iyer, B., L, C., and Mehrotra, S.: Executng SQL over encryted data n the database-servce-rovder model. In Proc. of the ACM SIGMOD 00, Madson, Wsconsn, USA (00) 8. Iyer, B., Mehrotra, S., Myletun, E., Tsud, G. and Wu, Y.: A Framewor for Effcent Storage Securty n RDBMS. E. Bertno et al. (Eds.): EDBT 004, LNCS 99 (004) Bouganm, L. and Pucheral, P.: Ch-secured data access: Confdental data on untrusted servers. In Proc. of the 8th Internatonal Conference on Very Large Data Bases, Hong Kong, Chna (00) Database Encryton n Oracle9. An Oracle Techncal Whte Paer (00). Bayer, R. and Metzger, J.K.: On the Encherment of Search Trees and Random Access Fles. ACM Trans Database Systems, Vol. (976) Bertno, E. and Ferrar, E.: Secure and Selectve Dssemnaton of XML Documents. ACM Transactons on Informaton and System Securty Vol. 5 No. 3 (00) Hwang, M.S. and Yang, W.P.: A two-hase encryton scheme for enhancng database securty. J. Systems and Software 3() (995) 57-65

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge and

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

A New Technique for Vehicle Tracking on the Assumption of Stratospheric Platforms. Department of Civil Engineering, University of Tokyo **

A New Technique for Vehicle Tracking on the Assumption of Stratospheric Platforms. Department of Civil Engineering, University of Tokyo ** Fuse, Taash A New Technque for Vehcle Tracng on the Assumton of Stratosherc Platforms Taash FUSE * and Ehan SHIMIZU ** * Deartment of Cvl Engneerng, Unversty of Toyo ** Professor, Deartment of Cvl Engneerng,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Load Balancing of Parallelized Information Filters

Load Balancing of Parallelized Information Filters IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. XXX, NO. XX, XXXXXXX 2001 1 Load Balancng of Parallelzed Informaton Flters Nel C. Rowe, Member, IEEE Comuter Socety, and Amr Zaky, Member, IEEE

More information

Dynamic Load Balancing of Parallel Computational Iterative Routines on Platforms with Memory Heterogeneity

Dynamic Load Balancing of Parallel Computational Iterative Routines on Platforms with Memory Heterogeneity Dynamc Load Balancng of Parallel Comutatonal Iteratve Routnes on Platforms wth Memory Heterogenety Davd Clare, Alexey Lastovetsy, Vladmr Rychov School of Comuter Scence and Informatcs, Unversty College

More information

Inter-domain Alliance Authentication Protocol Based on Blind Signature

Inter-domain Alliance Authentication Protocol Based on Blind Signature Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Efficient Computation of Optimal, Physically Valid Motion

Efficient Computation of Optimal, Physically Valid Motion Vol. xx No. xx,.1 5, 200x 1 Effcent Comutaton of Otmal, Physcally Vald Moton Anthony C. Fang 1 and Nancy S. Pollard 2 1 Deartment of Comuter Scence, Natonal Unversty of Sngaore 2 Robotcs Insttute, Carnege

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Monitoring Network Traffic to Detect Stepping-Stone Intrusion

Monitoring Network Traffic to Detect Stepping-Stone Intrusion Montorng etork Traffc to Detect Steng-Stone Intruson Janhua Yang, Byong Lee, Stehen S. H. Huang Deartment of Math and Comuter Scence, Bennett College E-mal: {jhyang, blee }@bennett.edu Deartment of Comuter

More information

Learning User's Scheduling Criteria in a Personal Calendar Agent!

Learning User's Scheduling Criteria in a Personal Calendar Agent! Learnng User's Schedulng Crtera n a Personal Calendar Agent! Shh-ju Ln and Jane Yung-jen Hsu Deartment of Comuter Scence and Informaton Engneerng Natonal Tawan Unversty 1 Sec 4 Roosevelt Road, Tae, 106

More information

A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS PI. M. Yaghoubi Waskasi MYaghoubi@ece.ut.ac.ir. M. J. Yazdanpanah Yazdan@ut.ac.

