{"title":"Human Rights in the Context of the Digital Society - Input to an Ongoing Discussion on Regulatory Issues","authors":"L. Berntzen, E. Karamagioli","doi":"10.1109/ICDS.2008.30","DOIUrl":"https://doi.org/10.1109/ICDS.2008.30","url":null,"abstract":"It is widely recognized that ICT both affect and are affected by the socio-political environment into which it is introduced and functioning. Because of the neutrality of technology, ICT can act as a magnifier and multiplier of the inherent tendencies and characteristics of the spaces in which it is implemented and either support or undermine those values. ICT can be considered not only as a mean of exchanging and disseminating information but can also be a tool to enhance human rights. There is however always an important risk that inappropriate use of ICT could undermine those rights, disenfranchise particular socio-economic groups and attack the fundamental institutions of democracy. The aim of this paper is to discuss existing international regulatory mechanisms related to human rights in the context of the digital society. There are ongoing efforts to introduce new mechanisms to regulate the digital society, and this contribution seeks to highlight current strengths and limitations of existing international regulations governing human rights issues.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124163944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention","authors":"Rok Bojanc, B. Jerman-Blazic","doi":"10.1109/ICDS.2008.37","DOIUrl":"https://doi.org/10.1109/ICDS.2008.37","url":null,"abstract":"With rise of the potential risks from different cyberattacks on the ICT systems the investment in security technology is growing and is becoming a serious economic issue to many organizations. The assessment of the appropriate investment that is economically affordable and provides enough protection of the enterprise information system is an issue that is analysed in this paper. Identification of the assets, the threats, the vulnerabilities of the ICT systems are presented and the methods for quantification of the necessary investment. The paper concludes with a recommendation for a standard approach for optimal selection of security technology investment.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Organizational Privacy Patterns","authors":"Jan Porekar, Aljosa Jerman-Blazic, T. Klobučar","doi":"10.1109/ICDS.2008.27","DOIUrl":"https://doi.org/10.1109/ICDS.2008.27","url":null,"abstract":"Privacy has been a hot topic and received a lot of discussion in recent years. European legislation contains strong privacy oriented regulations and rules which are poorly understood and comprehended by European businesses. Unfortunately courts do not have enough practice to bring the privacy abuses to justice. In addition to all this privacy enhancing technologies (PETs) that exist today are not enough to solve the contradicting requirements of informational systems resulting from business environments and privacy regulations. A large gap exists between privacy regulations on one hand and available privacy technologies on the other. We believe that this gap could and should be bridged by organizational privacy patterns (OPP). OPPs are abstractions of real world situations and problems that businesses run into. Organizational Privacy Patterns capture the problem, the context of the generic problem and the proven solutions to the problem. In this paper we present a first set of privacy organizational patterns.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"476 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117012123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MV-FT: Efficient Implementation for Matrix-Vector Multiplication on FT64 Stream Processor","authors":"Jing Du, F. Ao, Xuejun Yang","doi":"10.1109/ICDS.2008.16","DOIUrl":"https://doi.org/10.1109/ICDS.2008.16","url":null,"abstract":"In this paper, we present a detailed case study of the optimizing implementation of a fundamental scientific kernel, matrix-vector multiplication, on FT64, which is the first 64-bit stream processor designed for scientific computing. The major novelties of our study are as follows. First, we develop four stream programs according to different stream organizations, involving dot product, row product, multi-dot product and multi-row product approaches. Second the optimal strip size for partitioning the large matrix is put forward based on a practical parameter model. Finally loop unrolling and software pipelining are used to hide the communications with the computations. The experimental results show that the optimizing implementations on FT64 achieve high speedup over the corresponding Fortran programs running on Itanium 2. It is certain that matrix-vector multiplication can efficiently exploit the tremendous potential of FT64 stream processor through programming optimizations.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Migration from Regional to a National eHealth Network","authors":"K. Harno, P. Ruotsalainen, P. Nykänen, K. Kopra","doi":"10.1109/ICDS.2008.28","DOIUrl":"https://doi.org/10.1109/ICDS.2008.28","url":null,"abstract":"Finland is being transformed into a knowledge economy driven by information and communication technologies - 96 % of primary care health centres, 95 % of hospital districts and 89 % of private sector service providers use an electronic patient record (EPR). The governance and funding of the Finnish health care system is very decentralized and the lack of standards has led to a broad spectrum of one-off systems with little technical interoperability. National strategies to overcome this challenge has created sharable electronic health records (EHR) by supporting a collection of federated interoperable repositories with regional middleware services. In the Hospital District of Helsinki and Uusimaa an established regional eHealth network (RHIN) connects 24 public hospitals, 29 municipal health centers (primary care) and two private health care clinics. There are 6.000 end-users, information from 1,4 million citizens and 12 million links to EPRs. Migration to a national eHealth network (NHIN) and centralized eArchive providing a platform that delivers a longitudinal view of a patient's relevant health records (core data set) is currently underway and plans for coordinated architecture and transformation from regional to national sharing of health care information and ePrescription are drawn.