Trust and Trustworthy Computing最新文献

筛选
英文 中文
Authentication System Using Encrypted Discrete Biometrics Data 使用加密离散生物特征数据的认证系统
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_16
K. Ohzeki, Yuanyu Wei, Masaaki Kajihara, M. Takatsuka, Y. Hirakawa, Toru Sugimoto
{"title":"Authentication System Using Encrypted Discrete Biometrics Data","authors":"K. Ohzeki, Yuanyu Wei, Masaaki Kajihara, M. Takatsuka, Y. Hirakawa, Toru Sugimoto","doi":"10.1007/978-3-319-08593-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_16","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125056391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Early Warning Intrusion Detection System 预警入侵检测系统
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_22
P. Chatziadam, Ioannis G. Askoxylakis, N. Petroulakis, Alexandros G. Fragkiadakis
{"title":"Early Warning Intrusion Detection System","authors":"P. Chatziadam, Ioannis G. Askoxylakis, N. Petroulakis, Alexandros G. Fragkiadakis","doi":"10.1007/978-3-319-08593-7_22","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_22","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131857158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents - (Extended Abstract) 为及时应对紧急动物疾病事件而建立可信合作的挑战-(扩展摘要)
Trust and Trustworthy Computing Pub Date : 2014-06-30 DOI: 10.1007/978-3-319-08593-7_15
J. Zic
{"title":"Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents - (Extended Abstract)","authors":"J. Zic","doi":"10.1007/978-3-319-08593-7_15","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_15","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132540344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community-driven reviewing and validation of publications 社区驱动的出版物评审和验证
Trust and Trustworthy Computing Pub Date : 2014-06-09 DOI: 10.1145/2618137.2618142
G. Fursin, Christophe Dubach
{"title":"Community-driven reviewing and validation of publications","authors":"G. Fursin, Christophe Dubach","doi":"10.1145/2618137.2618142","DOIUrl":"https://doi.org/10.1145/2618137.2618142","url":null,"abstract":"In this report, we share our practical experience on crowdsourcing evaluation of research artifacts and reviewing of publications since 2008. We also briey discuss encountered problems including reproducibility of experimental results and possible solutions.","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"20 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114117074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
CARE, the comprehensive archiver for reproducible execution 可重复执行的综合归档器
Trust and Trustworthy Computing Pub Date : 2014-06-09 DOI: 10.1145/2618137.2618138
Yves Janin, Cédric Vincent, Rémi Duraffort
{"title":"CARE, the comprehensive archiver for reproducible execution","authors":"Yves Janin, Cédric Vincent, Rémi Duraffort","doi":"10.1145/2618137.2618138","DOIUrl":"https://doi.org/10.1145/2618137.2618138","url":null,"abstract":"We present CARE, the Comprehensive Archiver for Reproducible Execution on Linux. CARE runs in userland, requires no setup and performs a single task: building an archive that contains selected executables and files accessed by a given application during an observation run. To reproduce computational results from this initial run, it is then enough to unpack the archive that comes equipped with all necessary tools for re-execution in a confined environment.\u0000 Technically, CARE leverages on PRoot, a generic system call interposition engine that relies on the ptrace mechanism to monitor (and if needed to modify) system calls emitted by applications under scrutiny. PRoot is extensible and CARE is properly speaking an extension of PRoot. CARE is available on x86_64, x86 and ARM processors, and benefits from a new history-based algorithm that automatically selects files to be stored in a CARE archive.","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133035686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Academia 2.0: removing the publisher middle-man while retaining impact 学术界2.0:在保留影响力的同时去掉出版商中间人
Trust and Trustworthy Computing Pub Date : 2014-06-09 DOI: 10.1145/2618137.2618139
R. Poss, S. Altmeyer, Mark Thompson, Rob Jelier
{"title":"Academia 2.0: removing the publisher middle-man while retaining impact","authors":"R. Poss, S. Altmeyer, Mark Thompson, Rob Jelier","doi":"10.1145/2618137.2618139","DOIUrl":"https://doi.org/10.1145/2618137.2618139","url":null,"abstract":"Recent work on academic publishing has focused on transparency, to eliminate skews in favor of results channeled through already established publishers. This movement, called \"open peer review\", will require infrastructure. So far, proposed realizations of open peer review have relied on centralized coordinating platforms; this is unsatisfactory as this architectural choice stays vulnerable to long-term predatory commercial capture and data loss. Instead, we propose \"Academia 2.0\", a