S. K. Jalal, S. C. Biswas, Parthasarathi Mukhopadhyay
{"title":"Webometric analysis of Central Universities in India: A study","authors":"S. K. Jalal, S. C. Biswas, Parthasarathi Mukhopadhyay","doi":"10.1109/ICITST.2009.5402605","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402605","url":null,"abstract":"Web presence of Indian Universities has been reflected in general and Central Universities in particular. Webometric data have been collected through Yahoo! and Google search engines using special query syntax. An attempt has been made to rank Central Universities in India using appropriate webometric indicators. Results reveled that University of Delhi becomes top rank (with score 4.28 and Sikkim University occupied the last (with score 1.64) among Central Universities in India.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115199478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Macedo Firmino, G. B. Brandao, A. Guerreiro, R. Valentim
{"title":"Neural cryptography applied to key management protocol with mutual authentication in RFID systems","authors":"Macedo Firmino, G. B. Brandao, A. Guerreiro, R. Valentim","doi":"10.1109/ICITST.2009.5402512","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402512","url":null,"abstract":"RFID (radio frequency identification) is an emerging technology, for automatic identification and tracking, to provide increased efficiency and decrease operating costs in industry and supply chain. However, existing international standards not include security specifications, which resulted in appearance of security threats. Many efforts have been done in this area. However, the key management protocols proposed are unsafe or impractical for most RFID systems. This paper presents a novel approach of a key management protocol with mutual authentication for RFID systems. This protocol is an extension of RFID systems for the protocol proposed by Kinzel and Kanter , adding to the original protocol: a mutual authentication and the definition of frames. Through simulations it was possible to observe that the security level of the proposed protocol is a function only of the computational resources of the entities in the RFID system.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125033139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Willems, W. Dawoud, Thomas Klingbeil, C. Meinel
{"title":"Security in Tele-Lab — Protecting an online virtual lab for security training","authors":"Christian Willems, W. Dawoud, Thomas Klingbeil, C. Meinel","doi":"10.1109/ICITST.2009.5402506","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402506","url":null,"abstract":"The rapid burst of Internet usage and the corresponding growth of security risks and online attacks for the everyday user or the enterprise employee have emerged the terms Awareness Creation and Information Security Culture. Nevertheless, security education widely has remained an academic issue. Teaching system or network security on the basis of practical experience inherits a great challenge for the teaching environment, which is traditionally solved using a computer laboratory at a university campus. The Tele-Lab project offers a system for hands-on IT security training within a remote virtual lab environment — over the web, accessible by everyone. Such a system is inherently exposed to various security threats, since it has to provide full access to virtual machines running attack tools for potentially malicious users. The paper at hand introduces usage, management and operation of Tele-Lab as well as its architecture. Furthermore, this work focuses on possible attacks, the challenges when securing such a system, and shows how to set up an infrastructure that ensures the main security objectives identified as authentication, authorisation and availability.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123941767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology","authors":"Yi-Tung F. Chan, C. Shoniregun, G. Akmayeva","doi":"10.1109/ICITST.2009.5402621","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402621","url":null,"abstract":"Nowadays, due to the advantage of technology and the Internet popularization, Peer-to-Peer (P2P) computing technology has been gradually becoming the mainstream on the distributed system applications. However, the main purpose of P2P computing technology is to process the large-scale task through the distributed system computer cooperatively. Therefore, how to efficiently assign tasks to every nodes and how to make tasks to achieve the load balance on each node of the system are a worthy discussion issue. In this research paper, we proposed the Load Balance Min-Min (LBMM) schedule algorithm to process the task assignment in the three tiers of P2P network topology architecture. Through setting up the threshold value, every task which needs to be executed can be quickly assigned on the suitable nodes. In this method, it can not only improve the task loading on each node but also choose the most suitable node by the task characteristic in order to provide the Quality Assurance (QA) on the three tiers of P2P network topology of the load balance and the performance efficacy.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129342334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic simulation and intelligent agents","authors":"M. Radecký, P. Gajdoš","doi":"10.1109/ICITST.2009.5402576","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402576","url":null,"abstract":"The development process of Multi-Agent Systems has similar features to standard information systems. However, there are special requests that have to be taken into account, e.g. general MAS architecture, internal architecture of particular agents, their autonomy and communication. This paper describes a new development tool (AgentStudio) that covers main phases of agent development and simulation. Our approaches support the creation of intelligent agents and reconfiguration of their behaviours.