I
nte
rna
t
io
na
l J
o
urna
l o
f
Adv
a
nces in Applie
d Science
s
(
I
J
AAS)
Vo
l.
4
,
No
.
1
,
Ma
r
ch
2
0
1
5
,
p
p
.
13
~
23
I
SS
N:
2252
-
8814
13
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
J
AAS
Platfor
m
-
as
-
a
-
Ser
v
ice (
Paa
S)
:
M
o
d
el and Sec
urity Is
sues
Dev
i T,
G
a
nes
a
n R
S
c
h
o
o
l
o
f
Co
m
p
u
ti
n
g
S
c
ien
c
e
a
n
d
En
g
i
n
e
e
rin
g
,
V
IT
Un
iv
e
rsit
y
,
Ch
e
n
n
a
i,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Dec
1
5
,
2
0
1
4
R
ev
i
s
ed
Feb
2
,
2
0
1
5
A
cc
ep
ted
Feb
2
2
,
2
0
1
5
Clo
u
d
c
o
m
p
u
ti
n
g
is
m
a
k
in
g
a
b
ig
re
v
o
lu
ti
o
n
i
n
th
e
f
ield
o
f
i
n
f
o
rm
a
ti
o
n
tec
h
n
o
l
o
g
y
th
e
re
b
y
re
d
u
c
in
g
c
a
p
it
a
l
e
x
p
e
n
d
it
u
re
s
sp
e
n
t.
C
o
m
p
u
ti
n
g
is
d
e
li
v
e
re
d
a
s
a
se
rv
ice
e
n
a
b
li
n
g
e
ffe
c
ti
v
e
u
ti
li
z
a
ti
o
n
o
f
c
o
m
p
u
tati
o
n
a
l
re
so
u
rc
e
s.
Ce
rtain
se
c
u
rit
y
issu
e
s
e
x
ist
w
h
ich
p
re
v
e
n
ts
in
d
iv
id
u
a
ls
a
n
d
in
d
u
stries
f
ro
m
u
sin
g
c
lo
u
d
s
d
e
sp
it
e
it
s
a
d
v
a
n
tag
e
s.
Re
so
lv
in
g
su
c
h
p
ro
b
lem
s
m
a
y
in
c
re
a
s
e
th
e
u
sa
g
e
o
f
c
lo
u
d
th
e
re
b
y
re
d
u
c
in
g
th
e
a
m
o
u
n
t
sp
e
n
t
f
o
r
re
so
u
rc
e
s.
T
h
e
p
a
p
e
r
f
o
c
u
se
s
o
n
o
n
e
o
f
th
e
th
re
e
se
rv
ice
d
e
li
v
e
r
y
m
o
d
e
ls,
P
latf
o
rm
-
as
-
a
-
S
e
r
v
ice
(P
a
a
S
).
P
a
a
S
m
o
d
e
l,
la
y
e
rs
in
P
a
a
S
a
n
d
P
a
a
S
p
ro
v
id
e
rs
a
re
d
e
sc
rib
e
d
a
lo
n
g
w
it
h
th
e
se
c
u
rit
y
issu
e
s
e
n
c
o
u
n
tere
d
i
n
P
a
a
S
c
l
o
u
d
s
.
T
h
e
issu
e
s
a
lo
n
g
w
it
h
so
l
u
ti
o
n
s
d
isc
u
ss
e
d
p
ro
v
id
e
a
n
i
n
sig
h
t
i
n
t
o
P
a
a
S
se
c
u
rit
y
f
o
r
b
o
th
p
ro
v
id
e
rs
a
n
d
u
se
rs
wh
ich
m
a
y
h
e
lp
in
f
u
tu
re
P
a
a
S
d
e
sig
n
a
n
d
im
p
le
m
e
n
tatio
n
.
K
ey
w
o
r
d
:
E
n
cr
y
p
tio
n
I
n
ter
o
p
er
ab
ilit
y
Mu
lti
-
te
n
an
c
y
T
r
u
s
ted
co
m
p
u
t
in
g
b
ase
V
ir
tu
aliza
t
io
n
Co
p
y
rig
h
t
©
201
5
In
s
t
it
u
te
o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Dev
i T
,
Sch
o
o
l o
f
C
o
m
p
u
ti
n
g
Scie
n
ce
an
d
E
n
g
in
ee
r
i
n
g
,
VI
T
Un
iv
er
s
it
y
,
C
h
e
n
n
ai,
I
n
d
ia
.
E
m
ail:
d
ev
i.j
an
u
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
Ou
ts
o
u
r
cin
g
o
f
co
m
p
u
tat
io
n
al
r
eso
u
r
ce
s
is
p
o
s
s
ib
le
w
i
th
t
h
e
ad
v
en
t
o
f
clo
u
d
co
m
p
u
ti
n
g
(
Kau
f
m
a
n
,
2
0
0
9
)
.
Sh
ar
in
g
o
f
r
eso
u
r
ce
s
r
ed
u
ce
s
ca
p
ital
ex
p
en
d
it
u
r
e
m
a
k
in
g
i
t
f
o
r
eseen
(
C
atted
d
u
an
d
Ho
g
b
en
,
2
0
0
9
)
an
d
ca
n
b
e
o
b
s
er
v
ed
as
r
is
in
g
tr
en
d
.
Su
ch
s
h
ar
i
n
g
o
f
r
eso
u
r
ce
s
m
a
y
ca
u
s
e
ce
r
tai
n
s
ec
u
r
it
y
is
s
u
es
d
esp
ite
o
f
v
ast
ad
v
an
ta
g
es
o
f
clo
u
d
lik
e
b
ette
r
u
tili
za
tio
n
o
f
r
eso
u
r
ce
s
,
lea
s
t
ti
m
e
ta
k
en
i
n
d
ep
lo
y
i
n
g
n
e
w
s
er
v
ices
a
n
d
s
o
o
n
.
T
h
r
ee
w
a
y
s
(
S
u
b
as
h
in
i
an
d
K
av
it
h
a,
2
0
1
1
)
to
d
eliv
er
clo
u
d
co
m
p
u
ti
n
g
ca
p
ab
ilit
ies
(F
ig
u
r
e
1
)
ar
e
So
f
t
w
ar
e
as
a
Ser
v
ice
(
SaaS)
,
P
latf
o
r
m
as
a
Ser
v
ice
(
P
aa
S)
an
d
I
n
f
r
astr
u
ctu
r
e
as a
Ser
v
ice
(
I
aa
S).
C
h
ar
ac
ter
is
tics
o
f
clo
u
d
ar
e
o
n
-
d
e
m
a
n
d
s
el
f
-
s
er
v
ice,
b
r
o
ad
n
et
w
o
r
k
ac
ce
s
s
,
r
eso
u
r
ce
p
o
o
lin
g
,
r
ap
id
elasticit
y
a
n
d
m
ea
s
u
r
ed
s
er
v
ice.
T
h
e
v
ar
io
u
s
d
ep
lo
y
m
e
n
t
m
o
d
els
i
n
cl
u
d
e
p
r
iv
ate,
p
u
b
lic,
h
y
b
r
id
a
n
d
co
m
m
u
n
it
y
c
lo
u
d
(
T
ab
le
1)
.
Fig
u
r
e
1
.
S
er
v
ice
d
eliv
er
y
m
o
d
els in
C
lo
u
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8814
IJ
AA
S
Vo
l.
4
,
No
.
1
,
Ma
r
ch
201
5
:
13
–
23
14
T
ab
le
1
.
Dep
lo
y
m
e
n
t
m
o
d
els i
n
C
lo
u
d
D
e
p
l
o
y
m
e
n
t
M
o
d
e
l
U
se
r
M
a
n
a
g
e
d
B
y
P
r
i
v
a
t
e
C
l
o
u
d
P
r
i
v
a
t
e
o
r
g
a
n
i
z
a
t
i
o
n
A
n
o
r
g
a
n
i
z
a
t
i
o
n
o
r
a
t
h
i
r
d
p
a
r
t
y
P
u
b
l
i
c
C
l
o
u
d
G
e
n
e
r
a
l
P
u
b
l
i
c
A
n
o
r
g
a
n
i
z
a
t
i
o
n
o
r
se
l
l
i
n
g
c
l
o
u
d
se
r
v
i
c
e
s
C
o
mm
u
n
i
t
y
C
l
o
u
d
S
h
a
r
e
d
b
y
se
v
e
r
a
l
o
r
g
a
n
i
z
a
t
i
o
n
s
a
n
d
s
u
p
p
o
r
t
s
a
s
p
e
c
i
f
i
c
c
o
mm
u
n
i
t
y
A
n
o
r
g
a
n
i
z
a
t
i
o
n
o
r
a
t
h
i
r
d
p
a
r
t
y
H
y
b
r
i
d
C
l
o
u
d
A
n
o
r
g
a
n
i
z
a
t
i
o
n
L
a
r
g
e
o
r
g
a
n
i
z
a
t
i
o
n
s
P
aa
S
p
lay
s
a
m
aj
o
r
r
o
le
in
clo
u
d
as
it
b
r
in
g
s
cu
s
to
m
s
o
f
t
w
ar
e
d
ev
elo
p
m
e
n
t
to
th
e
clo
u
d
.
NI
S
T
d
ef
in
e
s
P
aa
S
as
"
T
h
e
ca
p
ab
ili
t
y
p
r
o
v
id
ed
to
th
e
co
n
s
u
m
er
t
o
d
ep
lo
y
o
n
to
t
h
e
clo
u
d
i
n
f
r
as
tr
u
ctu
r
e
co
n
s
u
m
er
-
cr
ea
ted
o
r
ac
q
u
ir
ed
ap
p
licatio
n
s
cr
ea
ted
u
s
in
g
p
r
o
g
r
a
m
m
i
n
g
la
n
g
u
a
g
es a
n
d
to
o
ls
s
u
p
p
o
r
ted
b
y
t
h
e
p
r
o
v
id
er
"
.
I
n
1
9
9
0
s
,
d
esk
to
p
p
latf
o
r
m
s
(
o
p
er
atin
g
s
y
s
te
m
s
)
an
d
d
ev
elo
p
m
e
n
t
to
o
ls
ca
tap
u
lted
th
e
s
a
l
e
o
f
P
C
s
b
y
e
m
p
o
w
er
i
n
g
d
ev
elo
p
er
s
an
d
m
ak
in
g
P
C
s
ea
s
ier
to
u
s
e.
I
n
n
ea
r
f
u
tu
r
e,
P
aa
S
w
ill
d
r
iv
e
d
em
an
d
f
o
r
th
e
clo
u
d
in
s
i
m
ilar
w
a
y
s
.
P
aa
S
is
i
m
p
o
r
tan
t
as
it
s
p
ee
d
s
d
ev
elo
p
m
e
n
t
an
d
s
av
es
a
lo
t
o
f
m
o
n
e
y
.
A
cc
o
r
d
in
g
to
NI
ST,
“
P
aa
S
co
n
s
u
m
er
s
e
m
p
lo
y
t
h
e
to
o
ls
an
d
ex
ec
u
tio
n
r
eso
u
r
ce
s
p
r
o
v
id
ed
b
y
clo
u
d
p
r
o
v
id
er
s
to
d
ev
elo
p
,
test
,
d
ep
lo
y
an
d
m
a
n
a
g
e
th
e
o
p
er
atio
n
o
f
P
aa
S
ap
p
licatio
n
s
h
o
s
te
d
in
a
clo
u
d
en
v
ir
o
n
m
e
n
t.
P
aa
S
co
n
s
u
m
er
s
ca
n
b
e
ap
p
licatio
n
d
ev
elo
p
er
s
w
h
o
d
esig
n
a
n
d
i
m
p
le
m
en
t
ap
p
licatio
n
s
o
f
t
w
ar
e;
ap
p
licatio
n
test
e
r
s
w
h
o
r
u
n
an
d
tes
t
ap
p
licatio
n
s
in
a
c
lo
u
d
-
b
ased
en
v
ir
o
n
m
e
n
t;
ap
p
licatio
n
d
ev
elo
p
er
s
w
h
o
p
u
b
li
s
h
ap
p
lica
tio
n
s
i
n
to
th
e
c
lo
u
d
;
an
d
ap
p
licatio
n
ad
m
i
n
is
tr
ato
r
s
w
h
o
co
n
f
i
g
u
r
e,
m
o
n
ito
r
an
d
m
a
n
a
g
e
ap
p
licatio
n
s
d
ep
lo
y
e
d
in
a
clo
u
d
.
P
aa
S
co
n
s
u
m
er
s
ca
n
b
e
b
illed
ac
c
o
r
d
in
g
to
th
e
n
u
m
b
er
o
f
P
aa
S
u
s
er
s
;
t
h
e
p
r
o
ce
s
s
in
g
,
s
t
o
r
ag
e
an
d
n
et
w
o
r
k
r
eso
u
r
ce
s
co
n
s
u
m
ed
b
y
th
e
P
aa
S a
p
p
licatio
n
; a
n
d
th
e
d
u
r
atio
n
o
f
t
h
e
p
latf
o
r
m
u
s
a
g
e
”
.
P
aa
S
is
co
llectio
n
o
f
r
elate
d
s
er
v
ices
f
o
r
cr
ea
ti
n
g
an
d
d
ep
lo
y
in
g
s
o
f
t
w
ar
e
o
n
clo
u
d
,
s
o
it
is
n
o
t
a
s
in
g
le
tec
h
n
o
lo
g
y
.
P
aa
S
o
f
f
er
i
n
g
s
m
a
n
a
g
e
u
s
er
s
u
b
s
cr
ip
tio
n
s
,
s
ec
u
r
it
y
,
r
eso
u
r
ce
m
eter
in
g
,
r
o
le
-
b
ased
s
ec
u
r
it
y
an
d
o
th
er
s
h
ar
e
s
er
v
ice
s
.
A
tt
r
ib
u
tes
t
h
at
ch
ar
ac
ter
ize
P
aa
S
h
a
v
e
b
ee
n
s
h
o
w
n
in
T
ab
le
2
alo
n
g
w
it
h
t
h
eir
f
u
n
ctio
n
alitie
s
.
T
ab
le
2
.
P
aa
S c
h
ar
ac
ter
is
tics
A
t
t
r
i
b
u
t
e
s
F
u
n
c
t
i
o
n
a
l
i
t
y
M
u
l
t
i
-
t
e
n
a
n
t
a
r
c
h
i
t
e
c
t
u
r
e
C
o
mm
o
n
t
e
c
h
n
i
c
a
l
r
e
so
u
r
c
e
s
a
n
d
c
o
d
e
i
n
s
t
a
n
c
e
f
o
r
m
u
l
t
i
p
l
e
c
l
i
e
n
t
c
o
mp
a
n
i
e
s.
