Application of Improved SSL in Data Security Transmission of Mobile Database System
|
|
|
- Abigayle Byrd
- 9 years ago
- Views:
Transcription
1 Alication of Imrove SSL in Data Security Transmission of Mobile Database System RUIFENG WANG, XIAOHUA ZHANG, DECHAO XU College of Automation & Electrical Engineering Lanzhou Jiaotong University Lanzhou, CHINA Abstract: - The existing SSL (Secure Socet Layer) rotocol which mobile atabase system is using has many rawbacs, such as large amount of communication, comutational comlexity of encrytion algorithm an the worloa imbalance. In orer to solve these roblems, the aer rooses an imrove SSL rotocol. It ecomoses the rivate ey into ineenent elements which reucing the comutational comlexity an imlementing arallel comuting, at the same time it ut art of ecrytion calculation to the client so that balancing the worloa an shortening the running time of the algorithm. The imrove SSL rotocol exchanges certificate ientifier instea of certificate entities between client an server, which reuces the message ayloa. The imrove SSL rotocol imroves the ecrytion see an reuces the hanshae communication loa comare to the original SSL rotocol. Key-Wors: - Mobile atabase, security transmission, imrove SSL rotocol, RSA encrytion algorithm, ientity authentication into ineenent elements to ecrease the moe of ower oeration, at the same time it will ecomose art of the ecrytion moule an ower oeration, so that ensure the security of transmission ata an reuce comutational comlexity. An the imrove RSA algorithm erformance is comare with the traitional algorithm, the simulation results show that the imrove algorithm erformance is better. It authenticates clients to transfer unique ientification of certificate by storing server certificates in clients, effectively reucing the communication loa rotocol to imrove transmission efficiency. Introuction Mobile atabase system realizes ata synchronization transmission via wireless networ, its instability an wea immunity leas to illegal users easier to theft an tamer with transmission ata. So that it results in leaage of synchronous ata an error information transmission. If imortant information relate to security changes will lea to a major accient. Therefore it is very imortant to imrove the security of transmission ata. Literatures [-3] guarantee the security of ata transmission through taing encrytion algorithm to encryt the raio transmission lin, but comutational comlexity of the algorithm currently use results in transmission elay increasing. Literatures [4-8] roose to verify the ientity of the terminal to revent unauthorize users from logging system to steal ata. However it nees to ass the certification entity to verify its effectiveness, resulting in increase traffic loas an client comuting, an reucing efficiency of the system. The aer uts forwar an imrove SSL rotocol to achieve safe an efficient ata transmission in mobile atabase systems. The imrove SSL rotocol ecomoses the rivate ey 2 Mobile Database System Data Synchronization Transmission The alication of mobile atabase system is more an more oular with the rai eveloment of wireless communication technology an mobile comuting technology. The instability of wireless networ an frequent breaout lea to leaage of transmission ata[]. Mobile atabase SQL Server CE establishes a secure channel base on SSL rotocol in orer to guarantee security of ata transmission an integrity. Mobile atabase SQL Server CE rovies remote ata access an merge relication, ensures that the ata of SQL Server CE E-ISSN: Volume 3, 204
2 in the mobile client can be reliably transmitte. An it can offline oerate atabase, then sync with the server, which maes SQL Server CE ieal atabase in mobile an wireless environment. Before the SSL connection, it is necessary to create reliable TCP connections between client an server[2]. Ientity authentication server of SSL rotocol rovies authentication through the certificate entity first. Then the SQL Server CE client roxy sens HTTP requests to SQL Server CE server agent request. SSL hanshae rotocol consults encrytion algorithm an session ey which is use to encryt ata. Finally it can transfer synchronize ata through SSL channel which ensures confientiality an integrity of transmission ata. It will escribe the woring rocess of the SSL rotocol to achieve ata security transmission below. Then it will ut forwar imrovement measures which are aime at imroving the efficiency an security of transmission ata base on the SSL rotocol erformance efects. 3 SSL Protocol SSL Protocol has recor rotocol an hanshae rotocol two layers. Recor rotocol acets, comresses, encryts an encasulates the highlayer ata. Hanshae rotocol which running on the recor rotocol is use for ientity authentication, negotiation encrytion algorithm, ey exchange before the ata[3]. 