首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Location-based applications such as Facebook Places, Foursquare, or Loopt typically use location services to manage mobile object positions. However, exposing precise user positions raises user privacy concerns, especially if location service providers are not fully trusted. To enable the secure management of private user positions in non-trusted systems, we present two novel position sharing approaches based on the concept of multi-secret sharing. We improve existing geometric position sharing approaches by Dürr et al. [2] and Skvortsov et al. [3] by considering continuous position updates and by increasing the robustness against various attacks. Furthermore, we present the first position sharing approach for symbolic location models.  相似文献   

2.
This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of location (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of location net that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic security-policy specification language that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions, to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies. The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms and highlight the advantages of the model checking-based approach, which combines the validation of security properties with other checks, such as the validation of buffer overflows.  相似文献   

3.
Urban pollution control systems suffer from the presence of fixed stations in a greater number than mobile monitoring devices. Data gathered from such stations provide detailed and reliable information, thanks to equipment quality and effective measuring protocols, but these sampled data are gathered from very limited areas and through discontinuous monitoring campaigns. Fortunately, the spread of technologies for mobility has fostered the development of new approaches like mobile crowdsensing (MCS), increasing the chances of using mobile devices, even personal ones, as suitable sensors for the urban monitoring scenario. Nevertheless, one of the open challenges is the management of integrated heterogeneous data flows, differing in terms of typology, technical specifications (eg, transmission protocols), and semantics. The osmotic computing paradigm aims at creating an abstract level between mobile devices/Internet-of-Things devices and a cloud platform, which enables opportunistic filtering and the addition of metadata for improving the data processing flow. This work focuses on the design and development of a middleware that integrates data coming from mobile and Internet-of-Things devices specifically deployed in urban contexts using the osmotic computing paradigm. Moreover, a component of the osmotic membrane has been developed for security management.  相似文献   

4.
本文是在原来办公固定资产管理台账基础上,开发的一款手机APP应用系统,利用专用标签打印程序,将办公固定资产的基本信息,如资产编号,资产名称、资产保管人、资产使用人、资产存放位置、资产序号等,通过QR二维码格式打印到一枚标签上,然后,将二维码标签粘贴在资产设备(如桌椅、电脑、打印机等)的表面,在进行资产清查或变更时,通过手机APP实现办公资产的登记、领用借用归还,还可以进行快速统计和资产盘点,可以极大的提高办公资产的管理能力和水平。  相似文献   

5.
The aim of this paper is to compare different context-aware broadcasting approaches in mobile ad hoc networks (MANETs) and to evaluate their respective performances. Message broadcasting is one of the core challenges brought up by distributed systems and has therefore largely been studied in the context of traditional network structures, such as the Internet. With the emergence of MANETs, new broadcasting algorithms especially geared at these networks have been introduced. The goal of these broadcasting algorithms is to ensure that a maximum number of nodes deliver the broadcasted message (reliability), while ensuring that the minimum number of nodes retransmit the broadcasted message (efficiency), in order to save their resources, such as bandwidth or battery. In recent years, as more and more mobile devices have become context-aware, several broadcasting algorithms have been introduced that take advantage of contextual information in order to improve their performance. We distinguish four approaches with respect to context: (1) context-oblivious approaches, (2) network traffic-aware approaches, (3) power-aware approaches, and (4) location-aware approaches. This paper precisely aims at presenting these four different broadcasting approaches and at measuring the performance of algorithms built upon them.  相似文献   

6.
一种基于移动代理的网络管理系统及性能分析   总被引:16,自引:0,他引:16  
张普含  孙玉芳 《软件学报》2002,13(11):2090-2098
当前所用的网络管理系统大都属于集中式管理模式,因此,在性能、可扩展性、灵活性等方面具有很大的局限性.基于移动代理的网络管理是针对这些不足而提出的具有潜力的解决方案之一,但是要精确地判定在什么条件下移动代理比传统的客户/服务器模式更有效是比较困难的.为此,提出了一个定量模型,从理论上分析和比较了两种结构的流量和响应时间,并就移动代理和SNMP(simple network management protocol)的性能进行了模拟实验比较.理论和实验结果都表明,当被管理的网络设备数在一定范围内时,移动代理的性能比SNMP的性能要好;对于移动代理访问固定数量的设备后再返回到网络管理器这种方案,移动代理的性能有较大的提高.  相似文献   

