We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using thi...We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using this technique, an eavesdropper will never find an isolated authorized user's signal. When authorized users and virtual users transmit data synchronously and asynehronously, network security increases by 25% and 37.5%, respectively.展开更多
移动边缘计算(Mobile Edge Computing,MEC)通过在网络边缘部署服务器,提供计算和存储资源,可为用户提供超低时延和高带宽业务。网络功能虚拟化(Network Function Virtualization,NFV)与MEC技术相结合,可在MEC服务器上提供服务功能链(Ser...移动边缘计算(Mobile Edge Computing,MEC)通过在网络边缘部署服务器,提供计算和存储资源,可为用户提供超低时延和高带宽业务。网络功能虚拟化(Network Function Virtualization,NFV)与MEC技术相结合,可在MEC服务器上提供服务功能链(Service Function Chain,SFC),提升用户的业务体验。为了保证移动用户的服务质量,需要在用户跨基站移动时将SFC迁移到合适的边缘服务器上。主要以最小化用户服务的端到端时延和运行成本为目标,提出了MEC网络中具有资源容量约束的SFC迁移策略,以实现移动用户业务的无缝迁移。仿真结果表明,与现有方案相比,该策略具有更好的有效性和高效性。展开更多
For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different us...For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.展开更多
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario...Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.展开更多
Virtual Globes such as Google Earth TM, revolutionize the way scientists conduct their research and the way the general public use geospatial – related data and information. Improvement in the processing power and st...Virtual Globes such as Google Earth TM, revolutionize the way scientists conduct their research and the way the general public use geospatial – related data and information. Improvement in the processing power and storage capacities of computers, along with the increased Internet accessibility and connectivity, has supported the usage of Virtual Globes technologies. Even more, software releases of freely downloadable Virtual Globes, such as Google Earth and NASA World Wind, has sparked an enormous public interest and increased people’s awareness of spatial sciences.In this study, the Virtual Globes (VG) revolution is discussed and a client - server Graphical User Interface (GUI) application is presented. The developed application enables Google Earth TM Application Program Interface and activates spatial analysis, through enhanced JavaScripts and Visual Basic script codes. The main scope was to present the methodology followed during geological modeling along with the application capabilities when handling with data derived from digitized geological maps and field measurements.展开更多
为了系统认识虚拟现实技术在用户体验设计应用研究的全局概况,运用科学知识图谱的方法,涵盖时间、国家/地区、机构和作者的产出情况、研究热点聚类、知识基础以及研究演化等多个方面,对Web of Science数据库1998-2022年间的学术文献进...为了系统认识虚拟现实技术在用户体验设计应用研究的全局概况,运用科学知识图谱的方法,涵盖时间、国家/地区、机构和作者的产出情况、研究热点聚类、知识基础以及研究演化等多个方面,对Web of Science数据库1998-2022年间的学术文献进行了分析。结果显示,国际研究里发达国家影响较大,其中高等院校是研究的主要机构;国际研究聚焦于环境(environments)、增强现实(augmented reality)、沉浸感(immersion)等;教育、虚拟环境、用户满意度以及可用性成为近几年国际研究热点;国际研究的关键词聚类可分为#1用户体验(User experience)、#2用户接受度(User acceptance)、#3虚拟环境(Virtual environment)、#4可视化设计(Visual design)4大类。国际研究者未来可关注用户体验环境或服务的设计理念、沉浸式体验、交互设计以及增强现实等方面。展开更多
文摘We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using this technique, an eavesdropper will never find an isolated authorized user's signal. When authorized users and virtual users transmit data synchronously and asynehronously, network security increases by 25% and 37.5%, respectively.
文摘移动边缘计算(Mobile Edge Computing,MEC)通过在网络边缘部署服务器,提供计算和存储资源,可为用户提供超低时延和高带宽业务。网络功能虚拟化(Network Function Virtualization,NFV)与MEC技术相结合,可在MEC服务器上提供服务功能链(Service Function Chain,SFC),提升用户的业务体验。为了保证移动用户的服务质量,需要在用户跨基站移动时将SFC迁移到合适的边缘服务器上。主要以最小化用户服务的端到端时延和运行成本为目标,提出了MEC网络中具有资源容量约束的SFC迁移策略,以实现移动用户业务的无缝迁移。仿真结果表明,与现有方案相比,该策略具有更好的有效性和高效性。
文摘For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.
文摘Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.
文摘Virtual Globes such as Google Earth TM, revolutionize the way scientists conduct their research and the way the general public use geospatial – related data and information. Improvement in the processing power and storage capacities of computers, along with the increased Internet accessibility and connectivity, has supported the usage of Virtual Globes technologies. Even more, software releases of freely downloadable Virtual Globes, such as Google Earth and NASA World Wind, has sparked an enormous public interest and increased people’s awareness of spatial sciences.In this study, the Virtual Globes (VG) revolution is discussed and a client - server Graphical User Interface (GUI) application is presented. The developed application enables Google Earth TM Application Program Interface and activates spatial analysis, through enhanced JavaScripts and Visual Basic script codes. The main scope was to present the methodology followed during geological modeling along with the application capabilities when handling with data derived from digitized geological maps and field measurements.