首页 > 最新文献

2009 International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Towards a Policy and Charging Control Architecture for Online Charging 面向在线收费的策略与收费控制体系结构研究
F. Bormann, Andre Braun, S. Flake, J. Tacken
Consistent and flexible policy and charging control is one key factor for effective access control and efficient resource management in IP-based multimedia communication networks. One approach to deal with this challenge is to put more decision logic into the so-called mediation layer which is residing between the operators’ core network and the charging system. This article describes our research study to extend the mediation layer with more capabilities for online charging control. The presented prototype implements and extends parts of the 3GPP Policy and Charging Control Architecture using the open source JAIN SLEE framework Mobicents.
在基于ip的多媒体通信网络中,一致灵活的策略和收费控制是实现有效访问控制和高效资源管理的关键因素。应对这一挑战的一种方法是将更多的决策逻辑放入所谓的中介层,该中介层位于运营商的核心网络和收费系统之间。本文描述了我们为扩展中介层提供更多在线收费控制功能的研究。提出的原型使用开源的JAIN SLEE框架Mobicents实现和扩展了3GPP策略和收费控制体系结构的部分内容。
{"title":"Towards a Policy and Charging Control Architecture for Online Charging","authors":"F. Bormann, Andre Braun, S. Flake, J. Tacken","doi":"10.1109/WAINA.2009.25","DOIUrl":"https://doi.org/10.1109/WAINA.2009.25","url":null,"abstract":"Consistent and flexible policy and charging control is one key factor for effective access control and efficient resource management in IP-based multimedia communication networks. One approach to deal with this challenge is to put more decision logic into the so-called mediation layer which is residing between the operators’ core network and the charging system. This article describes our research study to extend the mediation layer with more capabilities for online charging control. The presented prototype implements and extends parts of the 3GPP Policy and Charging Control Architecture using the open source JAIN SLEE framework Mobicents.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134388452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Approximating Travel Times Using Opportunistic Networking 利用机会网络估算旅行时间
Rudi Ball, Naranker Dulay
Determining the time and means by which to travel from location A to location B for a person utilising a MANET requires the dissemination of both realtime and historic data. In this paper, we describe an approach to collecting and analysing the time costs related to geographic tracks, utilising opportunistic networking, local knowledge approximation and commonality of query. We call this approach the Short-Pass-Feedback (SPF) protocol. Peers record their own tracks, recording the times between known waypoints. Tracks and the durations of walks are shared between peers to approximate and update the local time-cost knowledge of a community of local peers. SPF seeks to maximise the sharing of common travel data as it exists between individuals in such geographical settings. We present an application for opportunistic networking, show and outline the algorithms used to aquire context and geographical time-cost data, analyse the benefits and pitfalls of a distributed approach through simulation and finally discuss how this knowledge can be used by middleware or applications for the provision of mobile services. We also discuss that such an approach is feasible and can provide significantly useful information to a community of peers.
对于使用MANET的人来说,确定从地点A到地点B的时间和方式需要实时和历史数据的传播。在本文中,我们描述了一种利用机会网络、局部知识近似和查询共性来收集和分析与地理轨迹相关的时间成本的方法。我们称这种方法为短通反馈(SPF)协议。同伴记录自己的轨迹,记录已知航路点之间的时间。在节点之间共享路径和行走时间,以近似和更新本地节点社区的本地时间成本知识。SPF寻求最大限度地共享共同的旅行数据,因为它存在于这样的地理环境中的个人之间。我们提出了一个机会网络应用程序,展示并概述了用于获取上下文和地理时间成本数据的算法,通过模拟分析了分布式方法的优点和缺陷,最后讨论了中间件或应用程序如何使用这些知识来提供移动服务。我们还讨论了这种方法是可行的,并且可以为同行社区提供非常有用的信息。
{"title":"Approximating Travel Times Using Opportunistic Networking","authors":"Rudi Ball, Naranker Dulay","doi":"10.1109/WAINA.2009.199","DOIUrl":"https://doi.org/10.1109/WAINA.2009.199","url":null,"abstract":"Determining the time and means by which to travel from location A to location B for a person utilising a MANET requires the dissemination of both realtime and historic data. In this paper, we describe an approach to collecting and analysing the time costs related to geographic tracks, utilising opportunistic networking, local knowledge approximation and commonality of query. We call this approach the Short-Pass-Feedback (SPF) protocol. Peers record their own tracks, recording the times between known waypoints. Tracks