ThresPassport A Distributed Single Sign-On Service
|
|
|
- Beatrix Willis
- 10 years ago
- Views:
Transcription
1 ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng , Chna [email protected], [email protected] 2 Mcrosoft Research Asa, Bejng , Chna {bnzhu, spl}@mcrosoft.com Abstract. In ths paper, we present ThresPassport (Threshold scheme-based Passport), a web-based, dstrbuted ngle gn-on (O) system whch utlzes a threshold-based secret sharng scheme to splt a servce provder s authentcaton key nto partal shares dstrbuted to authentcaton servers. Each authentcaton server generates a partal authentcaton token upon request by a legtmate user after proper authentcaton. Those partal authentcaton tokens are combned to compute an authentcaton token to sgn the user on to a servce provder. ThresPassport depends on nether Publc Key Infrastructure (PKI) nor exstence of a trustworthy authorty. The sgn-on process s as transparent to users as Mcrosoft s.net Passport. ThresPassport offers many sgnfcant advantages over.net Passport and other Os on securtyortablty, ntruson and fault tolerance, scalablty, relablty, and avalablty. 1 Introducton As computer networks and systems prolferate to support more onlne accesses and busness, a user s typcally requred to mantan a set of authentcaton credentals such as username and password for each servce provder he or she s enttled to access. A user s facng a dlemma between usng dfferent authentcaton credentals for each ndvdual servce provder for the sake of securty, resultng n escalatng dffculty n memorzng all those credentals, and usng the same credentals for many servce provders for easy memorzaton at the cost of lowered securty. Forcng a user to enter authentcaton credentals frequently when the user accesses dfferent servce provders or the same servce provder multple tmes s also an awkward user experence. It s desrable to have an authentcaton servce to manage a user s sgn-on credentals and allow the user to authentcate hm or her convenently to a varety of servce provders. ngle gn-on (O) has been proposed as a potental soluton to the mplcatons of securty, credentals management, and usablty for the aforementoned applcatons. O utlzes a centralzed credentals management to provde authentcaton servces for users to access partcpatng servce provders. Wth O, a user needs to authent- Contact author: Bn B. Zhu, emal: [email protected] (preferred) or [email protected]. Ths work was done when Teru Chen was an ntern at Mcrosoft Research Asa.
2 cate hm or her to an authentcaton servce only once, whch n turn enables hm or her to automatcally log nto partcpatng servce provders he or she has access permsson when needed wthout any further user nteractons. uch a system makes the complexty to log nto an ncreasng number of servce provders completely transparent to a user. From a user s pont of vew, there s no dfference between loggng nto one servce provder and nto multple servce provders. The complexty s handled by the O system behnd scene. In other words, O enhances usablty n loggng nto multple servce provders dramatcally wth a centralzed authentcaton servce. everal dfferent O systems have been proposed. Kerberos [1] s an O system whch s wdely used when users, authentcaton servers, and servce provders are under a centralzed control such as n the same company. In Kerberos, a user authentcates to an authentcaton server and obtans a vald Tcket Grantng Tcket (TGT) whch s used to authentcate the user to a Tcket Grantng erver (TG) when requestng a ervce Grantng Tcket (GT). To access a servce, a user requests an GT from a TG and presents t to the servce provder whch checks valdty of the tcket and makes a decson f access s granted or not. Kerberos s not sutable for use n an untrusted envronment such as the Internet [2]. The Lberty Allance [3], a consortum of over 150 member companes, recently developed a set of open specfcatons for web-based O. ecurty Assertons Markup Language (AML) [4], a standard, XML-based framework for creatng and exchangng securty nformaton between onlne partners, s used n the specfcatons. The most popular and wdely deployed web-based O should be Mcrosoft s.net Passport [5] whch has provded servces snce The core of Passport s archtecture s a centralzed database whch contans all the regstered users and assocated data and credentals. Every account s unquely dentfed by a 64-bt number called the Passport ser ID (PID). Each partcpatng servce provder s also assgned a unque ID, and needs to mplement a specal component n ts web server software and to share wth the Passport server a secret key whch s delvered out of band. To log nto a partcpatng servce provder, a user s browser s redrected to the Passport server whch tres to retreve and verfy valdty of a Tcket Grantng Cooke (TGC) from the web browser s cooke cache. If such a cooke s not found, then the user needs to enter account name and password to authentcate to Passport, whch saves a fresh TGC n the browser s cooke cache. A TGC s encrypted by a master key known only to Passport. If everythng goes all rght, Passport saves n the browser s cooke cache a set of cookes encrypted wth the secret key shared between Passport and the specfc partcpatng servce provder. The set of cookes acts lke Kerberos GT and s used to authentcate the user to the partcpatng servce provder. More detals of dfferent O archtectures can be found n [2]. There are a few major concerns on securty and avalablty of.net Passport that prevent users and servce provders from wdely adoptng.net Passport as a webbased logn servce, esp. for accessng web servces such as a bank account whch requre hgher securty and contan senstve prvate data. These ssues are analyzed and dscussed n detal n [6, 7]. In.NET Passport, a user s authentcaton nformaton s centrally managed by the Passport server. Every user has to be dentfed and authentcated wth the help of the data stored n the central database. Every partcpatng servce provder depends on the response of the Passport server and ts securty..net
3 Passport s not scalable. The Passport server s a sngle pont of falure and a central pont of attacks for the system. It s an attractve target for hackers to paralyze the whole system through dstrbuted denal-of-servce attacks. A sngle compromse of the Passport server may endanger the whole system. Passport cookes are the only authentcaton proofs n.net Passport. nless a user chooses the automatc sgn-n mode whch uses persstent cookes, a cooke s lfetme n.net Passport s determned only by the browser s lfetme and the encrypted cooke s expraton tme. A user who forgets to log off the Passport account on a publc computer could leave vald authentcaton tokens for anyone to recover and reuse, whch s partcularly dangerous for persstent cookes that are strongly dscouraged to use. Threshold-based secret sharng [8, 9] has been extensvely studed n cryptography. A (k, m) threshold scheme splts a secret nto m shares and dstrbutes each share to an entty. Any k shares can be used to fully recover the secret whle any number of shares less than k wll not be able to recover the secret. Threshold-based secret sharng has recently been proposed to use n CorO, a dstrbuted O servce by Josephson et al. [10]. CorO s used to authentcate usersrograms, and servces, whch are referred to as prncpals. In CorO, each party has a par of publc and prvate keys. A set of authentcaton servers create a par of publc and prvate keys K, } and { k uses a threshold scheme wth a threshold t to splt the prvate key k and stores a dstnct share at each authentcaton server of the set. The publc key K s sent to and stored by an applcaton server A whch uses the set of authentcaton servers for authentcaton servce. The prvate key k speaks for the set of the authentcaton servers. A prncpal C also has a par of publc and prvate keys K, } where the { c k c prvate key k c speaks for the prncpal. When a prncpal C wants to access an applcaton server A, the prncpal C uses ts prvate key k c to encrypt a fresh challenge from the applcaton server A, and requests authentcaton servers to certfy ts publc key K c. Each authentcaton server, after proper dentty checkng, generates for the prncpal C a partal certfcate whch s an encrypted verson of the content ncludng the prncpal C, ts publc key K, vald tme of the certfcate, etc. wth ts partal c share of k. The prncpal C combnes the t partal certfcates receved from t authentcaton servers to compute a certfcate sgned wth the authentcaton prvate key k, whch s then sent together wth the challenge encrypted wth the prncpal s prvate key k c to the applcaton server A. The applcaton server A uses the authentcaton servers publc key K to verfy the receved certfcate, and then extracts the prncpal s publc key K c to decrypt the encrypted challenge and compare wth the orgnal challenge t sends to C to decde f the prncpal s allowed to access the applcaton server. It s clear that the threshold scheme and authentcaton servers are used to replace the conventonal Certfcate Authorty (CA) to certfy the publc key for each prncpal n CorO. The requrement of a par of publc and prvate keys for each prncpal renders CorO napproprate for web-based sngle sgn-on authentcaton servce for users,.e. the applcaton arena targeted by.net Passport and the Lberty Allance, snce CorO does not provde any portablty n ts authentcaton
4 servce. A user cannot easly use dfferent computers to access a web servce the user has permsson to access snce t s very nconvenent and nsecure to carry hs or her prvate key around. In ths paper, we present a dstrbuted, user-frendly O system based on threshold-based secret sharng. Our O system s called ThresPassport a threshold scheme-based Passport. In ThresPassport, a partcpatng servce provder selects a secret key K s and utlzes a threshold scheme to splt K s nto partal shares, each partal share s sent to an authentcaton server out of band durng regstraton of the servce provder. ThresPassport s clent module utlzes a user s account name and password to generate a dstnct logn credental for the user to authentcate to each authentcaton server. An authentcaton server uses ts partal share of the secret key K s to encrypt