Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing

Size: px
Start display at page:

Download "Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing"

Transcription

1 Requrement-Orented Prvacy Protecton Analyss Archtecture n Cloud Changbo Ke 1, 2 *, Ruchuan Wang 1, 2, Fu Xao 1, 2, 4, and Zhqu Huang 3 1 School of Computer Sc. & Tech./School of Software, Nanjng Unv. of Posts and Telecom., Nanjng , Chna 2 Jangsu Hgh Tech. Research Key Laboratory for Wreless Sensor Networks, Nanjng, Jangsu, , Chna 3 College of computer Sc. and Tech., Nanjng Unv. of Aeronautcs and Astronautcs, Nanjng, Jangsu, Chna 4 Key Lab of Broadband Wreless Communcaton and Sensor Network Tech. (Nanjng Unversty of Posts and Telecom.), Mnstry of Educaton Jangsu Provnce, Nanjng, Jangsu, , Chna Emal: brobo.ke@njupt.edu.cn; wangrc@njupt.edu.cn, xaof@njupt.edu.cn; zhqhuang@nuaa.edu.cn Abstract As a new software paradgm, cloud computng provdes servces dynamcally accordng to user requrements. However, t s dffcult to control personal prvacy nformaton because of the openng, vrtualzaton, mult-tenancy and servce outsourcng characters. Therefore, how to protect user prvacy nformaton has become a research focus. In ths paper, we propose requrement-orented prvacy protecton theory analyss archtecture and mplementaton platform. Frstly, the theory analyss archtecture s depcted as layers, and we analyze the functon and key technologes of every layer. Secondly, we address the prvacy property descrpton method wth ontology and descrpton logc, and then analyze the theory modules of prvacy tems conflct checkng layer, prvacy polcy negotaton layer and prvacy agreement forenscs layer. Thrdly, accordng to theory archtecture, we desgn the mplementaton platform of requrement-orented prvacy protecton, and dscuss the functon and workflow. In the end, we conclude and pont out the future work. Index Terms Prvacy protecton, prvacy tems, prvacy polcy, prvacy property, cloud computng I. INTRODUCTION Cloud computng s a model for enablng convenent, on-demand network access to a shared pool of confgurable computng resources (e.g., networks, servers, storage, applcatons, and servces) that can be rapdly provsoned and released wth mnmal management effort or servce provder nteracton [1]. There are some characters, such as servce outsourcng, vrtualzaton, dstrbuton and mult-tenancy. These characters enhance the servce qualty and save the computng resources, for example, servce outsourcng enhances the servce capablty and specalzaton through servce composton [2]. However, the transparency of prvacy nformaton to the outsourcng servce provder, make users worry that prvacy data be llegally propagated and used. For Manuscrpt receved September 2, 2014; revsed January 30, Ths work s supported n part by the Natonal Scence Foundaton of Chna under grants (No , No , No ), Major Program of Jangsu Hgher Educaton Insttutons under grant No.14KJA520002, Sx Industres Talent Peaks Plan of Jangsu under grant No.2013-DZXX-014 and Jangsu Qnglan Project. Correspondng author emal: brobo.ke@njupt.edu.cn. do: /jcm example, Google was sued by some users n Amerca and was nvestgated by European Unon, because of ts new unfed prvacy polcy mplemented from Mar. 1st, Accordng to the analyss by Amerca Electronc Prvacy Informaton Center, Google new prvacy polces do not take nto account how to use prvacy data n the product, and to whom prvacy data be propagated accordng to user prvacy requrement, and may have conflcts wth local laws. Therefore, prvacy protecton n cloud computng has become research focus. Prvacy was proposed as the human rght n the begnnng [3]. In doman of software engneerng, prvacy protecton means the capablty of preventng ndvdual nformaton from beng collected, dsclosed and stored by others [4]. The Platform for Prvacy Preferences (P3P) [5] provdes a standard and machne-understandable prvacy polcy, whch matches wth user prvacy preference. Accordng to the matched results, user can select servces. However, the P3P lacks semantc nformaton and only apples to Web Ste, not supportng servce composton. Therefore, P3P does not apply to cloud computng, snce all enttles n cloud computng are servce or composte servce. Extensble Access Control Markup Language (XACML) 2.0 [6] [7] extends the prvacy polcy through profle and apples to the cloud servce. However, t hardly guarantees the composte servce satsfyng user prvacy requrement. Pearson, S et al. [8] [9] defned prvacy protecton n cloud computng as the capablty of user controllng Personal Senstve Informaton (PSI) not be collected, used, dsclosed and stored by cloud servce provder. They provded certan theoretcal gudance, but do not put forward specfc soluton method. In order to satsfy user prvacy requrement and protect user prvacy data n the busness process, we propose requrement-orented prvacy protecton analyss archtecture n cloud computng, and develop a prototype system and run a case to prove the feasblty and practcablty of the archtecture. The other parts of ths paper are structured as the follows: Secton 2 we ntroduce related works. Secton 3 we address descrpton of prvacy requrement. Secton 4 we depct prvacy protecton archtecture and analyss, ncludng prvacy tems conflct checkng, prvacy polcy 55

