2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
IoT Access Control Issues: A Capability Based Approach 物联网访问控制问题:基于能力的方法
S. Gusmeroli, S. Piccione, D. Rotondi
{"title":"IoT Access Control Issues: A Capability Based Approach","authors":"S. Gusmeroli, S. Piccione, D. Rotondi","doi":"10.1109/IMIS.2012.38","DOIUrl":"https://doi.org/10.1109/IMIS.2012.38","url":null,"abstract":"Resource and information protection plays a relevant role in distributed systems. Most of the currently proposed authorization frameworks do not provide scalable, manageable, effective, and efficient mechanisms to support distributed systems with many interacting services. The advent of IoT will further increase the need for scalable and manageable solutions able to face the potentially unbound number of sensors, actuators and related resources, services and subjects. This is even more relevant if we take into account that IoT environments can envisage not only a greater number of resources to manage, but also a substantial increase of the interaction dynamics. This paper presents a capability based access control system that enterprises, or even individuals, can use to manage their own access control processes to services and information. The proposed mechanism supports rights delegation and a more sophisticated access control customization. The proposed approach is being developed within the European FP7 IoT@Work project to manage access control for some of the project's services deployed in the shop floor.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Locating Routing Instability Based on Path Exploration 基于路径探索的路由不稳定性定位
Hongjun Liu, Xiaofeng Hu, Dan Zhao, Xicheng Lu
{"title":"Locating Routing Instability Based on Path Exploration","authors":"Hongjun Liu, Xiaofeng Hu, Dan Zhao, Xicheng Lu","doi":"10.1109/IMIS.2012.47","DOIUrl":"https://doi.org/10.1109/IMIS.2012.47","url":null,"abstract":"Root cause analysis of BGP updates is the key to debug and troubleshoot BGP routing problems. However, accurately inferring what is the cause of routing instability and where it originate is very hard. In this paper, we present a novel approach to locate the origin of routing instability by analyzing the relationship of the closed loops formed by intersecting the all the paths in path exploration and the length variation of the paths received in a single vantage point. Then we demonstrate our approach using BGP data obtained by simulations and show that the method is quite effective. Once there is path exploration when a routing event triggering BGP updates, this approach can precisely identify whether the event is a link failure and pinpoint the right place where the event exactly happens if so. Otherwise the approach can deduce the candidate set of locations to a small size.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling the Cloud of Things 启用物联网
S. Distefano, Giovanni Merlino, A. Puliafito
{"title":"Enabling the Cloud of Things","authors":"S. Distefano, Giovanni Merlino, A. Puliafito","doi":"10.1109/IMIS.2012.61","DOIUrl":"https://doi.org/10.1109/IMIS.2012.61","url":null,"abstract":"This paper intends to contribute to the design of a pervasive infrastructure where new generation services interact with the surrounding environment, collecting data and applying management strategies. According to such perspective computing, storage and sensing become complementary aspects to be coordinated. In this way innovative and value-added services can be implemented by bridging Clouds with the Internet of Things. Heterogeneous resources can be aggregated and abstracted according to tailored thing-like semantics, thus enabling a Things as a Service paradigm, a way to build a \"Cloud of Things\" (CoT). This paper mainly focuses on the implementation of the underlying infrastructure at the basis of the CoT. An ad-hoc architecture and some preliminary background of this challenging view are provided and discussed, identifying guidelines and future directions.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121741469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Large-Scale Coordinated attacks: Impact on the Cloud Security 大规模协同攻击:对云安全的影响
D. Riquet, G. Grimaud, M. Hauspie
{"title":"Large-Scale Coordinated attacks: Impact on the Cloud Security","authors":"D. Riquet, G. Grimaud, M. Hauspie","doi":"10.1109/IMIS.2012.76","DOIUrl":"https://doi.org/10.1109/IMIS.2012.76","url":null,"abstract":"Cloud Computing has emerged as a model to process large volumetric data. Though Cloud Computing is very popular, cloud security could delay its adoption. Security of the cloud must provide data confidentiality and protection of resources. Such architecture seems to be vulnerable when confronted to distributed attacks also known as large-scale coordinated attacks. In this paper, we study the impact of large-scale coordinated attacks on Cloud Computing and its current security solutions. We experiment the open-source IDS Snort and a commercialized firewall using distributed port scan. Our results show that these security solutions are not designed to detect distributed attacks. Indeed, an attacker who controls about 32 hosts can easily achieve a distributed port scan without being detected.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125862028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Security Paradigm in Ubiquitous Computing 普适计算中的安全范式
Antonio Colella, Clara Maria Colombini