a challenge from the servce provder passed to t from a user s clent module. The clent module combnes t encrypted challengers from t authentcaton servers, computes a challenge encrypted by the servce provder s secret key K s, and passes the result to the servce provder, whch decrypts the receved encrypted challenge and compares wth the orgnal challenge to decde f the user s granted access permsson. ThresPassport shows many sgnfcant advantages over.net Passport and CorO, whch are dscussed n detal later n ths paper. The paper s organzed as follows. In ecton 2 we descrbe n detal the archtecture and protocols of our dstrbuted O system, ThresPassport. ecurty and comparson wth.net Passport and CorO are then presented n ecton 3. The paper concludes n ecton 4. 2 ThresPassport A ThresPassport O system conssts of three partes: users who want to access servce provders, servce provders who provde servces to users, and authentcaton servers whch offer sngle sgn-on servces for partcpatng users to access partcpatng servce provders. In ThresPassport, a server module s nstalled n the partcpatng servce provder s server, and a downloadable web browser s plug-n s nstalled to a user s clent machne. Before gong to ThresPassport detals, the notaton used n ths paper s ntroduced frst. 2.1 Notaton A partcpatng servce provder. A partcpatng user. A The -th authentcaton server. ID A unque ID for a partcpatng user. ID A unque ID for a partcpatng servce provder. AID An unque ID for the -th authentcaton server A. K A secret key generated by and known only to.
5 K The -th partal share of K s generated by a threshold scheme. K A secret key for to authentcate to the -th authentcaton server A. p 1 2 Two properly selected prme ntegers 2 > p1. g A generator n Ζ, 2 g p1 2. * p 1 K, A A sesson key between a user and the -th authentcaton server A. < m > k A message m encrypted by a symmetrc cpher wth a key k. k p < m >, It means m k mod p where m Z p. n X Nonce generated by entty X. r X A random number generated by entty X. [ x ] x s optonal n descrbng a protocol. 2.2 ThresPassport Protocols ThresPassport s dvded nto two phases: the setup phase and the authentcaton phase. In the setup phaseartcpatng servce provders and users regster to authentcaton servers, and generate and send secret keys securely to authentcaton servers out of band. Those keys wll be used n the authentcaton phase to authentcate a user to authentcaton servers and to a servce provder. In the followng, we assume that there are n authentcaton servers n total and a (t, n) threshold scheme s used to share a servce provder s secret key K. s etup Protocols for Partcpatng ervce Provders and sers Durng the setup phase, both partcpatng servce provders and users are requred to regster wth the authentcaton servers and nstall a server module on servce provders servers and a clent web browser plug-n on users machnes. A partcpatng servce provder utlzes the followng protocol to regster securely to authentcaton servers. 1. : Generates a secret key K, 1 K p2 2, and calculate K such that K K = K K = mod ( p 1) 2. : ses a (t, n) threshold scheme to splt K nto n shares K, 1 n. 3. A, 1 n: ID, K. 4. A, 1 n : uccess. A stores ID and K for later usage. A user also needs to regster wth the authentcaton servers before he or she can enjoy the authentcaton servce provded by ThresPassport. The followng protocol s
6 used to regster a user to the authentcaton servers. The regstraton process must be secure. 1. : Generates a unque user name and a good password. The clent program generates a unque ID from the user name. 2. : Computes K = hash ( sername, Password, A ), 1 n. 3., 1 n: ID, K. A 4. A, 1 n : uccess. A stores ID and K for later usage ser Authentcaton Protocol to an Authentcaton erver If a user has not authentcated to an authentcaton server A yet durng a sngle sgn-on process of ThresPassport, the user s requred to authentcate to A before A can help authentcate the user to a servce provder. A challenge-response protocol such as the followng one usng the shared key K derved from the user s password can serve the purpose and generate a sesson key for subsequent confdental communcatons between the user and the authentcaton server. 1. A : Authentcaton request. 2. A : n A. 3. A : ID, < r, n, n >. 4. A : A A K A K < r, n, n > or falure. In tep 3, generates the authentcaton key K from s password wth the equaton K = hash ( sername, Password, A ). In tep 4, A uses the receved ID to extract the correspondng key K to decrypt the receved message and encrypt the message to be sent. The decrypted nonce n A s compared aganst that sent n tep 2 to decde what to send n tep 4. If the protocol ends successfully, a sesson K, s generated at both ends by hashng the communcated random numbers r A and r : K = hash( r, r ). Ths sesson key s used for subsequent confdental A, A A communcatons between and A for the sesson. Once the sesson ends, K, s A destroyed and a user has to authentcate to A agan through the above protocol. A sesson can be termnated by a user or when the lfetme set by the securty polcy expres.