2 negotaton and prvacy agreement supervsng. Secton 5 we put forward prvacy protecton mplementaton platform. In the end, we conclude and pont out the future work n secton 6. II. RELATED WORKS We classfy the related works of prvacy protecton as computng process orented and data orented prvacy protecton. The former s classfed nto fve categores, whch are modelng and verfcaton of prvacy requrement, matchng and negotaton of prvacy polcy, dsclosure and rsk. In the mean tme, we compare them from contrbuton, appled computng paradgm, whether supportng servce composton and whether supportng semantc, and hghlght our work n the table. The prvacy polces are defned by dfferent users or servce provders, whch may cause varous understandng of the same words. The prvacy polces supportng semantc can mprove the matchng chance. Most of servces n cloud computng are composte servces. Therefore, whether supportng servce composton s very mportant. We specally compare related works from aspects of semantc and servce composton. In ths paper, we major dscuss the requrementorented prvacy protecton analyss archtecture n cloud computng. Our work apples to servce composton and contans semantc nformaton, whle most of other works do not. Detals showed as below Table I. TABLE. I: COMPARISON OF RELATED WORKS Methods Authors Contrbutons Modelng and Verfcaton Matchng Negotaton Dsclosure Rsk Analyss Archtecture Jajun Lu et al. [10] N. Guermouche, S et al. [11] Mokhtar K et al. [12] LnYuan Lu et al. [13] Changbo ke et al. [14] WEI Zhqang et al. [15] Changbo ke et al. [16] Tbahrt S et al. [17] ZHANG Yan et al. [18] Jan Kolter et al. [19] LnYuan Lu et al. [20] Verfcaton of Behavor-aware Prvacy Requrements n Web s Composton Prvacy-aware Web servce protocol replaceablty Verfcaton of Prvacy Tmed Propertes Mnmal prvacy authorzaton n web servces collaboraton Outsourcng Character Orented Prvacy Conflct Detecton Method n Cloud Prvacy-Protecton Polcy for Pervasve Supportng negotaton mechansm prvacy authorty method n cloud computng Prvacy-Enhanced Web Composton Paradgm Cloud Pervasve Cloud Support for Composton Support for Semantc Parsmonous Semantc Trust Negotaton N/A N/A Vsualzng Past Personal Data Dsclosures Analyss of the mnmal prvacy dsclosure T. Yu, Y et al. [21] Modelng and Measurng Prvacy Rsks Dan Svantesson et al. [22] Our work N/A: NOT APPLICABLE : SUPPORT : NOT SUPPORT Prvacy and consumer rsks n cloud computng Requrement-orented Prvacy Protecton Analyss Archtecture n Cloud Cloud Cloud N/A N/A *Answer: how to forenscs? Prvacy agreement audtng Prvacy agreement supervsng Prvacy agreement based on IFC Prvacy agreement supervsng based on DDL Forenscs Layer Prvacy agreement negotaton *Answer: what s accountablty bass? Consstency check of user requrement and servce provder polces Consstency check Consstency check Semantc asserton negotaton based on DL-PNL Ontology reason based on Tableau algorthm *Answer: how to accountablty? Negotaton Layer Checkng Layer provder prvacy polces User prvacy requrement Descrpton based on ontology and descrpton logc Descrpton Layer Fg. 1. Requrement-orented prvacy protecton archtecture 56

3 III. PRIVACY PROTECTION THEORY ANALYSIS ARCHITECTURE A. Prvacy Protecton Archtecture Requrement-orented prvacy protecton archtecture ncludes descrpton layer, checkng layer, negotaton layer and forenscs layer. Descrpton Layer: Prvacy requrement of user and servce provder s depcted wth ontology and descrpton logc, so that formal expresson have context semantc and machne-understandable. Ths layer s bass of other layers. Checkng Layer: Accordng to context semantc, check the consstency of both the prvacy requrement of user and prvacy polcy of servce provder respectvely. Then check the consstency between the prvacy requrement of user and prvacy polcy of servce provder, to gan the prvacy tems sequence. Negotaton Layer: To match correspondng prvacy polcy of prvacy tems wth prvacy negotaton language based on descrpton logc. Msmatched prvacy polcy wll be negotated wth prvacy asserton negotaton mechansm, to obtan the prvacy agreement that meet both user and servce provder. Forenscs Layer: To nstrument for cloud servce composton executon flow BPEL, and then verfy wth dynamc descrpton logc to supervse requrement. For prvacy requrement wth tme property, analyze and audt the supervsng log after BPEL s executed, n order to fnd the servce provders that volate the prvacy agreement, namely, to forensc the volatons. Detals as showed n Fg. 1. B. Descrpton of Prvacy Requrement Through analyzng the descrpton document of atom servce, whch jons n servce composng n cloud computng, negotaton engne obtans the user prvacy nformaton to be used or dsclosed from nput and precondton. In the mean tme, through analyzng user prvacy requrement, negotaton engne obtans the prvacy nformaton to be protected by user. Both obtaned prvacy nformaton are known as prvacy attrbutes. Under the framework of prvacy polcy negotaton, conflct detecton of prvacy attrbutes and exchange of prvacy dsclosure asserton between negotatng partes are automatcally done by respectve negotaton engne. Therefore, prvacy polcy asserton needs to be machneunderstandable, supportng context semantc reasonng. In ths paper, we take advantage of ontology and descrpton logc, to descrbe and reason the prvacy polcy at the bottom of the framework. Before elaborate the relatve theory of prvacy descrpton, we present an nstance that appled throughout the text. Instance: There are followng partcpants n ths nstance, Seller, Buyer, ES ( Composer), Bank, Shpper, Post offce. ES has the busness lcense ssued by Industral and Commercal Bureau, certfcated as legal E-commerce platform. ES can ssue reputaton certfcaton for those VIP sellers who have reputaton value over 600, or have credt over 6000 ssued by bank. Bank can ssue credt card certfcaton to both Seller and Buyer. One day, Tom wants to purchase some Furnture from servce provder corporaton S va cloud servce composer CSC. Tom has the followng prvacy requrements. Furnture Corporaton S needs better to be VIP seller. In transacton, only VIP seller can obtan Tom realname and phonenumber (Moble phone), whle non- VIP seller can only obtan Tom nckname or offcephonenumber. All phone number can only be provded to corporaton S and Shpper. Tom bank account can only be provded to Bank. Address and zp code can only be provded to Shpper. In certan perod after transacton s done, all partcpants have to delete all prvacy nformaton automatcally. Mantenance servce s provded through trackng number and phone number. Corporaton S especally requres gettng feedback about servce qualty through phone number and address, from those customers wth amount over $20,000. Consderng the above requrements, the pont s that whether Tom can successfully negotate wth S to obtan nteracton sequence, and then place an order or not. We obtan the relatonshp of prvacy attrbutes through mappng among knowledge ontology, and then descrbe t wth ontology tree. The ontology tree of prvacy attrbutes s showed n Fg. 2. Thng s root node, whch s super class of all prvacy attrbutes. Except the bottom layer, the relatonshp between all the other layers s subsumng, namely, relatonshp of class and subclass. For example, class name ncludes subclass realname and nckname. Only the bottom layer belongs to ts upper layer, for example, Country, Provnce and Cty belong to class Address. a b b a Thng Prvacy Item Prvacy Polcy Fg. 2. Ontology Descrpton of Prvacy Attrbutes Prvacy Attrbute Defnton 1 Prvacy Attrbute: We descrbe prvacy attrbute as 5-tuple, namely, PA S / PA U Issuer, Owner, Subject, PDA S / PDA U, Sgnature Issuer represents the mark of prvacy attrbute, to record the farther class and son class of a prvacy attrbute class. Owner represents partcpants of servce 57