C
u
s
t
o
mi
z
a
b
l
e
u
se
r
i
n
t
e
r
f
a
c
e
S
u
p
p
o
r
t
t
h
e
c
r
e
a
t
i
o
n
o
f
f
l
e
x
i
b
l
e
u
se
r
i
n
t
e
r
f
a
c
e
s
w
i
t
h
o
u
t
t
h
e
n
e
e
d
o
f
w
r
i
t
i
n
g
c
o
mp
l
e
x
c
o
d
e
.
U
n
l
i
mi
t
e
d
d
a
t
a
b
a
se
c
u
st
o
m
i
z
a
t
i
o
n
s
P
r
o
v
i
d
e
t
h
e
a
b
i
l
i
t
y
t
o
e
a
si
l
y
mo
d
i
f
y
o
r
e
x
t
e
n
d
t
h
e
d
a
t
a
mo
d
e
l
t
h
r
o
u
g
h
"
p
o
i
n
t
a
n
d
c
l
i
c
k
d
e
c
l
a
r
a
t
i
v
e
"
e
n
v
i
r
o
n
me
n
t
.
R
o
b
u
st
w
o
r
k
f
l
o
w
c
a
p
a
b
i
l
i
t
i
e
s
En
g
e
n
d
e
r
p
r
o
c
e
ss
a
u
t
o
ma
t
i
o
n
b
y
p
r
o
v
i
d
i
n
g
"
p
o
i
n
t
a
n
d
c
l
i
c
k
"
t
o
o
l
s
t
o
e
a
si
l
y
d
e
f
i
n
e
w
o
r
k
f
l
o
w
p
r
o
c
e
sse
s
a
n
d
sp
e
c
i
f
y
b
u
si
n
e
ss
r
u
l
e
s.
G
r
a
n
u
l
a
r
p
e
r
mi
ssi
o
n
s mo
d
e
l
M
u
l
t
i
-
l
e
v
e
l
c
o
n
t
r
o
l
o
v
e
r
se
c
u
r
i
t
y
o
r
s
h
a
r
i
n
g
w
i
t
h
i
n
a
p
p
l
i
c
a
t
i
o
n
s
a
n
d
p
l
a
t
f
o
r
m c
o
m
p
o
n
e
n
t
s.
I
n
t
e
g
r
a
t
e
d
c
o
n
t
e
n
t
l
i
b
r
a
r
y
C
o
mm
o
n
e
l
e
me
n
t
s
t
h
a
t
e
x
t
e
n
d
t
h
e
c
o
r
e
a
p
p
l
i
c
a
t
i
o
n
f
e
a
t
u
r
e
se
t
,
i
mp
r
o
v
e
i
n
f
o
r
ma
t
i
o
n
sh
a
r
i
n
g
a
n
d
s
p
e
e
d
-
u
p
g
o
t
o
m
a
r
k
e
t
t
i
me
.
F
l
e
x
i
b
l
e
se
r
v
i
c
e
s
-
e
n
a
b
l
e
d
I
n
t
e
g
r
a
t
i
o
n
mo
d
e
l
En
a
b
l
e
s
se
a
ml
e
ss
i
n
t
e
g
r
a
t
i
o
n
o
f
c
l
o
u
d
a
p
p
l
i
c
a
t
i
o
n
a
n
d
f
u
n
c
t
i
o
n
a
l
i
t
y
t
h
r
o
u
g
h
a
f
l
e
x
i
b
l
e
w
e
b
s
e
r
v
i
c
e
s
e
n
a
b
l
e
d
i
n
t
e
g
r
a
t
i
o
n
mo
d
e
l
.
A
n
a
l
y
t
i
c
s l
a
y
e
r
En
h
a
n
c
e
d
a
b
i
l
i
t
y
t
o
l
e
v
e
r
a
g
e
a
g
g
r
e
g
a
t
e
d
d
a
t
a
a
c
r
o
ss
c
o
mp
a
n
i
e
s
a
n
d
a
p
p
l
i
c
a
t
i
o
n
s fo
r
a
n
a
l
y
t
i
c
s.
A
d
v
an
ta
g
es o
f
P
aa
S a
r
e
m
e
n
ti
o
n
ed
b
elo
w
:
1.
C
an
ed
it o
p
er
atin
g
s
y
s
te
m
f
ea
t
u
r
es a
n
d
ea
s
i
l
y
u
p
g
r
ad
e.
2.
Ma
j
o
r
f
o
cu
s
is
o
n
s
ec
u
r
it
y
,
s
to
r
ag
e
an
d
d
atab
ase
in
te
g
r
atio
n
.
3.
Ser
v
ices c
a
n
b
e
u
s
ed
f
r
o
m
v
ar
iet
y
o
f
i
n
ter
n
a
tio
n
al
s
o
u
r
ce
s
.
4.
Ser
v
es a
s
a
ap
p
licatio
n
h
o
s
ti
n
g
,
test
i
n
g
,
d
ep
lo
y
m
e
n
t a
n
d
d
ev
elo
p
m
e
n
t e
n
v
ir
o
n
m
e
n
t.
5.
T
o
tal
ex
p
en
s
es is
r
ed
u
ce
d
.
P
aa
S
is
b
ased
o
n
ap
p
licatio
n
d
ev
elo
p
m
e
n
t
p
latf
o
r
m
s
th
at
allo
w
t
h
e
u
s
e
o
f
ex
ter
n
al
r
eso
u
r
ce
s
to
cr
ea
te
an
d
h
o
s
t a
p
p
licatio
n
s
.
E
x
a
m
p
l
es o
f
P
aa
S o
f
f
er
i
n
g
s
:
1.
C
lo
u
d
B
ee
s
: p
latf
o
r
m
to
b
u
ild
,
d
ep
lo
y
,
an
d
m
a
n
a
g
e
J
av
a
ap
p
licatio
n
s
.
2.
E
n
g
i
n
e
Yar
d
:
p
latf
o
r
m
to
b
u
il
d
an
d
d
ep
l
o
y
R
u
b
y
an
d
P
HP
a
p
p
licatio
n
s
th
at
ca
n
b
e
ex
ten
d
ed
w
ith
ad
d
-
o
n
s
.
3.
Go
o
g
le
A
p
p
E
n
g
in
e
:
p
latf
o
r
m
to
d
ev
elo
p
an
d
r
u
n
J
av
a,
P
y
t
h
o
n
,
an
d
Go
ap
p
licatio
n
s
o
n
G
o
o
g
le’
s
in
f
r
astru
ct
u
r
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
AA
S
I
SS
N:
2252
-
8814
P
la
tfo
r
m
-
as
-
a
-
S
ervice
(
P
a
a
S
)
:
Mo
d
el
a
n
d
S
ec
u
r
ity
I
s
s
u
es (
D
ev
i T)
15
4.
Her
o
k
u
:
p
latf
o
r
m
t
o
d
ep
lo
y
J
av
a,
R
u
b
y
,
P
y
t
h
o
n
,
C
lo
j
u
r
e,
n
o
d
e.
j
s
,
an
d
Scala
ap
p
licatio
n
s
th
at
ca
n
b
e
ex
ten
d
ed
w
i
th
ad
d
-
o
n
r
eso
u
r
ce
s
.
5.
Mic
r
o
s
o
f
t
W
in
d
o
w
s
A
zu
r
e:
o
n
-
d
e
m
a
n
d
co
m
p
u
te
an
d
s
to
r
a
g
e
s
er
v
ice
s
as
w
ell
as
a
d
ev
el
o
p
m
e
n
t
an
d
d
ep
lo
y
m
en
t p
latf
o
r
m
f
o
r
ap
p
licatio
n
s
th
a
t r
u
n
o
n
W
in
d
o
w
s
.
6.
Sales
f
o
r
ce
Fo
r
ce
.
co
m
:
p
lat
f
o
r
m
to
b
u
ild
an
d
r
u
n
ap
p
lica
tio
n
s
a
n
d
co
m
p
o
n
e
n
ts
b
o
u
g
h
t
f
r
o
m
A
p
p
E
x
c
h
an
g
e
o
r
cu
s
to
m
ap
p
licatio
n
s
.
P
r
o
m
in
e
n
t
P
aa
S
clo
u
d
s
ar
e
Mic
r
o
s
o
f
t
W
in
d
o
w
s
A
z
u
r
e
(
MW
A
)
,
Go
o
g
le
A
p
p
E
n
g
in
e
(
GA
E
)
an
d
Gr
o
u
n
d
OS
(
GO
S).
MW
A
an
d
GA
E
ar
e
p
r
o
p
r
i
etar
y
clo
u
d
s
wh
er
ea
s
GO
S is
o
p
en
s
o
u
r
ce
clo
u
d
.
C
o
m
p
ar
is
o
n
o
f
th
ese
t
h
r
ee
clo
u
d
s
s
h
o
w
n
i
n
T
ab
le
3
p
r
o
v
id
es
an
in
s
i
g
h
t
i
n
to
w
h
at
c
u
r
r
en
t
clo
u
d
p
r
o
v
i
d
er
s
n
ee
d
to
o
f
f
er
in
ter
m
s
o
f
clo
u
d
o
f
f
er
i
n
g
s
an
d
s
ec
u
r
it
y
i
n
t
h
eir
c
lo
u
d
s
.
B
ased
o
n
t
h
e
co
m
p
ar
i
s
o
n
r
e
s
u
l
ts
,
c
u
s
to
m
er
s
ca
n
c
h
o
o
s
e
th
eir
o
w
n
P
aa
S so
lu
tio
n
s
o
n
-
d
e
m
an
d
,
w
h
ich
m
a
k
e
th
e
p
r
o
ce
s
s
o
f
ap
p
licatio
n
d
ev
e
lo
p
m
en
t f
aster
.
T
ab
le
3
.
C
o
m
p
ar
is
o
n
o
f
P
aa
S C
lo
u
d
s
S
e
c
u
r
i
t
y
A
t
t
r
i
b
u
t
e
s
G
A
E
M
W
A
G
r
o
u
n
d
O
S
A
v
a
i
l
a
b
i
l
i
t
y
N
o
S
L
A
,
N
o
me
n
t
i
o
n
o
f
g
u
a
r
a
n
t
e
e
d
u
p
t
i
me
P
r
o
v
i
d
e
d
b
y
S
L
A
P
r
o
b
l
e
m o
f
U
ser
I
n
t
e
g
r
i
t
y
En
c
r
y
p
t
i
o
n
A
u
t
h
e
n
t
i
c
a
t
i
o
n
En
c
r
y
p
t
i
o
n
A
u
t
h
e
n
t
i
c
a
t
i
o
n
P
r
o
b
l
e
m o
f
U
ser
En
c
r
y
p
t
i
o
n
C
o
n
f
i
d
e
n
t
i
a
l
i
t
y
P
r
i
v
a
c
y
P
o
l
i
c
y
En
c
r
y
p
t
i
o
n
A
u
t
h
e
n
t
i
c
a
t
i
o
n
P
r
i
v
a
c
y
P
o
l
i
c
y
En
c
r
y
p
t
i
o
n
A
u
t
h
e
n
t
i
c
a
t
i
o
n
P
r
o
b
l
e
m o
f
U
ser
En
c
r
y
p
t
i
o
n
A
u
t
h
e
n
t
i
c
a
t
i
o
n
S
i
n
g
l
e
si
g
n
-
on
U
se
r
n
a
me
&
P
a
ssw
o
r
d
U
se
r
n
a
me
&
P
a
ssw
o
r
d
U
se
r
n
a
me
&
P
a
ssw
o
r
d
S
e
r
v
i
c
e
L
e
v
e
l
A
g
r
e
e
me
n
t
No
Y
e
s
No
T
h
e
p
ap
er
f
o
cu
s
es
o
n
b
asic
P
aa
S
m
o
d
el
a
n
d
also
i
n
id
e
n
ti
f
y
in
g
th
e
s
ec
u
r
it
y
in
P
aa
S
en
v
ir
o
n
m
e
n
t
alo
n
g
w
i
th
th
e
s
o
lu
tio
n
s
.
R
elat
ed
w
o
r
k
a
n
d
s
ec
u
r
it
y
co
n
s
id
er
atio
n
s
ar
e
b
ei
n
g
d
i
s
cu
s
s
ed
i
n
S
ec
tio
n
2
.
Sectio
n
3
g
iv
e
s
a
d
ee
p
in
s
ig
h
t
in
to
P
aa
S
m
o
d
el,
la
y
er
s
an
d
P
aa
S
p
r
o
v
id
er
s
.
Sectio
n
4
d
is
cu
s
s
es
t
h
e
s
e
cu
r
it
y
i
s
s
u
es
alo
n
g
w
it
h
ap
p
r
o
p
r
iate
s
o
lu
tio
n
s
.
T
h
e
p
ap
er
is
co
n
clu
d
ed
in
Sectio
n
5.
2.
Rela
t
ed
Wo
rk
Secu
r
it
y
ev
al
u
atio
n
s
m
ea
s
u
r
e
th
e
ef
f
ec
ti
v
e
n
ess
o
f
s
ec
u
r
it
y
co
n
tr
o
ls
(
W
in
k
ler
,
2
0
1
1
)
.
Secu
r
it
y
ch
ec
k
l
is
t
f
o
r
e
v
alu
at
in
g
s
ec
u
r
it
y
i
n
clo
u
d
h
a
v
e
b
ee
n
d
is
c
u
s
s
ed
.
Ho
w
ev
er
t
h
er
e
i
s
n
o
b
ig
co
n
ce
n
tr
atio
n
o
n
P
aa
S
s
ec
u
r
it
y
o
p
tio
n
s
lik
e
w
h
at
co
m
p
o
n
e
n
t
o
f
clo
u
d
s
y
s
te
m
it
s
h
o
u
ld
i
m
p
le
m
en
t
a
n
d
h
o
w
th
e
s
et
o
f
co
n
tr
o
ls
w
il
l
m
ee
t
s
ec
u
r
it
y
c
h
alle
n
g
e
s
.
NI
ST
Sp
ec
ial
P
u
b
licatio
n
8
0
0
-
5
3
o
f
f
er
s
s
ec
u
r
it
y
co
n
tr
o
l
b
aselin
es
w
h
ic
h
as
s
is
t
o
r
g
a
n
i
za
tio
n
s
in
ch
o
o
s
in
g
n
ec
e
s
s
ar
y
s
e
c
u
r
it
y
co
n
tr
o
ls
b
ased
o
n
r
is
k
ass
es
s
m
en
t
an
d
s
ec
u
r
it
y
p
lan
f
o
r
clo
u
d
s
y
s
te
m
s
.
