IT ProfessionalPub Date : 2023-09-01DOI: 10.1109/mitp.2023.3323608
{"title":"Over the Rainbow: 21st Century Security & Privacy Podcast","authors":"","doi":"10.1109/mitp.2023.3323608","DOIUrl":"https://doi.org/10.1109/mitp.2023.3323608","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IT ProfessionalPub Date : 2023-07-01DOI: 10.1109/MITP.2023.3277594
A. Sengupta, Mahendra Rathor, Rahul Chaurasia
{"title":"Biometrics for Hardware Security and Trust: Discussion and Analysis","authors":"A. Sengupta, Mahendra Rathor, Rahul Chaurasia","doi":"10.1109/MITP.2023.3277594","DOIUrl":"https://doi.org/10.1109/MITP.2023.3277594","url":null,"abstract":"Ensuring hardware security and trust is not only important for securing the designer’s/owner’s revenue but also for his/her reputation and trust in the electronics market. Biometrics-based authentication is an emerging approach to ensure security and trust in hardware, as it offers a unique identification of the true hardware designer/owner. This article provides a novel discussion and analysis of recently employed biometric techniques—intellectual property (IP) fingerprint, facial, and palmprint—for hardware IP security. More explicitly, this article discusses the potential hardware security threats, followed by a discussion of existing techniques for security. Furthermore, the article also provides a design flow for the IP core fingerprint biometrics, IP facial biometrics, and IP palmprint biometrics along with their corresponding detection flows. Finally, the article provides an analysis of the hardware security strength achieved through different biometric techniques in terms of probability of coincidence.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"5 1","pages":"36-44"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90509905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IT ProfessionalPub Date : 2023-07-01DOI: 10.1109/MITP.2023.3268567
Ángel F. Alcaide, Carlos Núñez-Gómez, F. Delicado, C. Carrión, María Blanca Caminero
{"title":"A Blockchain-Based e-Government Service for Quantity Surveyors","authors":"Ángel F. Alcaide, Carlos Núñez-Gómez, F. Delicado, C. Carrión, María Blanca Caminero","doi":"10.1109/MITP.2023.3268567","DOIUrl":"https://doi.org/10.1109/MITP.2023.3268567","url":null,"abstract":"In Spain, quantity surveyors are entitled to carry out official cadastral surveys, attestations, and certificate issuing according to a well-defined professional code. The Official Associations of Quantity Surveyors and Technical Architects (COAATs) are responsible for endorsing the documentation related to actions performed on buildings. An e-platform that enables immutability, traceability, and a unique property record among all the Spanish COAATs, with an affordable cost, is essential to streamline the involved processes.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"26 1","pages":"61-66"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74776280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IT ProfessionalPub Date : 2023-07-01DOI: 10.1109/MITP.2023.3297384
N. Kshetri, M. Schordan
{"title":"Can China Catch Up to the United States in Generative Artificial Intelligence?","authors":"N. Kshetri, M. Schordan","doi":"10.1109/MITP.2023.3297384","DOIUrl":"https://doi.org/10.1109/MITP.2023.3297384","url":null,"abstract":"Although Chinese technology firms are globally competitive in some artificial intelligence (AI) subfields, their performance has been disappointing in the generative AI (GAI) domain. This article offers an analysis of key barriers facing Chinese technology firms in the development of GAI services.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"38 1","pages":"94-97"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88432425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IT ProfessionalPub Date : 2023-07-01DOI: 10.1109/mitp.2023.3301261
{"title":"IEEE Open Journal of the Computer Society","authors":"","doi":"10.1109/mitp.2023.3301261","DOIUrl":"https://doi.org/10.1109/mitp.2023.3301261","url":null,"abstract":"","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135762115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IT ProfessionalPub Date : 2023-07-01DOI: 10.1109/MITP.2023.3296060
Stelios Prekas, P. Karkazis, P. Trakadas
{"title":"An Energy-Aware Path Enumeration Solution Based on the Path Algebra Framework","authors":"Stelios Prekas, P. Karkazis, P. Trakadas","doi":"10.1109/MITP.2023.3296060","DOIUrl":"https://doi.org/10.1109/MITP.2023.3296060","url":null,"abstract":"Energy-centric network resource management is becoming increasingly crucial regarding the operational support of next-generation networking ecosystems. To realize consistent power-saving provisions on the physical underlay, we propose a network path enumeration and ordering mechanism by means of path algebra’s formulations. This novel path evaluation solution introduces new primary network metrics, and by utilizing their algebraic composition it achieves a power-saving path-ranking performance of 90.1% regarding the first path choice, in contrast to its examined counterpart.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"48 1","pages":"29-35"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76358886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approximate Fault-Tolerance Design for a Convolutional Neural Network Accelerator","authors":"Wenda Wei, Chenyang Wang, Xinyang Zheng, Hengshan Yue","doi":"10.1109/MITP.2023.3264849","DOIUrl":"https://doi.org/10.1109/MITP.2023.3264849","url":null,"abstract":"Today, various domain-specific convolutional neural network (CNN) accelerators are deployed in large-scale systems to satisfy the massive computational demands of current deep CNNs. Although bringing significant performance improvements, the highly integrated CNN accelerators are more susceptible to faults caused by radiation, aging, and process variation. CNNs have been increasingly deployed in security-critical areas, requiring more attention to reliable execution. Although the classical fault-tolerant approaches are error-effective, the performance/energy overheads introduced are nonnegligible, which is the opposite of CNN accelerator design philosophy. In this article, we leverage CNN’s intrinsic tolerance for minor errors to explore approximate fault-tolerance (ApFT) opportunities for CNN accelerator fault-tolerance overhead reduction. Specifically, we discuss two branches of ApFT designs: selective duplicating-based approximate fault tolerance (S-ApFT) and imprecise checking-based approximate fault tolerance (I-ApFT). The results show that S-ApFT and I-ApFT can achieve comparable error-detection ability and dual-modular redundancy while achieving significant performance improvements.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"52 1","pages":"85-90"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79596937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IT ProfessionalPub Date : 2023-07-01DOI: 10.1109/MITP.2023.3293714
G. A. Safdar, Ali Mansour
{"title":"Security and Trust Issues in BYOD Networks","authors":"G. A. Safdar, Ali Mansour","doi":"10.1109/MITP.2023.3293714","DOIUrl":"https://doi.org/10.1109/MITP.2023.3293714","url":null,"abstract":"Companies are striving for increased productivity as well as reduced costs in today's corporate environment. Both capital and operational expenditure can impact cost significantly, accordingly there is a drive to bring your own device (BYOD) networks as a solution. However, security and trust issues in BYOD networks are increasingly becoming a risk from small to large businesses. This introduces challenges for IT Professionals when it comes to the security of the network, as well as while trying to achieve compliance with data security standards set out by the governing bodies of the particular industry. This article aims to discuss “how organizations can introduce trust into BYOD networks” both by using existing and developing technologies. The overall outcome will be a clear understanding of common technologies that are either currently used or being developed, which can help organizations create trust between the corporate network and the BYOD.","PeriodicalId":49045,"journal":{"name":"IT Professional","volume":"616 1","pages":"45-51"},"PeriodicalIF":2.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77376932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}