3. Woring rocess of the SSL rotocol The woring rocess of the SSL rotocol is comose of shaing hans an ata transmission. Hanshae rotocol comletes connection before ata transmission, SSL rotocol woring rocess as shown in figure, the main woring rocess as follows. ()The client an server swa hello message which mainly inclues ranom number r c an r s, the session i SID, rotocol version number V an a suite SecNeg encrytion algorithm, to establish SSL security connection. (2)The server sens certificate, server-ey-exchange an certificate request, finally sens server- hello-one news which inicates server hello hase en. (3)Client sens its certificate, the function of ey generation an certificate- verify the result of the server certificate verification after it receives server- hello-one news. (4)The client an server sen change ciher-sec an finishe message each other. (5)They use the negotiate eys to sen ata after the hanshae finally. Client Client-hello Certificate Client-ey-exchange Certificate-verify Change-ciher-sec Finishe Alication-ata Server Server-hello Certificate Server-ey-exchange Certificate-request Server-hello-one Change-ciher-sec Finishe Alication-ata Fig.. Woring rocess of SSL rotocol. 3.. Ientity authenticationl Hanshae rotocol imlements the communication on both sies of the ientity authentication through the igital certificate. Certificate Authority(CA) which is got by Public Key Infrastructure (PKI) rovies the mechanism rovies an manages the igital certificate an verifies the authenticity of ientity[4]. The server will first calculate the server certificate hash value by the hash algorithm, then use its own rivate ey to encryt hash which form igital signature, finally it will sen certificate information an signature to the client. The client calculates the content of CA after it receives the information, an it uses the ublic ey to ecryt the signature that get hash value comare with the value of the client. If they are the same, the server authentication is successful. Server for client authentication methos is similar, so as to realize two-way authentication Princile of RSA encrytion algorithm It uses the RSA encrytion algorithm which has encrytion ey (KU) an ecrytion ey (KR) two eys to exchange session ey in the SSL hanshae rotocol[5]. The algorithm etaile rocess as follows. ()Select two rime numbers an q;(2) Calculate n an φ(n), n=q, φ(n)= (-)(q-), φ(n) is the euler function for n; (3) Generate a ranom number e with φ(n) corime, namely gc(e,φ(n))=, an <e<φ(n), it will get the ublic ey KU = (e, n); (4) Get the rivate ey by calculating meet e mo φ(n),it sai the rouct of an e o moular arithmetic result must be equal to ; (5) Suose M as transmission ata, C as encryte ata, e C M (mo n), the receiver after receiving the ciher ecrytion to get the original ata M C (mo n). 3.2 Performance efect an imrovement roject of the SSL rotocol The communication loa leas uring the hanshae ue to it is require to transfer certificate entity for ientity authentication an verify its effectiveness. The SSL hanshae uses RSA encrytion algorithm to exchange session eys, ue to the algorithm comutational comlexity, slow see, an worloa imbalance. They result in a ecline in overall system erformance. This aer E-ISSN: Volume 3, 204
3 rooses an imrove SSL rotocol for SSL above efects to reuce the communication loa, imrove the efficiency of ata transmission, to ensure the high-efficiency an safety of the synchronous ata. In the imrovement of the SSL rotocol, it will be uniquely corresoning to each certificate a certificate ientity CID an ut certificate list in avance to the rover. It will effectively avoi transferring certificate of entity each other in the rocess of shaing hans. It only nees to sen the CID in the rocess of the SSL hanshae, the rover accoring to the CID fin the corresoning certificate entity in the list[6]. It greatly reuces the amount of communication an imroves hanshae rotocol connection see. Since the client storage caacity, comuting ower, ower management are limite, encrytion algorithm the SSL hanshae rotocol chose also affects overall system erformance. Accoring to the characteristics of the mobile environment, the aer uts forwar an imrove algorithm which imroves the safety an efficiency of the system. If moulus n=q with secial form =as+b an q=cs+, this form of rime numbers of (, q) constitutes a wea ey of RSA crytograhy system. Assume f/e is /q the best aroximation value, e an f are relatively rime an f<e<2f, s= n /(ef ), the s ajoint olynomials about n as shown in formula(). 