首页 > 最新文献

Proceedings of the 8th Asia-Pacific Symposium on Internetware最新文献

英文 中文
Protection of users' data confidentiality in cloud computing 云计算中用户数据保密性的保护
Pub Date : 2010-11-03 DOI: 10.1145/2020723.2020734
S. Yau, Ho G. An
Current cloud computing systems pose serious limitation to protecting users' data confidentiality. Since users' sensitive data is presented in unencrypted forms to remote machines owned and operated by third party service providers, the risks of unauthorized disclosure of the users' sensitive data by service providers may be quite high. There are many techniques for protecting users' data from outside attackers, but currently no effective way is available for protecting users' sensitive data from service providers in cloud computing. In this paper, an approach is presented to protecting the confidentiality of users' data from service providers, and ensures service providers cannot collect users' confidential data while the data is processed and stored in cloud computing systems. Our approach has three major aspects: (1) separating software service providers and infrastructure service providers in cloud computing, (2) hiding information about the owners of data, and (3) data obfuscation. An example to show how our approach can protect the confidentiality of users' data from service providers in cloud computing is given.
当前的云计算系统在保护用户数据机密性方面存在严重的局限性。由于用户的敏感数据以未加密的形式呈现给第三方服务提供商拥有和操作的远程机器,服务提供商未经授权泄露用户敏感数据的风险可能相当高。保护用户数据免受外部攻击的技术有很多,但目前还没有有效的方法来保护云计算中用户的敏感数据免受服务提供商的攻击。本文提出了一种保护用户数据对服务提供商的机密性的方法,确保服务提供商在云计算系统中处理和存储用户的机密数据时不会收集用户的机密数据。我们的方法有三个主要方面:(1)在云计算中分离软件服务提供商和基础设施服务提供商,(2)隐藏有关数据所有者的信息,以及(3)数据混淆。给出了一个示例,以展示我们的方法如何在云计算中保护用户数据的机密性不受服务提供商的侵犯。
{"title":"Protection of users' data confidentiality in cloud computing","authors":"S. Yau, Ho G. An","doi":"10.1145/2020723.2020734","DOIUrl":"https://doi.org/10.1145/2020723.2020734","url":null,"abstract":"Current cloud computing systems pose serious limitation to protecting users' data confidentiality. Since users' sensitive data is presented in unencrypted forms to remote machines owned and operated by third party service providers, the risks of unauthorized disclosure of the users' sensitive data by service providers may be quite high. There are many techniques for protecting users' data from outside attackers, but currently no effective way is available for protecting users' sensitive data from service providers in cloud computing. In this paper, an approach is presented to protecting the confidentiality of users' data from service providers, and ensures service providers cannot collect users' confidential data while the data is processed and stored in cloud computing systems. Our approach has three major aspects: (1) separating software service providers and infrastructure service providers in cloud computing, (2) hiding information about the owners of data, and (3) data obfuscation. An example to show how our approach can protect the confidentiality of users' data from service providers in cloud computing is given.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77543741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A binary graph reduction algorithm for multi-constrained QoS routing 多约束QoS路由的二值图约简算法
Pub Date : 2010-11-03 DOI: 10.1145/2020723.2020725
S. Zhang, Zhuzhong Qian, Sanglu Lu, Daoxu Chen
A lot of network services and applications are being designed to support quality-of-service (QoS) routing. One of the key problems is to find a feasible path that satisfies multiple QoS requirements, i.e., Multi-Constrained Path (MCP) problem which is known to be NP-complete. Many heuristic and approximation algorithms have been proposed to solve this problem. However, most of them converted it into the classic shortest path problem by transforming multiple QoS weights into single weight. In this paper, we propose a binary graph reduction (BGR) algorithm to convert network graph into a simplified graph by removing redundant edges before constructing a routing path. BGR improves system performance from two aspects: i) BGR decreases the decision-making time, which then decreases the delay of end users; ii) BGR removes some abnormal anti-heuristic redundant edges from network graph, so that the actual routing algorithm could get a better result. We use a multimedia delivery system to illustrate these advantages in this paper. Simulation results also approve the efficiency of the proposed BGR algorithm.
