C. Coma, N. Cuppens-Boulahia, F. Cuppens, A. Cavalli
{"title":"Interoperability of Context Based System Policies Using O2O Contract","authors":"C. Coma, N. Cuppens-Boulahia, F. Cuppens, A. Cavalli","doi":"10.1109/SITIS.2008.68","DOIUrl":"https://doi.org/10.1109/SITIS.2008.68","url":null,"abstract":"The evolution of today's markets and the high volatility of business requirements put an increasing emphasis on the ability for systems to accommodate the changes required by new organizational needs while maintaining security objectives satisfiability. This is even more true in case of collaboration and interoperability between different organizations and thus between their information systems.Usual solutions do not anticipate interoperability security requirements or do it in a non satisfactory way. In this paper, we propose contract and compatibility principles to achieve a secure interoperation. Contracts are used to explicitly represent the rules that determine the way interaction between organizations must be controlled to satisfy secure accesses to resources. Compatibility relations make it possible to derive interoperability security policies.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125936963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Distributed IDS Based on CVSS Framework","authors":"J. Aussibal, L. Gallon","doi":"10.1109/SITIS.2008.115","DOIUrl":"https://doi.org/10.1109/SITIS.2008.115","url":null,"abstract":"The objective of this paper is to describe a new distributed intrusion detection system (IDS) based on CVSS framework. This new platform uses a wide set of classical IDS and detection entities. This distributed IDS aims to improve the discovery of anomalies by reducing the rate of false positives and false negatives. Entities correlate the different alerts emitted by local probes. The severity of anomalies is evaluated by using a cumulative score of alerts scores.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Formal Methodology to Specify Hierarchical Agent-Based Systems","authors":"César Andrés, C. Molinero, M. Núñez","doi":"10.1109/SITIS.2008.70","DOIUrl":"https://doi.org/10.1109/SITIS.2008.70","url":null,"abstract":"In this paper we introduce a formal framework to specifyagent-based systems where each agent is specialized ina single task that will be fulfilled by making calls to other simpler agents. In other words, we are interested in systems that can perform a task by subdividing it in easier tasks and by using the knowledge about each agent already introduced in the system. The idea is to prefabricate a basic structure that can be reused by either changing the main goal or by adding several different specialized agents. The main characteristic of our methodology is that each complex agent contains a schematic definition of other agents. Each agent is thus able to retain and produce certain information, such as the time needed to accomplish a certain task, taking into account a given set of agents and resources. This allows to quickly produce information regarding the necessities in resources and derive the demands to other subsystems.In order to increase the applicability of our approach, we have fully implemented a tool that allows us to graphically specify complex systems. In addition, the tool allows us to simulate the behavior of the specified systems so that some interesting properties, such as starvation and maximal progress, can be studied.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Measurement Based Framework for Assessment of Usability-Centricness of Open Source Software Projects","authors":"G. Çetin, Mehmet Göktürk","doi":"10.1109/SITIS.2008.106","DOIUrl":"https://doi.org/10.1109/SITIS.2008.106","url":null,"abstract":"Free and open source software (F/OSS) developers tend to build feature-centric projects rather than following a user centred design, ignoring the necessity of usability inside the resulting product, ever since. As there are many reasons behind this, main cause can be attributed to the lack of awareness of usability from developers' point of view and little interaction of project stakeholders with human-computer interaction (HCI) studies. In order to increase the usability hence the competitiveness of open source software applications, developers need to measure their usability activities within the project, and to conduct appropriate user centered design methodologies. In this paper, a measurement method that focuses on open source project is proposed based on the motivation to improve the usability of applications and increase the efficiency of communication and collaboration level of HCI experts and developers.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Extrema Analysis and Blur Detection with Identification","authors":"R. M. Chong, Toshihisa Tanaka","doi":"10.1109/SITIS.2008.38","DOIUrl":"https://doi.org/10.1109/SITIS.2008.38","url":null,"abstract":"In real image processing applications, images may be blurred or not. When blur is present, the type and degree of degradation vary from one image to another. The process of restoring these images are usually computationally demanding so that there is a need to first detect blurs. If an image is not blurred then it need not undergo the restoration process. In this work, a novel algorithm that simultaneously detects and identifies blurs, is proposed. This method is based on the analysis of extrema values in an image. The extrema histograms are first constructed then analyzed in order to extract feature values. The distinctness of these values in the presence of blur is used. It is computationally simple and fast thereby making it suitable for preprocessing especially in practical imaging applications. Experimental results on natural images and its synthetically blurred versions show the validity of the proposed method.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"51 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131451889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akiyo Nadamoto, E. Aramaki, Takeshi Abekawa, Yohei Murakami
