8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)最新文献

筛选
英文 中文
Threat methodology for securing scalable video in the Cloud 用于保护云中可扩展视频的威胁方法
A. Khan, M. Oriol, M. Kiran
{"title":"Threat methodology for securing scalable video in the Cloud","authors":"A. Khan, M. Oriol, M. Kiran","doi":"10.1109/ICITST.2013.6750237","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750237","url":null,"abstract":"Scalable video using Cloud Computing is a potential solution for the distribution of media content to a large number of users. This may occur over a heterogeneous network connected to devices with different capabilities and diverse set of users. Although some of the problems are well known and understood in information and network security, there is still a need to improve the existing solutions to produce a solution that is both adequately secure and efficient in highly distributed and scalable environments. In this paper, we describe such improvements using a cloud computing scenario where video content is made available through a cloud platform. When put on an Infrastructure as a Service (IaaS) cloud video content should then be viewable by different consumers using different levels of bandwidth and security requirements depending on their identity. This requires a mechanism through which a cloud service could be authenticated and encrypted by end users. This paper describes the novel solution of securing scalable video in the cloud discussing the various threats for video distribution and how these can be made more secure in terms of confidentiality, availability and integrity, particularly threw source authentication and encryption.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion detection system for Wireless Nano sensor Networks 无线纳米传感器网络入侵检测系统
Aneel Rahim, P. Malone
{"title":"Intrusion detection system for Wireless Nano sensor Networks","authors":"Aneel Rahim, P. Malone","doi":"10.1109/ICITST.2013.6750215","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750215","url":null,"abstract":"Nano communication is an emerging multi-disciplinary research field of global importance. Nano machines are small in size and connected with each other to share information and perform small tasks such as simple computing, sensing, etc. Applications include healthcare, smart buildings, military and industrial products. The main theme of this proposed research study is the security of nano communications. Very limited research material currently exists in the area of security in nano networks. While security is an important concern in today's digital and physical world, sufficient research is not present in the network architecture of Wireless Nano sensor Networks (WNSNs). There is no intrusion detection system in existence for nano communication. Malicious nodes and malicious data provide a threat to nano networks in similar ways as they occur in traditional networks, but the limited communications facilities provide different challenges. The proposed work will bridge this current gap and provide a novel Intrusion Detection System (IDS) for nano communications, which will detect malicious nodes and malicious data. Through a literature research, requirement elicitation, framework and algorithm design, we will develop the proposed solution for securing nano networks.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124935684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Access control in probative value cloud 证据价值云中的访问控制
M. Msahli, Rached Abdeljaoued, A. Serhrouchni
{"title":"Access control in probative value cloud","authors":"M. Msahli, Rached Abdeljaoued, A. Serhrouchni","doi":"10.1109/ICITST.2013.6750274","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750274","url":null,"abstract":"Access Control over large scale distributed system like Cloud computing are one of the most debated topics of computer security. Despite the common use and the popularity of the Cloud computing paradigm, significant risks and challenges are inherent to this new concept, especially when we talk about storage of sensitive data via insecure network. In this paper we look at the problem of protecting data from unauthorized access to the Cloud in the context of gSafe (government Safe) project. Indeed, gSafe project defines essential basic units for a probative storage Cloud. The cornerstone of the efficient cloud security architecture is a well-written access control policy. In today's information technology, many models of access control have been proposed like the Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONABc). In this paper we use six entities proposed in the UCONABC: Object, Subject, Right, Authorization, oBligation and Condition to model the access control management in the gSafe project. Then we present the XML scheme containing metadata for stored files and users' access authorizations. The proposed solution is validated and implemented over Hadoop distributed file system.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems 身份访问管理系统中可接受用户体验的UTAUT模型的评估
S. Alotaibi, M. Wald
{"title":"Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems","authors":"S. Alotaibi, M. Wald","doi":"10.1109/ICITST.2013.6750197","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750197","url":null,"abstract":"The modern world is populated with a great many physical and virtual IAMS (Identity Access Management Systems), where people need to maintain various login credentials. There is a key issue associated with this approach, which is the ability to remember this information; however, this can be circumvented to some degree through utilising an innovative approach of a single sign-in mechanism. Throughout the course of recent times, a number of different systems have been developed in order to deliver both virtual and physical IAMS. Moreover, in addition to a greater level of awareness to ensure interoperable virtual and physical IAMS are implemented, there is a pressing urgency for clear guidelines to be devised relating to the integration of: security, comprising identity; user experience, involving usability; and acceptability, encompassing accessibility. Very few models adhere to such guidelines; therefore, this paper seeks to deal with the pressing need to devise, implement and evaluate a model for acceptable user experience, enabling the successful integration of physical and virtual public services in an e-government context. In regard to the users' assessment, which tests the suggested Unified Theory of Acceptance and Use of Technology (UTAUT), it was observed that there is an indirect impact on behavioural intention to utilise a new prototype system (Ubiquitous Identity Access Management System “UbIAMS”) through various factors, namely effort expectancy, performance expectancy and social influence, as well as through items relating to acceptability and user experience.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122352960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the Internet 利比亚大学学术人员对互联网作用态度的探索性研究