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134386917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-source Illumination Approach for Buried Objects Exploration","authors":"L. Hélaoui, J. B. Tahar, F. Choubani","doi":"10.1109/ICDS.2008.8","DOIUrl":"https://doi.org/10.1109/ICDS.2008.8","url":null,"abstract":"Many researchers showed the possibilities of a global qualitative reconstruction based on Diffraction Tomography to deliver images for buried objects. However, few investigations have dealt with the improvement of the spatial resolution of the reconstructed image with angular diversity techniques, adopted to enlarge the area of scattering object Fourier-domain data. In this paper, we present a parametric survey showing the influence of the main parameters considered in the imagery algorithm using multi-source illumination technique. Some numerical results are presented to illustrate the contribution of the scattered field from multiple sources in microwave imaging system.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed Environments","authors":"Xing Zhou, T. Dreibholz, E. Rathgeb","doi":"10.1109/ICDS.2008.12","DOIUrl":"https://doi.org/10.1109/ICDS.2008.12","url":null,"abstract":"In order to provide a generic, application- independent and resource-efficient framework for server redundancy and session failover, the IETF RSerPool WG is currently standardizing the reliable server pooling (RSerPool) framework. Server redundancy has to take load distribution and load balancing into consideration since these issues are crucial for the system performance. There has already been some research on the server selection strategies of RSerPool for different application scenarios. In particular, it has been shown that the adaptive least used selection usually provides the best performance. This strategy requires up-to-date load information of the services, which has to be propagated among distributed pool management components. But network delay (which is realistic for systems being widely distributed to achieve availability in case of regional servers failures) as well as caching of information may both lead to obsolete load information. Therefore, the purpose of this paper is to analyse and evaluate the performance of a new server selection rule to cope with update latencies. Especially, we will also analyse the impact of different workload parameters on the performance of the new server selection strategy.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116886702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Medical Databases Using Proposed Incremental Association Rules Algorithm (PIA)","authors":"L. Elfangary, W. A. Atteya","doi":"10.1109/ICDS.2008.10","DOIUrl":"https://doi.org/10.1109/ICDS.2008.10","url":null,"abstract":"The extensive amounts of knowledge and data stored in medical databases require the development of specialized tools for storing and accessing of data, data analysis and effective use of stored knowledge of data. The goal is to present how methods and tools for intelligent data analysis are helpful in narrowing the increasing gap between data gathering and data comprehension. This goal is achieved by applying Association Rules Technique to help in analyzing and retrieving hidden patterns for a large volume of data collected in a medical database for a large hospital. The approach used led to results normally unattainable using conventional techniques. Specifically, an episode database for Nephrology examinations, signs, symptoms and diagnosis is used. Theoretical and practical features for the Incremental Enhanced Association Rule Algorithm are presented. These features include Rules, Classification, Clarity, Automation, Accuracy, Relational Database Management Systems (RDBMS) and Raw Data.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The E-Mail Honeypot System Concept, Implementation and Field Test Results","authors":"E. Rathgeb, Dirk Hoffstadt","doi":"10.1109/ICDS.2008.14","DOIUrl":"https://doi.org/10.1109/ICDS.2008.14","url":null,"abstract":"This paper describes the concept and implementation of the \"E-mail honeypot system\" (EHS) which is designed to automatically receive, categorize, analyze and archive unsolicited mails (spam). An evaluation of the various system components and the overall system in a lab environment and in a field test confirms the feasibility of the EHS concept with respect to functionality, detection accuracy and performance. In addition, some results from a field test running for over a year are provided exemplifying the potential of the EHS to provide a statistical evaluation of spam activities as well as to provide some insight into spam mechanisms.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133795073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Arguments for a Class of ID-Based Signatures","authors":"Zhengwei Guo, Xinzheng He, Baocheng Xun","doi":"10.1109/ICDS.2008.34","DOIUrl":"https://doi.org/10.1109/ICDS.2008.34","url":null,"abstract":"Provable security based on complexity theory provides an efficient way for providing the convincing evidences of security. In this paper, we present a definition of generic ID-based signature schemes by extending the definition of generic signature schemes, and prove the Forking lemma for that. Then we propose a new and efficient ID-based signature scheme built upon bilinear maps. We prove its security under k-CAA computational assumption in the random oracle model.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114101087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}