2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

筛选
英文 中文
Fountain-code-enabled DCF for optimazing throughput in wireless sensors 支持喷泉代码的DCF,用于优化无线传感器的吞吐量
Rachid Aouami, Essaid Sabir, M. Rifi, M. Ouzzif
{"title":"Fountain-code-enabled DCF for optimazing throughput in wireless sensors","authors":"Rachid Aouami, Essaid Sabir, M. Rifi, M. Ouzzif","doi":"10.1109/ICITST.2015.7412136","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412136","url":null,"abstract":"This paper presents a new innovation network architecture for the analytical model by the integration which challenges both fountain code and Markov chain modeling to improve the throughput performance for ideal channel conditions. In this context, the collision result in corrupted packets and the following MAC layer retransmissions consume extra energy. Channel contention is a serious problem in Wireless sensor due to packets collisions. The Distribution Coordination Function (DCF) plays a very important role in the analytical model for IEEE802.11 in MAC layer protocol. Our solution uses the Fountain code enabled DCF (FCEDCF) under saturation traffic and compares the result with the classical proposed by Bianchi according a lightly accurate estimation of throughput and collision probability model to analyze the protocol MAC layer.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Facial expression change detection algorithm using optical flow technique 基于光流技术的面部表情变化检测算法
Norulzahrah Mohd. Zainudin, S. Ramli, T. T. Zizi, N. Hasbullah, Norazlin Ibrahim
{"title":"Facial expression change detection algorithm using optical flow technique","authors":"Norulzahrah Mohd. Zainudin, S. Ramli, T. T. Zizi, N. Hasbullah, Norazlin Ibrahim","doi":"10.1109/ICITST.2015.7412115","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412115","url":null,"abstract":"This study is aimed to investigate the use of optical flow techniques in detecting changes in facial expressions. A person face expression detection is very important as we can identify a person's emotional and mental state. When communicating with people, human can identify someone's expression accurately compared to computer. Although many approaches are tackled on this topic, there are still several drawbacks and limitations. In order to yield better results, we have applied optical flow technique to detect facial expression. In addition, we have the technique with Horn-Schunck method to optimize the results. Based on the experiment conducted, the average value represented by every facial expression can be identified, and the values are significant for future research that is focused on facial expression classification.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116921452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Case-based reasoning system for predicting the sustainability of a telecentre 预测远程中心可持续性的基于案例的推理系统
Azerikatoa Ayoung, Boyce Sigweni, Pamela Y. Abbott
{"title":"Case-based reasoning system for predicting the sustainability of a telecentre","authors":"Azerikatoa Ayoung, Boyce Sigweni, Pamela Y. Abbott","doi":"10.1109/ICITST.2015.7412072","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412072","url":null,"abstract":"Telecentre implementation has been inundated with failure in developing countries. This has necessitated the need for evaluations to unearth reasons for such occurrences. Various methods have been proposed to evaluate IT projects. However, very few of these methods have been used to predict telecentre failure. We combine two approaches (ICT4D evaluation and Machine Learning) to predict the likelihood for failure of a telecentre. Through the use of a case study, this paper uses the well-established Case-Based Reasoning (CBR) methodology to predict failure of telecentres. We apply CBR on real life dataset to predict the Design-Reality Gap score (DRGS). We compare three CBR methods with a naïve benchmark using ArchANGEL. We demonstrate through our experiments that CBR can be used to predict DRGS. This gives a refreshing indication suggesting that it may be feasible to use CBR to evaluate ICT initiatives and to predict adequately outcome of an initiative. Through this mechanism, it may be possible for managers and owners of telecentres to pre-empt an outcome and have the advantage to take mitigating steps. This affords managers an opportunity for remedial action for sustainability.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121977198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing security trade-offs in the Internet of Things using adaptive security 使用自适应安全性管理物联网中的安全权衡
Waqas Aman, E. Snekkenes
{"title":"Managing security trade-offs in the Internet of Things using adaptive security","authors":"Waqas Aman, E. Snekkenes","doi":"10.1109/ICITST.2015.7412122","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412122","url":null,"abstract":"Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT. Using the Event-driven Adaptive Security (EDAS) model, we provide the assessment of dynamic trade-off decisions in the IoT. We have showed that an optimum trade-off mitigation response in the IoT can be automated by assessing various contextual requirements, such as the QoS and user preferences, thing capabilities, and the risk faced, at runtime. eHealth scenarios are examined to illustrate system application in IoT-based remote patient monitoring systems.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A taxonomy of perceived information security and privacy threats among IT security students 资讯保安专业学生对资讯保安及私隐威胁的认知分类
Ali Farooq, S. Kakakhel, S. Virtanen, J. Isoaho
{"title":"A taxonomy of perceived information security and privacy threats among IT security students","authors":"Ali Farooq, S. Kakakhel, S. Virtanen, J. Isoaho","doi":"10.1109/ICITST.2015.7412106","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412106","url":null,"abstract":"The purpose of this study is to explore students' perceived information security and privacy (IS&P) threats and to classify them in a way that helps in analyzing the problem, creating awareness measures and further improving students' IS&P education. Using a qualitative research approach, a group of forty two Master's degree IT students identified seventy five IS&P threats related to them. The identified threats were classified into fourteen categories. Further, using the affinity diagraming technique, the categories were grouped into four domains - Personnel, Devices, Intranet and Internet. In this way, we defined a taxonomy of students' perceived IS&P threats as well as a model that highlights the domains where students consider themselves prone to IS&P threats. The proposed taxonomy and the domain model can be used as a benchmark for designing information security awareness assessment instruments as well as preparing information security awareness programs. The taxonomy can also be used for highlighting areas where students lack information security related knowledge.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121275308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2 使用scap1.2的cisco IPsec VPN路由器的自动安全配置检查表
Gabriel Biedima Peterside, P. Zavarsky, S. Butakov
