Proceedings of the 18th International Conference on Computer Systems and Technologies最新文献

筛选
英文 中文
A System for Website Data Management in a Website Building System 一个网站建设系统中的网站数据管理系统
Dimitar Z. Dimitrov
{"title":"A System for Website Data Management in a Website Building System","authors":"Dimitar Z. Dimitrov","doi":"10.1145/3134302.3134313","DOIUrl":"https://doi.org/10.1145/3134302.3134313","url":null,"abstract":"A system for website data management in a website building system, implemented on a server, the server having at least one processor and a memory, including a database management system, dynamic data version mapping system, dependency manager system and a website versioning system. The paper describes a system used by a website building system for managing the data structures which represent a website, being built by a user. The paper describes methods for optimized website data manipulations and suggests data structure abstractions for optimal operations of a website building system.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134529412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extended Graph Backbone for Motif Analysis 基序分析的扩展图形主干
A. Maratea, A. Petrosino, M. Manzo
{"title":"Extended Graph Backbone for Motif Analysis","authors":"A. Maratea, A. Petrosino, M. Manzo","doi":"10.1145/3134302.3134323","DOIUrl":"https://doi.org/10.1145/3134302.3134323","url":null,"abstract":"Local interaction patterns in complex networks, called motifs, explain many of the network properties but are challenging to extract due to the large search space. In this paper first an approximate representation of a complex network in terms of an extended backbone is proposed, then a reduced sampling space that speeds up the motif search in different kinds of networks is explored based on this representation. It will be shown using several real datasets that the proposed method is effective in reducing the sampling space, extracts the same relevant patterns, and hence preservs the network local structural information.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122161556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Situation Calculus for Multiple Action Representation 多动作表示的情境演算
Michael Zernov
{"title":"Situation Calculus for Multiple Action Representation","authors":"Michael Zernov","doi":"10.1145/3134302.3134341","DOIUrl":"https://doi.org/10.1145/3134302.3134341","url":null,"abstract":"The paper follows a sequence of publications dedicated to development of new situational-event calculus, which main concepts are: using of order-sorted logic and branching time concepts, taking into account many alternative outcomes of the same action, applying actions, grouped in a list to model their simultaneity.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124756939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol 使用硬件完整性认证协议防御基于硬件的可信计算攻击
Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis
{"title":"Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol","authors":"Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis","doi":"10.1145/3134302.3134320","DOIUrl":"https://doi.org/10.1145/3134302.3134320","url":null,"abstract":"As long as the use of distributed systems and Cloud Computing is significantly increasing, the amount of threats concerning the security of such systems and the data stored in them set great challenges on the application of Trusted Computing. In this work, we aim to discuss the Trusted Computing approaches applied on Cloud Computing security and focusing on their drawbacks on hardware verification (i.e., to attest hardware's integrity). We propose a model for hardware integrity attestation applied on Cloud Computing systems, presenting the main protocol based on the use of Endorsement Keys (EK) known from Trusted Computing. The validity of our protocol and its potentials against hardware-based attacks is proved by the combined use of verified Public-Key encryption algorithms.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"27 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124064422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
3D Augmented Reality Software Solution for Mechanical Engineering Education 机械工程教育三维增强现实软件解决方案
Yuksel Aliev, Vasil Kozov, Galina Ivanova, A. Ivanov
{"title":"3D Augmented Reality Software Solution for Mechanical Engineering Education","authors":"Yuksel Aliev, Vasil Kozov, Galina Ivanova, A. Ivanov","doi":"10.1145/3134302.3134306","DOIUrl":"https://doi.org/10.1145/3134302.3134306","url":null,"abstract":"The report contains a description of augmented reality technology application in the education and training of mechanical engineers. Software for augmented reality marker tracking for mechanical engineering education is created and described. An approach for design a textbook with 3D models of cutting tools, measuring tools and special equipment, visualised using augmented reality is presented.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Measuring Software Security from the Design of Software 从软件设计角度衡量软件安全性
Marko Saarela, Shohreh Hosseinzadeh, S. Hyrynsalmi, V. Leppänen
