{"title":"Scalable relational query results handling in service oriented architectures","authors":"A. Wöhrer, T. Lustig, P. Brezany","doi":"10.1109/ICITST.2009.5402517","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402517","url":null,"abstract":"The focus of Grid computing shifted in recent years towards data-intensive applications. Additionally, it became more standard-based and the adherence to and usage of them has to be further fostered in order to enable and ease exchange and interoperability among the research community. The OGSA-DAI framework for data access and integration together with its default XML output format for relational data, namely Java's WebRowSet, are two important representatives of these developments. The research reported in this paper is being conducted in the context of the EU project ADMIRE. The paper's contribution is twofold and targeted on improving the scalability of query result handling in SoA. First, an XML indexing approach is elaborated to provide an out-of-core Java implementation of the standard Java WebRowSet interface to handle big XML files with low main memory consumption. Second, the concept of fine grained data statistics for data preprocessing tasks calculated on-the-fly data service side is presented.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131613924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on Security Status Matrix (SSM) in Urban Computing","authors":"Hoon Ko, C. Ramos","doi":"10.1109/ICITST.2009.5402573","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402573","url":null,"abstract":"Urban Computing (UrC) which process based on interactive among all objects involves all elements of users/space as computing target. That is, UrC can support better conditions than ubiquitous computing by using user/space information. However, user can't to be safe using without security processing in any computing environment. Although there are many security skills, there are difficult to adapt on dynamic changing of UrC. The most important factors of security are encrypting algorithm/the number of round of encrypt/Key size. And encrypting algorithm / the number of round of encrypting algorithm / Key size has to be changed automatically for mobile devices. To using them, we studied Security Status Matrix (SSM). In this paper is for making SSM structure based on UrC as the first version.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125295894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The elephant in the room: Health information system security and the user-level environment","authors":"J. Fernando","doi":"10.1109/ICITST.2009.5402503","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402503","url":null,"abstract":"The patient care context comprises outdated infrastructure, pervasive computer use, shared clinical workspace, aural privacy shortcomings, interruptive work settings, confusing legislation, poor privacy and security (P&S) eHealth training outcomes and inadequate budgets. Twenty three medical, nursing and allied health clinicians working in Australia (Victoria) participated in qualitative research examining work practices with P&S for patient care. They criticised a slow, inefficient eHealth information system (eHIS) environment permeated by usability errors. EHealth systems expanded workloads and system demands were onerous, increasing the clinicians' scepticism of reliance on information technology. Consequently many clinicians had developed trade-offs to avoid reliance an eHIS. The trade-offs include IT support avoidance and shared passwords to PKI and computer accounts. Handover-sheets populated by transcribed notes were circulated between all clinicians present. The practices ensure paper persistence and escalate P&S threats to data confidentiality, integrity and availability. Study evidence suggests poor eHISs hamper patient care and may represent a larger P&S threat than indicated by studies to date.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131733760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Said Jafari, F. Mtenzi, Ronan Fitzpatrick, B. O'Shea
{"title":"An approach for developing comparative security metrics for healthcare organizations","authors":"Said Jafari, F. Mtenzi, Ronan Fitzpatrick, B. O'Shea","doi":"10.1109/ICITST.2009.5402504","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402504","url":null,"abstract":"Information sharing among different healthcare organizations is critical for efficient and cost effective healthcare service delivery. Isolated information systems need to be interconnected to ensure information exchange. Interconnectivity increases exposure to risk of damage, loss and fraud. Security and privacy of patients' information are concerns of all healthcare organizations. These concerns hinder the willingness to share data across different organizations. An objective assessment of organizational security posture is required in order to build trust among interconnected systems. Security metrics are a collection of several measurements taken at different points in time, compared against baselines and interpreted to reveal an understanding. They provide insight, improve performance and accountability, and can reveal the overall security posture of organization. The current security assessment practices focus either on measuring security programme effectiveness, auditing or assessment of individual information systems components like networks and software. These practices are not sufficient to reveal the overall security posture of organization. Also, their assessment results are not meaningfully comparable among different organizations. In this paper we propose an approach for developing security metrics to be used for assessing security posture of healthcare organizations. The metrics for this approach shall not be tailored to any specific organization to ensure comparable results.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129720907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Untraceability in the applied pi-calculus","authors":"Myrto Arapinis, Tom Chothia, Eike Ritter, M. Ryan","doi":"10.1109/ICITST.2009.5402514","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402514","url":null,"abstract":"The use of RFID tags in personal items, such as passports, may make it possible to track a person's movements. Even RFID protocols that encrypt their identity may leak enough information to let an attacker trace a tag. In this paper we define strong and weak forms of untraceablility, and illustrate these definitions with a simple example. We formally define these concepts in the applied pi-calculus which in some cases makes it possible to automatically check if an RFID tag running a particular protocol is untraceable.