Shandong Institute of Business And Technology

Displaying 1-20 of 20 results

  • White Papers // Dec 2013

    Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function

    The authors introduced Leaky Random Oracle Model (LROM for short) at ProvSec2008 in order to discuss security (or insecurity) of cryptographic schemes which use hash functions as building blocks when leakages from pairs of input and output of hash functions occur. This kind of leakages occurs due to various attacks...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Dec 2013

    The Application of ElGamal Encryption Technology to the Information Security of Digital Library

    Now-a-days, the construction and application of digital library leads a new era of the way people obtain knowledge and information, and promotes the academic exchanges and social progress. Digital library, however, also involves great risk; hacker attacks become the main threat of the information security of digital library, and may...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Mar 2013

    Property-Preserving Transformations Among Functional Encryption Schemes

    In general functional encryption systems, the control policy function can be set flexibly. The main gap among these functional encryption schemes lie in the policy functions that associates with the secret keys. In this paper, the authors first investigate some functional encryption schemes, and then formalize and unify the functionality...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jan 2013

    Placement of SaaS Cloud Data and Dynamically Access Scheduling Strategy

    For SaaS applications which share tables in storage, how to effectively manage multi-tenant cloud data has been one of the crucial issues. In SaaS delivery platform multi-tenant data migration strategy, put whole data of every tenant including the users business data and metadata into independent partition, where DBMS can guarantee...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jan 2013

    Data Security in Cloud Computing

    The original intention of the proposed cloud computing is Internet-based distributed and virtual machine technology, to provide users with inexpensive computing services and storage services, reducing the cost of computing. This paper discusses cloud computing data security issues, including the security of data transmission, storage, security and management of security....

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jan 2013

    New Impossible Differential Attack on SAFER+ and SAFER++

    SAFER+ was a candidate block cipher for AES with 128-bit block size and variable key sizes of 128, 192 or 256 bits. Bluetooth uses customized versions of SAFER+ for security. The numbers of rounds for SAFER+ with key sizes of 128, 192 and 256 are 8, 12 and 16, respectively....

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jan 2013

    A Community Cloud Platform Model Supporting Cross-Domain Business Collaboration

    Cloud computing is becoming a new application model for small and medium-sized enterprises to share hardware and software resources on-demand over the Internet. Despite the flourish of the cloud computing, there are many challenges, including establishing a model to make the cross-domain business collaboration between enterprises possible. In this paper,...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Dec 2012

    Twisted Edwards-Form Elliptic Curve Cryptography for 8-Bit AVR-Based Sensor Nodes

    Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress, the efficient implementation of Elliptic Curve Cryptography (ECC) for WSNs is still a very active research topic and techniques to further reduce...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Nov 2012

    Dynamic Deferral of Workload for Capacity Provisioning in Data Centers

    Recent increase in energy prices has led researchers to find better ways for capacity provisioning in data centers to reduce energy wastage due to the variation in workload. This paper explores the opportunity for cost saving utilizing the flexibility from the Service Level Agreements (SLAs) and proposes a novel approach...

    Provided By Shandong Institute of Business And Technology

  • White Papers // May 2012

    A Chunk Caching Location and Searching Scheme in Content Centric Networking

    Content Centric Networking (CCN) is a new network infrastructure around content dissemination and retrieval, shift from host addresses to named data. Each CCN router has a cache to store the chunks passed by it. Therefore the caching strategy about chunk placement can greatly affect the whole CCN performance. This paper...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Nov 2011

    Lattice-Based Proxy Signature Scheme

    Inspired by the demand to have secure proxy signatures, even in the presence of quantum computers, and with the help of the Bonsai trees and the pre-image sample function, a post-quantum lattice-based proxy signature scheme which satisfies all the security requirements of the proxy signature scheme is thereby proposed in...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Nov 2011

    Study on the Key Techniques of Emergency Logistics Visualization System Based on GIS

    GIS (Geographic Information System) can be used practically in four phases of Emergency Logistics Management, namely Risk Assessment & Planning, Preparation, Response and Recovery. This paper illustrates applications of GIS in the phases of Preparation and Response, proposes and discusses the key techniques of Emergency Logistics Visualization System based on...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jul 2011

    Research of Route Algorithm Improvement in P2P Network Based on Gnutella

    The huge redundant messages generated by flooding which is the basic routing algorithm of unstructured P2P network, severely reduce the efficiency of the algorithm, Combining the advantages of flooding search algorithm and random walk algorithm, such as short response time, high stability, simple structure, to greatly reduce the redundancy of...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jul 2011

