Build a general software development platform for industrial process supervisor and management system by combining the technology of industrial configuration and Client/Server model, and introduce the architecture and...Build a general software development platform for industrial process supervisor and management system by combining the technology of industrial configuration and Client/Server model, and introduce the architecture and topological application of this platform. It puts forward a solution to the real time problem in the industrial distributed supervisor system.展开更多
This paper discusses major issues involved in the design and implementation of a cooperative PIM(Personal Information Management) system on network, such as system architecture, implementory interface and human machin...This paper discusses major issues involved in the design and implementation of a cooperative PIM(Personal Information Management) system on network, such as system architecture, implementory interface and human machine interactive interface. Emphasis has been given to the architecture and interaction. Based on the C/S(Client/Server) architecture we manage the personal informations on the server and maintain all the workstations through TCP/IP protocol. All the queries are done through ODBC. For the cooperation of workstations we select MDI as the basis of our interface and apply OLE technique in it. Furthermore we apply multithread to manage the shared resource and individual resource. Our applications results show that C/S architecture can be an excellent platform for MIS developing and the principles for human-machine interface perform well in this kind of applications.展开更多
Information integrating platform is a basic supporting environment based on informationtechnology for a CIM(Computer Integrated Manufacturing)system.There are some prob-lems to solve in the research and development of...Information integrating platform is a basic supporting environment based on informationtechnology for a CIM(Computer Integrated Manufacturing)system.There are some prob-lems to solve in the research and development of the platform,such as the type of informa-tion processed in the platform and the distribution strategy of the platform system.This pa-per introduces a plan of an intelligent information integrating platform for CIM system basedon the client/server architecture,named I3P.The architecture,organization and detailed de-sign of services in I3P are also described.展开更多
A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The...A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The mathematical model of the overload of the center server was built and a series of simulation experiments were performed to validate the conclusions. When the client number increases to a certain value, the hybrid architecture can reduce server overload with some special clients (temp servers) selected with a certain heuristic strategy. With this architecture, the DVE system can support more system clients with the same server hardware than the C/S architecture can. The server overload "pulse" phenomena causing by the exiting of the temp server can be resolved by adopting a more optimized temp server selecting strategy and by reducing the child client capability of the temp server. By combining the advantages of the C/S architecture and the P2P architecture, the hybrid DVE architecture can effectively improve the scalability of the DVE system. This is validated by theoretical analysis and simulation experiments.展开更多
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ...During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.展开更多
Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibi...Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. On the other hand, multi-server architecture based authentication protocols make it difficult for the attacker to find out any significant authentication information related to the legitimate users. In 2009, Liao and Wang proposed a dynamic identity based remote user authentication protocol for multi-server environment. However, we found that Liao and Wang's protocol is susceptible to malicious server attack and malicious user attack. This paper presents a novel dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned flaws, while keeping the merits of Liao and Wang's protocol. It uses two-server paradigm by imposing different levels of trust upon the two servers and the user's verifier information is distributed between these two servers known as the service provider server and the control server. The proposed protocol is practical and computational efficient because only nonce, one-way hash function and XOR operations are used in its implementation. It provides a secure method to change the user's password without the server's help. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required.展开更多
基金The Natural Science Foundation of Hunan Province!(No.96 10 1 3 0 )
文摘Build a general software development platform for industrial process supervisor and management system by combining the technology of industrial configuration and Client/Server model, and introduce the architecture and topological application of this platform. It puts forward a solution to the real time problem in the industrial distributed supervisor system.
文摘This paper discusses major issues involved in the design and implementation of a cooperative PIM(Personal Information Management) system on network, such as system architecture, implementory interface and human machine interactive interface. Emphasis has been given to the architecture and interaction. Based on the C/S(Client/Server) architecture we manage the personal informations on the server and maintain all the workstations through TCP/IP protocol. All the queries are done through ODBC. For the cooperation of workstations we select MDI as the basis of our interface and apply OLE technique in it. Furthermore we apply multithread to manage the shared resource and individual resource. Our applications results show that C/S architecture can be an excellent platform for MIS developing and the principles for human-machine interface perform well in this kind of applications.
基金the High Technology Research and Development Programme of china.
文摘Information integrating platform is a basic supporting environment based on informationtechnology for a CIM(Computer Integrated Manufacturing)system.There are some prob-lems to solve in the research and development of the platform,such as the type of informa-tion processed in the platform and the distribution strategy of the platform system.This pa-per introduces a plan of an intelligent information integrating platform for CIM system basedon the client/server architecture,named I3P.The architecture,organization and detailed de-sign of services in I3P are also described.
文摘A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The mathematical model of the overload of the center server was built and a series of simulation experiments were performed to validate the conclusions. When the client number increases to a certain value, the hybrid architecture can reduce server overload with some special clients (temp servers) selected with a certain heuristic strategy. With this architecture, the DVE system can support more system clients with the same server hardware than the C/S architecture can. The server overload "pulse" phenomena causing by the exiting of the temp server can be resolved by adopting a more optimized temp server selecting strategy and by reducing the child client capability of the temp server. By combining the advantages of the C/S architecture and the P2P architecture, the hybrid DVE architecture can effectively improve the scalability of the DVE system. This is validated by theoretical analysis and simulation experiments.
文摘During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.
文摘Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. On the other hand, multi-server architecture based authentication protocols make it difficult for the attacker to find out any significant authentication information related to the legitimate users. In 2009, Liao and Wang proposed a dynamic identity based remote user authentication protocol for multi-server environment. However, we found that Liao and Wang's protocol is susceptible to malicious server attack and malicious user attack. This paper presents a novel dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned flaws, while keeping the merits of Liao and Wang's protocol. It uses two-server paradigm by imposing different levels of trust upon the two servers and the user's verifier information is distributed between these two servers known as the service provider server and the control server. The proposed protocol is practical and computational efficient because only nonce, one-way hash function and XOR operations are used in its implementation. It provides a secure method to change the user's password without the server's help. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required.