2010 International Conference on Information Science and Applications最新文献

筛选
英文 中文
Architecture Based Ripple Effect Analysis: a Software Quality Maintenance Perspective 基于架构的涟漪效应分析:软件质量维护的视角
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480529
S. Anwar, Fouzia Idris, M. Ramzan, A. A. Shahid, Abdul Rauf
{"title":"Architecture Based Ripple Effect Analysis: a Software Quality Maintenance Perspective","authors":"S. Anwar, Fouzia Idris, M. Ramzan, A. A. Shahid, Abdul Rauf","doi":"10.1109/ICISA.2010.5480529","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480529","url":null,"abstract":"one of the major challenges for software developer is to fulfill the quality requirements of the software systems. This emphasis on, software quality has some serious implications in terms of customer satisfaction and system acceptance. On the other hand, software architecture as an artifact can be used to deal with software qualities such as maintainability, performance and reliability etc. With rapid expansion on software systems to cater to the need of automation, software intensive systems are becoming large and complex. This is enhancing our emphasis on system quality which ultimately gives rise to the need for software quality maintenance. This software quality maintenance is not without ripple effect cost. This paper is an attempt to analyse architecture based quality maintenance ripple effect and for this purpose, a process for architecture based quality maintenance ripple effect analysis is proposed. A technique for ripple effect analysis is described.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129959256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Watermarking Techniques Applied to H264/AVC Video Standard 水印技术在H264/AVC视频标准中的应用
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480288
S. Bouchama, H. Aliane, L. Hamami
{"title":"Watermarking Techniques Applied to H264/AVC Video Standard","authors":"S. Bouchama, H. Aliane, L. Hamami","doi":"10.1109/ICISA.2010.5480288","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480288","url":null,"abstract":"Video watermarking describes the process of embedding information in video to satisfy applications such as the protection of intellectual property and the control of video authentication. In this field, researchers orient their investigations towards the new video standard H264/AVC which is increasingly used because of the coding efficiency it provides comparing to the previous standards. The different modules of this standard are exploited to embed watermark while responding to the application demands in terms of fragility or robustness to certain attacks and in terms of maintaining video quality and video bit rate. The aim of this paper is to give a global vision on the H264/AVC and to present some robust and fragile watermarking techniques applied to this video standard.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134232750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scalable, Privacy-Preserving Remote Attestation in and through Federated Identity Management Frameworks 通过联邦身份管理框架实现可扩展的、保护隐私的远程认证
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480294
T. Ali, M. Nauman, M. Amin, Masoom Alam
{"title":"Scalable, Privacy-Preserving Remote Attestation in and through Federated Identity Management Frameworks","authors":"T. Ali, M. Nauman, M. Amin, Masoom Alam","doi":"10.1109/ICISA.2010.5480294","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480294","url":null,"abstract":"Creating trustworthy online computing is an important open issue in security research. Trusted Computing aims to address this problem through the use of remote attestation but comes with its own baggage in the form of privacy concerns. Federated Identity Management Systems (FIDMSs), on the other hand, provide another form of trust but lack the ability to measure the integrity of platforms that they vouch for. We note that these two security architectures have reciprocal strengths and weaknesses and can be combined to create an architecture that addresses the concerns of both. In this paper, we propose an extended FIDMS in which the identity provider not only vouches for the identity of a user but also for her platform's integrity. In this way, we (a) allow a service provider to establish trust on a client platform's integrity without sacrificing privacy; and (b) create a feasible and scalable architecture for remote attestation. We describe our proposed architecture in the context of Shibboleth FIDMS and provide the details of the implementation of this system.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115264694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Fingerprint-Based User Authentication Scheme Using Smart Cards in IPTV Environments IPTV环境下基于智能卡的指纹认证方案
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480301
Eun-A Jun, H. Rhee, SeokWon Jung, Dong Hoon Lee
