As Internet business exponentially grows, a need for the high security level categories that identify a group of connections or an individual transaction is manifest. Recently the development of efficient and secure software architecture has been in high demand. In this paper, we propose adaptive secure software architecture to support secure e-commerce transactions. Our adaptive secure software architecture dynamically adapts security classes based on the nature and sensitivity of interactions among participants. Four security classes incorporate security levels of cryptographic techniques with a degree of information sensitivity. We have done extensive experiments on the performance of the proposed adaptive secure software architecture. Experimental results show that our adaptive secure software architecture provides e-commerce transactions with high-quality security services.
In this paper we simplify the 4.4BSD TCP/IP protocol suite, in support of the design and implementation of embedded high performance communication software. Perfonnance is achieved by employing a jlat memory model. The jlat memory model does not require protection between user mode and kernel mode. This model corresponds to the environment of current embedded systems.
Additionally, we validate a technique called DAP (Direct Access Packet-handler) to improve the performance of processing the upward jlow of packets from the network interface to the network protocol layer in the communicationssoftware. An summary of communication software on some commercial real-time OS is presented here. The structure of communication software in VRTX, which is implemented by modifying the 4.3 BSD TCP/IP protocol suite, is a two-level packet processing mechanism based on IPC using a mailbox to provide communication between the hardware interrupt-handler and packet processing-task. It uses interrupt enable and disable techniques to support the synchronization to access to shared data. The remaining structure of communication software is similar to the 4.3BSD TCP/IP protocol suite.The communication software of VXWORKS is also implemented by modifying the 4.3BSD TCP/IP protocol suite. It uses a semaphore to support synchronization to access shared data. The rest of its structure is similar to the 4.3 BSD TCP/IF' protocol suite except that managing the resources in the communication the monopoly of resources by tasks accessing the protocol layers in communication software. However the fair policy can degrade the performance of communication software when it supports multimedia services requiring real-time and high-speed because it causes frequent context switching and redundant task rescheduling of tasks that want to access the resources of the communications software. We found out the cost to pass the packet received by the network adapter to the correspondent task is expensive under this mechanism.I i Figure 6 . Structure of direct access packet-handler 6. Experiments and Results 6.1. Development environment for the implementation of communication software Figure 7 shows the environment for the development of communication software and embedded OS. The embedded OS and communication software are implemented by the gnu c compiler, gcc-2.6.1, under the FreeBSD 2.2.8. The FreeBSD 2.2.8 bootstrap is used to load and run the embedded OS kemel and communication software. For I/O, serial communication is used to verify the operational result of the kernel and communication software. This I/O environment is implemented by the YO subsystem of the embedded OS kemel which provides serial communication and the dual console mode of FreeBSD 2.2.8. With this approach, we tested the communication performance of FreeBSD2.2.8 and our own communication software in same development environment as (A) shown in Figure 7.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.