{"title":"A System for Website Data Management in a Website Building System","authors":"Dimitar Z. Dimitrov","doi":"10.1145/3134302.3134313","DOIUrl":"https://doi.org/10.1145/3134302.3134313","url":null,"abstract":"A system for website data management in a website building system, implemented on a server, the server having at least one processor and a memory, including a database management system, dynamic data version mapping system, dependency manager system and a website versioning system. The paper describes a system used by a website building system for managing the data structures which represent a website, being built by a user. The paper describes methods for optimized website data manipulations and suggests data structure abstractions for optimal operations of a website building system.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134529412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended Graph Backbone for Motif Analysis","authors":"A. Maratea, A. Petrosino, M. Manzo","doi":"10.1145/3134302.3134323","DOIUrl":"https://doi.org/10.1145/3134302.3134323","url":null,"abstract":"Local interaction patterns in complex networks, called motifs, explain many of the network properties but are challenging to extract due to the large search space. In this paper first an approximate representation of a complex network in terms of an extended backbone is proposed, then a reduced sampling space that speeds up the motif search in different kinds of networks is explored based on this representation. It will be shown using several real datasets that the proposed method is effective in reducing the sampling space, extracts the same relevant patterns, and hence preservs the network local structural information.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122161556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Situation Calculus for Multiple Action Representation","authors":"Michael Zernov","doi":"10.1145/3134302.3134341","DOIUrl":"https://doi.org/10.1145/3134302.3134341","url":null,"abstract":"The paper follows a sequence of publications dedicated to development of new situational-event calculus, which main concepts are: using of order-sorted logic and branching time concepts, taking into account many alternative outcomes of the same action, applying actions, grouped in a list to model their simultaneity.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124756939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis
{"title":"Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol","authors":"Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis","doi":"10.1145/3134302.3134320","DOIUrl":"https://doi.org/10.1145/3134302.3134320","url":null,"abstract":"As long as the use of distributed systems and Cloud Computing is significantly increasing, the amount of threats concerning the security of such systems and the data stored in them set great challenges on the application of Trusted Computing. In this work, we aim to discuss the Trusted Computing approaches applied on Cloud Computing security and focusing on their drawbacks on hardware verification (i.e., to attest hardware's integrity). We propose a model for hardware integrity attestation applied on Cloud Computing systems, presenting the main protocol based on the use of Endorsement Keys (EK) known from Trusted Computing. The validity of our protocol and its potentials against hardware-based attacks is proved by the combined use of verified Public-Key encryption algorithms.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"27 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124064422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuksel Aliev, Vasil Kozov, Galina Ivanova, A. Ivanov
{"title":"3D Augmented Reality Software Solution for Mechanical Engineering Education","authors":"Yuksel Aliev, Vasil Kozov, Galina Ivanova, A. Ivanov","doi":"10.1145/3134302.3134306","DOIUrl":"https://doi.org/10.1145/3134302.3134306","url":null,"abstract":"The report contains a description of augmented reality technology application in the education and training of mechanical engineers. Software for augmented reality marker tracking for mechanical engineering education is created and described. An approach for design a textbook with 3D models of cutting tools, measuring tools and special equipment, visualised using augmented reality is presented.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marko Saarela, Shohreh Hosseinzadeh, S. Hyrynsalmi, V. Leppänen
{"title":"Measuring Software Security from the Design of Software","authors":"Marko Saarela, Shohreh Hosseinzadeh, S. Hyrynsalmi, V. Leppänen","doi":"10.1145/3134302.3134334","DOIUrl":"https://doi.org/10.1145/3134302.3134334","url":null,"abstract":"With the increasing use of mobile phones in contemporary society, more and more networked computers are connected to each other. This has brought along security issues. To solve these issues, both research and development communities are trying to build more secure software. However, there is the question that how the secure software is defined and how the security could be measured. In this paper, we study this problem by studying what kinds of security measurement tools (i.e. metrics) are available, and what these tools and metrics reveal about the security of software. As the result of the study, we noticed that security verification activities fall into two main categories, evaluation and assurance. There exist 34 metrics for measuring the security, from which 29 are assurance metrics and 5 are evaluation metrics. Evaluating and studying these metrics, lead us to the conclusion that the general quality of the security metrics are not in a satisfying level that could be suitably used in daily engineering work flows. They have both theoretical and practical issues that require further research, and need to be improved.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling of Educational Data Following Big Data Value Chain","authors":"D. Petrova-Antonova, O. Georgieva, S. Ilieva","doi":"10.1145/3134302.3134335","DOIUrl":"https://doi.org/10.1145/3134302.3134335","url":null,"abstract":"Big Data is attracting increasing amount of attention among academy, industry and citizens. It poses both opportunities and challenges for society as a whole. In order to gain value from Big Data, it needs to be processed and analysed in an appropriate way, and the results have to be presented in a visual manner as to be able to effectively support decision making. Following the current trends in Big Data, this paper aims to prove the value-creation of Big Data by proposing a new data model in the field of the primary and secondary education in Bulgaria. It follows the Big Data Value Chain concept in order to group the schools depending on the concentration of students with learning deficits and risk of premature leaving the education system. The primary purpose of the proposed Data Model is to drive decisions by turning information into intelligence.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121683399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fine-Grained Access Control Model and Implementation","authors":"E. Gorshkova, Boris Novikov, M. Shukla","doi":"10.1145/3134302.3134310","DOIUrl":"https://doi.org/10.1145/3134302.3134310","url":null,"abstract":"The several models and solutions were introduced and implemented to address privacy and security issues during past decades. However, the most advanced role-based access control models support coarse-grained access control and widely used open source frameworks cannot provide efficient and effective fine-grained solution. We introduce a general fine-grained access control model and provide an implementation by extending Spring Security framework. Our model is tightly coupled with database access control at row-level and is separated from business functions of the application.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125622265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pass-the-Hash: One of the Most Prevalent Yet Underrated Attacks for Credentials Theft and Reuse","authors":"D. Dimov, Yulian Tzonev","doi":"10.1145/3134302.3134338","DOIUrl":"https://doi.org/10.1145/3134302.3134338","url":null,"abstract":"The aim of this article is to bring some light into the following topics: what is Pass-the-Hash, what is the methodology of such an attack on a Windows based environment and what are the environment prerequisites needed for a successful attack. The report also discusses the methods, techniques and best practices of how and where to organize the defense.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114063936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"Compatible\" Fuzzy Cognitive Maps for Direct and Inverse Inference","authors":"V. Borisov, A. Fedulov, Y. Fedulov","doi":"10.1145/3134302.3134347","DOIUrl":"https://doi.org/10.1145/3134302.3134347","url":null,"abstract":"The questions of system factors (concepts) compatibility for various types of fuzzy cognitive maps at the analysis of direct and inverse inference are considered. The offered type of \"compatible\" fuzzy cognitive maps is described. These models take into account the various degree of concepts compatibility at a choice of operations for estimation of the direct and mediated influence of concepts on each other. Solution methods of the direct and inverse inference for \"compatible\" fuzzy cognitive maps are offered.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116794320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}