2010 International Conference on Computational Intelligence and Security最新文献

筛选
英文 中文
A Reliable Service Quality Evaluation Model in the Web Services Community Web服务社区中可靠的服务质量评估模型
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.106
Liping Chen, Guojun Zhang, Weitao Ha
{"title":"A Reliable Service Quality Evaluation Model in the Web Services Community","authors":"Liping Chen, Guojun Zhang, Weitao Ha","doi":"10.1109/CIS.2010.106","DOIUrl":"https://doi.org/10.1109/CIS.2010.106","url":null,"abstract":"As the development of Web service, reliable service quality evaluation has become the key in the service optimization. This paper addresses this problem by proposing a reliable service quality evaluation model in the Web services community. The model initially imports Web service community aiming at evaluation unreliable when involved criterions are beyond service domain. The assistant domain Ontology besides the domain Ontology is defined, and criterion trees and criterion forest are built up to evaluate service reliably. Then in the model a new TFAHP which has fuzzy evaluation adjustment attribute is proposed, and approach of fuzzy comprehensive evaluation is improved. At the same time based on combination of them, a new evaluation algorithm to the model is created. Finally, an experiment is designed and performed to prove the feasibility and effectiveness of the model.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research of Internet of Things' Supporting Technologies Which Face the Logistics Industry 面向物流业的物联网支撑技术研究
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.148
Yuqiang Chen, Jianlan Guo, Xuanzi Hu
{"title":"The Research of Internet of Things' Supporting Technologies Which Face the Logistics Industry","authors":"Yuqiang Chen, Jianlan Guo, Xuanzi Hu","doi":"10.1109/CIS.2010.148","DOIUrl":"https://doi.org/10.1109/CIS.2010.148","url":null,"abstract":"This paper base on the application of the Internet of things in the logistics industry as the breakthrough point, to investigate the identification technology, network structure, middleware technology support and so on, which is used in the Internet of things, also to analyze the bottleneck of technology that the Internet of things could meet. At last, summarize the Internet of things’ application in the logistics industry with the intelligent port architecture.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Scheme for Confidentiality Protection of OpenID Authentication Mechanism OpenID认证机制的机密性保护方案
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.74
Xiangwu Ding, Junyin Wei
{"title":"A Scheme for Confidentiality Protection of OpenID Authentication Mechanism","authors":"Xiangwu Ding, Junyin Wei","doi":"10.1109/CIS.2010.74","DOIUrl":"https://doi.org/10.1109/CIS.2010.74","url":null,"abstract":"Single Sign-On (SSO) means that a user logs in once and gains access to all systems without being prompted to log in again at each of them. As a solution to SSO, OpenID can simplify users’ operation process and reduce the resource provider’s overhead. Its application is becoming popular. However, there are still some security problems in OpenID, such as some confidential resources might be downloaded by some un-granted users. How to implement the confidentiality protection in OpenID authentication mechanism as a problem of multilevel security has become a topic of concern and hence research on the multilevel security of the OpenID is significant. Based on the Single Sign-On solutions, we introduced the basic OpenID infrastructure, including its components, hierarchy and other key issues. Then we proposed a security access control scheme for OpenID based on BLP model, which can be used to solve the problem on access control of multi-level security, and we store the security label in XML document.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115766406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme AMVPayword:安全高效的匿名基于付费字的小额支付方案
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.126
Mona Hosseinkhani Loorak, Ebrahim Tarameshloo, M. Shajari
{"title":"AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme","authors":"Mona Hosseinkhani Loorak, Ebrahim Tarameshloo, M. Shajari","doi":"10.1109/CIS.2010.126","DOIUrl":"https://doi.org/10.1109/CIS.2010.126","url":null,"abstract":"Electronic payment systems are increasingly in need of improvement as they constitute the base for electronic commerce which is rapidly dominating much trade and particularly retail. One such system that allows payments of low value is known as micro payment system the main requirement for which is naturally ‘low cost of transaction’. Pay word is a micro payment system which uses hash chains and achieves better computational performance. It is a credit-based protocol involving a customer, vendor and broker. However, in this system users have to generate a new pay word chain for each vendor from which they make a purchase and also their payment process is not anonymous. MVPayword was an extension to Pay word which enables the user to make purchases from different vendors using only one hash chain. In this paper we shall introduce AMVPayword which is an extension to MVPayword and provides anonymity for customers. So users can be sure about the protection of their privacy in payment system.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115320951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Unsupervised Image Change Detection Based on 2-D Fuzzy Entropy 基于二维模糊熵的无监督图像变化检测
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.60
Wenbang Sun, Hexin Chen, H. Tang, Di Wu
{"title":"Unsupervised Image Change Detection Based on 2-D Fuzzy Entropy","authors":"Wenbang Sun, Hexin Chen, H. Tang, Di Wu","doi":"10.1109/CIS.2010.60","DOIUrl":"https://doi.org/10.1109/CIS.2010.60","url":null,"abstract":"Change detection in images of a given scene acquired at different times is one of the most interesting topics of image processing. A new change detection method based on 2-D fuzzy entropies is proposed in this paper to detect change area of the difference image. First, the best segmentation direction of 2-D histogram formed by pixel gray levels and the local average gray levels is found by using Fisher criterion. Then, a kind of new 2-D membership function is defined based on the best segmentation direction, which is used to obtain the optimal membership function by searching 2-D maximal fuzzy entropy. Finally, the image change area is detected by using the optimal membership function. The theoretical analysis and experiment results show that the proposed method has predominant change detection performance.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116185287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved Differential Cryptanalysis of Serpent 改进的差分密码分析蛇
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.85
Gaoli Wang, Shaohui Wang