T
h
e
g
u
id
eli
n
e
s
s
er
v
e
as
b
u
ild
i
n
g
b
lo
ck
s
in
e
v
alu
a
tio
n
an
d
s
elec
t
io
n
o
f
tech
n
ical
s
ec
u
r
it
y
co
n
tr
o
ls
an
d
h
elp
clo
u
d
s
er
v
ice
p
r
o
v
id
er
s
in
i
m
p
le
m
e
n
ti
n
g
s
ec
u
r
it
y
co
n
tr
o
ls
.
Su
b
a
s
h
i
n
i
a
n
d
Ka
v
ita
(
2
0
1
1
)
d
is
cu
s
s
ed
th
e
s
ec
u
r
it
y
is
s
u
es
in
th
r
ee
s
er
v
ice
d
eli
v
er
y
m
o
d
els alo
n
g
w
it
h
ap
p
r
o
p
r
ia
te
s
o
lu
tio
n
s
.
Sec
u
r
it
y
is
s
u
e
s
i
n
clo
u
d
e
n
v
ir
o
n
m
e
n
t
ar
e
d
is
cu
s
s
ed
b
y
Z
i
s
s
i
s
an
d
L
e
k
k
a
s
(
2
0
1
2
)
.
A
l
m
o
r
s
y
,
et
al.
,
(
2
0
1
1
)
p
r
o
p
o
s
ed
a
f
r
a
m
e
w
o
r
k
th
at
e
n
ab
les
c
lo
u
d
s
er
v
ice
p
r
o
v
id
er
s
a
n
d
c
u
s
to
m
er
s
to
m
an
a
g
e
th
e
ir
clo
u
d
p
latf
o
r
m
s
ec
u
r
it
y
.
T
h
is
is
b
it
co
m
p
lica
te
d
as
th
e
cu
s
to
m
er
s
n
ee
d
to
s
p
e
cif
y
i
n
ad
v
an
ce
t
h
e
t
y
p
e
o
f
s
ec
u
r
it
y
co
n
tr
o
ls
th
e
y
n
ee
d
w
i
th
o
u
t
ad
eq
u
ate
k
n
o
w
led
g
e
o
f
b
est
co
n
tr
o
ls
o
r
ef
f
ec
tiv
e
s
ec
u
r
it
y
p
ar
am
et
er
s
th
e
y
ca
n
g
et
f
r
o
m
th
e
p
r
o
v
id
er
s
.
Sar
ip
alli
et
al.
(
2
0
1
0
)
s
u
g
g
ested
r
is
k
as
s
es
s
m
en
t
f
r
a
m
e
w
o
r
k
f
o
r
clo
u
d
s
ec
u
r
it
y
w
h
ic
h
ass
e
s
s
e
s
an
d
id
en
t
if
ie
s
r
is
k
s
b
ased
o
n
s
ca
le
o
f
h
i
g
h
,
m
o
d
er
ate
an
d
lo
w
.
B
u
t
th
e
co
m
p
o
n
e
n
t
s
p
r
o
n
e
to
r
is
k
ar
e
n
o
t
s
p
ec
if
ied
.
Sen
g
u
p
ta
,
e
t
al.
,
(
2
0
1
1
)
illu
s
tr
ated
s
tep
s
to
w
ar
d
s
a
s
ec
u
r
it
y
ass
es
s
m
en
t
f
r
a
m
e
w
o
r
k
b
y
u
s
i
n
g
v
ar
io
u
s
p
r
o
ce
d
u
r
es
to
ev
al
u
ate
clo
u
d
s
ec
u
r
it
y
a
n
d
d
is
c
u
s
s
ed
i
m
p
lica
tio
n
s
to
s
ec
u
r
it
y
i
s
s
u
es
an
d
s
ec
u
r
it
y
r
el
ated
r
eg
u
la
to
r
y
co
m
p
lia
n
ce
i
n
th
e
clo
u
d
.
T
h
e
y
h
o
w
ev
er
d
id
n
o
t sp
ec
i
f
y
t
h
e
b
es
t
to
o
ls
an
d
co
n
tr
o
ls
th
at
w
i
ll h
a
n
d
le
id
en
tit
y
an
d
ac
ce
s
s
m
a
n
a
g
e
m
e
n
t c
o
n
ce
r
n
s
.
Kh
an
,
et
al.
,
(
2
0
1
2
)
s
u
g
g
e
s
te
d
a
r
is
k
m
a
n
a
g
e
m
e
n
t
m
eth
o
d
o
lo
g
y
i
n
ass
es
s
i
n
g
i
n
f
o
r
m
atio
n
s
ec
u
r
it
y
i
n
clo
u
d
en
v
ir
o
n
m
e
n
t
s
f
r
o
m
t
h
e
d
ep
lo
y
m
e
n
t
p
h
a
s
e
to
o
p
er
atio
n
al
p
h
ase
o
f
t
h
e
i
n
f
r
as
tr
u
ct
u
r
e
p
r
o
v
id
er
s
clo
u
d
lif
ec
y
cle.
T
h
is
ass
es
s
m
en
t
d
id
n
o
t
p
r
o
v
id
e
d
etails
o
n
w
h
at
c
o
m
p
o
n
en
t
s
o
f
th
e
clo
u
d
ar
e
s
u
b
j
ec
t
t
o
th
r
ea
ts
an
d
s
p
ec
if
ic
co
n
tr
o
ls
to
b
e
ap
p
lie
d
in
m
iti
g
ati
n
g
s
u
c
h
th
r
ea
t
s
.
Fu
s
e
n
i
g
an
d
S
h
ar
m
a
(
2
0
1
2
)
p
r
o
p
o
s
ed
a
s
ec
u
r
it
y
ar
ch
itect
u
r
e
to
ex
tr
ac
t
s
ec
u
r
it
y
p
ar
am
eter
s
th
a
t
m
ee
t
clo
u
d
s
ec
u
r
it
y
r
eq
u
ir
e
m
en
ts
f
r
o
m
t
h
e
s
er
v
ice
u
s
er
’
s
s
id
e
an
d
also
f
r
o
m
v
ir
tu
a
l
u
s
er
s
’
s
id
e
as
a
w
a
y
o
f
clo
u
d
s
ec
u
r
it
y
m
an
a
g
e
m
en
t.
P
au
le
y
p
r
o
v
id
ed
a
tr
an
s
p
ar
en
c
y
ass
es
s
m
en
t
o
f
clo
u
d
v
e
n
d
o
r
s
to
h
elp
b
u
s
i
n
ess
e
s
as
s
es
s
t
h
e
tr
an
s
p
ar
en
c
y
o
f
a
clo
u
d
p
r
o
v
id
er
’
s
s
ec
u
r
it
y
,
p
r
iv
ac
y
,
au
d
itab
il
it
y
,
a
n
d
s
e
r
v
ice
-
le
v
el
a
g
r
ee
m
e
n
t
s
v
ia
s
elf
-
s
er
v
ice
W
eb
p
o
r
tals
an
d
p
u
b
licatio
n
s
.
T
h
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8814
IJ
AA
S
Vo
l.
4
,
No
.
1
,
Ma
r
ch
201
5
:
13
–
23
16
s
co
r
ec
ar
d
h
o
w
ev
er
r
ev
ea
led
th
at
a
s
ig
n
i
f
ica
n
t
a
m
o
u
n
t
o
f
clo
u
d
p
r
o
v
id
er
s
d
id
n
o
t
g
iv
e
d
eta
iled
i
n
f
o
r
m
atio
n
o
n
th
e
t
y
p
e
o
f
s
ec
u
r
it
y
co
n
tr
o
ls
an
d
p
o
licies
th
at
ad
d
r
ess
m
u
l
ti
ten
an
c
y
is
s
u
e
s
in
th
e
ir
v
ar
i
o
u
s
clo
u
d
d
eliv
er
y
m
o
d
el
s
.
Su
c
h
an
i
n
v
e
s
ti
g
atio
n
o
f
r
elat
ed
w
o
r
k
clea
r
l
y
d
ep
icts
t
h
e
w
o
r
k
ca
r
r
ied
in
clo
u
d
s
ec
u
r
it
y
f
ie
ld
,
b
u
t
s
ec
u
r
it
y
c
h
alle
n
g
e
s
i
n
P
a
aS
d
eliv
er
y
m
o
d
el
r
e
m
ai
n
s
to
b
e
in
v
e
s
ti
g
ated
a
n
d
ad
d
r
ess
ed
.
S
ec
tio
n
4
d
escr
ib
es
s
ec
u
r
it
y
is
s
u
e
s
w
it
h
ap
p
r
o
p
r
iat
e
s
o
lu
tio
n
s
in
P
aa
S d
eliv
er
y
m
o
d
el.
3.
P
a
a
S
M
O
DE
L
3
.
1
.
B
a
s
ic
M
o
del o
f
P
a
a
S
T
h
e
t
w
o
d
i
f
f
er
en
t
co
n
s
tr
u
ct
s
o
f
P
aa
S
m
o
d
el
ar
e
C
o
n
tr
o
l
s
p
ac
e
a
n
d
A
p
p
s
p
ac
e
(
Fi
g
u
r
e
2
)
s
er
v
e
d
if
f
er
e
n
t
p
u
r
p
o
s
es.
A
p
p
s
p
ac
e
is
f
u
ll
y
w
r
ap
p
ed
w
it
h
i
n
t
h
e
C
o
n
tr
o
l
s
p
ac
e.
Si
n
ce
co
n
tr
o
l
s
p
ac
e
o
p
er
ates
o
n
s
a
m
e
i
n
f
r
astru
c
tu
r
e
li
k
e
th
e
ap
p
s
p
ac
e,
co
n
tr
o
l
s
p
ac
e
s
h
ar
es
s
o
m
e
ch
ar
ac
ter
i
s
tics
o
f
ap
p
s
p
ac
e.
C
o
n
tr
o
l
Sp
ac
e
co
m
p
o
n
e
n
t
s
ar
e
d
ef
in
iti
v
e
s
b
u
ilt
f
r
o
m
p
r
i
m
iti
v
es
a
n
d
s
o
p
h
is
t
icate
s
to
p
r
o
v
id
e
th
e
p
r
escr
ip
tiv
e
ap
p
r
o
ac
h
to
th
e
A
p
p
Sp
ac
e
t
h
at
m
ak
e
s
P
aa
S
an
at
tr
ac
tiv
e
al
ter
n
ati
v
e
t
o
tr
ad
itio
n
al
s
o
f
t
w
ar
e
b
u
ild
s
,
co
n
f
i
g
u
r
atio
n
a
n
d
d
ep
lo
y
m
en
t
s
.
Fig
u
r
e
2
.
P
aa
S m
o
d
el
-
C
o
n
tr
o
l Sp
ac
e
3
.
1
.
1
.
Co
ntr
o
l Spa
ce
T
h
e
f
u
n
c
tio
n
s
o
f
co
n
tr
o
l
s
p
ac
e
in
clu
d
e
s
au
to
m
atio
n
,
m
a
n
ag
e
m
en
t
an
d
p
r
o
v
is
io
n
in
g
.
I
t
in
ter
ac
ts
to
lo
-
lev
el
co
m
p
o
n
e
n
t
s
w
it
h
th
e
h
el
p
o
f
A
P
I
ab
s
tr
ac
tio
n
s
.
T
h
e
C
o
n
tr
o
l
s
p
ac
e
(
Fig
u
r
e
3
)
d
eter
m
i
n
es
w
h
at
ele
m
en
ts
ar
e
ex
p
o
s
ed
to
A
p
p
Sp
ac
e
th
e
r
eb
y
m
ai
n
tai
n
i
n
g
co
h
er
en
c
y
a
n
d
d
ep
en
d
en
cies
o
f
A
p
p
Sp
ac
e.
Sev
er
al
s
ep
ar
ate
f
u
n
ctio
n
s
o
f
co
n
tr
o
l sp
ac
e
ca
n
b
e
co
m
b
in
ed
i
n
v
ar
io
u
s
m
an
n
e
r
s
b
ased
o
n
P
aa
S im
p
le
m
e
n
tati
o
n
.
Fig
u
r
e
3
.
C
o
n
tr
o
l sp
ac
e
3
.
1
.
2
.
App Sp
a
ce
T
h
e
ap
p
licatio
n
s
o
f
en
d
-
u
s
er
/
cu
s
to
m
er
ar
e
d
ep
lo
y
ed
,
u
p
d
ated
an
d
r
u
n
in
A
p
p
Sp
ac
e
w
h
i
ch
is
b
ein
g
co
n
tr
o
lled
b
y
C
o
n
tr
o
l
Sp
ac
e.
E
x
p
o
s
u
r
e
o
f
P
aa
S
E
le
m
e
n
t
t
y
p
es
b
y
C
o
n
tr
o
l
Sp
ac
e
to
A
p
p
Sp
ac
e
is
o
n
e
o
f
t
h
e
k
e
y
d
i
f
f
er
e
n
tiati
n
g
f
ac
to
r
s
b
et
w
ee
n
d
if
f
er
en
t
P
aa
S
i
m
p
le
m
e
n
tatio
n
s
.
A
p
p
Sp
ac
e
ch
ar
ac
ter
is
tics
ar
e
co
n
tr
o
lled
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
AA
S
I
SS
N:
2252
-
8814
P
la
tfo
r
m
-
as
-
a
-
S
ervice
(
P
a
a
S
)
:
Mo
d
el
a
n
d
S
ec
u
r
ity
I
s
s
u
es (
D
ev
i T)
17
b
y
h
o
w
th
e
C
o
n
tr
o
l
Sp
ac
e
is
b
u
ilt/
d
esi
g
n
ed
alo
n
g
w
it
h
w
h
at
P
aa
S
E
lem
e
n
t
s
w
er
e
u
s
ed
t
o
b
u
ild
th
e
C
o
n
tr
o
l
Sp
ac
e.
1.
A
p
p
n
e
t
w
o
r
k
:
I
t
e
x
p
o
s
es
n
et
w
o
r
k
co
n
n
ec
tiv
it
y
to
A
p
p
Sp
ac
e.
T
h
is
is
ac
t
u
all
y
t
h
e
p
ath
th
r
o
u
g
h
w
h
ic
h
ap
p
licatio
n
s
co
m
m
u
n
ic
ate
w
it
h
ap
p
an
d
s
er
v
ice
s
ex
p
o
s
ed
to
ap
p
s
.
2.
E
x
ec
u
to
r
:
A
p
p
licat
io
n
b
o
o
ts
tr
ap
p
in
g
m
ec
h
an
is
m
f
o
r
ap
p
s
b
ein
g
d
ep
lo
y
ed
.