A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS PI. M. Yaghoubi Waskasi MYaghoubi@ece.ut.ac.ir. M. J. Yazdanpanah Yazdan@ut.ac. A NEW ACTIVE QUEUE MANAGEMENT ALGORITHM BASED ON NEURAL NETWORKS M. Yaghoub Waskas MYaghoub@ece.ut.ac.r M. J. Yazdananah Yazdan@ut.ac.r N. Yazdan Yazdan@ut.ac.r Control and Intellgent Processng Center

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Chapter 3: Dual-bandwidth Data Path and BOCP Design

Chapter 3: Dual-bandwidth Data Path and BOCP Design Chater 3: Dual-bandwdth Data Path and BOCP Desgn 3. Introducton The focus of ths thess s on the 4G wreless moble Internet networks to rovde data servces wthn the overlang areas of CDA2000-WLA networks.

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks

A Comprehensive Analysis of Bandwidth Request Mechanisms in IEEE 802.16 Networks A Comrehensve Analyss of Bandwdth Reuest Mechansms n IEEE 802.6 Networks Davd Chuck, Kuan-Yu Chen and J. Morrs Chang Deartment of Electrcal and Comuter Engneerng Iowa State Unversty, Ames, Iowa 500, USA

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

A Probabilistic Theory of Coherence

A Probabilistic Theory of Coherence A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want

More information

Designing A Secure Index For An En encrypted Database

Designing A Secure Index For An En encrypted Database Designing Secure Indexes for Encrypted Databases Erez Shmueli 1, Ronen Waisenberg 1, Yuval Elovici 1, and Ehud Gudes 2 1 Ben-Gurion University of the Negev, Faculty of Engineering, Department of Information

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Fuzzy Keyword Search over Encrypted Data in Cloud Computing Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L,QanWang, Cong Wang,NngCao,KuRen, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc Insttute

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS

PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS Software Analye PERFORMANCE ANALYSIS OF PARALLEL ALGORIHMS Felcan ALECU PhD, Unverty Lecturer, Economc Informatc Deartment, Academy of Economc Stude, Bucharet, Romana E-mal: alecu.felcan@e.ae.ro Abtract:

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Analysis and Modeling of Buck Converter in Discontinuous-Output-Inductor-Current Mode Operation *

Analysis and Modeling of Buck Converter in Discontinuous-Output-Inductor-Current Mode Operation * Energy and Power Engneerng, 3, 5, 85-856 do:.436/ee.3.54b63 Publshed Onlne July 3 (htt://www.scr.org/journal/ee) Analyss and Modelng of Buck Converter n Dscontnuous-Outut-Inductor-Current Mode Oeraton

More information

Research of concurrency control protocol based on the main memory database

Research of concurrency control protocol based on the main memory database Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Applied Research Laboratory. Decision Theory and Receiver Design

Applied Research Laboratory. Decision Theory and Receiver Design Decson Theor and Recever Desgn Sgnal Detecton and Performance Estmaton Sgnal Processor Decde Sgnal s resent or Sgnal s not resent Nose Nose Sgnal? Problem: How should receved sgnals be rocessed n order

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Evaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling

Evaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling MultCraft Internatonal Journal of Engneerng, Scence and Technology Vol, o, 9, -4 ITERATIOAL JOURAL OF EGIEERIG, SCIECE AD TECHOLOGY wwwest-ngcom 9 MultCraft Lmted All rghts reserved Evaluaton of the nformaton

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

From Selective to Full Security: Semi-Generic Transformations in the Standard Model

From Selective to Full Security: Semi-Generic Transformations in the Standard Model An extended abstract of ths work appears n the proceedngs of PKC 2012 From Selectve to Full Securty: Sem-Generc Transformatons n the Standard Model Mchel Abdalla 1 Daro Fore 2 Vadm Lyubashevsky 1 1 Département

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

A Prediction System Based on Fuzzy Logic

A Prediction System Based on Fuzzy Logic Proceedngs of the World Congress on Engneerng and Comuter Scence 2008 WCECS 2008, October 22-24, 2008, San Francsco, USA A Predcton System Based on Fuzzy Logc Vadeh.V,Monca.S, Mohamed Shek Safeer.S, Deeka.M

