{"title":"An Extensible Framework for RBAC in Dynamic Ad-Hoc Coalitions","authors":"Bo Chen, Lingna He","doi":"10.1109/NCIS.2011.12","DOIUrl":"https://doi.org/10.1109/NCIS.2011.12","url":null,"abstract":"The need to securely share information in dynamic ad-hoc coalition among collaborating entities is increasingly becoming important. In a dynamic coalition environment, organizations should be able to execute their local fine-grained access control policies when sharing resources with external entities. To facilitate such sharing, some automatic, efficient and secure solutions are needed. In this paper, we discuss an extensible framework based on XACML administration and delegation profile. This framework provides authorization policy represents, dynamic permission definition, delegation condition with complete administrative control. We have created a web-services implementation of our model and confirm that it is an efficient solution for web-based dynamic ad-ho coalition authorization.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128099791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin Xu, Hongcheng Wang, Xiajiong Shen, Wei Fang, Erli Niu
{"title":"The Design of Information Security System for Digital Power Grid","authors":"Jin Xu, Hongcheng Wang, Xiajiong Shen, Wei Fang, Erli Niu","doi":"10.1109/NCIS.2011.149","DOIUrl":"https://doi.org/10.1109/NCIS.2011.149","url":null,"abstract":"Digital power grid (DPG) is a highly informatized systems with multi-level and multi-area. According to the features of DPG, a information security system is presented with its key functions. The design adopts master-slave mode to implement security policy. 2-layer encryption mechanism is proposed to guarantee information security and integrity. The license structure based on XML can strengthen the flexibility of information security policies and the extensibility of information rights.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133849332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study and Practice on the Wireless Networking Curriculum","authors":"Xianliang Jiang, Guang Jin, Xiaodong Wang, Cuixia Ni, Zhijun Xie","doi":"10.1109/NCIS.2011.165","DOIUrl":"https://doi.org/10.1109/NCIS.2011.165","url":null,"abstract":"The ongoing development of wireless networking produces a lot of new technologies and applications, such as Ultra Wideband (UWB) and Wireless Sensor Networks (WSN). For traditional wired networking curriculums, the teaching is relatively easy due to the mature and stable measures. However, different from the traditional wired networking teaching, the Wireless Networking Teaching (WNT) is facing new challenges due to the complicated techniques and comprehensive contents, etc. In this paper, we outline the characteristics of wireless networking technologies and analyze the issues in current WNT. Then, we propose a new teaching mode applied in the wireless networking curriculums. Using NS2 to build the experimental environment, we can implement the proposed teaching mode in a vivid way. The theoretical and practical characteristics can be reflected effectively.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134079982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VMInsight: Hardware Virtualization-Based Process Security Monitoring System","authors":"Xianxian Li, Changhui Jiang, Jianxin Li, B. Li","doi":"10.1109/NCIS.2011.21","DOIUrl":"https://doi.org/10.1109/NCIS.2011.21","url":null,"abstract":"Malicious software is one of the primary threats to information system on Internet, while the traditional host-based and network-based monitoring systems are vulnerable to prevent the malicious behavior of software because most current malicious software is capable of resisting security monitoring. Virtualization technology gives an impactful approach to monitoring the behavior of malicious software since it can provide an abstraction layer between the operating system and the hardware. In this paper, we propose a hardware-virtualization-based security monitor system named VMInsight, which can provide load-time and run-time monitoring for processes. VMInsight intercepts system calls and process behaviors by monitoring changes in the virtual machine CPU register, and it is implemented in the hyper visor, thus is completely transparent to the software and operating system running in the virtual machine. The experimental results show that the performance overhead of VMInsight is less than 10%, and it can be easily applied to the third-party security monitoring system.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research in Customer Satisfaction Based on Web Services Resources","authors":"Cheng Guo-bin","doi":"10.1109/NCIS.2011.158","DOIUrl":"https://doi.org/10.1109/NCIS.2011.158","url":null,"abstract":"Users demand more and more for resources of the web Services, can meet their requirements. this is an important problem Services computing problems faced. This Services resources from the trust model based on Services resources proposed trust mechanism. Based on direct experience and recommended experience of resources to analyze the credibility of experience, and analysis the best mix of resources into the trust mechanisms. Finally, the measurement of resources from the user analysis user satisfaction with quality of Services.