Jilin University

Displaying 1-10 of 10 results

  • White Papers // May 2013

    User Authentication and Data Cryptograph System Based on Biometric Key for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have great prospect for the applications in unattended environments. Security measures should be taken to protect the sensitive data by preventing unauthorized users from accessing the information. However, traditional user authentication and data cryptograph method based on secret keys for WSNs have intrinsic shortcomings. This paper...

    Provided By Jilin University

  • White Papers // Feb 2013

    A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

    Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This paper introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose...

    Provided By Jilin University

  • White Papers // Sep 2012

    GSWAP: A Data Exchanging Partition for the Execution of Grid Jobs

    Grid aggregates heterogeneous resources over Internet to execute large-scale jobs. In the job execution, data is usually downloaded to the computing sites before the data processing. The batch mode of data transfer and processing might lead to the waiting of the reserved resources and the decrease of the system efficiency....

    Provided By Jilin University

  • White Papers // Jan 2011

    A New Placement-Ideal Layout for Multi-way Replication Storage System

    Technology trends are making sophisticated replication based storage architectures become a standard commercial practice in today's computing. Existing solutions successfully developed optimal and near-optimal parallelism layouts such as declustered parity organizations at small-scale storage architectures. There are very few studies on multi-way replication based storage architectures that are significantly different...

    Provided By Jilin University

  • White Papers // Oct 2010

    The Design and Implementation of Grid Information Service System Based on Service - Oriented Architecture

    Grid computing shares the distributed computing resources and unites the virtual organization spread in the different geographic situations to deal with large scale and data intensive computation together. In order to make grid application program use the variety of resources effectively and conveniently some reasonable mechanisms must be adopted to...

    Provided By Jilin University

  • White Papers // Oct 2010

    Securing Internet of Vehicles Using TCM

    In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identity authentication and integrality verification, the authors apply the Trusted Cryptography Module (TCM) into the on-vehicle electronic systems. TCM has many security features, such as integrality measurement, integrality report and protected storage, by...

    Provided By Jilin University

  • White Papers // Jul 2010

    Relation Based Access Control: Logic and Policies

    The Web 2.0, GRID applications and more recently semantic desktop applications are bringing the Web to a situation where more and more data and metadata are shared and made available to large user groups. Things are further complicated by the highly unpredictable and autonomous dynamics of data, users, permissions and...

    Provided By Jilin University

  • White Papers // Feb 2010

    A RFID Authentication Protocol With Index Inner Table Used in Reader

    Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel scheme called index inner table used in the reader. Index inner table may efficiently utilize calculation capacity and...

    Provided By Jilin University

  • White Papers // Oct 2008

    Teaching Resources Information Extraction System Based on Web and XML

    With the increase of websites, the teaching resources data present geometric progression to increase. At the same time, website teaching resources exist with the form of Semi-structured data. This paper proposes a teaching resource information extraction system that based on Web pages. Using the semi-automatic method to extract the teaching...

    Provided By Jilin University

  • White Papers // Jul 2008

    A Traffic-Based Intrusion Detection System in IPv6/4 Environments and Its Performance Analysis

    This paper proposed a traffic-based intrusion detection system framework in IPv6/4 environments and a traffic-based intrusion method. Through the establishment of a mathematical model to identify the relationship among detection time, memory usage and classification, one achieved a highly effective detection method which considered both traffic characteristics and rule characteristics....

    Provided By Jilin University

  • White Papers // Sep 2012

    GSWAP: A Data Exchanging Partition for the Execution of Grid Jobs

    Grid aggregates heterogeneous resources over Internet to execute large-scale jobs. In the job execution, data is usually downloaded to the computing sites before the data processing. The batch mode of data transfer and processing might lead to the waiting of the reserved resources and the decrease of the system efficiency....

    Provided By Jilin University

  • White Papers // May 2013

    User Authentication and Data Cryptograph System Based on Biometric Key for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have great prospect for the applications in unattended environments. Security measures should be taken to protect the sensitive data by preventing unauthorized users from accessing the information. However, traditional user authentication and data cryptograph method based on secret keys for WSNs have intrinsic shortcomings. This paper...

    Provided By Jilin University

  • White Papers // Feb 2013

    A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

    Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This paper introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose...

    Provided By Jilin University

  • White Papers // Oct 2008

    Teaching Resources Information Extraction System Based on Web and XML

    With the increase of websites, the teaching resources data present geometric progression to increase. At the same time, website teaching resources exist with the form of Semi-structured data. This paper proposes a teaching resource information extraction system that based on Web pages. Using the semi-automatic method to extract the teaching...

    Provided By Jilin University

  • White Papers // Jul 2008

    A Traffic-Based Intrusion Detection System in IPv6/4 Environments and Its Performance Analysis

    This paper proposed a traffic-based intrusion detection system framework in IPv6/4 environments and a traffic-based intrusion method. Through the establishment of a mathematical model to identify the relationship among detection time, memory usage and classification, one achieved a highly effective detection method which considered both traffic characteristics and rule characteristics....

    Provided By Jilin University

  • White Papers // Oct 2010

    The Design and Implementation of Grid Information Service System Based on Service - Oriented Architecture

    Grid computing shares the distributed computing resources and unites the virtual organization spread in the different geographic situations to deal with large scale and data intensive computation together. In order to make grid application program use the variety of resources effectively and conveniently some reasonable mechanisms must be adopted to...

    Provided By Jilin University

  • White Papers // Jan 2011

    A New Placement-Ideal Layout for Multi-way Replication Storage System

    Technology trends are making sophisticated replication based storage architectures become a standard commercial practice in today's computing. Existing solutions successfully developed optimal and near-optimal parallelism layouts such as declustered parity organizations at small-scale storage architectures. There are very few studies on multi-way replication based storage architectures that are significantly different...

    Provided By Jilin University

  • White Papers // Jul 2010

    Relation Based Access Control: Logic and Policies

    The Web 2.0, GRID applications and more recently semantic desktop applications are bringing the Web to a situation where more and more data and metadata are shared and made available to large user groups. Things are further complicated by the highly unpredictable and autonomous dynamics of data, users, permissions and...

    Provided By Jilin University

  • White Papers // Feb 2010

    A RFID Authentication Protocol With Index Inner Table Used in Reader

    Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel scheme called index inner table used in the reader. Index inner table may efficiently utilize calculation capacity and...

    Provided By Jilin University

  • White Papers // Oct 2010

    Securing Internet of Vehicles Using TCM

    In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identity authentication and integrality verification, the authors apply the Trusted Cryptography Module (TCM) into the on-vehicle electronic systems. TCM has many security features, such as integrality measurement, integrality report and protected storage, by...

    Provided By Jilin University