4 composton and also the owner of prvacy attrbute. Subject represents name of the prvacy attrbute. PDA- S/PDA-U represents Prvacy Dsclosure Asserton of s or users. Sgnature s dgtal sgnature. Each prvacy attrbute corresponds to one concept n prvacy attrbute ontology. Subject can be descrbed as follows: Subject C( op : I, op : I, op : I... op : I ) C( dp : D, dp : D, dp : D... dp : D ) where C represents class of prvacy attrbute ontology, op and dp represents object property and dgtal property respectvely, belongng to class, satsfyng ( j) ( op op j ) ( dp dp j ), I represents nstance of prvacy attrbute ontology, and s one certan value or constant. Defnton 2 Delegaton of Authorty Statement DAS: DAS s part of prvacy dsclosure asserton, namely, DAS must be satsfed for each dsclosure of prvacy attrbute, to prove f servce partcpants have the authorty of prvacy attrbute or not. It can be expressed as below: DAS : serverconstr authorzer asserton Suppose authorzer = {offcal, servcecomp}, whereas offcal represents offcal organzaton, servcecomp represents servce composer, serverconstr represents the rules or law constrant on servce partcpants ssued by offcal organzaton or servce composer. For example, ES s e-commerce platform. DAS clarfed that servce partcpants must satsfy the asserton expresson. Vald DAS must nclude sgnature on the asserton by offcal organzaton or servce composer, and n the mean tme, the sgnature s ncluded n the prvacy attrbute. Example 1: The DAS ssued by ES s as follows. To be VIP user of ES, the user must have reputaton value over 600 or have credt over 6000 ssued by bank. It can be express as below: n VIP EBay credt 6000( ratng) Bank reputaton 600( value) ES Defnton 3 Prvacy Dsclosure Asserton PDA-S: Prvacy Dsclosure Asserton s a constrant asserton for certan servce partcpant to own certan prvacy attrbute, t can be expressed as below: PDA S subjconstr ownerconstr; n n n subjconstr C op : ow ow... op : ow ow ownerconstr DAS; C op : ow ( vt ) op : ow ( vt ) ; n n n Prvacy Dsclosure Asserton PDA-S s composed of two parts, namely, constrant on subject of prvacy attrbute subjconstr, and constrant on servce partcpant who own the prvacy attrbute ownerconstr. The former subjconstr manly set constrants on the ownershp of prvacy attrbute and valdty perod of usng the prvacy n n n D (1) attrbute by servce partcpants. C represents class of prvacy attrbute, specfyng that prvacy attrbute exchange can only be processed among correspondng class or subclass. op1: ow1... ow n, n whch op1 represents some nstance of class and ow... 1 ow n represents servce partcpants correspondng to the op : ow ow op : ow ow represents nstance. 1 1 n n 1 n all nstances of class that owned by certan servce partcpants. op1 : ow1 ( vt1 ) opn : own ( vt n) represents valdty tme for servce partcpants ownng the prvacy attrbute nstance. If data doman of vt s nteger, then ow s a 1-tuple predcate based on data doman of vt. Common predcate s a or a, n whch a s constant. The latter ownerconstr manly set constrants on servce partcpants who own prvacy attrbutes, ownerconstr DAS means that servce partcpants who own prvacy attrbutes must also meet DAS requrement. Example 2: Corporaton S plans to sell furnture va ES on nternet. The prvacy dsclosure asserton of user address ssued by ES s as follows: Supposng corporaton S s ES VIP seller. ES requres buyer address can only be dsclosed to shpper, and be deleted wthn 2 hours after goods delvered and deal s fnshed, we can express t as below, address : shpper address : 2hours ( valdtme) Seller : VIP ES Take formula (1) nto formula (2), we can obtan: 600( ) address : shpper address : 2 hours ( valdtme) credt 6000( ratng) Bank reputaton value ES Defnton 4 Prvacy Dscloser Strategy (PDS): PDS s an ordnal sequence of prvacy dscloser asserton, namely, PDS PDA S1 PDA S2 PDA S3 PDA Sn Defnton 5 Prvacy Dsclosure Asserton of User (PDA-U): Prvacy Dsclosure Asserton of User s a constrant asserton for certan servce provder to own certan prvacy attrbute, t can be expressed as below: PDA U subjconstr serverconstr; n n n subjconstr C op : ow ow op : ow ow C op1 ow1 vt1 opn own vt n serverconstr trustdegree; : ( ) : ( ) ; Prvacy Dsclosure Asserton PDA-U s composed of two parts, namely, constrant on subject of prvacy attrbute subjconstr, and constrant on servce provder who own the prvacy attrbute serverconstr. The expresson of subjconstr s the same as that n Defnton 3, whle serverconstr s determned by user trust degree on servce or servce provder. Trust degree can be expressed as trustdegree = {S, DAS, Re}, whereas S (2) (3) 58