7 2.2.3 ngle gn-on Protocol The followng protocol s used for a user s clent module to acqure an authentcaton token from authentcaton servers and to gan access to a servce provder. 1. : Request access to a servce : ID, n,[ < g > r ], [a lst of t authentcaton servers {, 1 f t} ]. 3. For 1 f t Ad f r 1 3.1: A d f : ID, n, [ < g > ],[ID] 3.2: 2 A : < ID,, n, [ < g > ] > d f d r 1 K f r 1 K 2 4. : ID, < ID,, n, [ < g > ] >, [ < n > k], r r 1 where k =< g >. 5. : access s granted or dened. In tep 2, the servce provder pcks up t lve authentcaton servers from all avalable authentcaton servers based on workloads, bandwdthsrocessng power, relablty, etc. and sends to the user s module. Ths means that a servce provder may need to montor status of authentcaton servers. An alternatve soluton s that the clent s module tres to fnd t lve authentcaton servers from the lst of n authentcaton servers receved from the servce provder. If the lst of authentcaton servers s already known to clents, there s no need to send the lst to a clent. In tep 3, f the user has not authentcated to the t authentcaton servers yet or the precedng sessons have expred, the user authentcaton protocol descrbed n ecton s used to authentcate the user to each authentcaton server A and set up a secure communcaton channel between and d f A d f wth a sesson key K, A d f before gong to tep 3.1. Note that the communcatons between the user and an authentcaton server n teps 3.1 and 3.2 are confdental by usng the sesson key K, obtaned when the user s authentcated to the server, although the message A d f sent n tep 3.2 s not necessary to be confdental snce t s already encrypted. The clent n tep 4 computes an authentcaton token r 1 K 2 < ID,, n, [ < g > ] > from the receved t partal authentcaton token d r 1 K f 2 < ID,, n, [ < g > ] >. In tep 5, the servce provder uses the secret key 1 K known only to tself to decrypt the receved token: 1 r, 1 p K K r ]) ) = ( ID,, n, [ < g > ]) mod p 2 1 (( ID,, n, [ < g >, and makes a decson f access s granted or dened. If secure communcaton s desred after s sgned to, the optonal tems related to the generator g are also communcated n the protocol. The sesson key for subsequent confdental communcatons between
8 r r 1 and s set to be < g >, whch s k n tep 4. Ths sesson key s n fact generated wth the Dffe-Hellman key agreement [11]. r 1 K 2 Both the authentcaton token < ID,, n, [ < g > ] > and the partal au- 2 thentcaton token < ID,, n, [ < g > ] > contan whch s an unque network ID of the user s clent machne such as the network address. Note that nonce and random numbers n dfferent protocols have no relatonshp even though we use the same notaton n descrbng the protocols. d r 1 K f 3 ecurty and Comparson wth Other Os 3.1 ecurty of ThresPassport In ThresPassport, a servce provder s key K s generated by and known only to the provder. Authentcaton servers do not know and cannot deduce ths secret key unless t or more authentcaton servers collude. Ths secret key never transfers over a network and s under full control by ts rghtful owner. uch a desgn guarantees the securty of the secret key. On the clent sde, a user s password s never used drectly n authentcaton. Instead t s used wth a one-way functon to derve the authentcaton keys used to authentcate the user to authentcaton servers. An authentcaton server A cannot use the authentcaton key K t knows to recover the password or the user s authentcaton keys to other authentcaton servers wthout a brute force attack. Note that the authentcaton key K s never transferred over a network except durng the setup stage. That sad, a user s password should be complex enough to avod weak keys snce the authentcaton keys K are generated from the password, and hence contan no more entropy than the password. nce passwords are entered at the clent sde, certan securty and tamper resstance are requred for the clent module. uch a requrement s typcal n most securty software at the clent sde. For example, there should be no malcous module between the user and the clent module to launch a man-n-the-mddle attack to mpersonate the user n communcatng wth the clent module. The sesson keys stored by the clent module durng the lfe of the sesson should not be examned by untrustworthy programs. Our desgn also mnmzes such a rsk. In ThresPassport, a user s password s lve n memory n a very short tme. It s overwrtten once the authentcaton keys { K } are generated. Once the authentcaton process to authentcate a user to servers s over, the authentcaton keys } { K are overwrtten. Only the temporal, one-tme sesson keys are stored n memory and used n subsequent communcatons between the clent and authentcaton servers durng the lfe of the sesson.
