{"title":"Time Bounding Event Reasoning in Computer Forensic","authors":"Liu Jun, Zhuohao Guo","doi":"10.1109/CIS.WORKSHOPS.2007.178","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.178","url":null,"abstract":"Timestamps are widely used in computing and offer an easy way to determine the time of events in digital investigations. Unfortunately, the ability of users to change clock settings, the difficult to recover the multi-level overwriting data in a disk, etc. can not provide the efficient timestamp for event reasoning. In this paper, we present techniques to use lay technique to deal with the time of a file on local machine, even its data block of a file had been re-written many times or deleted long ago, and adopt the time offset mechanism to deal with the deviation time of the file at time t. Use a logging mechanism to record the time of modifications to each disk block and its deviation time at time t to calculate the real time of a file for reasoning the order of the events and obtaining a timeline of activities on a file.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130564300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deployment and Application of ERP Service on Grid","authors":"Zhongwen Gao, Ruizhen Duan","doi":"10.1109/CIS.WORKSHOPS.2007.56","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.56","url":null,"abstract":"This paper presents an implemental plan to deploy and apply ERP on Vega GOS platform, in which the stability of Vega GOS is guaranteed by dint of the Linux better security. The ERP application can be transplanted into Grid environment by compiling service program and sealing, and then it is realized that the ERP service registered to grid router is transferred by compiling program for client terminal. Additionally, the grid resources are real-time monitored and rationally dispatched by the performance evaluation module in Vega GOS. Finally, the superiority of this application is analyzed over traditional way, including interoperability, expandability, Sharing and the cooperation, High effect, Secure and the reliability and so on.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Restricted-Verifier Precise Bounded-Concurrent Zero-Knowledge","authors":"Ning Ding, Dawu Gu","doi":"10.1109/CIS.WORKSHOPS.2007.186","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.186","url":null,"abstract":"We present a stronger notion of precise bounded-concurrent zero-knowledge. Our notion captures the idea that view of any verifier in a bounded-concurrent interaction can be reconstructed in the almost same time. Precise zero-knowledge in stand-alone setting was introduced by Micali and Pass in STOC'06 and they constructed some precise stand-alone zero-knowledge protocols for NP using at least omega(1) rounds. Via providing a precise simulator for the known O(1)-round bounded-concurrent non-black-box zero-knowledge argument, we show the existence of O(1)- round bounded-concurrent zero-knowledge arguments with polynomial precision for NP. Our result assumes that the ratio of running-time of any adversarial verifier on any two different views in bounded-concurrent execution of the protocol is bounded by na, where a is any predeterminate constant. Such verifiers are called restricted verifiers.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127855322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stability Analysis for Grid Services Dynamic Scheduling System","authors":"Yang Yang, Weidong Hao, Ming Zeng","doi":"10.1109/CIS.WORKSHOPS.2007.173","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.173","url":null,"abstract":"Grid services and agents are increasingly walking to convergence. In this paper, an autonomy-oriented state space model based on the discrete events is given to describe the grid services dynamic scheduling system which processes a number of heterogeneous jobs concurrently. The stability condition of the grid services dynamic scheduling system is given and proved, then the suitable scheduling policy is found and the stability of the policy is proved. Simulation shows that the mathematical model and its scheduling policy can make the system within a controlled and stable state..","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126840423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Wuhan Railway Transit Project Information System","authors":"Zhou Ying, Ding Lie-yun, Zen Guang","doi":"10.1109/CIS.WORKSHOPS.2007.220","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.220","url":null,"abstract":"With the continuous development of the construction management, traditional manners can not satisfy the project managers' requirement. This article applies information technology in construction to enhance the management efficiency. Based on the practice of Wuhan railway transit project, the system design goals, system structure and functionality are explained. Also, it gives the suggestions of improving the system.