2010 International Conference on Internet Technology and Applications最新文献

筛选
英文 中文
Analysis for Botnet Detection Techniques 僵尸网络检测技术分析
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566260
Ying Wang, Zhigang Jin
{"title":"Analysis for Botnet Detection Techniques","authors":"Ying Wang, Zhigang Jin","doi":"10.1109/ITAPP.2010.5566260","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566260","url":null,"abstract":"Botnet is one of the most serious threats to the security of the Internet nowadays. This paper introduces the characteristics the transmission manner and the harm of botnet, studies the detection, tracking and removal technologies in botnet based on the analysis of samples from the bot start, and summarized the trends of botnet.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130585657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Research and Application of the Transparent Document Encryption Gateway in Information Leakage Prevention 透明文档加密网关在防信息泄露中的研究与应用
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566626
Liling Xie
{"title":"Research and Application of the Transparent Document Encryption Gateway in Information Leakage Prevention","authors":"Liling Xie","doi":"10.1109/ITAPP.2010.5566626","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566626","url":null,"abstract":"The paper presents a project which uses transparent encryption gateway to encrypt files for information security and leakage prevention. A system in intranet for information leakage prevention(ILP) based on this technique is proposed. It pays attention to both security and availability. Moreover, the users can encrypt documents flexibly with the optional encryption technique.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132946663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on a Multi-Level Security Model for Network Isolation 网络隔离的多级安全模型研究
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566624
HongGang Lin, Lin Chen
{"title":"Research on a Multi-Level Security Model for Network Isolation","authors":"HongGang Lin, Lin Chen","doi":"10.1109/ITAPP.2010.5566624","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566624","url":null,"abstract":"For solving information confidentiality problems in the network isolation system, a multi-level security model for network isolation system is proposed. It can control communication between subjects by adding communicating factor into system and constructing new state transition rules that describe work course of system. The model is proved to be correct through formal methods .The model can isolate the inner net and the outer net effectively, protect the confidentiality of sensitive information, and provide a theoretical foundation for design of nework isolation system.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132031778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Study of GIS-Based Optical Cable Information System 基于gis的光缆信息系统的设计与研究
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566487
Gang Tao, T. Chi, Guixiang Zheng
{"title":"Design and Study of GIS-Based Optical Cable Information System","authors":"Gang Tao, T. Chi, Guixiang Zheng","doi":"10.1109/ITAPP.2010.5566487","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566487","url":null,"abstract":"Information infrastructure network is the foundation of urban information infrastructure. Along with the completion of a large number of optic cable facilities, we need appropriate management tools to guide the network plan and design, maintaining the healthy development of the network. Combined with the characteristics and advantages of GIS, this paper introduced the GIS technology into city optic cable management, designed the GIS-based system and described the system's basic framework, function composition and technical line in turn, especially the key technology and technological advantages.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontology-Based Interactive Question and Answering System 基于本体的交互式问答系统
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566132
Li Liu, Quan Qi, Fangfang Li
{"title":"Ontology-Based Interactive Question and Answering System","authors":"Li Liu, Quan Qi, Fangfang Li","doi":"10.1109/ITAPP.2010.5566132","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566132","url":null,"abstract":"Interactive Question and Answering System (IQA) is a new question and answer research field. IQA guides users to complement the missing question information through some interaction strategy. It overcomes the defect that traditional question answering system cannot handle questions with incomplete information; it also reduces the requirement for questions analysis. This paper introduces the mechanism of IQA, proposes a domain Ontology-based IQA framework and an incomplete questions' knowledge representing framework-question information domain (QID). Domain Ontology-based IQA extracts effective information from domain question corpus, and then focuses the effective information on Ontology concept through Ontology-based query expansion (OBQE) method, to establish Ontology-based domain QID knowledgebase. The interaction is, searching the domain QID knowledgebase to complement users' QID to domain QID. We use rough set algorithm to deal with domain QID knowledgebase, reduce the search space and interaction steps. The experiment result shows that our IQA framework is feasible and the reduction of knowledgebase improves the interaction efficiently.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implement Environment and Countermeasures about the Lowest Tender Price Method in Bidding of Construction Engineering 最低投标价格法在建筑工程招投标中的实施环境与对策
