2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Study of e-Business and Long-Established Companies in Japan 日本电子商务与老牌企业研究
Hidekazu Sone, Innan Sasaki
{"title":"Study of e-Business and Long-Established Companies in Japan","authors":"Hidekazu Sone, Innan Sasaki","doi":"10.1109/IMIS.2014.82","DOIUrl":"https://doi.org/10.1109/IMIS.2014.82","url":null,"abstract":"Based on our previous work, this paper discusses IT utilization by long-established Japanese companies and its effects. According to our interviews to some managers of such companies, IT systems have been actively introduced and have shown positive effects. For example, multiple numbers of long-established Japanese-style confectionary companies in Kyoto such as Wakanaya and Fujikoma, a soba noodle restaurant which has more than 200 years of history, told us during the interviews that their sales increased approximately 10% after they started online sales. Also, after using IT systems for recruitment, they started to receive more inquiries than before both domestically and from abroad, and now they feel it is easier to obtain competent human resources. As mentioned above, IT seems to have a positive impact not only on the profit side but also on various aspects. Management studies have discussed business growth so far, but study on business continuance and decline has been only narrowly kept going. Therefore, we will examine here comprehensively covering business continuance and decline using business system theory. We provide the overview of several long-establish companies upon which our study is based, including Kongo Gumi, Chidoriya, Wakanaya, Yasuda-Nenju, Chuuboku-Chaya and Fujikoma.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115534047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic Techniques in Advanced Information Management 高级信息管理中的密码技术
M. Ogiela, L. Ogiela, U. Ogiela
{"title":"Cryptographic Techniques in Advanced Information Management","authors":"M. Ogiela, L. Ogiela, U. Ogiela","doi":"10.1109/IMIS.2014.31","DOIUrl":"https://doi.org/10.1109/IMIS.2014.31","url":null,"abstract":"The paper presents new solutions in the area of application cryptographic protocols for strategic or personal information protection and management. Computer techniques for classified information protection and distribution will be described in the context of application for security purposes personal or biometric information. Such techniques may also support the management processes of confidential data, and distribution of parts of shared information in large management structures. Development of presented algorithms will enable the reconstruction of secured information exclusively by the confidants with access to the secret, and parts of the information shared - i.e. by the authorized users of shared information. At the same time the proposed information division techniques will effectively secure data against unauthorized access to encrypted information.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127219957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Interoperability between Federated Authentication Systems 联邦身份验证系统之间的互操作性
Luigi Catuogno, Clemente Galdi
{"title":"Interoperability between Federated Authentication Systems","authors":"Luigi Catuogno, Clemente Galdi","doi":"10.1109/IMIS.2014.71","DOIUrl":"https://doi.org/10.1109/IMIS.2014.71","url":null,"abstract":"Federated authentication allows users to use their home authentication credentials for gaining access to other institutions services while moving among different institutions. Different federated authentication systems have been designed and implemented. Despite simplified users mobility, one key problem in this area is that different authentication systems do not cooperate. In this paper we propose a protocol for allowing full communication between two federated authentication systems, Shibboleth a de facto standard in this context, and PAPI.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124220635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Role-Based RSA Key Management Approach in a Hierarchy Scheme 层次结构中基于角色的RSA密钥管理方法
Hsing-Chung Chen, A. Christiana
