Root Administrator

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 597 Experts worldwide ranked by ideXlab platform

Hongbing Cheng - One of the best experts on this subject based on the ideXlab platform.

  • A Secure Data Access Mechanism for Cloud Tenants
    2015
    Co-Authors: Chunming Rong, Hongbing Cheng
    Abstract:

    Abstract—As the future big data storage center for tenants, cloud computing has been a hot issue recently, it consists of many large datacenters which are usually geographically distributed and heterogeneous, secure data access from cloud computing platform is a big challenge for cloud tenants. In this paper, we present a secure data access mechanism based on identity-based encryption and biometric authentication for cloud tenants. We review briefly about identity-based encryption and biometric authentication firstly and then we proposed a data access mechanism for cloud tenants, the mechanism set double protection for confidential data of cloud tenants, encryption will make the tenants data secure against the peekers and biometric authentication will eliminate the maloperations over tenants data by Root Administrator in cloud service. We compared the proposed mechanism with other technology and schemes through comprehensive analysis and experiment data; the results show that the proposed data access mechanism is feasible and suitable for cloud tenants. Keywords—Cloud computing; Big data center; Data access

  • A Secure Data Access Mechanism for Cloud Tenants
    2012
    Co-Authors: Chunming Rong, Hongbing Cheng
    Abstract:

    As the future big data storage center for tenants, cloud computing has been a hot issue recently, it consists of many large datacenters which are usually geographically distributed and heterogeneous, secure data access from cloud computing platform is a big challenge for cloud tenants. In this paper, we present a secure data access mechanism based on identity-based encryption and biometric authentication for cloud tenants. We review briefly about identity-based encryption and biometric authentication firstly and then we proposed a data access mechanism for cloud tenants, the mechanism set double protection for confidential data of cloud tenants, encryption will make the tenants data secure against the peekers and biometric authentication will eliminate the maloperations over tenants data by Root Administrator in cloud service. We compared the proposed mechanism with other technology and schemes through comprehensive analysis and experiment data; the results show that the proposed data access mechanism is feasible and suitable for cloud tenants. Keywords—Cloud computing; Big data center; Data access; Data security.

Chunming Rong - One of the best experts on this subject based on the ideXlab platform.

  • A Secure Data Access Mechanism for Cloud Tenants
    2015
    Co-Authors: Chunming Rong, Hongbing Cheng
    Abstract:

    Abstract—As the future big data storage center for tenants, cloud computing has been a hot issue recently, it consists of many large datacenters which are usually geographically distributed and heterogeneous, secure data access from cloud computing platform is a big challenge for cloud tenants. In this paper, we present a secure data access mechanism based on identity-based encryption and biometric authentication for cloud tenants. We review briefly about identity-based encryption and biometric authentication firstly and then we proposed a data access mechanism for cloud tenants, the mechanism set double protection for confidential data of cloud tenants, encryption will make the tenants data secure against the peekers and biometric authentication will eliminate the maloperations over tenants data by Root Administrator in cloud service. We compared the proposed mechanism with other technology and schemes through comprehensive analysis and experiment data; the results show that the proposed data access mechanism is feasible and suitable for cloud tenants. Keywords—Cloud computing; Big data center; Data access

  • A Secure Data Access Mechanism for Cloud Tenants
    2012
    Co-Authors: Chunming Rong, Hongbing Cheng
    Abstract:

    As the future big data storage center for tenants, cloud computing has been a hot issue recently, it consists of many large datacenters which are usually geographically distributed and heterogeneous, secure data access from cloud computing platform is a big challenge for cloud tenants. In this paper, we present a secure data access mechanism based on identity-based encryption and biometric authentication for cloud tenants. We review briefly about identity-based encryption and biometric authentication firstly and then we proposed a data access mechanism for cloud tenants, the mechanism set double protection for confidential data of cloud tenants, encryption will make the tenants data secure against the peekers and biometric authentication will eliminate the maloperations over tenants data by Root Administrator in cloud service. We compared the proposed mechanism with other technology and schemes through comprehensive analysis and experiment data; the results show that the proposed data access mechanism is feasible and suitable for cloud tenants. Keywords—Cloud computing; Big data center; Data access; Data security.