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566217
Hong-wei Liu, Zhuowen Wang
{"title":"Implement Environment and Countermeasures about the Lowest Tender Price Method in Bidding of Construction Engineering","authors":"Hong-wei Liu, Zhuowen Wang","doi":"10.1109/ITAPP.2010.5566217","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566217","url":null,"abstract":"The lowest tender price method in bidding of construction engineering is a mature and feasible method which conforms to market economy. The system environment and market economy are the foundation of this method through analysing it's implement environment. The essay put forward the implement countermeasures and five assuring measures about this method being practised in our country. The'power-money trade' and 'ogether-conspired bidding ' can be restrained by continuously perfecting the law, the system, the environment and so on. The method can also supply a permanent cure for our government in treating the important problems in construction field.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125599563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of the Knowledge Absorptive Capacity for a Modern Service Enterprise 现代服务企业知识吸收能力建模
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566154
Yuanjian Qin, Xinyan Zhu
{"title":"Modeling of the Knowledge Absorptive Capacity for a Modern Service Enterprise","authors":"Yuanjian Qin, Xinyan Zhu","doi":"10.1109/ITAPP.2010.5566154","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566154","url":null,"abstract":"Featured as being knowledge-intensified, innovation-motivated and network-orientated, a modern service enterprise has to attach more importance on the organizational absorptive capacity of knowledge than a traditional one. Through external environment, internal management and knowledge attribute, this Paper analyses the impacts on the organizational absorptive capacity of knowledge by different factors, including the enterprise network, prior knowledge basis, employee's absorptive capacity of knowledge, supporting system, attributes of external knowledge and organizational learning mechanism, on which the Knowledge Absorptive Capacity is modeled for the modern service enterprise.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Incentive Wage Contracts under Adverse Selection and Moral Hazard 逆向选择和道德风险下的最优激励工资契约
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566526
Jianzhang Li
{"title":"Optimal Incentive Wage Contracts under Adverse Selection and Moral Hazard","authors":"Jianzhang Li","doi":"10.1109/ITAPP.2010.5566526","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566526","url":null,"abstract":"In this paper, we study the problem in which a risk-neutral principal design optimal incentive wage contracts for a risk-averse agent under asymmetric information.Using the theories and methods of dynamic programming and optimal control and mechanism design,the characteristics and some interesting comparative static of optimal linear incentive wage contracts have been obtained in simultaneous adverse selection and moral hazard .we show that the higher the capacity of an agent, he was more hard work. Moreover,the optimal contract for the higher ability agent is higher energy incentive or higher risk for screening the ability of agents.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114072547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research a New Method of Search Engine Optimization 研究一种新的搜索引擎优化方法
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566137
Huanjiong Zhang
{"title":"Research a New Method of Search Engine Optimization","authors":"Huanjiong Zhang","doi":"10.1109/ITAPP.2010.5566137","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566137","url":null,"abstract":"With the source of information gaining strongly in the international network, people more and more take pay attention to how to quickly and valuably mining the useful information in the network. The main method of information mining is to apply the technology of search engine. The existing search engine has some defects, these defects restricts the performance of search engine. In this paper, based on the analysis of the reasons which make the search engine defects, a new optimization of search engine is pointed out, with this new method, some defects of existing search engine can be overcome, the efficiency of search engine can increase and the intellectual ability of search engine can be gained more and more.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Impeaching System Based on Bit Commitment with Revocable Anonymity 基于可撤销匿名比特承诺的弹劾系统
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566623
Weidong Qiu, Bozhong Liu, Shaopei Shi
{"title":"An Impeaching System Based on Bit Commitment with Revocable Anonymity","authors":"Weidong Qiu, Bozhong Liu, Shaopei Shi","doi":"10.1109/ITAPP.2010.5566623","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566623","url":null,"abstract":"In this paper we propose a new secure impeaching system based on bit commitment. The scheme keeps the informer's privacy in ordinary routine: Once a potential malicious prosecution occurs, the anonymity will be removed by a trusted thirty party (TTP) with the cooperation from electronic impeaching center (EIC), and the malicious user can be called to account. This scheme is more efficient than previous proposals and has adaptability in various numbers of users.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信