INFOCOMP Journal of Computer Science最新文献

筛选
英文 中文
Formalization of web security patterns web安全模式的形式化
INFOCOMP Journal of Computer Science Pub Date : 2015-06-01 DOI: 10.18760/IC.14120152
A. Dwivedi, S. K. Rath
{"title":"Formalization of web security patterns","authors":"A. Dwivedi, S. K. Rath","doi":"10.18760/IC.14120152","DOIUrl":"https://doi.org/10.18760/IC.14120152","url":null,"abstract":"Security issues in software industries become more and more challenging due to malicious attacks and as a result, it leads to exploration of various security holes in software system. In order to secure the information assets associated with any software system, organizations plan to design the system based on a number of security patterns, useful to build and test new security mechanisms. These patterns are nothing but certain design guidelines. But they have certain limitations in terms of consistency and usability. Hence, these security patterns may sometimes act as insecure. In this study, an attempt has been made to compose security patterns for the web-based application. Subsequently, a formal modeling approach for the composition of security patterns is presented. In order to maximize comprehensibility, Unified Modeling Language (UML) notations are used to represent structural and behavioral aspects of a web-based system. A formal modeling language i.e., Alloy has been taken into consideration for analyzing web-based security pattens. For the demonstration of this approach, a case study i.e., an online banking system is considered. A qualitative evaluation is performed for the identified security patterns against the critical security properties. In this study a model-driven framework is presented, which helps to automate the process of analyzing web security patterns.","PeriodicalId":320111,"journal":{"name":"INFOCOMP Journal of Computer Science","volume":"460 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122969173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Priority driven Call Scheduling in Mobile Networks: A MOGA based approach 移动网络中优先级驱动的呼叫调度:基于MOGA的方法
INFOCOMP Journal of Computer Science Pub Date : 2015-06-01 DOI: 10.18760/IC.14120151
P. Thakurta, S. Sett
{"title":"Priority driven Call Scheduling in Mobile Networks: A MOGA based approach","authors":"P. Thakurta, S. Sett","doi":"10.18760/IC.14120151","DOIUrl":"https://doi.org/10.18760/IC.14120151","url":null,"abstract":"Enhanced mobile communication in current days demands a drastic evolution in resource  management strategies to meet the quality of service (QoS) requirements for the network. Call scheduling is such an important scheme for efficient utilization in spite of scarcity of resources. In this paper, a priority driven call scheduling technique is proposed for efficient routing in mobile networks. The proposed scheduler is addressed with two conflicting objectives: to minimize the mean routing cost, and to achieve uniformity in the overall system utilization. In this context, a Multi Objective Genetic algorithm (MOGA) based approach is introduced for finding an optimal route from several alternatives pertaining to the network constraints. This results in effective scheduling and simultaneous improvement in call acceptance for the system. The proposed model takes into account the significance of priority in a comprehensive manner. The performance of the proposed model is evaluated in network scenarios with different parameters and service requirements. In addition, results from simulation studies show the quality of approximation obtained by the proposed model.","PeriodicalId":320111,"journal":{"name":"INFOCOMP Journal of Computer Science","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122036240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematic Modeling and Performance Analysis of an Adaptive Congestion Control in Intelligent Transportation Systems 智能交通系统中自适应拥塞控制的数学建模与性能分析
INFOCOMP Journal of Computer Science Pub Date : 2015-06-01 DOI: 10.18760/IC.14120154
R. Naja
{"title":"Mathematic Modeling and Performance Analysis of an Adaptive Congestion Control in Intelligent Transportation Systems","authors":"R. Naja","doi":"10.18760/IC.14120154","DOIUrl":"https://doi.org/10.18760/IC.14120154","url":null,"abstract":"In this paper, we develop a preventive congestion control mechanism applied at highway entrances and devised for Intelligent Transportation Systems (ITS). The proposed mechanism provides a vehicular admission control, regulates input traffic and performs vehicular traffic shaping. Our congestion control mechanism includes two classes of vehicles and is based on a specific priority ticket pool scheme with queue-length threshold scheduling policy, tailored to vehicular networks. In an attempt to cope with vehicular traffic fluctuation, we integrate an adaptation ticket generation module. The enhanced mechanism is then able to detect road congestion and provide performance metrics to road site units at the highway entrance. Mathematical modeling based on the embedded Markov chain method highlights the benefits of the proposed scheme. Performance analysis demonstrates the mechanism capability to accurately characterize road traffic congestion conditions, shape vehicular traffic and reduce travel time.","PeriodicalId":320111,"journal":{"name":"INFOCOMP Journal of Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130104829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Transmission of Medical Images by Single Label SWT and SVD based Non-Blind Watermarking Technique 基于单标签SWT和SVD的医学图像非盲水印安全传输
INFOCOMP Journal of Computer Science Pub Date : 2015-06-01 DOI: 10.18760/IC.14120155
Yatindra Pathak, Y. K. Jain, Satish Dehariya
{"title":"A Secure Transmission of Medical Images by Single Label SWT and SVD based Non-Blind Watermarking Technique","authors":"Yatindra Pathak, Y. K. Jain, Satish Dehariya","doi":"10.18760/IC.14120155","DOIUrl":"https://doi.org/10.18760/IC.14120155","url":null,"abstract":"Healthcare plays a most important part in human life today. Due to high quality of health-care, several dangerous diseases became curable now. But a major concerned problem with high quality healthcare is that it is not equally accessible throughout the world. The part of the problem is that the recipient and also the provider must be physically present within the same place. To overcome this problem information and communication technology has been used as a way by which healthcare can be delivered throughout the world. With the help of internet, medical professionals can be share medical reports and taking advice of experts before diagnosed that person. But use of internet also creates some issues such as security and safety of the medical data and protects their confidentiality, integrity and authenticity. Digital watermarking can be used as an important tool for the security and copyright protection of medical images. A new scheme for non-blind image watermarking is offered in this article that is robust against affine transformation and ordinary image manipulation. The suggested watermarking scheme based on Singular Value Decomposition(SVD) and Stationary Wavelet Transform(SWT). Once SWT is applied to both watermark and cover images, SVD is applied to the lower frequency LL subbands of both images. Now alter singular matrix (a diagonal matrix which contains singular values of image as its diagonal elements) of the cover image using singular matrix of the visual watermark. The proposed technique is robust against nearly all common attacks. Study and experimental results illustrate higher performance of the proposed method in comparison with the DWT method.","PeriodicalId":320111,"journal":{"name":"INFOCOMP Journal of Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121188487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信