Central South University

Displaying 1-22 of 22 results

  • White Papers // Jul 2013

    A Novel Multi-Scale Multi-View Display Design for Network Security Situation Awareness

    Visualization plays a growing important part in network security situation awareness. In this paper, the authors present a multi-scale and multi-view display design for network security situation awareness. Owning advantages of monitoring and analyzing large scale network data and multi-source security data on temporal and spatial dimensions in multi-scale, in...

    Provided By Central South University

  • White Papers // Jul 2013

    MVSec: A Novel Multi-view Visualization System for Network Security

    Different visualization graphs fit into kinds of features of different source data as well as various analyzing objectives. With four specialized views, MVSec is particularly designed for features of network security data to help analysts reach cooperative analysis on multiple source data. MVSec is a network security visualization and analysis...

    Provided By Central South University

  • White Papers // Mar 2013

    A Pairwise Key Establishment Scheme for Multiple Deployment Sensor Networks

    Pairwise key establishment is a fundamental security service for sensor networks. However, establishing pairwise key in sensor networks is a challenging problem, due to the resource constraints on nodes and the threat of node capture. In this paper, disjoint and association sub-key pools based on backward key chains are created,...

    Provided By Central South University

  • White Papers // May 2012

    An Energy-Balanced Clustering Protocol Based on Dominating Set for Data Gathering in Wireless Sensor Networks

    Data gathering is one basic functional operation provided by wireless sensor networks. Most existing clustering protocols suffer from unbalanced energy consumption among nodes, which shortens the lifetime of the network and limits their application in many fields. In this paper, an Energy-Balanced Dominating Set based Clustering scheme (EBDSC) is proposed...

    Provided By Central South University

  • White Papers // Feb 2012

    DCFR: A Novel Double Cost Function Based Routing Algorithm for Wireless Sensor Networks

    Cost function based routing has been widely studied in wireless sensor networks for energy efficiency and network lifetime elongation. Existing algorithms however have limited effects because they adopt a single cost function that does not fully capture nodal energy consumption situation. In this paper, the authors propose a novel Double...

    Provided By Central South University

  • White Papers // Feb 2012

    Integrating Innate Immune Concepts in the Design of an Artificial Immune System-Based Network Intrusion Detection

    This paper proposes to develop a novel architecture for a Network Intrusion Detection System (NIDS) by integrating the innate immune concepts. The proposed scheme is shown to have capabilities of both misuse-based and anomaly-based systems. The paper demonstrates that the resulting model possesses most of features that would be considered...

    Provided By Central South University

  • White Papers // Jan 2012

    Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments

    Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In this paper, the authors address two fundamental issues in a cloud environment: privacy and efficiency. They first review a private keyword-based file retrieval scheme proposed by Ostrovsky et. al. then, based on an...

    Provided By Central South University

  • White Papers // Aug 2011

    Using Genetic Algorithms to Optimize Web Caching in Multimedia-Integrated e-Learning Content

    The evolution of e-learning as a new information technology built around the use of internet has originated new possibilities to develop pedagogical methodologies that provide the necessary knowledge and skills in the higher education environment. This has in effect given rise to a large number of learners who desire to...

    Provided By Central South University

  • White Papers // Jul 2011

    Reliable Re-Encryption in Unreliable Clouds

    A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users. Then, when a user is revoked, the data owner will issue re-encryption commands to the cloud to re-encrypt the data, to prevent the revoked...

    Provided By Central South University

  • White Papers // Apr 2011

    Enhanced Model for SaaS Delivery in Developing Economy

    The emergence of cloud computing has brought about new hope for adoption and use of computer-based information system. Software as a Service (SaaS) allows online customers to use applications on the Internet on a pay-as-you-go basis without investing in new infrastructure or software license. However, the current SaaS pay-as-you-go phenomenon...