{"title":"Security Paradigm in Ubiquitous Computing","authors":"Antonio Colella, Clara Maria Colombini","doi":"10.1109/IMIS.2012.192","DOIUrl":"https://doi.org/10.1109/IMIS.2012.192","url":null,"abstract":"The vast development of Information and Communication Technologies and the innovations applied in the field of governance and management push the researchers to change their perspectives in finding new security paradigms. The major effort regards the capability to identify some appropriate tools that have the characteristic of better fit with the ``object'' to protect in the real world. One of main aspect that can ensure the success in this operation is the correct integration and harmonization of the human factor with all remaining factors of a security system. This paper discusses why the CIA (Confidentiality, Integrity and Availability) paradigm is no more valid and able to perform its effect in a post-modern world, and why Cloud and Pervasive Computing requires a new approach in which the user become the main actor of the entire security system.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123801329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference Models RFID读写器对读写器干扰模型中单一贡献与加性贡献的比较
Linchao Zhang, R. Ferrero, F. Gandino, M. Rebaudengo
{"title":"A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference Models","authors":"Linchao Zhang, R. Ferrero, F. Gandino, M. Rebaudengo","doi":"10.1109/IMIS.2012.122","DOIUrl":"https://doi.org/10.1109/IMIS.2012.122","url":null,"abstract":"The RFID reader-to-reader collision is a well-known interference problem that affects large RFID systems with many readers. In recent years, several anti-collision protocols have been proposed in order to address this problem. However, the evaluation of these approaches is often based on simple models that consider only direct collisions among two readers. Instead, more complex models capture the total signal power emitted by each reader and assume that the power of each signal decays as distance grows. In this paper, the main models of the two families are described, and a comparison is presented, in order to investigate their effectiveness for the study and the evaluation of reader-to-reader collision.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Cognitive Network for Intelligent Environments 面向智能环境的认知网络
Qian Li, P. Quax, K. Luyten, W. Lamotte
{"title":"A Cognitive Network for Intelligent Environments","authors":"Qian Li, P. Quax, K. Luyten, W. Lamotte","doi":"10.1109/IMIS.2012.14","DOIUrl":"https://doi.org/10.1109/IMIS.2012.14","url":null,"abstract":"With the emergence of ubiquitous computing, a dedicated network enabling applications for such systems becomes increasingly indispensable. Given the typical user-centered focus of ubiquitous applications, the dedicated network should be able to reconfigure itself autonomously according to the current context of use. In this paper, a new definition of a cognitive network is given and a clear line is drawn between cognitive networks and other types of networks. A framework for cognitive networks is presented and a novel cognition loop which is more consistent with human cognition is proposed. The evaluation of the design constitutes a part of the future work.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intangible Assets, Financial Performance, and Market Value -- An Integrative Research of Financial Services Industry 无形资产、财务绩效与市场价值——金融服务业的综合研究
Ying-Li Lin, Hsiu-Feng Huang
{"title":"Intangible Assets, Financial Performance, and Market Value -- An Integrative Research of Financial Services Industry","authors":"Ying-Li Lin, Hsiu-Feng Huang","doi":"10.1109/IMIS.2012.149","DOIUrl":"https://doi.org/10.1109/IMIS.2012.149","url":null,"abstract":"In the tendency of financial internationalization and liberalization, how to improve the company's value has become the important subject on the development of the bank industry. To a company in the financial service industry that focuses its core value on intangible assets, non-financial factors that are related to the company market value are even more important than financial performance. This study contributes to the prior research by clarifying how the approach can be extended to settings where value is created from abnormal earnings and intangible assets. Besides, this study also investigates the impact of systematic risk, firm size, and book-market ratios on the gap between risk-adjusted value minus stock price.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs 用gpu高效实现多元二次元系统的评估
Satoshi Tanaka, T. Nishide, K. Sakurai
{"title":"Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs","authors":"Satoshi Tanaka, T. Nishide, K. Sakurai","doi":"10.1109/IMIS.2012.139","DOIUrl":"https://doi.org/10.1109/IMIS.2012.139","url":null,"abstract":"QUAD stream cipher uses multivariate polynomial systems. It has provable security based on the computational hardness assumption. More specifically, the security of QUAD depends on hardness of solving non-linear multivariate system us over a finite field, and it is known as an NP-Hard problem. However, QUAD is slower than other stream ciphers, and an efficient implementation, which has a reduced computational cost is required. In this paper, we propose an efficient implementation of computing multivariate polynomial systems for multivariate cryptography on GPU and evaluate efficiency of the proposal. GPU is considered to be a commodity parallel arithmetic unit. Moreover, we give an evaluation of our proposal. Our proposal parallelizes an algorithm of multivariate cryptography, and makes it efficient by optimizing the algorithm with GPU.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Study of IEEE 802.11 DCF with Optimal Contention Window 具有最优争用窗口的IEEE 802.11 DCF性能研究
Chien-Erh Weng, Chun-Yin Chen
{"title":"Performance Study of IEEE 802.11 DCF with Optimal Contention Window","authors":"Chien-Erh Weng, Chun-Yin Chen","doi":"10.1109/IMIS.2012.144","DOIUrl":"https://doi.org/10.1109/IMIS.2012.144","url":null,"abstract":"The IEEE 802.11 protocol has achieved worldwide acceptance with WLANs with minimum management and maintenance costs. In order to maximize the throughput, stations had to spend many times to find out the best contention window. In our model, it is easy to derive the optimal contention window interval for a given network scale. We analyzed the behaviors of the model we proposed and found the optimal CW interval to maximize the throughput.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115391196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信