{"title":"Context Based Access Control in Pervasive Environments","authors":"Alexandru Petculescu","doi":"10.1109/iNCoS.2012.57","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.57","url":null,"abstract":"As current trends show, the Semantic Web is the future interaction environment used in data exchange and integration among homogenous applications. This trend raises new challenges in security models used for access control, and the only acceptable model is to take into account the semantic relations of the interacting entities. In this article we present the access control module used by the Mobile services framework presented in our previous paper: \"Web services applied to mobile environments\". Finally we present results obtained in the implementation of this module and our conclusions.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative Transmission with Broadcasting and Communication","authors":"Dongdong Wei, Yun Rui, Yinhui Luo, Mingqi Li, Fang Wang, Yingguan Wang","doi":"10.1504/IJES.2013.057086","DOIUrl":"https://doi.org/10.1504/IJES.2013.057086","url":null,"abstract":"In this paper, we propose a novel cooperative transmission strategy with broadcasting and cellular communication in a hybrid network system. With the help of cellular base station (CBS), two cooperative schemes are analyzed to improve broadcast performance. We define two thresholds in this paper. For users whose channel quality information (CQI) is less than the low threshold, e.g., the users near the edge of the broadcast cell, we deploy cooperative diversity transmission. Meanwhile, cooperative multiplexing transmission is exploited for users whose CQI is greater than the high threshold, such as those near the broadcasting base station (BBS). Our simulation results validate the effectiveness of our proposed cooperative schemes.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124993854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an Ontological Approach to Enrich a Community of Interest in Orthopaedic Specialty","authors":"M. E. Riu, David Bañeres, J. Conesa","doi":"10.1109/iNCoS.2012.81","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.81","url":null,"abstract":"A community of interest is helpful to professionals to assemble around a common interest and exchange information and experiences. However, the most used communities are too general for some specific areas and they are unable to store and classify relevant information for the community users. In this paper, we propose an approach that can be integrated with existent communities of practice. Moreover, it allows to specify and share the information relevant to the community of practice of orthopaedic based on a wiki. Instead of using a generic wiki where the knowledge is stored in textual format, a semantic wiki is used. This semantic tool, combined with an ontology description of the domain, stores the information in a computer readable format that could provide in the future additional advanced services to the community professionals.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asta Zelenkauskaite, N. Bessis, Stelios Sotiriadis, E. Asimakopoulou
{"title":"Interconnectedness of Complex Systems of Internet of Things through Social Network Analysis for Disaster Management","authors":"Asta Zelenkauskaite, N. Bessis, Stelios Sotiriadis, E. Asimakopoulou","doi":"10.1109/iNCoS.2012.25","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.25","url":null,"abstract":"This visionary paper presents the Internet of Things paradigm in terms of interdependent dynamic dimensions of objects and their properties. Given that in its current state Internet of Things (IoT) has been viewed as a paradigm based on hierarchical distribution of objects, evaluation of the dynamic nature of the hierarchical structures faces challenges in its evaluation and analysis. Within this in mind, our focus is on the area of complex social networks and the dynamic social network construction within the context of IoT. This is by highlighting and addressing the tagging issues of the objects to the real-world domain such as in disaster management, these are in relation to their hierarchies and interrelation within the context of social network analysis. Specifically, we suggest to investigate and deepen the understanding of the IoT paradigm through the application of social network analysis as a method for interlinking objects -- and thus, propose ways in which IoT could be subsequently interlinked and analyzed through social network analysis approach - which provides possibilities for linking of the objects, while extends it into real-world domain. With this in mind, we present few applications and key characteristics of disaster management and the social networking analysis approach, as well as, foreseen benefits of its application in the IoT domain.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125370661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Advising System for Supporting Users of Collaborative Activities in LMSs","authors":"T. Chronopoulos, I. Hatzilygeroudis","doi":"10.1109/iNCoS.2012.73","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.73","url":null,"abstract":"Learning management systems (LMSs) provide their users with the appropriate environments and tools to author, monitor and engage in collaborative learning activities. The unstructured collaboration spaces and the domain-independent interfaces of those platforms, pose restrictions to the analysis and the evaluation of the collaboration learning process. In this work is presented the design of an advising system, which aims to guide the users of the collaborative activities in a lesson in a LMS, by issuing recommendations and advices on the collaborative learning process. The system uses a fuzzy model to evaluate the learning behaviors of the learners and groups in the collaborative activities across several dimensions. An intelligent agent issues advices and recommendations to the learners and groups of the lesson based on their learning behaviors. The system aims to facilitate management of the collaborative