2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)最新文献

筛选
英文 中文
An Open Source Plugin for Image Analysis in Biology 一个用于生物学图像分析的开源插件
Giorgia Campanile, C. D. Ruberto, A. Loddo
{"title":"An Open Source Plugin for Image Analysis in Biology","authors":"Giorgia Campanile, C. D. Ruberto, A. Loddo","doi":"10.1109/WETICE.2019.00042","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00042","url":null,"abstract":"Image analysis is an important tool for several application fields, like biology and especially botany. Analysis of seed fossils can provide important information about their evolution, on agriculture origin, on plants domestication and knowledge of diets in ancient times. The aim of this work is to make the analysis process simple for biologists, by obtaining all the features needed for botanist user through a unique framework, that is still not available at the moment. We propose an ImageJ plugin able to extract morphological, textural and color features from seeds images in order to use them for classification. The experimental results have confirmed the goodness and correctness of the extracted features, making the proposed framework easily extendable to other application domains.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
JSCAN: Designing an Easy to use LLVM-Based Static Analysis Framework 设计一个易于使用的基于llvm的静态分析框架
Andrea Fornaia, Stefano Scafiti, E. Tramontana
{"title":"JSCAN: Designing an Easy to use LLVM-Based Static Analysis Framework","authors":"Andrea Fornaia, Stefano Scafiti, E. Tramontana","doi":"10.1109/WETICE.2019.00058","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00058","url":null,"abstract":"Assisting code evolution (refactoring, adaptation, parallelisation, etc.) can be handy for improving code quality and execution speed. Generally, tools assisting developers are tailored to some language, making analyses approaches hard to be applied in practice when using a different language. In this paper, we propose a cross-language framework for implementing analyses on object-oriented code. By separating the logic for computing metrics, or detecting code smells, that lets us identify the need for improvements, from code exploration, we enable developers designing high-level recommendation tools that can be effectively applied on the most common object-oriented languages, such as e.g. Java and C++. Code exploration components will provide inspection and data commonly needed for representing the details of the code, such as control and data dependencies, or object and method lists. These will be language-specific and provided by the framework itself.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126171742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Applicability of a SIEM Solution: Requirements and Evaluation SIEM解决方案的适用性:需求和评估
Hassan Mokalled, Rosario Catelli, V. Casola, Daniele Debertol, Ermete Meda, R. Zunino
{"title":"The Applicability of a SIEM Solution: Requirements and Evaluation","authors":"Hassan Mokalled, Rosario Catelli, V. Casola, Daniele Debertol, Ermete Meda, R. Zunino","doi":"10.1109/WETICE.2019.00036","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00036","url":null,"abstract":"The need for SIEM systems increased in the last few years, especially as cyber-attacks are evolving and targeting enterprises, which may cause discontinuity of their services, leakage of their data, and affect their reputation. Cybersecurity breaches can range from no or limited impact to stealing or manipulation of data, or even taking control of systems. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution. A significant factor for the increasing adoption of SIEMs is the capabilities that such systems offer, being able to provide near-real time analysis of security alerts and logs generated from various set of sources within an organization IT infrastructure. However, implementing a SIEM solution is not just an installation phase that fits any scenario within any organization; the best SIEM system for an organization may not be suitable at all for another one. An organization should consider other factors along with the technical side when evaluating a SIEM solution. This paper proposes an approach to aid enterprises, in selecting the most suitable SIEM solution; it suggests technical and organizational requirements that should be addressed and examines the SIEM applicability using quantitative and qualitative evaluation criteria.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115317567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Blockchain's Fame Reaches the Execution of Personalized Touristic Itineraries 区块链的名气触及个性化旅游行程的执行
Amina Brahem, Nizar Messai, Yacine Sam, Sami Bhiri, T. Devogele, Walid Gaaloul