{"title":"Improved Differential Cryptanalysis of Serpent","authors":"Gaoli Wang, Shaohui Wang","doi":"10.1109/CIS.2010.85","DOIUrl":"https://doi.org/10.1109/CIS.2010.85","url":null,"abstract":"Serpent is one of the five AES finalist. In 2001, Biham, Dunkelman and Keller present a differential cryptanalysis of Serpent up to 8 rounds with 256-key bits by using $2^{14}$ 6-round differential characteristics with probability $2^{-93}$. In this paper we present a new 6-round differential characteristic $Omega_A$ with the same probability $2^{-93}$. By changing the input differences of $Omega_A$, we get a characteristic $Omega_B$ with probability $2^{-95}$. We give an improved differential attack on 8-round Serpent with 256-bit keys by using $2^{19.62}$ 6-round characteristics with probability $2^{-95}$. Similarly, we present an improved differential attack on 8-round Serpent with 256-bit keys by using $2^{25.24}$ 6-round characteristics with probability $2^{-97}$.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Genetic Algorithm and Its Convergence for Constrained Optimization Problems 约束优化问题的一种新的遗传算法及其收敛性
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.39
Dalian Liu, Chunfeng Xing, Xuehai Shang
{"title":"A New Genetic Algorithm and Its Convergence for Constrained Optimization Problems","authors":"Dalian Liu, Chunfeng Xing, Xuehai Shang","doi":"10.1109/CIS.2010.39","DOIUrl":"https://doi.org/10.1109/CIS.2010.39","url":null,"abstract":"Constrained optimization problems are one of the most important mathematical programming problems frequently encountered in the disciplines of science and engineering applications. In this paper, a new approach is presented to handle constrained optimization problems. The new technique treats constrained optimization as a two-objective optimization and a new genetic algorithm with specifically designed genetic operators is proposed. The crossover operator adopts the idea of PSO but improves its search ability. To keep the diversity and generate the individuals near the boundary of the feasible region, the crossover is made between the individual taken part in the crossover and its farthest particle. As a necessary complement to crossover operator, the mutation operator is designed by using the shrinking chaotic technique and has strong local search ability. The selection operator is designed to prefer to the feasible solutions. Furthermore, the convergence of the algorithm is analyzed. At last, the computer simulation demonstrates the effectiveness of the proposed algorithm.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121601606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks 认知无线网络中一种基于信誉的子频谱感知方案
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.110
Hongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng
{"title":"A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks","authors":"Hongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng","doi":"10.1109/CIS.2010.110","DOIUrl":"https://doi.org/10.1109/CIS.2010.110","url":null,"abstract":"With the existing Cognitive Radio Networks development, we present a sub-spectrum sensing scheme based on reputation, which takes advantage in energy consumption, security and fairness from spectrum sensing, data fusion and spectrum allocation by classifying users and spectrum bands reasonably. The analysis shows that the sub-spectrum sensing scheme can save energy and defense SSDF attacks effectively.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128259547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Stock Index Futures Margin Level Settings by Hill Estimation and Empirical Analysis 基于Hill估计的股指期货保证金水平设置与实证分析
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.155
Manqi Wu, Sulin Pang
{"title":"Stock Index Futures Margin Level Settings by Hill Estimation and Empirical Analysis","authors":"Manqi Wu, Sulin Pang","doi":"10.1109/CIS.2010.155","DOIUrl":"https://doi.org/10.1109/CIS.2010.155","url":null,"abstract":"The article does empirical research on the margin level setting of Shanghai and Shenzhen 300 index futures. First of all, through the trend comparison chart of index and simulation index futures in 100 trading days, we obtain the conclusion that index data can instead of index futures. Then, 482 full samples’ daily returns is to descriptive statistical analysis and test of normality, we obtain that it doesn’t obey normal distribution, furthermore, it has a \"peak and fat-tail\", the left tail down the possibility of large, up the possibility of the right tail is large, To the tail, left tail has down possibility while right tail has up possibility, right tail has more risk than left. Secondly, we use extreme value theory which good at researching tail’s distribution characteristics and the Hill estimation method to solve the tail index estimates of full samples, left and right tail, and we obtain the margin level is 3.5717%. Thirdly, after the estimated margin level and actual historical price volatility (the absolute value of index returns) for comparison tests, we find that under the assumption of 0.01default rates, the margin level cannot cover 99% of price fluctuations, the result is low. Finally, we solve margin level’s coverage under different default rates and obtain that when default rate is equal to 0.03, the margin level can cover 97% of price fluctuations.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132600885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of Object-Oriented Encryption Storage System Based on Trusted Computing Platform 基于可信计算平台的面向对象加密存储系统的设计与实现
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.125
Junjian Chen, Jingning Liu, D. Feng
{"title":"Design and Implementation of Object-Oriented Encryption Storage System Based on Trusted Computing Platform","authors":"Junjian Chen, Jingning Liu, D. Feng","doi":"10.1109/CIS.2010.125","DOIUrl":"https://doi.org/10.1109/CIS.2010.125","url":null,"abstract":"Object-oriented storage system is a distributed storage systems with a storage device directly connected to the network. In existing encryption schemes the protection of the sensitive data is achieved mainly through an encrypted data storage system, but the encryption key is protected only by a weak password. This is a security risk to storage system, so the key protection is an important issue that needs to be resolved. This paper presents an Object-oriented Encryption Storage System based on Trusted Computing Platform (OESSTCP). A trusted computing platform is adapted in OESSTCP to the file system to protect the encryption keys, thereby enhancing the security of the entire storage system. We have designed and implemented OESSTCP scheme on an object-oriented storage system. Experimental results show that the OESSTCP key cryptographic security protection occupies only 0.3% of the entire encryption overhead and it does not bring great impact on performance of the storage system.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信