2015 5th World Congress on Information and Communication Technologies (WICT)最新文献

筛选
英文 中文
A dynamic group privacy protection mechanism based on cloud model 一种基于云模型的动态组隐私保护机制
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489650
Ruxiang Zhai, Kun Zhang, Mingjun Liu
{"title":"A dynamic group privacy protection mechanism based on cloud model","authors":"Ruxiang Zhai, Kun Zhang, Mingjun Liu","doi":"10.1109/WICT.2015.7489650","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489650","url":null,"abstract":"Data publishing has become an import way for information sharing. However, data privacy is still a challenge issue. When publishing data frequently, certain sensitive accurate trend may leak. Some significant sensitive overall information may be got from these published time-dependent data sets. It may result in serious consequences and heavy loss. For this issue, this paper proposes a group privacy preservation mechanism for dynamic data-sets. The sensitive accurate overall information of data-sets could be confused by some faked but rational value. In order to guarantee the rationality of the fake data, cloud model is used to generate the fake data. Analysis and experiments shows the effectiveness of this mechanism.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of location aided routing protocol in Vehicular Ad Hoc Networks on highway 高速公路车载自组网中位置辅助路由协议的改进
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489644
M. Nabil, A. Hajami, Abdlakrim Haqiq
{"title":"Improvement of location aided routing protocol in Vehicular Ad Hoc Networks on highway","authors":"M. Nabil, A. Hajami, Abdlakrim Haqiq","doi":"10.1109/WICT.2015.7489644","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489644","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) is an instance of MANETs that establishes wireless connections between vehicles. Recently, it was shown for the case of highway traffic that position-based routing protocols can very well deal with the high mobility of network vehicles. In VANETs, these routing protocols must be adapted to vehicular-specific capabilities and requirements. As many previous works have shown, routing performance is greatly dependent on the availability and stability of wireless links. This work proposes a small extension to the Location Aided Routing (LAR) protocol specific to highway scenarios. We seek to improve the stability of path between sources and destinations by removing from the paths the nodes that move in opposite direction of the source movement. The performance metrics such as average delay of stability path between source and destination, packet delivery ratio (PDR), throughput, and normalized routing load (NRL) are measured using ns2. The Intelligent Driver Model with Lane Changing (IDM_LC) based on VanetMobiSim tool is used to generate realistic mobility traces in highway.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimisation of the queries execution plan in cloud data warehouses 优化云数据仓库中的查询执行计划
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489659
Ettaoufik Abdelaziz, Ouzzif Mohamed
{"title":"Optimisation of the queries execution plan in cloud data warehouses","authors":"Ettaoufik Abdelaziz, Ouzzif Mohamed","doi":"10.1109/WICT.2015.7489659","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489659","url":null,"abstract":"Our everyday massive data processing activities and making correct decisions require a specific work environment. The cloud computing provides a flexible environment for customers to host and process their information through an outsourced infrastructure. This information was habitually located on local servers. Many applications dealing with massive data is routed to the cloud. Data Warehouse (DW) also benefit from this new paradigm to provide analytical data online and in real time. DW in the Cloud benefited of its advantages such flexibility, availability, adaptability, scalability, virtualization, etc. Improving the DW performance in the cloud requires the optimization of data processing time. The classical optimization techniques (indexing, materialized views and fragmentation) are still essential for DW in the cloud. The DW is partitioned before being distributed across multiple servers (nodes) in the Cloud. When queries containing multiple joins or ask voluminous data stored on multiple nodes, inter-node communication increases and consequently the DW performance degrades. In this paper, we propose an approach for improving the performance of DW in the cloud. Our approach is based on a classification technique of requests received by the nodes. For this purpose we use an algorithm based on the MapReduce programming model, this algorithm allows to identify the list of requests sent to the DW hosted in the cloud, and classify queries by the publication frequency. From the list of search queries we propose a partitioning scheme of DW on different nodes in order to reduce the inter-node communication and therefore minimize the queries processing time.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"94 S87","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tr-OrBAC: A trust model for collaborative systems within critical infrastructures Tr-OrBAC:关键基础设施内协作系统的信任模型
