Claudius Stern, Philipp Adelt, Volker Krummel, Marcel R. Ackermann
Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of business communications. In this paper we consider the problem of getting reliable evidence of the integrity and existence of some data from a storage service even if the data is not available for reference anymore and even if the partner may be untrustworthy or malicious. Several solutions are presented, among them the first cryptographically secure approach providing evidence of the integrity of remotely stored data, without owning or transferring the complete original data.
{"title":"Reliable Evidence of Data Integrity from an Untrusted Storage Service","authors":"Claudius Stern, Philipp Adelt, Volker Krummel, Marcel R. Ackermann","doi":"10.1109/ICNS.2008.28","DOIUrl":"https://doi.org/10.1109/ICNS.2008.28","url":null,"abstract":"Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of business communications. In this paper we consider the problem of getting reliable evidence of the integrity and existence of some data from a storage service even if the data is not available for reference anymore and even if the partner may be untrustworthy or malicious. Several solutions are presented, among them the first cryptographically secure approach providing evidence of the integrity of remotely stored data, without owning or transferring the complete original data.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129985274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Guo, Xingwei Wang, Jin Cao, Le Min Li, Ting Yang, Fei Yang
This paper proposes a new heuristic algorithm called Traffic recovery time Constrained Shared Sub-Path Protection (TC_SSPP) to provide survivability in WDM networks with Shared-Risk-Link-Group (SRLG). By properly setting the delay parameter of each link and running the Delay Constrained Shortest Path Algorithm (DCSPA) to compute the backup sub-paths, TC_SSPP can effectively guarantee the traffic recovery time for connection requests. Simulation results show that TC_SSPP outperforms the traditional algorithms.
{"title":"Shared Sub-Path Protection Algorithm with Recovery Time Constraint in WDM Networks","authors":"Lei Guo, Xingwei Wang, Jin Cao, Le Min Li, Ting Yang, Fei Yang","doi":"10.1109/ICNS.2008.12","DOIUrl":"https://doi.org/10.1109/ICNS.2008.12","url":null,"abstract":"This paper proposes a new heuristic algorithm called Traffic recovery time Constrained Shared Sub-Path Protection (TC_SSPP) to provide survivability in WDM networks with Shared-Risk-Link-Group (SRLG). By properly setting the delay parameter of each link and running the Delay Constrained Shortest Path Algorithm (DCSPA) to compute the backup sub-paths, TC_SSPP can effectively guarantee the traffic recovery time for connection requests. Simulation results show that TC_SSPP outperforms the traditional algorithms.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116679353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Dandashi, A. Griggs, J. Higginson, J. Hughes, Wilson Narvaez, M. Sabbouh, S. Semy, B. Yost
Many service oriented architecture (SOA) approaches in use today presume the consistent availability of reliable networks and limitless resources. For some department of defense (DoD) and other government users, operating at the tactical edge, who may be disadvantaged in terms of network and resource availability, the current methods of development may not provide them with reliable capability. In this paper, we propose a method for capturing design patterns for the disadvantaged user using the common vocabulary of a characterization framework. We also provide a set of design patterns that minimize technical constraints, and derive the infrastructure requirements needed to implement a selected design pattern.
{"title":"Characterization Framework and Design Patterns for the Disadvantaged User","authors":"F. Dandashi, A. Griggs, J. Higginson, J. Hughes, Wilson Narvaez, M. Sabbouh, S. Semy, B. Yost","doi":"10.1109/ICNS.2008.11","DOIUrl":"https://doi.org/10.1109/ICNS.2008.11","url":null,"abstract":"Many service oriented architecture (SOA) approaches in use today presume the consistent availability of reliable networks and limitless resources. For some department of defense (DoD) and other government users, operating at the tactical edge, who may be disadvantaged in terms of network and resource availability, the current methods of development may not provide them with reliable capability. In this paper, we propose a method for capturing design patterns for the disadvantaged user using the common vocabulary of a characterization framework. We also provide a set of design patterns that minimize technical constraints, and derive the infrastructure requirements needed to implement a selected design pattern.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, P. F. Rosa
The recent growth of peer-to-peer traffic and the popularity of streaming video is a cause for possible instability of the networks because most of these services run over UDP, without any mechanism for congestion control. Moreover, the adaptive features of peer-to-peer traffic may lead a misuse of the classical QoS rules legitimately applied to end-user applications. This paper proposes the usage of the partial reliability extension of the stream control transmission protocol (PR-SCTP) as the unique transport entity in an IP multimedia subsystem (IMS) network control and access layer, to mitigate situations of traffic congestion. The IMS is a 3GPP standardized approach that enables convergence of data, voice, video and mobile network technology over an IP-based network. Session initiation protocol (SIP) and session description protocol (SDP) are the groundwork to support the convergence proposed by IMS. PR-SCTP provides several features to improve the transport of SIP between the IMS entities and after introducing the motivation to this proposal, we discuss and compare the benefits and drawbacks of using PR-SCTP instead of TCP or UDP to transport SIP.