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128340483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seamless integration of unidirectional broadcast links into QoS-constrained broadband Wireless Mesh Access Networks","authors":"M. Kretschmer, G. Ghinea","doi":"10.1109/ICITST.2009.5402587","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402587","url":null,"abstract":"Wireless Mesh Networks (WMNs) have matured in recent years. They allow two nodes to communicate via multiple hops when no direct connectivity exists. This allows community networks such as Freifunk [3] to provide affordable Internet access to their communities by sharing a few gateway nodes. Increasing demand for multi-media content poses a challenge for the typical WMN routing protocols such a Optimised Link State Routing (OLSR) which lack Quality of Service (QoS) support. Although, numerous solutions have been proposed to introduce QoS awareness such as [4], those WMNs fail to meet commercial operator requirements in term of reliability and QoS guarantees. In this paper we propose the seamless integration of Broadcast technologies such as Digital Video Broadcast (DVB) to introduce support for high-bandwidth multi-media services.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132824967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy and trust policies within SOA","authors":"D. Allison, H. ElYamany, Miriam A. M. Capretz","doi":"10.1109/ICITST.2009.5402540","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402540","url":null,"abstract":"Privacy for Service-Oriented Architecture (SOA) is required to gain the trust of those who would use the technology. Through the use of an independent privacy service (PS), the privacy policies of a service consumer and provider can be compared to create an agreed upon privacy contract. In this paper we further define a metamodel for privacy policy creation and comparison. A trust element is developed as an additional criterion for a privacy policy. We define the PS and what operations it must perform to accomplish its goals. We believe this PS combined with the presented metamodel provide a strong solution to providing privacy for SOA.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114628084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust trust establishment framework using Dempster-Shafer theory for MANETs","authors":"Mohammad Karami, M. Fathian","doi":"10.1109/ICITST.2009.5402628","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402628","url":null,"abstract":"Recently, trust establishment framework has attracted extensive attention in research community as a general solution to enforce nodes to follow protocol specifications and cooperate with other nodes in a normal way. In this paper, we present a trust establishment framework that is based on first-hand evidences obtained via direct observations at the MAC layer as well as second-hand evidences that are obtained via recommendations from other nodes. To counter with the intrinsic uncertainty associated with the collected evidences from other nodes, dempster's rule for combination is applied. Dempster's rule for combination gives a numerical procedure for fusing together multiple pieces of evidence from unreliable observers. The paper, illustrates the applicability and effectiveness of the proposed framework on the Dynamic Source Routing (DSR) protocol. We present simulation results which demonstrate the robustness and effectiveness of the proposed framework even in the presence of malicious nodes that propagate false trust information.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114667546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new algorithm for controlling the mean queue length in a buffer with time varying arrival rate","authors":"Rasha Fares, M. Woodward","doi":"10.1109/ICITST.2009.5402596","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402596","url":null,"abstract":"Active Queue Management (AQM) algorithms play an important role in fair bandwidth allocation. In order to guarantee Quality of Service (QoS) to diverse Internet services, it is important to employ effective buffer management schemes at Internet routers. Controlling the size of the buffer is determined by the dynamics of TCP's congestion control algorithms. Therefore, effectively constraining the mean queue length to a specified level is a key QoS requirement. The goal is to make sure that the mean queue length is maintained at a specified level when a link is congested. This paper presents a control strategy that operates on a buffer which incorporates a moveable threshold. An algorithm is developed to control the mean queue length by dynamically adjusting the threshold, which, in turn, controls the effective arrival rate, by randomly dropping packets.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User interface in virtual learning environment","authors":"S. Barzegar, M. Shojafar, M. Keyvanpour","doi":"10.1109/ICITST.2009.5402572","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402572","url":null,"abstract":"Designing user interface has special importance in Virtual Learning. Considerable portion of students' time is spent in attempting to learn system, work with present lists in user interface and so forth. Perhaps virtual education system has several computational powers, but it lacks adequate user interface. Then, using system would be difficult and user may encounter many confuses during the work and would be unsuccessful in reaching their goals. These are results of unfamiliarity with fundamental principles and in user interface design and disusing them in generating virtual learning systems. Thus, in any virtual learning system design, it is necessary to consider fundamental principles and rules of the user interface design in such system, and in this manner, in this research an adequate user interface is suggested for e-learning Environment in which has been evaluated with regard to these fundamental principles and rules. Evaluations have been done on this interface show its desirable ability to attract users' satisfaction.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133999837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}