5 Journal of Communcatons Vol. 10, No. 1, January 2015 represents Securty, to certfy the truth and ntegrty of data and trustworthy of QOS. DAS s delegaton authorty statement that owned by servce or servce provder. Re represents reputaton of servce or servce provder. DAS usually s ssued by offcal organzaton or servce composer to servce provder, for example, statng whether Seller s VIP, whether Shpper or Bank have busness lcense ssued by offcal organzaton or not. We assume all shpper and bank have busness lcense n ths paper. Defnton 6 Prvacy Preference PP: PP s an ordnal sequence of prvacy dscloser asserton. Namely, framework, as showed n Fg. 3. Pre-detecton Layer: The part wth slash background n Fg. 3 represents Prvacy Conflct Pre-detecton Layer. Ths part manly mplements three functons as follows: 1) User prvacy requrement s translated nto prvacy preference asserton { 1, 2, 3,, n } by user prvacy preference edtor (PPE). 2) User comment nformaton and Qos n servce descrpton document (SDD) are evaluated by trust degree calculator (TDC), so as to obtan the trust degree value for servces. 3) The nput and precondton n servce descrpton document s captured by Xpath, and nput and precondton s refned nto prvacy property. At last, the prvacy preference asserton, trust degree and prvacy property are saved nto prvacy conflct detecton knowledge base. PP PDA U1 (C1 (op1 )) PDA U 2 (C2 (op2 )) PDA U 3 (C3 (op3 )) PDA U n (Cn (opn )) C. Prvacy Items Conflct Checkng There are two layers for prvacy conflct detecton SDD Knowledge base Trust Degree PPE ABox{ 1, 2, TBox TDC n } Precondton Input Internet Cloud_ 1 PCR Requester Cloud_ 2 Pre-detecton Layer Detecton Layer Fg. 3. Framework of prvacy conflct detecton User Negotaton Engne Prvacy Preference (PP) Server Negotaton Engne Prvacy tems Prvacy Dsclosure Strategy (PDS) Polcy send Macthng Prvacy Dsclosure Asserton (PDA) feedback Delegaton of Authorty Statement (DAS) Prvacy Dsclosure Asserton (PDA) Requester s Composer Mappng Knowledge Doman Ontology Prvacy Attrbute Collecton (PAC) Fg. 4. Prvacy polcy negotaton framework Detecton Layer: The part wth grd background n Fg. 3 represents Prvacy Conflct Detecton Layer. Prvacy conflct detecton layer contans knowledge base and prvacy conflct reasoner (PCR), n whch knowledge base s made up of prvacy preference asserton, trust degree and prvacy property. In ths layer, prvacy conflct detecton for knowledge base s mplemented by prvacy conflct reasoner and the detecton result s returned to user. D. Prvacy Polcy Negotaton The framework of prvacy polcy negotaton has two layers, as showed n Fg.4. 1) Mappng layer, whch supports the mappng 59