T
h
e
m
ain
f
u
n
ctio
n
i
s
to
p
r
o
v
id
e
co
m
p
u
te/
m
e
m
o
r
y
r
eso
u
r
ce
s
to
A
p
p
Sp
ac
e.
3.
C
o
d
e
P
r
o
ce
s
s
o
r
:
T
h
e
s
ig
n
i
f
ic
an
t
f
u
n
ctio
n
o
f
co
d
e
p
r
o
c
ess
o
r
is
to
ex
a
m
in
e
co
d
es,
lib
r
ar
ies
an
d
d
ep
en
d
en
cies b
ef
o
r
e
s
en
d
i
n
g
t
o
E
n
g
i
n
e
o
r
E
x
ec
u
to
r
.
I
t is ac
tu
all
y
lik
e
a
p
r
e
-
p
r
o
ce
s
s
o
r
.
4.
C
o
o
r
d
in
atio
n
Net
w
o
r
k
:
T
h
e
co
-
o
r
d
in
atio
n
o
f
co
n
tr
o
l
s
p
ac
e
co
m
p
o
n
e
n
ts
ta
k
es
p
lace
in
t
h
i
s
n
et
w
o
r
k
.
B
ased
o
n
th
e
n
ee
d
,
A
p
p
n
et
w
o
r
k
a
n
d
th
e
C
o
o
r
d
in
atio
n
n
et
w
o
r
k
ca
n
b
e
co
m
b
in
e
d
to
w
o
r
k
to
g
et
h
er
.
5.
E
n
g
i
n
e
:
T
h
e
m
aj
o
r
f
u
n
ctio
n
o
f
en
g
i
n
e
i
s
to
co
-
o
r
d
in
ate
th
e
d
is
tr
ib
u
tio
n
an
d
p
r
o
v
is
io
n
in
g
o
f
co
d
e,
s
er
v
ices
a
n
d
th
e
ir
d
ep
en
d
en
ci
es.
Dec
is
io
n
s
r
eg
ar
d
i
n
g
t
h
e
a
ctiv
itie
s
o
cc
u
r
r
in
g
i
n
s
id
e
th
e
A
p
p
s
p
ac
e
is
al
s
o
tak
en
b
y
e
n
g
in
e.
I
t
c
a
n
co
o
r
d
in
ate
w
it
h
Or
ch
es
tr
atio
n
la
y
er
o
r
au
to
m
atio
n
to
o
ls
o
u
t
s
id
e
C
o
n
tr
o
l
s
p
ac
e
to
o
f
f
er
r
eso
u
r
ce
s
to
b
o
th
A
p
p
an
d
C
o
n
tr
o
l Sp
ac
e.
6.
Mo
n
ito
r
:
T
h
e
f
u
n
ctio
n
s
o
f
m
o
n
ito
r
i
n
clu
d
e
s
k
ee
p
in
g
tr
ac
k
o
f
t
h
e
s
tat
u
s
o
f
A
p
p
s
p
ac
e
a
n
d
C
o
n
tr
o
l
s
p
ac
e
an
d
al
s
o
h
elp
s
i
n
s
i
g
n
a
llin
g
o
t
h
er
C
o
n
tr
o
l
s
p
ac
e
co
m
p
o
n
en
ts
to
r
eso
lv
e
co
n
f
lict
s
.
I
n
ca
s
e
o
f
a
w
eb
ap
p
licatio
n
d
ev
elo
p
m
e
n
t
p
r
o
j
e
ct,
tr
ad
itio
n
al
s
o
f
t
w
ar
e
d
ev
elo
p
m
e
n
t
in
v
o
lv
e
s
m
a
n
y
p
r
o
ce
s
s
es
w
h
ich
m
a
k
es
th
e
en
tire
p
h
ase
co
s
tl
y
a
n
d
co
m
p
licated
.
On
th
e
o
th
er
h
a
n
d
,
P
aa
S
p
r
o
v
id
er
p
r
o
v
id
es
th
is
p
latf
o
r
m
f
o
r
d
ev
elo
p
m
en
t
3
.
1
.
3
.
P
a
a
S E
le
m
ent
s
T
h
ese
ar
e
co
n
s
tr
u
cts
r
eq
u
ir
ed
to
b
u
ild
a
P
aa
S
(
Fig
u
r
e
4
)
.
T
h
e
y
ar
e
ab
s
tr
ac
tio
n
s
o
n
to
p
o
f
d
if
f
er
e
n
t
la
y
er
s
o
f
r
eso
u
r
ce
s
.
A
b
s
tr
ac
ti
o
n
s
ar
e
d
o
n
e
th
r
o
u
g
h
s
er
v
ic
e
b
ased
ab
s
tr
ac
tio
n
s
.
P
aa
S
el
e
m
en
ts
ar
e
f
u
r
th
er
class
i
f
ied
as t
h
r
ee
t
y
p
es a
s
d
e
f
in
ed
in
t
h
e
f
ig
u
r
e.
Fig
u
r
e
4
.
E
le
m
en
t
s
o
f
P
aa
S
A
ll
t
h
ese
ele
m
e
n
ts
i
n
P
aa
S
h
a
v
e
an
ab
ilit
y
to
in
ter
ac
t
th
r
o
u
g
h
a
p
ass
-
th
r
o
u
g
h
in
ter
f
ac
e
o
r
ab
s
tr
ac
tio
n
to
an
y
o
th
er
P
aa
S
ele
m
en
t
t
y
p
e
w
h
ic
h
ar
e
all
p
r
o
v
id
ed
b
y
C
o
n
tr
o
l
s
p
ac
e.
C
o
m
b
in
at
io
n
o
f
th
e
ele
m
e
n
ts
m
ak
e
u
p
an
ap
p
licatio
n
in
A
p
p
s
p
ac
e.
A
n
i
m
p
o
r
tan
t
t
h
i
n
g
to
n
o
t
e
is
th
at
t
h
e
co
n
tr
o
l
s
p
ac
e
is
en
tire
l
y
m
ad
e
u
p
o
f
P
aa
S e
lem
e
n
t
s
.
P
r
im
it
iv
e
s
:
T
h
e
y
ar
e
th
e
co
r
e
b
u
ild
in
g
b
lo
ck
o
f
r
eso
u
r
ce
s
.
I
n
ca
s
e
o
f
o
p
er
atin
g
s
y
s
te
m
as
a
p
r
im
i
tiv
e,
th
e
OS
h
as
n
o
t
ac
t
u
all
y
b
ee
n
in
s
ta
n
tia
ted
i.e
.
,
it
is
n
o
t
a
r
u
n
n
i
n
g
OS.
P
aa
S
eli
m
i
n
ates
al
l
d
ir
ec
t
ties
b
et
w
ee
n
co
d
e
an
d
OS.
So
p
h
is
ticate
s
:
So
p
h
is
t
icate
s
ar
e
co
m
p
o
s
ites
o
r
co
m
b
in
a
t
io
n
s
o
r
e
x
te
n
s
io
n
s
o
f
b
u
ild
i
n
g
b
lo
ck
s
(
p
r
im
i
t
iv
e
s
)
.
C
o
m
b
i
n
atio
n
o
f
an
o
th
er
s
o
p
h
i
s
ticate
an
d
a
p
r
im
iti
v
e
ca
n
b
u
ild
a
s
o
p
h
i
s
t
icate
.
Fo
r
ex
a
m
p
le,
R
DB
MS
w
i
ll
l
ik
el
y
lev
er
a
g
e
a
R
u
n
ti
m
eVM
,
a
n
Op
er
atin
g
S
y
s
te
m
,
P
r
o
ce
s
s
es,
a
n
I
n
te
r
f
ac
e,
B
lo
ck
Sto
r
e,
C
ac
h
e,
an
d
a
Fil
e
S
y
s
te
m
.
T
h
is
co
m
p
le
x
it
y
is
h
id
d
en
b
y
R
DB
MS
in
ter
f
ac
e
an
d
P
aa
S
ex
p
o
s
es
s
u
c
h
co
m
b
i
n
atio
n
as a
s
er
v
ice
w
h
ic
h
ca
n
b
e
co
n
s
u
m
ed
b
y
A
P
I
ca
ll o
r
d
atab
ase
co
n
n
ec
tio
n
.
Def
i
n
iti
v
es:
I
n
s
tan
tiatio
n
s
(
R
u
n
n
i
n
g
)
o
f
P
r
i
m
itiv
e
s
a
n
d
So
p
h
is
ticate
s
eit
h
er
d
ir
ec
tl
y
in
u
s
e
o
r
w
r
ap
p
ed
in
Ser
v
ices/
A
P
I
s
cr
e
atin
g
ea
s
il
y
le
v
er
ag
e
ab
s
tr
ac
t
i
o
n
s
f
o
r
m
t
h
e
d
ef
i
n
iti
v
es.
T
h
es
e
ab
s
tr
ac
tio
n
s
allo
w
co
m
p
le
x
co
n
f
ig
u
r
atio
n
s
o
f
P
r
im
it
iv
e
s
a
n
d
So
p
h
i
s
ticate
s
co
u
p
led
w
it
h
ap
p
licatio
n
l
o
g
ic
a
n
d
d
y
n
a
m
ic
co
n
f
i
g
u
r
atio
n
ca
p
ab
ilit
ies.
T
h
e
y
ar
e
liv
e
an
d
f
u
ll
y
i
m
p
le
m
e
n
ted
ab
s
tr
ac
tio
n
s
as
th
e
y
co
n
s
u
m
e
r
eso
u
r
ce
s
.
T
h
is
co
u
ld
b
e
a
s
ch
e
m
a
in
a
R
DB
MS
o
r
a
c
o
llectio
n
w
i
th
d
o
cu
m
en
ts
i
n
it
in
a
d
o
cu
m
e
n
t
s
to
r
e
an
d
th
is
is
w
h
er
e
all
o
f
s
p
ec
if
ic
it
y
o
cc
u
r
s
in
P
aa
S.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8814
IJ
AA
S
Vo
l.
4
,
No
.
1
,
Ma
r
ch
201
5
:
13
–
23
18
T
h
r
ee
m
aj
o
r
P
aa
S m
o
d
els ar
e
as f
o
llo
w
s
:
1.
C
o
m
p
r
eh
e
n
s
i
v
e
P
aa
S
:
T
h
ese
p
r
o
v
id
er
s
s
u
p
p
o
r
t
w
id
e
r
an
g
e
o
f
la
n
g
u
a
g
es
a
n
d
e
n
ab
les
I
T
to
ea
s
il
y
s
w
itc
h
a
m
o
n
g
t
h
ese
s
er
v
ice
s
.
E
g
.
W
in
d
o
w
s
A
zu
r
e.
2.
Sp
ec
if
ic
-
Stac
k
P
aa
S
:
T
h
ese
p
r
o
v
id
er
s
tar
g
et
en
ter
p
r
is
e
-
f
o
cu
s
ed
s
tac
k
s
f
o
r
co
m
p
an
ie
s
th
at
n
ee
d
to
u
s
e
t
h
e
ad
v
a
n
ta
g
es
o
f
P
aa
S
w
it
h
o
u
t
r
e
w
r
iti
n
g
a
n
ap
p
licatio
n
o
r
r
ei
m
p
le
m
en
t
in
g
t
h
e
s
tack
.
E
g
.
I
B
M
S
m
ar
t
C
lo
u
d
.
3.
P
r
o
p
r
ietar
y
P
aa
S
:
T
h
ese
p
r
o
v
id
er
s
p
r
o
m
i
s
e
a
n
e
x
tr
e
m
el
y
ca
p
ab
le
m
an
a
g
ed
p
latf
o
r
m
a
n
d
s
er
v
ice
in
e
x
c
h
an
g
e
f
o
r
e
m
b
r
ac
i
n
g
a
p
r
o
p
r
ietar
y
s
cr
ip
ti
n
g
la
n
g
u
a
g
e
an
d
co
n
f
i
g
u
r
atio
n
w
it
h
s
ig
n
i
f
ica
n
t
lo
c
k
-
in
r
is
k
.
E
g
.
W
o
r
k
Xp
r
ess
.
3
.
2
.
L
a
y
er
s
in P
a
a
S
T
h
e
F
ig
u
r
e
5
clea
r
l
y
d
ep
icts
t
h
e
t
w
o
m
aj
o
r
la
y
er
s
o
f
P
aa
S a
s
C
lo
u
d
O
S a
n
d
C
lo
u
d
Mid
d
le
w
ar
e.
P
aa
S
p
r
o
v
id
er
s
s
u
ch
a
s
Mic
r
o
s
o
f
t
W
in
d
o
w
s
Azu
r
e
allo
w
s
e
x
i
s
ti
n
g
.
Net
d
e
v
elo
p
er
s
to
cr
ea
te
th
eir
o
w
n
s
ca
lab
le
SaaS
an
d
Go
o
g
le
A
p
p
E
n
g
in
e
en
ab
le
J
av
a
an
d
P
y
t
h
o
n
d
e
v
elo
p
er
s
to
ea
s
il
y
d
ev
elo
p
clo
u
d
ap
p
s
.
Oth
er
b
est
P
aa
S
p
r
o
v
id
er
s
s
u
c
h
as
Or
an
g
eSca
p
e
a
n
d
W
o
lf
P
aa
S
ar
e
o
n
-
d
e
m
an
d
b
r
o
w
s
er
b
ased
p
l
atf
o
r
m
s
f
o
r
r
ap
id
l
y
d
esig
n
in
g
a
n
d
d
eli
v
er
in
g
ap
p
li
ca
tio
n
s
.
B
u
s
i
n
es
s
a
n
al
y
s
t
s
w
h
o
ar
e
n
o
n
-
d
ev
elo
p
er
s
w
i
th
g
o
o
d
an
al
y
t
ical
ab
ilit
y
an
d
d
o
m
ai
n
k
n
o
w
led
g
e
ca
n
al
s
o
u
s
e
to
lau
n
c
h
th
eir
Saa
S a
p
p
s
.
Fig
u
r
e
5
.
P
aa
S lay
er
s
3
.
3
.
E
v
a
lua
t
io
n c
rit
er
ia
in cho
o
s
ing
P
a
a
S pro
v
ider
T
h
e
s
ev
en
m
aj
o
r
f
ac
to
r
s
to
b
e
co
n
s
id
er
ed
w
h
ile
ch
o
o
s
i
n
g
a
P
aa
S p
r
o
v
id
er
ar
e
as f
o
llo
w
s
:
1.
P
r
o
g
r
am
m
i
n
g
la
n
g
u
a
g
e
an
d
f
r
a
m
e
w
o
r
k
s
:
I
n
p
r
o
p
r
ietar
y
P
aa
S,
cu
s
to
m
er
is
ca
n
u
s
e
w
h
ate
v
er
lan
g
u
a
g
e
is
r
eq
u
ir
ed
.