    Study on Cross Tabulation Query in Data Mining and Statistical Data Analysis

    Cross tabulation query can give a more complete picture of past and current trends as well as possible future outcomes of mess data, it usually involves aggregation of data, at the same time, a column of values will perhaps be transformed into many columns in the new view. In cross...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Apr 2011

    Modeling Theory of Component Based Network Architecture

    In this paper, the authors first provide formal (nominal) definition of component, connector and network architecture, and then use process algebra theory to define component operations on the network architecture. Further, they develop the network architecture's algebra model and prove the model's consistency and completeness. Computer network is a distributed...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Apr 2011

    Research of Adaptive Routing Method on P2P Network

    This paper aim to analyze and discuss a Query-based Routing Method in P2P network (QRM), In this Algorithm, the node records the received query and the nodes that can answer the query very well, in these nodes. Simulation experiments demonstrate that the method can enhance the searching efficiency very well...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Nov 2010

    Data Conflict Resolution with Markov Logic Networks

    In data integration, data conflict resolution is the key issue which is closely related to the quality of integrated data. Interest in it has grown rapidly in recent years, and many approaches have been proposed. However, because they lack of considering all-round influence factors of data conflict, the resolution results...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Apr 2010

    Service-Oriented Enterprise Interoperability in Automobile Supply Chain Management

    How to enhance interoperability between stakeholders and improve efficiency of supply chain management is the key issue that needs to be addressed in automobile industry. Existing interoperability solutions are suitable only for large enterprises, however, Small and Medium-sized Enterprises (SMEs) lack cheap, easy to integrate and easy to customize solutions....

    Provided By Shandong Institute of Business And Technology

  • White Papers // Dec 2009

    Fault Tree Based Architectural Analysis For E-Business Systems

    The increasing complexity of the e-business systems urges the improvement of existing methods of system analysis in order to reduce the likelihood that important threats remain unidentified. Such an improvement can be achieved by combining risk analysis methodologies with the architecture centric system design process. Existing methods are inherently deficient...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jun 2009

    Integrating Constraints to Support Legally Flexible Business Processes

    Flexible collaboration is a notable attribute of Web 2.0, which is often in the form of multiple users participating different activities that together complete a whole business process. In such an environment, business processes may be dynamically customized or adjusted, as well as the participants may be selected or attend...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Dec 2012

    Twisted Edwards-Form Elliptic Curve Cryptography for 8-Bit AVR-Based Sensor Nodes

    Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress, the efficient implementation of Elliptic Curve Cryptography (ECC) for WSNs is still a very active research topic and techniques to further reduce...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jan 2013

    New Impossible Differential Attack on SAFER+ and SAFER++

    SAFER+ was a candidate block cipher for AES with 128-bit block size and variable key sizes of 128, 192 or 256 bits. Bluetooth uses customized versions of SAFER+ for security. The numbers of rounds for SAFER+ with key sizes of 128, 192 and 256 are 8, 12 and 16, respectively....

    Provided By Shandong Institute of Business And Technology

  • White Papers // Nov 2012

    Dynamic Deferral of Workload for Capacity Provisioning in Data Centers

    Recent increase in energy prices has led researchers to find better ways for capacity provisioning in data centers to reduce energy wastage due to the variation in workload. This paper explores the opportunity for cost saving utilizing the flexibility from the Service Level Agreements (SLAs) and proposes a novel approach...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jan 2013

    A Community Cloud Platform Model Supporting Cross-Domain Business Collaboration

    Cloud computing is becoming a new application model for small and medium-sized enterprises to share hardware and software resources on-demand over the Internet. Despite the flourish of the cloud computing, there are many challenges, including establishing a model to make the cross-domain business collaboration between enterprises possible. In this paper,...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Apr 2010

    Service-Oriented Enterprise Interoperability in Automobile Supply Chain Management

    How to enhance interoperability between stakeholders and improve efficiency of supply chain management is the key issue that needs to be addressed in automobile industry. Existing interoperability solutions are suitable only for large enterprises, however, Small and Medium-sized Enterprises (SMEs) lack cheap, easy to integrate and easy to customize solutions....

