A novel multicast communication model using a RingNet hierarchy is proposed. The RingNet hierarchy consists of 4 tiers: border router tier, access gateway tier, access proxy tier and mobile host tier. Within the hiera...A novel multicast communication model using a RingNet hierarchy is proposed. The RingNet hierarchy consists of 4 tiers: border router tier, access gateway tier, access proxy tier and mobile host tier. Within the hierarchy, the upper 2 tiers are dynamically organized into logical rings with network entities. A novel hierarchical secure access control scheme on key management is proposed based on the RingNet model. Network entities within the multicast hierarchy belong to different privileged local groups. Network entities of the higher-privileged local groups have the right to derive the keys held by network entities of the lower-privileged local groups, and the reverse operation is not allowed. With the key management approach, any insertion and changing of local group key will not affect other local groups. The analytical result shows that the scheme has higher security than Lin’s.展开更多
IBM和Lotus两家公司1995年的购并,是一个非常值得回味的经典成功之作。在本文的前半部分,详细描述了IBM公司主席兼首席执行官Louis V. Gerstner Jr.和主管软件的副总裁John M. Thompson成功运作这起公司购并的始末。两家公司合并以来,...IBM和Lotus两家公司1995年的购并,是一个非常值得回味的经典成功之作。在本文的前半部分,详细描述了IBM公司主席兼首席执行官Louis V. Gerstner Jr.和主管软件的副总裁John M. Thompson成功运作这起公司购并的始末。两家公司合并以来,双双获得了很好的收获。Lotus借助IBM强大的市场能力把Notes的销售量扩大到10倍;而IBM则由Lotus填补了产品空白,向软件巨人转变的过程也将更加顺利。它告诉人们:IBM并不是一只笨拙的恐龙。这次购并遵循着以下的律条:不拖后腿,不讨价还价;让合适的人来玩游戏;不损害被兼并公司的信誉……接下来的几条,请您继续阅读下面的文章。展开更多
文摘A novel multicast communication model using a RingNet hierarchy is proposed. The RingNet hierarchy consists of 4 tiers: border router tier, access gateway tier, access proxy tier and mobile host tier. Within the hierarchy, the upper 2 tiers are dynamically organized into logical rings with network entities. A novel hierarchical secure access control scheme on key management is proposed based on the RingNet model. Network entities within the multicast hierarchy belong to different privileged local groups. Network entities of the higher-privileged local groups have the right to derive the keys held by network entities of the lower-privileged local groups, and the reverse operation is not allowed. With the key management approach, any insertion and changing of local group key will not affect other local groups. The analytical result shows that the scheme has higher security than Lin’s.
文摘IBM和Lotus两家公司1995年的购并,是一个非常值得回味的经典成功之作。在本文的前半部分,详细描述了IBM公司主席兼首席执行官Louis V. Gerstner Jr.和主管软件的副总裁John M. Thompson成功运作这起公司购并的始末。两家公司合并以来,双双获得了很好的收获。Lotus借助IBM强大的市场能力把Notes的销售量扩大到10倍;而IBM则由Lotus填补了产品空白,向软件巨人转变的过程也将更加顺利。它告诉人们:IBM并不是一只笨拙的恐龙。这次购并遵循着以下的律条:不拖后腿,不讨价还价;让合适的人来玩游戏;不损害被兼并公司的信誉……接下来的几条,请您继续阅读下面的文章。