9 3.2 Comparson wth Other Os { k In ths subsecton, we would lke to compare ThresPassport wth.net Passport [5] and CorO [10]. To an end user, ThresPassport appears the same and as easy to use as.net Passport. The complexty to authentcate a user to multple authentcaton servers n ThresPassport s completely hdden nsde the protocols and software. On the other hand, ThresPassport shows several mportant advantages over.net Passport. On the securty sde, there s no sngle central pont contanng all the secret credentals n ThresPassport. All secret credentals are completely controlled by each rghtful owner: a servce provder s key s controlled by and known only to the provder. A user s password s controlled by and known only to the user (and to the clent s module n a very short tme). Hackers have to compromse up to t authentcaton servers to ncur securty damage to ThresPassport, thanks to the (t, n) threshold scheme used n the system. nce.net Passport requres L/TL channels to communcate between the user and the Passport server, an approprate Publc Key Infrastructure (PKI) must be n place. Lke Kerberos, ThresPassport does not depend on any PKI. In ThresPassport, sesson keys replace authentcaton cookes n.net Passport for authentcaton, and therefore mtgate the rsk that a subsequent user recovers the precedng user s authentcaton cookes n.net Passport to mpersonate the precedng user to llegally access servce provders. A user s prvacy s also better protected n ThresPassport, thanks to the notorous prvacy track record of cookes. On the relablty sde, ThresPassport s no longer a system of a sngle pont of falure lke.net Passport due to ts dstrbuted authentcaton servers. Any t out of the total n authentcaton servers can provde authentcaton servces to users n the system. It s much more dffcult to launch a dstrbuted denal-of-servce attack to dsable all but t 1 or less authentcaton servers. On the contrary, a successful denalof-servce attack to the Passport server would dsrupt authentcaton servces completely n.net Passport. ThresPassport s also scalable, dealng well wth both small and large systems wth a large varety of users and servce provders. ThresPassport also shows several sgnfcant advantages over CorO. ThresPassport enables portablty that CorO lacks. A user can use any computer (as long as the ThresPassport s clent module s downloaded and nstalled) to sgn on and access a servce provder n ThresPassport. In CorO, a trustworthy authorty s assumed, whose role s to generate a par of publc and prvate keys K, } for a set of authentcaton servers and to use a threshold scheme to splt the prvate key k nto partal shares dstrbuted to and stored by ndvdual authentcaton servers. In ThresPassport, each party controls ts own secrets, and there s no dependency on the exstence of such a trustworthy authorty. Ths advantage s extremely attractve when authentcaton servers are controlled and admnstrated by dfferent companes snce n ths case federaton s needed to acheve a vrtual trustworthy authorty. A thrd advantage s that approprate PKI s requred n CorO, recall that each of the three partes n CorO, a prncpal, a servce provder, or a set of authentcaton servers, has a par of publc and prvate keys speakng for tself. As we have just mentoned above, ThresPassport does not depend on any PKI whch dramatcally ncreases ts chance to be wdely adopted and employed.