6 between Prvacy Attrbute Collecton (PAC) and Knowledge Doman Ontology (KDO), so that the semantc relatonshp among prvacy attrbutes can be determned and prvacy attrbute ontology can be set up. Durng the perod of the prvacy polcy pre-negotaton, once conflcts are detected, negotaton engne can substtute the conflcted attrbute wth brother attrbute of ontology tree, whch s found by semantc relatonshp among prvacy attrbutes, and fnd the prvacy attrbute sequence that satsfyng user prvacy requrement. 2) Negotaton layer, whch has two perods, namely, pre-negotatng perod and Prvacy Dsclosure Asserton (PDA) exchange perod. Durng the perod of pre-negotaton, frstly, negotaton engne analyzes the user requrement document and servce nput and pre-condton provded by servce provder, respectvely, obtanng user Prvacy Preference (PP) and servce Prvacy Attrbute Collecton (PAC). Secondly, detects the conflct between PP and PAC, to dscover prvacy attrbute that not satsfyng user prvacy requrement. Thrdly, search engne substtutes the dscovered prvacy attrbute wth brother attrbute of ontology tree through callng the mappng layer. Durng the PDA exchange perod, exchange the correspondng PDA of servce prvacy attrbute and user prvacy requrement, and terate ths exchange process. Through ths process, PDA collecton that satsfyng both servce provder and user, namely, Prvacy Dsclosure Strategy (PDS) may be found. Then PDS s ncluded n Level Agreement (SLA). E. Prvacy Agreement Supervsng Prvacy agreement-orented supervsng framework can be expressed wth two layers, as showed n Fg.5. 1) Analyss layer: Statc analyze the BPEL process wth BPEL Analyss Engne before executon. Detaled analyss process as follows: at frst, we capture nvoke mark by usng Xpath, then nsert probe DAS as precondton of callng outsourcng servce. If precondton DAS s unsatsfed, then termnate BPEL process. If satsfed, then supervse the executon of outsourcng servce wth Supervsor, n whch each prvacy tem {subject: name} corresponds wth PDA n SLA. 2) Supervsng layer: Wth BPEL Executon Engne execute the BPEL process that have been analyzed and nstrumented, and n the mean tme save the supervson log nto Supervson Log Repostory. If precondton DAS s unsatsfed for an outsourcng servce, then termnate the process and substtute the outsourcng servce wth canddate by usng BPEL Analyss Engne. If one or more PDAs n SLA are volated, then punsh the outsourcng servce accordng to correspondng punshment rule n SLA and decrease the trust degree. Level Agreement BPEL Executon Engne Supervson Log 1. PDA1 2. PDA2 3. PDA3 n. PDAn Supervsng Layer BPEL Analyss Engne nvoke nvoke DAS supervsor DAS supervsor Analyss Layer Fg. 5. Prvacy agreement-orented supervsng framework Prvacy tems /Prvacy Polces 1 Prvacy Requrement Prvacy Agreements 1 OWL-S 4 BPEL *See secton B *Obtan prvacy tems and polcy ; *OWL-S formal descrpton ; prvacy Property Management Module * User prvacy requrement formal descrpton ; 2 Prvacy Items of users and provders 2 Prvacy Items Sequence 3 Prvacy polcy 3 Prvacy Agreements 4 Prvacy Agreements Prvacy Agreement Supervsng Module * See secton E Prvacy Items Conflct Checkng Module * See secton C Prvacy Polcy Matchng and Negotaton Module *See secton D 4 Supervsng logs Fg. 6. Prvacy protecton mplementaton platform 60

7 IV. PRIVACY PROTECTION IMPLEMENTATION PLATFORM Prvacy protecton mplementaton platform s made up of four modules, ncludng prvacy property management module, prvacy tems conflct checkng module, prvacy polcy matchng and negotaton module and prvacy agreement supervsng module. As showed n Fg. 6. Prvacy Property Management Module: Resolvng user prvacy requrement and servce descrpton document OWL-S, to obtan the prvacy property, namely prvacy tems and correspondng prvacy polcy asserton, and then descrbng them wth ontology and descrpton logc. Prvacy Items Conflct Checkng Module: Detectng the conflct of both user and servce provder prvacy tem, and then detectng the conflct between user and servce provder prvacy tem, namely check the consstency wth Tableau algorthm. Prvacy Polcy Matchng and Negotaton Module: Accordng to matchng rules, matchng module match the correspondng prvacy polces of prvacy tem between user and servce provder. If msmatch s trggered, matchng module wll nvoke the negotaton module to obtan the prvacy agreement satsfyng user and servce provder. Prvacy Agreement Supervsng Module: Frstly, wth dynamc descrpton logc we verfy whether outsourcng servce s authorzed to obtan the user prvacy attrbute, to prevent unauthorzed outsourcng servce from obtanng user prvacy nformaton. Secondly, we supervse authorzed outsourcng servce accordng to the prvacy agreement, to assure the prvacy agreement s kept. Executon flow of prvacy protecton mplementaton platform as follows: Step 1: Prvacy property management module obtan the user prvacy requrement and servce descrpton document from user and servce provder, and resolve them to get prvacy tems and prvacy polces. Then save them to prvacy tems/prvacy polces database. Step 2: Prvacy conflct checkng module gan the prvacy tems through prvacy property management module, check the consstency between user and servce provder prvacy tems. And save the prvacy tems sequence to prvacy tems/prvacy polces database. Step 3: prvacy property management module obtan correspondng prvacy polcy accordng to prvacy tems sequence. Prvacy polcy negotaton module matches the correspondng prvacy polcy of every prvacy tem. When msmatch s found, Negotaton module wll trgger negotaton mechansm to gan the prvacy agreements, and save them to prvacy agreement database. Step 4: When servce composer provde the servce for user, prvacy agreement supervsng module obtan the servce composton executon process BPEL, nstrument prvacy agreement asserton nto BPEL accordng to prvacy agreement and BPEL context semantc. So as to supervse the executon process, save the supervsng logs nto database. In ths paper, we develop a prototype system CloPP and run a case to verfy our method feasblty and practcablty. The prototype system s developed wth java; the graphc nterface s desgned wth MyEclpse Swng Matsse and the prvacy data s stored wth MySql. We buld prvacy conflct detecton ontology wth ontology edtng tool Protégé based on java language, whch s developed by Stanford Unversty. And then the knowledge base s reasoned wth reasoner Pellet to obtan the prvacy tems sequence. Pellet was developed by Mnd Swap lab n Unversty of Maryland. Pellet verson number used n ths experment s V The system negotates the correspondng prvacy polces of the prvacy tem to gan the prvacy agreement satsfyng user and servce provder. In the end, the BPEL s supervsed by prvacy agreement supervsng module, to dscover the servce provder volatng the prvacy agreement. Fg. 7. Operaton vew of the prototype system 61

