Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess ...Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess request is also given. In this model, we give themeasure of trustworthiness factor to access request- by using some idea of uncertainty reasoning ofexpert system, present and prove the parallel propagation formula of request trustworthiness factoramong multiple policies, and get thefinal trustworthiness factor to decide whether authorizing. Inthis model, authorization decision is given according to the calculation of request trustworthinessfactor, which is more understandable, more suitable for real requirement and more powerfulforsecurity enhancement than traditional methods. Meanwhile the finer access control granularity isanother advantage.展开更多
Non-orthogonal multiple access (NOMA) schemes have achieved great attention recently and been considered as a crucial compo-nent for 5G wireless networks since they can efficiently enhance the spectrum efficiency, s...Non-orthogonal multiple access (NOMA) schemes have achieved great attention recently and been considered as a crucial compo-nent for 5G wireless networks since they can efficiently enhance the spectrum efficiency, support massive connections and poten-tially reduce access latency via grant free access. In this paper, we introduce the candidate NOMA solutions in 5G networks, com-paring the principles, key features, application scenarios, transmitters and receivers, etc. In addition, a unified framework of these multiple access schemes are proposed to improve resource utilization, reduce the cost and support the flexible adaptation of multi-ple access schemes. Further, flexible multiple access schemes in 5G systems are discussed. They can support diverse deployment scenarios and traffic requirements in 5G. Challenges and future research directions are also highlighted to shed some lights for the standardization in 5G.展开更多
In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pa...In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.展开更多
User’s data is considered as a vital asset of several organizations.Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns.Service providers must e...User’s data is considered as a vital asset of several organizations.Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns.Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment.The data stored on the public cloud will be vulnerable to outside and inside attacks.This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud.Different access control policies are applied for verifying users on the cloud.A security mechanism is applied to the cloud application that includes user registration,granting user privileges,and generating user authentication factor.An intrusion detection system is embedded to the security mechanism to detect malicious users.The multi factor authentication,intrusion detection,and access control techniques can be used for ensuring the identity of the user.Finally,encryption techniques are used for protecting the data from being disclosed.Experimental results are carried out to verify the accuracy and efficiency of the proposed frameworks and mechanism.The results recorded high detection rate with low false positive alarms.展开更多
Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can ...Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can build their systems by multiple invocations of these services. This research is devoted to investigating the management and data flow control over enterprise academic web applications where web services and developed academic web application are constructing infrastructure-networking scheme at the application level. Academic web services are invoked over http port and using REST based protocol;thus traditional access control method is not enough to control the follow of data using host and port information. The new cloud based access control rules proposed here are to be designed and implemented to work at this level. The new proposed access control architecture will be a web service gateway, and it published itself as a service (SaaS). We used three case studies to test our moodle and then we apply JSON parsers to perceive web service description file (WSDL file) and supply policies according to data are to be allowed or denied based on user roll through our parsing.展开更多
随着生物技术的快速发展,越来越多的生物制造饲料原料及添加剂研发成功。这些产品不仅能提高饲料的营养价值,还可以降低生产成本、提高养殖效益。然而,生物制造饲料原料及添加剂在生产工艺和质量标准方面与传统产品存在较大差异,造成市...随着生物技术的快速发展,越来越多的生物制造饲料原料及添加剂研发成功。这些产品不仅能提高饲料的营养价值,还可以降低生产成本、提高养殖效益。然而,生物制造饲料原料及添加剂在生产工艺和质量标准方面与传统产品存在较大差异,造成市场准入障碍,制约了饲料及畜牧业的高效发展。本文系统梳理了欧盟、美国、日本和中国的生物制造饲料蛋白原料和添加剂的市场准入与监管机制,包括相关法规政策依据、审批流程及标准要求。欧盟的审批流程相对严谨,对产品的安全性评估更为全面,但审批时间较长;美国的准入制度较为灵活,三种多元化的准入途径,但对于“一般公认安全”(Generally Recognized as Safe,GRAS)物质的认定存在一定的主观性;日本的法规较为完善,兼顾社会伦理与市场实际,形成了一套严谨且灵活的体系。近年来,中国在生物制造饲料原料或者添加剂市场准入与监管方面,规范了审批流程和标准,缩短了审批周期,但在产品评价方法、评价程序等方面仍存在一些问题。本文针对性地提出了优化建议,旨在助力生物制造在饲料养殖行业的高质量发展。展开更多
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a...With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC.展开更多
文摘Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess request is also given. In this model, we give themeasure of trustworthiness factor to access request- by using some idea of uncertainty reasoning ofexpert system, present and prove the parallel propagation formula of request trustworthiness factoramong multiple policies, and get thefinal trustworthiness factor to decide whether authorizing. Inthis model, authorization decision is given according to the calculation of request trustworthinessfactor, which is more understandable, more suitable for real requirement and more powerfulforsecurity enhancement than traditional methods. Meanwhile the finer access control granularity isanother advantage.
