Second International Conference on the Digital Society最新文献

筛选
英文 中文
Human Rights in the Context of the Digital Society - Input to an Ongoing Discussion on Regulatory Issues 数码社会背景下的人权-对规管问题持续讨论的意见
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.30
L. Berntzen, E. Karamagioli
{"title":"Human Rights in the Context of the Digital Society - Input to an Ongoing Discussion on Regulatory Issues","authors":"L. Berntzen, E. Karamagioli","doi":"10.1109/ICDS.2008.30","DOIUrl":"https://doi.org/10.1109/ICDS.2008.30","url":null,"abstract":"It is widely recognized that ICT both affect and are affected by the socio-political environment into which it is introduced and functioning. Because of the neutrality of technology, ICT can act as a magnifier and multiplier of the inherent tendencies and characteristics of the spaces in which it is implemented and either support or undermine those values. ICT can be considered not only as a mean of exchanging and disseminating information but can also be a tool to enhance human rights. There is however always an important risk that inappropriate use of ICT could undermine those rights, disenfranchise particular socio-economic groups and attack the fundamental institutions of democracy. The aim of this paper is to discuss existing international regulatory mechanisms related to human rights in the context of the digital society. There are ongoing efforts to introduce new mechanisms to regulate the digital society, and this contribution seeks to highlight current strengths and limitations of existing international regulations governing human rights issues.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124163944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention 预防网络犯罪的信息通信技术安全投资量化标准方法
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.37
Rok Bojanc, B. Jerman-Blazic
{"title":"Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention","authors":"Rok Bojanc, B. Jerman-Blazic","doi":"10.1109/ICDS.2008.37","DOIUrl":"https://doi.org/10.1109/ICDS.2008.37","url":null,"abstract":"With rise of the potential risks from different cyberattacks on the ICT systems the investment in security technology is growing and is becoming a serious economic issue to many organizations. The assessment of the appropriate investment that is economically affordable and provides enough protection of the enterprise information system is an issue that is analysed in this paper. Identification of the assets, the threats, the vulnerabilities of the ICT systems are presented and the methods for quantification of the necessary investment. The paper concludes with a recommendation for a standard approach for optimal selection of security technology investment.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Organizational Privacy Patterns 组织隐私模式
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.27
Jan Porekar, Aljosa Jerman-Blazic, T. Klobučar
{"title":"Towards Organizational Privacy Patterns","authors":"Jan Porekar, Aljosa Jerman-Blazic, T. Klobučar","doi":"10.1109/ICDS.2008.27","DOIUrl":"https://doi.org/10.1109/ICDS.2008.27","url":null,"abstract":"Privacy has been a hot topic and received a lot of discussion in recent years. European legislation contains strong privacy oriented regulations and rules which are poorly understood and comprehended by European businesses. Unfortunately courts do not have enough practice to bring the privacy abuses to justice. In addition to all this privacy enhancing technologies (PETs) that exist today are not enough to solve the contradicting requirements of informational systems resulting from business environments and privacy regulations. A large gap exists between privacy regulations on one hand and available privacy technologies on the other. We believe that this gap could and should be bridged by organizational privacy patterns (OPP). OPPs are abstractions of real world situations and problems that businesses run into. Organizational Privacy Patterns capture the problem, the context of the generic problem and the proven solutions to the problem. In this paper we present a first set of privacy organizational patterns.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"476 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117012123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
MV-FT: Efficient Implementation for Matrix-Vector Multiplication on FT64 Stream Processor MV-FT: FT64流处理器上矩阵-向量乘法的高效实现
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.16
Jing Du, F. Ao, Xuejun Yang
{"title":"MV-FT: Efficient Implementation for Matrix-Vector Multiplication on FT64 Stream Processor","authors":"Jing Du, F. Ao, Xuejun Yang","doi":"10.1109/ICDS.2008.16","DOIUrl":"https://doi.org/10.1109/ICDS.2008.16","url":null,"abstract":"In this paper, we present a detailed case study of the optimizing implementation of a fundamental scientific kernel, matrix-vector multiplication, on FT64, which is the first 64-bit stream processor designed for scientific computing. The major novelties of our study are as follows. First, we develop four stream programs according to different stream organizations, involving dot product, row product, multi-dot product and multi-row product approaches. Second the optimal strip size for partitioning the large matrix is put forward based on a practical parameter model. Finally loop unrolling and software pipelining are used to hide the communications with the computations. The experimental results show that the optimizing implementations on FT64 achieve high speedup over the corresponding Fortran programs running on Itanium 2. It is certain that matrix-vector multiplication can efficiently exploit the tremendous potential of FT64 stream processor through programming optimizations.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Migration from Regional to a National eHealth Network 从区域电子健康网络向国家电子健康网络的迁移
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.28
K. Harno, P. Ruotsalainen, P. Nykänen, K. Kopra
{"title":"Migration from Regional to a National eHealth Network","authors":"K. Harno, P. Ruotsalainen, P. Nykänen, K. Kopra","doi":"10.1109/ICDS.2008.28","DOIUrl":"https://doi.org/10.1109/ICDS.2008.28","url":null,"abstract":"Finland is being transformed into a knowledge economy driven by information and communication technologies - 96 % of primary care health centres, 95 % of hospital districts and 89 % of private sector service providers use an electronic patient record (EPR). The governance and funding of the Finnish health care system is very decentralized and the lack of standards has led to a broad spectrum of one-off systems with little technical interoperability. National strategies to overcome this challenge has created sharable electronic health records (EHR) by supporting a collection of federated interoperable repositories with regional middleware services. In the Hospital District of Helsinki and Uusimaa an established regional eHealth network (RHIN) connects 24 public hospitals, 29 municipal health centers (primary care) and two private health care clinics. There are 6.000 end-users, information from 1,4 million citizens and 12 million links to EPRs. Migration to a national eHealth network (NHIN) and centralized eArchive providing a platform that delivers a longitudinal view of a patient's relevant health records (core data set) is currently underway and plans for coordinated architecture and transformation from regional to national sharing of health care information and ePrescription are drawn.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134386917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multi-source Illumination Approach for Buried Objects Exploration 埋藏物探测的多光源照明方法
