{"title":"Secure User Authentication in Multimedia Systems","authors":"S. Shah, Fazl e Hadi, F. B. Muhaya","doi":"10.1109/FUTURETECH.2010.5482691","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482691","url":null,"abstract":"The security of multimedia systems is becoming extremely important nowadays. The huge growth of multimedia information, in different format with the rise of technology, and services influences the lifestyle of an individual and industry. Despite of recent progress in multimedia information security, accessing the information and online services require username and password which can be captured by shoulder surfing attack. Thus current multimedia authentication systems do not provide adequate security and unscrupulous users are able to use the stolen credentials. This paper discusses existing authentication systems, all authentication factors and describes a general architecture of user authentication. This study proposes the usage of secure authentication system by using Bluetooth technology to make hard shoulder surfing (SS) attack and increase the faith of users by resolving the problem of identity theft.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134645262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interaction Design Issues in Smart Home Environments","authors":"K. Fujinami","doi":"10.1109/FUTURETECH.2010.5482711","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482711","url":null,"abstract":"The advancement of technologies allowed us to provide and access huge amount of information and services anytime, anywhere, and to realize smart home environment. Major challenges include retrieving and perceiving information, sustaining attention to information, and maintaining awareness of changes in information in an unobtrusive manner. In this paper, we describe the design issues of interaction in a system that address the challenges. The system shows information related to a user's current task, in which a user's context is recognized through the state of usage of sensor augmented daily objects, and given to a system as an input. We show a basic model of the interaction, i.e. implicit interaction, and discuss the implications for the design based on four studies.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133985976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting Secure Embedded Access Control Policy with XACML+XML Security","authors":"G. Hsieh, Ryan Meeks, L. Marvel","doi":"10.1109/FUTURETECH.2010.5482714","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482714","url":null,"abstract":"XACML has become the de facto standard for expressing access control policy. Similarly, XML security standards, such as XML encryption and XML digital signature, have been widely deployed for protecting the confidentiality, authenticity and integrity of digital information. In this paper we present a framework of using XACML and XML security to support secure, embedded and fine-grained access control policy. The basic idea is to extend XACML such that access control policy can be embedded with the digital content in the same XACML document. The original content can be further divided into multiple parts, each of which is encapsulated by its own access control policy. The integrated XACML policy and content document is further protected using XML encryption and digital signature. This framework and associated security methods are designed to facilitate the protection, management and sharing of sensitive information.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123782163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach to Improve the Accuracy of Web Retrieval","authors":"V. Klyuev, V. Oleshchuk","doi":"10.1109/FUTURETECH.2010.5482671","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482671","url":null,"abstract":"General purpose search engines utilize a very simple view on text documents: They consider them as bags of words. It results that after indexing, the semantics of documents is lost. In this paper, we introduce a novel approach to improve the accuracy of Web retrieval. We utilize the WordNet and WordNet SenseRelate All Words Software as main tools to preserve the semantics of the sentences of documents and user queries. Nouns and verbs in the WordNet are organized in the tree hierarchies. The word meanings are presented by numbers that reference to the nodes on the semantic tree. The meaning of each word in the sentence is calculated when the sentence is analyzed. The goal is to put each noun and verb of the sentence on the right place on the tree. Taking this information into account, it is possible to solve the ambiguity problem for the query keywords and create the indicative summaries taking into account query words, and semantically related hypernyms and synonyms.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote Deposit Capture in the Consumer's Hands","authors":"J. Henkel, J. Zhan","doi":"10.1109/FUTURETECH.2010.5482635","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482635","url":null,"abstract":"The manner in which financial institutions offer payment processing to their customers and business partners has been ever evolving hand in hand with various evolving technologies. Remote Deposit Capture, one such payment process system, offers itself as one of the most popular systems in the financial sector today. The appeal to allow merchants to be able to deposit checks from their business locations without coming into the physical bank has presented itself as true business differentiator for financial institutions and affected the way that they operate. With more and more technologies utilizing mobile banking and such technologies it is only a matter of time before financial institution customers are going to be able to carry out Remote Deposit Capture (RDC) with mechanisms such as mobile devices. The overall understanding of implementing this technology is very lacking in terms of understanding what type of customer system is right, what types of risks such a system brings, and what is expected to be on the horizon for such a system in the future.