8 Fg. 7. s operaton vew of prototype system. The user and servce partners are lsted on the fgure top-left. The cloud servces descrpton document and BPEL are lsted on the fgure bottom-left. The wndow of prvacy tems conflct detecton, prvacy agreement negotaton and supervsng are lsted on the fgure rght. Through analyze the prvacy requrement, servce descrpton document OWL-S and busness process executon language BPEL, we can gan the prvacy tem sequence, prvacy agreement and servce partners volatng prvacy agreement. V. CONCLUSIONS AND FUTURE WORK Ths paper proposes a requrement-orented prvacy protecton methods n cloud computng. Accordng to the analyss of prvacy protecton theory archtecture, we desgn the prvacy protecton mplementaton platform. Future works s to mplement the theory frame of every module. ACKNOWLEDGMENT Ths work s supported n part by the Natonal Scence Foundaton of Chna under grants (No , No , No ), Major Program of Jangsu Hgher Educaton Insttutons under grant No.14KJA520002, Sx Industres Talent Peaks Plan of Jangsu under grant No.2013-DZXX-014 and Jangsu Qnglan Project. REFERENCES [1] V. Rajaraman, Cloud computng, Resonance, vol.19, pp , March [2] M. Armbrust, A. Fox, R. Grffth, A. D. Joseph, R. H. Katz, A. Konwnsk, et al., Above the clouds: A berkeley vew of cloud computng, Unversty of Calforna, Berkeley, Tech. Rep. UCB-EECS , Feb [3] K. Bagha, Prvacy as a human rght: A socologcal theory, Socology, vol. 46, pp , [4] I. Goldberg, D. Wagner, and E. Brewer, Prvacy-enhancng technologes for the nternet, n Proc. 42nd IEEE Internatonal Computer Conf., New Jersey, 1997, pp [5] F. Xao, Z. Huang, Z. Cao, J. Hu, and L, Lu. Modelng costaware Web servces composton usng PTCCS, n Proc Internatonal Conf. on Web, New Jersey, 2009, pp [6] G. Yee and L. Korba, Prvacy polcy complance for Web servces, n Proc IEEE Internatonal Conf on Web s, New Jersey, 2004, pp [7] J. Zhang, C. K. Chang, L. J. Zhang, and P. C. K. Hung, Toward a servce-orented development through a case study, IEEE Transacton on Systems, Man, Cybernetcs, Part A, vol. 37, pp , [8] S. Pearson, Takng account of prvacy when desgnng cloud computng servces, HP Labs Techncal Report, HPL , London, HP Labs, [9] S. Pearson and A. Charlesworth, Accountablty as a way forward for prvacy protecton n the cloud, HP Labs Techncal Report, HPL , London, HP Labs, [10] J. J. Lu, Z. Q. Huang, and C. Ke, Verfcaton of behavor-aware prvacy requrements n web servces composton, Journal of Software, vol. 9, pp , [11] N. Guermouche, S. Benbernou, E. Coquery and M. S. Hacd, Prvacy-aware Web servce protocol replaceablty, n Proc. of the Internatonal Conf. on Web s, New Jersey, 2007, pp [12] K. Mokhtar, S. Benbernou, M. Hacd, E. Coquery, and F. Leymann, Verfcaton of prvacy tmed propertes n Web servce protocols, n Proc. IEEE nternatonal Conf. on s, New Jersey, 2008, pp [13] L. Y. Lu, H. B. Zhu, Z. Q. Huang, and D. Q. Xe, Mnmal prvacy authorzaton n web servces collaboraton, Computer Standards & Interfaces, vol. 33, pp , [14] C. Ke, Z. Q. Huang, W. W. L, Y. Sun, and F. X. Xao, outsourcng character orented prvacy conflct detecton method n cloud computng, Journal of Appled Mathematcs, vol. 2014, May [15] Z. Q. We, M. J. Kang, et al., Research on Prvacy-Protecton Polcy for Pervasve, Chnese Journal of Computers, vol. 33, pp , [16] C. Ke, Z. Q. Huang, and M. Tang, Supportng negotaton mechansm prvacy authorty method n cloud computng, Knowledge-Based Systems, vol. 51, pp , Oct [17] S. Tbahrt, C. Ghedra, B. Medjahed, and M. Mrssa, Prvacyenhanced web servce composton, IEEE Transactons on s, vol. 7, pp , June [18] Y. Zhang and D. G. Fen, Parsmonous semantc trust negotaton, Chnese Journal of Computers, vol. 32, pp , [19] J. Kolter, M. Netter, and G. Pernul, Vsualzng past personal data dsclosures, n Proc. 17th Int. Conf. on Avalablty, Relablty and Securty, New Jersey, 2010, pp [20] L. Y. Lu, H. B. Zhu, and Z. Q. Huang, Analyss of the mnmal prvacy dsclosure for web servces collaboratons wth role mechansms, Expert Syst. Appl, vol. 38, pp , [21] T. Yu, Y. Zhang, and K. J. Ln, Modelng and measurng prvacy rsks n QoS web servces, n Proc. 8th IEEE Internatonal Conf on E-Commerce Technology/3th IEEE Internatonal Conf on Enterprse, E-Commerce and E-s, New Jersey, 2006, pp. 4. [22] D. Svantesson and Roger, Clarke prvacy and consumer rsks n cloud computng, Computer Law and Securty Revew, vol. 26, pp , Changbo Ke was born n Shanx Provnce, Chna, n He receved the B.S. and M.S. degree from the Kunmng Unversty of Scence and Technology of Chna, Kunmng, n 2008 and 2010 respectvely, and receved the PH.D degree from the Nanjng Unversty of Aeronautcs and Astronautcs, Nanjng, n Now s lecturer of Nanjng Unversty of Posts and Telecommuncatons. Major research nterests nclude securty and prvacy of nformaton system, cloud computng and ontology-based software engneerng. Ruchuan Wang was born n Anhu Provnce, Chna. He researched on graphc processng at Unversty of Bremen and program desgn theory Ludwg Maxmlan Muenchen Untverstaet from 1984 to He s a professor and tutor of Ph.D. canddate n Nanjng Unversty of Posts and Telecommuncatons snce Major 62

