Search and Find
Service
More of the content
Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010Proceedings
Preface
5
Organization
6
Workshop Preface
9
Workshop Organization
11
Table of Contents
13
The Third International Conference on Network Security and Applications (CNSA 2010)
19
Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks
19
Introduction
19
Preliminaries
20
Related Work
20
Key Pre-distribution Schemes
21
Revocation of Keys
21
Secure Data Aggregation Schemes
21
SDAKM Scheme
22
Secure Data Aggregation Scheme
23
Efficient Key Management Scheme
23
Performance Evaluation
24
Security Analysis of IHC
24
Security Analysis of Key Management Scheme
25
Conclusion
27
References
27
Data Security in Local Area Network Based on Fast Encryption Algorithm
29
Introduction
29
Review on the Symmetrical-Encryption Algorithms
30
The New Symmetrical Algorithm
32
Key Generation
32
Encryption
34
Decryption
35
Applications
35
The Results
41
Conclusion
43
References
44
Fuzzy Rule-Base Based Intrusion Detection System on Application Layer
45
Introduction
45
Architecture of the Fasids
46
Fuzzy Component for Non-intrusive Traffic
47
Working of Fuzzy Cognitive Mapper in Ids
47
Fuzzy Associative Memory by Fuzzy Rules
48
Algorithm for Fuzzy Intrusion Detection System
49
Results and Analysis
51
Conclusion
53
References
53
Trust Models in Wireless Sensor Networks: A Survey
55
Introduction
55
Security in WSNs
56
Notion of Trust
57
Trust in Sensor Networks
58
References
60
Load Balancing in Distributed Web Caching
65
Introduction
65
Issues
66
Solutions
67
Desirable Properties of Distributed Web Caching
67
Fast access
67
Robustness
67
Transparency
67
Scalability
67
Efficiency
68
Adaptivity
68
Stability
68
Load balancing
68
Simplicity
68
Problems in Distributed Web Caching
68
Extra Overhead
68
Size of Cache
68
Cache Coherence Problem
68
Scalability
68
Proposed Solution for Distributed Web Caching
68
The Proposed Caching System
69
Structure of Network
69
Proposed Architecture
69
Proposed Algorithm
70
Conclusions
72
References
72
TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups
73
Introduction
73
Related Work
74
Notations and Terminology
75
Broadcast Ring Based Group Communication
75
Join Protocol
75
Leave Protocol
76
Group Communication Using the Combination of Ring and Tree
77
Join Protocol
78
Leave Protocol
79
Analysis
81
Number of Keys at Each Member
81
Cost of Join
81
Cost of Leave
81
Conclusion
82
References
82
Image Classification for More Reliable Steganalysis
84
Introduction
84
Notations
85
Classification of Images for More Reliable Steganalysis
85
Experimental Results
89
Identification of Images Which Give Highly Inaccurate Results
89
Identification of Images Which Give Accurate Results
90
Conclusion
91
References
91
Security for High-Speed MANs/WANs
93
Introduction
93
Security Threats
95
Threat Identification
97
Security Concerns and TCP/ IP
98
Physical Security
99
Security Services and Mechanisms
99
Why a New Approach Is Needed
99
References
100
Behavioral Analysis of Transport Layer Based Hybrid Covert Channel
101
Introduction
101
Covert Communication
102
Importance of Covertness and Layers of Attack
103
Covert Channel Variants
104
Transport Layer Based Hybrid Covert Channel
105
NCT - SNCC Implementation
106
SCSL Implementation
108
Conclusion and Future Work
109
References
110
Efficient Encryption of Intra and Inter Frames in MPEG Video
111
Introduction
111
MPEG Coding Methodology
112
Video Security Algorithms
112
Proposed Encryption Method
114
Secret Sharing
114
Shamir’s Secret Sharing Scheme
115
Decryption of Intra and Inter Frames
116
Security Analysis
117
Key Space Analysis
117
Statistical Analysis
117
Experiments and Results
120
Conclusion
122
References
122
VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512
123
Introduction
123
SHA-512 Implementation
123
Preprocessing
124
Hash Computation
124
Proposed Model
126
Performance Analysis
129
Security Analysis
129
Conclusion
130
References
131
Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks
132
Introduction
132
Multicasting Protocols in MANET