{"title":"A Role-Based RSA Key Management Approach in a Hierarchy Scheme","authors":"Hsing-Chung Chen, A. Christiana","doi":"10.1109/IMIS.2014.32","DOIUrl":"https://doi.org/10.1109/IMIS.2014.32","url":null,"abstract":"The role-based hierarchical key assignment problem is to assign sensitive keys to security role-based classes in a partially ordered hierarchy so that legal data accesses among classes could be enforced according to the role's privileges. In role-based RSA key hierarchy management scheme, each user is assigned the role which could derive the RSA key corresponding to the assigned role-based class and its successors' classes in order to access specific contents of resources. In this paper, a role-based RSA key management scheme in a hierarchy scheme is proposed, which both RSA algorithm and Akl approach are combined to the scheme. The scheme provides an easy implement approach and a simple key storage manner to increase the availability of role-based access control scheme. Finally, the security analyses are also presented in this paper.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129430274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Scenario-Based Behavioral Nonexistent Consistency Checking for Cyber-Physical Systems 基于场景的网络物理系统不存在行为一致性检查
Yan Zhang, Xiangwei Liu, Jin Shi, Tian Zhang, Zhuzhong Qian
{"title":"Scenario-Based Behavioral Nonexistent Consistency Checking for Cyber-Physical Systems","authors":"Yan Zhang, Xiangwei Liu, Jin Shi, Tian Zhang, Zhuzhong Qian","doi":"10.1109/IMIS.2014.8","DOIUrl":"https://doi.org/10.1109/IMIS.2014.8","url":null,"abstract":"Cyber-Physical Systems (CPS) play an important role in the safety-critical systems. It is very significant to verify whether some concerned behaviors exist in a CPS. Hybrid interface automata, extension of a non-hybrid version, are used to model a CPS. A scenario, described by MARTE sequence diagram, specifies the concerned behaviors. An algorithm is given for bounded checking the behavioral nonexistent consistency, namely, the behaviors specified by a scenario all do not exist in a hybrid interface automaton. The idea of the algorithm is, firstly, encoding the behavioral nonexistent consistency to an unconstrained dynamic programming, secondly, solving the unconstrained dynamic programming by a genetic algorithm. The algorithm can search the results on the real domain, and be applied to nonlinear as well as linear hybrid systems.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125209958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cost-Effective Proxy-LMA Mobility Management Scheme in Mobile Networks with Global Mobility Support 具有全球移动支持的移动网络中具有成本效益的Proxy-LMA移动管理方案
Chulhee Cho, Jun-Dong Cho, Jongpil Jeong
{"title":"Cost-Effective Proxy-LMA Mobility Management Scheme in Mobile Networks with Global Mobility Support","authors":"Chulhee Cho, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.97","DOIUrl":"https://doi.org/10.1109/IMIS.2014.97","url":null,"abstract":"Mobile users (MUs) want to be provided with undisrupted network services when they navigate on the Next-Generation wireless networks (NGWNs). For that, interlocking with a heterogeneous network is important, but there have been few studies on the method for guaranteeing global mobility. Thus, this paper proposes the Proxy-LMA technique, the mobile IP-based global inter-networking system, to enhance global mobility and interoperability within the NGWN. The purpose of the proposed Proxy-LMA system is to expand the boundary of the mobility with regards to the existing mobility management protocol (PMIPv6 and MIPv6) in order to guarantee global mobility and interoperability within the heterogeneous network environment. The results of the performance evaluation showed that the proposed Proxy-LMA system was more efficient than other methods from the standpoint of signaling cost and delay in the heterogeneous network environment.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125318898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges of the Internet of Things: IPv6 and Network Management 物联网的挑战:IPv6和网络管理
N. Benamar, A. Jara, L. Ladid, M. D. E. Ouadghiri
{"title":"Challenges of the Internet of Things: IPv6 and Network Management","authors":"N. Benamar, A. Jara, L. Ladid, M. D. E. Ouadghiri","doi":"10.1109/IMIS.2014.43","DOIUrl":"https://doi.org/10.1109/IMIS.2014.43","url":null,"abstract":"Nowadays, many researchers are interested in the concept of Internet of Things (IoT). IoT is evolving our knowledge and conception of the world. IoT aims to offer a common communication paradigm for all objects via the Internet and its protocols. For that reasons, it is being applied in all areas of life, such as environmental monitoring, healthcare, military, cities management, and industry. One of the major challenges of the IoT is to integrate IPv6, and its related protocols, into the constrained capabilities offered by Wireless Sensor Networks, building automation, and home appliances. One