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127466020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Logic Decision Making for an Intelligent Home Healthcare System","authors":"T. Gatton, Malrey Lee","doi":"10.1109/FUTURETECH.2010.5482667","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482667","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiences in Lightweight Event Relaying Framework Design","authors":"M. Polojarvi, J. Riekki","doi":"10.1109/FUTURETECH.2010.5482647","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482647","url":null,"abstract":"In software development there is always the need for faster development process. One way to speed up the process is to reuse existing components, in which loose coupling of the components is an important prerequisite. Publish/subscribe is one popular way to provide loose coupling, and there exists many middleware solutions for it. However, most such solutions are aimed for large inter-device networks, and are poorly suited for resource-constrained low-level contexts. As our solution we present the design of SERF, a novel lightweight software framework implementing pub/sub event messaging and peer-to-peer architectures. We also describe the experiences and lessons learned that led to the development of the framework. Upon analysis we find out that SERF offers the advantages of loosely coupled modules and pub/sub, but also point out that the framework is less suitable outside its framed problem area.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123075144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-Power Embedded LDPC-H.264 Joint Decoding Architecture Based on Unequal Error Protection","authors":"Yoon Seok Yang, G. Choi","doi":"10.1109/FUTURETECH.2010.5482744","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482744","url":null,"abstract":"This paper presents a low-power embedded LDPC-H.264 decoding architecture to lower the baseband energy consumption of a channel decoder using joint source decoding and dynamic voltage and frequency scaling (DVFS). This method is developed for H.264 layered (data partitioned) video transmission over Low Density Parity Check (LDPC) codec. We exploit the fact that not all transmitted data require the same level of error protection; this is known as unequal error protection (UEP). In particular, we use variable iteration LDPC decoding along with H.264 data partitioning (DP). In this scheme, we determine and use the lowest values of iterations that are needed by the decoder to achieve pre-specified image qualities at the receiver, and apply DVFS to minimize power.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128373490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measure Large Scale Network Security Using Adjacency Matrix Attack Graphs","authors":"Tao Long, David Chen, R. Song","doi":"10.1109/FUTURETECH.2010.5482734","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482734","url":null,"abstract":"An Attack Graph capable of disclosing causal relationships between multiple vulnerabilities has become a desirable tool for administrators to analyze and locate potential risks to protect critical networked resources against internal or external multi-step attacks. However, probabilistic security metric computations, using currently applied attack graphs, have complexity problems due to their scale. It is hard or even impossible for current attack graphs to be applied to large scale networks. This paper proposes a novel approach that combines the advantages of exploit-dependency attack graphs and adjacency matrices, which results in quadratic complexity. We first give a motivating example to introduce the approach. We then define the adjacency matrix attack graphs. We show that computing probabilistic cumulative scores by means of adjacency matrix attack graphs is efficient and readily scalable.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionWhat Damage the Object-Oriented Program by Friendship","authors":"Jin-Cherng Lin, Pei-Wu Chou, Chu-Ting Chang","doi":"10.1109/FUTURETECH.2010.5482755","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482755","url":null,"abstract":"Friend keyword is a special syntax only in C++. Friend construct in C++ programming language is a violation of encapsulation, that will made default program become more and more difficult and complex. This paper will discuss how friend destroy the C++ programming language, and investigate this fault and the misunderstanding friend. This paper provides an estimate the polymorphism defects in design stage with friend. This metric can provide early information for developer on modify, redesign the system and find another way to fix these defect as well.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122402544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}