{"title":"An IMS Control and Access Layer PR-SCTP Based Network","authors":"Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, P. F. Rosa","doi":"10.1109/ICNS.2008.33","DOIUrl":"https://doi.org/10.1109/ICNS.2008.33","url":null,"abstract":"The recent growth of peer-to-peer traffic and the popularity of streaming video is a cause for possible instability of the networks because most of these services run over UDP, without any mechanism for congestion control. Moreover, the adaptive features of peer-to-peer traffic may lead a misuse of the classical QoS rules legitimately applied to end-user applications. This paper proposes the usage of the partial reliability extension of the stream control transmission protocol (PR-SCTP) as the unique transport entity in an IP multimedia subsystem (IMS) network control and access layer, to mitigate situations of traffic congestion. The IMS is a 3GPP standardized approach that enables convergence of data, voice, video and mobile network technology over an IP-based network. Session initiation protocol (SIP) and session description protocol (SDP) are the groundwork to support the convergence proposed by IMS. PR-SCTP provides several features to improve the transport of SIP between the IMS entities and after introducing the motivation to this proposal, we discuss and compare the benefits and drawbacks of using PR-SCTP instead of TCP or UDP to transport SIP.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121428248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patryk Chamuczynski, O. Alfandi, Constantin Werner, Henrik Brosenne, D. Hogrefe
To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuous connectivity, one prerequisite is the incorporation of seamless handover. The make-before-break approach facilitates seamless handover by means of executing an authentication to a new domain simultaneously while maintaining connection to current domain. The connection is only terminated after the handover to the new domain is successfully completed. However, the duration of the authentication is critical for the handover process because if the mobile nodes move very fast the remaining amount of time of connection to the current domain can become very limited. Therefore, it is a vital issue for seamless mobility to study the authentication performance of a pre-authentication framework. In this paper we model an authentication infrastructure and consider a scenario in which a high number of nodes handover to a new administration domain. The simulation of the authentication process shows the relation between authentication performance and traffic intensity. Furthermore we identify some critical points and potential bottlenecks of this pre-authentication approach.
{"title":"Performance Study of PANA Pre-authentication for Interdomain Handover","authors":"Patryk Chamuczynski, O. Alfandi, Constantin Werner, Henrik Brosenne, D. Hogrefe","doi":"10.1109/ICNS.2008.23","DOIUrl":"https://doi.org/10.1109/ICNS.2008.23","url":null,"abstract":"To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuous connectivity, one prerequisite is the incorporation of seamless handover. The make-before-break approach facilitates seamless handover by means of executing an authentication to a new domain simultaneously while maintaining connection to current domain. The connection is only terminated after the handover to the new domain is successfully completed. However, the duration of the authentication is critical for the handover process because if the mobile nodes move very fast the remaining amount of time of connection to the current domain can become very limited. Therefore, it is a vital issue for seamless mobility to study the authentication performance of a pre-authentication framework. In this paper we model an authentication infrastructure and consider a scenario in which a high number of nodes handover to a new administration domain. The simulation of the authentication process shows the relation between authentication performance and traffic intensity. Furthermore we identify some critical points and potential bottlenecks of this pre-authentication approach.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116977731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Designing a network with optimal deployment cost and maximum reliability considerations is a hard problem, especially when the all-terminal reliability is required. For efficiently finding out an acceptable solution, Genetic Algorithms (GAs) have been widely applied to solve this problem. In these GAs, the reliability values could be calculated in their objective functions. In year 2002, an extended network reliability model was proposed which considers the connection important level between each pair of nodes. This paper proposes an approximation algorithm based on Monte Carlo simulation for the new network reliability model. This approximation algorithm can be integrated into GAs to solve the optimal cost reliable network design problem under the extended model.