许多网络服务和应用程序都被设计为支持服务质量(QoS)路由。其中一个关键问题是如何找到一条满足多个QoS需求的可行路径,即多约束路径(Multi-Constrained path, MCP)问题,即np完全问题。许多启发式和近似算法被提出来解决这个问题。然而,它们大多将多个QoS权值转化为单个权值,将其转化为经典的最短路径问题。本文提出了一种二值图约简(BGR)算法,通过在构造路由路径之前去除冗余边,将网络图转化为简化图。BGR从两个方面提高了系统性能:1)BGR减少了决策时间,从而减少了最终用户的延迟;ii) BGR从网络图中去除了一些异常的反启发式冗余边,从而使实际的路由算法得到更好的结果。本文用多媒体传输系统来说明这些优点。仿真结果也验证了所提BGR算法的有效性。
{"title":"A binary graph reduction algorithm for multi-constrained QoS routing","authors":"S. Zhang, Zhuzhong Qian, Sanglu Lu, Daoxu Chen","doi":"10.1145/2020723.2020725","DOIUrl":"https://doi.org/10.1145/2020723.2020725","url":null,"abstract":"A lot of network services and applications are being designed to support quality-of-service (QoS) routing. One of the key problems is to find a feasible path that satisfies multiple QoS requirements, i.e., Multi-Constrained Path (MCP) problem which is known to be NP-complete. Many heuristic and approximation algorithms have been proposed to solve this problem. However, most of them converted it into the classic shortest path problem by transforming multiple QoS weights into single weight. In this paper, we propose a binary graph reduction (BGR) algorithm to convert network graph into a simplified graph by removing redundant edges before constructing a routing path. BGR improves system performance from two aspects: i) BGR decreases the decision-making time, which then decreases the delay of end users; ii) BGR removes some abnormal anti-heuristic redundant edges from network graph, so that the actual routing algorithm could get a better result. We use a multimedia delivery system to illustrate these advantages in this paper. Simulation results also approve the efficiency of the proposed BGR algorithm.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83996688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A collaborative management as a service framework for managing Internetware systems 用于管理互联网软件系统的协同管理服务框架
Pub Date : 2009-10-17 DOI: 10.1145/1640206.1640218
Tiancheng Liu, Ying Li, Xinhui Li
The openness, heterogeneity, dynamism and autonomy characteristics of Internetware bring challenges to the management. In this paper, we introduce a web-delivered management service framework to manage Internetware systems. Through this framework, the Internetware systems can be managed centrally, and management functions can be easily added and applied by publishing and subscribing management services. The key innovations of this framework are: using an abstract managed object model to describe the units to be managed and their relationships, and every management function is manipulated as a service which can be further composed into processes. The benefits are management services and processes can be published and subscribed by administrators and domain experts, and the services can be delivered remotely. Both the management service and the process can be reused thus the total management cost can be reduced.
