International Journal of Cooperative Information Systems最新文献

筛选
英文 中文
Binary Log Analysis on MySQL to Help Investigation Process Against Database Privillege Attacks MySQL二进制日志分析,帮助调查数据库特权攻击过程
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2020-05-18 DOI: 10.29040/IJCIS.V1I1.7
Siti Rokhmah, Ihsan Cahyo Utomo
{"title":"Binary Log Analysis on MySQL to Help Investigation Process Against Database Privillege Attacks","authors":"Siti Rokhmah, Ihsan Cahyo Utomo","doi":"10.29040/IJCIS.V1I1.7","DOIUrl":"https://doi.org/10.29040/IJCIS.V1I1.7","url":null,"abstract":"Database is an important part in managing information, because a database is a collection of data that is processed to produce information. because of the importance of the database, many crimes are directed to attack the database, both attacks against access rights or attacks against the data itself. My SQL is a Database Management System (DBMS) that provides several facilities, one of which is the logging facility. Binary Log is a type of database log in the form of binary digits that contains some information including the record of the time of the transaction, the user who made the transaction and the order in the transaction. With the Binary Log, it can be seen when the transaction occurred, who made the transaction and what transaction occurred in the database. The recording of transactions in the Binary Log can be used as one way to carry out an investigation process in the event of an attack on the database. In this study the focus is on analyzing transaction records in binary logs, namely when, who, dam and what information can be taken from the Binary Log. The output of this research is a table of binary log investigation results and its relation to database attacks. Keywords— Binary Log, MySql, Database, Database Attack","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43564791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Threshold Cryptography Scheme for Cloud ERP Data 一种有效的云ERP数据阈值加密方案
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2020-03-31 DOI: 10.5121/ijcis.2020.10101
Arnold Mashud Abukari, E. K. Bankas, Mohammed Iddrisu Muniru
{"title":"An Efficient Threshold Cryptography Scheme for Cloud ERP Data","authors":"Arnold Mashud Abukari, E. K. Bankas, Mohammed Iddrisu Muniru","doi":"10.5121/ijcis.2020.10101","DOIUrl":"https://doi.org/10.5121/ijcis.2020.10101","url":null,"abstract":"Cloud ERP is a new concept that has caught the attention of researchers and industry players. One of the major challenges towards migrating ERP data to cloud is security and confidentiality. A number of secret sharing schemes (SSS) have been proposed Mignote, Asmuth-Bloom, Shamir and Blakley but not without challenges. In this research we proposed an efficient threshold cryptography scheme to secure cloud ERP data. We modified the Asmuth-Bloom SSS and applied it to cloud ERP data.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46662205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lived displacement among the Evenki of Yiengra 伊恩格拉的埃文基人的生活流离失所
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2020-03-13 DOI: 10.5204/ijcis.v13i1.1322
T. Mustonen, A. Lehtinen
{"title":"Lived displacement among the Evenki of Yiengra","authors":"T. Mustonen, A. Lehtinen","doi":"10.5204/ijcis.v13i1.1322","DOIUrl":"https://doi.org/10.5204/ijcis.v13i1.1322","url":null,"abstract":"This article studies the Evenki experiences and memories bound to past and present changes in their modes of living in Sakha-Yakutia. An endemic understanding of the community reflections on de-placing, or lived displacement, is advanced, both theoretically and empirically. The empirical part starts with a description of the Evenki traditions sustained in everyday life today. This is followed by a threefold reading of the Evenki reflections of displacement, focusing on 1) routines of brigades and obchinas, 2) transitions of traditions and place names and 3) disturbances due to industrial land-rule. The analysis is based on Evenki interviews in Yiengra between 2005-2020 and related empirical material gathered for the Evenki Atlas completed by the first of the authors of this article. A major result of the study is an in-depth Evenki view on the phases of displacement. In addition, the article demonstrates the value of endemic ethnography which favours research commitments that are both sensitive to epistemic differentiation and help in identifying the actual costs of forced and unruly de-placing.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47719903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interculturalism as a means toward cultural inclusiveness and cross-cultural dialogue: 跨文化主义作为实现文化包容性和跨文化对话的一种手段:
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2020-03-06 DOI: 10.5204/ijcis.v12i2.1345
S. Gröschl
{"title":"Interculturalism as a means toward cultural inclusiveness and cross-cultural dialogue:","authors":"S. Gröschl","doi":"10.5204/ijcis.v12i2.1345","DOIUrl":"https://doi.org/10.5204/ijcis.v12i2.1345","url":null,"abstract":"Using a case study approach, this article explores the role of the Jose Domingo de Obaldia maternity hospital in Western Panama, and its policies and practices for responding to the cultural differences between Panamanian hospital staff and pregnant Ngöble Buglé patients, and their different understanding of health and illness that has been shaped by principles of traditional medicine. Using a range of in-depth interviews with hospitality staff and management and intercultural interpreters, this study explores how cultural aspects and differences can be of a compound and complex nature, requiring strong intercultural understanding, awareness and cross-cultural dialogue. The case of the Ngöble Buglé illustrates how interculturalism can foster such cultural inclusiveness and cross-cultural dialogue, and how interculturalism can have implications for other Indigenous communities in Latin America, and for non-Indigenous communities facing increasingly cultural diverse environments and contexts.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41636696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indigenous Reconciliation: Why, What, and How 土著和解:为什么,做什么,如何做
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2020-02-28 DOI: 10.5204/ijcis.v12i2.1276
Ranjan Datta
