2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications最新文献

筛选
英文 中文
Trusted Block as a Service: Towards Sensitive Applications on the Cloud 可信块即服务:面向云上的敏感应用
J. Hao, Wentong Cai
{"title":"Trusted Block as a Service: Towards Sensitive Applications on the Cloud","authors":"J. Hao, Wentong Cai","doi":"10.1109/TrustCom.2011.13","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.13","url":null,"abstract":"Cloud computing grows rapidly as today's advanced information technology. However, by allowing outsourcing computation on the Cloud, users risk of disclosing privacy and obtaining forged results. These potential threats block sensitive applications to join the Cloud. In this paper, we characterize sensitive applications on the Cloud (SAND) problem and define two critical security requirements: confidentiality and verifiability. The former refers to the protection of sensitive programs/data from disclosing to other users or even the Cloud administrators. The latter concerns with user's capability to verify whether computing results are faithfully calculated. To address SAND, we propose a new Cloud model, Trusted Block as a Service (TBaaS), to provide a confidential and verifiable environment for each sensitive application. TBaaS limits Cloud provider's access of sensitive applications while granting user the ability to verify whether the computation is faithfully carried out. Moreover, it offers high flexibility and low performance overhead.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115699674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Object-Level Data Model for Keyword Search over Relational Databases 关系型数据库关键字搜索的对象级数据模型
Jun Zhang, Renjun Shao
{"title":"Object-Level Data Model for Keyword Search over Relational Databases","authors":"Jun Zhang, Renjun Shao","doi":"10.1109/TrustCom.2011.185","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.185","url":null,"abstract":"Keyword Search Over Relational Databases(KSORD) has been widely studied in recent years. However, existing KSORD methods are usually based on schema graph or data graph and they are actually tuple-level methods. That is, the retrieved objects are direct tuple-level relational data, and the retrieval results are tuple-connected trees which are difficult to be understood by end-users. There are still much work to do to further improve the effectiveness and efficiency of existing KSORD methods. The essential cause is that an entity is usually divided into some parts stored in different tables due to normalized relational database design. In fact, the relational data model is storage-oriented rather than end-user-oriented. Therefore, a novel method called Object-level Keyword Search Over Relational Databases(OKSORD) is proposed in this paper. In OKSORD method, relational data are modeled as an object-level data graph, in which each node may consist of several tuples to present the complete information of an entity. There are two key issues in OKSORD method, one is object-level data modeling for relational databases, the other is object-level searching and ranking based on object-level data graph. This paper mainly addresses the first issues. The main contributions are as follows. Firstly, the concept of OKSORD is introduced for the first time. Secondly, an algorithm for classifying relation schemas is proposed to partition relations into four categories: primary relations, secondary relations, linked relations and coding relations. Finally, an object-level data model for relational data is defined and the algorithm for generating corresponding object-level data graph is proposed.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121809982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Private-Key Generation Scheme with Self-Certified Identity 具有自我认证身份的分布式私钥生成方案
Yongming Xie, Guojun Wang
{"title":"Distributed Private-Key Generation Scheme with Self-Certified Identity","authors":"Yongming Xie, Guojun Wang","doi":"10.1109/TrustCom.2011.65","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.65","url":null,"abstract":"In an identity-based encryption (IBE) system, a private-key generator (PKG) is assumed to be credible, which takes charge of identity authentication and private-key issuing for users. However, the reliability of IBE may be questioned since this assumption does not always hold. In this paper, we propose a new distributed private-key generation scheme with self-certified identity (SCI-DKG) which does not need any PKG. SCI-DKG takes advantage of distributed private key generation and self certification to remove PKG from IBE. Comparing with the existing IBE schemes, a user and his identity can be independently authenticated through his blind digital ID (BDID) card and identity signature. In the meanwhile, a user can extract private keys from other users' sharing packets containing secret shares, partial public parameters and BDID cards. The proposed scheme significantly extends IBE without involvement of PKGs, and provides a promising solution for applications where PKG is not always available. Theoretical analysis demonstrates that our scheme is secure and effective.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115826393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error Bursts 突发错误下可靠实时系统的概率可调度性保证
