2016 Third International Conference on Systems of Collaboration (SysCo)最新文献

筛选
英文 中文
Real time monitoring of security events for forensic purposes in Cloud environments using SIEM 使用SIEM对云环境中的安全事件进行实时监控,用于取证目的
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831327
Imane Bachane, Youness Idrissi Khamlichi Adsi, Habiba Chaoui Adsi
{"title":"Real time monitoring of security events for forensic purposes in Cloud environments using SIEM","authors":"Imane Bachane, Youness Idrissi Khamlichi Adsi, Habiba Chaoui Adsi","doi":"10.1109/SYSCO.2016.7831327","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831327","url":null,"abstract":"The use of Cloud computing keeps increasing day after day due to the unique combination of characteristics that the cloud introduce, including: on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. Though, from forensics experts' point of view, many challenges are faced when responding to incidents that have occurred in a cloud computing ecosystem. This paper examines some of the challenges in cloud forensics identified in the current research literature. Furthermore, it discusses an approach offered by researchers aiming to resolve forensics need in cloud computing. Finally, it presents a new approach for forensics investigation in the cloud based on SIEM by providing real time monitoring of security events and storing this events in order to use it as evidences in investigations.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125425206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intrusion detection in cloud computing based attacks patterns and risk assessment 基于攻击模式和风险评估的云计算入侵检测
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831341
B. Youssef, M. Nada, B. Elmehdi, Regragui Boubker
{"title":"Intrusion detection in cloud computing based attacks patterns and risk assessment","authors":"B. Youssef, M. Nada, B. Elmehdi, Regragui Boubker","doi":"10.1109/SYSCO.2016.7831341","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831341","url":null,"abstract":"This paper focuses on detecting and analyzing cyber-attacks in cloud environment, it represents a novel approach of detecting cyber-attacks by analyzing attacks pattern using risk assessment methodologies. The aims of our solution is to combine evidences obtained from Intrusion Detection Systems (IDS) deployed in cloud services with data of risk assessment related to each attack pattern. Our approach presents a new qualitative solution for analyzing each symptom, indicator and vulnerability to detect the impact and likelihood of distributed and multi-steps attacks directed to cloud environments. The implementation of this approach will minimize the false positive alerts and will improve the performance of the IDS.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116585763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cloud-based VCLE: A virtual collaborative learning environment based on a cloud computing architecture 基于云的VCLE:基于云计算架构的虚拟协作学习环境
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831340
A. E. Mhouti, Azeddine Nasseh Mohamed Erradi, J. Vasquèz
{"title":"Cloud-based VCLE: A virtual collaborative learning environment based on a cloud computing architecture","authors":"A. E. Mhouti, Azeddine Nasseh Mohamed Erradi, J. Vasquèz","doi":"10.1109/SYSCO.2016.7831340","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831340","url":null,"abstract":"Today, collaborative learning has a strong presence in technology-supported education, and as a result, practices being developed in the form of computer supported collaborative learning are more and more common. However, in order to support collaborative learning practices, Virtual Learning Environments (VLE) are facing challenges of optimizing large-scale resources management, according to the huge growth of services, users and educational resources. Indeed, with daily rising trend on requirement's dynamic changes in service, existing VLE fall short to respond on demand. Thus, in this paper, by taking advantage of cloud computing services, we propose to design a flexible cloud-based Virtual Collaborative Learning Environment (cloud-based VCLE). The aim of this work is to exploit cloud computing potentials to facilitate collaborative knowledge construction and maximize resource sharing in VLE. The proposed platform fulfills the basic requirement of VLE to support collaborative learning, but also responds to learner's dynamic need on demand. The platform facilitates and supports students to fulfill task-driven learning in a more flexibly and friendly collaborative manner.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A synthesis of communication architectures and services of smart grid systems 智能电网系统通信体系结构与服务的综合
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831334
Zahid Soufiane, B. Slimane, En-Nouaary Abdeslam
