64,793 research outputs found

    Verifying security protocols by knowledge analysis

    Get PDF
    This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols. The method can detect attacks and flaws involving interleaving sessions besides normal attacks. The implementation of the method in a generic theorem proving environment, namely Isabelle, makes the verification of protocols mechanical and efficient; it can verify a medium-sized security protocol in less than ten seconds. As an example, the paper finds the flaw in the Needham-Schroeder public key authentication protocol and proves the secure properties and guarantees of the protocol with Lowe's fix to show the effectiveness of this method

    The Impact of Bank and Non-Bank Financial Institutions on Local Economic Growth in China

    Get PDF
    This paper provides evidence on the relationship between finance and growth in a fast growing country, such as China.Employing data of 27 Chinese provinces over the period 1995-2003, we study whether the financial development of two different types of institutions - banks and non-bank financial institutions - have a (significantly different) impact on local economic growth.Our findings indicate that only banking development shows a statistically significant and economically relevant impact on local economic growth.growth;financial development;Chinese provinces;banks

    Information Sharing and Credit Rationing: Evidence from the Introduction of a Public Credit Registry

    Get PDF
    We provide the first evidence on how the introduction of information sharing via a public credit registry affects banks’ lending decisions. We employ a unique dataset containing detailed information on credit card applications and decisions from one of the leading banks in China. While we do not find that information sharing decreases credit rationing on average, the distribution of granted credit among borrowers with shared information has a unique pattern. In particular, compared to those with information reported only by this bank, borrowers with extra information shared by other banks receive higher credit card lines. While positive information shared by other banks augments lending of this bank, the effect of negative information shared by other banks is not significant. In addition, the availability of shared information through the Public Registry has mixed effects on how the bank utilizes internally produced information. Last, information sharing alleviates informational barriers in China’s credit card market, but not completely.information sharing;credit availability;credit rationing;credit card

    Survey of grid resource monitoring and prediction strategies.

    Get PDF
    This literature focuses on grid resource monitoring and prediction, representative monitoring and prediction systems are analyzed and evaluated, then monitoring and prediction strategies for grid resources are summarized and discussed, recommendations are also given for building monitoring sensors and prediction models. During problem definition, one-step-ahead prediction is extended to multi-step-ahead prediction, which is then modeled with computational intelligence algorithms such as neural network and support vector regression. Numerical simulations are performed on benchmark data sets, while comparative results on accuracy and efficiency indicate that support vector regression models achieve superior performance. Our efforts can be utilized as direction for building online monitoring and prediction system for grid resources

    Research on trust model in container-based cloud service

    Get PDF
    Container virtual technology aims to provide program independence and resource sharing. The container enables flexible cloud service. Compared with traditional virtualization, traditional virtual machines have difficulty in resource and expense requirements. The container technology has the advantages of smaller size, faster migration, lower resource overhead, and higher utilization. Within container-based cloud environment, services can adopt multi-target nodes. This paper reports research results to improve the traditional trust model with consideration of cooperation effects. Cooperation trust means that in a container-based cloud environment, services can be divided into multiple containers for different container nodes. When multiple target nodes work for one service at the same time, these nodes are in a cooperation state. When multi-target nodes cooperate to complete the service, the target nodes evaluate each other. The calculation of cooperation trust evaluation is used to update the degree of comprehensive trust. Experimental simulation results show that the cooperation trust evaluation can help solving the trust problem in the container-based cloud environment and can improve the success rate of following cooperation
    • 

    corecore