9 research nterests nclude wreless sensor networks, nformaton securty. Fu Xao was born n Hunan Provnce, Chna, n He receved the B.S. degree and the Ph.D. degree from the Nanjng Unversty of Scence and Technology of Chna n 2002 and 2007 respectvely. Now he s professor of Nanjng Unversty of Posts and Telecommuncatons. Major research nterests nclude wreless sensor networks. Zhqu Huang was born n Jangsu Provnce, Chna, n He receved the B.S. degree and the M.S. degree from the Natonal Unversty of Defense Technology of Chna, receved the Ph.D. degree from Nanjng Unversty of Aeronautcs and Astronautcs of Chna. Now he s a professor and tutor of Ph.D. canddate n Nanjng Unversty of Aeronautcs and Astronautcs of Chna. Major research nterests nclude formal method, software engneerng, cloud computng. 63

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Ontology Generator from Relational Database Based on Jena

Ontology Generator from Relational Database Based on Jena Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT

CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT Shh-Chen Chou Department of Computer Scence and Informaton Engneerng, Natonal Dong Hwa Unversty, Tawan ABSTRACT Informaton flow control (IFC) s

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

AN ALGEBRAIC APPROACH TO CONSISTENCY CHECKING BETWEEN CLASS DIAGRAMS

AN ALGEBRAIC APPROACH TO CONSISTENCY CHECKING BETWEEN CLASS DIAGRAMS AN ALGEBRAIC AROACH TO CONSISTENC CHECKING BETWEEN CLASS DIAGRAMS HIDEKAZU ENJO, MOTONARI TANABU, JUNICHI IIJIMA NTT DATA Corporaton, okohama Natonal Unversty, Tokyo Insttute of Technology enouh@nttdata.co.p,

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

A high precision collaborative vision measurement of gear chamfering profile

A high precision collaborative vision measurement of gear chamfering profile Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION 1 FENG YONG, DANG XIAO-WAN, 3 XU HONG-YAN School of Informaton, Laonng Unversty, Shenyang Laonng E-mal: 1 fyxuhy@163.com, dangxaowan@163.com, 3 xuhongyan_lndx@163.com

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Software Trustworthiness Static Measurement Model and the Tool

Software Trustworthiness Static Measurement Model and the Tool Avalable onlne at www.jpe-onlne.com vol. 13, no. 7, November 2017, pp. 1101-1110 DOI: 10.23940/jpe.17.07.p13.11011110 Software Trustworthness Statc Measurement Model and the Tool Yan L, Zhqang Wu, Yxang

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A XML-Based Composition Event Approach as an Integration and Cooperation Middleware

A XML-Based Composition Event Approach as an Integration and Cooperation Middleware A XML-Based Composton Event Approach as an Integraton and Cooperaton Mddleware Gang Xu, JanGang Ma, and Tao Huang Technology Center of Software Engneerng, Insttute of Software, Chnese Academy of Scences,

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

A Method of Query Expansion Based on Event Ontology

A Method of Query Expansion Based on Event Ontology A Method of Query Expanson Based on Event Ontology Zhaoman Zhong, Cunhua L, Yan Guan, Zongtan Lu A Method of Query Expanson Based on Event Ontology 1 Zhaoman Zhong, 1 Cunhua L, 1 Yan Guan, 2 Zongtan Lu,

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

A Facet Generation Procedure. for solving 0/1 integer programs

A Facet Generation Procedure. for solving 0/1 integer programs A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

PRÉSENTATIONS DE PROJETS

PRÉSENTATIONS DE PROJETS PRÉSENTATIONS DE PROJETS Rex Onlne (V. Atanasu) What s Rex? Rex s an onlne browser for collectons of wrtten documents [1]. Asde ths core functon t has however many other applcatons that make t nterestng