Sales
f
o
r
ce
.
co
m
i
s
o
n
e
o
f
t
h
e
b
est ex
a
m
p
le
w
h
ic
h
u
s
e
s
p
r
o
p
r
ietar
y
l
an
g
u
a
g
e.
2.
Data
b
ases
:
Mi
g
r
atio
n
to
d
if
f
er
en
t
d
atab
ase
s
er
v
er
is
m
ad
e
ea
s
ier
an
d
m
a
n
y
P
aa
S
p
r
o
v
i
d
er
s
s
u
p
p
o
r
t
"
n
ex
t
-
g
en
er
at
io
n
"
d
atab
ases
s
u
c
h
as
Xer
o
u
n
d
t
h
at
p
r
o
v
id
e
an
in
ter
f
ac
e
s
i
m
ilar
t
o
My
SQ
L
b
u
t
ar
e
p
r
o
v
id
ed
as a
s
er
v
ice.
Data
b
ase
s
ec
u
r
it
y
f
ea
t
u
r
es o
f
f
er
ed
b
y
P
aa
S v
en
d
o
r
s
n
ee
d
to
b
e
v
er
if
i
ed
.
3.
Av
ailab
ilit
y
:
I
n
ca
s
e
o
f
f
ai
l
u
r
e
o
f
s
er
v
er
o
r
s
o
f
t
w
ar
e,
s
er
v
ice
-
le
v
el
ag
r
ee
m
en
ts
s
h
o
w
th
eir
i
m
p
o
r
tan
ce
.
T
h
is
is
b
ec
au
s
e
v
en
d
o
r
s
r
o
les an
d
r
esp
o
n
s
ib
ilit
i
es h
a
v
e
to
b
e
s
p
ec
if
ied
in
S
L
As.
4.
Secu
r
it
y
:
Secu
r
it
y
a
n
d
r
eg
u
lat
o
r
y
co
m
p
lia
n
ce
ar
e
cr
itical
w
h
en
s
e
lectin
g
P
aa
S
v
e
n
d
o
r
s
w
h
o
d
r
iv
e
d
o
w
n
co
s
t
s
a
n
d
m
ai
n
tai
n
h
ig
h
av
ailab
ilit
y
b
y
s
p
r
ea
d
in
g
ap
p
li
ca
tio
n
s
a
n
d
d
ata
ac
r
o
s
s
a
lar
g
e
n
u
m
b
er
o
f
s
h
ar
ed
s
er
v
er
s
.
5.
Ser
v
ices
:
E
x
tr
a
s
er
v
ice
s
ar
e
p
r
o
v
id
ed
b
y
P
aa
S
v
e
n
d
o
r
s
th
r
o
u
g
h
th
ir
d
-
p
ar
t
y
ad
d
-
o
n
s
.
C
o
d
e
r
ep
o
s
ito
r
y
in
te
g
r
atio
n
,
ca
ch
i
n
g
s
er
v
ices,
lo
g
g
i
n
g
s
er
v
ice
s
an
d
p
ay
m
e
n
t
s
er
v
ic
e
s
ar
e
p
r
o
v
id
ed
b
y
P
aa
S
v
en
d
o
r
s
.
6.
C
u
s
to
m
er
ca
r
e
:
P
aa
S
v
en
d
o
r
s
b
u
ild
lay
er
s
b
et
w
ee
n
an
d
ar
o
u
n
d
v
ar
io
u
s
s
er
v
ices
(
s
u
ch
a
s
ap
p
licatio
n
-
to
-
d
atab
ase
tr
an
s
a
ctio
n
s
)
t
h
at
i
m
p
o
s
e
a
m
u
ch
cl
o
s
er
r
elatio
n
s
h
ip
b
et
w
ee
n
d
e
v
elo
p
er
an
d
v
en
d
o
r
th
an
w
ith
o
t
h
er
h
o
s
ti
n
g
o
p
tio
n
s
.
7.
P
r
ice
: Sele
ctio
n
is
also
b
ased
o
n
co
s
t f
ac
to
r
.
So
m
e
v
en
d
o
r
s
ev
en
p
r
o
v
id
e
f
r
ee
tr
ial
s
.
3
.
4
.
P
a
a
S f
o
r
S
M
B
s
I
n
ca
s
e
o
f
a
w
eb
ap
p
licatio
n
d
ev
elo
p
m
en
t
p
r
o
j
ec
t,
tr
ad
itio
n
al
s
o
f
t
w
ar
e
d
ev
elo
p
m
e
n
t
in
v
o
lv
es
m
a
n
y
p
r
o
ce
s
s
es
w
h
ic
h
m
ak
e
s
th
e
e
n
tire
p
h
ase
co
s
tl
y
a
n
d
co
m
p
li
ca
ted
.
On
th
e
o
th
er
h
an
d
,
P
aa
S
p
r
o
v
id
er
p
r
o
v
id
es
th
is
p
lat
f
o
r
m
f
o
r
d
ev
elo
p
m
e
n
t
an
d
th
e
p
latf
o
r
m
ca
n
b
e
co
n
s
u
m
ed
u
s
i
n
g
b
r
o
w
s
er
.
I
t
eli
m
i
n
a
tes
th
e
n
ec
e
s
s
it
y
o
f
d
o
w
n
lo
ad
i
n
g
a
n
y
s
o
f
t
w
ar
e.
T
h
ese
f
ea
t
u
r
es
li
k
e
co
s
t
e
f
f
icie
n
c
y
e
m
p
o
w
er
s
s
m
a
ll
an
d
m
ed
iu
m
-
s
ized
b
u
s
in
e
s
s
e
s
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
AA
S
I
SS
N:
2252
-
8814
P
la
tfo
r
m
-
as
-
a
-
S
ervice
(
P
a
a
S
)
:
Mo
d
el
a
n
d
S
ec
u
r
ity
I
s
s
u
es (
D
ev
i T)
19
to
lau
n
c
h
th
eir
o
w
n
Saa
S.
SM
B
s
ca
n
lev
er
ag
e
t
h
e
p
o
w
er
o
f
p
latf
o
r
m
p
r
o
v
id
er
s
w
ith
o
u
t
an
y
in
i
tial
in
v
es
t
m
e
n
t.
Dev
elo
p
m
e
n
t
o
f
ap
p
licatio
n
s
q
u
ick
l
y
t
h
r
o
u
g
h
P
aa
S
an
d
a
g
ile
m
et
h
o
d
o
lo
g
ies
lo
w
er
s
o
p
er
atio
n
al
co
s
ts
f
o
r
SMB
s
.
I
ter
ativ
e
ap
p
r
o
ac
h
o
f
ag
ile
m
e
t
h
o
d
o
lo
g
ies
a
n
d
ce
r
tain
co
m
p
o
n
e
n
ts
i
n
P
aa
S
g
u
ar
an
tee
s
th
at
b
es
t
s
o
lu
tio
n
is
d
eliv
er
ed
to
cu
s
to
m
er
s
in
lea
s
t
d
u
r
atio
n
.
T
h
is
m
a
y
i
m
p
r
o
v
e
cu
s
to
m
er
r
esp
o
n
s
i
v
e
n
ess
,
p
r
o
ce
s
s
au
to
m
at
io
n
a
n
d
also
o
v
er
la
y
e
f
f
icien
c
ies
f
o
r
in
ter
n
al
o
p
er
atio
n
s
f
o
r
SMB
s
.
Fi
g
u
r
e
s
h
o
w
s
a
g
ile
f
r
a
m
e
w
o
r
k
f
o
r
P
aa
S
w
h
ic
h
t
h
e
SMB
s
ca
n
u
s
e
to
d
ev
elo
p
ap
p
licatio
n
s
f
as
t
er
.
W
ith
P
aa
S,
d
ev
elo
p
er
s
an
d
p
r
o
j
ec
t
m
an
a
g
er
s
u
s
e
iter
ati
v
e
ap
p
r
o
ac
h
w
h
er
e
th
e
r
eq
u
ir
e
m
e
n
t
s
ar
e
g
ath
er
ed
b
ased
o
n
s
tag
es
o
f
d
ev
elo
p
m
en
t.
T
h
e
s
o
lu
tio
n
s
s
h
all
b
e
d
eli
v
er
ed
as
a
p
r
o
to
ty
p
e
w
it
h
t
h
e
av
ai
lab
le
s
et
o
f
d
a
ta
an
d
th
e
n
t
h
e
iter
atio
n
s
ca
n
b
e
tak
en
f
r
o
m
t
h
er
e
to
ar
r
iv
e
at
th
e
b
est
s
o
lu
tio
n
.
T
h
is
is
p
o
s
s
ib
le
w
ith
P
aa
S
w
it
h
its
r
ea
d
y
to
u
s
e
p
r
e
-
co
n
f
ig
u
r
ed
co
m
p
o
n
e
n
ts
.
So
,
P
aa
S c
an
b
e
ca
lled
as "
ag
ile
-
r
ea
d
y
"
f
r
a
m
e
w
o
r
k
.
Fig
u
r
e
6
.
A
g
ile
f
r
a
m
e
w
o
r
k
o
f
P
aa
S
4.
P
a
a
S
SE
CURI
T
Y
4
.
1
.
P
a
a
S Sec
urit
y
E
le
m
ent
s
E
le
m
e
n
ts
t
h
at
ch
ar
ac
ter
i
s
tics
P
aa
S secu
r
it
y
p
lat
f
o
r
m
ar
e
as f
o
llo
w
s
:
1.
I
n
f
o
r
m
a
tio
n
p
r
o
ce
s
s
i
n
g
:
T
h
is
is
t
h
e
s
ta
g
e
w
h
er
e
o
n
e
is
cr
ea
tin
g
d
ata
a
n
d
r
est
o
f
th
e
w
eb
u
s
e
s
it.
C
r
ea
tio
n
o
f
d
ata
m
a
y
h
ap
p
en
liv
e
o
n
r
e
m
o
te
s
er
v
er
.
So
t
h
e
d
o
cu
m
en
t
ca
n
b
e
i
n
ter
ce
p
ted
.
P
aa
S
p
r
o
v
id
es
s
ec
u
r
it
y
w
h
e
n
t
h
is
d
ata
is
i
n
s
t
o
r
ed
f
o
r
m
at,
w
h
ich
clea
r
l
y
s
ta
t
es th
at
t
h
e
p
r
o
b
lem
i
s
d
u
r
i
n
g
p
r
o
ce
s
s
in
g
s
ta
g
e.
2.
I
n
f
o
r
m
a
tio
n
i
n
ter
ac
ti
v
it
y
:
T
h
is
is
th
e
p
r
o
ce
s
s
o
f
s
h
ar
i
n
g
d
ata
ac
r
o
s
s
th
e
b
o
ar
d
.
I
n
ter
ac
tio
n
ca
n
g
o
w
it
h
p
er
s
o
n
a
l c
o
m
p
u
ter
s
,
n
et
w
o
r
k
s
,
d
ev
ices
li
k
e
p
h
o
n
e
s
an
d
s
o
o
n
.
T
h
is
in
ter
ac
tio
n
co
n
n
ec
ts
co
n
f
id
en
ti
a
l d
ata
in
lo
ca
l n
et
w
o
r
k
w
it
h
th
e
w
eb
w
h
er
e
m
o
s
t o
f
th
e
m
ca
n
ac
ce
s
s
an
d
h
e
n
ce
s
ec
u
r
it
y
i
s
s
u
e
co
m
es i
n
.
3.
Data
Sto
r
ag
e
:
T
h
is
s
p
ec
i
f
ie
s
th
e
h
o
s
ti
n
g
asp
ec
t
o
f
C
lo
u
d
.
Sev
er
al
m
ec
h
an
i
s
m
s
in
P
aa
S
allo
w
m
u
ltip
le
ap
p
licatio
n
s
to
b
e
en
c
r
y
p
ted
to
p
r
ev
en
t d
ata
lea
k
ag
e
.
Ver
if
icatio
n
i
s
h
ar
d
as d
ata
is
in
s
h
ar
ed
s
er
v
er
s
.
4
.
2
.
P
a
a
S Sec
urit
y
I
s
s
ue
s
1
)
I
n
ter
o
p
er
a
b
ilit
y
I
n
ter
o
p
er
ab
ilit
y
is
t
h
e
ab
ilit
y
f
o
r
d
if
f
er
en
t
clo
u
d
to
tal
k
to
ea
ch
o
th
er
at
th
r
ee
d
i
f
f
er
e
n
t
l
ev
els(Saa
S,
P
aa
S
an
d
I
aa
S).
I
t
is
ac
tu
all
y
t
h
e
ab
ilit
y
to
w
r
i
te
co
d
e
th
at
w
o
r
k
s
w
it
h
m
o
r
e
t
h
a
n
o
n
e
clo
u
d
p
r
o
v
id
er
s
i
m
u
lta
n
eo
u
s
l
y
,
r
e
g
ar
d
less
o
f
th
e
d
if
f
er
en
ce
s
b
et
w
ee
n
t
h
e
p
r
o
v
id
er
s
(
Dav
id
C
u
n
h
a,
et
al.
,
2
0
1
2
)
.
A
p
p
licatio
n
w
r
itte
n
to
u
s
e
s
p
ec
i
f
ic
s
er
v
ices
f
r
o
m
a
v
en
d
o
r
's P
aa
S
w
ill r
eq
u
ir
e
ch
a
n
g
es to
u
s
e
s
i
m
ilar
s
er
v
ices
f
r
o
m
a
n
o
th
e
r
v
en
d
o
r
's
P
aa
S.
E
f
f
o
r
ts
ar
e
ta
k
en
o
n
d
e
v
elo
p
m
e
n
t
o
f
o
p
en
an
d
p
r
o
p
r
ietar
y
s
ta
n
d
ar
d
A
P
I
'
s
to
en
ab
le
c
lo
u
d
m
an
a
g
e
m
e
n
t,
s
ec
u
r
it
y
,
a
n
d
in
ter
o
p
er
ab
ilit
y
.
C
o
m
m
o
n
co
n
ta
in
er
f
o
r
m
a
ts
li
k
e
DM
T
F'S
O
p
en
Vir
tu
aliza
tio
n
Fo
r
m
at
(
OVF)
.
ca
n
b
e
u
s
ed
.
A
p
p
licatio
n
w
r
itte
n
to
t
h
o
s
e
s
t
an
d
ar
d
s
is
f
ar
m
o
r
e
li
k
el
y
to
b
e
in
ter
o
p
er
ab
le
an
d
p
o
r
tab
le.