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Section 5.3 Annuities, Future Value, and Sinking Funds

Section 5.3 Annuities, Future Value, and Sinking Funds Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Optimal maintenance of a production-inventory system with continuous repair times and idle periods

Optimal maintenance of a production-inventory system with continuous repair times and idle periods Proceedngs o the 3 Internatonal Conerence on Aled Mathematcs and Comutatonal Methods Otmal mantenance o a roducton-nventory system wth contnuous rear tmes and dle erods T. D. Dmtrakos* Deartment o Mathematcs

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

RUHR-UNIVERSITÄT BOCHUM

RUHR-UNIVERSITÄT BOCHUM RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty

More information

Web Object Indexing Using Domain Knowledge *

Web Object Indexing Using Domain Knowledge * Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Search Efficient Representation of Healthcare Data based on the HL7 RIM

Search Efficient Representation of Healthcare Data based on the HL7 RIM 181 JOURNAL OF COMPUTERS, VOL. 5, NO. 12, DECEMBER 21 Search Effcent Representaton of Healthcare Data based on the HL7 RIM Razan Paul Department of Computer Scence and Engneerng, Bangladesh Unversty of

More information

Tools for Privacy Preserving Distributed Data Mining

Tools for Privacy Preserving Distributed Data Mining Tools for Prvacy Preservng Dstrbuted Data Mnng hrs lfton, Murat Kantarcoglu, Jadeep Vadya Purdue Unversty Department of omputer Scences 250 N Unversty St West Lafayette, IN 47907-2066 USA (clfton, kanmurat,

More information

Towards an Effective Personalized Information Filter for P2P Based Focused Web Crawling

Towards an Effective Personalized Information Filter for P2P Based Focused Web Crawling Journal of Comuter Scence (1): 97-103, 006 ISS 1549-3636 006 Scence Publcatons Towards an Effectve Personalzed Informaton Flter for PP Based Focused Web Crawlng Fu Xang-hua and Feng Bo-qn Deartment of

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability nformaton Artcle Effcent Dynamc Integrty Verfcaton for Bg Data Supportng Users Revocablty Xnpeng Zhang 1,2, *, Chunxang Xu 1, Xaojun Zhang 1, Tazong Gu 2, Zh Geng 2 and Guopng Lu 2 1 School of Computer

More information

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks Prv-Code: Preservng Prvacy Aganst Traffc Analyss through Networ Codng for Multhop Wreless Networs Zhguo Wan, Ka Xng, Yunhao Lu MOE Key Lab for Informaton System Securty, School of Software, Tsnghua Natonal

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

www.engineerspress.com Neural Network Solutions for Forward Kinematics Problem of Hybrid Serial-Parallel Manipulator

www.engineerspress.com Neural Network Solutions for Forward Kinematics Problem of Hybrid Serial-Parallel Manipulator www.engneersress.com World of Scences Journal ISSN: 307-307 Year: 03 Volume: Issue: 8 Pages: 48-58 Aahmad Ghanbar,, Arash ahman Deartment of Mechancal Engneerng, Unversty of Tabrz, Tabrz, Iran School of

More information

Some literature also use the term Process Control

Some literature also use the term Process Control A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Adaptive Load Balancing of Parallel Applications with Multi-Agent Reinforcement Learning on Heterogeneous Systems

Adaptive Load Balancing of Parallel Applications with Multi-Agent Reinforcement Learning on Heterogeneous Systems Adatve Load Balancng of Parallel Alcatons wth Mult-Agent Renforcement Learnng on Heterogeneous Systems Johan PAREN, Kata VERBEECK, Ann NOWE, Krs SEENHAU COMO, VUB Brussels, Belgum Emal: ohan@nfo.vub.ac.be,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Secure and Efficient Proof of Storage with Deduplication

Secure and Efficient Proof of Storage with Deduplication Secure and Effcent Proof of Storage wth Deduplcaton Qng Zheng Department of Computer Scence Unversty of Texas at San Antono qzheng@cs.utsa.edu Shouhua Xu Department of Computer Scence Unversty of Texas

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information