{"title":"Indigenous Reconciliation: Why, What, and How","authors":"Ranjan Datta","doi":"10.5204/ijcis.v12i2.1276","DOIUrl":"https://doi.org/10.5204/ijcis.v12i2.1276","url":null,"abstract":"Although a great number of academic researchers have introduced reconciliation in their work, they have not explained what it means from Indigenous perspectives. How do we need to understand and practise it in oureveryday practice? Why should we all, both Indigenous and non-Indigenous, practise land-based and antiracist learning—as a system of reciprocal social relations and ethical practices—as a framework for reconciliation? This article initiates these transdisciplinary questions that challenge not only our static science and social science mindsets, but also the responsibilities for reconciliation, including building respectful relationships with Indigenous people, respecting Indigenous treaties, taking actions to decolonise our ways of knowing and acting, learning the role of colonised education processes, and protecting Indigenous land and environment rights.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44407815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RMAC - A Lightweight Authentication Protocol for Highly Constrained IoT Devices RMAC——高度受限物联网设备的轻量级认证协议
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2018-09-30 DOI: 10.5121/ijcis.2018.8301
Ahmad Khoureich Ka
{"title":"RMAC - A Lightweight Authentication Protocol for Highly Constrained IoT Devices","authors":"Ahmad Khoureich Ka","doi":"10.5121/ijcis.2018.8301","DOIUrl":"https://doi.org/10.5121/ijcis.2018.8301","url":null,"abstract":"Nowadays, highly constrained IoT devices have earned an important place in our everyday lives. These \u0000devices mainly comprise RFID (Radio-Frequency Identification) or WSN (Wireless Sensor Networks) components. Their adoption is growing in areas where data security or privacy or both must be guaranteed. Therefore, it is necessary to develop appropriate security solutions for these systems. Many \u0000papers have proposed solutions for encryption or authentication. But it turns out that sometimes the proposal has security flaw or is ill-suited for the constrained IoT devices (which has very limited processing and storage capacities).In this paper, we introduce a new authentication protocol inspired by Mirror-Mac (MM) which is a generic construction of authentication protocol proposed by Mol et al. Our proposal named RMAC is well suited for highly constrained IoT devices since its implementation uses simple and lightweight algorithms. We also prove that RMAC is at least as secure as the MM protocol and thus secure against man-in-the-middle attacks.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Erratum: "Supporting End-User Articulations in Evolving Business Processes: A Case Study to Explore Intuitive Notations and Interaction Designs" 勘误表:“在不断发展的业务流程中支持最终用户表达:探索直观符号和交互设计的案例研究”
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2018-09-01 DOI: 10.1142/s0218843018920016
Jan Hess, Christian Reuter, V. Pipek, V. Wulf
{"title":"Erratum: \"Supporting End-User Articulations in Evolving Business Processes: A Case Study to Explore Intuitive Notations and Interaction Designs\"","authors":"Jan Hess, Christian Reuter, V. Pipek, V. Wulf","doi":"10.1142/s0218843018920016","DOIUrl":"https://doi.org/10.1142/s0218843018920016","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/s0218843018920016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42343277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DIFFERENTIALLY PRIVATE OUTLIER DETECTION IN A COLLABORATIVE ENVIRONMENT. 协作环境下的差异私有离群值检测。
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2018-09-01 Epub Date: 2018-07-03 DOI: 10.1142/S0218843018500053
Hafiz Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, Nabil Adam
{"title":"DIFFERENTIALLY PRIVATE OUTLIER DETECTION IN A COLLABORATIVE ENVIRONMENT.","authors":"Hafiz Asif,&nbsp;Tanay Talukdar,&nbsp;Jaideep Vaidya,&nbsp;Basit Shafiq,&nbsp;Nabil Adam","doi":"10.1142/S0218843018500053","DOIUrl":"https://doi.org/10.1142/S0218843018500053","url":null,"abstract":"<p><p>Outlier detection is one of the most important data analytics tasks and is used in numerous applications and domains. The goal of outlier detection is to find abnormal entities that are significantly different from the remaining data. Often the underlying data is distributed across different organizations. If outlier detection is done locally, the results obtained are not as accurate as when outlier detection is done collaboratively over the combined data. However, the data cannot be easily integrated into a single database due to privacy and legal concerns. In this paper, we address precisely this problem. We first define privacy in the context of collaborative outlier detection. We then develop a novel method to find outliers from both horizontally partitioned and vertically partitioned categorical data in a privacy-preserving manner. Our method is based on a scalable outlier detection technique that uses attribute value frequencies. We provide an end-to-end privacy guarantee by using the differential privacy model and secure multiparty computation techniques. Experiments on real data show that our proposed technique is both effective and efficient.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/S0218843018500053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"36902205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Author Index Volume 27 (2018) 作者索引第27卷(2018)
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2018-08-23 DOI: 10.1142/s0218843018990010
{"title":"Author Index Volume 27 (2018)","authors":"","doi":"10.1142/s0218843018990010","DOIUrl":"https://doi.org/10.1142/s0218843018990010","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49295525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quantum Cryptography Protocol for Access Control in Big Data 面向大数据访问控制的量子密码协议
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2018-06-30 DOI: 10.5121/ijcis.2018.8201
Abiodun O. Odedoyin, Helen O. Odukoya, Ayodeji O. Oluwatope
{"title":"A Quantum Cryptography Protocol for Access Control in Big Data","authors":"Abiodun O. Odedoyin, Helen O. Odukoya, Ayodeji O. Oluwatope","doi":"10.5121/ijcis.2018.8201","DOIUrl":"https://doi.org/10.5121/ijcis.2018.8201","url":null,"abstract":"Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信