互联网软件的开放性、异质性、动态性和自主性给管理带来了挑战。在本文中,我们介绍了一个web交付的管理服务框架来管理互联网软件系统。通过这个框架,可以对互联网系统进行集中管理,通过发布和订阅管理服务,可以方便地增加和应用管理功能。该框架的主要创新点是:使用抽象的被管理对象模型来描述被管理的单元及其关系,并且每个管理功能都作为一个服务来操作,该服务可以进一步组成流程。其好处是管理服务和流程可以由管理员和领域专家发布和订阅,并且服务可以远程交付。管理服务和流程都可以重用,从而降低了总管理成本。
{"title":"A collaborative management as a service framework for managing Internetware systems","authors":"Tiancheng Liu, Ying Li, Xinhui Li","doi":"10.1145/1640206.1640218","DOIUrl":"https://doi.org/10.1145/1640206.1640218","url":null,"abstract":"The openness, heterogeneity, dynamism and autonomy characteristics of Internetware bring challenges to the management. In this paper, we introduce a web-delivered management service framework to manage Internetware systems. Through this framework, the Internetware systems can be managed centrally, and management functions can be easily added and applied by publishing and subscribing management services. The key innovations of this framework are: using an abstract managed object model to describe the units to be managed and their relationships, and every management function is manipulated as a service which can be further composed into processes. The benefits are management services and processes can be published and subscribed by administrators and domain experts, and the services can be delivered remotely. Both the management service and the process can be reused thus the total management cost can be reduced.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77346690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Service-oriented rich client applications supported by Internetware browser middleware internet浏览器中间件支持的面向服务的富客户端应用程序
Pub Date : 2009-10-17 DOI: 10.1145/1640206.1640227
Qi Zhao, Gang Huang, Hong Mei
Since many web sites provide their own services and a web browser becomes a rich client platform, a new type of web application that is constructed by assembling web-delivered services in web browser, called Service-Oriented Rich Client (SoRC), emerges. Typical SoRC applications include web OSes and mashups. Due to the increasing complexity of SoRC, we propose a new type of middleware, which is embedded in web browsers and encapsulates reusable solutions for common problems of SoRC, including a container for component instances, a set of mechanisms for interactions within the browser, between the browser and server. Different SoRC applications can be constructed easily in high quality based on this middleware. We implement a prototype of the Internetware browser middleware, and then build two SoRC applications based on this prototype: 1) a web-based BPEL editor, iServiceStudio; 2) a mashup environment, iMashup.
由于许多网站提供自己的服务,而web浏览器成为富客户端平台,一种通过在web浏览器中组装web交付的服务来构建的新型web应用程序应运而生,称为面向服务的富客户端(Service-Oriented rich client, SoRC)。典型的SoRC应用程序包括web操作系统和mashup。由于SoRC越来越复杂,我们提出了一种新型的中间件,它嵌入到web浏览器中,封装了SoRC常见问题的可重用解决方案,包括组件实例的容器,一套用于浏览器内、浏览器和服务器之间交互的机制。基于此中间件可以轻松地以高质量构建不同的SoRC应用程序。我们实现了一个internet浏览器中间件的原型,然后基于这个原型构建了两个SoRC应用程序:1)基于web的BPEL编辑器iServiceStudio;2)一个混搭环境,iMashup。
{"title":"Service-oriented rich client applications supported by Internetware browser middleware","authors":"Qi Zhao, Gang Huang, Hong Mei","doi":"10.1145/1640206.1640227","DOIUrl":"https://doi.org/10.1145/1640206.1640227","url":null,"abstract":"Since many web sites provide their own services and a web browser becomes a rich client platform, a new type of web application that is constructed by assembling web-delivered services in web browser, called Service-Oriented Rich Client (SoRC), emerges. Typical SoRC applications include web OSes and mashups. Due to the increasing complexity of SoRC, we propose a new type of middleware, which is embedded in web browsers and encapsulates reusable solutions for common problems of SoRC, including a container for component instances, a set of mechanisms for interactions within the browser, between the browser and server. Different SoRC applications can be constructed easily in high quality based on this middleware. We implement a prototype of the Internetware browser middleware, and then build two SoRC applications based on this prototype: 1) a web-based BPEL editor, iServiceStudio; 2) a mashup environment, iMashup.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80052977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards runtime optimization of software quality based on feedback control theory 基于反馈控制理论的软件质量运行时优化研究
Pub Date : 2009-10-17 DOI: 10.1145/1640206.1640216
Bihuan Chen, Xin Peng, Wenyun Zhao
The increasingly complex environments in which software systems are running today have made runtime software quality unstable and hardly in an optimal state, especially for those systems in open and dynamic environments, e.g. Internetware. In this paper, we explore the effectiveness of software cybernetics and feedback control theory in runtime software quality optimization. We propose a method of runtime quality optimization by using feedback control theory. Specially, we consider the problem of runtime optimization for a specific quality attribute, namely throughput, for Web-based systems. We design a double-layer feedback control model for the problem and implement the runtime optimization control method. In the method, runtime feedbacks are collected and used by the control model to adjust related control parameters. The experimental study has demonstrated the effectiveness of software cybernetics and feedback control theory in runtime quality optimization.
