8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)最新文献

筛选
英文 中文
Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systems 设计容灾基础设施即服务云计算系统的可执行性模型
B. Silva, P. Maciel, A. Zimmermann
{"title":"Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systems","authors":"B. Silva, P. Maciel, A. Zimmermann","doi":"10.1109/ICITST.2013.6750283","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750283","url":null,"abstract":"Providing high availability in a diverse client demand scenario is a key challenge of cloud computing providers. A possible approach to protect cloud systems from natural disasters corresponds to the utilization of redundant data centers located far enough apart. The time to migrate a virtual machine (VM) from a data center to another increases due to distance. As this time impacts the overall system behavior, performability evaluation considering VM migration time and different load balances is of utmost importance when considering the analysis of distributed cloud systems. This work presents performability models for evaluating distributed cloud computing systems deployed into multiple data centers considering disaster occurrence. Additionally, we present a case study which evaluates a set of scenarios with different client loads and distances between data centers.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133551012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Context-aware RESTful services on mobile devices 移动设备上的上下文感知式RESTful服务
C. M. D. Westhuizen, M. Coetzee
{"title":"Context-aware RESTful services on mobile devices","authors":"C. M. D. Westhuizen, M. Coetzee","doi":"10.1109/ICITST.2013.6750220","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750220","url":null,"abstract":"Web accessible services on mobile devices such as smart phones and tablets are a reality in today's age. Services hosted on mobile devices consume valuable device resources such as battery power, network connectivity, and Global Positioning Systems (GPS) availability. For this research, clients consume web accessible services, provisioned from mobile devices acting as service providers. A challenge for constrained mobile devices is how the efficiency and discovery of web accessible services on mobile devices can be improved. To address this, a framework is presented that considers context information focusing on lightweight services and their discovery.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114175777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic data reuse for accelerating data intensive applications in the Cloud 自动数据重用,加速云中的数据密集型应用程序
Liangxiu Han, Zheng Xie, R. Baldock
{"title":"Automatic data reuse for accelerating data intensive applications in the Cloud","authors":"Liangxiu Han, Zheng Xie, R. Baldock","doi":"10.1109/ICITST.2013.6750272","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750272","url":null,"abstract":"This paper proposes a cost-oriented, petri-net based intelligent data reuse management to minimise data movement, reduce computing and storage costs and therefore improve the performance of data intensive applications in the Cloud. The proposed approach can automatically manage intermediate datasets of data intensive applications, predict the cost of the applications based on the previous runs, and intelligently decide whether the intermediate results should be stored or deleted for the subsequent runs, and dynamically optimise the cost of data intensive applications in the Cloud. The experimental evaluation demonstrates the proposed data reuse mechanism can significantly reduce the overall cost and enhance the performance of data intensive applications.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115772798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies 电子政务网络服务和发展中国家的个人身份信息安全——尼日利亚大使馆的案例
L. Adedayo, S. Butakov, Ron Ruhl, Dale Lindskog
{"title":"E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies","authors":"L. Adedayo, S. Butakov, Ron Ruhl, Dale Lindskog","doi":"10.1109/ICITST.2013.6750278","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750278","url":null,"abstract":"This paper examines the processing of PII data in e-Government web services in developing nations using the case study of some Nigerian embassies. It presents a secured framework intended for protecting Personally Identifiable Information (PII) data in e-Government web services in developing nations where such do not already exist. The framework is based on OWASP ASVS security requirement for data protection in web environment and this was used as a basis of assessment for the respective website by analysing the security of the web portal used in processing citizens' registration data through a non-invasive web sites analysis method.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Formally defining NFC M-coupon requirements, with a case study 正式定义NFC m -优惠券要求,并进行案例研究
A. Alshehri, Steve A. Schneider
{"title":"Formally defining NFC M-coupon requirements, with a case study","authors":"A. Alshehri, Steve A. Schneider","doi":"10.1109/ICITST.2013.6750161","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750161","url":null,"abstract":"An NFC-based mobile coupon (M-coupon) is a cryptographically secured electronic message with some value stored at user's mobile. In the literature, a number of NFC M-coupon protocols were proposed in order to meet particular security requirements. However, formal security analysis is required to check the security of these protocols and whether they address their requirements. This paper mainly focuses on the formal definition of the NFC M-coupon requirements, which is the first, and most important, part of the formal analysis. The formal definitions can apply to a variety of protocols. Then, we illustrate the concept on a case study.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131686017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis of security attacks on AODV routing AODV路由安全攻击分析
Mohamed A. Abdelshafy, P. King