L. Mueller - One of the best experts on this subject based on the ideXlab platform.

  • Competing DNS Roots- 1 Competing DNS Roots: Creative Destruction or Just Plain Destruction?
    2001
    Co-Authors: L. Mueller
    Abstract:

    The Internet Domain Name System (DNS) is a hierarchical name space that enables the assignment of unique, mnemonic identifiers to Internet hosts and the consistent mapping of these names to IP addresses. The Root of the domain name system is the top of the hierarchy and is currently managed by a quasi-private centralized regulatory authority, the Internet Corporation for Assigned Names and Numbers (ICANN). This paper identifies and discusses the economic and policy issues raised by competing DNS Roots. The paper provides a precise definition of Root-competition and shows that multiple Roots are a species of standards competition, in which network externalities play a major role. The paper performs a structural analysis of the different forms that competing DNS Roots can take and their effects on end-user compatibility. It then explores the policy implications of the various forms of competition. The thesis of the paper is that Root competition is caused by a severe disjunction between the demand for and supply of top-level domain names. ICANN has authorized a tiny number of new top-level domains (7) and subjected their operators to excruciatingly slow and expensive contractual negotiations. The growth of alternate DNS Roots is an attempt to bypass that bottleneck. The paper arrives at the policy conclusion that competition among DNS Roots should be permitted and is a healthy outlet for inefficiency or abuses of power by the dominant Root Administrator. Competing DNS Roots-

Milton Mueller - One of the best experts on this subject based on the ideXlab platform.

  • Competing DNS Roots: Creative Destruction or Just Plain Destruction?
    arXiv: Computers and Society, 2001
    Co-Authors: Milton Mueller
    Abstract:

    The Internet Domain Name System (DNS) is a hierarchical name space that enables the assignment of unique, mnemonic identifiers to Internet hosts and the consistent mapping of these names to IP addresses. The Root of the domain name system is the top of the hierarchy and is currently managed by a quasi-private centralized regulatory authority, the Internet Corporation for Assigned Names and Numbers (ICANN). This paper identifies and discusses the economic and policy issues raised by competing DNS Roots. The paper provides a precise definition of Root-competition and shows that multiple Roots are a species of standards competition, in which network externalities play a major role. The paper performs a structural analysis of the different forms that competing DNS Roots can take and their effects on end-user compatibility. It then explores the policy implications of the various forms of competition. The thesis of the paper is that Root competition is caused by a severe disjunction between the demand for and supply of top-level domain names. ICANN has authorized a tiny number of new top-level domains (7) and subjected their operators to excruciatingly slow and expensive contractual negotiations. The growth of alternate DNS Roots is an attempt to bypass that bottleneck. The paper arrives at the policy conclusion that competition among DNS Roots should be permitted and is a healthy outlet for inefficiency or abuses of power by the dominant Root Administrator.

Robert Montante - One of the best experts on this subject based on the ideXlab platform.

  • SIGCSE - Using Scapy in Teaching Network Header Formats: Programming Network Headers for Non-Programmers (Abstract Only)
    Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
    Co-Authors: Robert Montante
    Abstract:

    ntroductory computer networks courses often include descriptive coverage of the network protocol headers. A straightforward listing of the headers and their meanings can lead to questions like "Will this be on the test"? Programming exercises may involve selecting values for some aspects of a protocol but tend to abstract away the details, and depend on prior programming skills. In addition, campuses without dedicated network lab facilities may have limited ability to experiment with protocols on an existing institutional network. The Python-based Scapy package provides explicit, detailed control of the contents of header fields, and includes graphical visualization features that offer easy feedback. Programming ability is helpful but not necessary; the interactive Python environment permits step-by-step and guided exploration of the various protocols. Effective use of scapy requires Root (Administrator) privileges; a virtual machine environment such as that provided by Oracle VirtualBox allows complete control and access to the operating system. This talk is about scapy-based lab modules that the author is developing, which provide active, hands-on exposure to and manipulation of network headers. So far, a Transport-layer activity and a preliminary Link-layer activity have been written. The current activities will be discussed, along with ideas for additional modules.