of the design considerations, for the success of the IoT, is to integrate what exists from IPv6, before creating novel protocols, in order to promote and ensure the interoperability, homogeneity, openness, security, flexibility, and heritage of all existing hardware, tools, and applications of IPv6. This work presents how to integrate the management protocols in IPv6 into the emerging IoT networks based on protocols such as 6LoWPAN. An overview of the different management protocols for IPv6 is presented. Network Management Protocol (SNMP), and the considerations for IoT management from works such as Lightweight Network Management Protocol (LNMP), and the Constrained networks and devices Management (COMAN) Group from the IETF are discussed. COMAN is presenting solutions such as simplified MIB, new SNMP consideration, and CoAP-based management.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129201102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Service Security for Smart Grid System 智能电网系统的业务安全
Inshil Doh, Jiyoung Lim, K. Chae
{"title":"Service Security for Smart Grid System","authors":"Inshil Doh, Jiyoung Lim, K. Chae","doi":"10.1109/IMIS.2014.61","DOIUrl":"https://doi.org/10.1109/IMIS.2014.61","url":null,"abstract":"One of major application service areas in M2M (Machine-to-Machine) is the smart grid system. In smart grid systems, information and communications technology are used to gather and act on information that is related to the behaviors of consumers and suppliers. The technology is to improve the efficiency, reliability, and economics of the production and distribution of electricity. To make the system more reliable, security is a very important issue. In this paper, we propose secure system architecture and a mechanism to provide security for smart grid system robustness and reliability.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Elliptic Curve Scalar Multiplication with a Bijective Transform 具有双射变换的椭圆曲线标量乘法
Y. Nagai, Masaaki Shirase, T. Izu
{"title":"Elliptic Curve Scalar Multiplication with a Bijective Transform","authors":"Y. Nagai, Masaaki Shirase, T. Izu","doi":"10.1109/IMIS.2014.35","DOIUrl":"https://doi.org/10.1109/IMIS.2014.35","url":null,"abstract":"It is important to speed up scalar multiplication in elliptic curve cryptosystems and then various speeding-up techniques for that have been proposed. This paper proposes a method for computing a scalar multiplication, in which, first, we map a point we would like to compute a scalar multiplication into another point on another curve so that it has a special coordinate, second, we compute a scalar multiplication on the another curve, finally, we map the computed point on original curve. In fact, when we use the proposed method, the cost of scalar multiplication is reduced by about from 2 to 5% in projective, Jacobian, and modified Jacobian coordinate systems.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115757101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SODiCS on Challenged Communication Environment 挑战通信环境下的sodic
Kenta Ito, Go Hirakawa, Y. Shibata
{"title":"SODiCS on Challenged Communication Environment","authors":"Kenta Ito, Go Hirakawa, Y. Shibata","doi":"10.1109/IMIS.2014.138","DOIUrl":"https://doi.org/10.1109/IMIS.2014.138","url":null,"abstract":"Through we experienced at the Eastern Japan Great Earthquake on March 11, 2011, a disaster information gathering systems are strongly needed to widely collect the disaster state around the evaluated areas, correctly analyze the degree of damages and quickly make decision of disaster recovery response. For this requirement, a mobile video surveillance system on a vehicle based on wireless network is useful on because of its wide rage monitoring and mobility. However, since most of the communication lines and systems are seriously damaged and the communication state is widely worse particularly in hilly and mountainous areas. In this paper, we introduce SODiCS (Spatial and Temporal Omnidirectional Video Distribution and Collection System) for challenged communication environment. Video data gathered using omnidirectional camera and various sensors are transmitted to all of the users through a web application. The user can see those collected data on GIS map as a web application. We developed the system with two modes as video distribution functions, Live View mode and Storage View mode. The system configuration and architecture are explained and a prototype system is constructed to evaluate the performance of our system.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信