2009 Sixth International Conference on Information Technology: New Generations最新文献

筛选
英文 中文
The Role of Enterprise Architecture in Healthcare-IT 企业架构在医疗保健it中的作用
K. Ahsan, Hanifa Shah, P. Kingston
{"title":"The Role of Enterprise Architecture in Healthcare-IT","authors":"K. Ahsan, Hanifa Shah, P. Kingston","doi":"10.1109/ITNG.2009.9","DOIUrl":"https://doi.org/10.1109/ITNG.2009.9","url":null,"abstract":"As far as Enterprise Architecture is a strategic planning tool, Main objective of architecture is to define the layout of organizational components and relationship among them in order to understand the integration of objects for further improvement. Enterprise architecture has several benefits and it is imperative for defining the IT components and their association with human (paramedical staff)involvement. However, the problem is, how to choose and create enterprise architecture framework for healthcare. Due to importance and pragmatic of enterprise architecture, the architectural concepts should be clear to senior management. Since, it is their responsibility to select the appropriate organizational architecture/framework for Business-IT alignment. Paper provides the enterprise architecture concepts. Since, it provides the overall picture of organizational concepts of well known architectural framework. Paper also proposed ArchiMate framework for modeling the healthcare organizations due to its coherence within EA elements. The main reason behind the use of such framework is the limitations of the existing ones in this cohesiveness of EA elements.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121183661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies 为capec驱动的层次结构利用父级缓解和威胁
P. Engebretson, Joshua J. Pauli
{"title":"Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies","authors":"P. Engebretson, Joshua J. Pauli","doi":"10.1109/ITNG.2009.24","DOIUrl":"https://doi.org/10.1109/ITNG.2009.24","url":null,"abstract":"We propose a new attack pattern model which focuses on the re-inclusion of the “Parent Threat” and “Parent Mitigation” elements to logically group the background of each of the 101 attack patterns in the Common Attack Pattern Enumeration Classification’s (CAPEC) Release 1 dictionary.  Our approach creates a graphical hierarchy for each of the attack patterns and groups them not only by Parent Threats (such as “Spoofing” and “Injection”), but also by Parent Mitigations (such as “Access Control” and “Configuration Management”). This allows individual attack patterns to be traced upward to its Parent Threat and downward to its Parent Mitigation. The Parent Threat and Parent Mitigation elements are created from the inherit findings in the CAPEC and NIST standards; we are integrating this information into our hierarchy-based attack pattern approach.  The traceability from the top of the tree (Parent Threat), through the detailed elements of the attack patterns, to the roots of the tree (Parent Mitigation) introduces the CAPEC standard to audiences who are not familiar with attack patterns and allows experienced users to leverage the attacks from organized groupings that are widely accepted. There is a great amount of information in the CAPEC dictionary that we are capturing and documenting with this fan-in/fan-out approach.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Efficient and Reliable Time Variant Three-Entity and Data Authentication of Remote User Using Smart card 一种高效可靠的智能卡远程用户时变三实体及数据认证
C. Koner, C. Bhunia, U. Maulik
{"title":"An Efficient and Reliable Time Variant Three-Entity and Data Authentication of Remote User Using Smart card","authors":"C. Koner, C. Bhunia, U. Maulik","doi":"10.1109/ITNG.2009.190","DOIUrl":"https://doi.org/10.1109/ITNG.2009.190","url":null,"abstract":"Authentication of remote user needs research and investigation due to increasing security threats and attacks with the increasing volume of wired and wireless traffic. All of the popular password-based remote user authentication are fixed authentication and checks the authenticity of user by only user password and id. They provide only entity authentication, not any data authentication. This paper is a proposal of Time Variant Three-Entity and Data Authentication technique that will check the authenticity of remote user time to time by user password, identifier and biometric property and serves as entity authentication as well as data authentication. We have implemented Automatic Variable Password (AVP) by changing the password time to time. We shows that how AVP enhances the security of our technique. This paper also reports that our Time Variant Three-Entity and Data Authentication technique is more efficient than other Fixed Authentication techniques.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127038659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TGKAM: Adaptive Middleware Architecture for Secure Group Communication 安全组通信的自适应中间件体系结构
Rajesh Ingle, G. Sivakumar
{"title":"TGKAM: Adaptive Middleware Architecture for Secure Group Communication","authors":"Rajesh Ingle, G. Sivakumar","doi":"10.1109/ITNG.2009.210","DOIUrl":"https://doi.org/10.1109/ITNG.2009.210","url":null,"abstract":"Existing group communication middleware may violate security requirements of an application, because it does not harness knowledge of application parameters. These parameters such as arrival rate, departure rate, staying period, group life time and tolerance times for join and leave, are critical for meeting security requirements of the application and for optimizing performance. In this paper, we propose an adaptive middleware architecture for secure group communication which is configurable and tunable. This architecture makes use of tunable group key agreement protocol and application class awareness concept. Experiments performed show that it achieves adaptation with reasonable performance.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125948433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Estimation Method for Total Nitrogen and Fiber Contents in Tealeaves as well as Grow Index of Tealeaves and Tea Estate Monitoring with Network Cameras 茶叶中总氮、总纤维含量估算方法及茶叶生长指数及茶园网络摄像机监测
K. Arai
