J. ICT Stand.最新文献

筛选
英文 中文
QoXcloud: A Cloud Platform for QoE Evaluation QoXcloud: QoE评估的云平台
J. ICT Stand. Pub Date : 2015-03-30 DOI: 10.13052/JICTS2245-800X.232
Eduardo Saiz, Eva Ibarrola, Leire Cristobo, Ianire Taboada
{"title":"QoXcloud: A Cloud Platform for QoE Evaluation","authors":"Eduardo Saiz, Eva Ibarrola, Leire Cristobo, Ianire Taboada","doi":"10.13052/JICTS2245-800X.232","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.232","url":null,"abstract":"The current financial situation, together with the new market conditions, has led to major changes in the ICT sector over the last few years. Many services that in the past were only offered by operators are now held by third parties through the cloud, which has caused a shift towards new business models at the expense of a more traditional market. Furthermore, these economic changes have conducted to socio-cultural transformations with great impact on the user’s behaviors. In this paper a cloud platform for the measurement and evaluation of the Quality of Experience (QoE) is presented. The platform is based in a model (QoXphere) that ensures the user satisfaction in terms of Quality of Service (QoS) and the provider economic benefits, as demanded in current market situation. In addition, the proposed cloud architecture intends to help in the advance of the work item recently opened in ITU-T to establish an ITU recognition procedure of testing laboratories with competence in ITU-T Recommendations by providing a unified cloud environment in which to validate them.","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"124 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114009819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges of Security Assurance Standardization in ICT 信息通信技术安全保障标准化的挑战
J. ICT Stand. Pub Date : 2014-12-31 DOI: 10.13052/JICTS2245-800X.226
Marcus Wong
{"title":"Challenges of Security Assurance Standardization in ICT","authors":"Marcus Wong","doi":"10.13052/JICTS2245-800X.226","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.226","url":null,"abstract":"The explosion of mobile broadband growth has created a greater demand on the operators and vendors working together to place more and more telecom gears into wireless networks at a record pace to satisfy the users’ insatiable appetite for mobile data. The desire for undiminished security coupled with more sophisticated attacks in an ICT world where the traditionally closed telecom networks are going through a change of open architecture, open platform, and virtualization, the entire telecommunication community has taken a proactive approach to re-evaluate the security assurance process to ensure that the products are as secure as ever. The operators and the vendors have come together under the roof of 3GPP to create such a security assurance standards to be applied, recognized, and accepted in all areas for which 3GPP network products are sold and marketed. This paper will examine the many issues, hurdles, and challenges of the standardization of security assurance.","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121149370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimisation of a TV White Space Broadband Market Model for Rural Entrepreneurs 面向农村企业家的电视白色空间宽带市场模式优化
J. ICT Stand. Pub Date : 2014-12-31 DOI: 10.13052/JICTS2245-800X.223
S. Nleya, A. Bagula, M. Zennaro, E. Pietrosemoli
{"title":"Optimisation of a TV White Space Broadband Market Model for Rural Entrepreneurs","authors":"S. Nleya, A. Bagula, M. Zennaro, E. Pietrosemoli","doi":"10.13052/JICTS2245-800X.223","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.223","url":null,"abstract":"Leveraging on recent TV white space communications developments in regulations, standards initiatives and technology, this paper considers a suitable next generation network comprising of two primary users (PUs) that compete to offer a service to a group of secondary users (SUs) in the form of mesh routers that belong to different entrepreneurs participating in a noncooperative TV white space trading. From a game theoretic perspective the non-cooperativeinteractionofthePUsisviewedasapricingproblemwherein each PU strives to maximize its own profit. Subsequently the problem is formulated as a Bertrand game in an oligopolistic market where the PUs are playerswhoareresponsibleforsellingTVwhitespectruminthemarketwhile the SUs are the players who are the buyers of theTVwhite spectrum.The PUs strategise by way of price adjustment, so much such that SUs tend to favour the lowest price when buying. The inter- operator agreements are based on the delay and throughput QoS performance optimization metrics respectively. A performance evaluation of both models is comparatively performed with regards to parameters such as cost, generated revenue, profit, best response in","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123989808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting and Mitigating Repaying Attack in Expressive Internet Architecture (XIA) 表达性互联网架构(XIA)中还贷攻击的检测与缓解
J. ICT Stand. Pub Date : 2014-12-31 DOI: 10.13052/JICTS2245-800X.225
Beny Nugraha, M. Khondoker, R. Marx, K. Bayarou