2 fn / s( x) = ax + bx + c () 2 The iscriminant formula (): if = b 4ac 0,it has two rational root, it can be reresente as formula(2), an q are two rime factors by 2 comuting. if = b 4ac < 0, it is looing for {e, f} an calculate the s, at the same time seeing, q trough the iscriminant olynomial. It can search for integer {e, f} in small scoe if the rimes are smaller, an get s ecoing algorithm easily. In orer to imrove the security of RSA algorithm, it is necessary to increase the rivate ey resulting in larger ower oeration, sening a lot of time an storage sace, increasing system erformance overhea. f n / s ( x) = ( a x + b )( aq x + bq ) = q (2) The imrove RSA algorithm will brea own into a number of ifferent bloc using vector D = (, 2,, ) inicating which can be a searate oeration, so it can efficiently erform encrytion oerations. At the same server transfers art of ecrytion comutation to the client, balancing its worloa. It can achieve arallel rocessing to meet more connection requests. The algorithm basic iea is that server broen own rivate ey : = f + f f (moϕ( n)) (3) In formula (3), fi, i were searately c bit, n bit ranom vector, c etermines its safety. Sen vector first to the client, The client accoring to vector D that the server sen to an the formula (4) calculates the vector Z each element sent to the server. z x i i = (mo n), i (4) It can see the calculation of vector Z elements only associate with the vector D from the Eq.(4). The vector D each element is ineenent, so it can arallel comuting each element of vector Z, imroving the client encrytion see. Then the server ecryts the session ey accoring to the vector Z an formula (5). fi zi = x fii = x (mo n) In the imrove RSA algorithm, it ecomose large numbers of ower oeration into small moulus ower oeration of M, M q, they resectively by Eq.(6) an Eq.(7) calculate, fi an gi are c bit ranom value, an q can be arallel comute alone through Eq. (8) an Eq. (9), then server comletes the ecrytion oeration through the formula (0). M fi = zi ) gi f (5) i (mo = x (6) i q M = z i (mo q) = x (7) q x f = fii mo( ) (8) q = gi i mo( q ) (9) = M n + M n (mon) (0) n q q = q( q (mo )) () n q = ( (moq)) (2) It erforms ecrytion oeration by the formula (0). The server resectively calculates n, nq through Eq.() an Eq.(2) in avance. 4 Analysis of the Imrove SSL Protocol Performance In this aer, it will analyze the erformance of the imrove SSL rotocol from ata security, ata E-ISSN: Volume 3, 204
4 traffic an efficiency three inicators. The security intensity of stanar RSA algorithm is etermine by the ey length which is in 024 ~536 bit ey length guaranteeing security. In the imrove RSA algorithm, the safety of an q ensure the confientiality. After the illegal users get vector, they can get an q by searching all the ossible values of vector F an G which have elements[7]. Each element has c bit, so it will nee to test 2c through the exhaustive search. When c > 72 the security is quite retty with RSA ey length 024~536 bit by calculating, therefore the imrovement of SSL rotocol still has high security. While the imrove SSL hanshae rotocol in ientity authentication, it only sens CID instea certificate of entity, reucing the amount of communication ata, imroving the hanshae rotocol connection see greatly. The hanshae transmission message in SSL rotocol an imrovement is as shown in tableⅠ. Among them, null inicates the fiel is emty, n means transfer certificate number. The client an server certificate both nee to be verifie after sening certificateverify message, therefore tae n for 2[8]. Table : The Comarison of Hanshae Message Length message orer hanshae message message length of original SSL rotocol message length of imrove SSL rotocol Client-hello r c + SID + SecNeg + V r c + SID + SecNeg + V 2 Server-hello r s + SID + V r s + SID + V 3 Certificate Cert CID 4 Server-ey-exchange SecNeg SecNeg 5 Certificate-request CertificateTye + CertificateAuthorites CertificateTye + CertificateAuthorites 6 Server-hello-one null null 7 Certificate-verify Cert n+ H(m) CID + H(m) 8 Client-ey-exchange SecNeg SecNeg 9 Change-ciher-sec Change-ciher-sec Change-ciher-sec 0 Finishe m5-hash m5-hash Change-ciher-sec Change-ciher-sec Change-ciher-sec 2 Finishe m5-hash m5-hash The length of the arameters in Table Ⅰ as follows: rc = rs =20Byte, SID =4 Byte, SecNeg =3Byte, V = lbyte, H() =20Byte, Changeciher-sec =Byte, CID =8Byte, m5- hash =6Byte, CertificateTye =Byte, CertificateAuthorites =2 Byte, SSL certificate length is estimate KB. Each message estimating length results are shown in Table Ⅱ. Transmission an verification certificate is a major cause of leaing to the SSL rotocol big traffic from Table Ⅱ. The imrove SSL hanshae rotocol transfers CID instea of the certificate reucing the traffic in the rocess of shaing hans. Its ata traffic reuces from 388 to 32 byte, is 4% of the original traffic, seeing u the SSL rotocol hanshae, enhancing