8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)最新文献

筛选
英文 中文
Implementing a high-performance recommendation system using Phoenix++ 使用Phoenix++实现一个高性能的推荐系统
Chongxiao Cao, Fengguang Song, D. Waddington
{"title":"Implementing a high-performance recommendation system using Phoenix++","authors":"Chongxiao Cao, Fengguang Song, D. Waddington","doi":"10.1109/ICITST.2013.6750200","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750200","url":null,"abstract":"Recommendation systems are important big data applications that are used in many business sectors of the global economy. While many users utilize Hadoop-like MapReduce systems to implement recommendation systems, we utilize the high-performance shared-memory MapReduce system Phoenix++ [1] to design a faster recommendation engine. In this paper, we design a distributed out-of-core recommendation algorithm to maximize the usage of main memory, and devise a framework that invokes Phoenix++ as a sub-module to achieve high performance. The design of the framework can be extended to support different types of big data applications. The experiments on Amazon Elastic Compute Cloud (Amazon EC2) demonstrate that our new recommendation system can be faster than its Hadoop counterpart by up to 225% without losing recommendation quality.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using multi-agent systems to solve food distribution problem in disaster area 利用多智能体系统解决灾区粮食分配问题
U. Manzoor, M. Zubair, K. Batool
{"title":"Using multi-agent systems to solve food distribution problem in disaster area","authors":"U. Manzoor, M. Zubair, K. Batool","doi":"10.1109/ICITST.2013.6750290","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750290","url":null,"abstract":"Disasters have been causing huge damages to infrastructure as well as human life from a long time. One of the key problems faced when disaster hits an area is efficient distribution of resources such as medicine, food, water etc. In this paper, we propose a solution particularly for distribution of food. We have proposed a solution in which a big disaster region is divided into smaller areas (regions) and multi-agent system are used to deliver food in these regions. Agents use shortest path algorithms and coordination to deliver food within their particular region efficiently. In the experiment section, we have performed different experiments to check how the proposed solution performs when one of the parameter is changed. Using multi-agents can be very useful approach for distribution problems especially in disaster region.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mining salient images from a large-scale blogosphere 从大规模博客圈中挖掘突出图像
Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim
{"title":"Mining salient images from a large-scale blogosphere","authors":"Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim","doi":"10.1109/icist.2013.6747526","DOIUrl":"https://doi.org/10.1109/icist.2013.6747526","url":null,"abstract":"","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124228462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing E-Seal real time tracking system for Internet of Things 保障E-Seal物联网实时跟踪系统
Mouza Ahmad Bani Shemaili, C. Yeun, M. Zemerly, Khalid Mubarak, Y. Chang
{"title":"Securing E-Seal real time tracking system for Internet of Things","authors":"Mouza Ahmad Bani Shemaili, C. Yeun, M. Zemerly, Khalid Mubarak, Y. Chang","doi":"10.1109/ICITST.2013.6750163","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750163","url":null,"abstract":"High volume products such as RFID tags and Wireless Sensors (WS) have a constricted cost that limit the cryptographic implementation in such devices. Our work focuses on securing an E-Seal that can be used to secure the communication of the real time tracking communication by using a symmetric cryptosystem. Also, this paper addresses the use of the asymmetric cipher which is an Identity Based Cryptosystem (IBC) based with lightweight computation specification that can be used in low computation devices for locking and unlocking of the E-Seal.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptation of Web services using policies 使用策略调整Web服务
M. Velasco, D. While, Pathmeswaran Raju
{"title":"Adaptation of Web services using policies","authors":"M. Velasco, D. While, Pathmeswaran Raju","doi":"10.1109/ICITST.2013.6750218","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750218","url":null,"abstract":"Web services technology is evolving as a base for implementing service-oriented architectures (SOA), which has become an important architectural style for Web applications development. As Web Services development has grown considerably, the need for Quality of Service (QoS) has become a substantial aspect for developing a reliable service applications. In diverse business domains, Web services need to exhibit quality characteristics such as response time, availability, and reliability. However, a problem arises when a Web service is modified, updated or replaced by a new one. The new Web service may not fully match the QoS features provided from the previous one, this unavoidable problem is recognized as a mismatch. Mismatches are found in different layers of the Web service interoperability stack and corresponding adapters are needed to deal with this issue. This paper proposes a study to investigate the feasibility of achieving interoperability in Web services by evaluating the functionality of adapters when mismatches appear at the policy layer, which includes non-functional properties like QoS.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure 评估在公共平台即服务云环境中实现的安全机制案例研究:Windows Azure
A. Akinbi, E. Pereira, Chris Beaumont