7.
高文婷  刘越 《图学学报》2021,42(4):525-534
移动增强现实(AR)借助智能移动终端将虚拟信息和真实世界进行实时融合,能否实时准确地对 环境中需要增强的物体进行目标检测直接决定了系统的性能。随着深度学习的快速发展,近年来出现了大量的 基于深度学习的目标检测方法。由于存在移动增强设备计算能力有限、能耗大、模型尺寸大以及卸载任务到边 缘云端的网络延迟严重等问题,将深度学习方法应用于移动 AR 的目标检测是一项具有挑战性的问题。首先从 Two stage 和 One stage 的 2 方面对目前深度学习目标检测算法进行综述;然后对面向移动 AR 的目标检测系统 架构进行归纳分类,分析了基于本地端、云端或边缘端和协作式的移动 AR 目标检测系统并总结了各自的优势 和局限性;最后对移动 AR 中目标检测亟待解决的问题和未来发展方向进行了展望和预测。  相似文献   

8.
Workflow management systems are an emerging category of information systems, currently under dynamic evolution. On the other hand software agents are a distinct research area as well as an emerging paradigm for information systems design and development. This paper tries to examine the integration of these two fields; reveal the stimulation and the advantages of such a mixing. Popular standards of the workflow management field are used to derive a classification scheme, which is exploited to map existing approaches. As a significant number of existing approaches is reviewed, a plethora of integration patterns are identified and grouped according to the proposed classification scheme. The overall goal of the paper is to clear the vague picture of the consolidation of workflow management systems and software agents and to provide an unifying framework for this intersected area.  相似文献   

9.
The advent of mobile and ubiquitous systems has enabled the development of autonomous systems such as wireless-sensors for environmental data collection and teams of collaborating Unmanned Autonomous Vehicles (UAVs) used in missions unsuitable for humans. However, with these range of new application-domains comes a new challenge—enabling self-management in mobile autonomous systems. Autonomous systems have to be able to manage themselves individually as well as form self-managing teams which are able to adapt to failures, protect themselves from attacks and optimise performance. This paper proposes a novel distributed policy-based framework that enables autonomous systems of varying scale to perform self-management individually and as a team. The framework allows missions to be specified in terms of roles in an adaptable and reusable way, enables dynamic and secure team formation with a utility-based approach for optimal role assignment, caters for communication link maintenance amongst team-members and recovery from failure. Adaptive management is achieved by employing a policy-based architecture to enable dynamic modification of the management strategy relating to resources, role behaviour, communications and team management, without interrupting the basic software within the system. Evaluation of the framework shows that it is scalable with respect to the number of roles, and consequently the number of autonomous systems involved in the mission. It is also optimal with respect to role assignments, and robust to intermittent communication link and permanent team-member failures.  相似文献   

10.
为了进一步实现财务信息系统的精细化、智能化管理,通过南京水利科学研究院财务管理信息系统建设,对系统技术架构及财务报销约号系统、财务移动审批 App 系统、用户决策信息动态推送服务等关键技术进行研究分析,实现科学化预约报销、智能化审批、个性化信息服务及一体化管理,为财务管理者与财务系统使用者提供更高效的平台。  相似文献   

11.

