{"title":"A Design Towards Personally Identifiable Information Control and Awareness in OpenID Connect Identity Providers","authors":"R. Weingärtner, C. Westphall","doi":"10.1109/CIT.2017.30","DOIUrl":"https://doi.org/10.1109/CIT.2017.30","url":null,"abstract":"Cloud computing usage has increased in recent years as a consequence of its benefits such as agility on resource provisioning, elasticity, and reduced costs. However, once organizations migrate to cloud environments they lose control of the underlying structure of their applications such as physical networking, storage, and servers. Therefore, the cloud may pose privacy threats to sensitive data that are used to identify users; hence, data stored in identity providers that are deployed on cloud platforms may be accessed by curious/malicious system administrators. We present a design that addresses some privacy issues within the personally identifiable information that is stored in identity providers of federated identity management systems. Further, we provide an overview of the addition of the proposed design into the MITREid OpenID Connect implementation developed by MIT.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114534840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiachen Li, Jing Xu, Wei Liu, Shimin Gong, K. Zeng
{"title":"Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio Networks","authors":"Jiachen Li, Jing Xu, Wei Liu, Shimin Gong, K. Zeng","doi":"10.1109/CIT.2017.63","DOIUrl":"https://doi.org/10.1109/CIT.2017.63","url":null,"abstract":"Passive spectrum monitoring is important for network diagnosis and radio frequency management in spectrum-sharing wireless networks, i.e., cognitive radio network. Most of the related work focused on the sniffer-channel assignment problem, i.e, assigning proper operational channel to wireless sniffers with the aim of tracking and capturing the target signals or data packets. These approaches were usually designed for the scenarios in which the malicious or suspect wireless users are known. In this paper, we focus on the problem of spectrum patrolling, in which the sniffers have no specific targets, but try to patrol the interested temporal, spatial or spectrum areas. Once the periodicity or regularity of the wireless traffics is identified, a patrol path will be developed for routine patrolling. The path planning problem is formulated as a robust reward maximization problem with uncertain channel information. We propose an algorithm to determine the optimal solution and validate it through numerical simulations. Simulation results show that our proposed algorithm can achieve the maximal reward even with unknown information of the user activities.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting the Popularity of Online News Based on Multivariate Analysis","authors":"Caiyun Liu, Wenjie Wang, Yuqing Zhang, Ying Dong, Fannv He, Chensi Wu","doi":"10.1109/CIT.2017.36","DOIUrl":"https://doi.org/10.1109/CIT.2017.36","url":null,"abstract":"An increasing number of online news triggers wide academic concern for the prediction of news popularity, which is affected by users' behaviors and not easy to predict. However, existing methods that predict the popularity of online news after publication are not timely enough, and predicting before publication lacks discriminatory features. This paper explores the variables which may affect news popularity and presents a novel methodology to predict the popularity of online news before publication. Through the observation of news, we first find that grammatical construction of titles can affect news popularity, and experiments show that this feature can improve R^2 statistics of the prediction model by 6.62% exactly. Besides, we improve traditional category and author features by using logarithmic conversion to views first and calculating a score of these features instead of stuffing them into learning models directly. Using these features and two other features, we finally predict news popularity in two aspects: whether the news will be popular and how many views the news ultimately attract.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128623005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rafael Valero-Fernandez, David J. Collins, Colin Rigby, James Bailey
{"title":"Towards Accurate Predictions of Customer Purchasing Patterns","authors":"Rafael Valero-Fernandez, David J. Collins, Colin Rigby, James Bailey","doi":"10.1109/CIT.2017.58","DOIUrl":"https://doi.org/10.1109/CIT.2017.58","url":null,"abstract":"A range of algorithms was used to classify online retail customers of a UK company using historical transaction data. The predictive capabilities of the classifiers were assessed using linear regression, Lasso and regression trees. Unlike most related studies, classifications were based upon specific and marketing focused customer behaviours. Prediction accuracy on untrained customers was generally better than 80%. The models implemented (and compared) for classification were: Logistic Regression, Quadratic Discriminant Analysis, Linear SVM, RBF SVM, Gaussian Process, Decision Tree, Random Forest and Multi-layer Perceptron (Neural Network). Postcode data was then used to classify solely on demographics derived from the UK Land Registry and similar public data sources. Prediction accuracy remained better than 60%.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services","authors":"Madhusanka Liyanage, M. Ylianttila, A. Gurtov","doi":"10.1109/CIT.2017.45","DOIUrl":"https://doi.org/10.1109/CIT.2017.45","url":null,"abstract":"Ethernet based VPLS (Virtual Private LAN Service) networks are now becoming attractive in many enterprise applications due to simple, protocol-independent and cost efficient operation. However, new VPLS applications demand additional requirements, such as elevated security, enhanced scalability and improved flexibility. This paper summarized the results of a thesis which focused to increase the scalability, flexibility and compatibility of secure VPLS networks. First, we propose a scalable secure flat-VPLS architecture based on Host Identity Protocol (HIP) to increase the forwarding and security plane scalability. Then, a secure hierarchical-VPLS architecture has been proposed by extending the previous proposal to achieve control plane scalability as well. To solve the compatibility issues of Spanning Tree Protocol (STP) in VPLS networks, a novel Distributed STP (DSTP) is proposed. Lastly, we propose a novel SDN (Software Defined Networking) based VPLS (SoftVPLS) architecture to overcome tunnel management limitations in legacy secure VPLS architectures. Simulation models and testbed implementations are used to verify the performance of proposed solutions.