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Addiction Diagnostic Decision-Making Based on Attribute Reduction of Rough Set Theories","authors":"Shuxiang Dong, Guojun Jia","doi":"10.1109/NCIS.2011.173","DOIUrl":"https://doi.org/10.1109/NCIS.2011.173","url":null,"abstract":"The method of attribute reduction based on rough set theory is applied to the internet addiction diagnostic decision-making to improve the comprehensive performance of the decision-making. This paper briefly introduces the basic concepts of rough set theory and the method of attribute reduction, on which analyses the application of internet addiction diagnostic decision-making. The mentioned method which is applied to the internet addiction diagnostic decision-making, and which greatly enhanced the ability of knowledge acquisition and decision-making, of finding extraordinary events and predicting the trend of future, provided scientific and reliable basises for medical diagnostic decision-making.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Restoration Using Improved Particle Swarm Optimization","authors":"Na Li, Yuanxiang Li","doi":"10.1109/NCIS.2011.86","DOIUrl":"https://doi.org/10.1109/NCIS.2011.86","url":null,"abstract":"Aiming at too many restrictions in conventional image restoration methods, an image restoration method based on improved particle swarm optimization is proposed. This thesis introduces a selection process of genetic algorithm into standard particle swarm optimization, which resolves the problem of premature convergence of the standard particle swarm optimization parameters in image restoration. In this paper, the algorithm converts the gray image restoration problem to genetic algorithm optimize problem, and it is applied to improve image restoration and processing speed. Finally, experimental results are presented to validate the efficiency of the proposed scheme, further, its performance is compared with other conventional image restoration methods.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129117184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Algorithm for the Topology of Weighted Directed Network Based on the Triad Formation Rule","authors":"Fei-peng Li, Yanheng Liu, Xin Sun","doi":"10.1109/NCIS.2011.46","DOIUrl":"https://doi.org/10.1109/NCIS.2011.46","url":null,"abstract":"The research on the topology model of weighted directed network not only helps to explore the internal mechanism of network topology in a higher level, but also plays an important role in resolving the problems related to the weighted directed phenomenon in other areas. By studying the real directional social network and analyzing the dynamic evolution of international import and export trade network, this paper proposed the topology generation algorithm of weighted directed network based on the triad formation rule. In the algorithm, directed edges were added to the network by using weight preferential attachment rule and triad formation rule, moreover, weights of network edges evolved dynamically to realize the asymmetric interaction among nodes. Simulation results show that the algorithm can generate the network topology consistent with real network environment and has good controllability of the clustering coefficient.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"120 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120851387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Password-Based Group Authenticated Key Exchange Protocol: From 3-Party to Group","authors":"Minghui Wang, Junhua Pan, Jian-dong Wang","doi":"10.1109/NCIS.2011.54","DOIUrl":"https://doi.org/10.1109/NCIS.2011.54","url":null,"abstract":"Password-based authenticated group key exchange (denoted by PGKE) provides n parties who hold a common human-memorable password for secure group communication. In this paper, applying the cryptographic technique to a password-authenticated 2-party key establishment protocol without random oracle assumption, a password-authenticated group key exchange under the help of a trusted server with CDH assumption is proposed. Comparing with other existing protocols, this protocol does not require any Server's public key and encryption of simple password (low-entropy).","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124345769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Auxiliary Algorithms in Green Multi-agent Planning Framework","authors":"Dongning Rao, Zhihua Jiang","doi":"10.1109/NCIS.2011.43","DOIUrl":"https://doi.org/10.1109/NCIS.2011.43","url":null,"abstract":"Energy crisis brings green computing, and green computing needs algorithms and mechanicals to be redesigned for energy efficiency. Green multi-agent planning framework (GMAPF) is a framework redesigned for multi-agent planning. In this paper we proposed several auxiliary algorithms for GMAPF infrastructure and framework, including agent distribution, observation reduction, domain analyses and instantiation.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124549366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}