133
Experimental Setup and Performance Metrics
135
Simulation Result
135
Conclusion and Future Work
138
References
140
A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks
141
Introduction
141
Security Attacks in MANET
142
Related Works
143
Other Related Work
144
The Proposed Scheme
144
Nature of Association between Neighbouring Nodes in an Ad Hoc Network
144
Association Estimator Technique
145
Routing Mechanism
145
Simulation Set Up
146
Results and Discussions
146
Conclusion
147
References
148
Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks
150
Introduction
150
Admission of Voice Calls Using Delay Analysis Method in Differentiated Services
151
Components of the Qos-Provisioning System
152
Design of a Call Admission Control Agent (CACA)
153
Utilization-Based Deterministic Delay Analysis
154
Utilization-Based Statistical Delay Analysis
155
Proposed Method for Securing ARP Cache Poisoning Attack
155
Secure ARP Request and Response between LAN
156
Experimental Results for Admission of Voice Calls Using Delay Analysis Method
157
Performance of Authenticated Voice User Admission Procedure in VOIP Network
157
Verification of Prevented ARP Cache Poisoning Attack Using MessageIntegrity and Message Authentication
158
Conclusion
159
References
160
Wireless Mesh Networks: Routing Protocols and Challenges
161
Introduction
161
Routing Layer Challenges
162
Routing Metrics
162
Hop Count
163
Blocking Metric
163
Expected Transmission Count (ETX)
163
Expected Transmission Time (ETT)
163
Routing Protocols
163
Optimized Link State Routing (OLSR) Protocol
164
Fish-Eye State Routing Protocol
164
Destination Sequenced Distance Vector (DSDV)
165
The Wireless Routing Protocol (WRP)
165
Clusterhead Gateway Switching Routing Protocol (CGSR)
165
Zone Based Hierarchical Link State Routing Protocol (ZHLS)
166
Ad Hoc On Demand Distance Vector Routing (AODV)
166
Temporally-Ordered Routing Algorithm- TORA
166
Dynamic Source Routing- DSR
167
Application Scenarios
167
Wireless Broadband Home Networking
168
Enterprise Networking
168
Broadband Community Networking
168
Conclusion
168
References
168
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification
170
Introduction
170
Two Approaches for Protocol Verification
170
Formal Verification of Security Protocols
171
Belief Logics
171
Theorem Proving Based Approaches
172
State Exploration
172
Model Checking Tools
173
Protocol Verification Using Scyther
177
Comparative Analysis of Formal Method Model Checking Tools
179
Conclusion
180
References
180
Secured Paradigm for Mobile Databases
182
Introduction
182
Related Works
183
Encryption
183
Issues
183
Architecture
184
Proposed Architecture
184
Server Side Security
186
Client Side Security
186
Security during Data Transmission
187
Advantages of the Proposed Architecture
187
Conclusion
188
References
188
Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks
190
Introduction
190
Cryptography for WSN
191
Need of Asymmetric Key Cryptosystem
192
Crypt Algorithms for WSN
192
RSA Algorithm
192
ELGAMAL Algorithm
194
Simulation Results
194
ELGAMAL Algorithm-Energy Diagram
195
RSA Algorithm-Energy Diagram
196
Comparison of RSA and ELGAMAL
197
Conclusion
197
References
198
Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET
199
Introduction
199
Related Work
200
Trust Based Multipath DSR
201
Route Discovery at Source Node
201
RREQ Processing at Intermediate Nodes
202
RREP at Destination Node
202
RREP Processing at Intermediate Nodes
202
Path Decision at Source Node
202
Extended - Trust Based Multi-path Dynamic Source Routing(E-TMDSR)
203
Discovery of Multiple Paths
203
Path Selection
203
Traffic Allocation
204
Route Maintenance
204
Security Analysis of E-TMDSR
204
Protection against Malicious Colluding Nodes
204
Black Hole and Gray Hole Attacks
205
Cache Poisoning
205
Performance Analysis of E-TMDSR
205
Metrics
205
Discussion of Results
205
Conclusions and Future Work
207
References
207
A Flow Based Slow and Fast Scan Detection System
209
Introduction
209
Related Work
210
ProposedSystem
211
Architecture
211
Detection Methods
213
Experiments