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multidimensional QoE Assessment of a Simultaneous Transmission Method in Multi-view Video and Audio Transmission with MPEG-DASH","authors":"Yuki Maehara, Toshiro Nunome","doi":"10.1109/CIT.2017.24","DOIUrl":"https://doi.org/10.1109/CIT.2017.24","url":null,"abstract":"This paper proposes a simultaneous transmission method of Multi-View Video and Audio (MVV-A) with MPEG-DASH. In the MPEG-DASH protocol, the server stores multi-bitrate encoded videos in advance and transmits an appropriate video depending on network condition. In the simultaneous transmission method, the minimum bitrate videos of unselected viewpoints are transmitted with the video of the selected viewpoint. When we can select a viewpoint from four viewpoints, we compare the simultaneous transmission method with the selected single viewpoint transmission method. We conduct a subjective experiment under various network conditions and assess QoE.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data Mining-Based Approach for Cardiovascular Dysautonomias Diagnosis and Treatment","authors":"A. Idri, I. Kadi","doi":"10.1109/CIT.2017.28","DOIUrl":"https://doi.org/10.1109/CIT.2017.28","url":null,"abstract":"Autonomic nervous system (ANS) is a control system that acts largely unconsciously and regulates bodily functions. An autonomic malfunction can lead to serious problems related to blood pressure, heart, swallowing, breathing and others. A set of dynamic tests are therefore adopted in ANS units to diagnose and treat patients with cardiovascular dysautonomias. These tests generate big amount of data which are very well suited to be processed using data mining techniques. The purpose of this study is to develop a cardiovascular dysautonomias prediction system to identify the appropriate diagnosis and treatment for patients with cardiovascular dysautonomias using a dataset extracted from the ANS unit of the university hospital Avicenne in Morocco. Classification techniques and association rules were used for the diagnosis and treatment stages respectively. In fact, K-nearest neighbors, C4.5 decision tree algorithm, Random forest, Naïve bayes and Support vector machine were applied to generate the diagnosis classification models and Apriori algorithm was used for generating the association rules. The results obtained for each classifier were analyzed and compared to identify the most efficient one.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdoullah Fath-Allah, Laila Cheikhi, A. Idri, Rafa E. Al-Qutaish
{"title":"A Best Practice Based E-Government Portals’ Maturity Model — A Case Study","authors":"Abdoullah Fath-Allah, Laila Cheikhi, A. Idri, Rafa E. Al-Qutaish","doi":"10.1109/CIT.2017.23","DOIUrl":"https://doi.org/10.1109/CIT.2017.23","url":null,"abstract":"An e-government portal's maturity model is a set of incremental stages that defines the maturity of e-government portals. In fact, these models can be used by e-government agencies to identify the maturity rank of their portal and at the same time provide recommendations and guidelines for agencies to improve their portals' maturity. In previous research studies, we have built an e-government portals' best practice model and a maturity model that is based on the former model. Moreover, we have evaluated the model by a set of experts in the e-government field. The model has proved its validity and reliability within the set of the participants. The aim of this paper is to perform a case study on this maturity model on a real portal. Our findings show that the portal being measured is in the presence stage of maturity.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131406514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kan Zhang, Zichao Zhang, Yanlei Wu, Jin Xu, Yunyun Niu
{"title":"A Core Theory Based Algorithm for Influence Maximization in Social Networks","authors":"Kan Zhang, Zichao Zhang, Yanlei Wu, Jin Xu, Yunyun Niu","doi":"10.1109/CIT.2017.37","DOIUrl":"https://doi.org/10.1109/CIT.2017.37","url":null,"abstract":"The connectivity of large scale complex networks relies on a specific small set of structural nodes which is called the core of the whole network. The influence maximization problem is to identify such set of nodes, known as influencers, who can trigger the maximum range of information propagation in a network, which is one of the most important problems in network science. In this paper, we introduce core theory and simulated annealing algorithm to locate the set of core nodes. The initial active influencer can be acquired by optimally choosing from the core nodes. We compare our method with other alternative algorithms in real-world datasets. The results demonstrate that our method is competitive in both information propagation efficiency and time-consuming in all the diffusion models we consider.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases of City Platform as a Service","authors":"T. Yamakami","doi":"10.1109/CIT.2017.54","DOIUrl":"https://doi.org/10.1109/CIT.2017.54","url":null,"abstract":"As deployment of IoT grows, potential and real conflicts and interference of IoT systems also grow. Many problems are potentially born in the requirement phase. However, the vertical nature of IoT deployment prevents identification of the challenges in the difficult in the early design phase. The author is engaged in a city-area IoT and open data project, and becomes aware that the necessity of systematic methodologies at the requirement phase. The author presents a 3-stage framework of requirement engineering of joint use cases of vertical IoT services.","PeriodicalId":378423,"journal":{"name":"2017 IEEE International Conference on Computer and Information Technology (CIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126139519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}