{"title":"Detecting and Mitigating Repaying Attack in Expressive Internet Architecture (XIA)","authors":"Beny Nugraha, M. Khondoker, R. Marx, K. Bayarou","doi":"10.13052/JICTS2245-800X.225","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.225","url":null,"abstract":"Several Future Internet (FI) architectures have been proposed to address the problems of the Internet including flexibility (so called IP bottleneck), host-based addressing (addressing a host rather than the content itself), and security. In the beginning of this article, we survey the security solutions of seven FI architectures, namely XIA, RINA, NENA, SONATE, Mobility-First, NDN, and SONATE, based on literatures, prototypes, and demonstrations. It has been found that none of the architectures can fulfill all of the security goals: confidentiality, authentication, integrity and availability. Further in this article, we focus on eXpressive Internet Architecture (XIA) as it is the most secure and open-source Content-Centric Network (CCN). CCN is claimed by the Future Content Networks (FCN) Group to be the Future Internet. However, XIA does not have any mechanisms to mitigate the replaying attack, thus, this article proposes and implements a solution to mitigate it. Several existing solutions have been analyzed to derive the requirements for the proposed solution. By implementing the proposed protocol, XIA is now able to mitigate all of the reviewed network attacks. The evaluation shows that the proposed solution is more secure and less complex over the existing solutions. Journal of ICT, Vol. 2, 151–186. doi: 10.13052/jicts2245-800X.225 c © 2014 River Publishers. All rights reserved. 152 B. Nugraha, R. Khondoker et al.","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"986 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"Cyber Parallel TrafficWorld" Cloud Service in 5G Mobile Networks 5G移动网络中的“网络并行流量世界”云服务
J. ICT Stand. Pub Date : 2014-12-31 DOI: 10.13052/JICTS2245-800X.221
Y. Murata, S. Saito
{"title":"\"Cyber Parallel TrafficWorld\" Cloud Service in 5G Mobile Networks","authors":"Y. Murata, S. Saito","doi":"10.13052/JICTS2245-800X.221","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.221","url":null,"abstract":"","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An EvolutionaryWay to Standardize the Internet of Things 物联网标准化的演进之路
J. ICT Stand. Pub Date : 2014-12-31 DOI: 10.13052/JICTS2245-800X.222
Su-bin Shen, M. Carugi
{"title":"An EvolutionaryWay to Standardize the Internet of Things","authors":"Su-bin Shen, M. Carugi","doi":"10.13052/JICTS2245-800X.222","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.222","url":null,"abstract":"Thecurrentsituationoftechnologyseparationamongthedifferentapplication domainsoftheInternetofThings(IoT)resultsinamarketseparationperapplication domain. This issue hinders the technical innovation and investments in the IoT business. In order to solve the issue, it is necessary to standardize commontechnologiesoftheIoTacrossthedifferentapplicationdomains.This paper argues that a key direction of the future standardization of the IoT, in additiontostandardizingspecifictechnologies,isbuildingoverastandardized newarchitecturereferencemodelfortheIoT.Basedontheanalysisofexisting key activities concerning the standardization of OSI, NGN and IoT from a functional architecture perspective, it suggests that the IoT standardization workbeprogressedinanevolutionarywayinordertoenabletheintegrationof existing technologies, and focus on the interactions among functional entities ordeployablecomponentsoftheIoTtoimposeminimumconstraintsonfuture technical innovations. Topics discussed in the paper include characteristic capabilities of the IoT, ways of integrating the cloud computing technologies in the IoT perspective, and challenges faced by the IoT standardization work.","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127527559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Analysis of RoFSO Links with Diversity Reception for Transmission of OFDM Signals Under Correlated Log-normal Fading Channels 相关对数正态衰落信道下具有分集接收的RoFSO链路传输OFDM信号的性能分析
J. ICT Stand. Pub Date : 2014-12-31 DOI: 10.13052/JICTS2245-800X.224
Fan Bai, Yuwei Su, Takuro Sato
{"title":"Performance Analysis of RoFSO Links with Diversity Reception for Transmission of OFDM Signals Under Correlated Log-normal Fading Channels","authors":"Fan Bai, Yuwei Su, Takuro Sato","doi":"10.13052/JICTS2245-800X.224","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.224","url":null,"abstract":"Freespaceoptical(FSO)communicationhasbeenreceivinggrowingattention with recent commercialization successes as a cost-effective and high bandwidth optical access technique. Meanwhile, FSO communication has been regard as an attractive solution to bridging the gap between the wireless communications and optical fiber communications. However, a significant performance degradation in FSO communication system due to the atmospheric turbulence impairs the transmission performance improvement. FSO system employing the spatial diversity technique can be used to mitigate the effect of turbulence and improve the transmission performance. In this paper, a novel analytical approach is presented to evaluate the transmission performance of OFDM-FSO system with diversity reception considering effect of channel correlation.Adetailed mathematical model for OFDM-FSO system over turbulent channel modeled by correlated Log-normal distribution is provided. Then, We derive the signal-to-noise ratio (SNR), bit error ratio (BER) and outage probability expressions taking into account the diversity combining schemes (i.e. MRC, EGC), effects of atmospheric turbulence, channel correlation and aperture size of receiver lens. The results of this","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128899235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Proposed Identity and Access Management in Future Internet (IAMFI): A Behavioral Modeling Approach 未来互联网中的身份和访问管理(IAMFI):一种行为建模方法
