2009 International Conference for Internet Technology and Secured Transactions, (ICITST)最新文献

筛选
英文 中文
Webometric analysis of Central Universities in India: A study 印度中央大学的网络测量分析研究
S. K. Jalal, S. C. Biswas, Parthasarathi Mukhopadhyay
{"title":"Webometric analysis of Central Universities in India: A study","authors":"S. K. Jalal, S. C. Biswas, Parthasarathi Mukhopadhyay","doi":"10.1109/ICITST.2009.5402605","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402605","url":null,"abstract":"Web presence of Indian Universities has been reflected in general and Central Universities in particular. Webometric data have been collected through Yahoo! and Google search engines using special query syntax. An attempt has been made to rank Central Universities in India using appropriate webometric indicators. Results reveled that University of Delhi becomes top rank (with score 4.28 and Sikkim University occupied the last (with score 1.64) among Central Universities in India.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115199478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Neural cryptography applied to key management protocol with mutual authentication in RFID systems 神经密码技术应用于RFID系统中具有互认证的密钥管理协议
Macedo Firmino, G. B. Brandao, A. Guerreiro, R. Valentim
{"title":"Neural cryptography applied to key management protocol with mutual authentication in RFID systems","authors":"Macedo Firmino, G. B. Brandao, A. Guerreiro, R. Valentim","doi":"10.1109/ICITST.2009.5402512","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402512","url":null,"abstract":"RFID (radio frequency identification) is an emerging technology, for automatic identification and tracking, to provide increased efficiency and decrease operating costs in industry and supply chain. However, existing international standards not include security specifications, which resulted in appearance of security threats. Many efforts have been done in this area. However, the key management protocols proposed are unsafe or impractical for most RFID systems. This paper presents a novel approach of a key management protocol with mutual authentication for RFID systems. This protocol is an extension of RFID systems for the protocol proposed by Kinzel and Kanter , adding to the original protocol: a mutual authentication and the definition of frames. Through simulations it was possible to observe that the security level of the proposed protocol is a function only of the computational resources of the entities in the RFID system.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125033139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security in Tele-Lab — Protecting an online virtual lab for security training 远程实验室的安全——保护在线虚拟实验室进行安全培训
Christian Willems, W. Dawoud, Thomas Klingbeil, C. Meinel
{"title":"Security in Tele-Lab — Protecting an online virtual lab for security training","authors":"Christian Willems, W. Dawoud, Thomas Klingbeil, C. Meinel","doi":"10.1109/ICITST.2009.5402506","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402506","url":null,"abstract":"The rapid burst of Internet usage and the corresponding growth of security risks and online attacks for the everyday user or the enterprise employee have emerged the terms Awareness Creation and Information Security Culture. Nevertheless, security education widely has remained an academic issue. Teaching system or network security on the basis of practical experience inherits a great challenge for the teaching environment, which is traditionally solved using a computer laboratory at a university campus. The Tele-Lab project offers a system for hands-on IT security training within a remote virtual lab environment — over the web, accessible by everyone. Such a system is inherently exposed to various security threats, since it has to provide full access to virtual machines running attack tools for potentially malicious users. The paper at hand introduces usage, management and operation of Tele-Lab as well as its architecture. Furthermore, this work focuses on possible attacks, the challenges when securing such a system, and shows how to set up an infrastructure that ensures the main security objectives identified as authentication, authorisation and availability.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123941767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology 混合负载均衡策略,提高三层对等网络拓扑的性能效率
Yi-Tung F. Chan, C. Shoniregun, G. Akmayeva
{"title":"Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology","authors":"Yi-Tung F. Chan, C. Shoniregun, G. Akmayeva","doi":"10.1109/ICITST.2009.5402621","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402621","url":null,"abstract":"Nowadays, due to the advantage of technology and the Internet popularization, Peer-to-Peer (P2P) computing technology has been gradually becoming the mainstream on the distributed system applications. However, the main purpose of P2P computing technology is to process the large-scale task through the distributed system computer cooperatively. Therefore, how to efficiently assign tasks to every nodes and how to make tasks to achieve the load balance on each node of the system are a worthy discussion issue. In this research paper, we proposed the Load Balance Min-Min (LBMM) schedule algorithm to process the task assignment in the three tiers of P2P network topology architecture. Through setting up the threshold value, every task which needs to be executed can be quickly assigned on the suitable nodes. In this method, it can not only improve the task loading on each node but also choose the most suitable node by the task characteristic in order to provide the Quality Assurance (QA) on the three tiers of P2P network topology of the load balance and the performance efficacy.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic simulation and intelligent agents 交通模拟和智能代理
M. Radecký, P. Gajdoš
{"title":"Traffic simulation and intelligent agents","authors":"M. Radecký, P. Gajdoš","doi":"10.1109/ICITST.2009.5402576","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402576","url":null,"abstract":"The development process of Multi-Agent Systems has similar features to standard information systems. However, there are special requests that have to be taken into account, e.g. general MAS architecture, internal architecture of particular agents, their autonomy and communication. This paper describes a new development tool (AgentStudio) that covers main phases of agent development and simulation. Our approaches support the creation of intelligent agents and reconfiguration of their behaviours.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131365911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Object based dynamic separation of duty in RBAC RBAC中基于对象的动态任务分离