    Provided By Central South University

  • White Papers // Feb 2011

    Feature Selection via Sparse Approximation for Face Recognition

    Inspired by biological vision systems, the over-complete local features with huge cardinality are increasingly used for face recognition during the last decades. Accordingly, feature selection has become more and more important and plays a critical role for face data description and recognition. In this paper, the authors propose a trainable...

    Provided By Central South University

  • White Papers // Feb 2011

    Secure Locking for Untrusted Clouds

    Migrating applications with strong consistency requirements to public cloud platforms remains risky since the data owner cannot verify the correctness of the public cloud's locking algorithm. In this paper, the authors identify new attacks that an untrusted cloud provider can launch via control of the locking mechanism and propose an...

    Provided By Central South University

  • White Papers // Dec 2010

    Holographic View Language HVL4DCAM for Aspectual Middleware Platform

    Aspectual middleware platform DCAM is a middleware computing environment, which satisfies the self-adaptability requirements of on-demand computing and supports the real-time reconstruction of system. Based on the analysis of the existing aspect-oriented architecture description languages, this paper proposes a kind of holographic view language HVL4DCAM for DCAM based on XML...

    Provided By Central South University

  • White Papers // Nov 2010

    DCAM: A Distributed Aspectual Middleware

    In order to meet the self-adaptability requirement of on-demand computing and ubiquitous computing in distributed environment, the paper presents a new model of distributed aspectual middleware called DCAM. DCAM adopts hierarchical structure and introduces aspect-oriented function support into its core layer. Extension mechanism for services and containers are introduced as...

    Provided By Central South University

  • White Papers // Sep 2010

    Toward Architecture-Based Context-Aware Deployment and Adaptation

    Software systems are increasingly expected to dynamically self-adapt to the changing environments. One of the main adaptation mechanisms is dynamic recomposition of application components. This paper addresses the key issues that arise when context knowledge is used to steer the run-time (re)composition process so as to match the new environmental...

    Provided By Central South University

  • White Papers // Sep 2010

    A Service-Clustering-Based Dynamic Scheduling Algorithm for Grid Tasks

    Task scheduling in Grid environment is a challenging problem because of NP-complete nature of scheduling issue and dynamic characteristic of the environment. Not constrained by local scheduling policy of Grid site, a dynamic service evaluation method based on cloud model is presented. Then, they obtain performance metrics of dynamic service....

    Provided By Central South University

  • White Papers // Aug 2010

    The Degree and Connectivity of Internet's Scale-Free Topology

    With the rapid development of the large-scale Internet, the relation between network topology and function has become one of the most important and difficult challenges the Internet offers. The pioneering work, revealing the power-law distribution of the AS-level and router-level Internet topology, has impelled a great number of studies on...

    Provided By Central South University

  • White Papers // May 2010

    Efficient Sharing of Secure Cloud Storage Services

    Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob is the user at the upper level and all the employees in the company are the users at...

    Provided By Central South University

  • White Papers // Mar 2010

    Delay-Constrained Multicast Routing Algorithm Based on Average Distance Heuristic

    Multicast is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different location. With the development of Internet, Multicast is widely applied in all kinds of multimedia real-time application: distributed multimedia systems, collaborative computing,...

    Provided By Central South University

  • White Papers // Oct 2009

    An Anonymous Communication Mechanism without Key Infrastructure Based on Multi-Paths Network Coding

    In the anonymous communication mechanisms based on key infrastructure, public key or pre-shared key are widely used to set up relay paths and negotiate shared keys in session. Therefore, these systems always have complicated architecture and high key management cost. However, key infrastructure is hard to deployed in distributed environment....

    Provided By Central South University

  • White Papers // Sep 2009

    Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks

    The authors propose a new tracking framework by organizing nodes into a polygonal spatial neighborhood in order to detect and track unauthorized traversals in surveillance wireless sensor networks. During a tracking, the neighborhood is further constructed ahead of the target traversal, and this features a timely forwarding with guaranteed delivery...

    Provided By Central South University

  • White Papers // Jul 2009

    An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing

    A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a user should store his personal files in an encrypted form in a cloud, and then sends queries in...