and the durations of walks are shared between peers to approximate and update the local time-cost knowledge of a community of local peers. SPF seeks to maximise the sharing of common travel data as it exists between individuals in such geographical settings. We present an application for opportunistic networking, show and outline the algorithms used to aquire context and geographical time-cost data, analyse the benefits and pitfalls of a distributed approach through simulation and finally discuss how this knowledge can be used by middleware or applications for the provision of mobile services. We also discuss that such an approach is feasible and can provide significantly useful information to a community of peers.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Architectural Approach for Self-Managing Security Services 自管理安全服务的体系结构方法
G. Russello, Naranker Dulay
Self-managing systems are the focus of an increasing research activity since can provide a more robust way of building software artifacts. In this paper, we focus on self-managing systems for adapting the security concern. Providing security as a one-size-fits-all solution results in a system that is far too rigid to accommodate the needs of different application domains. Security mechanisms can depend on the hardware that is available and can be changed over time. Offering a system that can cope with such change without the need of major re-engineering is a major challenge. Moreover, not at all time the same security level has to be maintained. A system that can adapt its security mechanisms to the actual threat level can deliver better performance. In this paper, we provide an architecture for self-adapting the security concern to the actual context. Context is provided in terms of trust and threat values. Moreover, contextual information on resource consumption (e.g., memory and bandwidth) and system status (e.g., availability) can be provided.
自管理系统是越来越多的研究活动的焦点,因为它可以提供构建软件工件的更健壮的方法。在本文中,我们关注自管理系统以适应安全问题。将安全性作为一刀切的解决方案提供会导致系统过于僵化,无法适应不同应用程序领域的需求。安全机制可能取决于可用的硬件,并且可以随时间而更改。提供一个能够应付这种变化而不需要主要重新设计的系统是一个主要的挑战。此外,并不是在任何时候都必须保持相同的安全级别。能够根据实际威胁级别调整其安全机制的系统可以提供更好的性能。在本文中,我们提供了一种使安全关注自适应于实际环境的体系结构。上下文以信任值和威胁值的形式提供。此外,还可以提供有关资源消耗(例如,内存和带宽)和系统状态(例如,可用性)的上下文信息。
{"title":"An Architectural Approach for Self-Managing Security Services","authors":"G. Russello, Naranker Dulay","doi":"10.1109/WAINA.2009.48","DOIUrl":"https://doi.org/10.1109/WAINA.2009.48","url":null,"abstract":"Self-managing systems are the focus of an increasing research activity since can provide a more robust way of building software artifacts. In this paper, we focus on self-managing systems for adapting the security concern. Providing security as a one-size-fits-all solution results in a system that is far too rigid to accommodate the needs of different application domains. Security mechanisms can depend on the hardware that is available and can be changed over time. Offering a system that can cope with such change without the need of major re-engineering is a major challenge. Moreover, not at all time the same security level has to be maintained. A system that can adapt its security mechanisms to the actual threat level can deliver better performance. In this paper, we provide an architecture for self-adapting the security concern to the actual context. Context is provided in terms of trust and threat values. Moreover, contextual information on resource consumption (e.g., memory and bandwidth) and system status (e.g., availability) can be provided.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116284034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of the Student Refuge Information System Using IC Card Type Student Identification Cards 基于IC卡型学生证的学生庇护信息系统的开发
Hiroaki Yuze, Yuji Aota, T. Kawada
The disaster-prevention drill is held in University of Shizuoka every year. Although the refuge procedure of the disaster-prevention drill is very common, we are anxious about refuge people's verification work being insufficient. In this paper, we proposed the "student refuge information system" which solved the problem of the conventional refuge verification work. In order to verify the fundamental function, performance, and terminal form of this system, we developed the prototype system. The prototype system was used on trial in the disaster-prevention drill to evaluate the usefulness of the system. The usefulness of the prototype system became clear as a result of trial.