{"title":"A synthesis of communication architectures and services of smart grid systems","authors":"Zahid Soufiane, B. Slimane, En-Nouaary Abdeslam","doi":"10.1109/SYSCO.2016.7831334","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831334","url":null,"abstract":"The future electrical grid or the Smart Grid is an intelligent power network featured by its two-way flows of electricity and information. With an integrated communication infrastructure, Smart Grid manages the operation of all connected components to provide reliable and sustainable electricity supplies. However, utilities from all over the world are now facing the key challenge of finding the most appropriate architecture that can satisfy their future communication needs. The architecture models given by the international organizations of standardization are conceptual, so it is insufficient to grab the relation between the network components. In this paper, we introduce the current architectures proposed by international organizations, that is, NIST, ITU and IEEE. And we highlight their limits which prevent us from understanding the communication flow in the system. Then, we present a communication infrastructure model based on these international roadmaps and guides. Unlike other architectures, this one fulfills the six functionalities that Smart Grid network must achieve. Finally, we present the communication technologies that can be used for interconnecting the components and standards for each section. This paper is a preliminary step in our work. In fact, we aim in the future work to check our architecture by modeling the system and take the step of verification and validation.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134305570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Non-functional requirements interdependencies in web service composition web服务组合中的非功能需求的相互依赖性
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831332
Ilyass El Kassmi, Zahi Jarir, A. Obaid
{"title":"Non-functional requirements interdependencies in web service composition","authors":"Ilyass El Kassmi, Zahi Jarir, A. Obaid","doi":"10.1109/SYSCO.2016.7831332","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831332","url":null,"abstract":"Web services composition has been an active area of Service-oriented computing research. Where in literature the subjects around the functional composition of web service has gained increasing attention, some other efforts have been deployed to integrate the Non-functional requirements to be taken in consideration by the web service composition. However, integrating different Non-functional requirements in a composition of web services is a highly complex task and can lead to undesirable interactions that negatively affect service quality and the expected result. In this paper we propose a Finite State Automata based approach for modeling and integrating Non-functional requirements taking in consideration their interdependencies. To validate our formalization UPPAAL model checking tool is used. In this work we applied our approach to Security as Non-functional Requirements, and proposed a Health Care case study for experimentations.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improvement of complementary pedagogical resources indexing based on pedagogical warehouse for recommendation system CEHL 基于教学仓库的互补教学资源索引在推荐系统CEHL中的改进
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831339
Rtili Mohammed Kamal, Khaldi Mohamed, Dahmani Ali
{"title":"Improvement of complementary pedagogical resources indexing based on pedagogical warehouse for recommendation system CEHL","authors":"Rtili Mohammed Kamal, Khaldi Mohamed, Dahmani Ali","doi":"10.1109/SYSCO.2016.7831339","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831339","url":null,"abstract":"In recent years, the fast growth of Web pages and the constant evolution of internet technologies have lead to a significant increase in the number of pedagogical resources. Thus, the indexing and search problems have become crucial. To overcome this problem, it was proposed to use information coming from the norms and standards of educational metadata. However, this solution does not solve completely the problem. Previously, traditional information retrieval systems rely on indexing by keywords for representing pedagogical resources and queries content. This process, based on lexical matching, allows selecting pedagogical resources based on keywords shared with the query, which can reduce the accuracy of search results if the meaning of common words in the query and in the pedagogical resources is different. To overcome this issue and provide a more sophisticated search, adding semantics becomes necessary. Semantic Indexing offers a representation by the meaning of words in order to find pedagogical resources semantically relevant to the user request. We present in this paper the choice of the indexing approach used for the complementary educational resources. The main objective is to integrate this approach in the warehouse model that aims on one hand to store the complementary pedagogical resources, and on the other hand to help the user fill in the description fields of these resources.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve MQTT协议通信安全的新方法。RSA与椭圆曲线的比较
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831326
Abdessamad Mektoubi, Hicham Lalaoui Hassani, H. Belhadaoui, M. Rifi, A. Zakari
