- User Authentication and Security Systems
- Cryptographic Implementations and Security
- Wireless Communication Security Techniques
- Cloud Computing and Resource Management
- Software-Defined Networks and 5G
- Software System Performance and Reliability
- Advanced Authentication Protocols Security
- Advanced Steganography and Watermarking Techniques
- Privacy-Preserving Technologies in Data
Macau University of Science and Technology
2023
Chinese Academy of Sciences
2008
Institute of Computing Technology
2007
Grid system software is inherently complex, hard to build and maintain. In this paper, we propose a self- managing building block: Unit, which facilitates constructing with higher availability lower management overhead. We present an agent organization as autonomic framework, self-recovering protocol eliminate most of tough jobs from administrator's routines. The has been deployed on Dawning 4000A since 2004, the biggest node for China system. have done extensive experiments evaluate...
With the resurgence of virtualization technology, todaypsilas Internet data centers are shifting towards virtualized centers. applications tend to see dynamically varying workloads. To address problem performance management for multi-tier hosted in center, we propose a three-level automatic provisioning framework based on feedback control applications. Experiments demonstrate effectiveness our technique SLA guarantees while obtaining improved resource utilization.
The advent of 6G networks with their capabilities for massive communication and low latency presents opportunities a more intelligent way life. This paper proposes secure, flexible, decentralized data sharing approach, tailor-made the complexities networks. Building upon famous framework called Droplet, proposed approach furnishes users fine-grained access to time-series data, while maintaining overhead minimizing potential leakage. We spotlight an underlying vulnerability within Droplet...