the woring efficiency of the system. Hence it can eal with more the SSL connection requests. Table 2: The Message Length of Two Protocols (Unit: Byte) message orer length of hanshae message total original SSL rotocol imrove SSL rotocol The aer imroves the efficiency of SSL through imrove RSA encrytion algorithm. It uses c++ language to rogram the stanar RSA algorithm an the imrove algorithm. It aots exan Eucli algorithm to realize gc(e,φ(n)) an e-(mo φ(n)) an uses the basic metho to realize moe of ower oeration. The (len (), len (q)) that len(), len(q) resectively elegate, q igits inicates the size of RSA algorithm[9]. The algorithms ineenently run 00 times for ifferent igits of rime. The aer will comare efficiency of the imrove algorithm with stan algorithm from system initialization an ecrytion oeration two asects. The erformance comarison of two ins of algorithm initialize is shown in figure 2. The E-ISSN: Volume 3, 204
5 initialization execution time of two ins of algorithm is funamentally the same before (len (), len (q)) = (80, 60). The initialization execution time of the imrove RSA algorithm is about 40s when (len(), len(q))=(90,70), an the stanar algorithm is about 390s from the figure 2 Although the imrove RSA algorithm requires a certain time for the rivate ecomosition, the initialization time consuming is not significantly increasing with the increase of rime bits an the imrove algorithm only initializes once an erformance loss is not obvious. Hence running see of the imrove algorithm has quicene significantly in the bac of the moule an ower oeration once the algorithm is built. Fig.2 Comarison of Initialization erformance stanar algorithm neraly 0 times when (len(), len(q))=(00,80).the imrove RSA algorithm will greatly imrove the ecrytion see, shorten the hanshae connection time, hanle more requests, imrove the system efficiency. Because it ecomoses rivate ey that M, M q are comose of various small moule ower oeration comleting arallel rocessing an calculates the, q, n, n q in avance. At the time the server transfers art of ecrytion comutation to the client reucing worloa. 5 Conclusion The aer rooses an imrove SSL rotocol to realize synchronous ata secure transmission in view of the security roblem of synchronization ata in mobile atabase system. The imrove SSL rotocol ecomoses the rivate ey of RSA algorithm reucing the moe of ower oeration an re-rocesses art of the ecrytion moule so that reucing the overall running time an imroving the imlementation efficiency of the SSL rotocol. At the same time it restores server certificate on the client to abanon transferring certificate of entity in the rocess of the SSL hanshae to reuce the communication loa of the rotocol by assing the CID. The imrovements of the SSL rotocol guarantee synchronous ata securely an efficiently transorts in mobile atabase system. Fig.3 Comarison of ecrytion erformance The ecrytion erformance comarison of two algorithms is shown in figure 3.The imrove RSA algorithm ecrytion erformance is stanar algorithm about 7 times when (len(), len(q))=(80,60) from the figure 3, an the effect is more significant with the increase of rime bit. The imrove RSA algorithm ecrytion erformance is References: [] M.R. Chen, X. Zhang an K. He, Scheme of imrovement an chosen-cihertext security of ublic ey encrytion, Journal of comuter, vol.36, no.6,.49-54, 203. [2] PanosK. Chrysanthis, Transaction Processing in Mobile Comuting Environment, IEEE on Avances in Parallel an Distribute Systems, vol., no.0,.77-82, 999. [3] L. H. Yeo, A. Zaslavsy, Submission of Transactions from Mobile Worstations in a CooPerative Multiatabase Processing Environment, Proc. 4th IEEE CS International Conference on Distribute Comuting Systems. Polan. 994, [4] S. Acharya, M. Franlin an S. Zoni, Dissemination-base ata elivery using E-ISSN: Volume 3, 204
6 broacast iss, IEEE Personal Communications,.50-60, Dec [5] C. Su, L. Tassiulas, Broacast scheuling for information istribution, Proc. of IEEE Infocom, Los Alamitos, 997, [6] M. Nicola an M. Jare, Performance moeling of istribute an relicate atabases, IEEE Transaction on Knowlege & Data Engineering, vol.7, , [7] G.D. Walborn, P.K. Chrysanthis, Suorting Semantics-base Transaction Processing in Mobile Database Alications, Proceeings of 4th IEEE Symosium on Reliable Distribute Systems, vol.09,.3-40, 995. [8] E,U. Grenoble, Mobile Databases: a Reort on Oen Issues an Research Directions, ACM SIGMOD Recor, vol.33, no.2,.78-83, [9] J. Bachouse, H. Caro, A. McDonnell, Towar Public-Key Infrastructure Inter-oerability, Communications of the ACM, vol.46, no.6,.98-00, E-ISSN: Volume 3, 204
An Approach to Optimizations Links Utilization in MPLS Networks
An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC.
