Yang Yang, Hui Xu, Yanan Liu, Zhongwei Li, Weishan Zhang, Xin Liu
{"title":"Feature Analysis of Important Nodes in Microblog","authors":"Yang Yang, Hui Xu, Yanan Liu, Zhongwei Li, Weishan Zhang, Xin Liu","doi":"10.1109/CSCloud.2015.65","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.65","url":null,"abstract":"Microblog plays an important role in the dissemination of information now, especially on some sensitive topics. We established the propagation model of the microblog was constructed in this paper. The weak ties are used in the microblog network to obtain independent communities. We analyzed degree centrality, betweenness centrality and closeness centrality of microblog network. Various messages disseminate from different nodes with various feature which can be preset. The characteristics of some nodes in the information dissemination process become clearer according to the comparison among results after message dissemination. We analyzed the impacts of some nodes with information entropy during the information dissemination, which is so important to guide public opinion and maintain social stability.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133640221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salam Ismaeel, A. Miri, Dharmendra Chourishi, S. Dibaj
{"title":"Open Source Cloud Management Platforms: A Review","authors":"Salam Ismaeel, A. Miri, Dharmendra Chourishi, S. Dibaj","doi":"10.1109/CSCloud.2015.84","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.84","url":null,"abstract":"In the cloud computing paradigm, Infrastructure-as-a-Service (IaaS) providers can provision virtualized hardware and resources to users, removing the need for users to own and operate these resources, which can lead to lower costs and improved performance. This paper gives a general description of most commonly used open source IaaS service platforms. It includes descriptions and comparisons of OpenNebula, Eucalyptus, Nimbus, OpenStack and CloudStack platforms, and it should be accessible to a wide audience.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114869354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoshiaki Shiraishi, M. Mohri, H. Miyazaki, M. Morii
{"title":"A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology","authors":"Yoshiaki Shiraishi, M. Mohri, H. Miyazaki, M. Morii","doi":"10.1109/CSCloud.2015.64","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.64","url":null,"abstract":"While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is required depending on a type of applications. Asokan et al. have proposed a multi-party fair exchange protocol for mesh topology. This scheme can be adapted to all kinds of topologies but requires much communication costs, which is 4n(n-1) passes in the all n-participators honest cases and 8n2-n-10 passes in the worst case. In previous works, more efficient and multi-functional schemes specialized for a kind of topologies have been proposed but most of these are for ring topology and star topology. Zhou et al. have proposed an efficient multi-party contract signing protocol for line topology. It is shown the two protocols such that a simple protocol which is completed with 4(n-1) passes in the all honest cases and 5n-3 passes in the worst case and an optimized protocol which is completed with 3(n-1) passes in the all honest cases and 4n-2 passes in the worst. This result means that a fair exchange protocol for line topology is efficient in a number of communications nevertheless a certified email protocol specialized for line topology has not been proposed. That is, a certified email protocol run on line topology is only a protocol for mesh proposed by Asokan et al. adapted to line topology, therefore there is large room for reducing a number of communications by specializing for a certified email protocol. In this paper, we propose a three-party certified email protocol for line topology towards a design of n-party protocol. The proposed protocol has such basic properties of certified email as fairness, non-repudiation, trusted third party invisibility and timeliness, as same as the previous works. Our scheme is completed with eight passes in the case of all honest and twelve passes in the worst. The communication cost is less than the Asokan et al.'s scheme with 24 (n=3) passes even if the all n-participators are honest.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}