{"title":"IoT Access Control Issues: A Capability Based Approach","authors":"S. Gusmeroli, S. Piccione, D. Rotondi","doi":"10.1109/IMIS.2012.38","DOIUrl":"https://doi.org/10.1109/IMIS.2012.38","url":null,"abstract":"Resource and information protection plays a relevant role in distributed systems. Most of the currently proposed authorization frameworks do not provide scalable, manageable, effective, and efficient mechanisms to support distributed systems with many interacting services. The advent of IoT will further increase the need for scalable and manageable solutions able to face the potentially unbound number of sensors, actuators and related resources, services and subjects. This is even more relevant if we take into account that IoT environments can envisage not only a greater number of resources to manage, but also a substantial increase of the interaction dynamics. This paper presents a capability based access control system that enterprises, or even individuals, can use to manage their own access control processes to services and information. The proposed mechanism supports rights delegation and a more sophisticated access control customization. The proposed approach is being developed within the European FP7 IoT@Work project to manage access control for some of the project's services deployed in the shop floor.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Locating Routing Instability Based on Path Exploration","authors":"Hongjun Liu, Xiaofeng Hu, Dan Zhao, Xicheng Lu","doi":"10.1109/IMIS.2012.47","DOIUrl":"https://doi.org/10.1109/IMIS.2012.47","url":null,"abstract":"Root cause analysis of BGP updates is the key to debug and troubleshoot BGP routing problems. However, accurately inferring what is the cause of routing instability and where it originate is very hard. In this paper, we present a novel approach to locate the origin of routing instability by analyzing the relationship of the closed loops formed by intersecting the all the paths in path exploration and the length variation of the paths received in a single vantage point. Then we demonstrate our approach using BGP data obtained by simulations and show that the method is quite effective. Once there is path exploration when a routing event triggering BGP updates, this approach can precisely identify whether the event is a link failure and pinpoint the right place where the event exactly happens if so. Otherwise the approach can deduce the candidate set of locations to a small size.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling the Cloud of Things","authors":"S. Distefano, Giovanni Merlino, A. Puliafito","doi":"10.1109/IMIS.2012.61","DOIUrl":"https://doi.org/10.1109/IMIS.2012.61","url":null,"abstract":"This paper intends to contribute to the design of a pervasive infrastructure where new generation services interact with the surrounding environment, collecting data and applying management strategies. According to such perspective computing, storage and sensing become complementary aspects to be coordinated. In this way innovative and value-added services can be implemented by bridging Clouds with the Internet of Things. Heterogeneous resources can be aggregated and abstracted according to tailored thing-like semantics, thus enabling a Things as a Service paradigm, a way to build a \"Cloud of Things\" (CoT). This paper mainly focuses on the implementation of the underlying infrastructure at the basis of the CoT. An ad-hoc architecture and some preliminary background of this challenging view are provided and discussed, identifying guidelines and future directions.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121741469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large-Scale Coordinated attacks: Impact on the Cloud Security","authors":"D. Riquet, G. Grimaud, M. Hauspie","doi":"10.1109/IMIS.2012.76","DOIUrl":"https://doi.org/10.1109/IMIS.2012.76","url":null,"abstract":"Cloud Computing has emerged as a model to process large volumetric data. Though Cloud Computing is very popular, cloud security could delay its adoption. Security of the cloud must provide data confidentiality and protection of resources. Such architecture seems to be vulnerable when confronted to distributed attacks also known as large-scale coordinated attacks. In this paper, we study the impact of large-scale coordinated attacks on Cloud Computing and its current security solutions. We experiment the open-source IDS Snort and a commercialized firewall using distributed port scan. Our results show that these security solutions are not designed to detect distributed attacks. Indeed, an attacker who controls about 32 hosts can easily achieve a distributed port scan without being detected.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125862028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Paradigm in Ubiquitous Computing","authors":"Antonio Colella, Clara Maria Colombini","doi":"10.1109/IMIS.2012.192","DOIUrl":"https://doi.org/10.1109/IMIS.2012.192","url":null,"abstract":"The vast development of Information and Communication Technologies and the innovations applied in the field of governance and management push the researchers to change their perspectives in finding new security paradigms. The major effort regards the capability to identify some appropriate tools that have the characteristic of better fit with the ``object'' to protect in the real world. One of main aspect that can ensure the success in this operation is the correct integration and harmonization of the human factor with all remaining factors of a security system. This paper discusses why the CIA (Confidentiality, Integrity and Availability) paradigm is no more valid and able to perform its effect in a post-modern world, and why Cloud and Pervasive Computing requires a new approach in which the user become the main actor of the entire security system.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123801329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Linchao Zhang, R. Ferrero, F. Gandino, M. Rebaudengo
