K. Ohzeki, Yuanyu Wei, Masaaki Kajihara, M. Takatsuka, Y. Hirakawa, Toru Sugimoto
{"title":"Authentication System Using Encrypted Discrete Biometrics Data","authors":"K. Ohzeki, Yuanyu Wei, Masaaki Kajihara, M. Takatsuka, Y. Hirakawa, Toru Sugimoto","doi":"10.1007/978-3-319-08593-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_16","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125056391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Chatziadam, Ioannis G. Askoxylakis, N. Petroulakis, Alexandros G. Fragkiadakis
{"title":"Early Warning Intrusion Detection System","authors":"P. Chatziadam, Ioannis G. Askoxylakis, N. Petroulakis, Alexandros G. Fragkiadakis","doi":"10.1007/978-3-319-08593-7_22","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_22","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131857158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community-driven reviewing and validation of publications","authors":"G. Fursin, Christophe Dubach","doi":"10.1145/2618137.2618142","DOIUrl":"https://doi.org/10.1145/2618137.2618142","url":null,"abstract":"In this report, we share our practical experience on crowdsourcing evaluation of research artifacts and reviewing of publications since 2008. We also briey discuss encountered problems including reproducibility of experimental results and possible solutions.","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"20 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114117074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CARE, the comprehensive archiver for reproducible execution","authors":"Yves Janin, Cédric Vincent, Rémi Duraffort","doi":"10.1145/2618137.2618138","DOIUrl":"https://doi.org/10.1145/2618137.2618138","url":null,"abstract":"We present CARE, the Comprehensive Archiver for Reproducible Execution on Linux. CARE runs in userland, requires no setup and performs a single task: building an archive that contains selected executables and files accessed by a given application during an observation run. To reproduce computational results from this initial run, it is then enough to unpack the archive that comes equipped with all necessary tools for re-execution in a confined environment.\u0000 Technically, CARE leverages on PRoot, a generic system call interposition engine that relies on the ptrace mechanism to monitor (and if needed to modify) system calls emitted by applications under scrutiny. PRoot is extensible and CARE is properly speaking an extension of PRoot. CARE is available on x86_64, x86 and ARM processors, and benefits from a new history-based algorithm that automatically selects files to be stored in a CARE archive.","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133035686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Academia 2.0: removing the publisher middle-man while retaining impact","authors":"R. Poss, S. Altmeyer, Mark Thompson, Rob Jelier","doi":"10.1145/2618137.2618139","DOIUrl":"https://doi.org/10.1145/2618137.2618139","url":null,"abstract":"Recent work on academic publishing has focused on transparency, to eliminate skews in favor of results channeled through already established publishers. This movement, called \"open peer review\", will require infrastructure. So far, proposed realizations of open peer review have relied on centralized coordinating platforms; this is unsatisfactory as this architectural choice stays vulnerable to long-term predatory commercial capture and data loss. Instead, we propose \"Academia 2.0\", a combination of both true peer-to-peer, distributed scientific dissemination channels, and their accompanying workflows for open peer review. It features safe decoupling of storage, indexing and search sites and supports research metrics. Our proposal relies on the existence of semantic web sites for researchers and powerful Internet search engines, an assumption which did not hold 10 years ago. We also introduce post-hoc citations, a key mechanism for quality control, impact measurement and post-hoc credit attribution for previous work. Due to the technology involved, computer engineering is likely the scientific field with the most potential to try out and evaluate our model.","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Falsifiability of network security research: the good, the bad, and the ugly","authors":"D. Gamayunov","doi":"10.1145/2618137.2618141","DOIUrl":"https://doi.org/10.1145/2618137.2618141","url":null,"abstract":"A falsifiability criterion helps us to distinguish between scientific and non-Scientific theories. One may try to raise a question whether this criterion is applicable to the information security research, especially to the intrusion detection and malware research fields. In fact, these research fields seems to fail to satisfy the falsifiability criterion, since they lack the practice of publishing raw experimental data which were used to prove the theories. Existing public datasets like the KDD Cup'99 dataset and VX Heavens virus dataset are outdated. Furthermore, most of current Scientific research projects tend to keep their datasets private. We suggest that the Scientific community should pay more attention to creating and maintaining public open datasets of malware and any kinds of computer attack-related data. But how can we bring this into reality, taking into account legal and privacy concerns?","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134343908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shoaib Sufi, Neil Philippe Chue Hong, S. Hettrick, M. Antonioletti, Steve Crouch, Alexander Hay, D. Inupakutika, M. Jackson, Aleksandra Pawlik, Giacomo Peru, John Robinson, L. Carr, D. D. Roure, C. Goble, Mark Parsons
{"title":"Software in reproducible research: advice and best practice collected from experiences at the collaborations workshop","authors":"Shoaib Sufi, Neil Philippe Chue Hong, S. Hettrick, M. Antonioletti, Steve Crouch, Alexander Hay, D. Inupakutika, M. Jackson, Aleksandra Pawlik, Giacomo Peru, John Robinson, L. Carr, D. D. Roure, C. Goble, Mark Parsons","doi":"10.1145/2618137.2618140","DOIUrl":"https://doi.org/10.1145/2618137.2618140","url":null,"abstract":"The Collaborations Workshop 2014 (CW14) brought together representatives from across the research community to discuss the issues around software's role in reproducible research. In this paper we summarise the themes, practices and ideas raised at the workshop. We also consider how the \"unconference\" format of the CW14 helps in eliciting information and forming future collaborations around aspects of reproducible research. In particular, we describe three distinct areas of concern which emerged from the event: collaboration readiness, capability enhancement and advocacy.","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130418589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PrivLoc: Preventing Location Tracking in Geofencing Services","authors":"J. Bohli, D. Dobre, Ghassan O. Karame, Wenting Li","doi":"10.1007/978-3-319-08593-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_10","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chris Burnett, P. Edwards, T. Norman, Liang Chen, Y. Rahulamathavan, M. Jaffray, E. Pignotti
{"title":"TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas","authors":"Chris Burnett, P. Edwards, T. Norman, Liang Chen, Y. Rahulamathavan, M. Jaffray, E. Pignotti","doi":"10.1007/978-3-642-38908-5_11","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_11","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}