This article argues that the mobile agent approach is well suited for sporadic communication in open distributed systems, especially for rather ''loose'' cooperations across local and organizational boundaries. In an increasing number of cases, management of distributed business procedures reaches beyond such boundaries. This means, for most existing workflow management systems, that cooperating partners are required to give up their local autonomy. However, for cases in which business partners intend to cooperate but still need to preserve their local autonomy, process participation on the basis of mobile agents represents an appropriate mechanism. This article shows how such process integration can be achieved. It also demonstrates how the Common Open Service Market (COSM) system software can be extended in order to use petri-net based process definitions that realize mobile agents in an integrated distributed system platform.  相似文献   

12.
The lack of proper support for multicast services in the Internet has hindered the widespread use of applications that rely on group communication services such as mobile software agents. Although they do not require high bandwidth or heavy traffic, these types of applications need to cooperate in a scalable, fair and decentralized way. This paper presents GMAC, an overlay network that implements all multicast related functionality–including membership management and packet forwarding–in the end systems. GMAC introduces a new approach for providing multicast services for mobile agent platforms in a decentralized way, where group members cooperate in a fair way, minimize the protocol overhead, thus achieving great scalability. Simulations comparing GMAC with other approaches, in aspects such as end-to-end group propagation delay, group latency, group bandwidth, protocol overhead, resource utilization and failure recovery, show that GMAC is a scalable and robust solution to provide multicast services in a decentralized way to mobile software agent platforms with requirements similar to MoviLog.  相似文献   

13.
面对越来越多企业对平台化办公和移动办公的需要,遵循信息系统生命周期理论,运用结构化开发方法,通过系统规划、业务流程分析、数据流程分析及系统设计,给出了平台化办公管理系统设计方案,包含部门职位管理、日志管理、消息管理、项目工作管理、日常申请管理和财务管理等功能模块,该系统设计方案能够满足企业平台化办公和移动办公管理的需要...  相似文献   

14.
Increasing number of sophisticated services provided by the current wireless communication systems have caused a significant transition from E-commerce to M-commerce. Enterprises have provided considerable new opportunities to promote their businesses accessible from small mobile devices such as personal digital assistant (PDA) or mobiles phones. These facilities are envisioned as the most convenient way of using M-commerce. Using such services from mobile phones or PDAs equipped with GSM/GPRS involve effective mobility management mechanisms in cellular networks—a popular architecture for wireless networks. Success of such systems will largely depend on the reliable connection for the roaming users. Consequently, Quality of Service (QoS) provision is one of the most challenging issues in the heterogeneous wireless network-based m-commerce systems. Such m-commerce systems enable users to roam between different wireless networks operators and geographical areas while providing interactive broadband services and seamless connectivity. This paper presents an analytical framework to model scarce channels in any cell for maximizing channel utilization and efficient handling of handover requests. Typical numerical experiments are presented to validate the analytical solution against simulation to study the effect of bursty traffic upon the performance of the cell in any cellular networks.  相似文献   

15.
Mobile platforms are becoming highly heterogeneous by combining a powerful multiprocessor system-on-a-chip (MpSoC) with numerous other resources, including display, memory, power management IC, battery and wireless modems into a compact package. Furthermore, the MpSoC itself is a heterogeneous resource that integrates many processing elements such as CPU cores, GPU, video, image, and audio processors. Platform energy consumption and responsiveness are two major considerations for mobile systems, since they determine the battery life and user satisfaction, respectively. As a result, energy minimization approaches targeting mobile computing need to consider the platform at various levels of granularity. In this paper, we first present power consumption, response time, and energy consumption models for mobile platforms. Using these models, we optimize the energy consumption of baseline platforms under power, response time, and thermal constraints with and without introducing new resources. Finally, we validate the proposed framework through experiments on Qualcomm’s Snapdragon 800 Mobile Development Platforms.  相似文献   