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489657
Nawal Ait Aali, A. Baina, L. Echabbi
{"title":"Tr-OrBAC: A trust model for collaborative systems within critical infrastructures","authors":"Nawal Ait Aali, A. Baina, L. Echabbi","doi":"10.1109/WICT.2015.7489657","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489657","url":null,"abstract":"In last decades, the notion of collaborative systems is presented as the new concept in Critical Infrastructures. It regroups different organizations collaborating in order to ensure the continuity of these infrastructures. However, some malicious behavior can arise causing perturbations on the information systems of the organizations. To avoid this behavior, building trust between collaborating organizations is necessary; it allows cooperating and sharing resources in a secure way. In this paper, we present Tr-OrBAC: a new trust model applicable in collaborative systems; it is based on the OrBAC (Organization Based Access Control) access control model and trust evaluation. In this paper, we will focus on explaining and detailing the proposed trust model.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128366906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Formal analysis of SEP protocol using the interpretation function-based method 采用基于解释函数的方法对SEP协议进行形式化分析
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489637
Houssam El Ismaili, H. Houmani, Hicham Madroumi
{"title":"Formal analysis of SEP protocol using the interpretation function-based method","authors":"Houssam El Ismaili, H. Houmani, Hicham Madroumi","doi":"10.1109/WICT.2015.7489637","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489637","url":null,"abstract":"Electronic payment is the very important step of the electronic business system, and its security must be ensured. The Secure Electronic protocol (SEP) [1] was proposed to protect online payment transactions against the fraud without involving the third party such as Visa or MasterCard. SEP protocol avoids the complexities relating to the implementation unlike SET and 3D-secure, integration and utilization are also easier than before. Then it's crucial to ensure that this protocol respect security properties such as confidentiality, authentication and integrity. In this paper, we analyze the SEP protocol with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method [2, 3]. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily life protocols such us SEP.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131267200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of the credibility of the information shared by a wireless sensor network 研究无线传感器网络共享信息的可信度
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489655
Lahma Karim, H. Mohamed, Belhaddaoui Hicham
{"title":"Study of the credibility of the information shared by a wireless sensor network","authors":"Lahma Karim, H. Mohamed, Belhaddaoui Hicham","doi":"10.1109/WICT.2015.7489655","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489655","url":null,"abstract":"The technology of the wireless sensor networks (WSN) is increasingly invading our daily life, taking into account a plenty of existing applications to nowadays (measurements, supervision ...). In many applications of this type of network, the credibility of the information shared by its devices is essentially depending on the criticality of the application. Our goal is to treat the problem of reliability of information exchanged by WSN to make sense of the credibility of this information. The result of this approach is to be able at any moment to give a confidence level to that information exchanged by the WSN. We are implementing a set of mathematical theories to generate an algorithm to characterize the notion of credibility. To validate this study, we conducted a simulation platform.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114613593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perspectives on the implementation of standardization within the UK library RFID market 对英国图书馆RFID市场实施标准化的看法
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489662
Ian Pratt, Shiyun Zhong
{"title":"Perspectives on the implementation of standardization within the UK library RFID market","authors":"Ian Pratt, Shiyun Zhong","doi":"10.1109/WICT.2015.7489662","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489662","url":null,"abstract":"Implementation of RFID technology within the library sector has taken great strides forward over the last decade. ISO 28560 is a recent standard aimed at providing a common platform to an industry that has initially evolved with a number of implementers formulating their own RFID data storage models. Although RFID standards such as ISO 14223, 14443 & 15693, relating to air interface protocols largely predate their implementation, standards such as ISO 28560 which pertain to standardisation of tag data models have been introduced at a stage when implementations have reached a certain level of maturity. This paper provides a critique of the applicability of ISO 28560 through direct experience in applying it to the UK library market.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134638079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward a multi-tenant college sustained team seeking system 向着多租户高校持续寻人系统的方向发展
