2013 16th International Conference on Network-Based Information Systems最新文献

筛选
英文 中文
Secure Aggregation and Attack Detection for Smart Grid System 智能电网系统的安全聚合与攻击检测
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.41
Inshil Doh, Jiyoung Lim, K. Chae
{"title":"Secure Aggregation and Attack Detection for Smart Grid System","authors":"Inshil Doh, Jiyoung Lim, K. Chae","doi":"10.1109/NBiS.2013.41","DOIUrl":"https://doi.org/10.1109/NBiS.2013.41","url":null,"abstract":"Smart grid is a very efficient and intelligent system for managing and monitoring the electricity usage and it can be applied in many useful areas. It supports energy producers and consumers efficiently by supporting the estimation and provision of the proper amount of electricity in proper time. However, when the information is altered or forged by the attackers, it could cause the system malfunction. In addition to that, some attacks could waste the system resources on purpose and could lead to disastrous results. In this work, we propose a secure data aggregation mechanism providing verification of the aggregated data and detection of the compromised node to prevent the DoS(Denial of Service) attack based on the homomorphic encryption.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121027551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Marking Intrusion of Transaction-Based Applications in Wireless Storage Area Network 无线存储区域网络中基于事务应用的入侵标记
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.91
S. Chatti, Habib Ounelli
{"title":"Marking Intrusion of Transaction-Based Applications in Wireless Storage Area Network","authors":"S. Chatti, Habib Ounelli","doi":"10.1109/NBiS.2013.91","DOIUrl":"https://doi.org/10.1109/NBiS.2013.91","url":null,"abstract":"Due to the increasing amount of data handled by business applications and the need of an easy way to access data by multiple servers, storage area networks (SAN) have been proposed as a solution to be deployed in enterprises networks. Introducing the wireless aspects to the SAN environment enables more flexibility but it introduces at the same time a set of threats and vulnerabilities that may be exploited by the intruder in order to cause damage to network resources. The integration of transaction-based applications in these environment introduces an additional set of threats that may prevent the correct processing in the wireless storage area network (WSAN) environment. In this context, we propose a marking intrusion for WSAN environment.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123215802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of Dynamic Running Mode Switch Mechanism by Presence of OS Protection 基于操作系统保护的动态运行模式切换机制评估
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.56
K. Yokoyama, H. Kumon, H. Taniguchi
{"title":"Evaluation of Dynamic Running Mode Switch Mechanism by Presence of OS Protection","authors":"K. Yokoyama, H. Kumon, H. Taniguchi","doi":"10.1109/NBiS.2013.56","DOIUrl":"https://doi.org/10.1109/NBiS.2013.56","url":null,"abstract":"System call is high-cost operation because it causes switch the running mode of a process. As a solution reduce overhead of system call, we have proposed the Dynamic running Mode Switch Mechanism (DMSM) which can switch the running mode of process dynamically. Because DMSM enables that system call is substituted by simple function call, it dramatically improved of overhead of system call. However, DMSM cannot protect the OS to access an applications program executing by supervisor-mode. In this paper, we propose protection function of OS from an application with a supervisor-mode. We propose two types of protection function, i.e., virtual space switch mechanism and segmentation switch mechanism. We also evaluate the effectiveness of two protection functions compared with original DMSM.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing 一种基于云计算的隐私保护数据聚合方案
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.24
Mebae Ushida, Kouichi Itoh, Yoshinori Katayama, Fumihiko Kozakura, H. Tsuda
{"title":"A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing","authors":"Mebae Ushida, Kouichi Itoh, Yoshinori Katayama, Fumihiko Kozakura, H. Tsuda","doi":"10.1109/NBiS.2013.24","DOIUrl":"https://doi.org/10.1109/NBiS.2013.24","url":null,"abstract":"In recent years, the evolution of the cloud computing increases the demand of the services which provides profitable information analyzed from huge data from heterogeneous information sources. In order to reduce the user's anxiety to store the private and confidential information in the cloud, various Privacy Preserving Data Mining (PPDM) techniques are developed, which enable the cloud to perform data mining from secured data. In this paper, we propose a PPDM technique specialized in data aggregation that satisfies following two requirements: (1)The information stored in the cloud is guaranteed against information leakage, because no profitable information is obtained from the secured data without the users' secret information, which is not stored in the cloud. (2)The cloud provides multi-level granularity of the aggregation results according to the user's authority.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application for Mobile Cloud Learning 移动云学习应用
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.46
Jae Dong Lee, J. Park
{"title":"Application for Mobile Cloud Learning","authors":"Jae Dong Lee, J. Park","doi":"10.1109/NBiS.2013.46","DOIUrl":"https://doi.org/10.1109/NBiS.2013.46","url":null,"abstract":"E-learning applications and processes include Web-based learning, computer-based learning, virtual classrooms and digital collaboration. Recently, in the system development case, cloud computing has applied for learning system. This research aims to make a model for mobile cloud learning system and its application. In the system, it has three layers; system layer, application layer and user layer.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Targeted Advertisement Using Smartphones and Cloud Computing 利用智能手机和云计算进行定向广告
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.22
M. Durresi, Tamara Luarasi, I. Baholli, A. Durresi