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Composition of UML Described Refactoring Rules *

Composition of UML Described Refactoring Rules * Composton of UML Descrbed Refactorng Rules * Slavsa Markovc Swss Federal Insttute of Technology Department of Computer Scence Software Engneerng Laboratory 05 Lausanne-EPFL Swtzerland e-mal: Slavsa.Markovc@epfl.ch

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

Towards Autonomous Service Composition in A Grid Environment

Towards Autonomous Service Composition in A Grid Environment Towards Autonomous Servce Composton n A Grd Envronment Wllam K. Cheung +, Jmng Lu +, Kevn H. Tsang +, Raymond K. Wong ++ Department of Computer Scence + Hong Kong Baptst Unversty Hong Kong {wllam,jmng,hhtsang}@comp.hkbu.edu.hk

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Oracle Database: 12c Administrator

Oracle Database: 12c Administrator Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Specifying Database Updates Using A Subschema

Specifying Database Updates Using A Subschema Specfyng Database Updates Usng A Subschema Sona Rstć, Pavle Mogn 2, Ivan Luovć 3 Busness College, V. Perća 4, 2000 Nov Sad, Yugoslava sdrstc@uns.ns.ac.yu 2 Vctora Unversty of Wellngton, School of Mathematcal

More information

Alignment Results of SOBOM for OAEI 2010

Alignment Results of SOBOM for OAEI 2010 Algnment Results of SOBOM for OAEI 2010 Pegang Xu, Yadong Wang, Lang Cheng, Tany Zang School of Computer Scence and Technology Harbn Insttute of Technology, Harbn, Chna pegang.xu@gmal.com, ydwang@ht.edu.cn,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

SERVICE-ORIENTED Computing (SOC) is a new and novel

SERVICE-ORIENTED Computing (SOC) is a new and novel IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 4, NO. 1, JANUARY-MARCH 2011 3 Servce-Centrc Framework for a Dgtal Government Applcaton Athman Bouguettaya, Fellow, IEEE, QYu,Member, IEEE, Xumn Lu, Member,

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP(  1 Web Servce Dscovery Usng Semantcally Annotated Belef Network Rajesh G (P.G Student) 1, A Gnanasekar (Assstant Professor) 2, Dr. R. M. Suresh (Prncpal) 3 1 M.E. - Computer Scence and Engneerng R.M.D. Engneerng

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Privacy Models for RFID Authentication Protocols

Privacy Models for RFID Authentication Protocols Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna

More information

A plan-driven dynamic reconfiguration mechanism for C2 Communities of Interest

A plan-driven dynamic reconfiguration mechanism for C2 Communities of Interest 15 th ICCRTS The Evoluton of C2 Ttle of Paper: A plan-drven dynamc reconfguraton mechansm for C2 Communtes of Interest Topcs Topc 6: Modelng and Smulaton Paper ID ID# 080 Authors JngJng Yan ZhuYun Duanmu

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Fault Detection in Rule-Based Software Systems

Fault Detection in Rule-Based Software Systems Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Data Preprocessing Based on Partially Supervised Learning Na Liu1,2, a, Guanglai Gao1,b, Guiping Liu2,c

Data Preprocessing Based on Partially Supervised Learning Na Liu1,2, a, Guanglai Gao1,b, Guiping Liu2,c 6th Internatonal Conference on Informaton Engneerng for Mechancs and Materals (ICIMM 2016) Data Preprocessng Based on Partally Supervsed Learnng Na Lu1,2, a, Guangla Gao1,b, Gupng Lu2,c 1 College of Computer

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES. Vaibhav Mathur and Viktor K.

A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES. Vaibhav Mathur and Viktor K. A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES Vabhav Mathur and Vktor K. Prasanna Department of EE-Systems Unversty of Southern Calforna Los Angeles, CA

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Association Rule Mining with Parallel Frequent Pattern Growth Algorithm on Hadoop

Association Rule Mining with Parallel Frequent Pattern Growth Algorithm on Hadoop Assocaton Rule Mnng wth Parallel Frequent Pattern Growth Algorthm on Hadoop Zhgang Wang 1,2, Guqong Luo 3,*,Yong Hu 1,2, ZhenZhen Wang 1 1 School of Software Engneerng Jnlng Insttute of Technology Nanng,

More information

WS-Governance: a policy language for SOA Governance

WS-Governance: a policy language for SOA Governance WS-Governance: a polcy language for SOA Governance José Antono Parejo, Pablo Fernandez, and Antono Ruz-Cortés Unversdad de Sevlla, Span Abstract. The wdespread use of Servce Orented Archtectures (SOA)

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Decision Strategies for Rating Objects in Knowledge-Shared Research Networks

Decision Strategies for Rating Objects in Knowledge-Shared Research Networks Decson Strateges for Ratng Objects n Knowledge-Shared Research etwors ALEXADRA GRACHAROVA *, HAS-JOACHM ER **, HASSA OUR ELD ** OM SUUROE ***, HARR ARAKSE *** * nsttute of Control and System Research,

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm Recommended Items Ratng Predcton based on RBF Neural Network Optmzed by PSO Algorthm Chengfang Tan, Cayn Wang, Yuln L and Xx Q Abstract In order to mtgate the data sparsty and cold-start problems of recommendaton

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information