215
Test Set-Up
215
Result
215
Result Analysis
216
Fast Scan Detection
216
Slow Scan Detection
216
Conclusion
217
References
218
A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices
219
Introduction
220
Problems in the Traditional Method
220
Related Work
221
Authentication
222
Authentication Factors
222
Indirect Authentication
222
Proposed Authentication Scheme
223
Initial Phase
223
Registration Phase
223
Login Phase
223
Authentication Phase
224
Security Analysis of Our Scheme
225
Denial of Service Attack
225
Forgery Attack
225
Password Guessing Attack
225
Parallel Session Attack
225
Mutual Authentication
225
Security Analysis
225
Implementation Results and Discussions
226
Experimental Setup
227
Time Complexity
227
Energy Requirements
228
Conclusion
230
References
230
Concurrent Usage Control Implementation Verification Using the SPIN Model Checker
232
Introduction
232
Related Work
233
Overview of Software Model Checking
234
The SPIN Model Checker
234
Concurrent Usage Control Authorization Implementation Verification
234
Verification Using the SPIN
235
Case Study
236
Safe Usage Control Authorization Model Design
236
Usage Control Implementation Verification
237
Conclusion
240
References
240
Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory
242
Introduction
242
AES (Advanced Encryption Standard)
243
Pipelining of AES Encryption
243
Search Based Memory
244
Pipelining of Key Schedule Algorithm
245
Pipelined Architecture for Key Expansion Module
245
Comparison of Hardware Utilization
245
Conclusion
248
References
248
A SAT Based Verification Framework for Wireless LAN Security Policy Managemen Supported by STRBAC Model
250
Introduction
250
Related Work
251
WLAN Security Policy Management System
252
Proposed Spatio-temporal RBAC Model for WLAN Policy Management
253
Modeling Basic RBAC Entities in the Proposed System
254
Modeling of Global Policy
255
SAT Based Security Property Verification
256
Boolean Modeling STRBAC Entities and Policy Configurations
256
SAT Solver and SAT Query Formulation
257
Conclusion
258
References
258
Detection and Classification of DDoS Attacks Using Fuzzy Inference System
260
Introduction
260
Review of Literature
261
System Architecture
262
Anomaly Detection Dataset
263
Alert Generation
263
Alert Preprocessing
263
Alert Classification Using Fuzzy Inference System
265
Implementation Details
266
Results and Discussion
267
Key Findings of the Research
269
Conclusion
269
References
270
Detection and Recognition of File Masquerading for E-mail and Data Security
271
Introduction
271
Problem Definition
272
Design Goals
272
File Type Detection Methods
272
Literature Survey
274
Byte Frequency Distribution Techniques
274
Metric Based Techniques
275
Proposed Technique
275
File Header/Trailer Analysis
276
Multiple Discriminant Analysis/Compound File Type Detection
277
Tested Environment
277
Conclusion
278
Future Work
279
References
279
Privacy Preserving Mining of Distributed Data Using Steganography
281
Introduction
281
Related Works
283
Proposed Approach: Steganography
284
Conclusions
286
References
286
First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P
288
Proxy Re-signature Scheme That Translates OneType of Signature Scheme to Another Type of Signature Scheme
288
Introduction
288
Definition of Proxy Re-signature Scheme
289
Proxy Re-signature Scheme to Translate One Type of Signature Scheme to Another Type
290
Schnorr Signature Scheme to RSA Signature Scheme
290
ElGamal Signature to RSA Signature Scheme
292
Proxy Signer Revocation
294
Properties of the New Proxy Re-signature Schemes
295
Security of Our Schemes
295
Conversion of One Type of Signature to Another Type:Applications
296
Conclusion
296
References
297
Efficient Region-Based Key Agreement for Peer -to - PeerInformation Sharing in Mobile Ad Hoc Networks
298
Introduction
298
Proposed Scheme
299
System Model
299
Network Dynamics
301
Communication Protocol
303
Applying Elliptic Curve Based Diffie-Hellman Key Exchange
304
Tree-Based Group Elliptic Curve Diffie-Hellman Protocol
306
Experimental Results and Discussion
308
