3,078 research outputs found
Formal specification of human-computer interfaces
A high-level formal specification of a human computer interface is described. Previous work is reviewed and the ASLAN specification language is described. Top-level specifications written in ASLAN for a library and a multiwindow interface are discussed
An Architecture for Distributed Energies Trading in Byzantine-Based Blockchain
With the development of smart cities, not only are all corners of the city
connected to each other, but also connected from city to city. They form a
large distributed network together, which can facilitate the integration of
distributed energy station (DES) and corresponding smart aggregators.
Nevertheless, because of potential security and privacy protection arisen from
trustless energies trading, how to make such energies trading goes smoothly is
a tricky challenge. In this paper, we propose a blockchain-based multiple
energies trading (B-MET) system for secure and efficient energies trading by
executing a smart contract we design. Because energies trading requires the
blockchain in B-MET system to have high throughput and low latency, we design a
new byzantine-based consensus mechanism (BCM) based on node's credit to improve
efficiency for the consortium blockchain under the B-MET system. Then, we take
combined heat and power (CHP) system as a typical example that provides
distributed energies. We quantify their utilities, and model the interactions
between aggregators and DESs in a smart city by a novel multi-leader
multi-follower Stackelberg game. It is analyzed and solved by reaching Nash
equilibrium between aggregators, which reflects the competition between
aggregators to purchase energies from DESs. In the end, we conduct plenty of
numerical simulations to evaluate and verify our proposed model and algorithms,
which demonstrate their correctness and efficiency completely
Comparative Analysis of Data Security and Cloud Storage Models Using NSL KDD Dataset
Cloud computing is becoming increasingly important in many enterprises, and researchers are focusing on safeguarding cloud computing. Due to the extensive variety of service options it offers, A significant amount of interest from the scientific community has been focused on cloud computing. The two biggest problems with cloud computing are security and privacy. The key challenge is maintaining privacy, which expands rapidly with the number of users. A perfect security system must efficiently ensure each security aspect. This study provides a literature review illustrating the security in the cloud with respect to privacy, integrity, confidentiality and availability, and it also provides a comparison table illustrating the differences between various security and storage models with respect to the approaches and components of the models offered. This study also compares NaĂŻve Bayes and SVM on the accuracy, recall and precision metrics using the NSL KDD dataset
Recommended from our members
A practical mandatory access control model for XML databases
A practical mandatory access control (MAC) model for XML databases is presented in this paper. The
label type and label access policy can be defined according to the requirements of different applications. In order to
preserve the integrity of data in XML databases, a constraint between a read-access rule and a write-access rule in
label access policy is introduced. Rules for label assignment and propagation are presented to alleviate the workload
of label assignments. Furthermore, a solution for resolving conflicts in label assignments is proposed. Rules for
update-related operations, rules for exceptional privileges of ordinary users and the administrator are also proposed
to preserve the security of operations in XML databases. The MAC model, we proposed in this study, has been
implemented in an XML database. Test results demonstrated that our approach provides rational and scalable
performance
- …