当今软件系统运行的环境越来越复杂,使得运行时软件质量不稳定,很难处于最佳状态,特别是对于那些处于开放和动态环境中的系统,例如互联网。本文探讨了软件控制论和反馈控制理论在运行时软件质量优化中的有效性。提出了一种基于反馈控制理论的运行质量优化方法。特别地,我们考虑基于web系统的特定质量属性(即吞吐量)的运行时优化问题。针对该问题设计了双层反馈控制模型,实现了运行时优化控制方法。在该方法中,控制模型收集运行时反馈并利用这些反馈来调整相关的控制参数。实验研究证明了软件控制论和反馈控制理论在运行时质量优化中的有效性。
{"title":"Towards runtime optimization of software quality based on feedback control theory","authors":"Bihuan Chen, Xin Peng, Wenyun Zhao","doi":"10.1145/1640206.1640216","DOIUrl":"https://doi.org/10.1145/1640206.1640216","url":null,"abstract":"The increasingly complex environments in which software systems are running today have made runtime software quality unstable and hardly in an optimal state, especially for those systems in open and dynamic environments, e.g. Internetware. In this paper, we explore the effectiveness of software cybernetics and feedback control theory in runtime software quality optimization. We propose a method of runtime quality optimization by using feedback control theory. Specially, we consider the problem of runtime optimization for a specific quality attribute, namely throughput, for Web-based systems. We design a double-layer feedback control model for the problem and implement the runtime optimization control method. In the method, runtime feedbacks are collected and used by the control model to adjust related control parameters. The experimental study has demonstrated the effectiveness of software cybernetics and feedback control theory in runtime quality optimization.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79373639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Trusted resource dissemination in Internetware systems 互联网系统中的可信资源传播
Pub Date : 2009-10-17 DOI: 10.1145/1640206.1640223
Zude Li, Xiaojun Ye, Jianmin Wang
Trusted resource dissemination over Internet is still an open problem. However, it is crucial to the success of Internet-based or Internetware systems. We propose an approach that supports trusted resource dissemination between Internetware nodes. In this paper, we focus on an evidence-based trustworthiness-assurance mechanism in the approach. An architecture and a protocol that enforces this approach in Internetware systems are also described.
可信资源在Internet上的传播仍然是一个悬而未决的问题。然而,它对基于互联网或互联网软件系统的成功至关重要。我们提出了一种支持可信资源在互联网节点间传播的方法。在本文中,我们重点研究了一种基于证据的可信保证机制。还描述了在互联网系统中实施这种方法的体系结构和协议。
{"title":"Trusted resource dissemination in Internetware systems","authors":"Zude Li, Xiaojun Ye, Jianmin Wang","doi":"10.1145/1640206.1640223","DOIUrl":"https://doi.org/10.1145/1640206.1640223","url":null,"abstract":"Trusted resource dissemination over Internet is still an open problem. However, it is crucial to the success of Internet-based or Internetware systems. We propose an approach that supports trusted resource dissemination between Internetware nodes. In this paper, we focus on an evidence-based trustworthiness-assurance mechanism in the approach. An architecture and a protocol that enforces this approach in Internetware systems are also described.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78001723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A problem-driven scenario-based approach to collaborative requirement elicitation 一个问题驱动的基于场景的协作需求引出方法
Pub Date : 2009-10-17 DOI: 10.1145/1640206.1640228
Haiyan Zhao, Li Yi, Wei Zhang, Hong Mei
Stakeholders play critical roles in requirements elicitation, since they are the source of requirements, and the quality of elicited requirements is significantly influenced by the degree of stakeholders' participation and collaboration in elicitation. However, requirements elicitation is often obstructed due to the diversity in stakeholders' background and interests, especially in the different perspectives on the envisioned systems, the insufficient communication and common-understanding among them, and the different abilities to express requirements.