{"title":"Targeted Advertisement Using Smartphones and Cloud Computing","authors":"M. Durresi, Tamara Luarasi, I. Baholli, A. Durresi","doi":"10.1109/NBiS.2013.22","DOIUrl":"https://doi.org/10.1109/NBiS.2013.22","url":null,"abstract":"Targeted advertisement is an efficient way of matching clients' buying preferences with potential products from various vendors. We propose an application architecture that uses smart phones and cloud computing to distribute in real time advertisement information to clients by matching their location, preferences and price range with available products. Our tests of the proposed application show its applicability in targeted advertisement.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"108 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
GEESE: A Cognitive USN Platform 鹅:一个认知USN平台
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.145
Junyoung Park, Youngjun Lee, Kyungroul Lee, Hanggon Kim, Dmitry Volokhov, Kangbin Yim
{"title":"GEESE: A Cognitive USN Platform","authors":"Junyoung Park, Youngjun Lee, Kyungroul Lee, Hanggon Kim, Dmitry Volokhov, Kangbin Yim","doi":"10.1109/NBiS.2013.145","DOIUrl":"https://doi.org/10.1109/NBiS.2013.145","url":null,"abstract":"This paper introduces a framework for a ubiquitous sensor network along with its prototype platform, as a testbed for cognitive computing and routing algorithms. As wireless sensor networks have attracted worldwide attention as an important building block of the \"Internet of Things\", the cognitive sensor network is currently becoming a popular research topic as an intelligently-enhanced and power-efficient dynamic network. However, related research is still at the conceptual stage, and a realized test platform is essential. The combination of a framework and platform introduced in this paper is expected to be a useful testbed for cognitive computations and dynamic routing algorithms.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127031789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Clustering Algorithm Using Twitter User Biography 基于Twitter用户传记的聚类算法
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.70
Masaki Kohana, S. Okamoto, Masaya Kaneko
{"title":"A Clustering Algorithm Using Twitter User Biography","authors":"Masaki Kohana, S. Okamoto, Masaya Kaneko","doi":"10.1109/NBiS.2013.70","DOIUrl":"https://doi.org/10.1109/NBiS.2013.70","url":null,"abstract":"Our previous work proposed a clustering algorithm to cluster research documents automatically. It used Web hit counts of AND-search on two words as a document vector. Target documents are clustered with a result of k-means clustering method, in which cosine similarity is used to calculate a distance. This paper uses this algorithm to cluster twitter users. However, the twitter users have different characteristics from the research documents. Therefore, we investigate problems of the using our algorithm for twitter users and propose some ideas to resolve it.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114405481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Experiment on Ultra-resolution Video Transmission with Tiled Display Wall in Wide-Area Network 广域网中基于平铺显示墙的超分辨率视频传输实验
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.49
Yasuo Ebara, S. Noda, Akira Sakuraba, Y. Shibata
{"title":"An Experiment on Ultra-resolution Video Transmission with Tiled Display Wall in Wide-Area Network","authors":"Yasuo Ebara, S. Noda, Akira Sakuraba, Y. Shibata","doi":"10.1109/NBiS.2013.49","DOIUrl":"https://doi.org/10.1109/NBiS.2013.49","url":null,"abstract":"In order to realize high-realistic sensation tele-communication over wide-area network, we consider that non-verbal communication play an important role, and displaying the existence of participant by high-quality video streaming on large-scale screen system in each remote site is effective. However, the display specification of these systems such as commercial projector and wide-area monitor is low-resolution, and displaying of real video streaming with sufficient quality is difficult. Moreover, displaying video streaming with realistic high-resolution is serious, because there is a limit in the display resolution of video image captured by a single camera. We have constructed the tele-communication environment to display ultra resolution video streaming by multi-transmitting each video image which captured by four cameras with tiled display wall which is a technology to display various high-resolution contents by configuring the large-scale display with two or more LCD panels. In this paper, we have conducted an experiment on ultra-resolution video transmission between remote sites via wide-area network by using this tiled display wall environment in order to examine the feasibility of high-realistic sensation tele-communication, and have reported the experimental results.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114949684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Addition Formula on Elliptic Curves Given by Weierstrass Normal Form 用weerstrass范式给出椭圆曲线的一个改进的加法公式
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.88
Masaaki Shirase
{"title":"An Improved Addition Formula on Elliptic Curves Given by Weierstrass Normal Form","authors":"Masaaki Shirase","doi":"10.1109/NBiS.2013.88","DOIUrl":"https://doi.org/10.1109/NBiS.2013.88","url":null,"abstract":"An improved addition formula for an elliptic curve given by Weierstrass form is proposed. First, the coordinate is converted so that P = (0, y<sub>1</sub>) and Q = (x<sub>2</sub>, y<sub>2</sub>), and then the equation of the elliptic curve becomes y<sup>2</sup> = x<sup>3</sup> + ax<sup>2</sup> + bx + c. The proposed formula is thus “x-coordinate of P + Q= (b - 2λ<sub>y1</sub>)/x<sub>2</sub>”, where λ is the slope of the line through P and Q. The proposed formula can be derived by the geometric definition of point addition. Applying the proposed formula reduces the cost of adding point by about 20% on a system using the mixed coordinate of affine + projective = projective. However, it increases the cost of doubling point, and so we require a further improvement in the future.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122676450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信