Learn More
The Efficiency of present symmetric encryption algorithms mainly depends on implementation cost and resulting performances. Present symmetric encryption, like the Advanced Encryption Standard (AES) rather focus on finding a good tradeoff between cost, security and performances. Some present symmetric encryption algorithms are targeted for software(More)
Although the multicast group key management scheme using the flat table with attribute-based encryption can resist colluding attacks, the final scheme is inefficient regarding the communication and computation cost in the rekeying phase. In this article, we propose an efficient and scalable hierarchical multicast key management by exploiting the attribute(More)
Service Availability is an important method meeting adaptive and general requirements of service failure detection and largely affected by failure detection indexes. Therefore, how to select appropriate indicators of service failure detection is an important issue. However, only small number of indicators in the existing service availability mechanism can't(More)
The detection of failure is a fundamental component for highly reliable systems. Taking the QoS of failure detection into consideration, a Framework of Disaster-Tolerance Oriented Adaptive Failure Detection (DTO-FDF) is presented, which adopts hierarchical modularity design and constructs the DTO-FDF and algorithm from the system view and data circulation(More)
Nowadays, data security and business continuity of information system become the hot spot of research. According to the fact of disaster occurrence frequently of information system, based on the thinking of high-availability, from the view of hierarchy, a network disaster-tolerant system is designed. The system is divided into three levels, which are Client(More)
To improve the level of disaster recovery construction, combined with disaster recovery evaluation standards, this paper proposed disaster recovery evaluation PROC model framework based on information flow. The framework achieved real-time monitoring state of disaster recovery ability by combining disaster recovery resource-based static evaluation with(More)
  • 1