I
n
ter
o
p
er
ab
ilit
y
ca
n
b
e
m
ai
n
tai
n
ed
b
y
p
r
o
v
id
in
g
co
m
m
o
n
i
n
ter
f
ac
e
s
to
o
b
j
ec
ts
f
o
r
r
eso
u
r
ce
ac
ce
s
s
.
T
r
u
s
ted
C
o
m
p
u
ti
n
g
B
ase
(
T
C
B
)
is
th
e
s
o
l
u
tio
n
f
o
r
th
e
ab
o
v
e
m
en
tio
n
ed
is
s
u
e.
T
C
B
(
Stein
b
er
g
a
n
d
Kau
er
,
2
0
1
0
)
is
co
llectio
n
o
f
e
x
ec
u
tab
le
co
d
e
a
n
d
co
n
f
ig
u
r
at
io
n
f
iles
t
h
at
ar
e
co
n
s
id
er
ed
to
b
e
s
ec
u
r
e
w
h
ic
h
i
s
in
s
ta
lled
as
a
la
y
er
o
v
er
th
e
o
p
er
atin
g
s
y
s
te
m
an
d
p
r
o
v
id
es
a
s
ta
n
d
ar
d
ized
ap
p
lica
tio
n
p
r
o
g
r
a
m
m
in
g
in
ter
f
ac
e(
A
P
I
)
f
o
r
u
s
er
o
b
j
e
ct
s
.
T
C
B
co
d
e
is
m
i
n
i
m
ized
to
av
o
id
co
m
p
le
x
it
y
in
co
d
es
an
d
s
ec
u
r
it
y
f
la
w
s
.
T
C
B
is
b
u
ilt
b
y
r
eso
u
r
ce
cla
s
s
i
f
icatio
n
,
s
et
tin
g
r
eso
u
r
ce
a
s
s
i
g
n
m
e
n
t
r
u
les
a
n
d
ev
a
lu
at
i
n
g
r
eso
u
r
ce
ac
ce
s
s
r
eq
u
ests
.
I
n
ter
o
p
er
ab
ilit
y
ca
n
b
e
ac
h
iev
ed
b
y
in
s
tallat
io
n
o
f
T
C
B
o
n
ea
ch
an
d
ev
er
y
h
o
s
t
an
d
ass
i
g
n
m
e
n
t
o
f
r
eso
u
r
ce
th
r
o
u
g
h
T
C
B
.
A
t
tac
k
s
f
r
o
m
o
b
j
ec
ts
to
h
o
s
ts
ca
n
b
e
p
r
ev
en
ted
as
ev
er
y
r
eso
u
r
ce
ass
ig
n
m
en
t
is
ch
ec
k
ed
b
y
T
C
B
.
2)
Ho
s
t V
u
ln
er
ab
ilit
y
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8814
IJ
AA
S
Vo
l.
4
,
No
.
1
,
Ma
r
ch
201
5
:
13
–
23
20
Vu
l
n
er
ab
ilit
y
m
a
y
b
e
d
escr
ib
ed
in
ter
m
s
o
f
r
esis
tan
ce
to
a
ce
r
tain
t
y
p
e
o
f
a
tta
ck
.
M
u
lti
-
ten
an
c
y
(
Sal
tzer
,
1
9
7
4
)
allo
w
s
u
s
er
o
b
j
ec
ts
to
b
e
s
p
r
ea
d
o
v
er
in
ter
co
n
n
ec
ted
m
u
l
ti
-
u
s
er
h
o
s
t
s
.
Ho
s
ts
h
a
v
e
to
b
e
p
r
o
tecte
d
f
r
o
m
attac
k
s
i
n
s
u
c
h
an
e
n
v
ir
o
n
m
en
t.
I
f
th
is
p
r
o
tectio
n
f
ail
s
,
an
at
tack
er
ca
n
ea
s
il
y
ac
ce
s
s
t
h
e
r
eso
u
r
ce
s
o
f
h
o
s
t
a
n
d
also
te
n
an
t
o
b
j
ec
ts
.
P
r
o
v
id
er
h
as
to
tak
e
n
ec
e
s
s
ar
y
s
ec
u
r
it
y
m
ea
s
u
r
es.
T
C
B
s
er
v
es
as
s
o
lu
tio
n
f
o
r
h
o
s
t
v
u
ln
er
ab
ilit
y
also
.
3
)
Ob
j
ec
t V
u
ln
er
ab
ilit
y
Ser
v
ice
p
r
o
v
id
er
s
ca
n
ac
ce
s
s
an
d
m
o
d
if
y
u
s
er
o
b
j
ec
ts
(
R
o
ch
a
an
d
C
o
r
r
eia,
2
0
1
1
)
.
T
h
r
ee
w
a
y
s
b
y
w
h
ic
h
s
ec
u
r
it
y
o
f
an
o
b
j
ec
t c
a
n
b
e
b
r
ea
ch
ed
in
P
aa
S c
lo
u
d
s
ar
e:
1.
P
r
o
v
id
er
m
a
y
ac
ce
s
s
a
n
y
u
s
er
o
b
j
ec
t
th
at
r
esid
e
o
n
its
h
o
s
ts
.
L
'
o
p
ez
-
A
lt
,
et
al.
,
(
2
0
1
2
)
s
u
g
g
ested
th
at
a
f
u
ll
y
h
o
m
o
m
o
r
p
h
ic
e
n
cr
y
p
tio
n
ca
n
b
e
e
m
p
lo
y
ed
as
a
cr
y
p
to
g
r
ap
h
ic
d
ef
e
n
s
e
f
o
r
u
s
er
o
b
j
ec
ts
d
u
r
in
g
e
x
ec
u
t
io
n
,
b
u
t
i
t
i
s
co
m
p
u
tatio
n
all
y
e
x
p
en
s
i
v
e
(
Van
Dij
k
an
d
J
u
els,
2
0
1
0
)
.
Hen
ce
,
th
is
t
y
p
e
o
f
attac
k
is
u
n
a
v
o
id
ab
le
an
d
ca
n
b
e
a
v
o
id
ed
to
s
o
m
e
e
x
ten
t
b
y
tr
u
s
t
r
ela
tio
n
s
b
et
w
ee
n
u
s
er
an
d
p
r
o
v
id
er
.
2.
User
s
m
a
y
m
u
tu
a
ll
y
at
tack
e
ac
h
o
th
er
'
s
o
b
j
ec
ts
th
at
ar
e
t
en
an
t
s
o
f
s
a
m
e
h
o
s
t
b
ec
au
s
e
ten
an
t
o
b
j
ec
ts
s
y
n
ch
r
o
n
o
u
s
l
y
s
h
ar
e
t
h
e
s
a
m
e
r
eso
u
r
ce
s
.
3.
T
h
ir
d
p
ar
ty
m
a
y
d
ir
ec
tl
y
at
tack
a
u
s
er
o
b
j
ec
t.
Secu
r
e
co
d
in
g
e
n
ab
les
o
b
j
ec
ts
to
d
ef
en
d
th
e
m
s
el
v
es.
E
n
cr
y
p
ti
n
g
o
b
j
ec
ts
is
t
h
e
s
o
l
u
tio
n
f
o
r
o
b
j
ec
t
v
u
l
n
er
ab
ilit
y
.
I
t
is
t
h
e
r
esp
o
n
s
ib
ilit
y
o
f
p
r
o
v
i
d
er
to
p
r
o
tect
th
e
i
n
te
g
r
it
y
an
d
p
r
iv
ac
y
o
f
u
s
er
o
b
j
ec
t
o
n
a
h
o
s
t.
C
er
tain
p
r
o
b
lem
s
li
k
e
m
al
icio
u
s
p
r
o
v
id
er
a
n
d
h
o
s
t
b
ein
g
b
r
ea
ch
ed
b
y
m
a
licio
u
s
p
ar
ty
ca
n
m
ak
e
o
b
j
ec
ts
to
b
e
d
elete
d
o
r
m
o
d
if
ied
o
r
in
ac
ce
s
s
ib
le.
C
r
y
p
to
g
r
ap
h
ic
m
et
h
o
d
s
s
y
m
m
etr
ic
a
n
d
as
y
m
m
etr
ic
en
cr
y
p
tio
n
,
h
a
s
h
in
g
a
n
d
s
ig
n
a
tu
r
es
h
elp
to
p
r
o
tect
o
b
j
ec
t c
o
n
ten
ts
.
4
)
A
cc
ess
C
o
n
tr
o
l
Net
w
o
r
k
co
m
m
u
n
icatio
n
s
m
u
s
t
b
e
co
n
f
id
en
t
ial
a
n
d
ac
ce
s
s
o
f
r
e
m
o
te
e
n
tit
ies
s
h
o
u
ld
b
e
co
n
tr
o
lled
.
T
h
r
ee
m
aj
o
r
co
n
ce
p
ts
o
f
ac
ce
s
s
co
n
tr
o
l a
r
e
: a
u
t
h
en
t
icatio
n
,
a
u
th
o
r
izati
o
n
a
n
d
tr
ac
ea
b
ilit
y
.
So
m
e
o
f
t
h
e
attac
k
s
in
s
u
ch
clo
u
d
-
b
ased
en
v
ir
o
n
m
en
ts
ar
e
i
m
p
er
s
o
n
atio
n
,
p
h
i
s
h
i
n
g
attac
k
s
,
b
r
u
te
f
o
r
ce
attac
k
s
an
d
p
ass
w
o
r
d
r
eset
attac
k
s
.
T
w
o
-
f
ac
to
r
au
th
e
n
tica
tio
n
lik
e
s
m
ar
t c
ar
d
s
an
d
b
io
m
etr
ic
m
ec
h
a
n
i
s
m
s
ca
n
p
r
o
tect
f
r
o
m
s
u
c
h
attac
k
s
.
Au
t
h
en
t
icatio
n
:
I
t
n
ee
d
s
p
ar
ti
es
to
p
r
o
v
e
t
h
e
a
u
t
h
e
n
ticit
y
o
f
t
h
eir
id
en
titi
es
d
u
r
i
n
g
a
n
i
n
ter
ac
tio
n
.
Au
t
h
en
t
icatio
n
f
ail
s
w
h
e
n
u
n
p
r
iv
ileg
ed
en
titi
es
tr
y
to
ac
c
ess
o
b
j
ec
ts
.
C
u
r
r
en
t
a
u
t
h
en
ti
ca
tio
n
m
et
h
o
d
s
ar
e
en
o
u
g
h
f
o
r
P
aa
S c
lo
u
d
s
.
Au
t
h
o
r
izatio
n
:
T
h
is
m
ec
h
a
n
is
m
d
eter
m
i
n
es
w
h
o
ca
n
ac
ce
s
s
o
b
j
ec
ts
b
ased
o
n
p
r
ed
ef
in
e
d
p
o
licies.
Un
p
r
iv
ile
g
ed
ac
ce
s
s
r
es
u
lt
d
u
e
to
lack
o
f
au
t
h
o
r
izatio
n
.
R
o
le
-
b
ased
ac
ce
s
s
co
n
tr
o
l
an
d
f
ed
er
ated
ac
ce
s
s
co
n
tr
o
l
(
Mo
n
an
d
Nain
g
,
2
0
1
1
)
ar
e
em
p
lo
y
ed
f
o
r
m
an
a
g
i
n
g
au
th
o
r
izatio
n
.
B
u
t,
s
t
i
ll
p
r
o
b
le
m
s
p
er
s
i
s
t
i
n
P
aa
S
as
o
b
j
ec
ts
m
ig
r
ate
a
n
d
th
e
d
if
f
ic
u
lt
y
e
x
is
ts
in
k
ee
p
in
g
u
p
th
e
p
o
licies
d
u
r
in
g
h
o
s
t
r
ec
o
n
f
i
g
u
r
atio
n
.
E
ac
h
u
s
er
ca
n
m
a
n
a
g
e
a
ce
n
tr
al
d
atab
ase
f
o
r
p
o
licies
o
f
h
is
o
b
j
ec
ts
.
B
u
t,
th
e
ce
n
tr
alize
d
ap
p
r
o
ac
h
b
u
r
d
en
s
th
e
u
s
er
.
B
est
w
a
y
i
s
to
ca
r
r
y
p
o
licies
alo
n
g
w
it
h
th
e
o
b
j
ec
ts
s
o
t
h
at
w
h
e
n
an
o
b
j
ec
t is
m
o
v
ed
to
a
n
e
w
h
o
s
t,
p
o
licies t
h
at
ar
e
ef
f
ec
t o
n
p
r
ev
io
u
s
h
o
s
t
m
u
s
t a
ls
o
b
e
ef
f
ec
ti
v
e
o
n
c
u
r
r
en
t
h
o
s
t.
T
r
ac
ea
b
ilit
y
:
T
h
is
is
ac
h
iev
ed
th
r
o
u
g
h
k
ee
p
in
g
r
ec
o
r
d
s
o
f
ev
en
ts
o
cc
u
r
r
ed
in
a
s
y
s
te
m
.
E
v
e
n
t
r
ec
o
r
d
s
ar
e
n
ec
es
s
ar
y
f
o
r
m
ea
s
u
r
i
n
g
s
er
v
ice
c
h
ar
ac
ter
is
t
ics.
T
h
e
u
s
er
s
ar
e
b
illed
b
y
s
er
v
ice
p
r
o
v
id
er
s
b
ased
o
n
t
h
e
a
m
o
u
n
t
o
f
u
s
a
g
e.
I
n
tu
r
n
u
s
er
s
m
o
n
ito
r
th
e
s
ta
te
o
f
th
eir
ap
p
licatio
n
s
a
n
d
au
d
it
ac
ce
s
s
to
th
eir
d
ata.
I
n
ca
s
e
o
f
co
n
f
lic
ts
b
et
w
e
en
t
h
ese
t
w
o
,
th
e
j
u
r
is
d
ictio
n
ca
n
in
v
est
ig
at
e
th
e
lo
g
s
.
HI
P
AA
h
as
b
ee
n
f
r
a
m
ed
f
o
r
ac
ce
s
s
ag
ain
s
t p
er
s
o
n
al
h
ea
lt
h
r
ec
o
r
d
s
(
Gu
n
n
.
et
al.
,
2
0
0
4
)
.
So
lu
tio
n
s
to
ac
ce
s
s
co
n
tr
o
l p
r
o
b
le
m
s
ar
e
as f
o
llo
w
s
:
1.
E
n
ca
p
s
u
la
tio
n
E
n
ca
p
s
u
la
tin
g
ac
ce
s
s
co
n
tr
o
l
p
o
licies
w
i
th
o
b
j
ec
ts
ca
n
b
e
o
n
e
o
f
t
h
e
s
o
lu
tio
n
s
to
r
e
s
o
lv
e
ac
ce
s
s
co
n
tr
o
l c
o
n
f
lict
s
.
