{"title":"Analysis for Botnet Detection Techniques","authors":"Ying Wang, Zhigang Jin","doi":"10.1109/ITAPP.2010.5566260","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566260","url":null,"abstract":"Botnet is one of the most serious threats to the security of the Internet nowadays. This paper introduces the characteristics the transmission manner and the harm of botnet, studies the detection, tracking and removal technologies in botnet based on the analysis of samples from the bot start, and summarized the trends of botnet.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130585657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Application of the Transparent Document Encryption Gateway in Information Leakage Prevention","authors":"Liling Xie","doi":"10.1109/ITAPP.2010.5566626","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566626","url":null,"abstract":"The paper presents a project which uses transparent encryption gateway to encrypt files for information security and leakage prevention. A system in intranet for information leakage prevention(ILP) based on this technique is proposed. It pays attention to both security and availability. Moreover, the users can encrypt documents flexibly with the optional encryption technique.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132946663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on a Multi-Level Security Model for Network Isolation","authors":"HongGang Lin, Lin Chen","doi":"10.1109/ITAPP.2010.5566624","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566624","url":null,"abstract":"For solving information confidentiality problems in the network isolation system, a multi-level security model for network isolation system is proposed. It can control communication between subjects by adding communicating factor into system and constructing new state transition rules that describe work course of system. The model is proved to be correct through formal methods .The model can isolate the inner net and the outer net effectively, protect the confidentiality of sensitive information, and provide a theoretical foundation for design of nework isolation system.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132031778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Study of GIS-Based Optical Cable Information System","authors":"Gang Tao, T. Chi, Guixiang Zheng","doi":"10.1109/ITAPP.2010.5566487","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566487","url":null,"abstract":"Information infrastructure network is the foundation of urban information infrastructure. Along with the completion of a large number of optic cable facilities, we need appropriate management tools to guide the network plan and design, maintaining the healthy development of the network. Combined with the characteristics and advantages of GIS, this paper introduced the GIS technology into city optic cable management, designed the GIS-based system and described the system's basic framework, function composition and technical line in turn, especially the key technology and technological advantages.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology-Based Interactive Question and Answering System","authors":"Li Liu, Quan Qi, Fangfang Li","doi":"10.1109/ITAPP.2010.5566132","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566132","url":null,"abstract":"Interactive Question and Answering System (IQA) is a new question and answer research field. IQA guides users to complement the missing question information through some interaction strategy. It overcomes the defect that traditional question answering system cannot handle questions with incomplete information; it also reduces the requirement for questions analysis. This paper introduces the mechanism of IQA, proposes a domain Ontology-based IQA framework and an incomplete questions' knowledge representing framework-question information domain (QID). Domain Ontology-based IQA extracts effective information from domain question corpus, and then focuses the effective information on Ontology concept through Ontology-based query expansion (OBQE) method, to establish Ontology-based domain QID knowledgebase. The interaction is, searching the domain QID knowledgebase to complement users' QID to domain QID. We use rough set algorithm to deal with domain QID knowledgebase, reduce the search space and interaction steps. The experiment result shows that our IQA framework is feasible and the reduction of knowledgebase improves the interaction efficiently.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implement Environment and Countermeasures about the Lowest Tender Price Method in Bidding of Construction Engineering","authors":"Hong-wei Liu, Zhuowen Wang","doi":"10.1109/ITAPP.2010.5566217","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566217","url":null,"abstract":"The lowest tender price method in bidding of construction engineering is a mature and feasible method which conforms to market economy. The system environment and market economy are the foundation of this method through analysing it's implement environment. The essay put forward the implement countermeasures and five assuring measures about this method being practised in our country. The'power-money trade' and 'ogether-conspired bidding ' can be restrained by continuously perfecting the law, the system, the environment and so on. The method can also supply a permanent cure for our government in treating the important problems in construction field.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125599563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling of the Knowledge Absorptive Capacity for a Modern Service Enterprise","authors":"Yuanjian Qin, Xinyan Zhu","doi":"10.1109/ITAPP.2010.5566154","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566154","url":null,"abstract":"Featured as being knowledge-intensified, innovation-motivated and network-orientated, a modern service enterprise has to attach more importance on the organizational absorptive capacity of knowledge than a traditional one. Through external environment, internal management and knowledge attribute, this Paper analyses the impacts on the organizational absorptive capacity of knowledge by different factors, including the enterprise network, prior knowledge basis, employee's absorptive capacity of knowledge, supporting system, attributes of external knowledge and organizational learning mechanism, on which the Knowledge Absorptive Capacity is modeled for the modern service enterprise.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Incentive Wage Contracts under Adverse Selection and Moral Hazard","authors":"Jianzhang Li","doi":"10.1109/ITAPP.2010.5566526","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566526","url":null,"abstract":"In this paper, we study the problem in which a risk-neutral principal design optimal incentive wage contracts for a risk-averse agent under asymmetric information.Using the theories and methods of dynamic programming and optimal control and mechanism design,the characteristics and some interesting comparative static of optimal linear incentive wage contracts have been obtained in simultaneous adverse selection and moral hazard .we show that the higher the capacity of an agent, he was more hard work. Moreover,the optimal contract for the higher ability agent is higher energy incentive or higher risk for screening the ability of agents.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114072547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research a New Method of Search Engine Optimization","authors":"Huanjiong Zhang","doi":"10.1109/ITAPP.2010.5566137","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566137","url":null,"abstract":"With the source of information gaining strongly in the international network, people more and more take pay attention to how to quickly and valuably mining the useful information in the network. The main method of information mining is to apply the technology of search engine. The existing search engine has some defects, these defects restricts the performance of search engine. In this paper, based on the analysis of the reasons which make the search engine defects, a new optimization of search engine is pointed out, with this new method, some defects of existing search engine can be overcome, the efficiency of search engine can increase and the intellectual ability of search engine can be gained more and more.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Impeaching System Based on Bit Commitment with Revocable Anonymity","authors":"Weidong Qiu, Bozhong Liu, Shaopei Shi","doi":"10.1109/ITAPP.2010.5566623","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566623","url":null,"abstract":"In this paper we propose a new secure impeaching system based on bit commitment. The scheme keeps the informer's privacy in ordinary routine: Once a potential malicious prosecution occurs, the anonymity will be removed by a trusted thirty party (TTP) with the cooperation from electronic impeaching center (EIC), and the malicious user can be called to account. This scheme is more efficient than previous proposals and has adaptability in various numbers of users.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}