{"title":"Analysis of security attacks on AODV routing","authors":"Mohamed A. Abdelshafy, P. King","doi":"10.1109/ICITST.2013.6750209","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750209","url":null,"abstract":"MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability analysis of AODV. We simulate four routing attacks to analyse their impacts on AODV protocol using NS-2 network simulator. These attacks are blackhole, grayhole, selfish and flooding attacks. The blackhole and flooding attacks have a severe impact on the network performance while the selfish and grayhole attacks have less significant effect on the network performance.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127648216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Anomaly detection in Online Social Networks using structure-based technique 基于结构的在线社交网络异常检测
Abdolazim Rezaei, Z. M. Kasirun, Vala Ali Rohani, T. Khodadadi
{"title":"Anomaly detection in Online Social Networks using structure-based technique","authors":"Abdolazim Rezaei, Z. M. Kasirun, Vala Ali Rohani, T. Khodadadi","doi":"10.1109/ICITST.2013.6750277","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750277","url":null,"abstract":"Online Social Networks as new phenomenon have affected our life in many positive ways; however it can be considered as way of malicious activities. Identifying anomalous users has become a challenge and many researches are conducted but they are not enough and in this paper we propose a methodology based on graph metrics of online social networks. The experimental results illustrate that majority of friends in online social networks have common friends with their friends while anomalous users may not follow this fact.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Design and implementation of the contents visualization system for social networks 社交网络内容可视化系统的设计与实现
J. Lee, J. Kim, Ikkyun Kim, K. Han
{"title":"Design and implementation of the contents visualization system for social networks","authors":"J. Lee, J. Kim, Ikkyun Kim, K. Han","doi":"10.1109/ICITST.2013.6750246","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750246","url":null,"abstract":"Generally, social network contains a social structure between individuals who are connected by a set of social relationships, such as family, friendship, co-working and colleague etc. Our paper suggests an approach for visualizing the social network elements including users and relationships as well as the community that contains groups of users and contents. For this, we designed and implemented a social visualization system that manage and visualize the relationship among a related group of users called ‘communities’ and members including contents shared by the group users. The visualization system provides multi-dimensional layers for monitoring and arranging the social contents for its optimized way to visualize relationships among users and communities.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124699011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the effectiveness of collaborative learning processes in Libyan Higher Education 提高利比亚高等教育中协作学习过程的有效性
T. Kenan, C. Pislaru, A. Elzawi, Maysoun Restoum
{"title":"Improving the effectiveness of collaborative learning processes in Libyan Higher Education","authors":"T. Kenan, C. Pislaru, A. Elzawi, Maysoun Restoum","doi":"10.1109/ICITST.2013.6750233","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750233","url":null,"abstract":"This paper analyses the existing state-of-the-art implementation of e-learning and collaborative learning systems in Libyan Higher Education. The authors have developed a questionnaire, which was completed by mature Libyan students enrolled for two categories, the first category is a researchers group in UK who also are full-time lecturers at the Universities of Tripoli, Garyounis, Gharian and Ezawia; the second category is full-time lecturers in Libya at the above- mentioned universities. The quantitative and qualitative analysis of the answers shows the necessity to revise the nature of knowledge so the classroom activities and interactive online applications enable the development of team-building skills required by employers. Also other factors such as intelligent multimedia, internet technologies, knowledge management; have a significant influence on creating innovative and inspiring collaborative learning environments where lecturers are expert designers of intellectual experiences for students who become active participants to the learning processes.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121614677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive market place for converged cloud computing model 融合云计算模型的自适应市场
I. K. Musa, Stuart D. Walker
{"title":"Adaptive market place for converged cloud computing model","authors":"I. K. Musa, Stuart D. Walker","doi":"10.1109/ICITST.2013.6750273","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750273","url":null,"abstract":"Next generation cloud computing architecture is envisioned to be built on advanced self-serviced and converged infrastructure with high adaptability. As a result, there is a growing interest on cloud value added services. Platform and brokering services enable functionalities to address these challenges. This paper identifies the ecosystem in a converged cloud computing model that binds together infrastructure and platform service in a common market place. In the model, resources are organized in a virtual container and delivered to users in a holistic manner. Our work presents a business model in which additional value is created from the interaction and transactions of various virtual service actors. Results obtained from experiment conducted on private cloud shows the strength of our model in increasing the aggregate revenue and achieving a stable response time.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133160110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信