{"title":"Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2","authors":"Gabriel Biedima Peterside, P. Zavarsky, S. Butakov","doi":"10.1109/ICITST.2015.7412120","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412120","url":null,"abstract":"For large enterprises running many different operating systems, applications, and multi-vendor devices, the task of reviewing the security state of a broad range of devices and business areas in order to either comply with security requirements from regulations or detect risks such as misconfigured devices, out-of-date software, etc., is time-consuming, error-prone, and expensive. Although humans are important in the security assessment process, they are unable to keep up with the task, and may introduce inconsistencies which could further make organizations vulnerable to security breaches. Security automation provides a solution to this challenges. In this paper, a common security automation protocol, Security Content Automation Protocol (SCAP) version 1.2, was leveraged to develop an automated secure configuration checklist which can be used by security professionals to rapidly and consistently audit network edge devices such as a Cisco IPsec VPN router to ensure secure configuration per the baseline.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126041734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Recent advances of smart glass application security and privacy 智能玻璃应用安全与隐私的最新进展
Buti Al Delail, C. Yeun
{"title":"Recent advances of smart glass application security and privacy","authors":"Buti Al Delail, C. Yeun","doi":"10.1109/ICITST.2015.7412058","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412058","url":null,"abstract":"The recent developments in technology have led to new emerging wearable devices such as Smart Glasses. Usually, consumer electronics devices are designed for the benefits and functionalities they can provide, and the security aspect is incorporated later. In its core, a Smart Glass is based on components available in modern smartphones. This includes the CPU, Sensors and Operating System. Thus would share similar security threats. This paper identifies security threats and privacy issues of the Smart Glass from two different perspectives, as well as propose preliminary solutions to overcome such risks. This includes, a suggested two-factor authentication for smart glasses based on PIN or Voice combined with an Iris scan. The purpose of this work to examine the current state-of-the-art of smart glasses applications, and analyse existing and potential security and privacy issues. Therefore, we investigate issues from a system perspective, and the users point of view. In addition, we survey existing solutions for each issue.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127001750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Study of applicability of Chinese remainder theorem based group key management for cloud environment 基于中文剩余定理的群密钥管理在云环境下的适用性研究
Vimal Kumar SathiyaBalan, P. Zavarsky, Dale Lindskog, S. Butakov
{"title":"Study of applicability of Chinese remainder theorem based group key management for cloud environment","authors":"Vimal Kumar SathiyaBalan, P. Zavarsky, Dale Lindskog, S. Butakov","doi":"10.1109/ICITST.2015.7412069","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412069","url":null,"abstract":"This paper reports on applicability of the Chinese Remainder Theorem (CRT) based Group Key Management (CRTGKM) for cloud environment. The results of our experiments confirm that the cloud environment group key management schemes known as ACV-BGKM and AB-GKM require high computation time for key update and key recovery processes. Therefore, to reduce the computational cost, a CRTGKM algorithm of multimedia multicast environment is applied to cloud environment based on applicability criteria. JAVA-based testbed was developed for simulation of performance of various group key management schemes and for estimation of the computation time for key update and key recovery processes.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115291440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey on security and privacy issues in big data 大数据中的安全和隐私问题调查
Duygu Sinanc, Ramazan Terzi, Ş. Sağiroğlu
{"title":"A survey on security and privacy issues in big data","authors":"Duygu Sinanc, Ramazan Terzi, Ş. Sağiroğlu","doi":"10.1109/ICITST.2015.7412089","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412089","url":null,"abstract":"Due to the reasons such as the rapid growth and spread of network services, mobile devices, and online users on the Internet leading to a remarkable increase in the amount of data. Almost every industry is trying to cope with this huge data. Big data phenomenon has begun to gain importance. However, it is not only very difficult to store big data and analyse them with traditional applications, but also it has challenging privacy and security problems. For this reason, this paper discusses the big data, its ecosystem, concerns on big data and presents comparative view of big data privacy and security approaches in literature in terms of infrastructure, application, and data. By grouping these applications an overall perspective of security and privacy issues in big data is suggested.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 126
Role-based privilege isolation: A novel authorization model for Android smart devices 基于角色的权限隔离:一种新的Android智能设备授权模型
B. Das, L. Maddali, Harshita Vani Nallagonda
{"title":"Role-based privilege isolation: A novel authorization model for Android smart devices","authors":"B. Das, L. Maddali, Harshita Vani Nallagonda","doi":"10.1109/ICITST.2015.7412093","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412093","url":null,"abstract":"Data ex-filtration is a major security concern in smart devices as they often store private and confidential data. Data ex-filtration can potentially lead to identity theft, financial and non-financial risks, and reputation damage for individuals and organizations. In Android smart devices, sandbox mechanism is not flexible enough to allow an application, such as webbrowser, to protect its own data against attacks such as cross-site request forgery, session or cookie hijacking that exploit application or platform vulnerabilities. These attacks in turn can lead to severe sensitive, private and confidential data ex-filtration. In this paper, we propose a novel authorization model for Android smart devices called Role Based Privilege Isolation (RBPI) which intends to mitigate data ex-filtration. This model achieves fine-grained privilege separation by creating roles based on application usage categories. By using roles, different instances of an application can be made to run with different data access privileges. Thus, the model protects sensitive data even in case where other instances of the same application are compromised. RBPI acts as an additional data security layer on top of the existing Android's security model without any performance overhead. Our proposed model is also applicable on any end-user computing system.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信