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jun 2009

    Integrating Constraints to Support Legally Flexible Business Processes

    Flexible collaboration is a notable attribute of Web 2.0, which is often in the form of multiple users participating different activities that together complete a whole business process. In such an environment, business processes may be dynamically customized or adjusted, as well as the participants may be selected or attend...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Dec 2013

    The Application of ElGamal Encryption Technology to the Information Security of Digital Library

    Now-a-days, the construction and application of digital library leads a new era of the way people obtain knowledge and information, and promotes the academic exchanges and social progress. Digital library, however, also involves great risk; hacker attacks become the main threat of the information security of digital library, and may...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Dec 2013

    Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function

    The authors introduced Leaky Random Oracle Model (LROM for short) at ProvSec2008 in order to discuss security (or insecurity) of cryptographic schemes which use hash functions as building blocks when leakages from pairs of input and output of hash functions occur. This kind of leakages occurs due to various attacks...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Mar 2013

    Property-Preserving Transformations Among Functional Encryption Schemes

    In general functional encryption systems, the control policy function can be set flexibly. The main gap among these functional encryption schemes lie in the policy functions that associates with the secret keys. In this paper, the authors first investigate some functional encryption schemes, and then formalize and unify the functionality...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jan 2013

    Data Security in Cloud Computing

    The original intention of the proposed cloud computing is Internet-based distributed and virtual machine technology, to provide users with inexpensive computing services and storage services, reducing the cost of computing. This paper discusses cloud computing data security issues, including the security of data transmission, storage, security and management of security....

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jan 2013

    Placement of SaaS Cloud Data and Dynamically Access Scheduling Strategy

    For SaaS applications which share tables in storage, how to effectively manage multi-tenant cloud data has been one of the crucial issues. In SaaS delivery platform multi-tenant data migration strategy, put whole data of every tenant including the users business data and metadata into independent partition, where DBMS can guarantee...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Nov 2010

    Data Conflict Resolution with Markov Logic Networks

    In data integration, data conflict resolution is the key issue which is closely related to the quality of integrated data. Interest in it has grown rapidly in recent years, and many approaches have been proposed. However, because they lack of considering all-round influence factors of data conflict, the resolution results...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Dec 2009

    Fault Tree Based Architectural Analysis For E-Business Systems

    The increasing complexity of the e-business systems urges the improvement of existing methods of system analysis in order to reduce the likelihood that important threats remain unidentified. Such an improvement can be achieved by combining risk analysis methodologies with the architecture centric system design process. Existing methods are inherently deficient...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Apr 2011

    Modeling Theory of Component Based Network Architecture

    In this paper, the authors first provide formal (nominal) definition of component, connector and network architecture, and then use process algebra theory to define component operations on the network architecture. Further, they develop the network architecture's algebra model and prove the model's consistency and completeness. Computer network is a distributed...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Apr 2011

    Research of Adaptive Routing Method on P2P Network

    This paper aim to analyze and discuss a Query-based Routing Method in P2P network (QRM), In this Algorithm, the node records the received query and the nodes that can answer the query very well, in these nodes. Simulation experiments demonstrate that the method can enhance the searching efficiency very well...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jul 2011

    Research of Route Algorithm Improvement in P2P Network Based on Gnutella

    The huge redundant messages generated by flooding which is the basic routing algorithm of unstructured P2P network, severely reduce the efficiency of the algorithm, Combining the advantages of flooding search algorithm and random walk algorithm, such as short response time, high stability, simple structure, to greatly reduce the redundancy of...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Jul 2011

    Study on Cross Tabulation Query in Data Mining and Statistical Data Analysis

    Cross tabulation query can give a more complete picture of past and current trends as well as possible future outcomes of mess data, it usually involves aggregation of data, at the same time, a column of values will perhaps be transformed into many columns in the new view. In cross...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Nov 2011

    Study on the Key Techniques of Emergency Logistics Visualization System Based on GIS

    GIS (Geographic Information System) can be used practically in four phases of Emergency Logistics Management, namely Risk Assessment & Planning, Preparation, Response and Recovery. This paper illustrates applications of GIS in the phases of Preparation and Response, proposes and discusses the key techniques of Emergency Logistics Visualization System based on...

    Provided By Shandong Institute of Business And Technology

  • White Papers // May 2012

    A Chunk Caching Location and Searching Scheme in Content Centric Networking

    Content Centric Networking (CCN) is a new network infrastructure around content dissemination and retrieval, shift from host addresses to named data. Each CCN router has a cache to store the chunks passed by it. Therefore the caching strategy about chunk placement can greatly affect the whole CCN performance. This paper...

    Provided By Shandong Institute of Business And Technology

  • White Papers // Nov 2011

    Lattice-Based Proxy Signature Scheme

    Inspired by the demand to have secure proxy signatures, even in the presence of quantum computers, and with the help of the Bonsai trees and the pre-image sample function, a post-quantum lattice-based proxy signature scheme which satisfies all the security requirements of the proxy signature scheme is thereby proposed in...

    Provided By Shandong Institute of Business And Technology