At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con...At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.展开更多
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio...This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string).展开更多
An effective and reliable access control is crucial to a PDM system.This article has discussed the commonly used access control models,analyzed their advantages and disadvantages,and proposed a new Role and Object bas...An effective and reliable access control is crucial to a PDM system.This article has discussed the commonly used access control models,analyzed their advantages and disadvantages,and proposed a new Role and Object based access control model that suits the particular needs of a PDM system.The new model has been implemented in a commercial PDM system,which has demonstrated enhanced flexibility and convenience.展开更多
A novel distributed cognitive radio multichannel medium access protocol without common control channel was proposed.The protocol divided a transmission interval into two parts for exchanging control information and da...A novel distributed cognitive radio multichannel medium access protocol without common control channel was proposed.The protocol divided a transmission interval into two parts for exchanging control information and data,respectively.In addition to evaluating system saturation throughput of the proposed protocol,a three-dimensional multi channel Markov chain model to describe the sate of the cognitive users (CUs) in dynamic spectrum access was presented.The proposed analysis was applied to the packet transmission schemes employed by the basic,RTS/CTS access mechanism adopted in the normal IEEE 802.11.Analyzing the advantage of the two methods,a hybrid access mechanism was proposed to improve the system throughput.The simulation results show that the experiment results are close to the value computed by the model (less than 5%),and the proposed protocol significantly improves the performance of the system throughput by borrowing the licensed spectrum.By analyzing the dependence of throughput on system parameters,hybrid mechanism dynamically selecting access mechanism can maintain high throughput.展开更多
This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided in...This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently.展开更多
提出一种分析模型,基于信号流图和母函数方法分析了无线局域网中EDCA(enhanced distribution channel access)机制的MAC(medium access control)接入延时.得到了MAC接入延时的概率分布和相关的数字特征,包括接入延时的均值、方差、标准...提出一种分析模型,基于信号流图和母函数方法分析了无线局域网中EDCA(enhanced distribution channel access)机制的MAC(medium access control)接入延时.得到了MAC接入延时的概率分布和相关的数字特征,包括接入延时的均值、方差、标准差和变异系数.仿真结果与模型的分析结果吻合良好,验证了模型和计算方法的正确性.进一步分析了各类AC(access category)的发送概率、碰撞概率、挂起概率和延时均值随终端数目变化的规律;分析了MAC接入延时的成因;指出了AIFS(arbitration inter frame spacing)值对MAC接入延时的影响;指出接入延时的变异系数大于1,因此,采用负指数分布作为MAC接入延时的近似分布,会错误地估计系统的服务能力.展开更多
针对现有能够应用于太赫兹超高速无线网络的能量和频谱感知的媒介接入控制(energy and spectrum-aware media access control,ES-MAC)及IEEE802.15.3c协议存在的时隙申请量未及时更新、超帧结构不合理及分配时隙时未合并同一对节点之间...针对现有能够应用于太赫兹超高速无线网络的能量和频谱感知的媒介接入控制(energy and spectrum-aware media access control,ES-MAC)及IEEE802.15.3c协议存在的时隙申请量未及时更新、超帧结构不合理及分配时隙时未合并同一对节点之间的时隙请求等问题,提出了一种高吞吐量低时延MAC(high throughput low delay MAC,HLMAC)协议。通过设计一种新的超帧结构,使节点及时得到时隙分配信息,大大降低数据接入时延;通过更新时隙请求量和合并同一对节点的时隙请求,增加了数据发送量,提高了网络吞吐量。理论分析表明了HLMAC协议的有效性,仿真结果显示它比ES-MAC协议增加了65.7%的网络吞吐量,同时降低了30%的接入时延。展开更多
基金Acknowledgements This work was supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900) and National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008).
文摘At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.
文摘This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string).
文摘An effective and reliable access control is crucial to a PDM system.This article has discussed the commonly used access control models,analyzed their advantages and disadvantages,and proposed a new Role and Object based access control model that suits the particular needs of a PDM system.The new model has been implemented in a commercial PDM system,which has demonstrated enhanced flexibility and convenience.
基金Project(61071104) supported by the National Natural Science Foundation of China
文摘A novel distributed cognitive radio multichannel medium access protocol without common control channel was proposed.The protocol divided a transmission interval into two parts for exchanging control information and data,respectively.In addition to evaluating system saturation throughput of the proposed protocol,a three-dimensional multi channel Markov chain model to describe the sate of the cognitive users (CUs) in dynamic spectrum access was presented.The proposed analysis was applied to the packet transmission schemes employed by the basic,RTS/CTS access mechanism adopted in the normal IEEE 802.11.Analyzing the advantage of the two methods,a hybrid access mechanism was proposed to improve the system throughput.The simulation results show that the experiment results are close to the value computed by the model (less than 5%),and the proposed protocol significantly improves the performance of the system throughput by borrowing the licensed spectrum.By analyzing the dependence of throughput on system parameters,hybrid mechanism dynamically selecting access mechanism can maintain high throughput.
基金Supported by the Science Foundation of Shanghai Mu-nicipal Commission of Science and Technology under contract 045115012.
文摘This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently.
文摘提出一种分析模型,基于信号流图和母函数方法分析了无线局域网中EDCA(enhanced distribution channel access)机制的MAC(medium access control)接入延时.得到了MAC接入延时的概率分布和相关的数字特征,包括接入延时的均值、方差、标准差和变异系数.仿真结果与模型的分析结果吻合良好,验证了模型和计算方法的正确性.进一步分析了各类AC(access category)的发送概率、碰撞概率、挂起概率和延时均值随终端数目变化的规律;分析了MAC接入延时的成因;指出了AIFS(arbitration inter frame spacing)值对MAC接入延时的影响;指出接入延时的变异系数大于1,因此,采用负指数分布作为MAC接入延时的近似分布,会错误地估计系统的服务能力.
基金Supported by the Program for New Century Excellent Talents in University of China under Grant No.NCET-05-0657(新世纪优秀人才支持计划)the Foundation for Distinguished Young Scientists of Hubei Province of China under Grant No.2006ABB028(湖北省青年杰出人才基金)
基金Supported by the National High-Tech Research and Development Plan of China under Grant No.2005AA121570(国家高技术研究发展计划(863))the National Basic Research Program of China under Grant No.2003CB314802(国家重点基础研究发展计划(973))
文摘针对现有能够应用于太赫兹超高速无线网络的能量和频谱感知的媒介接入控制(energy and spectrum-aware media access control,ES-MAC)及IEEE802.15.3c协议存在的时隙申请量未及时更新、超帧结构不合理及分配时隙时未合并同一对节点之间的时隙请求等问题,提出了一种高吞吐量低时延MAC(high throughput low delay MAC,HLMAC)协议。通过设计一种新的超帧结构,使节点及时得到时隙分配信息,大大降低数据接入时延;通过更新时隙请求量和合并同一对节点的时隙请求,增加了数据发送量,提高了网络吞吐量。理论分析表明了HLMAC协议的有效性,仿真结果显示它比ES-MAC协议增加了65.7%的网络吞吐量,同时降低了30%的接入时延。