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.8
L. Hélaoui, J. B. Tahar, F. Choubani
{"title":"Multi-source Illumination Approach for Buried Objects Exploration","authors":"L. Hélaoui, J. B. Tahar, F. Choubani","doi":"10.1109/ICDS.2008.8","DOIUrl":"https://doi.org/10.1109/ICDS.2008.8","url":null,"abstract":"Many researchers showed the possibilities of a global qualitative reconstruction based on Diffraction Tomography to deliver images for buried objects. However, few investigations have dealt with the improvement of the spatial resolution of the reconstructed image with angular diversity techniques, adopted to enlarge the area of scattering object Fourier-domain data. In this paper, we present a parametric survey showing the influence of the main parameters considered in the imagery algorithm using multi-source illumination technique. Some numerical results are presented to illustrate the contribution of the scattered field from multiple sources in microwave imaging system.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed Environments 广泛分布环境下可靠服务器池的新服务器选择策略
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.12
Xing Zhou, T. Dreibholz, E. Rathgeb
{"title":"A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed Environments","authors":"Xing Zhou, T. Dreibholz, E. Rathgeb","doi":"10.1109/ICDS.2008.12","DOIUrl":"https://doi.org/10.1109/ICDS.2008.12","url":null,"abstract":"In order to provide a generic, application- independent and resource-efficient framework for server redundancy and session failover, the IETF RSerPool WG is currently standardizing the reliable server pooling (RSerPool) framework. Server redundancy has to take load distribution and load balancing into consideration since these issues are crucial for the system performance. There has already been some research on the server selection strategies of RSerPool for different application scenarios. In particular, it has been shown that the adaptive least used selection usually provides the best performance. This strategy requires up-to-date load information of the services, which has to be propagated among distributed pool management components. But network delay (which is realistic for systems being widely distributed to achieve availability in case of regional servers failures) as well as caching of information may both lead to obsolete load information. Therefore, the purpose of this paper is to analyse and evaluate the performance of a new server selection rule to cope with update latencies. Especially, we will also analyse the impact of different workload parameters on the performance of the new server selection strategy.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116886702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Mining Medical Databases Using Proposed Incremental Association Rules Algorithm (PIA) 基于增量关联规则算法(PIA)的医学数据库挖掘
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.10
L. Elfangary, W. A. Atteya
{"title":"Mining Medical Databases Using Proposed Incremental Association Rules Algorithm (PIA)","authors":"L. Elfangary, W. A. Atteya","doi":"10.1109/ICDS.2008.10","DOIUrl":"https://doi.org/10.1109/ICDS.2008.10","url":null,"abstract":"The extensive amounts of knowledge and data stored in medical databases require the development of specialized tools for storing and accessing of data, data analysis and effective use of stored knowledge of data. The goal is to present how methods and tools for intelligent data analysis are helpful in narrowing the increasing gap between data gathering and data comprehension. This goal is achieved by applying Association Rules Technique to help in analyzing and retrieving hidden patterns for a large volume of data collected in a medical database for a large hospital. The approach used led to results normally unattainable using conventional techniques. Specifically, an episode database for Nephrology examinations, signs, symptoms and diagnosis is used. Theoretical and practical features for the Incremental Enhanced Association Rule Algorithm are presented. These features include Rules, Classification, Clarity, Automation, Accuracy, Relational Database Management Systems (RDBMS) and Raw Data.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The E-Mail Honeypot System Concept, Implementation and Field Test Results 电子邮件蜜罐系统的概念、实现及现场测试结果
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.14
E. Rathgeb, Dirk Hoffstadt
{"title":"The E-Mail Honeypot System Concept, Implementation and Field Test Results","authors":"E. Rathgeb, Dirk Hoffstadt","doi":"10.1109/ICDS.2008.14","DOIUrl":"https://doi.org/10.1109/ICDS.2008.14","url":null,"abstract":"This paper describes the concept and implementation of the \"E-mail honeypot system\" (EHS) which is designed to automatically receive, categorize, analyze and archive unsolicited mails (spam). An evaluation of the various system components and the overall system in a lab environment and in a field test confirms the feasibility of the EHS concept with respect to functionality, detection accuracy and performance. In addition, some results from a field test running for over a year are provided exemplifying the potential of the EHS to provide a statistical evaluation of spam activities as well as to provide some insight into spam mechanisms.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133795073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Arguments for a Class of ID-Based Signatures 一类基于id的签名的安全参数
Second International Conference on the Digital Society Pub Date : 2008-02-10 DOI: 10.1109/ICDS.2008.34
Zhengwei Guo, Xinzheng He, Baocheng Xun
{"title":"Security Arguments for a Class of ID-Based Signatures","authors":"Zhengwei Guo, Xinzheng He, Baocheng Xun","doi":"10.1109/ICDS.2008.34","DOIUrl":"https://doi.org/10.1109/ICDS.2008.34","url":null,"abstract":"Provable security based on complexity theory provides an efficient way for providing the convincing evidences of security. In this paper, we present a definition of generic ID-based signature schemes by extending the definition of generic signature schemes, and prove the Forking lemma for that. Then we propose a new and efficient ID-based signature scheme built upon bilinear maps. We prove its security under k-CAA computational assumption in the random oracle model.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114101087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信