{"title":"New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve","authors":"Abdessamad Mektoubi, Hicham Lalaoui Hassani, H. Belhadaoui, M. Rifi, A. Zakari","doi":"10.1109/SYSCO.2016.7831326","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831326","url":null,"abstract":"The Internet of things (IoT) is the interconnection of physical objects with the Internet network using existing technologies and communication protocols. The speed up and massive uses of this network's type in a multitude domain, from large industrial applications to small every day's uses, raises new serious problematic related to security. Indeed, recent reports on cyber security highlighted the Internet of things' vulnerability, and the risks continue to increase exponentially, especially with the deployment of intelligent networks [1]. These objects connected to the Internet network will create a lot of new attack attempts and present a considerable danger for the integrity of data. To avoid disastrous consequences, security approaches must take place to ensure a set of criteria, namely: resistance to attack, data authenticity, access control and user privacy [2]. Due to limited IoT capacities as a CPU, memory, bandwidth and the energy, a new kind of protocols and concepts have been developed and/or improved to satisfy the specific quality of service of this network's type. Among these protocols we find “Message Queue Telemetry Transport” (MQTT). It is an open source protocol created by IBM that uses the Publish/Subscribe pattern and requires only a small bandwidth. In this work, we propose a new approach of secured communication based on the MQTT protocol. Indeed, in an unsecured network, we use standard techniques and algorithms of cryptography such as digital signatures, hash functions and the RSA algorithm to secure communications, data and keys exchanges in an IoT network.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Modeling of a collaborative learning process in the context of MOOCs mooc环境下协作学习过程的建模
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831336
Asma Hassani, S. Ghanouchi
{"title":"Modeling of a collaborative learning process in the context of MOOCs","authors":"Asma Hassani, S. Ghanouchi","doi":"10.1109/SYSCO.2016.7831336","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831336","url":null,"abstract":"Distance learning is an area in progress that continues to evolve with further research. Nowadays, MOOCs (Massive Open Online Courses) correspond to the most developed method of learning. It is a new phenomenon in e-learning which gives learners from around the world free, web-based, open access to content produced by a MOOC team. The phenomenon of MOOCs has increased remarkably by adopting collaborative mechanisms and offering new features promoting communication and exchange between learners. In this area, a big attention is given by researchers, developers and educators to the collaborative learning through Learning Management Systems (LMS), especially through learning environments and social networking. In this paper, we model the collaborative learning process in the context of a MOOC. More precisely, we focus on the evaluation process in the context of MOOCs. The proposed process is modeled with the BPMN notation and implemented via the Bonita's BPMS for future management of this process. This modeling has allowed better understanding of the considered processes and detection of different problems that can occur during an online collaborative and massive learning.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125436050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A comparative analysis of different approaches for big data interoperability 大数据互操作性不同方法的比较分析
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831345
Omar Hajoui, M. Talea, Abdellah Bakhouyi, Zouhair Ibn Batouta, R. Dehbi
{"title":"A comparative analysis of different approaches for big data interoperability","authors":"Omar Hajoui, M. Talea, Abdellah Bakhouyi, Zouhair Ibn Batouta, R. Dehbi","doi":"10.1109/SYSCO.2016.7831345","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831345","url":null,"abstract":"NoSQL databases are an effective solution for storing and processing large data, but these databases are heterogeneous. They offer different data storage models, implementations and languages to developers and users. This wide variety of platforms makes it difficult data interoperability, data integration and even data migration from one system to another. This paper proposes a literature review of papers related to big data interoperability. This paper also compares different big data interoperability approaches using a multi-criteria analysis by applying the Complex Proportional Assessment Method (COPRAS).","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposition of an approach based on BPM to manage agile development processes 提出一种基于BPM的方法来管理敏捷开发过程
2016 Third International Conference on Systems of Collaboration (SysCo) Pub Date : 2016-11-01 DOI: 10.1109/SYSCO.2016.7831331
Sirine Zaouali, Sonia Ayachi Ghannouchi
{"title":"Proposition of an approach based on BPM to manage agile development processes","authors":"Sirine Zaouali, Sonia Ayachi Ghannouchi","doi":"10.1109/SYSCO.2016.7831331","DOIUrl":"https://doi.org/10.1109/SYSCO.2016.7831331","url":null,"abstract":"Software development processes have known important evolutions such as the appearance of the agile methods. They become now the centre of interest of all development teams. Furthermore, BPM is an approach for modelling and automating business processes, favouring their continuous improvement. This paper proposes a new approach for conducting agile software development projects, based on BPM in order to have a comprehensible modelling of the corresponding processes, automating them, facilitating their management and favouring the collaboration between the involved actors. The case of the agile Scrum method is taken in order to model the corresponding development process and implement an executable prototype for Scrum teams.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133695482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信