{"title":"Blockchain's Fame Reaches the Execution of Personalized Touristic Itineraries","authors":"Amina Brahem, Nizar Messai, Yacine Sam, Sami Bhiri, T. Devogele, Walid Gaaloul","doi":"10.1109/WETICE.2019.00047","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00047","url":null,"abstract":"Blockchain trends cover more and more tech domains making it one of the most used technologies in the last few years. This is due to two essential aspects. First, it is a distributed peer-to-peer network where there is no need for third part to execute operations between peers. Second, blockchain implements mechanisms to make the most data sensitive operations executed in a trusted way. Regarding these attractive aspects, we intend in this work to use the blockchain technology for the implementation of touristic itineraries. We consider the latter as process choreographies involving different participants. We intend to model and execute the touristic itineraries generated from a personalized trip planner called CART in raw XML format in a way that respects this collaborative aspect and resolves the problem of trust. We will propose a pattern and its transformation rules to reconstruct the itineraries presented in declarative annotations such as XML to smart contracts written in some smart contract-specific programming language called Solidity. Experimental results show promising perspectives of the deployment of the proposed solution to execute touristic plans.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Patterns to Parameterize the Execution of Collaborative Tasks 使用模式参数化协作任务的执行
M. Cisse, H. Tran, Samba Diaw, B. Coulette, A. Bah
{"title":"Using Patterns to Parameterize the Execution of Collaborative Tasks","authors":"M. Cisse, H. Tran, Samba Diaw, B. Coulette, A. Bah","doi":"10.1109/WETICE.2019.00031","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00031","url":null,"abstract":"During the execution of a process, managing the collaboration inside a task performed by various actors is not straightforward due to possible changes of the process's context and the collaboration strategy. Process management solutions which describe the collaboration at modeling time offer a rigid control for conducting such collaborative tasks and thus cannot adapt to changes. To enable a flexible execution of collaborative tasks, we propose using the late-binding mechanism to allow process actors, at execution time, choosing or adapting strategies to perform their collaboration. To do so, first we model collaboration strategies as process patterns providing different ways to implement a collaborative tasks at execution time. These collaboration patterns describe how to establish necessary relations for coordinating different instances of the task, for sharing and exchanging working artifacts among actors performing those instances. Then we define actions to execute collaborative tasks. These actions take collaboration patterns as parameters. Thus, by letting process actor selecting a suitable collaboration pattern, they allow binding dynamically a collaborative task to its implementation flexibly.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of the Use of Software Agents in Digital Factories 软件代理在数字化工厂中的应用调查
N. Bicocchi, Giacomo Cabri, L. Leonardi, Giulio Salierno
{"title":"A Survey of the Use of Software Agents in Digital Factories","authors":"N. Bicocchi, Giacomo Cabri, L. Leonardi, Giulio Salierno","doi":"10.1109/WETICE.2019.00010","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00010","url":null,"abstract":"Digital factories represent an abstraction of real factories, which is useful to manage at a high level the processes as well as the interactions inside the factories but also the interactions between factories. This abstraction can automatize several processes and can enable to dynamically adapt the factory production to unexpected situations. Software agents can meet the requirements of digital factories by means of their features of autonomy, reactivity, proactivity and sociality. In this paper, we survey the use of software agents in the context of digital factories, showing how they can be exploited. A discussion about the advantages brought by software agents and the limitation of agent-based approaches completes the paper.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Trust in Collaborative Filtering for Recommendations 基于信任的协同推荐过滤
F. Saleem, N. Iltaf, H. Afzal, M. Shahzad