{"title":"A Monte Carlo Method for Estimating the Extended All-Terminal Reliability","authors":"Shiang-Ming Huang, Quincy Wu, Shi-Chun Tsai","doi":"10.1109/ICNS.2008.29","DOIUrl":"https://doi.org/10.1109/ICNS.2008.29","url":null,"abstract":"Designing a network with optimal deployment cost and maximum reliability considerations is a hard problem, especially when the all-terminal reliability is required. For efficiently finding out an acceptable solution, Genetic Algorithms (GAs) have been widely applied to solve this problem. In these GAs, the reliability values could be calculated in their objective functions. In year 2002, an extended network reliability model was proposed which considers the connection important level between each pair of nodes. This paper proposes an approximation algorithm based on Monte Carlo simulation for the new network reliability model. This approximation algorithm can be integrated into GAs to solve the optimal cost reliable network design problem under the extended model.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116701911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Soriano, D. Lizcano, J. Hierro, M. Reyes, C. Schroth, T. Janner
Considered as enablers of seamless application-to- application integration both within company boundaries and on a global scale, Web Services-based SOAs have traditionally focused on automating service-to-service collaboration. However, they have never featured a "face " to human users. This gap between human users and services still prevents enterprises from realizing how innovations at the SOA front-end help to make people more productive. And, ultimately, it hinders the emergence of a real Web of Services driven by a global, user-centric SOA. In this paper, we revisit the notion of SOA and analyze its major shortcomings with regard to the emergence of a Web of Services enhancing user-service interaction and increased service usability. We then elaborate on novel, currently emerging technologies that facilitate the establishment of the global mesh of interoperable user-centric services. A novel platform architecture is presented that builds on all the key technical enablers.
作为在公司边界和全球范围内实现应用程序到应用程序无缝集成的推动者,基于Web服务的soa传统上专注于自动化服务到服务协作。然而,它们从未向人类用户展示过一张“脸”。人类用户和服务之间的这种差距仍然阻碍企业认识到SOA前端的创新如何帮助人们提高工作效率。而且,最终,它阻碍了由全局的、以用户为中心的SOA驱动的真正的服务Web的出现。在本文中,我们将重新审视SOA的概念,并分析其主要缺点,因为Web of Services的出现增强了用户-服务交互并提高了服务可用性。然后,我们详细介绍了当前新兴的新技术,这些技术有助于建立可互操作的以用户为中心的服务的全球网格。提出了一种基于所有关键技术支持因素的新型平台体系结构。
{"title":"Enhancing User-Service Interaction through a Global User-Centric Approach to SOA","authors":"J. Soriano, D. Lizcano, J. Hierro, M. Reyes, C. Schroth, T. Janner","doi":"10.1109/ICNS.2008.37","DOIUrl":"https://doi.org/10.1109/ICNS.2008.37","url":null,"abstract":"Considered as enablers of seamless application-to- application integration both within company boundaries and on a global scale, Web Services-based SOAs have traditionally focused on automating service-to-service collaboration. However, they have never featured a \"face \" to human users. This gap between human users and services still prevents enterprises from realizing how innovations at the SOA front-end help to make people more productive. And, ultimately, it hinders the emergence of a real Web of Services driven by a global, user-centric SOA. In this paper, we revisit the notion of SOA and analyze its major shortcomings with regard to the emergence of a Web of Services enhancing user-service interaction and increased service usability. We then elaborate on novel, currently emerging technologies that facilitate the establishment of the global mesh of interoperable user-centric services. A novel platform architecture is presented that builds on all the key technical enablers.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114362613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of new mobile services can benefit from adopting XML Web services technologies, because this can dramatically reduce the time to market for many types of mobile services. However, it is often believed that XML Web services will become too large a bottleneck in service performance, rendering the service unusable, as well as it can compromise service usage due to lack of security features. This paper provides a thorough study of these topics, i.e., a study of the typical performance of mobile services built on top of XML Web services, how security features can be introduced for these services and how these security features influence on the performance of services. The results of this paper should apply to any mobile services implementation based on XML Web services technologies.
