2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)最新文献

筛选
英文 中文
Time Bounding Event Reasoning in Computer Forensic 计算机取证中的时间边界事件推理
Liu Jun, Zhuohao Guo
{"title":"Time Bounding Event Reasoning in Computer Forensic","authors":"Liu Jun, Zhuohao Guo","doi":"10.1109/CIS.WORKSHOPS.2007.178","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.178","url":null,"abstract":"Timestamps are widely used in computing and offer an easy way to determine the time of events in digital investigations. Unfortunately, the ability of users to change clock settings, the difficult to recover the multi-level overwriting data in a disk, etc. can not provide the efficient timestamp for event reasoning. In this paper, we present techniques to use lay technique to deal with the time of a file on local machine, even its data block of a file had been re-written many times or deleted long ago, and adopt the time offset mechanism to deal with the deviation time of the file at time t. Use a logging mechanism to record the time of modifications to each disk block and its deviation time at time t to calculate the real time of a file for reasoning the order of the events and obtaining a timeline of activities on a file.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130564300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment and Application of ERP Service on Grid 网格上ERP服务的部署与应用
Zhongwen Gao, Ruizhen Duan
{"title":"Deployment and Application of ERP Service on Grid","authors":"Zhongwen Gao, Ruizhen Duan","doi":"10.1109/CIS.WORKSHOPS.2007.56","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.56","url":null,"abstract":"This paper presents an implemental plan to deploy and apply ERP on Vega GOS platform, in which the stability of Vega GOS is guaranteed by dint of the Linux better security. The ERP application can be transplanted into Grid environment by compiling service program and sealing, and then it is realized that the ERP service registered to grid router is transferred by compiling program for client terminal. Additionally, the grid resources are real-time monitored and rationally dispatched by the performance evaluation module in Vega GOS. Finally, the superiority of this application is analyzed over traditional way, including interoperability, expandability, Sharing and the cooperation, High effect, Secure and the reliability and so on.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restricted-Verifier Precise Bounded-Concurrent Zero-Knowledge 限制-验证器精确-有界-并发零知识
Ning Ding, Dawu Gu
{"title":"Restricted-Verifier Precise Bounded-Concurrent Zero-Knowledge","authors":"Ning Ding, Dawu Gu","doi":"10.1109/CIS.WORKSHOPS.2007.186","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.186","url":null,"abstract":"We present a stronger notion of precise bounded-concurrent zero-knowledge. Our notion captures the idea that view of any verifier in a bounded-concurrent interaction can be reconstructed in the almost same time. Precise zero-knowledge in stand-alone setting was introduced by Micali and Pass in STOC'06 and they constructed some precise stand-alone zero-knowledge protocols for NP using at least omega(1) rounds. Via providing a precise simulator for the known O(1)-round bounded-concurrent non-black-box zero-knowledge argument, we show the existence of O(1)- round bounded-concurrent zero-knowledge arguments with polynomial precision for NP. Our result assumes that the ratio of running-time of any adversarial verifier on any two different views in bounded-concurrent execution of the protocol is bounded by na, where a is any predeterminate constant. Such verifiers are called restricted verifiers.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127855322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability Analysis for Grid Services Dynamic Scheduling System 网格服务动态调度系统的稳定性分析
Yang Yang, Weidong Hao, Ming Zeng
{"title":"Stability Analysis for Grid Services Dynamic Scheduling System","authors":"Yang Yang, Weidong Hao, Ming Zeng","doi":"10.1109/CIS.WORKSHOPS.2007.173","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.173","url":null,"abstract":"Grid services and agents are increasingly walking to convergence. In this paper, an autonomy-oriented state space model based on the discrete events is given to describe the grid services dynamic scheduling system which processes a number of heterogeneous jobs concurrently. The stability condition of the grid services dynamic scheduling system is given and proved, then the suitable scheduling policy is found and the stability of the policy is proved. Simulation shows that the mathematical model and its scheduling policy can make the system within a controlled and stable state..","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126840423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Wuhan Railway Transit Project Information System 武汉市轨道交通工程信息系统研究
Zhou Ying, Ding Lie-yun, Zen Guang
{"title":"Study on Wuhan Railway Transit Project Information System","authors":"Zhou Ying, Ding Lie-yun, Zen Guang","doi":"10.1109/CIS.WORKSHOPS.2007.220","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.220","url":null,"abstract":"With the continuous development of the construction management, traditional manners can not satisfy the project managers' requirement. This article applies information technology in construction to enhance the management efficiency. Based on the practice of Wuhan railway transit project, the system design goals, system structure and functionality are explained. Also, it gives the suggestions of improving the system.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123327955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Oriented Secure Routing Protocol of Mobile Agents 面向组的移动代理安全路由协议
Weidong Qiu, Haibin Guan, Xinghao Jiang, Zheng Huang