日本静冈大学每年都会举行防灾演习。虽然防灾演习的避难程序非常普遍,但我们担心避难人员的核查工作不足。本文提出了“学生避难信息系统”,解决了传统避难审核工作的问题。为了验证该系统的基本功能、性能和终端形式,我们开发了原型系统。原型系统在防灾演练中进行了试验,以评估系统的实用性。经过试验,原型系统的实用性变得清晰起来。
{"title":"Development of the Student Refuge Information System Using IC Card Type Student Identification Cards","authors":"Hiroaki Yuze, Yuji Aota, T. Kawada","doi":"10.1109/WAINA.2009.150","DOIUrl":"https://doi.org/10.1109/WAINA.2009.150","url":null,"abstract":"The disaster-prevention drill is held in University of Shizuoka every year. Although the refuge procedure of the disaster-prevention drill is very common, we are anxious about refuge people's verification work being insufficient. In this paper, we proposed the \"student refuge information system\" which solved the problem of the conventional refuge verification work. In order to verify the fundamental function, performance, and terminal form of this system, we developed the prototype system. The prototype system was used on trial in the disaster-prevention drill to evaluate the usefulness of the system. The usefulness of the prototype system became clear as a result of trial.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131814190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Clustering Method Based on Grid-Shaking 一种基于网格抖动的增强聚类方法
Jinbeom Kang, Joongmin Choi, Jaeyoung Yang
Clustering is an essential way to extract meaningful information from massive data without human intervention in the field of data mining. Clustering algorithms can be divided into four types: partitioning algorithms, hierarchical algorithms, grid-based algorithms, and locality-based algorithms. Each algorithm, however, has problems that are not easily solved. K-means, for example, suffer from setting up an initial centroid problem when distribution of data is not hyper-ellipsoid. Chain effect, outlier, and degree of density in data are problems occurring in other types of algorithms. To solve these problems, various kinds of algorithms were proposed. In this paper, we propose a novel grid-based clustering algorithm through building clusters in each cell and show how to solve the previously mentioned problems.
聚类是从海量数据中提取有意义信息而无需人工干预的重要方法。聚类算法可以分为四种类型:分区算法、分层算法、基于网格的算法和基于位置的算法。然而,每种算法都有不容易解决的问题。例如,当数据不是超椭球分布时,K-means会产生初始质心问题。链效应、离群值和数据密度是其他类型算法中出现的问题。为了解决这些问题,提出了各种各样的算法。在本文中,我们提出了一种新的基于网格的聚类算法,通过在每个单元中构建聚类来解决前面提到的问题。
{"title":"An Enhanced Clustering Method Based on Grid-Shaking","authors":"Jinbeom Kang, Joongmin Choi, Jaeyoung Yang","doi":"10.1109/WAINA.2009.100","DOIUrl":"https://doi.org/10.1109/WAINA.2009.100","url":null,"abstract":"Clustering is an essential way to extract meaningful information from massive data without human intervention in the field of data mining. Clustering algorithms can be divided into four types: partitioning algorithms, hierarchical algorithms, grid-based algorithms, and locality-based algorithms. Each algorithm, however, has problems that are not easily solved. K-means, for example, suffer from setting up an initial centroid problem when distribution of data is not hyper-ellipsoid. Chain effect, outlier, and degree of density in data are problems occurring in other types of algorithms. To solve these problems, various kinds of algorithms were proposed. In this paper, we propose a novel grid-based clustering algorithm through building clusters in each cell and show how to solve the previously mentioned problems.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design of Reduced Data Representation for Information Sharing in the Disaster-Affected Area 面向灾区信息共享的简化数据表示设计
Misako Urakami, K. Fujii, Mitsuhiro Kota, H. Matsuno
We have proposed the shared disaster information service system for exchanging automatic disaster information among all the shelters. However, it is necessary to accumulate much disaster information in the microcomputer which has restriction in data volume. Moreover, the disaster information must be smoothly transmitted in a comparatively low speed wireless network. In this paper, we propose the data format and conversion algorithm for changing disaster information compactly. Our proposal was verified using disaster information. It was shown that it is possible enough for our verification to exchange and share the disaster information accumulated in the microcomputer in the city with about 200,000 populations.