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123327955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Group Oriented Secure Routing Protocol of Mobile Agents","authors":"Weidong Qiu, Haibin Guan, Xinghao Jiang, Zheng Huang","doi":"10.1109/CIS.WORKSHOPS.2007.17","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.17","url":null,"abstract":"Security is an important issue for the widespread deployment of applications based on software agent technology. Group signature is integrated into secure routing protocol for mobile agents in this paper. The hosts visited by mobile agent are in different groups. The structure of group oriented routing protocol is more clear and nature. Besides, by building trust policies, the risk and loss of DoS attack will be minimized. Furthermore, if DoS attack happens unfortunately, the protocol can identify the malicious host launching the DoS attack. According to the behavior of hosts in past, we can either define an appropriate order in which selected hosts should be visited, or decide which hosts we do not want to contact again.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Binary Trademark Image Retrieval Using Region Orientation Information Entropy","authors":"Caikou Chen, Q. Sun, Jing-yu Yang","doi":"10.1109/CIS.WORKSHOPS.2007.164","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.164","url":null,"abstract":"This paper presents a new trademark image retrieval method based on the region orientation information entropy. In the first stage, image is rotated according to principal orientation, and the object region in the rotated image is extracted. Then, the object region is partitioned into a lot of sub-blocks. In the third stage, the information entropy of each partitioned region is computed, which construct a feature vector for describing the shape of the image. Finally, the Euclidean distance is adopted to measure the similarity between the images based on the feature vector of each image obtained. Experiments performed on a database containing more than 2,000 trademark images show that the region orientation information entropy keeps good invariance under rotation, translation, scale and the retrieved results satisfy human visual perception very well.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid EA Approach with Cooperation between Individuals to Substructure Discovery in Graphical Databases","authors":"Xingong Chang, Minqiang Li, Jisong Kou","doi":"10.1109/CIS.WORKSHOPS.2007.123","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.123","url":null,"abstract":"A hybrid EA based algorithm is developed to discover potentially usefull substructures from graphical databases. During the searching process, losing instances is very common and vital to the algorithm performance. To address this issue, an individual cooperation operator is proposed, which enables different individuals to search the same substructure in a cooperative way. In addition, a new mechanism is also proposed to preserve the diversity regarding both the composition of an individual and the composition of the whole population. Experimental results show that these hybrid scheme successfully enhances the searching capability of the algorithm and improves the qualities of solutions.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Information Measurement Scheme Based on TPM for Trusted Network Access","authors":"Lu Chen, Huanguo Zhang, Liqiang Zhang, Liang Cai","doi":"10.1109/CIS.WORKSHOPS.2007.83","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.83","url":null,"abstract":"The information measurement of the NAR (network access requester) is the key element for trusted network access. The only issues TNC (trusted network connection) proposed the conception of integrity measurement and pointed out that only if the measurements passed can the NAS ((network access server) let the endpoint enter. But no concrete techniques are expatiated in TNC, and the related specification IMM (integrity measurement model) is too complex to implement. Virtually, the measurement cannot be localized to the integrity. In this paper, a new information measurement architecture is proposed, in which not only the integrity information of the platform, but also the identity of user and platform, and the information of system availability are considered. The related techniques (information collection and verification etc.) are illustrated, and the trust chain transfer is analyzed at the end.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of ASW Helicopter ACGF Construction Based on CXBR","authors":"Hu Zheng-tao, Liu Jian","doi":"10.1109/CIS.WORKSHOPS.2007.98","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.98","url":null,"abstract":"In anti-submarine warfare (ASW) simulation system, agent based helicopter computer generated force (ACGF) has been an important and effective CGF by the use of agent AI knowledge. In order to have a better simulation of the behavior of ASW helicopter and to respond to different kinds of interrupts especially for the interrupts of different levels of action, it is essential to build an unusual ASW helicopter agent to the system need of interaction, flexibility and validity, and give a model of the behavior decision and a simulation frame. This article constructs a model of ASW helicopter ACGF on behavior decision making in the method named CXBR after the analysis of system firstly, then classifies the actions of the helicopter ACGF, moreover constructs a database for forces and environment and a database for tactics knowledge, and verifies the validity of the model to the need of system finally.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124935755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}