{"title":"A framework for measuring the vulnerability of hosts","authors":"K. Scarfone, T. Grance","doi":"10.1109/INFTECH.2008.4621610","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621610","url":null,"abstract":"This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually constructed models, and most approaches have examined software flaws only, not other vulnerabilities such as software misconfiguration and software feature misuse. The framework uses a highly automatable metrics-based approach, producing rapid and consistent measurements for quantitative risk assessment and for attack and vulnerability modeling. In this paper, we propose the framework and its components and describe the work needed to implement them.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115501476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CartoMetric: Semantic ontology evaluation with cartographic methods","authors":"Krzysztof Goczy, Wojciech Waloszek","doi":"10.1109/INFTECH.2008.4621703","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621703","url":null,"abstract":"In the last years, with development of the Semantic Web, large number of still evolving ontologies has been designed, which led to rising of the environment called sometimes ldquowild wide Webrdquo. In this rapidly changing environment, both human users and computer agents need a method of evaluation of ontologies that takes into consideration their semantic properties, i.e. the spaces of possible models. This paper presents latest improvements of the cartographic method, which has been developed in the course of PIPS - 6th European Framework Project - and focuses on use of the method for measuring semantic properties of ontologies. A prototypical system performing this task and the results of the preliminary experiments are also presented.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"57 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113937233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-core/tile Polymorphous Computing systems","authors":"H. Spaanenburg","doi":"10.1109/INFTECH.2008.4621675","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621675","url":null,"abstract":"Polymorphous computing systems have been introduced in multi-core/tile architectures as a result of the DARPA Polymorphous Computing Architectures (PCA) program. We will review the state-of-the-art in multi-core systems, first by reviewing the PCA developed systems, and secondly by reviewing recently announced multi-core chips. The PCA-developed USC-ISI/Raytheon/Mercury MONARCH chip in addition to the general-purpose (post)-processing cores contains reprogrammable hardware for high-performance sensor-based (pre)-processing. This paper describes the application of polymorphous computing in embedded processing application domains. We will be particularly interested in the performance benefits gained from additional reconfigurable hardware in multi-core chips.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A solution to remote biometric identification","authors":"P. Bodnar","doi":"10.1109/INFTECH.2008.4621615","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621615","url":null,"abstract":"Identification is an essential part of security in most systems. There are many technologies and protocols supporting this functionality. Biometrics is considered promising because of ease of use from the user's viewpoint. They are also helpful if physical user presence has to be guaranteed. This paper studies security of biometrics if used in distributed and unprotected contexts. It demonstrates that an unprotected architecture is vulnerable to trivial attacks and that the use of biometric technologies in the user identification process may significantly undermine the security chain of the whole system. A solution which removes most of the difficulties is presented and discussed in the context of a distributed e-health application.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123772831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scalable range radio-communication interfacing for embedded systems","authors":"T. Kochanski, R. Niski, A. Rucinski, J. Zurek","doi":"10.1109/INFTECH.2008.4621605","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621605","url":null,"abstract":"This paper describes the radio-communications ldquostate-of-the-artrdquo and ldquostate-of-the-practicerdquo for interfacing nodes in an ambient intelligence network. We also discuss the role of software defined hardware for software defined radios that form the radio-communication interface for ambient intelligence networks. Nodes must be capable of communication over at least one medium from Wibree-like (Bluetooth) to broadband satellite, preferably with flexible range and bandwidth. Wireless sensor networks and wireless ad-hoc networks based on these nodes provide a well-defined architectural basis for mission-critical and security-critical solutions.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117137824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Branch and bound algorithm for nonenzymatic RNA degradation","authors":"J. Błażewicz, M. Figlerowicz, Agnieszka Rybarczyk","doi":"10.1109/INFTECH.2008.4621679","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621679","url":null,"abstract":"A stability of individual phosphodiester bonds is an important factor affecting biological properties of large RNA molecules. One or more unstable bonds can control the rate of RNA decay and consequently, regulate its activity in vivo. Earlier in vitro studies on the mechanism of the spontaneous RNA degradation revealed that it is structure dependent process. Here, we present a mathematical formulation of a new problem of nonenzymatic spontaneous RNA degradation and a branch and bound algorithm for finding the solution of the problem. We also show the experimental data that enable to verify the results of the algorithm.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131045785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mission critical embedded system: A new type FPGA-based digital magnetometer system for space research","authors":"Hyomin Kim, M.N. Islam, L. Long, A. Rucinski","doi":"10.1109/INFTECH.2008.4621599","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621599","url":null,"abstract":"The magnetometer, a sensor system which measures magnetic field intensity and how it varies over time, is commonly used in scientific research and industrial applications. Typically, it consists of a magnetic sensor, analog amplifier and filter circuits. It also contains digital circuits for data acquisition. In our study, we address an issue where there is a number of ground-based magnetometer systems installed in both polar regions and in outer space. Due to the limited accessibility to those regions, installation and maintenance of those systems require high cost and lead time. This study proposes a primary test model of a ground-based magnetometer system for space research using digital signal processing techniques based on field programmable gate array (FPGA) and minimal analog circuits. This FPGA-based design is accessible via an Ethernet based network. Network functions provide communications, data acquisition, system test, and remote system control. This approach includes remote control of system characteristics like frequency response, gain, sampling rate, and sampling resolution. This new design concept will result in timely and less expensive maintenance, ease of access/service, and greater reliability. In addition, this system remotely uses an embedded self-test method which can perform system integrity tests for each separate circuit component.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130639162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SBFS - steganography based file system","authors":"J. Lach","doi":"10.1109/INFTECH.2008.4621617","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621617","url":null,"abstract":"This paper presents the idea of file system that is built on top of image library using steganography techniques. In this solution user is allowed to select arbitrary set of images that are used as covers for hiding not only single portion of data but a whole file system which can contain several data files. The file system is dedicated for mobile devices such as smart phones which equipped with digital cameras often store large image libraries. Those can be successfully used for hiding sensitive data. As long as steganography technique used for hiding the existence of the file system stays secure the solutionpsilas characteristic feature is plausible deniability since the user can deny its existence.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126509637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On some constructions of monochrome visual cryptographic schemes","authors":"A. Adhikari, B. Roy","doi":"10.1109/INFTECH.2008.4621609","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621609","url":null,"abstract":"Most of the secret sharing schemes are based on algebraic calculations in their realizations. But there are some different realizations of the secret sharing schemes. Visual cryptography is one such secret sharing scheme. In a visual cryptographic scheme, for a set P of n participants, a secret image is split into n shadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image with some loss of contrast, but other forbidden sets of participants have no information about the secret image. In this paper we review with appropriate examples some of the methods for the construction of monochrome visual cryptographic schemes for general as well as for threshold access structures.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125665305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blending-prediction-based approach for lossless image compression","authors":"G. Ulacha, P. Dziurzański","doi":"10.1109/INFTECH.2008.4621685","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621685","url":null,"abstract":"An approach for blending-prediction-based lossless compression of images together with its system-level model utilizing a NoC-based multicore realization is presented in this paper. We utilize a multi-path routing algorithm and heuristic algorithms for core mapping in order to balance and minimize transfers between cores realizing subsequent stages of the compression algorithm. The experimental results confirming the applicability of the proposed approach are provided.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129421047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}