文摘Non-orthogonal multiple access (NOMA) schemes have achieved great attention recently and been considered as a crucial compo-nent for 5G wireless networks since they can efficiently enhance the spectrum efficiency, support massive connections and poten-tially reduce access latency via grant free access. In this paper, we introduce the candidate NOMA solutions in 5G networks, com-paring the principles, key features, application scenarios, transmitters and receivers, etc. In addition, a unified framework of these multiple access schemes are proposed to improve resource utilization, reduce the cost and support the flexible adaptation of multi-ple access schemes. Further, flexible multiple access schemes in 5G systems are discussed. They can support diverse deployment scenarios and traffic requirements in 5G. Challenges and future research directions are also highlighted to shed some lights for the standardization in 5G.
文摘In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.
文摘User’s data is considered as a vital asset of several organizations.Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns.Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment.The data stored on the public cloud will be vulnerable to outside and inside attacks.This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud.Different access control policies are applied for verifying users on the cloud.A security mechanism is applied to the cloud application that includes user registration,granting user privileges,and generating user authentication factor.An intrusion detection system is embedded to the security mechanism to detect malicious users.The multi factor authentication,intrusion detection,and access control techniques can be used for ensuring the identity of the user.Finally,encryption techniques are used for protecting the data from being disclosed.Experimental results are carried out to verify the accuracy and efficiency of the proposed frameworks and mechanism.The results recorded high detection rate with low false positive alarms.
文摘Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can build their systems by multiple invocations of these services. This research is devoted to investigating the management and data flow control over enterprise academic web applications where web services and developed academic web application are constructing infrastructure-networking scheme at the application level. Academic web services are invoked over http port and using REST based protocol;thus traditional access control method is not enough to control the follow of data using host and port information. The new cloud based access control rules proposed here are to be designed and implemented to work at this level. The new proposed access control architecture will be a web service gateway, and it published itself as a service (SaaS). We used three case studies to test our moodle and then we apply JSON parsers to perceive web service description file (WSDL file) and supply policies according to data are to be allowed or denied based on user roll through our parsing.
文摘随着生物技术的快速发展,越来越多的生物制造饲料原料及添加剂研发成功。这些产品不仅能提高饲料的营养价值,还可以降低生产成本、提高养殖效益。然而,生物制造饲料原料及添加剂在生产工艺和质量标准方面与传统产品存在较大差异,造成市场准入障碍,制约了饲料及畜牧业的高效发展。本文系统梳理了欧盟、美国、日本和中国的生物制造饲料蛋白原料和添加剂的市场准入与监管机制,包括相关法规政策依据、审批流程及标准要求。欧盟的审批流程相对严谨,对产品的安全性评估更为全面,但审批时间较长;美国的准入制度较为灵活,三种多元化的准入途径,但对于“一般公认安全”(Generally Recognized as Safe,GRAS)物质的认定存在一定的主观性;日本的法规较为完善,兼顾社会伦理与市场实际,形成了一套严谨且灵活的体系。近年来,中国在生物制造饲料原料或者添加剂市场准入与监管方面,规范了审批流程和标准,缩短了审批周期,但在产品评价方法、评价程序等方面仍存在一些问题。本文针对性地提出了优化建议,旨在助力生物制造在饲料养殖行业的高质量发展。
文摘With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC.