BigDataSecurity/HPSC/IDS最新文献

筛选
英文 中文
Arithmetic Correlation Used in Mobile Cloud ID-Based Multiple Authentication 基于移动云id的多重认证算法关联
BigDataSecurity/HPSC/IDS Pub Date : 1900-01-01 DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.10
Huijuan Wang, Yong Jiang, Gao-Feng Zhan, Ruijun Shi
{"title":"Arithmetic Correlation Used in Mobile Cloud ID-Based Multiple Authentication","authors":"Huijuan Wang, Yong Jiang, Gao-Feng Zhan, Ruijun Shi","doi":"10.1109/BigDataSecurity-HPSC-IDS.2016.10","DOIUrl":"https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.10","url":null,"abstract":"","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123438237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Program Chairs HPSC 2022 HPSC 2022项目主席致辞
BigDataSecurity/HPSC/IDS Pub Date : 1900-01-01 DOI: 10.1109/BigDataSecurityHPSCIDS54978.2022.00008
Cheng Zhang, Keke Gai, Jihe Wang
{"title":"Message from the Program Chairs HPSC 2022","authors":"Cheng Zhang, Keke Gai, Jihe Wang","doi":"10.1109/BigDataSecurityHPSCIDS54978.2022.00008","DOIUrl":"https://doi.org/10.1109/BigDataSecurityHPSCIDS54978.2022.00008","url":null,"abstract":"","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126487750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust Model for Secure and Reliable Cloud Service Systems 安全可靠的云服务系统信任模型
BigDataSecurity/HPSC/IDS Pub Date : 1900-01-01 DOI: 10.1109/BDS/HPSC/IDS18.2018.00032
Wenwen Gong, Chengming Zhang, Qing Cheng, Hang Zhang
{"title":"A Trust Model for Secure and Reliable Cloud Service Systems","authors":"Wenwen Gong, Chengming Zhang, Qing Cheng, Hang Zhang","doi":"10.1109/BDS/HPSC/IDS18.2018.00032","DOIUrl":"https://doi.org/10.1109/BDS/HPSC/IDS18.2018.00032","url":null,"abstract":"With the ever-increasing popularity of cloud computing technology, many enterprises and organizations have migrated their business applications to the cloud platform, thus forming a cloud service system that hosts various cloud services. A user can browse, select and invoke his/her interested services from the cloud service system and rate the service quality through online feedback or ratings. Such user ratings contribute much to the healthy running of the cloud service system. However, the fake ratings from potential malicious users can affect the fairness of cloud service system's trust model negatively and severely, even misleading the future users' service selection decisions. Therefore, it is becoming a necessity to build a find-grained trust model that can effectively punish the malicious ratings, for the security and reliability of the cloud service system. In view of this challenge, in this paper, we put forward a novel punishment approach for malicious ratings based on three criteria, i.e., cost, profit and risk. More concretely, we analyze each criterion as well as its influencing factors and put forward a unified model that integrates the three criteria quantitatively.","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127364128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Program Chairs IDS 2022 来自IDS 2022项目主席的信息
BigDataSecurity/HPSC/IDS Pub Date : 1900-01-01 DOI: 10.1109/BigDataSecurityHPSCIDS54978.2022.00010
Han Qiu, Luna Li, L. Kong
{"title":"Message from the Program Chairs IDS 2022","authors":"Han Qiu, Luna Li, L. Kong","doi":"10.1109/BigDataSecurityHPSCIDS54978.2022.00010","DOIUrl":"https://doi.org/10.1109/BigDataSecurityHPSCIDS54978.2022.00010","url":null,"abstract":"","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach for End-to-End (E2E) Security of 5G Applications 5G应用端到端安全解决方案
BigDataSecurity/HPSC/IDS Pub Date : 1900-01-01 DOI: 10.1109/BDS/HPSC/IDS18.2018.00038
K. A. Kumari, G. Sadasivam, S. Gowri, S. A. Akash, E. G. Radhika
{"title":"An Approach for End-to-End (E2E) Security of 5G Applications","authors":"K. A. Kumari, G. Sadasivam, S. Gowri, S. A. Akash, E. G. Radhika","doi":"10.1109/BDS/HPSC/IDS18.2018.00038","DOIUrl":"https://doi.org/10.1109/BDS/HPSC/IDS18.2018.00038","url":null,"abstract":"As 5G transitions from an industrial vision to a tangible, next-generation mobile technology, security remains key business driver. Heterogeneous environment, new networking paradigms and novel use cases makes 5G vulnerable to new security threats. This in turn necessitates a flexible and dependable security mechanism. End-to-End (E2E) data protection provides better security, avoids repeated security operations like encryption/decryption and provides differentiated security based on the services. E2E security deals with authentication, integrity, key management and confidentiality. The attack surface of a 5G system is larger as 5G aims for a heterogeneous networked society. Hence attack resistance needs to be a design consideration when defining new 5G protocols. This framework has been designed for accessing the manifold applications with high security and trust by offering E2E security for various services. The proposed framework is evaluated based on computation complexity, communication complexity, attack resistance rate and security defensive rate. The protocol is also evaluated for correctness, and resistance against passive, active and dictionary attacks using random oracle model and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool.","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Component Based Graphical Parallel Programming Approach for Numerical Simulation Development 一种基于组件的图形并行编程方法用于数值模拟开发
BigDataSecurity/HPSC/IDS Pub Date : 1900-01-01 DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.15
Li Liao, Z. Mo, Aiqing Zhang
{"title":"A Component Based Graphical Parallel Programming Approach for Numerical Simulation Development","authors":"Li Liao, Z. Mo, Aiqing Zhang","doi":"10.1109/BigDataSecurity-HPSC-IDS.2016.15","DOIUrl":"https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.15","url":null,"abstract":"","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"94 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Program Chairs BigDataSecurity 2022 来自BigDataSecurity 2022项目主席的信息
BigDataSecurity/HPSC/IDS Pub Date : 1900-01-01 DOI: 10.1109/BigDataSecurityHPSCIDS54978.2022.00006
Yonghao Wang, Shui Yu, Yongxin Zhu
{"title":"Message from the Program Chairs BigDataSecurity 2022","authors":"Yonghao Wang, Shui Yu, Yongxin Zhu","doi":"10.1109/BigDataSecurityHPSCIDS54978.2022.00006","DOIUrl":"https://doi.org/10.1109/BigDataSecurityHPSCIDS54978.2022.00006","url":null,"abstract":"","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信