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131365911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object based dynamic separation of duty in RBAC","authors":"Muhammad Asif Habib, Christian Praher","doi":"10.1109/ICITST.2009.5402642","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402642","url":null,"abstract":"Role Based Access Control (RBAC) offers tight security of information and ease of management to implement. RBAC is a proven and open ended technology that is being attracted by most of the organizations for its capability to reduce security administration in terms of cost and complexity. The focus of this paper is one of the important factors in RBAC, i.e. Dynamic Separation of Duty (DSD) which is implemented to avoid internal security threats. We discuss DSD from a different perspective i.e. object based separation of duty. Different problems and observations have been described regarding DSD with respect to formal definitions of DSD. Those observations and problems influenced us to go for updated definition of DSD. So, we propose a newly updated definition of DSD. Different examples have been given regarding object based DSD with different scenarios. We also described benefits of implementing newly proposed definition of DSD.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dang Nguyen Duc, Hyunrok Lee, D. M. Konidala, Kwangjo Kim
{"title":"Open issues in RFID security","authors":"Dang Nguyen Duc, Hyunrok Lee, D. M. Konidala, Kwangjo Kim","doi":"10.1109/ICITST.2009.5402510","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402510","url":null,"abstract":"RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In this paper we attempt to summarize current research works in the field of RFID security and discuss some of their open issues. Firstly, we outline the security threats to RFID, then we summarize some of the current counter-measures and finally, we draw attention to the open issues and challenges in RIFD security.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The composite algebraic structure over capabilities and actions of a system","authors":"Petr Pinkas, J. Klecková","doi":"10.1109/ICITST.2009.5402562","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402562","url":null,"abstract":"In this paper, we propose a different approach to modeling of a system that focuses on the capability of the system to participate in interactions with its environment. Furthermore, we use mathematical object to describe this capability. In addition, we show an equivalency (from an outer point of view) between capabilities and states. Finally, we define a composite algebraic structure and then show that capabilities of the system are a solution of a system of equations in this algebraic structure.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127923168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A computer based strategy design for automobile spare part logistics network optimization","authors":"Gao Yi, Lin Xinda, Wang Dong","doi":"10.1109/ICITST.2009.5402534","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402534","url":null,"abstract":"This paper discusses the problem of the automobile spare part logistics warehouse network strategy, a quite important problem in logistics. On the basis of the integration of quantitative technology and qualitative technology, a mathematic model and algorithm of automobile spare part logistics network optimization are presented. In the quantitative analysis part we propose a novel hybrid approach through crossing over the PSO and GA, called hybrid PSO-GA based algorithm. Among the mixed algorithm, GA is embedded to solve the difficulties of updating the particles in the binary code system; the roulette algorithm is embedded to eliminate worse particles; SA is embed to control convergence of particles. Then in the qualitative part, we propose a selection model along with the AHP methodology that project selection would be easier and more accurate than before. In the end we apply the above approach in an automobile spare part logistics company. Computational simulation is carried out to evaluate the performance of the algorithm and the results show that this approach can indeed find effective solutions for the automobile spare part logistics optimization problem.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131438898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison of search engine using “tag title and abstract” with CiteULike — An initial evaluation","authors":"P. Jomsri, S. Sanguansintukul, W. Choochaiwattana","doi":"10.1109/ICITST.2009.5402563","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402563","url":null,"abstract":"At present, the performance and capabilities of web search engine are vital. Most researchers use search engines for research papers related to their topics of interest. This paper demonstrates the initial comparison search results between a search engine using the indexing method of “tag title and abstract” and the native CiteUlike engine. The retrieval performance of these two search engines are evaluated using mean values of Normalized Discount Cumulative Gain (NDCG). The results illustrate that the search engine with indexer using “tag, title, and abstract” provides better search results as compared to CiteUlike, particularly for those documents in the first two rank which would be considered as the most relevant documents. This primary evaluation in the experiments implies that the chosen heuristic indexer may improve the efficiency of web resource searching on social bookmarking websites.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}