Andreas Finger, Holger Meyer, Tim Rieger, A. Heuer
{"title":"Transactions and service level agreements for online music distribution","authors":"Andreas Finger, Holger Meyer, Tim Rieger, A. Heuer","doi":"10.1109/ICITST.2009.5402524","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402524","url":null,"abstract":"Online music distribution is currently experiencing a boom. While it is too early to proclaim the end of the audio CD format, agreement exists that in the future substantial amounts of music will be purchased online as digital files or audio streams. Furthermore, new applications like audio and video live streaming gain in importance. Regular download or streaming technologies, however, are not adequate for the demands of commercial online music distribution. In the course of this work the current practice in online music distribution is evaluated using a set of criteria called MAGICC criteria. It is found that current music streaming offerings do not fulfill all of these. Therefore, a new transaction concept using fuzzy transactions is introduced to solve this problem. It consists of fuzzy transactions, an architecture design to implement the fuzzy transaction concept, and a set of rules which form a simple commit protocol. Technical feasibility of the proposed concept is shown.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of IEEE 802.11 DCF in comparison with IEEE 802.11e EDCA","authors":"Bilal Rauf, M. Amjad, Kabeer Ahmed","doi":"10.1109/ICITST.2009.5402597","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402597","url":null,"abstract":"IEEE 802.11 Wireless Local Area Network (WLAN) is one of the most widely deployed wireless network technologies in the world today. However, 802.11 MAC algorithm is unable to support modern multimedia applications which require certain level of quality of service (QoS) guarantees in terms of consistent, timely and reliable data transfer. The 802.11e MAC protocol provides extension for adjustment of MAC parameters that were previously fixed in the standard 802.11 CSMA/CA contention mechanism. In this paper we conduct the evaluation study of 802.11e Enhanced Distributed Channel Access (EDCA) mechanism which supports service differentiation by assigning data traffic with different priorities based on their QoS requirements. The evaluation also includes the study of the role of different parameters IEEE 802.11e EDCA utilizes to realize service differentiation as well as the performance comparison of 802.11 and 802.11e along with its capability to resolve downlink/uplink fairness problem.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132946034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intertextual distance for Arabic texts classification","authors":"R. Ayadi, M. Maraoui, M. Zrigui","doi":"10.1109/ICITST.2009.5402564","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402564","url":null,"abstract":"Our researches works are interested on the application of the intertextual distance theory on the Arabic language as a tool for the classification of texts. This theory assumes the classification of texts according to criteria of lexical statistics, and it is based on the lexical connection approach. Our objective is to integrate this theory as a tool of classification of texts in Arabic language. It requires the integration of a metrics for the classification of texts using a database of lemmatized and identified corpus which can be considered as a literature reference for times, kinds, literary themes and authors and this in order to permit the classification of anonymous texts.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133239592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. F. M. Batista, M. Marietto, Gislene Cristina de O. Barbosa, R. S. França, G. Kobayashi
{"title":"Multi-agent systems to build a computational middleware: A chatterbot case study","authors":"A. F. M. Batista, M. Marietto, Gislene Cristina de O. Barbosa, R. S. França, G. Kobayashi","doi":"10.1109/ICITST.2009.5402586","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402586","url":null,"abstract":"In this work we argue that the shift from computer networks to agent networks is an important improvement of the network programming technology. Its due the fact that agents are well suited for modeling, designing and implementing scalable, flexible and secure distributed systems over a computing environment. Based on this agent-paradigm, our proposal is to make a case study of a chatterbot prototype. This chatterbot can be utilized in educational virtual environments to provide an interface to guide the student in the explanation of the FAQs.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach using transformation techniques and decision tree algorithm on images for performing Digital Watermarking","authors":"Samir B. Patel, Tejas B. Mehta, S. N. Pradhan","doi":"10.1109/ICITST.2009.5402565","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402565","url":null,"abstract":"Digital Watermarking is an emerging copyright protection technology. The paper presents a new robust watermarking technique based on combining the power of transform domain technique, the Discrete Cosine Transform (DCT) and the data mining technique such as Decision Tree Induction (ID3). The paper focuses on a technique through which the notion of decision tree can be applied on transformed vectors to build the decision tree. We train the image blocks for deriving the classification tree. The resulting decision tree provides decision making rules to identify good quality image blocks for insertion of watermark. The implementation results have shown that the algorithm has an acceptable robustness against the JPEG compression and addition of noise.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116996906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinxin Fan, Honggang Hu, G. Gong, Eric M. Smith, D. Engels
{"title":"Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers","authors":"Xinxin Fan, Honggang Hu, G. Gong, Eric M. Smith, D. Engels","doi":"10.1109/ICITST.2009.5402515","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402515","url":null,"abstract":"The Radio Frequency IDentification (RFID) technology provides an extensible, flexible and secure measure against product counterfeiting. However, due to the harsh cost and power constraints of RFID tags only dedicated cryptographic engines or low-power consumption microcontrollers can be integrated into tags to implement various security mechanisms. In this contribution, we investigate efficient implementation of an ultra-lightweight cryptographic algorithm Hummingbird[5] on a zero-power 4-bit MARC4 microcontroller from Atmel and compare the performance of Hummingbird to another ultra-lightweight block cipher PRESENT [4] on the same platform. Our experimental results show that after a system initialization phase Hummingbird can achieve about 58% faster throughput than the block cipher PRESENT on a 4-bit ATAM893-D microcontroller running at 16KHz, 500KHz and 2MHz, respectively. In particular, Hummingbird can process one data block with less than 12 ms under a typical low power configuration of 4-bit microcontrollers such as an 1.8V supply voltage and a 500KHz clock frequency.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"45 29","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120811369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Email classification: Solution with back propagation technique","authors":"T. Ayodele, Shikun Zhou, R. Khusainov","doi":"10.1109/ICITST.2009.5402583","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402583","url":null,"abstract":"To acquire knowledge by learning automatically from the data, through a process of inference, model fitting, or learning from example is one of the rare field of email management. And when an artificial system can perform \"intelligent\", tasks similar to those performed by the human brain and such is implemented in email classification, such a system will be is extremely intelligent. Using neural network for email content classification with back propagation is where our technique becomes distinct and effective. This paper proposes a new email classification model using a teaching process of multi-layer neural network to implement back propagation algorithm. Our contributions are: the use of empirical analysis to select an optimum, novel collection of features of a user's email message content that enables the rapid detection of most important words, phrases in emails and a demonstration of the effectiveness of two equal sets of emails (training and testing data).","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128284736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of authentication of anycast communication","authors":"Chenglian Liu","doi":"10.1109/ICITST.2009.5402618","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402618","url":null,"abstract":"In the above paper a conception has been proposed which is a variant of the ElGamal-type digital signature. It considers the problem of authentication in the anycast communication model. This paper emphasises on the error in related work and scheme section of Al-Ibrahim and Anton Cerny. The authors state signature scenario scheme as follows.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"36 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Kirkham, Kleopatra G. Konstanteli, Julian Robert Gallop, C. Lalos, I. Johnson
{"title":"Identity management in a mobile service orientated grid","authors":"T. Kirkham, Kleopatra G. Konstanteli, Julian Robert Gallop, C. Lalos, I. Johnson","doi":"10.1109/ICITST.2009.5402547","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402547","url":null,"abstract":"Composite applications consisting of multiple mobile services require intricate service management and security infrastructures. Grid based approaches to service management can be applied to provide such infrastructures to both support and secure users and services in these composite mobile applications. The Akogrimo project has applied WSRF based Service Oriented toolkits as the core element of a mobile Service Oriented Infrastructure (SOI). Security is described in relation to the domains into which the SOI is split — Network Provider, Service Provider and two types of Virtual Organization. This paper describes how the Akogrimo SOI has been secured by an approach based on the management of identities within it. The results of this have been demonstrated initially in an E-Health scenario that is one of the first examples of a truly mobile Service Orientated Architecture.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114503175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure e-learning using a holistic and immune security framework","authors":"Jeffy Mwakalinga, S. Kowalski, L. Yngström","doi":"10.1109/ICITST.2009.5402508","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402508","url":null,"abstract":"This paper describes how to secure e-learning systems by applying the Holistic and Immune Security Framework. E-learning has great potential for developing communities but security of e-learning systems has not been fully addressed. We have developed a security framework that considers culture of users and environments where information systems operate. The holistic and immune security framework is a function of the deterrence, prevention, detection, response, and recovery system. The security framework makes an E-learning system learn to adapt to environments and to culture of users. We apply the principles of immune system to secure E-learning systems. We describe how to secure the weak links that are created by culture of users in E-leaning systems.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114388738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}