Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Towards Trustworthy Coordination For Web Services Business Activities, Hua Chai, Hongle Zhang, Wenbing Zhao, P. M. Melliar-Smith, L. E. Moser May 2018

Towards Trustworthy Coordination For Web Services Business Activities, Hua Chai, Hongle Zhang, Wenbing Zhao, P. M. Melliar-Smith, L. E. Moser

Wenbing Zhao

We present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used to render the coordination of web services business activities (WS-BA) more trustworthy. The lightweight design of the BFT algorithm is the result of a comprehensive study of the threats to the WS-BA coordination services and a careful analysis of the state model of WS-BA. The lightweight BFT algorithm uses source ordering, rather than total ordering, of incoming requests to achieve Byzantine fault tolerant, state-machine replication of the WS-BA coordination services. We have implemented the lightweight BFT algorithm, and incorporated it into the open-source Kandula framework, which implements …


Spe: Security And Privacy Enhancement Framework For Mobile Devices, Brian Krupp, Nigamanth Sridhar, Wenbing Zhao May 2018

Spe: Security And Privacy Enhancement Framework For Mobile Devices, Brian Krupp, Nigamanth Sridhar, Wenbing Zhao

Wenbing Zhao

In this paper, we present a security and privacy enhancement (SPE) framework for unmodified mobile operating systems. SPE introduces a new layer between the application and the operating system and does not require a device be jailbroken or utilize a custom operating system. We utilize an existing ontology designed for enforcing security and privacy policies on mobile devices to build a policy that is customizable. Based on this policy, SPE provides enhancements to native controls that currently exist on the platform for privacy and security sensitive components. SPE allows access to these components in a way that allows the framework …


Scientific Programming Towards A Smart World, Wenbing Zhao, Xiong Luo, Huaping Liu, Kun Hua, Chaomin Luo May 2018

Scientific Programming Towards A Smart World, Wenbing Zhao, Xiong Luo, Huaping Liu, Kun Hua, Chaomin Luo

Wenbing Zhao

No abstract provided.


Low Latency Fault Tolerance System, Wenbing Zhao, P. M. Melliar-Smith, L. E. Moser May 2018

Low Latency Fault Tolerance System, Wenbing Zhao, P. M. Melliar-Smith, L. E. Moser

Wenbing Zhao

The Low Latency Fault Tolerance (LLFT) system provides fault tolerance for distributed applications within a local-area network, using a leader-follower replication strategy. LLFT provides application-transparent replication, with strong replica consistency, for applications that involve multiple interacting processes or threads. Its novel system model enables LLFT to maintain a single consistent infinite computation, despite faults and asynchronous communication. The LLFT Messaging Protocol provides reliable, totally-ordered message delivery by employing a group multicast, where the message ordering is determined by the primary replica in the destination group. The Leader-Determined Membership Protocol provides reconfiguration and recovery when a replica becomes faulty and when …


Concurrent Byzantine Fault Tolerance For Software-Transactional-Memory Based Applications, Honglei Zhang, Wenbing Zhao May 2018

Concurrent Byzantine Fault Tolerance For Software-Transactional-Memory Based Applications, Honglei Zhang, Wenbing Zhao

Wenbing Zhao

Typical Byzantine fault tolerance algorithms require the application requests to be executed sequentially, which may severely limit the throughput of the system considering that modern CPUs are equipped with multiple processing cores. In this paper, we present the design and implementation of a Byzantine fault tolerance framework for software-transactional-memory based applications that aims to maximize concurrent processing while preserving strong replica consistency. The approach is based on the idea of committing concurrent transactions according to the total order of the requests that triggered the transactions. A comprehensive performance evaluation is carried out to characterize the effectiveness and limitations of this …


A Survey Of Applications And Human Motion Recognition With Microsoft Kinect, Roanna Lun, Wenbing Zhao May 2018

A Survey Of Applications And Human Motion Recognition With Microsoft Kinect, Roanna Lun, Wenbing Zhao

Wenbing Zhao

Microsoft Kinect, a low-cost motion sensing device, enables users to interact with computers or game consoles naturally through gestures and spoken commands without any other peripheral equipment. As such, it has commanded intense interests in research and development on the Kinect technology. In this paper, we present, a comprehensive survey on Kinect applications, and the latest research and development on motion recognition using data captured by the Kinect sensor. On the applications front, we review the applications of the Kinect technology in a variety of areas, including healthcare, education and performing arts, robotics, sign language recognition, retail services, workplace safety …