{"title":"Searching for Important But Neglected Content from Community-Type-Content","authors":"Akiyo Nadamoto, E. Aramaki, Takeshi Abekawa, Yohei Murakami","doi":"10.1109/SITIS.2008.54","DOIUrl":"https://doi.org/10.1109/SITIS.2008.54","url":null,"abstract":"In online community-type content such as SNSs and blogs, users occasionally do not understand the theme of the content from multiple viewpoints, and much of the information is often lost. Because the discussion in a community is concentrated, the viewpoint narrows. We believe that it is necessary to provide information about the lack of awareness of a user to the users of community-type content. Information about which a user is unaware is called as a \"content hole,\" and searching for such holes is called as \"content hole search.\" In this paper, as a first step toward developing a technique for searching for content holes, we attempt to extract and represent important but neglected content from online community-type content based on isolated and non-related degrees. This content is information that nobody from the community is interested in, but that may be of interest to many people outside the community.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133269482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Graph Theoretic Approach for Image Segmentation","authors":"K. S. Camilus, V. Govindan, P. S. Sathidevi","doi":"10.1109/SITIS.2008.25","DOIUrl":"https://doi.org/10.1109/SITIS.2008.25","url":null,"abstract":"This paper presents a new robust graph theoretic approach for image segmentation. The proposed method which is capable of accurately locating region boundaries has the following salient features. First, it is a non-supervised approach which reflects the non-local properties of the image. Second, it guarantees that the regions are connected. Finally, it produces robust results which is almost unaffected by the influences of outliers. In thistechnique, at each step, a minimum weight edge is selected and the two regions connected by the minimum weight edge are considered for merge. The merging of regions is carried out, if the mean of the edges connecting the two regions is smaller than the maximum of the mean of the intra region edges along with the threshold value.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Approach for Automatic Palmprint Classification","authors":"Mongkon Sakdanupab, N. Covavisaruch","doi":"10.1109/SITIS.2008.22","DOIUrl":"https://doi.org/10.1109/SITIS.2008.22","url":null,"abstract":"This paper proposes an efficient approach for automatic palmprint classification based on principle lines that consist of a life line, a head line and a heart line. The extracted principle lines need not be perfect and our features and the criteria for classification are obvious and simple. Experiments are done with Visgraph database and our CU-CGCI hand database. Each database consists of 1,000 palmprint RGB color images from 100 users. Our method classifies palmprints into six groups. The distribution of categories 1-6 in Visgraph database are 28.8%, 34.4%, 24.2%, 3.8%, 4.5% and 4% whereas they are 34.7%, 27.5%, 22.6%, 5.7%, 3.4% and 5.9% in our CU-CGCI hand database. The palmprint distribution from our method is more even with the most population being around 34%.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115712456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wissam Mallouli, M. Lallali, Gerardo Morales, A. Cavalli
{"title":"Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study","authors":"Wissam Mallouli, M. Lallali, Gerardo Morales, A. Cavalli","doi":"10.1109/SITIS.2008.58","DOIUrl":"https://doi.org/10.1109/SITIS.2008.58","url":null,"abstract":"Ensuring that a Web-based system respects its security requirements is a critical issue that has become more and more difficult to perform in these last years. This difficulty is due to the complexity level of such systems as well as their variety and increasing distribution. To guarantee such a respect, we need to test the target Web system by applying a complete set of test cases covering all the possible scenarios. To reach this aim, we first specify the Web system behavior from its functional point of view using IF language. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. This language is well adapted to express security properties with time constraints. Then, we use a dedicated tool called TestGen-IF, to perform an automatic test generation of test cases targeting security purposes. These test sequences are transformed in executable test cases that can be applied on a real Web application. We present in this paper an industrial Web-based system provided by France Telecom as a case study to demonstrate the reliability of our framework.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Community-Based Approach for Application Composition in a Peer-to-Peer Environment","authors":"Elie Abi-Lahoud, Marco Viviani, K. Yétongnon","doi":"10.1109/SITIS.2008.102","DOIUrl":"https://doi.org/10.1109/SITIS.2008.102","url":null,"abstract":"The design of composite applications by combining existing services with known semantics is an ongoing topic in current research. Several studies are aimed at providing service description models and standards, service discovery and matching etc. However, service composition in distributed dynamic environments such as P2P has received little attention from the research communities. In this paper we present a design framework for composing services, taking in particular into account different ways for building peer-communities based on network or services characteristics.","PeriodicalId":202698,"journal":{"name":"2008 IEEE International Conference on Signal Image Technology and Internet Based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123073948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}