Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Physical Sciences and Mathematics

Swindew-A P2p-Based Decentralized Workflow Management System, Jun Yan, Y. Yang, G. K. Raikundalia Dec 2012

Swindew-A P2p-Based Decentralized Workflow Management System, Jun Yan, Y. Yang, G. K. Raikundalia

Dr Jun Yan

Workflow technology undoubtedly has been one of the most important domains of interest over the past decades, from both research and practice perspectives. However, problems such as potential poor performance, lack of reliability, limited scalability, insufficient user support, and unsatisfactory system openness are largely ignored. This research reveals that these problems are mainly caused by the mismatch between application nature, i.e., distributed, and system design, i.e., centralized management. Therefore, conventional approaches based on the client-server architecture have not addressed them properly so far. The authors abandon the dominating client-server architecture in supporting workflow because of its inherent limitations. Instead, the …


Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan Dec 2012

Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan

Dr Jun Yan

Advanced Access model has been introduced in general practice in the United States to improve patient access to primary health care services for more than ten years. It has brought in the benefits of eliminating service provider’s waiting lists, improving patients’ timely access to services and reducing no-show rate. However, to implement this model, practices need to collect relevant information, develop contingency plans and set up practice strategies to balance the provision of care and patient’s demand. These tasks are not always easy to achieve. Understanding the requirements and constraints for effective management of patient booking is essential for developing …


Towards Dynamic Formation Of Temporal Constraints For The Service Level Agreements Negotiation, Azlan Ismail, Jun Yan, Jun Shen Dec 2012

Towards Dynamic Formation Of Temporal Constraints For The Service Level Agreements Negotiation, Azlan Ismail, Jun Yan, Jun Shen

Dr Jun Yan

SLAs play an important role for the QoS-driven service composition. Meanwhile, the temporal constraints are one of the main elements in the management of SLA especially in specifying the validity period of the QoS offers. In practice, the temporal constraints should be generated dynamically by taking the resource capability of the provider into account. The generation should consider various parameters that influence the resource capability such as the expected duration of the required Web service, the amount of current utilization, the amount of available resources, the number of required time slots, etc. Therefore, this paper aims to elaborate this issue …


Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong Dec 2012

Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong

Dr Jun Yan

How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that allows a data source to be accessed by multiple parties who hold different rights. We ensure that the database remains secure, while some selected data sources can be securely shared with other authorized parties.


New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i. e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption …


Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu Dec 2012

Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu

Dr Jun Yan

The goal of federated identity management is to allow principals, such as identities and attributes, to be shared across trust boundaries based on established policies. Since current Single Sign-On (SSO) mechanism excessively relies on the specifications of Circle of Trust (CoT), the need for service collaboration from different domains is being addressed on CoT. For the motivating issue of the cross-domain SSO mechanism, we need an emergent dynamic trust list for calculating the trust parties, thus, the CoT specifications require an initial effort on enrolling members automatically to adapt to the dynamic open environment. In this paper, we propose a …


Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang Dec 2012

Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang

Dr Jun Yan

As more and more organisations and institutions are moving towards the e-learning strategy, more and more disparate data are distributed by different e-learning systems. How to effectively use this vast amount of distributed data becomes a big challenge. This paper addresses this challenge and works out a new mechanism to implement data integration for e-learning. A workflow management system based (WFMS-based) data integration model is contributed to the e-learning.


A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan Dec 2012

A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan

Dr Jun Yan

A peer-to-peer (p2p) based service flow management system, SwinDeW-S, could support decentralised Web service composition, deployment and enactment. However, traditional workflow definition languages, such as extended XPDL and service-oriented BPEL4WS, have become insufficient to specify business process semantics, especially the descriptions of inputs, outputs, preconditions and effects. In this paper, we propose a novel solution based on OWL-S, a semantic Web ontology language that leverages service discovery, invocation and negotiation more effectively. The enhanced SwinDeW-S architecture is adapted with advanced ontology-based service profiles, and it takes advantage of a well-developed profile generation tool, which translates the BPEL4WS process models to …


Efficient Oblivious Transfers With Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

Efficient Oblivious Transfers With Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

Oblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from the sender without releasing anything about his choices. OT can be used to protect user’s privacy. In principle, any user can interact with a server to request some services. This might allow some undesirable users to obtain services from the server. How to ensure that only the authorized receivers can obtain services obliviously is a daunting task. In this paper, we introduce oblivious signature based-on envelope (OSBE) to OT and propose two novel OT schemes, which only allow the legitimate receivers to obtain services obliviously. The …


Location-Based Services In Emergency Management- From Government To Citizens: Global Case Studies, A. Aloudat, Katina Michael, Jun Yan Dec 2012

Location-Based Services In Emergency Management- From Government To Citizens: Global Case Studies, A. Aloudat, Katina Michael, Jun Yan

Dr Jun Yan

In emergencies governments have long utilised broadcasting media like radio and television to disseminate up-to-date real-time information to citizens. In the same context, however, some other technologies like mobile location-based services have not been utilised to full extent or potential. The value of such services could be foreseen in the case of critical situations where the coordination of emergency management procedures with location-awareness activities is paramount. This paper tracks the introduction of location-aware services in the realm of emergency management. It investigates case studies where text messaging has been exploited to deliver safety information and early warnings to users based …


Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the required attributes and (iii) there are no efficient verification algorithms for the secret keys. These drawbacks limit the use of ABS in practice. In this paper, we propose an attribute-based oblivious access control (ABOAC) scheme to address these problems, …


Towards Collaborative Service Level Agreement Negotiation, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin Dec 2012

Towards Collaborative Service Level Agreement Negotiation, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin

Dr Jun Yan

A critical issue in the Service Level Agreement management for service composition is to control the relationship between the composite service and the component services in the negotiation. However, existing approaches are inefficient. This paper presents a novel agent-based collaborative approach to address this problem. We introduce a negotiation protocol, under which the agents on the service providers’ side collaborate by exchanging information with each other to gain global knowledge of the negotiation. The collaboration can facilitate the progress of the negotiation. We also discuss the corresponding impact on the decision making strategies.


A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan Dec 2012

A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan

Dr Jun Yan

"Although modern Smart Car technologies are growing rapidly, there are many challenges to be addressed. The limited processing capabilities of the contemporary in-car computers in smart cars may cause bottlenecks in smart control. The content in smart car applications can hardly be extended. In addition, the traditional software installation approach that is used in smart cars is neither economical nor convenient. To address these issues in smart cars, this paper presents a Cloud-based Information Integration Platform that has the ability to improve flexibility and enhance the value of smart cars. In this work, the architecture of the Cloud-based Information Integration …