{"title":"A Fingerprint-Based User Authentication Scheme Using Smart Cards in IPTV Environments","authors":"Eun-A Jun, H. Rhee, SeokWon Jung, Dong Hoon Lee","doi":"10.1109/ICISA.2010.5480301","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480301","url":null,"abstract":"In IPTV environments, a user authentication is an important security primitive to check the validity of membership. Authentication schemes between a smart card and set-topbox(STB) for authenticating users have been proposed in IPTV environment. Since many contents contain classifiable elements such as violence, sex, coarse language, themes and drug use, we should classify contents with ages and restrict an access ability of a user according to user's age. Specially, to protect young children from a misusage of harmfulness contents, the legal and technical efforts are also required in IPTV. In aspect to technical efforts, it is required to provide an access control according to the policy of content provider. In this paper we first propose a fingerprint-based user authentication scheme which checks the suitability of user to the policy of contents provider. Since our scheme additionally contains a pre-computation phase, the computation cost of the smart cards is very low. And, the proposed scheme can also solve vulnerabilities against security problems such as smart card cloning and McCormac Hack attack in IPTV environment.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132904408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Study on Risk Analysis and Assessment of Damages to Cyber Attack 网络攻击损害风险分析与评估研究
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480348
W. Park
{"title":"A Study on Risk Analysis and Assessment of Damages to Cyber Attack","authors":"W. Park","doi":"10.1109/ICISA.2010.5480348","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480348","url":null,"abstract":"Recently, cyber attacks against the nation or the enterprise are increasing rapidly and hereupon, the necessity of standard for risk analysis and assessment of damages is raising. For surveying the actual condition of the cyber threats, it is necessary for us to grasp a danger. But actually, there are still lack of danger factors and no definite standards. As a result, we assess the amount of loss with different standards, so we do not assess the amount of damages exactly in the actual condition. In this paper, we study the risk analysis and assessment of damages based on analyzing the cyber attacks against the enterprise in 7.7 cyber attacks.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"625 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133013875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Selective Forwarding Scheme for Alert Message Propagation in VANETs VANETs中警报消息传播的增强选择性转发方案
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480516
Do-hyeon Lee, Songnan Bai, Tae-won Kim, Jae-il Jung
{"title":"Enhanced Selective Forwarding Scheme for Alert Message Propagation in VANETs","authors":"Do-hyeon Lee, Songnan Bai, Tae-won Kim, Jae-il Jung","doi":"10.1109/ICISA.2010.5480516","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480516","url":null,"abstract":"Recently vehicular safety applications have been introduced to improve traffic safety and efficiency. These applications are classified into two types: safety-oriented and non-safety applications. In this classification, safety-oriented applications are usually provided by means of vehicular multi-hop broadcasting in order to support reliable and fast alert message propagation to all surrounding vehicles when an emergency event occurs on a road. In VANETs, broadcast-based packet forwarding is usually preferred in order to propagate urgent traffic-related information to all reachable nodes within a certain dangerous region. However, this approach may cause broadcast storm problem, which can lead to serious contention in transmission between adjacent nodes. With this motivation, in this paper, we propose an alert message propagation scheme based on selective forwarding that aims at i) minimizing the number of rebroadcasting nodes, and ii) guaranteeing reliable and fast alert message delivery to all reachable nodes. The proposed scheme is evaluated using two types of highway scenarios. The simulation results show that the proposed scheme performs better than existing broadcast schemes in terms of message delivery latency, message delivery ratio, and message rebroadcasting ratio.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131434778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Nutrition Counseling System and Food Menu Planning 营养咨询系统与食物菜单规划
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480421
Yanisa Usthasopha, Suphakant Phimoltares, N. Cooharojananone
{"title":"Nutrition Counseling System and Food Menu Planning","authors":"Yanisa Usthasopha, Suphakant Phimoltares, N. Cooharojananone","doi":"10.1109/ICISA.2010.5480421","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480421","url":null,"abstract":"In recent years the effects of industrial growth have resulted in drastic changes in consuming behavior, standard of living, and lifestyles. In particular there has been a significant rise in the number of people who eat out regularly. This often means that they cannot control the characteristics of the food they take, such as its taste, calories per portion, and other nutritional details. As a result they may become prone to obesity. Today people are confronted with more difficult decisions about how to select food items suitable to their nutritional needs. In this paper, we present a new nutrition counseling system for food menu planning (NCS). This NCS not only assists in finding the appropriate menu for users, by entering data parameters such as gender, age, height, weight, exercise activity and favorite food but also provides meals customized to each individual nutritional profile. In the near future such systems might become integral to an encompassing lifestyle health information system.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133499970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Aware Role Based Access Control Model: Revisited for Multi-Policy Conflict Detection 基于隐私感知角色的访问控制模型:对多策略冲突检测的重新审视
