The Network Attached Storage (NAS) is one of the most effective projects for solving the network storage bottleneck at present. Its security mechanism is different from the common network security. This paper puts for...The Network Attached Storage (NAS) is one of the most effective projects for solving the network storage bottleneck at present. Its security mechanism is different from the common network security. This paper puts forward a NAS security model based on the Petri Nets and provides a NAS security system designed according to the model which has been proved effective and applicable by tests.展开更多
Many workflow management systems have emerged in recent years, but few of them provide any form of support for verification. This frequently results in runtime errors that need to be corrected at prohibitive costs. In...Many workflow management systems have emerged in recent years, but few of them provide any form of support for verification. This frequently results in runtime errors that need to be corrected at prohibitive costs. In Ref.[1], a few reduction rules of verifying workflow graph are given. After analyzing the reduction rules, the overlapped reduction rule is found to be inaccurate. In this paper, the improved reduction rules are presented and the matrix-based implementing algorithm is given, so that the scope of the verification of workflow is expanded and the efficiency of the algorithm is enhanced. The method is simple and natural, and its implementation is easy too.展开更多
文摘The Network Attached Storage (NAS) is one of the most effective projects for solving the network storage bottleneck at present. Its security mechanism is different from the common network security. This paper puts forward a NAS security model based on the Petri Nets and provides a NAS security system designed according to the model which has been proved effective and applicable by tests.
文摘Many workflow management systems have emerged in recent years, but few of them provide any form of support for verification. This frequently results in runtime errors that need to be corrected at prohibitive costs. In Ref.[1], a few reduction rules of verifying workflow graph are given. After analyzing the reduction rules, the overlapped reduction rule is found to be inaccurate. In this paper, the improved reduction rules are presented and the matrix-based implementing algorithm is given, so that the scope of the verification of workflow is expanded and the efficiency of the algorithm is enhanced. The method is simple and natural, and its implementation is easy too.