A. Elzawi, S. Wade, T. Kenan, C. Pislaru
{"title":"Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the Internet","authors":"A. Elzawi, S. Wade, T. Kenan, C. Pislaru","doi":"10.1109/ICITST.2013.6750248","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750248","url":null,"abstract":"This study has been directed to disclose the attitudes of academic staff in Libyan universities towards Internet-based learning and training. The research for this study has been conducted using both quantitative and qualitative methods. The findings suggest that faculty members have positive attitudes towards integrating the Internet into the teaching process and an expectation that this will dramatically change the nature of higher education in Libya over the next few years. The need for inclusive strategic planning and effective implementation plans and strategies is discussed.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network 心电图信号作为生物识别技术在保护无线体域网络中的应用
S. N. Ramli, R. Ahmad, M. F. Abdollah
{"title":"Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network","authors":"S. N. Ramli, R. Ahmad, M. F. Abdollah","doi":"10.1109/ICITST.2013.6750259","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750259","url":null,"abstract":"A recent trend in the field of biometrics is ECG-based, where electrocardiogram (ECG) signals are used as input to the biometric system. Previous work has shown that ECG has a good potential, which can be used alone as a biometric parameter or in combination with some other parameters for greater accuracy, due to its main key properties. This paper presents a study on the applicability of ECG signals in securing Wireless Body Area Network (WBAN) communications. We study the permanence and the distinctiveness properties of ECG signals on 10 random patients. The Independent Component Analysis (ICA) and Fast Fourier Transform (FFT) are applied on the ECG signals obtained from MIT-BIH Normal Synus Rhythm (nsrdb) public database. The experimental results are presented, which exhibit that ECG signal can be utilized properly to achieve better security performance under the stringent constraints of WBAN sensors. Thus, it is believed that the system can naturally secure the information transmission within WBAN, where other techniques use hardware and software to achieve the same purpose.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128434117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Broker-based Cross-Cloud Federation Manager 基于代理的跨云联合管理器
J. B. Abdo, J. Demerjian, H. Chaouchi, K. Barbar, G. Pujolle
{"title":"Broker-based Cross-Cloud Federation Manager","authors":"J. B. Abdo, J. Demerjian, H. Chaouchi, K. Barbar, G. Pujolle","doi":"10.1109/ICITST.2013.6750199","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750199","url":null,"abstract":"Cloud federation is the next step in creating a new cloud computing ecosystem. The absence of suitable business models for federation managers is hindering the wide deployment of this critical feature. In this paper we will study existing federation managers, specifically CCFM (Cross-Cloud Federation Manager) and analyze its strengths and limitations. To overcome its limitations and make cloud federation more competitive in the current business trends, we introduce a new node called “broker” which will play a significant role in the enhanced CCFM mechanisms. The discovery and match-making agents in CCFM will be modified to enforce a new business model which is more interesting for private investors. Finally, our new business model will be discussed and possible versions are stated.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A methodology to build run-time monitors for security-aware workflows 为具有安全意识的工作流构建运行时监视器的方法
Clara Bertolissi, Silvio Ranise
{"title":"A methodology to build run-time monitors for security-aware workflows","authors":"Clara Bertolissi, Silvio Ranise","doi":"10.1109/ICITST.2013.6750251","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750251","url":null,"abstract":"Run-time monitors are crucial to the development of workflow management systems, which are at the heart of several modern E-services. In this paper, we propose a new methodology to build run-time monitors capable of ensuring the successful termination of workflows subject to authorization constraints. The methodology is based on state-of-the-art Satisfiability Modulo Theories techniques.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114620161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Results on implementing personal learning environments in Tanzanian secondary schools 坦桑尼亚中学实施个性化学习环境的结果
L. Mselle, Tabu S. Kondo
{"title":"Results on implementing personal learning environments in Tanzanian secondary schools","authors":"L. Mselle, Tabu S. Kondo","doi":"10.1109/ICITST.2013.6750234","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750234","url":null,"abstract":"In this paper we describe how an Offline Personal Learning Environment (OPLE) for learning mathematics was implemented in Tanzanian secondary schools. Students and teachers' perceptions were captured and discussed. The viability of delivering mathematics classes through offline digital content was tested. Results show that OPLE can be used to improve teaching and learning in Tanzanian secondary schools.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130696387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DA5DCSWS: A Distributed Architecture for semantic Web services Discovery and Composition
Adel Boukhadra, K. Benatchba, Amar Balla
{"title":"DA5DCSWS: A Distributed Architecture for semantic Web services Discovery and Composition","authors":"Adel Boukhadra, K. Benatchba, Amar Balla","doi":"10.1109/ICITST.2013.6750188","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750188","url":null,"abstract":"The Web services technology is now widely used in support of interoperability between distributed and heterogeneous applications. With the evolution of Semantic Web services (SWs) within organizations and their uses in a large-scale, composition of services in a distributed setting has become a real challenge. A mechanism for automatic composition of SWs according to their functionality is necessary, since the features are the most important thing that partners seek. In this paper, we describe a distributed approach to automatic composition of SWs, which supports the complexity of both SWs and the task at hand. The approach is based on the notion of alignment of OWL-S, in order to achieve semantic interoperability in a heterogeneous, and distributed architecture, to ensure correct operation of Web services provided, and meet the needs and users' preferences. The objective is to optimize the time of the completion of the automatic composition of SWs, and to overcome the problem of communication within and between SWs and network saturation.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130876118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信