Searching for Information [4,5,6]
308
Normal Search
309
Content Search
309
Performance Analysis
310
Storage Overhead
311
Communication Overhead
312
Computation Overhead
312
Conclusion and Future Work
313
References
313
A Power Adjustment Approach for Multi-channelMulti-AP Deployment Using Cognitive Radio Concept
314
Introduction
314
Related Work
315
The Proposed Approach
315
Algorithm for Power Adjustment
318
Conclusion
318
References
319
Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise
320
Introduction
320
Related Work and Our Approach
321
Related Work
321
Our Unique Contributions
323
System Model
323
Protecting P2P Networks
325
Conscience Filters
325
Content Poisoning
326
Audit Trails
327
Circumventing Trust-Based Systems
327
Result Analysis
327
Creating Real-World Conscience
329
Conclusions and Future Work
330
References
330
Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks
332
Introduction
332
Heuristic Cognitive Approach for IEEE 802.11 WLAN
333
IEEE 802.11 Architecture
333
Cognitive Radio
334
Proposed Heuristic Model
335
802.11 Based Cognitive Radio Network
337
Operation Principles of the System
337
Overview of IEEE 802.11 DCF
338
Proposed 802.11 Based Cognitive Design Spectrum Sensing
339
Conclusion
340
References
340
Privacy Layer for Business Intelligence
341
Introduction
341
Preserving Privacy
342
Our Approach
343
The Privacy Layer
344
Components of Privacy Layer
344
Conclusion
346
References
347
Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm
349
Introduction
349
Overview of Existing Backoff Algorithms
351
Proposed Probability Based Backoff Algorithm
352
Comparative Analysis of BEB Algorithm, MBEB Algorithm and Proposed PBB Algorithm
353
Conclusion
356
References
356
Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing
358
Introduction
358
Related Work
359
Our Scheme
360
Setup Phase
360
SLA Details
360
Exposure Window
360
End of SLA Period
361
Destructor
361
Verifier
363
Proof of Destruction/Proof of Erasability
364
Analysis of Our Scheme
364
Conclusion
365
References
366
A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies
367
Introduction
367
Related to This Work
368
Identity Management – A Survey
368
Selection of Vendors for the Survey
368
Selection of Evaluation Criteria
369
State-of-the-Art IdM Taxonomies
369
Review of Different IdMs
369
IBM Tivoli Identity Manager
369
Novell Identity Manager
370
Sun Java System Identity Manager
371
Oracle Identity Management
371
CA Identity Manager
372
Comparison Results
373
Future Work
375
Conclusion
375
References
375
BubbleTrust: A Reliable Trust Management for Large P2P Networks
377
Introduction
377
BasicConcept
378
Calculation
379
Basic Algorithm
382
Data Management
384
Provider and Evaluator Function
385
Optimized Algorithms
387
Algorithm with Cutting Off
387
Limiting Depth
388
Using Values from Previous Runs
388
Evaluation and Data Analysis
389
Conclusion and Future Work
390
References
391
Dynamic Policy Adaptation for Collaborative Groups
392
Introduction
392
System Model
394
Peer Behavior and Roles
394
Change of Roles
395
Detailed Working of the Framework
395
Group Discovery and Advertisement
396
Admission Request
396
Authentication
397
Key Management
397
PDTBAC- Policy Driven Trust Based Access Control for P$_2$P Applications
397
Trust Model in Presence of Malicious Peers
400
Context Sensitive Layered Reputation Model
401
Design of Trust Model
402
Modeling Dynamic Policies Using Prolog
403
Modeling Rules for Join
403
Modeling Rules for Level Update
403
Modeling Dynamic Rules
404
Overall Working of Framework with Prolog
404
Application Framework
404
Peer Behavior
405
Implementation Details
405
Simulations and Graphs
406
Related Work
410
Conclusion
411
References
411
A Deviation Based Outlier Intrusion Detection System
413
Introduction
413
Intruder
413
Intrusion
414
Intrusion Detection
414
IDS Classification
414
Contemporary Research
415
Proposed Approach
415
Approach
415
Model
415
Conclusion and Future Works
419
References
419
Privacy Preserving Ciphertext Policy Attribute Based Encryption
420
Introudction
420
Our Contribution