10 4 Concluson In ths paper, we have presented ThresPassport, a web-based, dstrbuted sngle sgnon system usng passwords, threshold-based secret sharng, and encrypton-based authentcaton tokens. In ThresPassport, crtcal secrets such as a servce provder s sgn-on key and a user s password are always controlled by and known only to the orgnal owner. Every authentcaton server owns partal authentcaton nformaton of a clent or a servce provder. A threshold number of authentcaton servers are requred to accomplsh an authentcaton servce. ThresPassport depends on nether PKI nor exstence of a trustworthy authorty. It s as transparent and easy to use as.net Passport. ThresPassport offers many sgnfcant advantages over.net Passport and other proposed Os on securtyortablty, ntruson and fault tolerance, scalablty, relablty, and avalablty. References 1. Internet Engneerng Task Force: RFC 1510: The Kerberos Network Authentcaton ervce (V5) (1993) 2. Pashalds, A., Mtchell, C. J.: A Taxonomy of ngle gn-on ystems. In afav-nan, eberry, J. (eds.): 8th Australasan Conf. Info. ecurty and Prvacy (ACIP) Wollongong, Australa, July 9-11, Lecture Notes n Computer cence, Vol. 2727, prnger-verlag, Berln Hedelberg New York (2003) Kormann, D. P., Rubn, A. D.: Rsks of the Passport ngle gnon Protocol. IEEE Computer Networks, 33 (2000) Opplger, R.: Mcrosoft.NET Passport: A ecurty Analyss. IEEE Computer Magazne, 36 (7) (2003) hamr, A.: How to hare a ecret. Communcatons of ACM, 24 (11) (1979) houp, V.: Practcal Threshold gnatures. Proc. EROCRPT 00, Lecture Notes n Computer cence, Vol. 1807rnger-Verlag, Berln Hedelberg New York (2000) Josephson, W. K., rer, E. G., chneder, F. B.: Peer-to-Peer Authentcaton wth a Dstrbuted ngle gn-on ervce. 3rd Int. Workshop on Peer-to-Peer ystems (IPTP 04), an Dego, A (2004) 11. Menezes, A. J., van Oorschot, P. C., Vanstone,. A.: Handbook of Appled Cryptography, CRC Press, London, New York (1997)
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Scalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
Vembu StoreGrid Windows Client Installation Guide
Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Updating the E5810B firmware
Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert
IT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
Small pots lump sum payment instruction
For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
3C-Auth: A New Scheme for Enhancing Security
Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan
A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )
February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs
MULTIVAC Customer Portal Your access to the MULTIVAC World
MULTIVAC Customer Portal Your access to the MULTIVAC World 2 Contents MULTIVAC Customer Portal Introducton 24/7 Accessblty Your ndvdual nformaton Smple and ntutve Helpful and up to date Your benefts at
Trivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
Global innovative solutions You can rely on. www.calyon.com
Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
iavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
One Click.. Ȯne Location.. Ȯne Portal...
New Addton to your NJ-HITEC Membershp! Member Portal Detals & Features Insde! One Clck.. Ȯne Locaton.. Ȯne Portal... Connect...Share...Smplfy Health IT Member Portal Benefts Trusted Advsor - NJ-HITEC s
PKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event.
Audtng Wndows & Actve Drectory Changes va Wndows Event Logs Ths document takes a lghtweght look at the steps and consderatons nvolved n settng up Wndows and/or Actve Drectory event log audtng. Settng up
How To Get A Tax Refund On A Retirement Account
CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual
Uncrystallised funds pension lump sum payment instruction
For customers Uncrystallsed funds penson lump sum payment nstructon Don t complete ths form f your wrapper s derved from a penson credt receved followng a dvorce where your ex spouse or cvl partner had
Introduction CONTENT. - Whitepaper -
OneCl oud ForAl l YourCr t c al Bus nes sappl c at ons Bl uew r esol ut ons www. bl uew r e. c o. uk Introducton Bluewre Cloud s a fully customsable IaaS cloud platform desgned for organsatons who want
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
LIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
www.olr.ccli.com Introducing Online Reporting Your step-by-step guide to the new online copy report Online Reporting
Onlne Reportng Introducng Onlne Reportng www.olr.ccl.com Your step-by-step gude to the new onlne copy report Important nformaton for all lcence holders No more software to download Reportng as you go...