提出了一种灾害信息共享服务系统,实现各避难所之间的灾害信息自动交换。然而,由于数据量的限制,需要在微机中积累大量的灾害信息。此外,灾害信息必须在相对低速的无线网络中顺利传输。本文提出了一种数据格式和转换算法,以实现灾害信息的紧凑变化。我们的建议使用灾难信息进行了验证。结果表明,在这个人口约20万的城市中,将微机中积累的灾害信息进行交换和共享是完全有可能的,我们的核查工作是完全可行的。
{"title":"A Design of Reduced Data Representation for Information Sharing in the Disaster-Affected Area","authors":"Misako Urakami, K. Fujii, Mitsuhiro Kota, H. Matsuno","doi":"10.1109/WAINA.2009.177","DOIUrl":"https://doi.org/10.1109/WAINA.2009.177","url":null,"abstract":"We have proposed the shared disaster information service system for exchanging automatic disaster information among all the shelters. However, it is necessary to accumulate much disaster information in the microcomputer which has restriction in data volume. Moreover, the disaster information must be smoothly transmitted in a comparatively low speed wireless network. In this paper, we propose the data format and conversion algorithm for changing disaster information compactly. Our proposal was verified using disaster information. It was shown that it is possible enough for our verification to exchange and share the disaster information accumulated in the microcomputer in the city with about 200,000 populations.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Dynamic Size Distributed Program Image Cache for Wireless Sensor Networks 无线传感器网络的动态大小分布式程序图像缓存
J. Ellul, K. Martinez, D. D. Roure
Reprogramming node software over-the-air is an essential requirement in many wireless sensor network applications due to the inaccessibility of the deployed sensor nodes. Transmitting whole software images consumes a high amount of energy in proportion to updates, especially when they are small in size.  Incremental updates have addressed this; however introduce the potential of a sensor node becoming out of sync when it misses an update. In this paper we present a dynamic size distributed program image cache that provides increased efficiency in reprogramming out of sync nodes and multi-purpose wireless sensor networks.
由于部署的传感器节点无法访问,在许多无线传感器网络应用中,空中重新编程节点软件是一项基本要求。传输整个软件图像与更新成比例消耗大量的能量,特别是当它们很小的时候。增量更新已经解决了这个问题;然而,引入了传感器节点在错过更新时失去同步的可能性。在本文中,我们提出了一个动态大小的分布式程序图像缓存,它提供了更高的效率,重新编程不同步节点和多用途无线传感器网络。
{"title":"A Dynamic Size Distributed Program Image Cache for Wireless Sensor Networks","authors":"J. Ellul, K. Martinez, D. D. Roure","doi":"10.1109/WAINA.2009.195","DOIUrl":"https://doi.org/10.1109/WAINA.2009.195","url":null,"abstract":"Reprogramming node software over-the-air is an essential requirement in many wireless sensor network applications due to the inaccessibility of the deployed sensor nodes. Transmitting whole software images consumes a high amount of energy in proportion to updates, especially when they are small in size.  Incremental updates have addressed this; however introduce the potential of a sensor node becoming out of sync when it misses an update. In this paper we present a dynamic size distributed program image cache that provides increased efficiency in reprogramming out of sync nodes and multi-purpose wireless sensor networks.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133696229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Protection in Passive Network Monitoring: An Access Control Approach 被动网络监控中的隐私保护:一种访问控制方法
G. Lioudakis, Fotios Gogoulos, A. Antonakopoulou, D. Kaklamani, I. Venieris
"On the Internet, nobody knows you are a dog" according to the famous Pat Steiner cartoon in The New Yorker, which has been very frequently cited in order to emphasize the potential for anonymity and privacy that the Internet was supposed to offer. However, the reality seems to be rather different. Among the several threats to personal privacy caused by the emerging Information and Communication Technologies, activities related to passive network monitoring hold an outstanding position. This paper discusses from an access control point of view the issue of privacy protection regarding data originating from passive network monitoring. It proposes a semantic information model, along with the underlying enforcement framework, for the real-time determination of access control provisions as stem from the personal data protection legislation and depending on the particular characteristics of every request for monitoring data disclosure.