{"title":"Using Trust in Collaborative Filtering for Recommendations","authors":"F. Saleem, N. Iltaf, H. Afzal, M. Shahzad","doi":"10.1109/WETICE.2019.00053","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00053","url":null,"abstract":"Recommender systems are increasingly being used in e-commerce websites to solve the problem of finding right kind of information. Collaborative filtering is considered as most promising method for recommendation because it recommends items based on common interests of users. Trust Aware Recommender Systems (TARS) is an enhancement of traditional recommendation systems to improve recommendation quality which uses trusted users for recommending an item to an active user. From literature, it is proven that including all trusted users in recommendation process reduces its performance so this research work performs a filtration process on users for reduction of trusted neighborhood of an active user. The main idea of this research work is to keep only those users in trusted neighborhood whose rating behavior is similar to an active user. Subspace clustering method is used for filtration process. The proposed algorithm uses both implicit and explicit trust for trust value calculation. The results demonstrates that the proposed algorithm improves results in terms of Mean Absolute Error and Coverage as compared to other conventional methods.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133435716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Validation of Safety Critical Collaboration Systems (VSC) at WETICE 2019: Track Report 在WETICE 2019上验证安全关键协作系统(VSC):跟踪报告
E. Tramontana, Andrea Calvagna, Andrea Fornaia
{"title":"Validation of Safety Critical Collaboration Systems (VSC) at WETICE 2019: Track Report","authors":"E. Tramontana, Andrea Calvagna, Andrea Fornaia","doi":"10.1109/WETICE.2019.00055","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00055","url":null,"abstract":"This report describes the scope of the VSC track held at the IEEE WETICE 2019 conference. The 2019 edition of WETICE was held in Capri (Naples), Italy, from June, the 12th to 14th. The papers accepted and presented to the VSC track dealt with the analysis of complex systems in order to detect erroneous or unexpected behaviour, especially from the security, and safety perspective.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges 智能电网AMI系统的认证:威胁模型、解决方案和挑战
Mourad Benmalek, Y. Challal, A. Derhab
{"title":"Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges","authors":"Mourad Benmalek, Y. Challal, A. Derhab","doi":"10.1109/WETICE.2019.00052","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00052","url":null,"abstract":"Advanced Metering Infrastructure (AMI) has been regarded as a foundational part of the Smart Grid (SG). Consequently, AMI security is of critical importance. In this paper, we describe and investigate the current proposed authentication schemes and techniques for AMI. We discuss the challenges and desired objectives of authentication. We also provide a review of the recent proposed schemes for AMI along with their advantages and drawbacks towards meeting the discussed challenges and objectives. Based on the current survey, we identify open issues and suggest possible future research directions.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134367903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Scanclave: Verifying Application Runtime Integrity in Untrusted Environments 扫描程序:在不受信任的环境中验证应用程序运行时完整性
M. Morbitzer
{"title":"Scanclave: Verifying Application Runtime Integrity in Untrusted Environments","authors":"M. Morbitzer","doi":"10.1109/WETICE.2019.00050","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00050","url":null,"abstract":"Data hosted in a cloud environment can be subject to attacks from a higher privileged adversary, such as a malicious or compromised cloud provider. To provide confidentiality and integrity even in the presence of such an adversary, a number of Trusted Execution Environments (TEEs) have been developed. A TEE aims to protect data and code within its environment against high privileged adversaries, such as a malicious operating system or hypervisor. While mechanisms exist to attest a TEE's integrity at load time, there are no mechanisms to attest its integrity at runtime. Work also exists that discusses mechanisms to verify the runtime integrity of programs and system components. However, those verification mechanisms are themselves not protected against attacks from a high privileged adversary. It is therefore desirable to combine the protection mechanisms of TEEs with the ability of application runtime integrity verification. In this paper, I present Scanclave, a lightweight design which achieves three design goals: Trustworthiness of the verifier, a minimal trusted software stack and the possibility to access an application's memory from a TEE. Having achieved these goals, I am able to verify the runtime integrity of applications even in the presence of a high privileged adversary. I refrain from discussing which properties define the runtime integrity of an application, as different applications will require different verification methods. Instead, I show how Scanclave enables a remote verifier to determine the runtime integrity of an application. Afterwards, I perform a security analysis for the different steps of my design. Additionally, I discuss different enclave implementations that might be used for the implementation of Scanclave.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信