{"title":"Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure","authors":"A. Akinbi, E. Pereira, Chris Beaumont","doi":"10.1109/ICITST.2013.6750183","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750183","url":null,"abstract":"The security risks of cloud computing and ambiguity of security mechanisms implemented on an on-demand cloud service like Platform-as-a-Service (PaaS), continues to raise concerns in cloud consumers. These risks clearly affect the adoption of the potentials offered by provisioning of computer resources of this scale. Examining an on-demand Platform-as-a-Service public cloud environment, this paper focuses on the security controls and mechanisms implemented on each component of Windows Azure. Using a security framework which consists of industry standard controls to evaluate its security offerings, this study attempts to understand how its security controls and implementations meet the needs of consumers in identity management, access management and virtualization security in the development of web based applications hosted on the cloud.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121767668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Lightweight chaos-based cryptosystem for secure images 用于安全图像的轻量级基于混沌的密码系统
Zeinab Fawaz, S. E. Assad, M. Frajallah, Ayman Khalil, R. Lozi, O. Déforges
{"title":"Lightweight chaos-based cryptosystem for secure images","authors":"Zeinab Fawaz, S. E. Assad, M. Frajallah, Ayman Khalil, R. Lozi, O. Déforges","doi":"10.1109/ICITST.2013.6750156","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750156","url":null,"abstract":"In the last two decades, several chaos-based cryptosystems have been proposed. Some of them have architecture comprising a layer of permutation and a layer of diffusion and these layers are simultaneously executed in a simple scan of plain-image pixels. In this kind of cryptosystems, due to the channel effect, a bit error(s) in the cipher-image produces, at the decryption side, a random bit error in the estimated plain-image. In this paper, we propose a cipher-block encryption algorithm in CBC (Cipher Block Chaining) mode. It consists of a permutation process on the bits achieved by a 2D-cat map, followed by a bitwise XOR operation. Here, each permuted bit (confusion phase) is immediately diffused in a simple manner in the same phase. Therefore, the confusion and diffusion effects are stronger and the cryptanalyses for permutation-only ciphers become ineffective.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127210393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security in the cloud based systems: Structure and breaches 基于云的系统中的安全性:结构和漏洞
Vivek Shandilya, S. Shiva
{"title":"Security in the cloud based systems: Structure and breaches","authors":"Vivek Shandilya, S. Shiva","doi":"10.1109/ICITST.2013.6750260","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750260","url":null,"abstract":"Cloud based systems(CBSs) are increasing in the computing world. These systems derive their complexity due to both the disparate components and the diverse stake holders involved in them. The component wise security alone does not solve the problem of securing CBSs, but the stakeholder's computational space spanning across many components of the CBS, needs to be secured too. There have been initial attempts to model the security of the cloud in terms of securing stakeholder's computational space. Some recent attempts formally model the CBS as modularized actor models, using rewriting & equational logic based modeling languages. Building on these works we present a framework for building executable models of CBSs for security analyses. We illustrate its validity showing how the recent security breaches and security solutions can be modeled and analyzed using this framework.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards an efficient shopping mechanism for M-commerce 面向移动商务的高效购物机制
S. Réhman, N. Ejaz
{"title":"Towards an efficient shopping mechanism for M-commerce","authors":"S. Réhman, N. Ejaz","doi":"10.1109/ICITST.2013.6750264","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750264","url":null,"abstract":"Mobile commerce (M-commerce) is the facility to carry out commerce using mobile devices. This mechanism provides freedom to the customers that they can perform transaction anywhere, anytime. In this research, we propose a solution that makes the use of intelligent agents as the component units around which our application and its services can be conceptualized. One such application is Pocket Savvy which is an android base application based on the principals of m-commerce. It's based on the buying of online products in an efficient and effective way through mobile devices.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133758158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ProtoML: A rule-based validation language for Google Protocol Buffers ProtoML:用于Google协议缓冲区的基于规则的验证语言
Miklós Kálmán
{"title":"ProtoML: A rule-based validation language for Google Protocol Buffers","authors":"Miklós Kálmán","doi":"10.1109/ICITST.2013.6750189","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750189","url":null,"abstract":"We live in an information age where massive amounts of data are being transferred across multiple platforms. Cross-platform formats are constantly evolving to aid the communication between machines running different backends. There are text-based (e.g.: XML, JSON) and binary (e.g.: BSON, bXML, Google Protocol Buffers) formats that can provide the basis of common communication. In this article we will be focusing on a widely used binary-format: Google Protocol Buffers. This format has support for various languages. One caveat of this format is that although the structure of the messages is defined by the “.proto” file the validation and sanitization of the transmitted messages have to be implemented by the developer. We introduce a new metalanguage called ProtoML that serves as a solid foundation for the definition of validation and constraint rules for Protocol Buffer messages. The ProtoML rules can easily be extended using additional validation functions and have the added benefit of providing a way to correct messages on the fly prior to transmission. We will also demonstrate a draft implementation of the ProtoML language to showcase its potential.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134067194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信