A
d
v
a
n
ta
g
es
o
f
s
u
c
h
ap
p
r
o
ac
h
is
:
a.
Settin
g
s
ar
e
en
s
u
r
ed
to
b
e
ca
r
r
ied
to
g
eth
er
w
it
h
o
b
j
ec
ts
.
b.
A
d
d
itio
n
al
co
n
n
ec
t
io
n
o
r
co
m
p
o
n
en
t is
n
o
t n
ec
es
s
ar
y
.
c.
No
n
ee
d
o
f
r
ec
o
n
f
i
g
u
r
atio
n
d
u
r
in
g
o
b
j
ec
t
m
ig
r
atio
n
.
2.
P
o
licy
en
f
o
r
ce
m
e
n
t p
o
in
t
s
(
P
E
P
s
)
A
P
o
lic
y
E
n
f
o
r
ce
m
e
n
t
P
o
in
t
(
P
E
P
)
is
th
e
lo
g
ical
en
ti
t
y
o
r
p
lace
o
n
a
s
er
v
er
t
h
at
m
a
k
es
ad
m
is
s
io
n
co
n
tr
o
l
an
d
p
o
licy
d
ec
is
io
n
s
i
n
r
esp
o
n
s
e
to
a
r
eq
u
est
f
r
o
m
a
u
s
er
w
a
n
ti
n
g
to
ac
ce
s
s
a
r
eso
u
r
ce
o
n
a
co
m
p
u
ter
o
r
n
e
t
w
o
r
k
s
er
v
er
.
A
cc
es
s
c
o
n
tr
o
l
ar
ch
itect
u
r
es
o
f
te
n
d
is
tin
g
u
i
s
h
p
o
lic
y
en
f
o
r
ce
m
e
n
t
p
o
in
ts
an
d
p
o
lic
y
d
ec
is
io
n
p
o
in
t
s
.
P
o
lic
y
e
n
f
o
r
ce
m
en
t
p
o
in
t
s
i
n
ter
ce
p
t
ac
ce
s
s
to
p
r
o
tecte
d
ap
p
licatio
n
r
eso
u
r
ce
s
(
1
)
an
d
r
eq
u
es
t
au
th
o
r
izatio
n
d
ec
is
io
n
s
f
r
o
m
a
p
o
licy
d
ec
is
io
n
p
o
in
t
(
2
)
.
A
p
o
lic
y
d
ec
is
io
n
p
o
in
t
e
v
al
u
ates
a
u
t
h
o
r
izatio
n
d
ec
is
io
n
r
eq
u
e
s
ts
r
elati
v
e
to
a
s
ec
u
r
it
y
co
n
tex
t
(
3
)
an
d
r
etu
r
n
s
t
h
e
e
v
al
u
atio
n
r
es
u
lt
to
t
h
e
p
o
lic
y
e
n
f
o
r
ce
m
en
t
p
o
in
t
(
4
)
.
I
f
th
e
e
v
al
u
atio
n
r
e
s
u
lt
i
n
d
icate
s
s
u
f
f
icie
n
t
p
r
i
v
ile
g
es
t
h
e
p
o
lic
y
en
f
o
r
ce
m
e
n
t
p
o
in
t
allo
w
s
t
h
e
i
n
itial
r
eq
u
esto
r
to
ac
ce
s
s
th
e
p
r
o
tecte
d
r
eso
u
r
ce
(
5
)
,
o
th
er
w
is
e
ac
c
ess
is
b
lo
ck
ed
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
AA
S
I
SS
N:
2252
-
8814
P
la
tfo
r
m
-
as
-
a
-
S
ervice
(
P
a
a
S
)
:
Mo
d
el
a
n
d
S
ec
u
r
ity
I
s
s
u
es (
D
ev
i T)
21
Fig
u
r
e
7
.
P
o
licy
E
n
f
o
r
ce
m
e
n
t
P
o
in
ts
Un
d
en
iab
le
lo
g
g
i
n
g
p
r
o
to
co
l:
T
h
e
p
r
o
to
co
l
aim
s
at
s
o
lv
i
n
g
lo
g
in
te
g
r
it
y
p
r
o
b
le
m
s
an
d
allo
w
s
ac
ce
s
s
r
eq
u
ests
an
d
r
esp
ec
tiv
e
r
esp
o
n
s
e
s
n
o
t
to
b
e
s
en
t
d
ir
ec
tly
to
r
elate
d
p
ar
ties
(
San
d
ik
k
a
y
a
a
n
d
Har
m
a
n
ci,
2
0
1
2
)
.
T
h
ese
p
ar
ties
f
o
llo
w
th
e
m
e
s
s
a
g
es
p
u
b
lis
h
ed
o
n
o
n
lin
e
b
u
lleti
n
b
o
ar
d
.
Pre
v
en
tio
n
o
f
m
is
u
s
e
li
k
e
f
als
e
r
eq
u
ests
a
n
d
r
esp
o
n
s
e
is
al
s
o
an
ad
d
ed
f
ea
tu
r
e
o
f
t
h
e
p
r
o
to
co
l.
C
o
m
i
n
g
to
t
h
e
ca
s
e
o
f
tr
ac
ea
b
ilit
y
,
lo
g
g
in
g
s
y
s
te
m
s
a
s
s
u
m
e
lo
g
g
er
to
b
e
tr
u
s
t
w
o
r
t
h
y
.
E
v
e
n
t
r
ec
o
r
d
s
ar
e
s
to
r
ed
as
s
i
m
p
le
te
x
t
m
ess
a
g
es
i
n
lo
g
g
i
n
g
s
y
s
te
m
s
.
I
n
teg
r
ated
u
n
d
e
n
iab
le
lo
g
g
i
n
g
p
r
o
to
co
l
ca
n
b
e
e
m
p
lo
y
ed
f
o
r
p
r
o
tectin
g
lo
g
g
i
n
g
s
y
s
te
m
s
a
g
ain
s
t a
ll i
n
ter
ac
ti
n
g
p
ar
ties
.
5
)
Priv
ac
y
-
Aw
ar
e
A
u
th
e
n
ticat
io
n
Fo
r
au
th
e
n
tica
tio
n
,
u
s
er
r
e
v
ea
ls
m
o
s
t
o
f
t
h
e
d
etails
r
eg
ar
d
in
g
h
i
m
.
P
r
o
x
y
ce
r
ti
f
icate
s
h
e
lp
to
r
ed
u
ce
th
e
r
is
k
as
s
o
ciate
d
w
it
h
r
ev
ea
l
in
g
o
f
t
h
ese
a
ttrib
u
tes.
P
r
o
x
y
ce
r
tif
icate
i
s
ac
t
u
all
y
an
e
lectr
o
n
ic
ce
r
tific
ate
t
h
at
in
cl
u
d
es
o
n
l
y
th
e
r
eq
u
ir
ed
att
r
ib
u
tes
o
f
t
h
e
co
r
r
esp
o
n
d
in
g
i
d
en
tit
y
.
R
eq
u
ir
e
m
e
n
t
s
to
b
e
m
et
d
u
r
in
g
p
r
iv
ac
y
-
a
w
ar
e
au
th
e
n
ticatio
n
w
it
h
p
r
o
x
y
ce
r
ti
f
icate
s
.
a.
B
ased
o
n
ac
ce
s
s
co
n
tr
o
l
p
o
licies
d
ef
i
n
ed
b
y
b
o
t
h
s
er
v
ice
p
r
o
v
id
er
s
an
d
u
s
er
s
,
h
o
s
t
s
a
n
d
o
b
j
ec
ts
s
h
o
u
ld
n
o
t
r
eq
u
est
m
o
r
e
attr
i
b
u
tes
th
a
n
t
h
e
r
eq
u
ir
ed
am
o
u
n
t.
I
f
m
o
r
e
attr
ib
u
te
s
ar
e
r
eq
u
ested
,
th
en
t
h
e
s
er
v
ice
is
n
e
g
o
tiated
.
b.
W
ith
th
e
h
elp
o
f
tr
u
s
ted
th
ir
d
p
ar
ty
,
ea
s
il
y
co
n
f
i
g
u
r
ab
le
cr
ed
en
tials
w
h
ich
r
ev
ea
l
d
ata
th
at
th
e
id
en
tit
y
o
w
n
er
s
p
er
m
i
t c
an
b
e
ac
h
iev
ed
.
P
r
o
x
y
ce
r
ti
f
icate
au
th
o
r
itie
s
(
P
C
As)
h
an
d
le
d
y
n
a
m
ic
g
en
er
atio
n
o
f
attr
ib
u
te
b
ased
cr
ed
en
tial
s
b
ased
o
n
g
e
n
u
in
e
ce
r
tific
ates
a
n
d
li
n
k
s
p
r
o
x
y
a
n
d
g
e
n
u
in
e
ce
r
ti
f
ica
tes
i
n
ca
s
e
o
f
co
n
f
l
icts
.
T
h
e
y
k
ee
p
tr
ac
k
o
f
p
r
o
x
y
ce
r
tif
ic
ate
s
is
s
u
ed
alo
n
g
w
it
h
co
r
r
esp
o
n
d
in
g
g
e
n
u
in
e
ce
r
ti
f
i
ca
tes.
P
r
o
x
y
ce
r
ti
f
icate
s
ca
n
b
e
r
eu
s
ed
an
d
P
C
A
s
ar
e
s
er
v
ices p
r
o
v
id
ed
in
clo
u
d
.
Hier
ar
ch
ical
P
C
A
s
ca
n
b
e
u
til
ized
to
ac
h
iev
e
s
ca
lab
ilit
y
.
6
)
C
o
n
tin
u
it
y
o
f
Ser
v
ice
an
d
T
o
ler
an
ce
o
f
Fau
l
t
Ser
v
ice
m
a
y
b
e
d
i
s
r
u
p
ted
d
u
e
to
m
al
f
u
n
c
tio
n
o
r
attac
k
an
d
h
en
ce
th
e
i
n
ter
ac
tio
n
s
to
p
s
f
o
r
a
p
er
io
d
o
f
ti
m
e.
C
o
n
te
n
t
o
f
o
b
j
ec
t
is
ch
a
n
g
ed
o
r
d
elete
d
co
m
p
letel
y
.
B
y
za
n
t
in
e
q
u
o
r
u
m
ap
p
r
o
ac
h
(
L
o
r
en
zo
,
et
al.
,
2
0
0
1
)
ca
n
b
e
e
m
p
lo
y
ed
to
attai
n
f
a
u
lt
-
to
ler
an
ce
a
n
d
s
er
v
ice
co
n
tin
u
it
y
.
B
y
za
n
ti
n
e
q
u
o
r
u
m
s
y
s
te
m
(
Ma
lk
h
i
a
n
d
R
eiter
,
1
9
9
8
)
o
f
f
er
s
r
ea
d
an
d
w
r
ite
s
er
v
ice
s
to
it
s
clie
n
ts
o
n
a
s
et
o
f
r
ep
licated
d
ata
ite
m
s
.
A
r
ea
d
o
p
er
atio
n
r
etr
iev
es
d
ata
f
r
o
m
a
q
u
o
r
u
m
o
f
co
r
r
ec
t
r
ep
licas
an
d
a
w
r
i
te
o
p
er
atio
n
ap
p
lies
t
h
e
u
p
d
a
te
to
a
q
u
o
r
u
m
o
f
co
r
r
ec
t
r
e
p
licas.
So
,
m
o
d
if
icat
io
n
s
o
n
an
o
b
j
ec
t
w
ill
b
e
d
etec
ted
o
r
in
ac
ce
s
s
ib
le
s
y
s
te
m
s
c
an
b
e
r
ec
o
v
er
ed
in
s
u
c
h
s
y
s
te
m
s
.
T
h
is
f
a
u
lt
to
l
er
an
t
s
y
s
te
m
p
r
o
v
id
es
p
r
o
tectio
n
a
g
ain
s
t
u
n
av
ai
lab
ilit
y
o
f
s
er
v
ice
in
clo
u
d
en
v
ir
o
n
m
e
n
t
s
.
S
u
r
v
e
y
o
f
s
u
c
h
s
y
s
te
m
s
w
it
h
e
x
ten
s
i
v
e
e
x
a
m
p
les
ar
e
d
is
cu
s
s
ed
b
y
B
ess
a
n
i
,
et
al.
,
2011.
T
ab
le
3
s
h
o
w
s
t
h
e
s
u
m
m
ar
y
o
f
s
ec
u
r
it
y
is
s
u
es i
n
P
aa
S a
lo
n
g
w
it
h
t
h
eir
s
o
lu
t
io
n
s
.
T
ab
le
4
.
Su
m
m
ar
y
o
f
s
ec
u
r
it
y
is
s
u
es
w
it
h
t
h
eir
s
o
lu
tio
n
s
S
e
c
u
r
i
t
y
I
ssu
e
s
S
o
l
u
t
i
o
n
s
I
n
t
e
r
o
p
e
r
a
b
i
l
i
t
y
T
r
u
st
e
d
C
o
m
p
u
t
i
n
g
B
a
se
H
o
st
V
u
l
n
e
r
a
b
i
l
i
t
y
T
r
u
st
e
d
C
o
m
p
u
t
i
n
g
B
a
se
O
b
j
e
c
t
V
u
l
n
e
r
a
b
i
l
i
t
y
En
c
r
y
p
t
i
o
n
A
c
c
e
ss C
o
n
t
r
o
l
En
c
a
p
s
u
l
a
t
i
o
n
P
o
l
i
c
y
En
f
o
r
c
e
me
n
t
P
o
i
n
t
s
U
n
d
e
n
i
a
b
l
e
L
o
g
g
i
n
g
P
r
o
t
o
c
o
l
P
r
i
v
a
c
y
A
w
a
r
e
A
u
t
h
e
n
t
i
c
a
t
i
o
n
P
r
o
x
y
C
e
r
t
i
f
i
c
a
t
e
s
S
e
r
v
i
c
e
C
o
n
t
i
n
u
i
t
y
a
n
d
F
a
u
l
t
T
o
l
e
r
a
n
c
e
B
y
z
a
n
t
i
n
e
Q
u
o
r
u
m
S
y
st
e
m
5.
CO
NCLU
SI
O
N
Secu
r
e
P
aa
S c
lo
u
d
ca
n
b
e
ac
h
i
ev
ed
b
y
u
n
d
er
s
tan
d
i
n
g
t
h
e
P
aa
S
m
o
d
el,
i
ts
t
y
p
es
an
d
t
h
e
is
s
u
es r
elate
d
to
s
ec
u
r
it
y
.