{"title":"Group Oriented Secure Routing Protocol of Mobile Agents","authors":"Weidong Qiu, Haibin Guan, Xinghao Jiang, Zheng Huang","doi":"10.1109/CIS.WORKSHOPS.2007.17","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.17","url":null,"abstract":"Security is an important issue for the widespread deployment of applications based on software agent technology. Group signature is integrated into secure routing protocol for mobile agents in this paper. The hosts visited by mobile agent are in different groups. The structure of group oriented routing protocol is more clear and nature. Besides, by building trust policies, the risk and loss of DoS attack will be minimized. Furthermore, if DoS attack happens unfortunately, the protocol can identify the malicious host launching the DoS attack. According to the behavior of hosts in past, we can either define an appropriate order in which selected hosts should be visited, or decide which hosts we do not want to contact again.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Binary Trademark Image Retrieval Using Region Orientation Information Entropy 基于区域方向信息熵的二值商标图像检索
Caikou Chen, Q. Sun, Jing-yu Yang
{"title":"Binary Trademark Image Retrieval Using Region Orientation Information Entropy","authors":"Caikou Chen, Q. Sun, Jing-yu Yang","doi":"10.1109/CIS.WORKSHOPS.2007.164","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.164","url":null,"abstract":"This paper presents a new trademark image retrieval method based on the region orientation information entropy. In the first stage, image is rotated according to principal orientation, and the object region in the rotated image is extracted. Then, the object region is partitioned into a lot of sub-blocks. In the third stage, the information entropy of each partitioned region is computed, which construct a feature vector for describing the shape of the image. Finally, the Euclidean distance is adopted to measure the similarity between the images based on the feature vector of each image obtained. Experiments performed on a database containing more than 2,000 trademark images show that the region orientation information entropy keeps good invariance under rotation, translation, scale and the retrieved results satisfy human visual perception very well.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Hybrid EA Approach with Cooperation between Individuals to Substructure Discovery in Graphical Databases 基于个体合作的混合EA方法在图形数据库子结构发现中的应用
Xingong Chang, Minqiang Li, Jisong Kou
{"title":"A Hybrid EA Approach with Cooperation between Individuals to Substructure Discovery in Graphical Databases","authors":"Xingong Chang, Minqiang Li, Jisong Kou","doi":"10.1109/CIS.WORKSHOPS.2007.123","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.123","url":null,"abstract":"A hybrid EA based algorithm is developed to discover potentially usefull substructures from graphical databases. During the searching process, losing instances is very common and vital to the algorithm performance. To address this issue, an individual cooperation operator is proposed, which enables different individuals to search the same substructure in a cooperative way. In addition, a new mechanism is also proposed to preserve the diversity regarding both the composition of an individual and the composition of the whole population. Experimental results show that these hybrid scheme successfully enhances the searching capability of the algorithm and improves the qualities of solutions.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Information Measurement Scheme Based on TPM for Trusted Network Access 基于TPM的可信网络访问信息测量新方案
Lu Chen, Huanguo Zhang, Liqiang Zhang, Liang Cai
{"title":"A New Information Measurement Scheme Based on TPM for Trusted Network Access","authors":"Lu Chen, Huanguo Zhang, Liqiang Zhang, Liang Cai","doi":"10.1109/CIS.WORKSHOPS.2007.83","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.83","url":null,"abstract":"The information measurement of the NAR (network access requester) is the key element for trusted network access. The only issues TNC (trusted network connection) proposed the conception of integrity measurement and pointed out that only if the measurements passed can the NAS ((network access server) let the endpoint enter. But no concrete techniques are expatiated in TNC, and the related specification IMM (integrity measurement model) is too complex to implement. Virtually, the measurement cannot be localized to the integrity. In this paper, a new information measurement architecture is proposed, in which not only the integrity information of the platform, but also the identity of user and platform, and the information of system availability are considered. The related techniques (information collection and verification etc.) are illustrated, and the trust chain transfer is analyzed at the end.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Research of ASW Helicopter ACGF Construction Based on CXBR 基于CXBR的反潜直升机ACGF构建研究
Hu Zheng-tao, Liu Jian
{"title":"The Research of ASW Helicopter ACGF Construction Based on CXBR","authors":"Hu Zheng-tao, Liu Jian","doi":"10.1109/CIS.WORKSHOPS.2007.98","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.98","url":null,"abstract":"In anti-submarine warfare (ASW) simulation system, agent based helicopter computer generated force (ACGF) has been an important and effective CGF by the use of agent AI knowledge. In order to have a better simulation of the behavior of ASW helicopter and to respond to different kinds of interrupts especially for the interrupts of different levels of action, it is essential to build an unusual ASW helicopter agent to the system need of interaction, flexibility and validity, and give a model of the behavior decision and a simulation frame. This article constructs a model of ASW helicopter ACGF on behavior decision making in the method named CXBR after the analysis of system firstly, then classifies the actions of the helicopter ACGF, moreover constructs a database for forces and environment and a database for tactics knowledge, and verifies the validity of the model to the need of system finally.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124935755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信