{"title":"Measuring Software Security from the Design of Software","authors":"Marko Saarela, Shohreh Hosseinzadeh, S. Hyrynsalmi, V. Leppänen","doi":"10.1145/3134302.3134334","DOIUrl":"https://doi.org/10.1145/3134302.3134334","url":null,"abstract":"With the increasing use of mobile phones in contemporary society, more and more networked computers are connected to each other. This has brought along security issues. To solve these issues, both research and development communities are trying to build more secure software. However, there is the question that how the secure software is defined and how the security could be measured. In this paper, we study this problem by studying what kinds of security measurement tools (i.e. metrics) are available, and what these tools and metrics reveal about the security of software. As the result of the study, we noticed that security verification activities fall into two main categories, evaluation and assurance. There exist 34 metrics for measuring the security, from which 29 are assurance metrics and 5 are evaluation metrics. Evaluating and studying these metrics, lead us to the conclusion that the general quality of the security metrics are not in a satisfying level that could be suitably used in daily engineering work flows. They have both theoretical and practical issues that require further research, and need to be improved.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modelling of Educational Data Following Big Data Value Chain 大数据价值链下的教育数据建模
D. Petrova-Antonova, O. Georgieva, S. Ilieva
{"title":"Modelling of Educational Data Following Big Data Value Chain","authors":"D. Petrova-Antonova, O. Georgieva, S. Ilieva","doi":"10.1145/3134302.3134335","DOIUrl":"https://doi.org/10.1145/3134302.3134335","url":null,"abstract":"Big Data is attracting increasing amount of attention among academy, industry and citizens. It poses both opportunities and challenges for society as a whole. In order to gain value from Big Data, it needs to be processed and analysed in an appropriate way, and the results have to be presented in a visual manner as to be able to effectively support decision making. Following the current trends in Big Data, this paper aims to prove the value-creation of Big Data by proposing a new data model in the field of the primary and secondary education in Bulgaria. It follows the Big Data Value Chain concept in order to group the schools depending on the concentration of students with learning deficits and risk of premature leaving the education system. The primary purpose of the proposed Data Model is to drive decisions by turning information into intelligence.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121683399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Fine-Grained Access Control Model and Implementation 细粒度访问控制模型和实现
E. Gorshkova, Boris Novikov, M. Shukla
{"title":"A Fine-Grained Access Control Model and Implementation","authors":"E. Gorshkova, Boris Novikov, M. Shukla","doi":"10.1145/3134302.3134310","DOIUrl":"https://doi.org/10.1145/3134302.3134310","url":null,"abstract":"The several models and solutions were introduced and implemented to address privacy and security issues during past decades. However, the most advanced role-based access control models support coarse-grained access control and widely used open source frameworks cannot provide efficient and effective fine-grained solution. We introduce a general fine-grained access control model and provide an implementation by extending Spring Security framework. Our model is tightly coupled with database access control at row-level and is separated from business functions of the application.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125622265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pass-the-Hash: One of the Most Prevalent Yet Underrated Attacks for Credentials Theft and Reuse 传递哈希:凭证盗窃和重用的最普遍但被低估的攻击之一
D. Dimov, Yulian Tzonev
{"title":"Pass-the-Hash: One of the Most Prevalent Yet Underrated Attacks for Credentials Theft and Reuse","authors":"D. Dimov, Yulian Tzonev","doi":"10.1145/3134302.3134338","DOIUrl":"https://doi.org/10.1145/3134302.3134338","url":null,"abstract":"The aim of this article is to bring some light into the following topics: what is Pass-the-Hash, what is the methodology of such an attack on a Windows based environment and what are the environment prerequisites needed for a successful attack. The report also discusses the methods, techniques and best practices of how and where to organize the defense.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114063936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
"Compatible" Fuzzy Cognitive Maps for Direct and Inverse Inference 直接和反向推理的“兼容”模糊认知图
V. Borisov, A. Fedulov, Y. Fedulov
{"title":"\"Compatible\" Fuzzy Cognitive Maps for Direct and Inverse Inference","authors":"V. Borisov, A. Fedulov, Y. Fedulov","doi":"10.1145/3134302.3134347","DOIUrl":"https://doi.org/10.1145/3134302.3134347","url":null,"abstract":"The questions of system factors (concepts) compatibility for various types of fuzzy cognitive maps at the analysis of direct and inverse inference are considered. The offered type of \"compatible\" fuzzy cognitive maps is described. These models take into account the various degree of concepts compatibility at a choice of operations for estimation of the direct and mediated influence of concepts on each other. Solution methods of the direct and inverse inference for \"compatible\" fuzzy cognitive maps are offered.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116794320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信