International Confernce on Innovation Information in Computing Technologies最新文献

筛选
英文 中文
Notifying and filtering undesirable messages from online social network (OSN) 通知和过滤来自在线社交网络的不良消息(OSN)
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396091
V. Kaveri, S. Gopal
{"title":"Notifying and filtering undesirable messages from online social network (OSN)","authors":"V. Kaveri, S. Gopal","doi":"10.1109/ICIICT.2015.7396091","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396091","url":null,"abstract":"Nowadays, we have a standard communicating source i.e. On-line Social Networks which are used to share, link and broadcast the substantial quantity of the data of human being's life. Constant and day-to-day communication infers the interchange of numerous kinds of information, comprising image, unrestricted text, video and audial information. A chief portion of social network content is established through the text of short, a notable sample are the mails eternally printed by users of OSN on specific private and public zones, named in common walls. This work recommends the system which imposes the screening process of content-based information and it is considered as a vital provision for OSN. This scheme permits the users of OSN to take a straight supervision on the messages which are mailed on the OSN user's walls. This is attained by the scheme of flexible rule-based, which permits a user to change the screening norms to be practiced to the OSN user's walls, and applied the tool of soft classifier i.e. Machine Learning spontaneously creating membership tags in provision of the process of filtering based on content.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121396712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Certificate and message authentication acceleration in VANET VANET中的证书和消息认证加速
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396089
R. Balamurali, J. Vimali
{"title":"Certificate and message authentication acceleration in VANET","authors":"R. Balamurali, J. Vimali","doi":"10.1109/ICIICT.2015.7396089","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396089","url":null,"abstract":"Vehicular Ad hoc Networks adopt the general asymmetric cryptography and credential Retraction Records for its safety. In such arrangement, the substantiation of a received data is achieved by inspecting if the credential of the transmitter is enclosed within the present retraction record and certificatory the genuineness of the credential and signature of the transmitter. Here, we use an Expedite Message Substantiation Protocol for VANET that alternates the long inspecting method by an economical retraction inspecting method. Additionally, EMSP uses a unique key sharing that allows non-retracted ORUs to firmly share and update a secret key. EMSP will efficiently down the data loss attributable to the data examination delay compared with the standard substantiation ways using. By performing necessary analysis, EMSP is in congestible to be safe and economical. In this paper we also propose a combination of Expedite Data Substantiation Protocol and Dynamic Source Routing protocol for VANETs, which enables efficient routing alternates the classical retraction inspecting method by an efficient retraction inspecting method.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"AES-18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126543876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An algebra for composing access control policies in cloud 云环境中访问控制策略组合代数
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396067
B. Balamurugan, A. R. Mandadi, S. Mohan, Sherein Faatheima
{"title":"An algebra for composing access control policies in cloud","authors":"B. Balamurugan, A. R. Mandadi, S. Mohan, Sherein Faatheima","doi":"10.1109/ICIICT.2015.7396067","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396067","url":null,"abstract":"The Multi-tenancy nature of the cloud is prone to several data leakage, threats and malicious attacks. The access control techniques are the major ways through which these threats can be exterminated. The firewalls and the current access control techniques were not efficient in meeting the challenges faced by the cloud environment. The access control policy composition is a substantial requirement of cloud environment. In this paper, we propose an algebra for the composition of a Role-based access control policy. Generally in a role based access control, the privileges are given to the individuals based on their roles within an organization. The traditional and some new algebraic operators were used and their semantics are redefined to suit the cloud environments.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"115 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114003950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信