{"title":"A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference Models","authors":"Linchao Zhang, R. Ferrero, F. Gandino, M. Rebaudengo","doi":"10.1109/IMIS.2012.122","DOIUrl":"https://doi.org/10.1109/IMIS.2012.122","url":null,"abstract":"The RFID reader-to-reader collision is a well-known interference problem that affects large RFID systems with many readers. In recent years, several anti-collision protocols have been proposed in order to address this problem. However, the evaluation of these approaches is often based on simple models that consider only direct collisions among two readers. Instead, more complex models capture the total signal power emitted by each reader and assume that the power of each signal decays as distance grows. In this paper, the main models of the two families are described, and a comparison is presented, in order to investigate their effectiveness for the study and the evaluation of reader-to-reader collision.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cognitive Network for Intelligent Environments","authors":"Qian Li, P. Quax, K. Luyten, W. Lamotte","doi":"10.1109/IMIS.2012.14","DOIUrl":"https://doi.org/10.1109/IMIS.2012.14","url":null,"abstract":"With the emergence of ubiquitous computing, a dedicated network enabling applications for such systems becomes increasingly indispensable. Given the typical user-centered focus of ubiquitous applications, the dedicated network should be able to reconfigure itself autonomously according to the current context of use. In this paper, a new definition of a cognitive network is given and a clear line is drawn between cognitive networks and other types of networks. A framework for cognitive networks is presented and a novel cognition loop which is more consistent with human cognition is proposed. The evaluation of the design constitutes a part of the future work.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intangible Assets, Financial Performance, and Market Value -- An Integrative Research of Financial Services Industry","authors":"Ying-Li Lin, Hsiu-Feng Huang","doi":"10.1109/IMIS.2012.149","DOIUrl":"https://doi.org/10.1109/IMIS.2012.149","url":null,"abstract":"In the tendency of financial internationalization and liberalization, how to improve the company's value has become the important subject on the development of the bank industry. To a company in the financial service industry that focuses its core value on intangible assets, non-financial factors that are related to the company market value are even more important than financial performance. This study contributes to the prior research by clarifying how the approach can be extended to settings where value is created from abnormal earnings and intangible assets. Besides, this study also investigates the impact of systematic risk, firm size, and book-market ratios on the gap between risk-adjusted value minus stock price.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs","authors":"Satoshi Tanaka, T. Nishide, K. Sakurai","doi":"10.1109/IMIS.2012.139","DOIUrl":"https://doi.org/10.1109/IMIS.2012.139","url":null,"abstract":"QUAD stream cipher uses multivariate polynomial systems. It has provable security based on the computational hardness assumption. More specifically, the security of QUAD depends on hardness of solving non-linear multivariate system us over a finite field, and it is known as an NP-Hard problem. However, QUAD is slower than other stream ciphers, and an efficient implementation, which has a reduced computational cost is required. In this paper, we propose an efficient implementation of computing multivariate polynomial systems for multivariate cryptography on GPU and evaluate efficiency of the proposal. GPU is considered to be a commodity parallel arithmetic unit. Moreover, we give an evaluation of our proposal. Our proposal parallelizes an algorithm of multivariate cryptography, and makes it efficient by optimizing the algorithm with GPU.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Study of IEEE 802.11 DCF with Optimal Contention Window","authors":"Chien-Erh Weng, Chun-Yin Chen","doi":"10.1109/IMIS.2012.144","DOIUrl":"https://doi.org/10.1109/IMIS.2012.144","url":null,"abstract":"The IEEE 802.11 protocol has achieved worldwide acceptance with WLANs with minimum management and maintenance costs. In order to maximize the throughput, stations had to spend many times to find out the best contention window. In our model, it is easy to derive the optimal contention window interval for a given network scale. We analyzed the behaviors of the model we proposed and found the optimal CW interval to maximize the throughput.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115391196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}