16.
Modern cellular mobile communications systems are characterized by a high degree of capacity. Consequently, they have to serve the maximum possible number of calls while the number of channels per cell is limited. The objective of channel allocation is to assign a required number of channels to each cell such that both efficient frequency spectrum utilization is provided and interference effects are minimized. Channel assignment is therefore an important operation of resource management and its efficient implementation increases the fidelity, capacity, and quality of service of cellular systems. Most channel allocation strategies are based on deterministic methods, however, which result in implementation complexity that is prohibitive for the traffic demand envisaged for the next generation of mobile systems. An efficient heuristic technique capable of handling channel allocation problems is introduced as an alternative. The method is called a combinatorial evolution strategy (CES) and belongs to the general heuristic optimization techniques known as evolutionary algorithms (EAs). Three alternative allocation schemes operating deterministically, namely the dynamic channel assignment (DCA), the hybrid channel assignment (HCA), and the borrowing channel assignment (BCA), are formulated as combinatorial optimization problems for which CES is applicable. Simulations for representative cellular models show the ability of this heuristic to yield sufficient solutions. These results will encourage the use of this method for the development of a heuristic channel allocation controller capable of coping with the traffic and spectrum management demands for the proper operation of the next generation of cellular systems  相似文献   

17.
The Semantic Web technologies are being increasingly used for exploiting relations between data. In addition, new tendencies of real-time systems, such as social networks, sensors, cameras or weather information, are continuously generating data. This implies that data and links between them are becoming extremely vast. Such huge quantity of data needs to be analyzed, processed, as well as stored if necessary. In this position paper, we will introduce recent work on Real-Time Business Intelligence combined with semantic data stream management. We will present underlying approaches such as continuous queries, data summarization and matching, and stream reasoning.  相似文献   

18.
This paper describes a novel approach for managing service-centric communications networks called distributed autonomic management (DAM). Current approaches to network management employ the client/server model, cooperative stationary agents, and/or non-intelligent mobile agents. The DAM model consists of communities of mobile and stationary intelligent agents in collaboration. We discuss an experiment with DAM and proceed to discuss outstanding research issues. The DAM approach uses the properties and characteristics of autonomic systems in support of managing service-oriented communications networks and protecting e-commerce and business enterprises against cyber terrorism.  相似文献   

19.
Massimo Ficco  Stefano Russo 《Software》2009,39(13):1095-1125
Location‐aware computing is a form of context‐aware mobile computing that refers to the ability of providing users with services that depend on their position. Locating the user terminal, often called positioning, is essential in this form of computing. Towards this aim, several technologies exist, ranging from personal area networking, to indoor, outdoor, and up to geographic area systems. Developers of location‐aware software applications have to face with a number of design choices, that typically depend on the chosen technology. This work addresses the problem of easing the development of pull location‐aware applications, by allowing uniform access to multiple heterogeneous positioning systems. Towards this aim, the paper proposes an approach to structure location‐aware mobile computing systems in a way independent of positioning technologies. The approach consists in structuring the system into a layered architecture, that provides application developers with a standard Java Application Programming Interface (JSR‐179 API), and encapsulates location data management and technology‐specific positioning subsystems into lower layers with clear interfaces. In order to demonstrate the proposed approach we present the development of HyLocSys. It is an open hybrid software architecture designed to support indoor/outdoor applications, which allows the uniform (combined or separate) use of several positioning technologies. HyLocSys uses a hybrid data model, which allows the integration of different location information representations (using symbolic and geometric coordinates). Moreover, it allows support to handset‐ and infrastructure‐based positioning approaches while respecting the privacy of the user. The paper presents a prototypal implementation of HyLocSys for heterogeneous scenarios. It has been implemented and tested on several platforms and mobile devices. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

20.
To enhance the security of mobile devices, enterprises are developing and adopting mobile device management systems. However, if a mobile device management system is exploited, mobile devices and the data they contain will be compromised. Therefore, it is important to perform extensive threat modeling to develop realistic and meaningful security requirements and functionalities. In this paper, we analyze some current threat modeling methodologies, propose a new threat modeling methodology and present all possible threats against a mobile device management system by analyzing and identifying threat agents, assets, and adverse actions. This work will be used for developing security requirements such as a protection profile and design a secure system.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号