Hüseyin Aysan, R. Dobrin, S. Punnekkat, Rolf Johansson
{"title":"Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error Bursts","authors":"Hüseyin Aysan, R. Dobrin, S. Punnekkat, Rolf Johansson","doi":"10.1109/TrustCom.2011.157","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.157","url":null,"abstract":"The fundamental requirement for the design of effective and efficient fault-tolerance mechanisms in dependable real-time systems is a realistic and applicable model of potential faults, their manifestations and consequences. Fault and error models also need to be evolved based on the characteristics of the operational environments or even based on technological advances. In this paper we propose a probabilistic burst error model in lieu of the commonly used simplistic fault assumptions in the context of processor scheduling. We present a novel schedulability analysis that accounts for the worst case interference caused by error bursts on the response times of tasks scheduled under the fixed priority scheduling (FPS) policy. Further, we describe a methodology for the calculation of probabilistic schedulability guarantees as a weighted sum of the conditional probabilities of schedulability under specified error burst characteristics. Finally, we identify potential sources of pessimism in the worst case response time calculations and discuss potential means for circumventing these issues.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127114272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Decreasing SoC Test Power Dissipation and Test Data Volume Based on Pattern Recombination 基于模式重组降低SoC测试功耗和测试数据量
Chunlei Mei, Maoxiang Yi, Zhifei Shen
{"title":"Decreasing SoC Test Power Dissipation and Test Data Volume Based on Pattern Recombination","authors":"Chunlei Mei, Maoxiang Yi, Zhifei Shen","doi":"10.1109/TrustCom.2011.90","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.90","url":null,"abstract":"Ever-growing test data volume and test power dissipation poses significant cost and security challenges in testing core-based system-on-chip (SoC). In this paper, a test pattern recombination technique is proposed to improve test data compression and decrease scan test power dissipation. The proposed technique first analyzes the entropy of a test set, which is used to determine the maximum compression ratio, and then divides the test set into a group of patterns that are used as scan slices for scan test based on multi-scan chains. The probability of the compatibility between the patterns in every vector is calculated, according to which the patterns of each test vector are recombined so that the patterns with high compatible probability are placed closely. Finally, for all the test vectors in a test set, a unified arrangement order for their patterns is determined based on the goal that the test set can be compressed and the scan test power dissipation can be decreased to advantage. The proposed scheme is applied to ISCAS89 test benchmarks and their MinTest test sets are used. The experimental results show that compared to the recently presented scheme, the proposed technique can effectively ensure a high data compression ratio and reduce shift power dissipation during testing.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reform and Practice of Training Engineering Professionals in 2C+E Computer Science 计算机工程专业2C+E专业人才培养的改革与实践
Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li
{"title":"Reform and Practice of Training Engineering Professionals in 2C+E Computer Science","authors":"Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li","doi":"10.1109/TrustCom.2011.178","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.178","url":null,"abstract":"In order to meet the current demand for IT professionals, this paper presents the reform idea of 2C+E (Core professional knowledge, Core professional ability, Engineering environment) training system with the goal of training ideal professionals. The idea needs students to master core professional knowledge, to train core professional ability in the university, and to enhance their capability of engineering practice in the environment of university-enterprise cooperation. We have successfully applied reform measures of training engineering professionals in real situations and demonstrated a training scheme of university-enterprise cooperation. The result of the reform has played a significant role in training engineering professionals of computer major in our university.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127475913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Phase-Wise Clustering of Time Series Gene Expression Data 时间序列基因表达数据的分相聚类
Poonam Goyal, Navneet Goyal, R. Karwa, M. John