    Provided By Central South University

  • White Papers // Sep 2010

    A Service-Clustering-Based Dynamic Scheduling Algorithm for Grid Tasks

    Task scheduling in Grid environment is a challenging problem because of NP-complete nature of scheduling issue and dynamic characteristic of the environment. Not constrained by local scheduling policy of Grid site, a dynamic service evaluation method based on cloud model is presented. Then, they obtain performance metrics of dynamic service....

    Provided By Central South University

  • White Papers // Feb 2012

    Integrating Innate Immune Concepts in the Design of an Artificial Immune System-Based Network Intrusion Detection

    This paper proposes to develop a novel architecture for a Network Intrusion Detection System (NIDS) by integrating the innate immune concepts. The proposed scheme is shown to have capabilities of both misuse-based and anomaly-based systems. The paper demonstrates that the resulting model possesses most of features that would be considered...

    Provided By Central South University

  • White Papers // Aug 2011

    Using Genetic Algorithms to Optimize Web Caching in Multimedia-Integrated e-Learning Content

    The evolution of e-learning as a new information technology built around the use of internet has originated new possibilities to develop pedagogical methodologies that provide the necessary knowledge and skills in the higher education environment. This has in effect given rise to a large number of learners who desire to...

    Provided By Central South University

  • White Papers // Dec 2010

    Holographic View Language HVL4DCAM for Aspectual Middleware Platform

    Aspectual middleware platform DCAM is a middleware computing environment, which satisfies the self-adaptability requirements of on-demand computing and supports the real-time reconstruction of system. Based on the analysis of the existing aspect-oriented architecture description languages, this paper proposes a kind of holographic view language HVL4DCAM for DCAM based on XML...

    Provided By Central South University

  • White Papers // Nov 2010

    DCAM: A Distributed Aspectual Middleware

    In order to meet the self-adaptability requirement of on-demand computing and ubiquitous computing in distributed environment, the paper presents a new model of distributed aspectual middleware called DCAM. DCAM adopts hierarchical structure and introduces aspect-oriented function support into its core layer. Extension mechanism for services and containers are introduced as...

    Provided By Central South University

  • White Papers // Feb 2012

    DCFR: A Novel Double Cost Function Based Routing Algorithm for Wireless Sensor Networks

    Cost function based routing has been widely studied in wireless sensor networks for energy efficiency and network lifetime elongation. Existing algorithms however have limited effects because they adopt a single cost function that does not fully capture nodal energy consumption situation. In this paper, the authors propose a novel Double...

    Provided By Central South University

  • White Papers // Jan 2012

    Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments

    Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In this paper, the authors address two fundamental issues in a cloud environment: privacy and efficiency. They first review a private keyword-based file retrieval scheme proposed by Ostrovsky et. al. then, based on an...

    Provided By Central South University

  • White Papers // Sep 2010

    Toward Architecture-Based Context-Aware Deployment and Adaptation

    Software systems are increasingly expected to dynamically self-adapt to the changing environments. One of the main adaptation mechanisms is dynamic recomposition of application components. This paper addresses the key issues that arise when context knowledge is used to steer the run-time (re)composition process so as to match the new environmental...

    Provided By Central South University

  • White Papers // May 2012

    An Energy-Balanced Clustering Protocol Based on Dominating Set for Data Gathering in Wireless Sensor Networks

    Data gathering is one basic functional operation provided by wireless sensor networks. Most existing clustering protocols suffer from unbalanced energy consumption among nodes, which shortens the lifetime of the network and limits their application in many fields. In this paper, an Energy-Balanced Dominating Set based Clustering scheme (EBDSC) is proposed...

    Provided By Central South University

  • White Papers // Oct 2009

    An Anonymous Communication Mechanism without Key Infrastructure Based on Multi-Paths Network Coding

    In the anonymous communication mechanisms based on key infrastructure, public key or pre-shared key are widely used to set up relay paths and negotiate shared keys in session. Therefore, these systems always have complicated architecture and high key management cost. However, key infrastructure is hard to deployed in distributed environment....