涉众在需求引出中扮演着关键的角色,因为他们是需求的来源,而引出需求的质量受到涉众在引出中的参与和协作程度的显著影响。然而,由于干系人背景和兴趣的差异,特别是对所设想的系统的不同观点,他们之间的沟通和共识不足,以及表达需求的能力不同,往往会阻碍需求的提取。
{"title":"A problem-driven scenario-based approach to collaborative requirement elicitation","authors":"Haiyan Zhao, Li Yi, Wei Zhang, Hong Mei","doi":"10.1145/1640206.1640228","DOIUrl":"https://doi.org/10.1145/1640206.1640228","url":null,"abstract":"Stakeholders play critical roles in requirements elicitation, since they are the source of requirements, and the quality of elicited requirements is significantly influenced by the degree of stakeholders' participation and collaboration in elicitation. However, requirements elicitation is often obstructed due to the diversity in stakeholders' background and interests, especially in the different perspectives on the envisioned systems, the insufficient communication and common-understanding among them, and the different abilities to express requirements.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78888160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards self-healing web services composition 走向自修复的web服务组合
Pub Date : 2009-10-17 DOI: 10.1145/1640206.1640221
Guoquan Wu, Jun Wei, Tao Huang
To achieve self-healing web services composition, much work has been studied in the area of web services composition recently. However, most work addresses the problem of runtime monitoring, diagnosis and recovery in isolation. What is missing, however, is a unified solution that can be used to tackle this challenge in a principled manner. This paper presents a fresh view on self-healing web services composition. In particular, rather than building baseline system model a priori, we advocate using statistical learning theory(SLT) technique to extract it by observing the behavior of web services composition and locate the potential anomaly.
为了实现自修复的web服务组合,最近在web服务组合领域进行了大量的研究。但是,大多数工作都是孤立地解决运行时监视、诊断和恢复问题。然而,目前缺少的是一种统一的解决办法,可以用来以有原则的方式应对这一挑战。本文提出了一种关于自修复web服务组合的新观点。特别是,我们提倡使用统计学习理论(SLT)技术,而不是先验地构建基线系统模型,通过观察web服务组合的行为来提取它,并定位潜在的异常。
{"title":"Towards self-healing web services composition","authors":"Guoquan Wu, Jun Wei, Tao Huang","doi":"10.1145/1640206.1640221","DOIUrl":"https://doi.org/10.1145/1640206.1640221","url":null,"abstract":"To achieve self-healing web services composition, much work has been studied in the area of web services composition recently. However, most work addresses the problem of runtime monitoring, diagnosis and recovery in isolation. What is missing, however, is a unified solution that can be used to tackle this challenge in a principled manner. This paper presents a fresh view on self-healing web services composition. In particular, rather than building baseline system model a priori, we advocate using statistical learning theory(SLT) technique to extract it by observing the behavior of web services composition and locate the potential anomaly.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77307200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Reliable multicast with network coding 可靠的多播与网络编码
Pub Date : 2009-10-17 DOI: 10.1145/1640206.1640211
Kaikai Chi, Xiaohong Jiang, Baoliu Ye
Reliable multicast, the lossless dissemination of data from one sender to a group of receivers, has a wide range of important applications like software update and dissemination of stock quotes. Recently, network coding has been applied to the reliable multicast in wireless networks, where the sender encodes multiple lost packets together into one packet and uses a single retransmission to potentially recover multiple packet losses, resulting in a significant reduction of band-width consumption. In this paper, we provide a review of recent research works in this area, examine their advantages and limitations, and also present some open research challenges need to be addressed in the future.