{"title":"Phase-Wise Clustering of Time Series Gene Expression Data","authors":"Poonam Goyal, Navneet Goyal, R. Karwa, M. John","doi":"10.1109/TrustCom.2011.231","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.231","url":null,"abstract":"Extensive studies have shown that analyzing micro array time series data is important in bioinformatics research and biomedical applications. An observation in the analysis of gene expression data is that many genes have similarity in their expression patterns and therefore appear to be co-regulated. Previously, the time series gene expression data was analyzed mainly by checking the global similarities between the gene expression profiles and local similarities were overlooked. Local similarities can provide useful insight into gene behavior. In this paper, we propose a clustering algorithm for analyzing the time series gene expression data to identify the gene clusters based on the phase-wise local similarities in the cell cycle. Our approach exploits the fact that the genes which are involved in one phase of a cell cycle would have a characteristic profile for time points belonging to that phase and may not be involved in other phases. Moreover, a gene that is clustered with a set of genes in one phase might be involved with a different set of genes in other phases. In the proposed approach, we first clustered the genes at every time point of a phase and group genes with similar expression profiles, i.e., we group those genes together which remain in the same cluster at every time point within a phase. The functions of genes were obtained from Gene Ontology. In this paper, the results are presented for different phases of a cell cycle. Candidate genes are identified for these phases and their groups are analyzed. We found that the group of candidate genes had few genes which are known to be involved. Furthermore, some genes are found to be involved in more than one phase with different set of genes. Results presented show that local similarities can provide useful insight into gene behavior. Results are compared with an existing algorithm, STEM. We have used a saccharomyces cerevisiae cell cycle micro array database which is part of the Stanford Micro array Database (SMD).","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Decision Making Ontology Building Process for Analytical Requirements Elicitation 面向分析需求的决策本体构建过程
Fahmi Bargui, H. Ben-Abdallah, J. Feki
{"title":"A Decision Making Ontology Building Process for Analytical Requirements Elicitation","authors":"Fahmi Bargui, H. Ben-Abdallah, J. Feki","doi":"10.1109/TrustCom.2011.212","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.212","url":null,"abstract":"Goal-oriented modeling is a promising approach to elicit the analytical requirements of decision makers. However, the lack of a technique that formalizes the decision making knowledge necessary for goal elicitation hinders the automation of this type of approaches. In this paper, we propose a process for building a decision making ontology that represents the domain knowledge. The formal aspect of the ontology makes the domain knowledge machine readable, which facilitates the decomposition of goals and automates their elicitation. The usefulness of the ontology in analytical requirements elicitation is assessed through an experimental evaluation.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115537157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cross-Platform Application Sharing Mechanism 跨平台应用程序共享机制
Raja Naeem Akram, K. Markantonakis, K. Mayes
{"title":"Cross-Platform Application Sharing Mechanism","authors":"Raja Naeem Akram, K. Markantonakis, K. Mayes","doi":"10.1109/TrustCom.2011.77","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.77","url":null,"abstract":"The application sharing mechanism in multi-application smart cards facilitates corroborative schemes between applications in a secure and reliable manner. Traditional application sharing can only be realised if both applications are installed on the same device. In this paper, we extend the smart card firewall to include the application sharing mechanism between applications installed on different smart cards. We propose Platform and Application Binding Protocols that enables two smart-cards / applications to authenticate and ascertain the trustworthiness before sharing resources. Furthermore, we provide an informal analysis of the protocols along with comparison with existing protocols. Subsequently, mechanical formal analysis based on the CasperFDR, and the implementation experience is presented.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Model for a Testbed for Evaluating Reputation Systems 评价信誉系统的试验台模型
P. Chandrasekaran, B. Esfandiari
{"title":"A Model for a Testbed for Evaluating Reputation Systems","authors":"P. Chandrasekaran, B. Esfandiari","doi":"10.1109/TrustCom.2011.40","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.40","url":null,"abstract":"The lack of an universal model in reputation systems makes it challenging to evaluate and compare them against attacks. While there are test beds that provide application domain specific metrics to evaluate reputation systems, in this paper we propose a model for a test bed that is application agnostic. It is a workflow of graph transformations that is generic enough to accommodate a number of reputation systems in existing literature. In doing so, we note that these reputation systems work at different stages in the workflow and as a result, a byproduct of this model is a new classification method. We also describe various attacks using our model.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信