“在互联网上,没有人知道你是一条狗”,这是帕特·斯坦纳(Pat Steiner)在《纽约客》(the New Yorker)上发表的著名漫画中的一句话。为了强调互联网本应提供的匿名和隐私的潜力,这句话被经常引用。然而,现实似乎大不相同。在新兴的信息通信技术对个人隐私造成的诸多威胁中,与被动网络监控相关的活动占有突出的地位。本文从访问控制的角度讨论了被动网络监控数据的隐私保护问题。它提出了一个语义信息模型,以及基本的执行框架,用于实时确定访问控制条款,这些条款源于个人数据保护立法,并取决于每个监测数据披露请求的特定特征。
{"title":"Privacy Protection in Passive Network Monitoring: An Access Control Approach","authors":"G. Lioudakis, Fotios Gogoulos, A. Antonakopoulou, D. Kaklamani, I. Venieris","doi":"10.1109/WAINA.2009.158","DOIUrl":"https://doi.org/10.1109/WAINA.2009.158","url":null,"abstract":"\"On the Internet, nobody knows you are a dog\" according to the famous Pat Steiner cartoon in The New Yorker, which has been very frequently cited in order to emphasize the potential for anonymity and privacy that the Internet was supposed to offer. However, the reality seems to be rather different. Among the several threats to personal privacy caused by the emerging Information and Communication Technologies, activities related to passive network monitoring hold an outstanding position. This paper discusses from an access control point of view the issue of privacy protection regarding data originating from passive network monitoring. It proposes a semantic information model, along with the underlying enforcement framework, for the real-time determination of access control provisions as stem from the personal data protection legislation and depending on the particular characteristics of every request for monitoring data disclosure.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132761114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Performance Analysis of EAP Methods Used as GDOI Phase 1 for IP Multicast on Airplanes 平面IP组播GDOI第一阶段EAP方法性能分析
P. Pillai, Yim-Fun Hu
IP multicast is a bandwidth efficient technology that can be utilised for one-to-many or many-to-many communications via satellite for aeronautical passenger communication. An AAA framework for multicast services was presented in [1]. The framework combines the GDOI multicast security protocol with AAA functionality enabling network providers to control access to multicast sessions and account the usage of the multicast services. The GDOI protocol is a "phase 2" protocol which must be protected by a "phase 1" protocol that provides a mechanism for peer authentication and confidentiality and message integrity for GDOI messages. This paper analyses the use of different EAP methods as phase 1 for GDOI to provide AAA for aeronautical passenger multicast communication.
IP多播是一种带宽高效的技术,可用于航空旅客通信的一对多或多对多卫星通信。在[1]中提出了一种组播服务的AAA框架。该框架将GDOI多播安全协议与AAA功能结合起来,使网络提供商能够控制对多播会话的访问,并说明多播服务的使用情况。GDOI协议是“第二阶段”协议,必须受到“第一阶段”协议的保护,该协议为GDOI消息提供了对等认证、机密性和消息完整性机制。本文分析了采用不同的EAP方法作为GDOI的第一阶段,为航空旅客组播通信提供AAA。
{"title":"Performance Analysis of EAP Methods Used as GDOI Phase 1 for IP Multicast on Airplanes","authors":"P. Pillai, Yim-Fun Hu","doi":"10.1109/WAINA.2009.106","DOIUrl":"https://doi.org/10.1109/WAINA.2009.106","url":null,"abstract":"IP multicast is a bandwidth efficient technology that can be utilised for one-to-many or many-to-many communications via satellite for aeronautical passenger communication. An AAA framework for multicast services was presented in [1]. The framework combines the GDOI multicast security protocol with AAA functionality enabling network providers to control access to multicast sessions and account the usage of the multicast services. The GDOI protocol is a \"phase 2\" protocol which must be protected by a \"phase 1\" protocol that provides a mechanism for peer authentication and confidentiality and message integrity for GDOI messages. This paper analyses the use of different EAP methods as phase 1 for GDOI to provide AAA for aeronautical passenger multicast communication.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134123975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Small-World Model for Amino Acid Interaction Networks 氨基酸相互作用网络的小世界模型
O. Gaci, Stefan Balev
In this paper we introduce the notion of protein interaction network. This is a graph whose verticesare the protein's amino acids and whose edges are the interactions between them. Using a graph theory approach, we identify a number of properties of these networks. We compare them to the general small-world network model and we analyze their hierarchical structure.
本文介绍了蛋白质相互作用网络的概念。这张图的顶点是蛋白质的氨基酸,边缘是它们之间的相互作用。使用图论方法,我们确定了这些网络的一些性质。我们将它们与一般的小世界网络模型进行了比较,并分析了它们的层次结构。
{"title":"The Small-World Model for Amino Acid Interaction Networks","authors":"O. Gaci, Stefan Balev","doi":"10.1109/WAINA.2009.41","DOIUrl":"https://doi.org/10.1109/WAINA.2009.41","url":null,"abstract":"In this paper we introduce the notion of protein interaction network. This is a graph whose verticesare the protein's amino acids and whose edges are the interactions between them. Using a graph theory approach, we identify a number of properties of these networks. We compare them to the general small-world network model and we analyze their hierarchical structure.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2009 International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1