activities in a LMS, by advising the instructors on the design of the collaborative learning experiences and also the learners on self-regulating their learning behaviors. The intelligent system has been partially developed using the Java Agent Development Framework (JADE) for the collaborative activities of Learning Activity Management System (LAMS).","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126889402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm","authors":"Ying Cai, Xiaofei Wang, Yuqing Zhang","doi":"10.1109/iNCoS.2012.12","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.12","url":null,"abstract":"The lack of available and practical analysis about some regular knowledge of mobility models has limit their applications to mobile ad hoc networks. As the mobility models have the great significance effects on the network performance, and meanwhile, existing in-depth researches are mostly based on the i.i.d. mobility model which is a way of globe move, the desire for the effective and reasonable applications of the two-hop relay algorithms to other more realistic mobility models contributes to this paper. We focus on a time-slotted finite network system in order to simplify the complex probabilistic description process of the non-i.i.d. mobility models and we develop some general probability analysis under various mobility solutions. We further put forward some conditions that can make the behaviors of the special mobility models approximately equivalent to that of the i.i.d mobility model. Related simulation studies are also conducted to demonstrate that the different mobility models might have similar influences on the capacity and delay of a mobile ad hoc network.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127378480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing","authors":"Xu Ma, Jin Li, Fangguo Zhang","doi":"10.1109/iNCoS.2012.31","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.31","url":null,"abstract":"Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for security when users want to securely outsource the computation of cryptographic operations to the untrusted cloud servers. As we know, modular exponentiation is one of basic operations among most of current cryptosystems. In this paper, we present two generic secure outsourcing schemes enabling users to securely outsource the computations of exponentiations to cloud servers. The first one is a secure outsourcing scheme for fixed base-variable exponent exponentiation, while the second is for fixed exponent-variable base exponentiation. With our techniques, a batch of exponentiations (eg. t exponentiations) can be efficiently computed by the user with only (n+t) multiplications, where n is the number of bits of the exponent. Furthermore, there is not any pre-computation on the user side. The schemes are proved to be secure under the Hidden Subset Sum Problem.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115269689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game-Theoretic Resource Allocation of the Cognitive Base Station in Two-Tie Co-existing Femtocell Networks","authors":"Jing Song, J. Ge, Jing Li, L. Cong","doi":"10.1109/iNCoS.2012.49","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.49","url":null,"abstract":"Femtocells will be widely employed in the next generation wireless networks since they improve indoor capacity and coverage with low cost and low power characteristics. However since macro cells may have to share the same spectrum with femtocells, resource allocation schemes have been a key challenge to manage interference. In this paper, we propose a novel resource allocation scheme based on cognitive technologies and cooperative game theory. The competition among the Femtocell Access Points (FAPs) for spectrum resource and power resource is formulated as a game-theoretic problem. We solve the problem by integrating Dynamic Sub carrier Allocation (DSA) algorithm and Adaptive Power Allocation (APA) algorithm implemented by the cognitive macro cell Base Station, so that the interference is reduced and the transmitting rate is increased. Simulation results show that compared with the max-rate algorithm and max-min fairness algorithm, the scheme we proposed achieves a better trade-off between the transmitting rate and the fairness.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126690538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management of Software Driven Networks - Research Challenges","authors":"A. Galis, S. Clayman","doi":"10.1109/iNCoS.2012.122","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.122","url":null,"abstract":"In this position paper we present a new networking framework -- SdNET - that integrates software driven features with the management features of modern autonomic network management, and many service features from the world of Services. This framework is under development and validation.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme","authors":"Jindan Zhang, Xu An Wang","doi":"10.1109/iNCoS.2012.52","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.52","url":null,"abstract":"In proxy re-encryption (PRE), a semi-trusted proxy can convert a cipher text originally intended for Alice into one which can be decrypted by Bob, while the proxy can not know the underlying plaintext. In multi-use PRE schemes, the cipher text can be transformed from Alice to Bob and to Charlie and so on. Due to its cipher text transformation property, it is difficult to achieve chosen cipher text security for PRE, especially for multi-use PRE. IBE is a new kind of public-key encryption where the recipient's public key is an arbitrary string that represents the recipient's identity. Identity based proxy re-encryption (IBPRE) is a primitive combing the feature of IBE and PRE. Recently Wang et al. proposed a multi-use unidirectional CCA-secure identity based proxy re-encryption (IBPRE) scheme. Unfortunately, we show their proposal is not CCA-secure in the corresponding security models by giving concrete attacks.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}