2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

筛选
英文 中文
Best of two worlds: Secure cloud federations meet eIDAS 两全其美:安全的云联盟符合eIDAS
Thomas Zefferer, Dominik Ziegler, Andreas Reiter
{"title":"Best of two worlds: Secure cloud federations meet eIDAS","authors":"Thomas Zefferer, Dominik Ziegler, Andreas Reiter","doi":"10.23919/ICITST.2017.8356430","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356430","url":null,"abstract":"The federation of information technology (IT) systems is a common approach to bundle capabilities and get the best results for all participants. Cloud computing and electronic identity (eID) are only two out of many domains, for which federated solutions have been a topic of scientific and corporate interest during the past years. Recently, the H2020 project SUNFISH has introduced a new cloud-federation approach called ‘Federation as a Service’ (FaaS). FaaS enables secure cloud federations, where data owners remain in full control of their data and workflows. In this paper, we identify shortcomings of the FaaS approach in terms of secure and reliable user authentication. In this sense, data security and protection mechanisms are only as good as the applied authentication measures. We solve this issue by proposing the integration of an existing pan-European federation of national eID systems into FaaS. This increases security guarantees of FaaS by using a trustworthy and liable eID solution that has a strong legal basis in the form of the EU eIDAS Regulation. A first successful implementation and deployment of the proposed solution demonstrates its feasibility and shows the great potential of combining federation solutions from the cloud domain and the eID domain.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models 基于LSTM递归神经网络和ARIMA模型的数据中心机器CPU工作负荷预测
Deepak Janardhanan, E. Barrett
{"title":"CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models","authors":"Deepak Janardhanan, E. Barrett","doi":"10.23919/ICITST.2017.8356346","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356346","url":null,"abstract":"The advent of Data Science has led to data being evermore useful for an increasing number of organizations who want to extract knowledge from it for financial and research purposes. This has triggered data to be mined at an even faster pace causing the rise of Data Centers that host over thousands of machines together with thousands of jobs running in each of those machines. The growing complexities associated with managing such a huge infrastructure has caused the scheduling management systems to be inefficient at resource allocation across these machines. Hence, resource usage forecasting of machines in data centers is a growing area for research. This study focuses on the Time Series forecasting of CPU usage of machines in data centers using Long Short-Term Memory (LSTM) Network and evaluating it against the widely used and traditional autoregressive integrated moving average (ARIMA) models for forecasting. The final LSTM model had a forecasting error in the range of 17–23% compared to ARIMA model's 3742%. The results clearly show that LSTM models performed more consistently due to their ability to learn non-linear data much better than ARIMA models.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Monitoring darknet activities by using network telescope 利用网络望远镜监测暗网活动
Shaikha AlShehyari, C. Yeun, E. Damiani
{"title":"Monitoring darknet activities by using network telescope","authors":"Shaikha AlShehyari, C. Yeun, E. Damiani","doi":"10.23919/ICITST.2017.8356360","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356360","url":null,"abstract":"Today, many hosts are connected to the Internet worldwide. Those hosts are intentionally or even accidentally targeted in a daily basis by malicious activities. Thus, it is essential to monitor Internet traffic in order to acquire the knowledge of the threats that is targeting computers and network systems. Security experts initiated numerous approaches for monitoring traffic that includes malicious activities, and network telescope was one of them. Network telescopes are valuable in the term of monitoring and gathering data associated with Internet attack activities. Analysis of traffic captured by network telescopes has been shown as an effective measure in characterizing evil traffic caused by worm propagation and distributed denial of service attacks. This paper will discuss monitoring traffic coming from Darknet using network telescope. Additionally, we will identify the security issues and threats introduced if no monitored device is placed within a network infrastructure. The objective of this paper is to introduce the effect of such a technology on entities, provide successful solution, and encourage future research in this area of interest.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lightweight signcryption scheme based on discrete Chebyshev maps 基于离散切比雪夫映射的轻量级签名加密方案
Ta Thi Kim Hue, T. Hoang, An Braeken
{"title":"Lightweight signcryption scheme based on discrete Chebyshev maps","authors":"Ta Thi Kim Hue, T. Hoang, An Braeken","doi":"10.23919/ICITST.2017.8356343","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356343","url":null,"abstract":"Signcryption schemes are cryptographic mechanisms providing both encryption and signing in a very efficient way. This paper presents a lightweight signcryption scheme based on Chebyshev chaotic maps over finite fields. For that, complex dynamic properties of the Chebyshev map are investigated and shown to be adequate for the construction of a signcryption scheme. The proposed signcryption scheme is proven to be secure for both outsider and insider attacks. Moreover, its computational cost is low, and the lower hardware complexity in compared with others based on elliptic curves.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129304677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing cyber security awareness with mobile games 利用手机游戏提升网络安全意识
F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki
{"title":"Enhancing cyber security awareness with mobile games","authors":"F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki","doi":"10.23919/ICITST.2017.8356361","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356361","url":null,"abstract":"The ever-increasing threats on cybersecurity has consequently increased the need for enhanced awareness about cybersecurity and its various threats among public. This paper presents the design aspects of the two mobile gaming applications including Malware Guardian game, and Password Protector game. Further, different mobile games concept developed during the course of the study is also presented. The malware Guardian was aimed at educating the users about different security threats, security issues, the risks associated with it and the tools to be used for preventing these attacks. The Password Protector is aimed at educating the users about the need for creating strong and complex passwords, remembering and changing them frequently. Both the games are in the final phase of design, and will be developed once the design specifications are outlined. The major design aspects of the two gaming applications are presented in this paper, which are carefully crafted after a peer review of functions and technologies to be associated with.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance vs. security: Implementing an immutable database in MySQL 性能vs.安全性:在MySQL中实现不可变数据库
Thomas Nash, Aspen Olmsted
{"title":"Performance vs. security: Implementing an immutable database in MySQL","authors":"Thomas Nash, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356402","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356402","url":null,"abstract":"Maintaining transactional history is crucial to unraveling the changes any unauthorized user makes to a system, and this logging database is often a prime target for attackers. One common approach to maintaining this security is through an immutable database. There are many ways to implement such a database which maintains appropriate security requirements, each ranging in the complexity and effort required to configure. What remains constant amongst all the methods is that the database is available only to a restricted, defined set of users and that records may only be inserted and not updated or deleted to maintain a proper history. We demonstrate two of these methods in the MySQL database system and compare performance and capabilities amongst them.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile business performance metrics: Framework and case study 移动业务性能指标:框架和案例研究
Ahyoung Kim, Junwoo Lee
{"title":"Mobile business performance metrics: Framework and case study","authors":"Ahyoung Kim, Junwoo Lee","doi":"10.23919/ICITST.2017.8356372","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356372","url":null,"abstract":"The increases in mobile-phone users changed paradigms in mobile business and extended business area and its applications. Therefore, various attempts have been made to succeed in mobile business. In this study, performance indicators for measuring business performance are proposed, also using proposed performance indicators framework for analyzing usage-focused mobile business is suggested. Based on the characteristics of mobile business, performance indicators are classified to Customer Retention and Product Engagement. The customer's usage data automatically collected from mobile application is analyzed by 2 performance indicators. In this paper, we will suggest the mobile business analysis framework for performance indicators, and introduce the result of analysis through case-study. The suggestion and mobile business analysis framework from this study support decision making in mobile business area such as mobile marketing and mobile commerce.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection 一种基于DCT心理视觉阈值的鲁棒版权保护盲水印技术
F. Ernawan, M. Kabir, Z. Mustaffa
{"title":"A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection","authors":"F. Ernawan, M. Kabir, Z. Mustaffa","doi":"10.23919/ICITST.2017.8356354","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356354","url":null,"abstract":"This work presents a blind watermarking technique based on a psychovisual threshold for a robust copyright protection. Psychovisual threshold can provide a trade-off between imperceptibility and robustness of the watermark. This paper proposes a new watermarking scheme where watermarks are embedded on some selected coefficients of DCT frequencies considering psychovisual threshold. The embedding regions are determined using a modified entropy to indicate less distortion areas. Furthermore, the watermark image is scrambled before embedding to provide additional security. The proposed scheme is tested under different types of signal-processing and geometric attack. The experimental results show that our scheme produces higher imperceptibility and robustness of the watermark than the existing schemes.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134498021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On blockchain-based authorization architecture for beyond-5G mobile services 基于区块链的超5g移动服务授权架构研究
S. Kiyomoto, A. Basu, Mohammad Shahriar Rahman, S. Ruj
{"title":"On blockchain-based authorization architecture for beyond-5G mobile services","authors":"S. Kiyomoto, A. Basu, Mohammad Shahriar Rahman, S. Ruj","doi":"10.23919/ICITST.2017.8356363","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356363","url":null,"abstract":"This paper proposes a new conceptual architecture for authorization of mobile services based on blockchain technologies, and presents a design of procedures for heterogeneous mobile communication services. Furthermore, an extension of the procedures is considered in order to enhance privacy protection for users. The new architecture realizes the separation of mobile communication infrastructure and billing functions and multiple use of several mobile communication services under a single contract with a billing operator.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Evaluate action primitives for human activity recognition using unsupervised learning approach 使用无监督学习方法评估人类活动识别的动作原语
Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted
{"title":"Evaluate action primitives for human activity recognition using unsupervised learning approach","authors":"Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356374","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356374","url":null,"abstract":"Smartphones and wearable devices are in the frontlines when it comes to the field of Human Activity Recognition (HAR). There have been numerous attempts to use motion sensors in smartphones and wearables to recognize human activity. Most of these studies apply supervised learning techniques, which requires them to use labeled datasets. In this work, we take a sample of these labels, or action primitives (sit, stand, run, walk, jump, lie down), and evaluate them against the resulting labels of several clustering algorithms. We built two datasets (labeled and unlabeled) using accelerometer, gyroscope, and pedometer readings from two fixed-position devices, a smartphone in the side pocket, and a smartwatch strapped onto the left-hand wrist. Ultimately, we want to determine whether these action primitives commonly used in HAR are optimal, and suggest a better set of primitives if not.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信