首页 > 最新文献

2011 Frontiers of Information Technology最新文献

英文 中文
Development of an Optical Sensor for the Detection of Volatile Organic Compounds 挥发性有机化合物光学传感器的研制
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.66
U. Masud, M. I. Baig
Volatile Organic Compounds (VOCs) are organic compounds with a low boiling point at room temperature. This fact leads to their easy evaporation into the nearby air, intoxicating it and making breathing hard for living species especially human beings are vulnerable to audible and visual damage. Technological advancements in biomedical engineering have led to the development of various methods to moderate this problem. In this paper, we present an optical sensor that can be used to analyze the quantity of VOCs in air. The technique deploys Absorption Spectroscopy based measurements at different points in a defined area. Emphasis has been led to the optical setup that uses a mechanical chopper and a set of lenses, since the main results rely heavily on it. Some of the important outcomes are presented and discussed in detail which leads to attention grabbing graphical results.
挥发性有机化合物(VOCs)是在室温下具有低沸点的有机化合物。这一事实导致它们很容易蒸发到附近的空气中,使空气中毒,使生物物种呼吸困难,尤其是人类,容易受到听觉和视觉损伤。生物医学工程的技术进步导致了各种方法的发展,以缓和这个问题。在本文中,我们提出了一种光学传感器,可用于分析空气中挥发性有机化合物的数量。该技术在特定区域的不同点部署了基于吸收光谱的测量。重点是光学设置,使用机械斩波器和一组镜头,因为主要结果严重依赖于它。提出并详细讨论了一些重要的结果,从而产生了引人注目的图形结果。
{"title":"Development of an Optical Sensor for the Detection of Volatile Organic Compounds","authors":"U. Masud, M. I. Baig","doi":"10.1109/FIT.2011.66","DOIUrl":"https://doi.org/10.1109/FIT.2011.66","url":null,"abstract":"Volatile Organic Compounds (VOCs) are organic compounds with a low boiling point at room temperature. This fact leads to their easy evaporation into the nearby air, intoxicating it and making breathing hard for living species especially human beings are vulnerable to audible and visual damage. Technological advancements in biomedical engineering have led to the development of various methods to moderate this problem. In this paper, we present an optical sensor that can be used to analyze the quantity of VOCs in air. The technique deploys Absorption Spectroscopy based measurements at different points in a defined area. Emphasis has been led to the optical setup that uses a mechanical chopper and a set of lenses, since the main results rely heavily on it. Some of the important outcomes are presented and discussed in detail which leads to attention grabbing graphical results.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SWAM: Stuxnet Worm Analysis in Metasploit Metasploit中的Stuxnet蠕虫分析
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.34
Rahat Masood, Um-e-Ghazia, Z. Anwar
Nowadays cyber security is becoming a great challenge. Attacker's community is progressing towards making smart and intelligent malwares (viruses, worms and Root kits). They stealth their existence and also use administrator rights without knowing legal user. Stuxnet worm is an example of a recent malware first detected in July 2010. Its variants were also detected earlier. It is the first type of worm that affects the normal functionality of industrial control systems (ICS) having programmable logic controllers (PLC) through PLC Root kit. Its main goal is to modify ICS behavior by changing the code of PLC and make it to behave in a way that attacker wants. It is a complex piece of malware having different operations and functionalities which are achieved by exploiting zero day vulnerabilities. Stuxnet exploits various vulnerable services in Microsoft Windows. In this paper we will show real time simulation of first three vulnerabilities of these through Metasploit Framework 3.2 and analyze results. A real time scenario is established based on some assumptions. We assumed Proteus design (pressure sensor) as PLC and showed after exploitation that the pressure value drops to an unacceptable level by changing Keil code of this design.
