2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)最新文献

筛选
英文 中文
A Hardware-Based Software Protection Systems--Analysis of Security Dongles with Memory 一种基于硬件的软件保护系统——基于内存的安全加密狗分析
I. Józwiak, A. Liber, K. Marczak
{"title":"A Hardware-Based Software Protection Systems--Analysis of Security Dongles with Memory","authors":"I. Józwiak, A. Liber, K. Marczak","doi":"10.1109/ICCGI.2007.2","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.2","url":null,"abstract":"Software piracy is the illegal reproduction and distribution of software applications, whether for business or personal use. Globally, businesses and consumers will spend $300 billion on PC software over the next four years, according to International Data Corporation (IDC) estimates. Given the current market growth by country and current country-level piracy rates, during the same four-year period, we can expect almost $200 billion worth of PC software to be pirated. Protecting application against not authorized copying using program solutions is impossible. If there is a possibility to start program, there is also a possibility to crack it. Cracking means that application can be used without being registered or to the application there is a mechanism added which enables to obviate implemented there protections (for example: generator of serials codes). The device protection of software (dongles) has existed on the market for many years and it has functioned as devices protecting the software against not authorized copying and usage. For the application to work without device's key, the intruder has to modify it or emulate the presence of device's key. The dissertation presents tools and techniques used to break devices' protection of software with memory. The issue of software protection against not authorized copying, using devices' solutions is not a popular subject of scientific publications. The dissertations provides information about the applied methods and techniques of breaking the hypothetical construction of device's protection used the constructed electronic devices. The research is the introduction to designing the hardware protection of programmes resistant to well-known methods of breaking through safety of electronic devices' keys.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Information Management for Dynamic Networks 动态网络的信息管理
K. Pentikousis, R. Aguero, R. Giaffreda, A. Galis, E. Hepworth
{"title":"Information Management for Dynamic Networks","authors":"K. Pentikousis, R. Aguero, R. Giaffreda, A. Galis, E. Hepworth","doi":"10.1109/ICCGI.2007.28","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.28","url":null,"abstract":"The proliferation of mobile devices and the bundling of several network access technologies in a single product have increased considerably the communication environment complexity. There has been a certain drive for allowing end users to be \"best- connected\" anywhere, anytime, which places an additional set of stringent requirements on the already over-engineered domain of mobile computing. This rapidly increasing computational complexity is reinforced by the mounting number of wirelessly connected mobile devices and, therefore, network solutions are sought after with several self-X properties (self-configuration, - adaptation, and -management, to name a few). Such networks will require services that reliably cater the latest information aiming at simplifying and fostering autonomic decision-making. We introduce the dynamic networks information service infrastructure (DNISI), an application of the information service architecture developed in the ambient networks project. We present how DNISI supports both enhanced mobility management and context-aware communications in today's pervasive networking environments by providing the means for gathering, correlating, and managing cross-layer and cross-domain information. Finally, we explain how service platform components and end-users applications can benefit in the near-term.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133828551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
E-Bicycle Demonstration on the Tour De France 环法自行车赛上的电动自行车演示
A. Dhraief, N. Montavont, R. Kuntz, M. Tsukada
{"title":"E-Bicycle Demonstration on the Tour De France","authors":"A. Dhraief, N. Montavont, R. Kuntz, M. Tsukada","doi":"10.1109/ICCGI.2007.23","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.23","url":null,"abstract":"In this paper, we describe the E-bicycle demonstration held within the Tour De France. It was performed by the Nautilus6 working group in order to see the impact and usage of new IPv6 mobility protocols in the real life. We report our experience of settting an IPv6 mobile network demonstration where a E-car and two E-bicycles are communicating together while being in motion. The scenario involves network mobility managed by NEMO Basic support and optimized group communication via Xcast6. We finally put forward the results of the demonstration and give recommendations for future deployment.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134185125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of a Learning Management System for Adaptivity Purposes 基于适应性目的的学习管理系统评价
E. Popescu, P. Trigano, C. Bǎdicǎ
{"title":"Evaluation of a Learning Management System for Adaptivity Purposes","authors":"E. Popescu, P. Trigano, C. Bǎdicǎ","doi":"10.1109/ICCGI.2007.24","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.24","url":null,"abstract":"Adaptive Web-based educational systems are a continuously growing area of research. However, despite the relatively numerous approaches, adaptivity from the point of view of student learning styles is not properly addressed. We therefore plan to create a framework for devising and deploying university courses that will take into account not only student's knowledge level but also his/her cognitive traits, interests and motivation. A first step towards achieving our objective is the choice of an existing LMS, suitable for being extended into an adaptive one. The netUniversite platform proved to be a successful candidate.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116265401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Rapid Development of Enhanced Services Using Application Programming Interfaces 使用应用程序编程接口快速开发增强服务
D. Adamopoulos
{"title":"Rapid Development of Enhanced Services Using Application Programming Interfaces","authors":"D. Adamopoulos","doi":"10.1109/ICCGI.2007.51","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.51","url":null,"abstract":"In the highly competitive telecommunications environment of today a service provider must continually evolve its network and enable new revenue-generating services faster and more cost effectively than the competition. These services should create value for the end users by satisfying all their functional requirements in an efficient manner, and they should be delivered with simplicity and ease of provisioning. This paper focuses on the transition from a requirements capture and analysis phase to a service analysis phase in the framework of an object- oriented service creation methodology, by considering the internal structure and the functionality of a telematic service. After the examination of the main activities that take place in the service analysis phase and the identification of the main artifacts that are produced during them, the overall service development process is highlighted, and the paper attempts to validate, through several service creation experiments, not only the service analysis phase, but also the overall service creation methodology. Finally, the validation results are discussed and further evaluation actions are briefly outlined.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Optimization of a DHT-Based Discovery Science 基于dht的发现科学的自优化
P. Karwaczyriski, J. Mocnik
{"title":"Self-Optimization of a DHT-Based Discovery Science","authors":"P. Karwaczyriski, J. Mocnik","doi":"10.1109/ICCGI.2007.58","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.58","url":null,"abstract":"Discovery in large, highly dynamic service oriented systems cannot be realized by traditional means, i.e. with a centralized index. Instead, distributed data structures are used, with a distributed hash table deployed on an overlay network being a typical example. The efficiency of overlay networks built on top of the IP network commonly suffers from the mismatch between the topologies of the overlay and the underlying IP network, resulting in unnecessary traffic and increased latencies. Substantial improvement can be achieved by optimizing the logical links between overlay nodes. In this paper, we propose a new method for self-optimization of a pervasive, DHT-based discovery service. Our method has no need for active measurement of inter-node latencies, thus minimizing network traffic costs of node insertion and topology maintenance. We verify our method by means of analysis of a large data sets of latency measurements between arbitrary nodes on the Internet, proving correlation among common IP prefix length of communicating nodes and latency.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Patterns for Voice over IP Networks IP网络语音的安全模式
E. Fernández, Juan C. Pelaez, Maria Mercedes Larrondo-Petrie
{"title":"Security Patterns for Voice over IP Networks","authors":"E. Fernández, Juan C. Pelaez, Maria Mercedes Larrondo-Petrie","doi":"10.4304/JSW.2.2.19-29","DOIUrl":"https://doi.org/10.4304/JSW.2.2.19-29","url":null,"abstract":"Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in the same network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. We give an overview of VoIP and provide UML models of some aspects of its infrastructure, including architectures and basic use cases. We present some security patterns that describe mechanisms that can control many of the possible attacks and which could be used to design secure systems.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121111212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信