    Provided By Central South University

  • White Papers // Mar 2013

    A Pairwise Key Establishment Scheme for Multiple Deployment Sensor Networks

    Pairwise key establishment is a fundamental security service for sensor networks. However, establishing pairwise key in sensor networks is a challenging problem, due to the resource constraints on nodes and the threat of node capture. In this paper, disjoint and association sub-key pools based on backward key chains are created,...

    Provided By Central South University

  • White Papers // Jul 2013

    A Novel Multi-Scale Multi-View Display Design for Network Security Situation Awareness

    Visualization plays a growing important part in network security situation awareness. In this paper, the authors present a multi-scale and multi-view display design for network security situation awareness. Owning advantages of monitoring and analyzing large scale network data and multi-source security data on temporal and spatial dimensions in multi-scale, in...

    Provided By Central South University

  • White Papers // Jul 2013

    MVSec: A Novel Multi-view Visualization System for Network Security

    Different visualization graphs fit into kinds of features of different source data as well as various analyzing objectives. With four specialized views, MVSec is particularly designed for features of network security data to help analysts reach cooperative analysis on multiple source data. MVSec is a network security visualization and analysis...

    Provided By Central South University

  • White Papers // May 2010

    Efficient Sharing of Secure Cloud Storage Services

    Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob is the user at the upper level and all the employees in the company are the users at...

    Provided By Central South University

  • White Papers // Jul 2009

    An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing

    A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a user should store his personal files in an encrypted form in a cloud, and then sends queries in...

    Provided By Central South University

  • White Papers // Aug 2010

    The Degree and Connectivity of Internet's Scale-Free Topology

    With the rapid development of the large-scale Internet, the relation between network topology and function has become one of the most important and difficult challenges the Internet offers. The pioneering work, revealing the power-law distribution of the AS-level and router-level Internet topology, has impelled a great number of studies on...

    Provided By Central South University

  • White Papers // Feb 2011

    Feature Selection via Sparse Approximation for Face Recognition

    Inspired by biological vision systems, the over-complete local features with huge cardinality are increasingly used for face recognition during the last decades. Accordingly, feature selection has become more and more important and plays a critical role for face data description and recognition. In this paper, the authors propose a trainable...

    Provided By Central South University

  • White Papers // Mar 2010

    Delay-Constrained Multicast Routing Algorithm Based on Average Distance Heuristic

    Multicast is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different location. With the development of Internet, Multicast is widely applied in all kinds of multimedia real-time application: distributed multimedia systems, collaborative computing,...

    Provided By Central South University

  • White Papers // Apr 2011

    Enhanced Model for SaaS Delivery in Developing Economy

    The emergence of cloud computing has brought about new hope for adoption and use of computer-based information system. Software as a Service (SaaS) allows online customers to use applications on the Internet on a pay-as-you-go basis without investing in new infrastructure or software license. However, the current SaaS pay-as-you-go phenomenon...

    Provided By Central South University

  • White Papers // Feb 2011

    Secure Locking for Untrusted Clouds

    Migrating applications with strong consistency requirements to public cloud platforms remains risky since the data owner cannot verify the correctness of the public cloud's locking algorithm. In this paper, the authors identify new attacks that an untrusted cloud provider can launch via control of the locking mechanism and propose an...

    Provided By Central South University

  • White Papers // Jul 2011

    Reliable Re-Encryption in Unreliable Clouds

    A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users. Then, when a user is revoked, the data owner will issue re-encryption commands to the cloud to re-encrypt the data, to prevent the revoked...

    Provided By Central South University

  • White Papers // Sep 2009

    Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks

    The authors propose a new tracking framework by organizing nodes into a polygonal spatial neighborhood in order to detect and track unauthorized traversals in surveillance wireless sensor networks. During a tracking, the neighborhood is further constructed ahead of the target traversal, and this features a timely forwarding with guaranteed delivery...

    Provided By Central South University