421
Related Work
421
Preliminaries
422
Bilinear Maps
422
Access Structure
422
Ciphertext Policy Attribute Based Encryption
423
Security Model for CP-ABE
423
Construction
424
Security Analysis
425
Conclusion
426
References
427
Reliable Timeout Based Commit Protocol
428
Introduction
428
Proposed Solution: Reliable Timeout Based Commit Protocol
429
Transaction Execution at MH
430
Transaction Execution at Coordinator i.e. at BS
432
Recovery Model
433
Performance Analysis of Reliable Timeout Based Commit Protocol
434
Results
436
Conclusion and Future Work
436
References
436
Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
438
Introduction
438
IoT Objectives
439
Naming and Addressing
439
Device Discovery and Network Discovery
439
Content and Service Access
439
Communication
440
Security and Privacy
440
Security Requirements
440
Key Properties of IoT
440
Challenges
441
High Level Security Requirements
441
Security and Threat Taxonomy for IoT
442
Related Work
443
Identity Certificate Frameworks
444
Single Sign-On
444
Identity Federation
444
User-Centric Identity Management
444
Device Security
445
Proposed Security Model for IoT
445
Conclusion
445
References
446
Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges
448
Introduction
448
Architectural Framework and Design Constraints
449
Identity Management
450
Related Work
451
OpenId
451
Liberty Alliance
452
Card-Space
452
Shibboleth
452
Higgins
452
Identity Modeling and Requirement Matrix
453
Proposed IdM Framework
455
Conclusion
456
References
456
Reputation Enhancement in a Trust Management System
458
Introduction
458
Related Work
459
Extended TUX-TMS Model
460
Architecture of TUX-TMS
460
Parameters
460
Partitioning of the Users
464
Results and Discussion
465
Performance against Malicious Users
466
Performance in a Distributed Environment
467
Conclusion
467
References
468
A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks
470
Introduction
470
Usage Scenario and Functional Requirements
471
The A-Code Primitive
472
The Experimental Platform
474
Experimental Results
476
Related Work
479
Conclusions and Future Work
479
References
480
Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks
481
Introduction
481
Related Work
482
Description of the Reliability-based Source Routing Protocol
483
Motivation
483
Attack Model
483
Reliability Metric Table and Beacon Broadcasts
484
Reliability Metric of a Path
485
Sequence of Steps for the RSR Protocol
485
Logic behind the Use of the Probe Packet and the Public Key Certificate
487
RSR Route Maintenance
487
Increment vs. Decrement Costs
487
Conclusions and Future Work
489
References
489
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
491
Introduction
491
Attacks on Vehicular Networks
492
Sybil Attack and Classification
492
Simulation of Sybil Attack in VANET
493
Simulation Parameters and Performance Metrics
494
Simulation Results
495
Related Work of Sybil Attack Detection
498
Proposed Sybil Attack Detection Technique for VANETs
498
Conclusions
499
References
500
Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis
501
Introduction
501
Related Work
502
Proposed Methodology
502
Conclusion and Limitations
506
References
507
Knowledge Base Compound Approach towards Spam Detection
508
Introduction
508
Spammer Approaches and Their Attack
510
Related Work
511
Proposed Methodology
511
Implementation and Analysis
513
Conclusion and Limitation
516
References
516
Trust Management Framework for UbiquitousApplications
518
Introduction
518
Security Approach for Typical Ubiquitous Applications
519
Related Work
520
Proposed Architecture for Trust Management Framework
521
Trust Value Calculation Using Inference Engine
523
Conclusion and Future Work
525
References
525
A Hybrid Address Allocation Algorithm for IPv6
527
Introduction
527
Existing IPv6 Address Allocation Algorithms
528
Bisection Allocation Algorithm
528
Rate-Sparse Allocation Algorithm
529
Existing Proposals on IPv6 Address Allocation Algorithms
530
Growth-based Address Partitioning Algorithm (GAP)
530
Common Address Pool (CAP)
531