J. ICT Stand. Pub Date : 2014-07-31 DOI: 10.13052/JICTS2245-800X.211
P. NancyAmbritta, P. Railkar, P. Mahalle
{"title":"Proposed Identity and Access Management in Future Internet (IAMFI): A Behavioral Modeling Approach","authors":"P. NancyAmbritta, P. Railkar, P. Mahalle","doi":"10.13052/JICTS2245-800X.211","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.211","url":null,"abstract":"The Future Internet (FI) sees the world of objects completely connected over the Internet all the time. It is like opening one’s network doors of say home, companies and organizations to the world where it increases efficiency but at any case should not compromise security by exposing sensitive information, presenting tremendous challenge towards access control and identity management in FI. A well-managed identity management system should provide necessary tools for controlling user access and access to critical information. A fitting example will be the IoT (Internet of Things) where every object will be smart and will take advantage of cloud for storage and processing power. In this paper we provide an introduction to Identity and access management in FI followed by a simplified architecture of the FI and its components. We then proceed by providing a short description about the frequent threats to data stored on cloud along with possible mitigation techniques to the threats.We also provide a comparative study of existing work on access control and propose a method to overcome the limitation of the existing techniques where sensitive organizational information (access policy) is exposed to the cloud. We address this issue in IAMFI by extending the Attribute based encryption Journal of ICT, Vol. 2 1, 1–36. doi: 10.13052/jicts2245-800X.211 c © 2014 River Publishers. All rights reserved. 2 Nancy Ambritta P. et al. technique and allowing users to have control over their attribute exposure at the time of requesting access. We also provide a mechanism in IAMFI for distributed attribute and key management for various users thereby reducing the overhead at a single site.","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125891525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Traffic Offload Guideline and Required Year of the 50% Traffic Offloading 流量分流指引及50%流量分流所需年份
J. ICT Stand. Pub Date : 2014-07-31 DOI: 10.13052/JICTS2245-800X.212
Shozo Komaki, Naoki Ohshima, Hassan Keshavartz
{"title":"Traffic Offload Guideline and Required Year of the 50% Traffic Offloading","authors":"Shozo Komaki, Naoki Ohshima, Hassan Keshavartz","doi":"10.13052/JICTS2245-800X.212","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.212","url":null,"abstract":"Smart Phone and tablet terminals are widely accepted into mobile society and support wireless cloud service effectively. Terminals generally adopt flat rate tariff and the traffic is increasing rapidly. To solve this problem, new technology developments and new spectrum resource allocations and assignments are intensively executed. However in quite near future, traffic will overcome this action.This paper proposes the traffic offloading to microcells and give numerical guideline of offloading ratio that minimize the total radio base station cost under the existing spectrum resource allotment. First, offload guideline is derived based on the Japanese congested area case study in Shibuya ward, and this guideline is translated and generalized to global circumstances. Using the guideline, the required offloading year is calculated for the high population cities or wards in the world. From the results of the analyses, it is shown that the traffic offloading to microcell is necessary in near future. This result is valuable and inevitable to minimize increasing spectrum allotment to the existing mobile service. To monitor the offload ratio, it is better to analyze social bigdata and the carrier’s bigdata. In the final part, example of Draft Question for ITU-R is proposed.","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124504559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Internet of Things: Architectural Framework for eHealth Security 物联网:电子健康安全的架构框架
J. ICT Stand. Pub Date : 2014-03-31 DOI: 10.13052/JICTS2245-800X.133
D. Lake, R. Milito, M. Morrow, Rajesh Vargheese
{"title":"Internet of Things: Architectural Framework for eHealth Security","authors":"D. Lake, R. Milito, M. Morrow, Rajesh Vargheese","doi":"10.13052/JICTS2245-800X.133","DOIUrl":"https://doi.org/10.13052/JICTS2245-800X.133","url":null,"abstract":"The Internet of Things (IoT) holds big promises for Health Care, especially in Proactive Personal eHealth. To fulfil the promises major challenges must be overcome, particularly regarding privacy and security. This paper explores these issues, discusses use case scenarios, and advances a secure architecture framework. We close the paper with a discussion of the state of various standard organizations, in the conviction of the critical role they will play in making eHealth bloom.","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117059104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信