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489638
Shuwei Yao, Kun Ma, Zhe Yang, A. Abraham
{"title":"Toward a multi-tenant college sustained team seeking system","authors":"Shuwei Yao, Kun Ma, Zhe Yang, A. Abraham","doi":"10.1109/WICT.2015.7489638","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489638","url":null,"abstract":"College students often collaborate in some projects or contests with other students from different majors, but current team seeking system has some limitations on finding teammates. In this paper, we design a multi-tenant college sustained team seeking system, aiming at establishing a sustained team among college students who have similar interest. We present the architecture, core modules, and some emerging techniques to design such a system. The evaluation of query efficiency and page loading speed are present at last.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment 使用云SaaS来确保异构云环境中的互操作性和标准化
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489640
Elhozmari Majda, Ettalbi Ahmed
{"title":"Using cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment","authors":"Elhozmari Majda, Ettalbi Ahmed","doi":"10.1109/WICT.2015.7489640","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489640","url":null,"abstract":"During the last years, because of the evolution of Cloud applications and the attractive advantages given to consumers, many companies outsource their data and Information Technology (IT) system to the Cloud based technology. With the growth in the number of Cloud Service Providers, many enterprises and organizations can use and associate services from multiple providers. There may be many Internet protocols for service access standards that are used to ensure interoperability between users browser and Web server, such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP). Each service has its specific characteristics such as authentication and security requirements. Hence, Cloud providers attempt to lock customers into proprietary interfaces so consumers can find themselves at not expects inevitable vendor lock-in. Therefore, the focus of our paper is to propose a solution to this problem by using Cloud intermediate between Cloud providers and consumer in heterogeneous Cloud environments interfaces. This is to achieve benefits such as standardization and interoperability, minimizing lock-in of Cloud providers. To reach such benefits, we propose a Cloud SaaS based on two interfaces and an internet component. These interfaces are used in Cloud Consumer and Provider sides and therefore guarantee communication between Cloud Consumer and Provider using different Internet protocols for Web service access such as REST and SOAP. Our approach guarantees interoperability and standardization in heterogeneous Cloud based environments because in this case Cloud Consumer and Provider using REST interface can communicate easily with Cloud Provider and Consumer using SOAP interface.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Model-to-model transformation in approach by modeling: From UML model to Model-View-Presenter and Dependency Injection patterns 通过建模的方法中的模型到模型转换:从UML模型到模型-视图-表示器和依赖注入模式
2015 5th World Congress on Information and Communication Technologies (WICT) Pub Date : 2015-12-01 DOI: 10.1109/WICT.2015.7489648
R. Esbai, M. Erramdani
{"title":"Model-to-model transformation in approach by modeling: From UML model to Model-View-Presenter and Dependency Injection patterns","authors":"R. Esbai, M. Erramdani","doi":"10.1109/WICT.2015.7489648","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489648","url":null,"abstract":"The continuing evolution of business needs and technology makes Web applications more demanding in terms of development, usability and interactivity of their user interfaces. The complexity and diversity of these applications emerges the need of flexibility and combining operations with existing models to create other new, more complex models. As more complex models are used, the importance of transformations between models grows. This paper presents the application of the MDA (Model Driven Architecture) to generate, from the UML model, the code following the MVP (Model-View-Presenter), DI (Dependency Injection) and DAO (Data Access Object) patterns for a RIA (Rich Internet Application) using the standard MOF 2.0 QVT (Meta-Object Facility 2.0 Query-View-Transformation) as a transformation language. We adopt GWT (Google web Toolkit), Spring and Hibernate as a Frameworks for creating a target meta-model to generate an entire GWT-based N-tiers web application. That is why we have developed two meta-models handling UML class diagrams and N-tiers Web applications, then we have to set up transformation rules. The transformation rules defined in this paper can generate, from the class diagram, an XML file containing the Presentation, the Business, and the Data Access package. This file can be used to generate the necessary code of a RIA N-tiers web application.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信