{"title":"Estimation Method for Total Nitrogen and Fiber Contents in Tealeaves as well as Grow Index of Tealeaves and Tea Estate Monitoring with Network Cameras","authors":"K. Arai","doi":"10.1109/ITNG.2009.57","DOIUrl":"https://doi.org/10.1109/ITNG.2009.57","url":null,"abstract":"Estimation Method for total nitrogen and fiber which are contained in tealeaves is proposed together with a method for tea estate monitoring with network cameras due to a fact that Near Infrared: NIR camera data shows a good correlation to total nitrogen. Through a comparison between actual direct measured and the estimated total nitrogen and fiber contents shows a good correlation so that a validity of the proposed method is confirmed. Also it is found that monitoring of a grow index of tealeaves with bi-directional reflectance distribution function measured with networks cameras is capable. Thus it is concluded that a monitoring of tea estates is capable with network cameras of visible and NIR.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125267139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applying Domain-Specific Modeling to Mobile Health Monitoring Applications 将特定于领域的建模应用于移动运行状况监视应用程序
Florence T. Balagtas-Fernandez, H. Hussmann
{"title":"Applying Domain-Specific Modeling to Mobile Health Monitoring Applications","authors":"Florence T. Balagtas-Fernandez, H. Hussmann","doi":"10.1109/ITNG.2009.14","DOIUrl":"https://doi.org/10.1109/ITNG.2009.14","url":null,"abstract":"This paper introduces a conceptual framework and process that aims to simplify the development of applications for mobile devices. We specialize on the domain of health monitoring by providing a whole system that would allow people to model their own mobile health monitoring applications in a simplified manner without dealing with low-level coding themselves.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130791736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lessons Learned from a Survey of Web Applications Testing 从Web应用程序测试调查中学到的经验教训
Ben W. Y. Kam, T. Dean
{"title":"Lessons Learned from a Survey of Web Applications Testing","authors":"Ben W. Y. Kam, T. Dean","doi":"10.1109/ITNG.2009.306","DOIUrl":"https://doi.org/10.1109/ITNG.2009.306","url":null,"abstract":"A study from the Business Internet Group San Francisco (BIG-SF) reported approximately 70% of websites contain bugs (resided in both static pages and dynamic pages) and suffer some kind of failure. Interestingly, these sites include not only commercial websites but also US government managed websites. It is our objective to better understand why testers are unable to reveal certain kind of bugs. We have reviewed several testing methods, summarized their techniques, and listed the kinds of problems that can or cannot be tested. Consequently, we suggest a complementary solution by re-using the existing methods for web applications testing that may prove fruitful.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116571680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Proposesd Ontology for Effective Searching of Sharable Content Objects Emphasizing on Learning Objectives 一种强调学习目标的可共享内容对象有效搜索的提议本体
A. Kardan, Shima Zahmatkesh
{"title":"A Proposesd Ontology for Effective Searching of Sharable Content Objects Emphasizing on Learning Objectives","authors":"A. Kardan, Shima Zahmatkesh","doi":"10.1109/ITNG.2009.322","DOIUrl":"https://doi.org/10.1109/ITNG.2009.322","url":null,"abstract":"Discovery of an appropriate learning object according to the needs and interests of a client is one of the major challenges. Although SCORM presents some approaches for content reusability but efficient searching process is a significant problem yet. Under SCORM definition a learning content is packed as a Sharable Content Object (SCO). Some approaches like Semantic Web and Ontology were proposed for resource searching in the web. In this work, we would introduce ontology for discovering learning objects with emphasizing on the SCO's. Focusing on Learning Objectives is the significant innovation of this work. In this research, we assessed related works and centred our attention on their most significant common concepts. Then, some new concepts were added to complete our proposed ontology.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"94 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131024986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Teaching Object-Oriented Programming with Games 基于游戏的面向对象编程教学
Lu Yan
{"title":"Teaching Object-Oriented Programming with Games","authors":"Lu Yan","doi":"10.1109/ITNG.2009.13","DOIUrl":"https://doi.org/10.1109/ITNG.2009.13","url":null,"abstract":"First-year students in CS/IT curriculum are often overwhelmed by the introduction to programming module, which is a mandatory component for the whole study program. In this paper, we discuss the difficulties students may encounter in this module and propose a novel approach to teaching programming to new programmer with games. We reflect on our experiences on making the programming module friendly and improving the success rate among new programmers. We present our learning theory, teaching methodology and assistive software with technical details.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134240325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Modeling Situation-Aware Ambient Assisted Living Systems for Eldercare 情境感知环境养老辅助系统建模
W. Kurschl, Stefan Mitsch, J. Schönböck
{"title":"Modeling Situation-Aware Ambient Assisted Living Systems for Eldercare","authors":"W. Kurschl, Stefan Mitsch, J. Schönböck","doi":"10.1109/ITNG.2009.25","DOIUrl":"https://doi.org/10.1109/ITNG.2009.25","url":null,"abstract":"The development of ambient assisted living (AAL) systems, which are tailored to health or elder care, requires specific methods and tools. AAL systems make often use of wireless sensor networks, machine learning algorithms and sensory devices. Since wireless sensor networks and their sensors are inhomogeneous, it became apparent that such systems need to cope with different hardware platforms, different programming languages, unreliable wireless communication, energy constraints, data analysis algorithms, recognition of situations, and deployment options. Developers to date tend to use a bottom-up approach: hardware components dictate the development of AAL systems and thereby restrict the range of use cases that can be realized; domain experts by contrast would prefer a top-down approach and model the system’s functionality independently from the hardware platform. Currently available software development environments and tools do not adequately support domain experts and developers to accomplish these tasks efficiently. This paper presents methods that support domain experts in their top-down approach, as well as technically experienced developers in their bottom-up approach. The implemented tools enable a model-driven software development process (from platform-independent modeling to generating AAL application code) and thus facilitate programming AAL systems.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134645087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信