2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing最新文献

筛选
英文 中文
Feature Analysis of Important Nodes in Microblog 微博中重要节点的特征分析
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-01 DOI: 10.1109/CSCloud.2015.65
Yang Yang, Hui Xu, Yanan Liu, Zhongwei Li, Weishan Zhang, Xin Liu
{"title":"Feature Analysis of Important Nodes in Microblog","authors":"Yang Yang, Hui Xu, Yanan Liu, Zhongwei Li, Weishan Zhang, Xin Liu","doi":"10.1109/CSCloud.2015.65","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.65","url":null,"abstract":"Microblog plays an important role in the dissemination of information now, especially on some sensitive topics. We established the propagation model of the microblog was constructed in this paper. The weak ties are used in the microblog network to obtain independent communities. We analyzed degree centrality, betweenness centrality and closeness centrality of microblog network. Various messages disseminate from different nodes with various feature which can be preset. The characteristics of some nodes in the information dissemination process become clearer according to the comparison among results after message dissemination. We analyzed the impacts of some nodes with information entropy during the information dissemination, which is so important to guide public opinion and maintain social stability.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133640221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open Source Cloud Management Platforms: A Review 开源云管理平台:综述
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-01 DOI: 10.1109/CSCloud.2015.84
Salam Ismaeel, A. Miri, Dharmendra Chourishi, S. Dibaj
{"title":"Open Source Cloud Management Platforms: A Review","authors":"Salam Ismaeel, A. Miri, Dharmendra Chourishi, S. Dibaj","doi":"10.1109/CSCloud.2015.84","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.84","url":null,"abstract":"In the cloud computing paradigm, Infrastructure-as-a-Service (IaaS) providers can provision virtualized hardware and resources to users, removing the need for users to own and operate these resources, which can lead to lower costs and improved performance. This paper gives a general description of most commonly used open source IaaS service platforms. It includes descriptions and comparisons of OpenNebula, Eucalyptus, Nimbus, OpenStack and CloudStack platforms, and it should be accessible to a wide audience.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114869354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology 基于线路拓扑可验证加密签名方案的三方乐观认证电子邮件协议
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-02-24 DOI: 10.1109/CSCloud.2015.64
Yoshiaki Shiraishi, M. Mohri, H. Miyazaki, M. Morii
{"title":"A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme for Line Topology","authors":"Yoshiaki Shiraishi, M. Mohri, H. Miyazaki, M. Morii","doi":"10.1109/CSCloud.2015.64","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.64","url":null,"abstract":"While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is required depending on a type of applications. Asokan et al. have proposed a multi-party fair exchange protocol for mesh topology. This scheme can be adapted to all kinds of topologies but requires much communication costs, which is 4n(n-1) passes in the all n-participators honest cases and 8n2-n-10 passes in the worst case. In previous works, more efficient and multi-functional schemes specialized for a kind of topologies have been proposed but most of these are for ring topology and star topology. Zhou et al. have proposed an efficient multi-party contract signing protocol for line topology. It is shown the two protocols such that a simple protocol which is completed with 4(n-1) passes in the all honest cases and 5n-3 passes in the worst case and an optimized protocol which is completed with 3(n-1) passes in the all honest cases and 4n-2 passes in the worst. This result means that a fair exchange protocol for line topology is efficient in a number of communications nevertheless a certified email protocol specialized for line topology has not been proposed. That is, a certified email protocol run on line topology is only a protocol for mesh proposed by Asokan et al. adapted to line topology, therefore there is large room for reducing a number of communications by specializing for a certified email protocol. In this paper, we propose a three-party certified email protocol for line topology towards a design of n-party protocol. The proposed protocol has such basic properties of certified email as fairness, non-repudiation, trusted third party invisibility and timeliness, as same as the previous works. Our scheme is completed with eight passes in the case of all honest and twelve passes in the worst. The communication cost is less than the Asokan et al.'s scheme with 24 (n=3) passes even if the all n-participators are honest.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信