A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
A role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
GENESYS BUSINESS MANAGER
GENESYS BUSINESS MANAGER e-manager Onlne Conference User Account Admnstraton User Gude Ths User Gude contans the followng sectons: Mnmum Requrements...3 Gettng Started...4 Sgnng On to Genesys Busness Manager...7
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
An RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu
EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty [email protected], [email protected] ABSTRACT Voce over IP (VoIP) s one of
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS
QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,
A DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
CONTENTS Introduction... 3
Cuty ourm c r os of t Ex c hangeser v er s t or agec os t sbyupt o85% Howema lar c h v ngs ol ut onsex pand y ournat v eema lappl c at on' sc apab l t es CONTENTS Introducton... 3 Emal Storage Management...
Certificate Revocation using Fine Grained Certificate Space Partitioning
Certfcate Revocaton usng Fne Graned Certfcate Space Parttonng Vpul Goyal Department of Computer Scence Unversty of Calforna, Los Angeles [email protected] Abstract A new certfcate revocaton system s presented.
Optimization of network mesh topologies and link capacities for congestion relief
Optmzaton of networ mesh topologes and ln capactes for congeston relef D. de Vllers * J.M. Hattngh School of Computer-, Statstcal- and Mathematcal Scences Potchefstroom Unversty for CHE * E-mal: [email protected]
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Keywords: Tourism, Mobile Learning, Quality Management, Security
M-TOURIM EDUCATION FOR FUTURE QUALITY MANAGEMENT ABTRACT Ion Ivan 1 Aln Zamfrou 2 Toursm s the man ncome source of revenue n GDP n many countres. For 2012 the relatve contrbuton of toursm n GDP n Croata
Load Balancing By Max-Min Algorithm in Private Cloud Environment
Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam
Calculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
Multiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
Ensuring Data Storage Security in Cloud Computing
1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc
Enterprise Master Patient Index
Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME
August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000
Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error
Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
ELM for Exchange version 5.5 Exchange Server Migration
ELM for Exchange verson 5.5 Exchange Server Mgraton Copyrght 06 Lexmark. All rghts reserved. Lexmark s a trademark of Lexmark Internatonal, Inc., regstered n the U.S. and/or other countres. All other trademarks
Inter-domain Alliance Authentication Protocol Based on Blind Signature
Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan
sscada: securing SCADA infrastructure communications
Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,
Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
Ensuring Data Storage Security in Cloud Computing
Ensurng Data Storage Securty n Cloud Computng Cong Wang, Qan Wang, and Ku Ren Department of ECE Illnos Insttute of Technology Emal: {cwang, qwang, kren}@ece.t.edu Wenjng Lou Department of ECE Worcester
A Programming Model for the Cloud Platform
Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna [email protected]
Section 5.4 Annuities, Present Value, and Amortization
Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today
Uncrystallised funds pension lump sum
For customers Uncrystallsed funds penson lump sum Payment nstructon What does ths form do? Ths form nstructs us to pay the full penson fund, under your non-occupatonal penson scheme plan wth us, to you
REQUIRED FOR YEAR END 31 MARCH 2015. Your business information
REQUIRED FOR YEAR END 31 MARCH 2015 Your busness nformaton Your detals Busness detals Busness name Balance date IRD number Contact detals - to ensure our records are up to date, please complete the followng
Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School
Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
E-learning Vendor Management Checklist
E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net
Multi-Source Video Multicast in Peer-to-Peer Networks
ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany
An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS
Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer
Tuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
BERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
Conferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre
Oservce Vs. Sannet - Which One is Better?
o rcng n Compettve Telephony Markets Yung-Mng L nsttute of nformaton Management Natonal Chao Tung Unversty, Tawan 886-3-57111 Ext 57414 [email protected] Shh-Wen Chu nsttute of nformaton Management Natonal
DP5: A Private Presence Service
DP5: A Prvate Presence Servce Nkta Borsov Unversty of Illnos at Urbana-Champagn, Unted States [email protected] George Danezs Unversty College London, Unted Kngdom [email protected] Ian Goldberg Unversty
National Security Agency Information Assurance Directorate
Natonal Securty Agency Informaton Assurance Drectorate Net-Centrc Enterprse Servces (NCES) Profle of Web Servce Securty: Smple Object Access Protocol (SOAP) Message Securty (WSSE) 02 MAY 2008 Prepared
Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
Improved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
IWFMS: An Internal Workflow Management System/Optimizer for Hadoop
IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna [email protected], [email protected]