可靠的多播,即数据从一个发送者到一组接收者的无损传播,具有广泛的重要应用,如软件更新和股票报价的传播。近年来,网络编码已被应用于无线网络中的可靠组播,发送方将多个丢失的数据包一起编码成一个数据包,并使用一次重传来潜在地恢复多个数据包的丢失,从而大大减少了带宽消耗。在本文中,我们对该领域的最新研究工作进行了综述,分析了它们的优势和局限性,并提出了未来需要解决的一些开放的研究挑战。
{"title":"Reliable multicast with network coding","authors":"Kaikai Chi, Xiaohong Jiang, Baoliu Ye","doi":"10.1145/1640206.1640211","DOIUrl":"https://doi.org/10.1145/1640206.1640211","url":null,"abstract":"Reliable multicast, the lossless dissemination of data from one sender to a group of receivers, has a wide range of important applications like software update and dissemination of stock quotes. Recently, network coding has been applied to the reliable multicast in wireless networks, where the sender encodes multiple lost packets together into one packet and uses a single retransmission to potentially recover multiple packet losses, resulting in a significant reduction of band-width consumption. In this paper, we provide a review of recent research works in this area, examine their advantages and limitations, and also present some open research challenges need to be addressed in the future.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85012176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constructing and testing privacy-aware services in a cloud computing environment: challenges and opportunities 在云计算环境中构建和测试隐私感知服务:挑战与机遇
Pub Date : 2009-10-17 DOI: 10.1145/1640206.1640208
Lin Gu, S. Cheung
After decades of engineering development and infrastructural investment, Internet connections have become a commodity product in many countries, and Internetscale "cloud computing" has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internetware. One distinct characteristic of cloud computing is the global integration of data, logic, and users, but such integration magnifies a sharp concern about privacy, which is one of the most frequently cited reasons by enterprises for not migrating to cloud-based solutions. We argue that cloud-based systems should include privacy as a fundamental design goal, and that privacy in a cloud environment is bidirectional, covering both end users and application providers. End users need privacy-aware software services that prevent their private data from being exposed to other users or the cloud providers. Application providers need a privacy-protected testing methodology to prevent the companies' internal activities and product features from leaking to external users. Focusing on privacy protection, we discuss the research challenges in this unique design space, and explore potential solutions for enhancing privacy protection in several important components of the system.
经过几十年的工程开发和基础设施投资,互联网连接在许多国家已经成为一种商品,互联网规模的“云计算”已经开始通过其技术优势和规模经济与传统软件业务竞争。云计算是一种很有前途的互联网软件使能技术。云计算的一个明显特征是数据、逻辑和用户的全局集成,但是这种集成放大了对隐私的严重关注,这是企业不迁移到基于云的解决方案的最常见的原因之一。我们认为,基于云的系统应该将隐私作为一个基本的设计目标,并且云环境中的隐私是双向的,包括最终用户和应用程序提供商。最终用户需要具有隐私意识的软件服务,以防止他们的私人数据暴露给其他用户或云提供商。应用程序提供商需要一种隐私保护的测试方法,以防止公司的内部活动和产品功能泄露给外部用户。以隐私保护为重点,我们讨论了在这个独特的设计空间中的研究挑战,并探讨了在系统的几个重要组件中增强隐私保护的潜在解决方案。
{"title":"Constructing and testing privacy-aware services in a cloud computing environment: challenges and opportunities","authors":"Lin Gu, S. Cheung","doi":"10.1145/1640206.1640208","DOIUrl":"https://doi.org/10.1145/1640206.1640208","url":null,"abstract":"After decades of engineering development and infrastructural investment, Internet connections have become a commodity product in many countries, and Internetscale \"cloud computing\" has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internetware. One distinct characteristic of cloud computing is the global integration of data, logic, and users, but such integration magnifies a sharp concern about privacy, which is one of the most frequently cited reasons by enterprises for not migrating to cloud-based solutions. We argue that cloud-based systems should include privacy as a fundamental design goal, and that privacy in a cloud environment is bidirectional, covering both end users and application providers. End users need privacy-aware software services that prevent their private data from being exposed to other users or the cloud providers. Application providers need a privacy-protected testing methodology to prevent the companies' internal activities and product features from leaking to external users. Focusing on privacy protection, we discuss the research challenges in this unique design space, and explore potential solutions for enhancing privacy protection in several important components of the system.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85437633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
Proceedings of the 8th Asia-Pacific Symposium on Internetware
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1