T
h
e
v
ar
io
u
s
f
ea
t
u
r
es
o
f
P
aa
S
ca
n
b
e
u
tili
ze
d
in
an
ef
f
icie
n
t
m
a
n
n
er
b
ased
o
n
th
e
d
ee
p
er
u
n
d
er
s
ta
n
d
in
g
o
f
P
aa
S
en
v
ir
o
n
m
e
n
t
i
n
clo
u
d
.
T
h
e
c
h
ar
ac
ter
is
tics
o
f
P
aa
S
alo
n
g
w
i
th
t
h
e
e
v
alu
a
tio
n
cr
iter
ia
i
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8814
IJ
AA
S
Vo
l.
4
,
No
.
1
,
Ma
r
ch
201
5
:
13
–
23
22
ch
o
o
s
in
g
a
p
r
o
v
id
er
f
o
r
P
aa
S
h
as
also
b
ee
n
id
en
t
if
ied
a
lo
n
g
w
it
h
P
aa
S
s
ec
u
r
it
y
e
le
m
e
n
t
s
.
Fi
n
all
y
,
s
ec
u
r
it
y
is
s
u
es i
n
P
aa
S
w
it
h
t
h
eir
ap
p
r
o
p
r
iate
s
o
lu
tio
n
s
h
a
v
e
b
ee
n
g
i
v
en
.
W
it
h
t
h
e
s
o
l
u
tio
n
s
a
n
d
al
s
o
b
y
k
n
o
w
i
n
g
th
e
s
e
is
s
u
es,
cu
s
to
m
er
s
ca
n
b
e
p
r
ec
au
tio
n
ar
y
w
h
ile
u
s
in
g
P
aa
S.
ACK
NO
WL
E
D
G
E
M
E
NT
S
T
h
e
au
th
o
r
s
w
o
u
ld
li
k
e
to
th
a
n
k
VI
T
Un
iv
er
s
it
y
f
o
r
p
r
o
v
id
in
g
r
eso
u
r
ce
s
an
d
f
ac
ilit
ie
s
to
ca
r
r
y
o
u
t
r
esear
ch
w
o
r
k
.
RE
F
E
R
E
NC
E
S
[1
]
L.
M
.
Ka
u
fm
a
n
,
“
Da
ta
se
c
u
rit
y
in
th
e
w
o
rld
o
f
c
lo
u
d
c
o
m
p
u
ti
n
g
”
,
I
EE
E
S
e
c
u
rity
&
Priva
c
y
,
V
o
l
.
7
,
No
.
4
,
p
p
.
61
–
6
4
,
2
0
0
9
.
[2
]
D.
Ca
tt
e
d
d
u
a
n
d
G
.
Ho
g
b
e
n
,
“
Clo
u
d
c
o
m
p
u
ti
n
g
:
Be
n
e
f
it
s,
risk
s
a
n
d
re
c
o
m
m
e
n
d
a
ti
o
n
s
f
o
r
in
f
o
rm
a
ti
o
n
se
c
u
rit
y
”
,
T
e
c
h
n
ica
l
re
p
o
rt,
ENIS
A
,
No
v
2
0
0
9
.
[3
]
S
.
S
u
b
a
sh
in
i
a
n
d
V
.
Ka
v
it
h
a
,
“
A
su
rv
e
y
o
n
se
c
u
rit
y
issu
e
s
in
se
r
v
i
c
e
d
e
li
v
e
r
y
m
o
d
e
ls
o
f
c
lo
u
d
c
o
m
p
u
ti
n
g
”
,
J
o
u
rn
a
l
o
f
Ne
two
rk
a
n
d
Co
m
p
u
ter
A
p
p
li
c
a
ti
o
n
s
,
V
o
l.
3
4
,
N
o
.
1
,
p
p
.
1
-
1
1
,
J
a
n
2
0
1
1
.
[4
]
V.
J.
R.
W
in
k
ler,
“
S
e
c
u
rin
g
th
e
Clo
u
d
:
Clo
u
d
C
o
m
p
u
ter
S
e
c
u
rit
y
T
e
c
h
n
iq
u
e
s
a
n
d
T
a
c
ti
c
s”
,
W
a
lt
h
a
m
:
S
y
n
g
re
ss
,
2
0
1
1
.
[5
]
Na
ti
o
n
a
l
In
st
it
u
te
o
f
S
tan
d
a
r
d
s an
d
T
e
c
h
n
o
lo
g
y
(NIST
).
[6
]
G
o
o
g
le ap
p
e
n
g
in
e
,
Ju
ly
2
0
1
2
.
[7
]
W
in
d
o
w
s az
u
re
p
latf
o
r
m
,
Ju
ly
2
0
1
2
.
[8
]
D.
Zi
ss
is
a
n
d
D
.
L
e
k
k
a
s,
“
A
d
d
re
ss
in
g
c
lo
u
d
c
o
m
p
u
ti
n
g
se
c
u
rit
y
issu
e
s
”
,
Fu
t
u
re
Ge
n
e
ra
ti
o
n
Co
mp
u
ter
S
y
ste
ms
,
V
o
l
.
2
8
,
N
o
.
3
,
p
p
.
5
8
3
-
5
9
2
,
2
0
1
2
.
[9
]
M
.
A
l
m
o
rs
y
,
e
t
a
l.
,
“
Co
ll
a
b
o
ra
ti
o
n
-
Ba
se
d
Cl
o
u
d
Co
m
p
u
ti
n
g
S
e
c
u
rit
y
M
a
n
a
g
m
e
n
t
F
ra
m
e
w
o
r
k
”
,
IEE
E
4
t
h
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
Cl
o
u
d
Co
m
p
u
ti
n
g
,
p
p
.
3
6
4
-
3
7
1
,
2
0
1
1
.
[1
0
]
P
.
S
a
rip
a
ll
i
a
n
d
B.
W
a
lt
e
rs
,
“
QU
I
RC:
A
Qu
a
n
ti
tativ
e
I
m
p
a
c
t
a
n
d
Risk
A
ss
e
ss
m
e
n
t
F
ra
m
e
w
o
rk
f
o
r
Clo
u
d
S
e
c
u
rit
y
”
,
Pro
c
e
e
d
in
g
s
o
f
IE
EE
3
rd
I
n
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
Clo
u
d
Co
mp
u
ti
n
g
,
p
p
.
2
8
0
-
2
8
8
,
2
0
1
0
.
[1
1
]
S.
S
e
n
g
u
p
ta,
e
t
a
l.
,
“
Clo
u
d
Co
m
p
u
ti
n
g
S
e
c
u
rit
y
-
T
re
n
d
s
a
n
d
Re
se
a
rc
h
Dire
c
ti
o
n
s
”
,
IEE
E
W
o
rld
Co
n
g
re
ss
o
n
S
e
rv
ice
s
,
p
p
.
5
2
4
-
5
3
1
,
2
0
1
1
[1
2
]
A
.
U.
Kh
a
n
,
e
t
a
l.
,
“
S
e
c
u
rit
y
Risk
s
a
n
d
th
e
ir
M
a
n
a
g
e
m
e
n
t
in
Clo
u
d
Co
m
p
u
ti
n
g
”
,
IEE
E
4
t
h
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Clo
u
d
Co
mp
u
t
i
n
g
T
e
c
h
n
o
l
o
g
y
a
n
d
S
c
ien
c
e
,
p
p
.
1
2
1
-
1
2
8
,
2
0
1
2
.
[1
3
]
V
.
F
u
se
n
ig
a
n
d
A
.
S
h
a
rm
a
,
“
S
e
c
u
rit
y
A
rc
h
it
e
c
tu
re
f
o
r
Clo
u
d
N
e
tw
o
rk
in
g
”
,
IEE
E
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Co
mp
u
t
in
g
,
Ne
two
rk
i
n
g
a
n
d
C
o
mm
u
n
ica
t
io
n
s
,
p
p
.
45
-
4
9
,
2
0
1
2
.
[1
4
]
W
.
A
.
P
a
u
ley
,
“
Clo
u
d
P
r
o
v
id
e
r
T
ra
n
sp
a
re
n
c
y
:
A
n
E
m
p
iri
c
a
l
Ev
a
lu
a
ti
o
n
”
,
C
o
p
u
b
l
ish
e
d
By T
h
e
IE
EE
Co
mp
u
ter
An
d
Relia
b
i
li
ty S
o
c
ieties
.
[1
5
]
Da
v
id
Cu
n
h
a
,
e
t
a
l.
,
“
In
tero
p
e
ra
b
il
it
y
A
n
d
P
o
rta
b
il
it
y
O
f
Clo
u
d
S
e
rv
ice
,
En
a
b
lers
In
A
P
a
a
s
En
v
iro
n
m
e
n
t
”
,
2
n
d
In
tern
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
Cl
o
u
d
Co
m
p
u
ti
n
g
a
n
d
S
e
rv
ice
s S
c
ien
ce
,
p
p
.
4
3
2
-
4
3
7
,
A
p
ril
2
0
1
2
.
[1
6
]
U.
S
tein
b
e
r
g
a
n
d
B.
Ka
u
e
r,
“
No
v
a
:
a
mic
ro
h
y
p
e
rv
iso
r
-
b
a
se
d
se
c
u
re
v
irtu
a
li
za
ti
o
n
a
rc
h
it
e
c
tu
re
”,
In
P
r
o
c
e
e
d
in
g
s
o
f
th
e
5
t
h
E
u
ro
p
e
a
n
c
o
n
f
e
re
n
c
e
o
n
Co
m
p
u
ter sy
ste
m
s,
Eu
ro
S
y
s ’1
0
,
N
e
w
Yo
rk
,
NY
,
US
A
,
p
p
.
2
0
9
-
2
2
2
,
2
0
1
0
.
[1
7
]
J.
H.
S
a
lt
z
e
r
,
“
P
r
o
tec
ti
o
n
a
n
d
t
h
e
c
o
n
tr
o
l
o
f
in
f
o
rm
a
ti
o
n
sh
a
rin
g
i
n
m
u
lt
ics
”
,
Co
mm
u
n
.
ACM
,
Vo
l.
17
,
No
.
7
,
p
p
.
388
-
4
0
2
,
1
9
7
4
.
[1
8
]
F
.
Ro
c
h
a
a
n
d
M
.
Co
rre
ia
,
“
L
u
c
y
in
th
e
sk
y
wit
h
o
u
t
d
i
a
mo
n
d
s
:
S
tea
li
n
g
c
o
n
f
id
e
n
t
ia
l
d
a
ta
i
n
th
e
c
lo
u
d
”,
I
n
P
r
o
c
e
e
d
in
g
s
o
f
th
e
2
0
1
1
IEE
E
/IF
I
P
4
1
s
t
I
n
tern
a
ti
o
n
a
l
Co
n
f
e
r
e
n
c
e
o
n
De
p
e
n
d
a
b
le
S
y
ste
m
s
a
n
d
Ne
tw
o
rk
s
W
o
rk
sh
o
p
s,
DSNW
’1
1
,
W
a
sh
in
g
to
n
,
DC,
USA
,
p
p
.
1
2
9
–
1
3
4
,
2
0
1
1
.
[1
9
]
A
.
L´
o
p
e
z
-
A
lt
,
e
t
a
l
.
,
“
On
-
th
e
-
fl
y
mu
lt
ip
a
rty
c
o
mp
u
t
a
ti
o
n
o
n
th
e
c
l
o
u
d
v
i
a
mu
lt
ike
y
fu
ll
y
h
o
mo
mo
r
p
h
ic
e
n
c
ry
p
ti
o
n
”,
In
P
ro
c
e
e
d
i
n
g
s
o
f
th
e
4
4
th
sy
m
p
o
siu
m
o
n
T
h
e
o
r
y
o
f
Co
m
p
u
ti
n
g
,
S
T
OC
’1
2
,
Ne
w
Yo
rk
,
NY
,
US
A
,
pp.
1
2
1
9
–
1
2
3
4
,
2
0
1
2
.
[2
0
]
M
.
v
a
n
Dijk
a
n
d
A
.
Ju
e
ls,
“
On
t
h
e
im
p
o
ss
ib
il
it
y
o
f
c
r
y
p
to
g
r
a
p
h
y
a
lo
n
e
f
o
r
p
ri
v
a
c
y
-
p
re
se
r
v
in
g
c
lo
u
d
c
o
m
p
u
ti
n
g
”
,
IA
CR Cr
y
p
to
lo
g
y
e
P
rin
t
A
rc
h
iv
e
,
Vo
l.
3
0
5
,
2
0
1
0
.
[2
1
]
E.
E.
M
o
n
a
n
d
T
.
T
.
Na
in
g
,
“
T
h
e
p
riv
a
c
y
-
a
w
a
re
a
c
c
e
ss
c
o
n
tr
o
l
sy
ste
m
u
sin
g
a
t
trib
u
te
-
a
n
d
r
o
le
-
b
a
se
d
a
c
c
e
ss
c
o
n
tro
l
in
p
riv
a
te
c
lo
u
d
”,
In
B
ro
a
d
b
a
n
d
Ne
tw
o
rk
a
n
d
M
u
lt
im
e
d
ia
T
e
c
h
n
o
lo
g
y
(IC
-
BNMT
),
2
0
1
1
4
t
h
IEE
E
In
tern
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
,
p
p
.
4
4
7
-
4
5
1
,
Oc
t
2
0
1
1
.
[2
2
]
P
.
P
.
G
u
n
n
,
e
t
a
l
.
,
“
T
h
e
h
e
a
lt
h
in
su
ra
n
c
e
p
o
rt
a
b
il
it
y
a
n
d
a
c
c
o
u
n
tab
il
it
y
a
c
t
p
riv
a
c
y
ru
le:
a
p
ra
c
t
ica
l
g
u
id
e
f
o
r
re
se
a
rc
h
e
rs
”,
M
e
d
ica
l
Ca
re
,
V
o
l
.
42
,
N
o
.
4
,
p
p
.
3
2
1
-
3
2
7
,
2
0
0
4
.
[2
3
]
S
a
n
d
ik
k
a
y
a
a
n
d
Ha
rm
a
n
c
i,
“
S
e
c
u
rity
Pro
b
lem
s
o
f
Pl
a
t
fo
rm
-
as
-
a
-
S
e
rv
ice
(
Pa
a
S
)
C
lo
u
d
s
a
n
d
Pra
c
ti
c
a
l
S
o
lu
ti
o
n
s
t
o
th
e
Pro
b
lem
s
”
,
In
tern
a
ti
o
n
a
l
S
y
m
p
o
siu
m
o
n
Re
li
a
b
le Distri
b
u
ted
S
y
ste
m
s,
IEE
E
,
p
p
.
4
6
3
-
4
6
8
,
2
0
1
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.