{"title":"Security and Performance of Mobile XML Web Services","authors":"Thao Nguyen, I. Jørstad, D. Thanh","doi":"10.1109/ICNS.2008.41","DOIUrl":"https://doi.org/10.1109/ICNS.2008.41","url":null,"abstract":"The development of new mobile services can benefit from adopting XML Web services technologies, because this can dramatically reduce the time to market for many types of mobile services. However, it is often believed that XML Web services will become too large a bottleneck in service performance, rendering the service unusable, as well as it can compromise service usage due to lack of security features. This paper provides a thorough study of these topics, i.e., a study of the typical performance of mobile services built on top of XML Web services, how security features can be introduced for these services and how these security features influence on the performance of services. The results of this paper should apply to any mobile services implementation based on XML Web services technologies.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quality of Service impairments in wireless and wired access networks for IP-based next generation networks (NGNs) differ fundamentally from the ones which we typically encounter in core networks. Examples include but are not limited to high delay, low bandwidth, and high jitter. Even though most NGN architectures claim to be access-agnostic, applications deployed on NGNs have requirements which may not be met by specific access technologies. This raises the need to test NGN application prototypes on user acceptance for a huge number of possible access technology combinations. Unfortunately, tests relying on real access network implementations are expensive and time-consuming while simulation at physical or logical link layer are subject to complex parameter configuration. In this paper we present a distinct approach which bases on the sound theoretical background of the IETF IP Performance Metric (IPPM) framework. We argue that careful analysis of performance metrics in existing public access networks can capture access network properties which are sufficiently accurate to model "typical" access links at IP-layer level using either emulation or simulation. We propose a three-step model which starts with metric and methodology selection, continues with parameter acquisition by means of measurements in existing access networks, and ends with emulation or simulation of this access network. The goal of our process is to provide NGN application developers with means to automatically test their applications from the very beginning on the compatibility with various access network technologies, covering both, signaling and data streaming aspects of access networks. We illustrate the procedure using performance measurement results of a public UMTS Release 5 network and UMTS access network emulation by an extended open-source delay emulator.
{"title":"A Generic Approach to Access Network Modeling for Next Generation Network Applications","authors":"J. Fabini, P. Reichl, A. Poropatich","doi":"10.1109/ICNS.2008.47","DOIUrl":"https://doi.org/10.1109/ICNS.2008.47","url":null,"abstract":"Quality of Service impairments in wireless and wired access networks for IP-based next generation networks (NGNs) differ fundamentally from the ones which we typically encounter in core networks. Examples include but are not limited to high delay, low bandwidth, and high jitter. Even though most NGN architectures claim to be access-agnostic, applications deployed on NGNs have requirements which may not be met by specific access technologies. This raises the need to test NGN application prototypes on user acceptance for a huge number of possible access technology combinations. Unfortunately, tests relying on real access network implementations are expensive and time-consuming while simulation at physical or logical link layer are subject to complex parameter configuration. In this paper we present a distinct approach which bases on the sound theoretical background of the IETF IP Performance Metric (IPPM) framework. We argue that careful analysis of performance metrics in existing public access networks can capture access network properties which are sufficiently accurate to model \"typical\" access links at IP-layer level using either emulation or simulation. We propose a three-step model which starts with metric and methodology selection, continues with parameter acquisition by means of measurements in existing access networks, and ends with emulation or simulation of this access network. The goal of our process is to provide NGN application developers with means to automatically test their applications from the very beginning on the compatibility with various access network technologies, covering both, signaling and data streaming aspects of access networks. We illustrate the procedure using performance measurement results of a public UMTS Release 5 network and UMTS access network emulation by an extended open-source delay emulator.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134224931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As communication is making the whole world a global village, there seems to be tremendous pressure on the service providers in this field. The greatest demand is for Quality Of Service (QoS) wherein the most important role is played by Interference. There are numerous parameters leading to interference in both wired and wireless communication. In this paper an attempt is made to minimize interference in wired and wireless communication. In wired, an analysis of All Optical Network is carried out whereas in wireless networks, overall interference is reduced using fundamental approach.
{"title":"Handling of Interference Using Power Penalty Analysis and Frequency Assignment Problem Approach in Communication","authors":"A. Kulkarni, B. Ambudkar","doi":"10.1109/ICNS.2008.40","DOIUrl":"https://doi.org/10.1109/ICNS.2008.40","url":null,"abstract":"As communication is making the whole world a global village, there seems to be tremendous pressure on the service providers in this field. The greatest demand is for Quality Of Service (QoS) wherein the most important role is played by Interference. There are numerous parameters leading to interference in both wired and wireless communication. In this paper an attempt is made to minimize interference in wired and wireless communication. In wired, an analysis of All Optical Network is carried out whereas in wireless networks, overall interference is reduced using fundamental approach.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}