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480349
Yoonjeong Kim, Eunjee Song
{"title":"Privacy-Aware Role Based Access Control Model: Revisited for Multi-Policy Conflict Detection","authors":"Yoonjeong Kim, Eunjee Song","doi":"10.1109/ICISA.2010.5480349","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480349","url":null,"abstract":"Privacy-aware Role-based Access Control (P-RBAC) model is one of Role-Based Access Control (RBAC) model extensions that has been proposed to help the enforcement of privacy policies. Despite the enhanced privacy protection mechanism by P-RBAC, its pair-wise policy conflict detection algorithm has been pointed out as one of its limitations because conflicts within more than two policies are not detected. In this paper, we review and extend P-RBAC's existing conflict detection algorithm so that it can check conflicts in multiple policies. Our review includes the performance comparison on two conflict detection algorithms, triple-policy conflict detection vs. double-policy conflict detection. We find out that as the number of policies increases and the number of same condition variables in the policies increases, the running time complexity gets bigger. Especially for tripe-policy conflict, the probability of triple policy conflict also affects the complexity.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115457874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Distributed Communication System Design Based on Can Bus for Parallel-Serial Hybrid Electrical Vehicles 基于Can总线的混联混合动力汽车分布式通信系统设计
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480584
Yi-He Zuo, C. Xiang, Q. Yan, Wei-da Wang, Hui Liu, Hongcai Li
{"title":"Distributed Communication System Design Based on Can Bus for Parallel-Serial Hybrid Electrical Vehicles","authors":"Yi-He Zuo, C. Xiang, Q. Yan, Wei-da Wang, Hui Liu, Hongcai Li","doi":"10.1109/ICISA.2010.5480584","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480584","url":null,"abstract":"Distributed network system based on Controller Area Network (CAN) protocol has been widely applied into the vehicle industries. CAN communication protocol for the parallel-serial hybrid electrical vehicles (PSHEV) has been designed in the paper. Real-time scheduling algorithms based on optimization periodic algorithm (OPA) with non-preemptive and preemptive scheduling are also proposed with an optimization goal function to decrease the delay time for sporadic tasks and increase the CPU utilization for a real-time controller. Then a kind of method of solving the OPA have been designed namely exhaust algorithm (EA). With a view to avoid real vehicles experiment failures in advance, it is necessary for us to make an experiment set-up to verify the validity of the CAN protocol designed and OPA for the PSHEV. So the related hardware circuits for testing CAN system have been made. Finally, communication experiments are made based on CAN protocol proposed above. The results show the CAN protocol and OPA scheduling algorithm for the PSHEV are valid, all messages can be transmitted and received efficiently and completely avoiding the occurrence of loss of messages in the process of communications in all nodes of the system and the optimized periodic tasks as a result of OPA scheduling algorithm can decrease the delay time for sporadic tasks and increase the CPU utilization for a real-time controller.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124018412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Profile Approach to Using UML Models for Rich Form Generation 使用UML模型生成富表单的概要方法
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480315
T. Cerný, Eunjee Song
{"title":"A Profile Approach to Using UML Models for Rich Form Generation","authors":"T. Cerný, Eunjee Song","doi":"10.1109/ICISA.2010.5480315","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480315","url":null,"abstract":"The Model Driven Development (MDD) has provided a new way of engineering today's rapidly changing requirements into the implementation. However, the development of user interface (UI) part of an application has not benefit much from MDD although today's UIs are complex software components and they play an essential role in the usability of an application. As one of the most common UI examples, consider view forms that are used for collecting data from the user. View forms are usually generated with a lot of manual efforts after the implementation. For example, in case of Java 2 Enterprise Edition (Java EE) web applications, developers create all view forms manually by referring to entity beans to determine the content of forms, but such manual creation is pretty tedious and certainly very much error-prone and makes the system maintenance difficult. One promise in MDD is that we can generate code from UML models. Existing design models in MDD, however, cannot provide all class attributes that are required to generate the practical code of UI fragments. In this paper, we propose a UML profile for view form generation as an extension of the object relational mapping (ORM) profile. A profile form of hibernate validator is also introduced to implement the practical view form generation that includes an user input validation.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"77 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信