A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
Load Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management
The Imact of Forecasting Methos on Bullwhi Effect in Suly Chain Management HX Sun, YT Ren Deartment of Inustrial an Systems Engineering, National University of Singaore, Singaore Schoo of Mechanical an
GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *
GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications
Power analysis of static VAr compensators
Available online at www.scienceirect.com Electrical Power an Energy ystems 0 (008) 7 8 www.elsevier.com/locate/ijees Power analysis of static VAr comensators F.. Quintela *, J.M.G. Arévalo,.. eono Escuela
A Certification Authority for Elliptic Curve X.509v3 Certificates
A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena
MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND
art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN
JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT
OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 [email protected] Ugo Buy Comuter Science
FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
Text Analytics. Modeling Information Retrieval 2. Ulf Leser
Text Analytics Moeling Information etrieval 2 Ulf Leser Content of this Lecture I Moels Boolean Moel Vector Sace Moel elevance Feebac in the VSM Probabilistic Moel Latent Semantic Inexing Other I Moels
Design of A Knowledge Based Trouble Call System with Colored Petri Net Models
2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Concurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
Enterprise Resource Planning
Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach
Enhanced Security Key Management Scheme for MANETS
Enhanced Security Key Management Scheme for MANETS EDNA ELIZABETH.N, SUBASREE.S, and S.RADHA Electronics and Communication Engineering Deartment Sri Sivasubramaniya Nadar College of Engineering Kalavakkam,
BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart
CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Simulink Implementation of a CDMA Smart Antenna System
Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The
Double Integrals in Polar Coordinates
Double Integrals in Polar Coorinates Part : The Area Di erential in Polar Coorinates We can also aly the change of variable formula to the olar coorinate transformation x = r cos () ; y = r sin () However,
Data Center Power System Reliability Beyond the 9 s: A Practical Approach
Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
How To Understand The Structure Of A Can (Can)
Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the
Stock Market Value Prediction Using Neural Networks
Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: [email protected] Hamireza Taremian Engineering
Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs
Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
PRETRIAL NEGOTIATION, LITIGATION, AND PROCEDURAL RULES
PRETRIAL NEGOTIATION, LITIGATION, AND PROCEDURAL RULES JIONG GONG AND R. PRESTON MCAFEE* We moel the ciil isute resolution rocess as a two-stage game with the arties bargaining to reach a settlement in
Secure synthesis and activation of protocol translation agents
Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see
INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES
1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Failure Behavior Analysis for Reliable Distributed Embedded Systems
Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of
An Efficient NURBS Path Generator for a Open Source CNC
An Efficient NURBS Path Generator for a Oen Source CNC ERNESTO LO VALVO, STEFANO DRAGO Diartimento di Ingegneria Chimica, Gestionale, Informatica e Meccanica Università degli Studi di Palermo Viale delle
Energy consumption in pumps friction losses
Energy consumtion in ums friction losses In this secon article in a series on energy savings in ums, Hans Vogelesang, irector of Netherlans-base esign consultancy PumSuort, eals with some ractical asects
A Data Placement Strategy in Scientific Cloud Workflows
A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,
A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition
A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition B.Sundar Raj Assistant rofessor, Det of CSE, Bharath University, Chennai, TN, India. ABSTRACT: This aer
Service Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
Service Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
Complex Conjugation and Polynomial Factorization
Comlex Conjugation and Polynomial Factorization Dave L. Renfro Summer 2004 Central Michigan University I. The Remainder Theorem Let P (x) be a olynomial with comlex coe cients 1 and r be a comlex number.
STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND
STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications
Rummage Web Server Tuning Evaluation through Benchmark
IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.
Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing
Dynamic Load Balance for Aroximate Parallel Simulations with Consistent Hashing Roberto Solar Yahoo! Labs Santiago, Chile [email protected] Veronica Gil-Costa Universidad Nacional de San Luis, Argentina
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks
Tra Coverage: Allowing Coverage Holes of Boune Diameter in Wireless Sensor Networks Paul Balister Zizhan Zheng Santosh Kumar Prasun Sinha University of Memhis The Ohio State University {balistr,santosh.kumar}@memhis.eu
FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY
FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering
The Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden [email protected] School of Technology and Society, Malmö University,
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
Achieving quality audio testing for mobile phones
Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing
LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING
LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING Ranjan Kumar 1 and G Sahoo 2 1 Deartment of Comuter Science & Engineering, C.I.T Tatisilwai, Ranchi, India 2 Deartment of Information Technology, B.I.T
Managing Sales Return in Dual Sales Channel: Common Return versus Cross-Channel Return Analysis
Managing ales Return in ual ales Channel: Common Return versus Cross-Channel Return Analysis Erwin Wioo, atsuhiko Takahashi, atsumi Morikawa, I Nyoman Pujawan, an Bui antosa Abstract This work examines
A Study on the Interfacial Characteristics of Nitramine Explosive-Polymer Binder
169 A tuy on the Interfacial Characteristics of Nitramine Exlosive-Polymer Biner Jung. him, Hyoun. Kim, Keun D. Lee an Jeong K. Kim Agency for Defense Develoment (ADD) Yuseung P.O.Box 35-5, Daejon, Korea
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France
Unit 3. Elasticity Learning objectives Questions for revision: 3.1. Price elasticity of demand
Unit 3. Elasticity Learning objectives To comrehen an aly the concets of elasticity, incluing calculating: rice elasticity of eman; cross-rice elasticity of eman; income elasticity of eman; rice elasticity
Web Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law
Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
How To Write A Powerline
The Stragegy for Fat I/O in Degrae Moe of RAID-5 *DONG-JAE, KANG *CHANG-SOO, KIM **BUM-JOO,SHIN *Comuter & Sytem Lab. ETRI 161 Gajeong-Dong, Yueong-Gu, Deajeon, 35-35 KOERA **125-1 Naei-Dong Miryang Gyeongnam
TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks
On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area etworks Takeshi Ito, Hiroyuki Ohsaki, and Makoto Imase Abstract In wide-area Grid comuting, geograhically distributed comutational resources
Wavefront Sculpture Technology
Auio Engineering Society Convention Paer Presente at the th Convention 00 Setember New York, NY, USA This convention aer has been rerouce from the author's avance manuscrit, without eiting, corrections,
Buffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
CSC 474 Information Systems Security
CSC 474 Information Systems Security Topic 4.5 Transport Layer Security CSC 474 Dr. Peng Ning 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
SECURE SOCKETS LAYER (SSL)
INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS
CSC 774 -- Network Security
CSC 774 -- Network Security Topic 6: Transport Layer Security Dr. Peng Ning CSC 774 Network Security 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
Free Software Development. 2. Chemical Database Management
Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN
Risk Management for Derivatives
Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where
Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University
Network Security Web Security and SSL/TLS Angelos Keromytis Columbia University Web security issues Authentication (basic, digest) Cookies Access control via network address Multiple layers SHTTP SSL (TLS)
How To Segmentate An Insurance Customer In An Insurance Business
International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah
Monitoring Frequency of Change By Li Qin
Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial
From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling
From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France [email protected] Henri Casanova Det. of Information and Comuter Sciences University
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms
C-Bus Voltage Calculation
D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers
State of Louisiana Office of Information Technology. Change Management Plan
State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change
Franck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: [email protected]
MPI versus MPI+OenMP on the IBM SP for the NAS Benchmarks Franck Caello and Daniel Etiemble LRI, Université Paris-Sud, 945, Orsay, France Email: [email protected] Abstract The hybrid memory model of clusters
Local Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University [email protected] Rik Sarkar Comuter Science Freie Universität Berlin [email protected]
Branch-and-Price for Service Network Design with Asset Management Constraints
Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Product Differentiation for Software-as-a-Service Providers
University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 1 SSL/TLS The Secure Socket Layer (SSL) and Transport Layer Security
On Traffic Fairness in Data Center Fabrics
On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: [email protected]
Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems
Safety evaluation of digital ost-release environment sensor data interface for distributed fuzing systems 57 th Fuze Conference, Newark, NJ Wednesday, July 30 th, 2014 Oen Session IIIA, 3:20 PM S. Ebenhöch,
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
Inverse Trig Functions
Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that
Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE
RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently
