2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

筛选
英文 中文
Multi-resolution Next Location Prediction for Distributed Virtual Environments 分布式虚拟环境下一个位置的多分辨率预测
J. Pribyl, P. Zemčík
{"title":"Multi-resolution Next Location Prediction for Distributed Virtual Environments","authors":"J. Pribyl, P. Zemčík","doi":"10.1109/EUC.2010.43","DOIUrl":"https://doi.org/10.1109/EUC.2010.43","url":null,"abstract":"Computing performance of today's graphics hardware grows fast as well as amount of rendered data. Modern graphics engines enable a possibility to use an arbitrary number of textures with arbitrary resolutions. On the other hand, high quality distributed 3D virtual environments can't exploit the computation power due to the limited network bandwidth. The problem mainly appears just in case the designers of such environments use high resolution textures. To overcome this streaming bottleneck an efficient prefetching scheme should be proposed. Instead of blind greedy scheduling policy we propose a scheme which exploits movement history of users to realize a look-ahead policy which enables the clients to retrieve potentially rendered data in advance. The prediction itself is established by Markov chains due to their ability to fast learning in conjunction with 2-state predictor which increases ability of the scheduling system to adapt to new habits of particular users.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124293952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security of the TCG Privacy-CA Solution TCG隐私ca解决方案的安全性
Liqun Chen, B. Warinschi
{"title":"Security of the TCG Privacy-CA Solution","authors":"Liqun Chen, B. Warinschi","doi":"10.1109/EUC.2010.98","DOIUrl":"https://doi.org/10.1109/EUC.2010.98","url":null,"abstract":"The privacy-CA solution (PCAS) is a protocol designed by the Trusted Computing Group (TCG) as an alternative to the Direct Anonymous Attestation scheme for anonymous authentication of Trusted Platform Module (TPM). The protocol has been specified in TPM Specification Version 1.2. In this paper we offer a rigorous security analysis of the protocol. We first design an appropriate security model that captures the level of security offered by PCAS. The model is justified via the expected uses of the protocol in real applications. We then prove, assuming standard security notions for the underlying primitives that the protocol indeed meets the security notion we design. Our analysis sheds some light on the design of the protocol. Finally, we propose a strengthened protocol that meets a stronger notion of security where the adversary is allowed to adaptively corrupt TPMs.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks S-Kcore:口袋交换网络中社会感知的Kcore分解算法
Ming Li, Longxiang Gao, Wanlei Zhou
{"title":"S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks","authors":"Ming Li, Longxiang Gao, Wanlei Zhou","doi":"10.1109/EUC.2010.116","DOIUrl":"https://doi.org/10.1109/EUC.2010.116","url":null,"abstract":"The key nodes in network play the critical role in system recovery and survival. Many traditional key nodes selection algorithms utilize the characters of the physical topology to find the key nodes. But they can hardly succeed in the mobile ad hoc network due to the mobility nature of the network. In this paper we propose a social-aware Kcore selection algorithm to work in the Pocket Switched Network. The social view of the network suggests the social position of the mobile nodes can help to find the key nodes in the Pocket Switched Network. The S-Kcore selection algorithm is designed to exploit the nodes' social features to improve the performance in data communication. Experiments use the NS2 shows S-Kcore selection algorithm workable in the Pocket Switched Network. Furthermore, with the social behavior information, those key nodes are more suitable to represent and improve the whole network's performance.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115955111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Deficit and Dynamics of Trust 信任的缺失与动态
Abhaya C. Nayak
{"title":"The Deficit and Dynamics of Trust","authors":"Abhaya C. Nayak","doi":"10.1109/EUC.2010.85","DOIUrl":"https://doi.org/10.1109/EUC.2010.85","url":null,"abstract":"Trust and Belief are two very closely connected notions. Hence one would expect that any mechanism that guides the management of one can efficaciously guide the other. In fact, devices such as Dempster-Shafer’s theory of evidence have been successfully used in the management of both. This paper looks at a different mechanism devised for inductive inferencing, namely Spohn’s Ordinal Conditional Functions, and shows that, when appropriately adapted and interpreted, it can fruitfully model the dynamics of trust via trust deficit.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Empirical Evaluation of Content-based Pub/Sub Systems over Cloud Infrastructure 云基础设施上基于内容的Pub/Sub系统的实证评价
Biao Zhang, Beihong Jin, Haibiao Chen, Z. Qin
{"title":"Empirical Evaluation of Content-based Pub/Sub Systems over Cloud Infrastructure","authors":"Biao Zhang, Beihong Jin, Haibiao Chen, Z. Qin","doi":"10.1109/EUC.2010.22","DOIUrl":"https://doi.org/10.1109/EUC.2010.22","url":null,"abstract":"Pub/Sub systems permit users to submit subscriptions and notify interested users of the events detected in a distributed way. Moving a Pub/Sub system to a cloud infrastructure is for high performance and scalability. This paper describes how to migrate two Pub/Sub systems i.e. PADRES and Once Pub Sub to Xen Cloud Platform, especially proposes black-box method, grey-box method and white-box method so as to take full advantage of cloud mechanisms. This paper then conducts a series of experiments on the Pub/Sub systems in the cloud to evaluate benefits and costs. The experimental results indicate that the black-box method does not always take effect although it can be implemented easily, the grey-box method is more appropriate to a Pub/Sub system if its workload features and brokers¡¯ roles are known in advance. Further, the experimental results show the white-box method, combined the load balance mechanism both in the cloud and in a Pub/Sub system, can achieve satisfying performance and scalability especially facing the workload with unidentified distribution.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124859873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Isolating System Faults on Vehicular Network Gateways Using Virtualization 利用虚拟化隔离车载网络网关系统故障
S. Chung, Hyun-Wook Jin
{"title":"Isolating System Faults on Vehicular Network Gateways Using Virtualization","authors":"S. Chung, Hyun-Wook Jin","doi":"10.1109/EUC.2010.134","DOIUrl":"https://doi.org/10.1109/EUC.2010.134","url":null,"abstract":"The traditional vehicular network gateway takes charge of communication between different internal networks and helping the electric control units in vehicle to collaborate each other. Due to the increasing requirements on innovative applications such as infotainment systems and cyber-physical systems, there are significant efforts to have an external wireless network connection on the vehicles. Accordingly, the secure architecture of the network gateway that can avoid or isolate the malicious behavior of external nodes is very critical for the next-generation vehicles. In this paper, we design a safe vehicular network gateway by exploiting full virtualization technology. Since the virtualization adds additional overheads, we try to minimize this side effect while considering the security by carefully choosing the communication mechanisms in the virtualized gateway. In our preliminary implementation, we use Virtual Box to run Linux and QNX as guest operating systems, which handles external (Wi-Fi) and internal (CAN) networks, respectively. The performance measurement results show that the virtualization-based gateway adds only 10% overhead compared with non-virtualized gateway while improving the security. We also show that the multi-core processor can leverage performance improvement.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of Property Based Attestation in Trusted Platforms 可信平台中基于属性的认证分析
A. Nagarajan, V. Varadharajan, M. Hitchens
{"title":"Analysis of Property Based Attestation in Trusted Platforms","authors":"A. Nagarajan, V. Varadharajan, M. Hitchens","doi":"10.1109/EUC.2010.136","DOIUrl":"https://doi.org/10.1109/EUC.2010.136","url":null,"abstract":"Binary attestation in trusted computing platforms provide the ability to reason about the state of a system using hash measurements. Property based attestation on the other hand enables more meaningful attestation by abstracting low level binary values to high level security properties or functions of systems. In this paper, we try to understand the kind of security properties that trusted platforms can attest. We propose that security properties can have different levels of granularity and provide a pyramid model that classifies properties at four different levels. We leverage the Common Criteria framework for security requirements to provide examples of such properties. The model is then implemented in the context of authorisation for Web services.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online Personal Connection Presentation System for Communication Assistance 联机个人连接演示系统用于通信协助
Ryota Ayaki, Hideki Shimada, Kenya Sato
{"title":"Online Personal Connection Presentation System for Communication Assistance","authors":"Ryota Ayaki, Hideki Shimada, Kenya Sato","doi":"10.1109/EUC.2010.63","DOIUrl":"https://doi.org/10.1109/EUC.2010.63","url":null,"abstract":"With the present technology and environment, we are able to interact with other people using online communities, while sometimes missing the opportunity to meet people in the real world. Location-based services have a strong correlation with the real world, and have the potential to develop online connections into off-line connections. However, most of these location-based services observe only users' action histories, and have difficulty indentifying each individual, making it difficult to develop such connections. In this paper, we propose \"Light Footprint,\" which is able to manage users' past, present, and future locations simultaneously using the unified method, and visualize the information in the real world using a footprint metaphor to solve the problem mentioned before. We show the effectiveness of our proposal by implementing the prototype with the proposed software module and database, and evaluate it by calculating the response time.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchical Certificateless Signatures 分层无证书签名
Lei Zhang, Qianhong Wu, J. Domingo-Ferrer, Bo Qin
{"title":"Hierarchical Certificateless Signatures","authors":"Lei Zhang, Qianhong Wu, J. Domingo-Ferrer, Bo Qin","doi":"10.1109/EUC.2010.92","DOIUrl":"https://doi.org/10.1109/EUC.2010.92","url":null,"abstract":"Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In this paper, to incorporate the advantages of both types of cryptosystems, we instantiate hierarchical certificate less cryptography by formalizing the notion of hierarchical certificate less signatures. Furthermore, we propose an HCLS scheme which, under the hardness of the computational Diffie-Hellman (CDH) problem, is proven to be existentially unforgeable against adaptive chosen-message attacks in the random oracle model. As to efficiency, our scheme has constant complexity, regardless of the depth of the hierarchy. Hence, the proposal is secure and scalable for practical applications.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SimTrust: A New Method of Trust Network Generation SimTrust:一种新的信任网络生成方法
T. Bhuiyan, Yue Xu, A. Jøsang
{"title":"SimTrust: A New Method of Trust Network Generation","authors":"T. Bhuiyan, Yue Xu, A. Jøsang","doi":"10.1109/EUC.2010.113","DOIUrl":"https://doi.org/10.1109/EUC.2010.113","url":null,"abstract":"Trust can be used for neighbor formation to generate automated recommendations. User assigned explicit rating data can be used for this purpose. However, the explicit rating data is not always available. In this paper we present a new method of generating trust network based on user’s interest similarity. To identify the interest similarity, we use user’s personalized tag information. This trust network can be used to find the neighbors to make automated recommendation. Our experiment result shows that the precision of the proposed method outperforms the traditional collaborative filtering approach.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信