Muhammad Asif Habib, Christian Praher
{"title":"Object based dynamic separation of duty in RBAC","authors":"Muhammad Asif Habib, Christian Praher","doi":"10.1109/ICITST.2009.5402642","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402642","url":null,"abstract":"Role Based Access Control (RBAC) offers tight security of information and ease of management to implement. RBAC is a proven and open ended technology that is being attracted by most of the organizations for its capability to reduce security administration in terms of cost and complexity. The focus of this paper is one of the important factors in RBAC, i.e. Dynamic Separation of Duty (DSD) which is implemented to avoid internal security threats. We discuss DSD from a different perspective i.e. object based separation of duty. Different problems and observations have been described regarding DSD with respect to formal definitions of DSD. Those observations and problems influenced us to go for updated definition of DSD. So, we propose a newly updated definition of DSD. Different examples have been given regarding object based DSD with different scenarios. We also described benefits of implementing newly proposed definition of DSD.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Open issues in RFID security RFID安全中的开放性问题
Dang Nguyen Duc, Hyunrok Lee, D. M. Konidala, Kwangjo Kim
{"title":"Open issues in RFID security","authors":"Dang Nguyen Duc, Hyunrok Lee, D. M. Konidala, Kwangjo Kim","doi":"10.1109/ICITST.2009.5402510","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402510","url":null,"abstract":"RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In this paper we attempt to summarize current research works in the field of RFID security and discuss some of their open issues. Firstly, we outline the security threats to RFID, then we summarize some of the current counter-measures and finally, we draw attention to the open issues and challenges in RIFD security.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
The composite algebraic structure over capabilities and actions of a system 一个系统的能力和行为的复合代数结构
Petr Pinkas, J. Klecková
{"title":"The composite algebraic structure over capabilities and actions of a system","authors":"Petr Pinkas, J. Klecková","doi":"10.1109/ICITST.2009.5402562","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402562","url":null,"abstract":"In this paper, we propose a different approach to modeling of a system that focuses on the capability of the system to participate in interactions with its environment. Furthermore, we use mathematical object to describe this capability. In addition, we show an equivalency (from an outer point of view) between capabilities and states. Finally, we define a composite algebraic structure and then show that capabilities of the system are a solution of a system of equations in this algebraic structure.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127923168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A computer based strategy design for automobile spare part logistics network optimization 基于计算机的汽车备件物流网络优化策略设计
Gao Yi, Lin Xinda, Wang Dong
{"title":"A computer based strategy design for automobile spare part logistics network optimization","authors":"Gao Yi, Lin Xinda, Wang Dong","doi":"10.1109/ICITST.2009.5402534","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402534","url":null,"abstract":"This paper discusses the problem of the automobile spare part logistics warehouse network strategy, a quite important problem in logistics. On the basis of the integration of quantitative technology and qualitative technology, a mathematic model and algorithm of automobile spare part logistics network optimization are presented. In the quantitative analysis part we propose a novel hybrid approach through crossing over the PSO and GA, called hybrid PSO-GA based algorithm. Among the mixed algorithm, GA is embedded to solve the difficulties of updating the particles in the binary code system; the roulette algorithm is embedded to eliminate worse particles; SA is embed to control convergence of particles. Then in the qualitative part, we propose a selection model along with the AHP methodology that project selection would be easier and more accurate than before. In the end we apply the above approach in an automobile spare part logistics company. Computational simulation is carried out to evaluate the performance of the algorithm and the results show that this approach can indeed find effective solutions for the automobile spare part logistics optimization problem.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131438898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comparison of search engine using “tag title and abstract” with CiteULike — An initial evaluation 使用“标签标题和摘要”的搜索引擎与CiteULike的比较——初步评价
P. Jomsri, S. Sanguansintukul, W. Choochaiwattana
{"title":"A comparison of search engine using “tag title and abstract” with CiteULike — An initial evaluation","authors":"P. Jomsri, S. Sanguansintukul, W. Choochaiwattana","doi":"10.1109/ICITST.2009.5402563","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402563","url":null,"abstract":"At present, the performance and capabilities of web search engine are vital. Most researchers use search engines for research papers related to their topics of interest. This paper demonstrates the initial comparison search results between a search engine using the indexing method of “tag title and abstract” and the native CiteUlike engine. The retrieval performance of these two search engines are evaluated using mean values of Normalized Discount Cumulative Gain (NDCG). The results illustrate that the search engine with indexer using “tag, title, and abstract” provides better search results as compared to CiteUlike, particularly for those documents in the first two rank which would be considered as the most relevant documents. This primary evaluation in the experiments implies that the chosen heuristic indexer may improve the efficiency of web resource searching on social bookmarking websites.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信