Proposed Hybrid IPv6 Address Allocation Algorithm
532
Evaluation
533
Conclusion
534
References
534
Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols
536
Introduction
536
Related Literature Reviews
538
Proposed Model of Efficient and Dynamic Probabilistic Broadcasting Algorithm (EDPB)
539
Simulation Experimental Setup and Performance Metrics
540
Result Analysis
541
Conclusions
544
References
544
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network
546
Introduction
546
Related Work
547
AODV and Modeling of the State Machine
548
Finite State Machine Model
548
The Proposed Algorithm
550
The Features of the Algorithm
550
The Detection Algorithm
551
Simulation Results
553
Conclusion and Future Work
554
References
555
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks
556
Introduction
556
Related Work
557
Trust Manager
558
The Monitoring Module
558
The Reputation Handling Module
558
Simulation
562
Conclusion
564
References
564
Towards Designing Application Specific Trust Treated Model
566
Introduction
566
Motivation
567
Literature Review
568
Trust Models
568
Aspect-Oriented Methodologies
569
Trust Treated Model
570
Overview
570
Trust Modeling Process
570
Reputation Service - A Running Example
572
Conclusions and Future Work
573
References
574
First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010
576
Security for Contactless Smart Cards Using Cryptography
576
Introduction
576
Methodology and Architecture
578
Implementation and Result
580
Evaluation and Limitations
581
Future Enhancements
583
Conclusion
584
References
584
A Novel Approach for Compressed Video Steganography
585
Introduction
585
Architecture
586
Embedding and Extraction Mechanism
587
Embedding Position Selection
587
Compressed Video Steganographic Algorithm
588
Adaptive Rules to Reduce Distortion
589
Pseudo-random Dithering
589
The Embedding Algorithm
590
The Extraction Algorithm
591
Experimental Result
591
Capacity and PSNR
591
Conclusion
593
References
593
Privacy Preserving Data Mining by Cyptography
594
Introduction
594
Privacy Preserving
595
Cryptography: Oblivious Transfer
595
Two Party Case
596
Two Multi Party Case
597
Conclusion
599
References
600
A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure
601
Introduction
601
Proposed Framework
602
Proposed Algorithm
603
Analysis of Proposed Framework
604
Mining of Association Rules for Dense Dataset
605
Hyper-Linked Data Structure on Sparse Datasets
607
Performance Study and Experimental Results
609
Conclusion and Future Wok
610
References
610
Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm
611
Introduction
611
Related Work
612
Proposed Approach
613
Approach Decomposition
613
Algorithm
614
Results and Discussion
617
Conclusion
619
References
619
Design and Implementation of Pessimistic Commit Protocols in Mobile Environments
621
Introduction
621
Mobile Database System
622
Pessimistic Commit Protocols
623
Architecture of Mobile Transaction Management System
623
Mapping Functionality to Architecture
624
Design and Implementation of Pessimistic Commit Protocols
625
Mobility Management in Pessimistic Protocols
628
Data Structures
629
Conclusion
630
References
630
On Analyzing the Degree of Coldnessin Iowa, a North Central Region,United States: An XML Exploitation in Spatial Databases
631
Introduction
631
Approach
633
NC94 Dataset
633
Canonical Storage for XML (CanStoreX)
634
Common GUI
636
ParaSQL Query
637
Color Coding Scheme
638
Formulation
639
Algorithm to Calculate the Degree of Coldness
639
Model to Calculate the Darkness
640
Results
641
Related Work
641
Conclusion and Future Work
641
References
642
Implementation of MPEG-7 Document Management System Based on Native Database
643
Introduction
643
Related Works
644
MPEG-7 Data Clustering
645
Design of MDMS
646
General Structure of MDMS
647
Schema Management Subsystem
647
Document Management Subsystem
648
Implementation of MDMS
648
Implementation Environment
648
MDMS Packages
649
Storage Structure
649
Comparison of MPEG-7 Document Clustering Method
649
Conclusions and Future Work
651
References
652
Author Index
653
All prices incl. VAT