combination of both true peer-to-peer, distributed scientific dissemination channels, and their accompanying workflows for open peer review. It features safe decoupling of storage, indexing and search sites and supports research metrics. Our proposal relies on the existence of semantic web sites for researchers and powerful Internet search engines, an assumption which did not hold 10 years ago. We also introduce post-hoc citations, a key mechanism for quality control, impact measurement and post-hoc credit attribution for previous work. Due to the technology involved, computer engineering is likely the scientific field with the most potential to try out and evaluate our model.","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Falsifiability of network security research: the good, the bad, and the ugly 网络安全研究的可证伪性:好的、坏的和丑陋的
Trust and Trustworthy Computing Pub Date : 2014-06-09 DOI: 10.1145/2618137.2618141
D. Gamayunov
{"title":"Falsifiability of network security research: the good, the bad, and the ugly","authors":"D. Gamayunov","doi":"10.1145/2618137.2618141","DOIUrl":"https://doi.org/10.1145/2618137.2618141","url":null,"abstract":"A falsifiability criterion helps us to distinguish between scientific and non-Scientific theories. One may try to raise a question whether this criterion is applicable to the information security research, especially to the intrusion detection and malware research fields. In fact, these research fields seems to fail to satisfy the falsifiability criterion, since they lack the practice of publishing raw experimental data which were used to prove the theories. Existing public datasets like the KDD Cup'99 dataset and VX Heavens virus dataset are outdated. Furthermore, most of current Scientific research projects tend to keep their datasets private. We suggest that the Scientific community should pay more attention to creating and maintaining public open datasets of malware and any kinds of computer attack-related data. But how can we bring this into reality, taking into account legal and privacy concerns?","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134343908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software in reproducible research: advice and best practice collected from experiences at the collaborations workshop 可重复研究中的软件:从合作研讨会的经验中收集的建议和最佳实践
Trust and Trustworthy Computing Pub Date : 2014-06-09 DOI: 10.1145/2618137.2618140
Shoaib Sufi, Neil Philippe Chue Hong, S. Hettrick, M. Antonioletti, Steve Crouch, Alexander Hay, D. Inupakutika, M. Jackson, Aleksandra Pawlik, Giacomo Peru, John Robinson, L. Carr, D. D. Roure, C. Goble, Mark Parsons
{"title":"Software in reproducible research: advice and best practice collected from experiences at the collaborations workshop","authors":"Shoaib Sufi, Neil Philippe Chue Hong, S. Hettrick, M. Antonioletti, Steve Crouch, Alexander Hay, D. Inupakutika, M. Jackson, Aleksandra Pawlik, Giacomo Peru, John Robinson, L. Carr, D. D. Roure, C. Goble, Mark Parsons","doi":"10.1145/2618137.2618140","DOIUrl":"https://doi.org/10.1145/2618137.2618140","url":null,"abstract":"The Collaborations Workshop 2014 (CW14) brought together representatives from across the research community to discuss the issues around software's role in reproducible research. In this paper we summarise the themes, practices and ideas raised at the workshop. We also consider how the \"unconference\" format of the CW14 helps in eliciting information and forming future collaborations around aspects of reproducible research. In particular, we describe three distinct areas of concern which emerged from the event: collaboration readiness, capability enhancement and advocacy.","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130418589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
PrivLoc: Preventing Location Tracking in Geofencing Services PrivLoc:防止地理围栏服务中的位置跟踪
Trust and Trustworthy Computing Pub Date : 2014-04-18 DOI: 10.1007/978-3-319-08593-7_10
J. Bohli, D. Dobre, Ghassan O. Karame, Wenting Li
{"title":"PrivLoc: Preventing Location Tracking in Geofencing Services","authors":"J. Bohli, D. Dobre, Ghassan O. Karame, Wenting Li","doi":"10.1007/978-3-319-08593-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-08593-7_10","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas 特朗普:一个值得信赖的移动平台,用于农村地区慢性病的自我管理
Trust and Trustworthy Computing Pub Date : 2013-06-17 DOI: 10.1007/978-3-642-38908-5_11
Chris Burnett, P. Edwards, T. Norman, Liang Chen, Y. Rahulamathavan, M. Jaffray, E. Pignotti
{"title":"TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas","authors":"Chris Burnett, P. Edwards, T. Norman, Liang Chen, Y. Rahulamathavan, M. Jaffray, E. Pignotti","doi":"10.1007/978-3-642-38908-5_11","DOIUrl":"https://doi.org/10.1007/978-3-642-38908-5_11","url":null,"abstract":"","PeriodicalId":355592,"journal":{"name":"Trust and Trustworthy Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信