如今,网络安全正成为一个巨大的挑战。攻击者社区正在朝着制造智能恶意软件(病毒、蠕虫和根工具包)的方向发展。他们隐藏自己的存在,并且在不知道合法用户的情况下使用管理员权限。震网蠕虫是2010年7月首次检测到的最新恶意软件的一个例子。它的变种也在早些时候被发现。它是通过PLC Root kit影响具有可编程逻辑控制器(PLC)的工业控制系统(ICS)正常功能的第一种蠕虫。它的主要目标是通过改变PLC的代码来修改ICS的行为,使其按照攻击者想要的方式运行。它是一种复杂的恶意软件,具有不同的操作和功能,通过利用零日漏洞实现。震网病毒利用微软Windows系统中的各种易受攻击的服务。在本文中,我们将通过Metasploit Framework 3.2对其中的前三个漏洞进行实时仿真,并分析结果。基于一些假设,建立了一个实时场景。我们假设Proteus设计(压力传感器)为PLC,开发后通过改变该设计的Keil代码显示压力值下降到不可接受的水平。
{"title":"SWAM: Stuxnet Worm Analysis in Metasploit","authors":"Rahat Masood, Um-e-Ghazia, Z. Anwar","doi":"10.1109/FIT.2011.34","DOIUrl":"https://doi.org/10.1109/FIT.2011.34","url":null,"abstract":"Nowadays cyber security is becoming a great challenge. Attacker's community is progressing towards making smart and intelligent malwares (viruses, worms and Root kits). They stealth their existence and also use administrator rights without knowing legal user. Stuxnet worm is an example of a recent malware first detected in July 2010. Its variants were also detected earlier. It is the first type of worm that affects the normal functionality of industrial control systems (ICS) having programmable logic controllers (PLC) through PLC Root kit. Its main goal is to modify ICS behavior by changing the code of PLC and make it to behave in a way that attacker wants. It is a complex piece of malware having different operations and functionalities which are achieved by exploiting zero day vulnerabilities. Stuxnet exploits various vulnerable services in Microsoft Windows. In this paper we will show real time simulation of first three vulnerabilities of these through Metasploit Framework 3.2 and analyze results. A real time scenario is established based on some assumptions. We assumed Proteus design (pressure sensor) as PLC and showed after exploitation that the pressure value drops to an unacceptable level by changing Keil code of this design.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132278106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
High Throughput Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist: BLAKE 安全哈希算法(SHA-3)的高吞吐量硬件实现入围者:BLAKE
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.42
Kashif Latif, A. Mahboob, A. Aziz
Cryptographic hash functions are at heart of many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In consequence of recent innovations in cryptanalysis of commonly used hash algorithms, NIST USA announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. An essential part of this contest is hardware performance evaluation of the candidates. In this work we present a high throughput efficient hardware implementation of one of the final round candidate of SHA-3: BLAKE. We implemented and investigated the performance of BLAKE on latest Xilinx FPGAs. We show our results in form of chip area consumption, throughput and throughput per area. We compare and contrasted these results with most recently reported implementations of BLAKE. Our design ranked highest in terms of speed, achieving throughputs of 2.47Gbps on Virtex 7 and 2.28Gbps on Virtex 5.
加密散列函数是许多信息安全应用程序(如数字签名、消息身份验证码(mac)和其他形式的身份验证)的核心。由于最近在常用散列算法的密码分析方面的创新,NIST USA宣布公开竞争,以选择称为SHA-3的新标准安全散列算法。本次竞赛的一个重要部分是对候选人的硬件性能进行评估。在这项工作中,我们提出了SHA-3最后一轮候选之一:BLAKE的高吞吐量高效硬件实现。我们在最新的赛灵思fpga上实现并研究了BLAKE的性能。我们以芯片面积消耗、吞吐量和每区域吞吐量的形式显示我们的结果。我们将这些结果与最近报道的BLAKE实现进行了比较和对比。我们的设计在速度方面排名最高,在Virtex 7上实现了2.47Gbps的吞吐量,在Virtex 5上实现了2.28Gbps。
{"title":"High Throughput Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist: BLAKE","authors":"Kashif Latif, A. Mahboob, A. Aziz","doi":"10.1109/FIT.2011.42","DOIUrl":"https://doi.org/10.1109/FIT.2011.42","url":null,"abstract":"Cryptographic hash functions are at heart of many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In consequence of recent innovations in cryptanalysis of commonly used hash algorithms, NIST USA announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. An essential part of this contest is hardware performance evaluation of the candidates. In this work we present a high throughput efficient hardware implementation of one of the final round candidate of SHA-3: BLAKE. We implemented and investigated the performance of BLAKE on latest Xilinx FPGAs. We show our results in form of chip area consumption, throughput and throughput per area. We compare and contrasted these results with most recently reported implementations of BLAKE. Our design ranked highest in terms of speed, achieving throughputs of 2.47Gbps on Virtex 7 and 2.28Gbps on Virtex 5.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129816333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Investigating integration challenges and solutions in global software development 调查全球软件开发中的集成挑战和解决方案
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.61
A. Zafar, Sajad Ali, R. Shahzad
One of the major challenges of Global Software Development (GSD) is associated with overcoming integration problems that remain hidden throughout development and surface at the end of a project. Incompatibilities and other integration complexities can lead to extra costs, delays, lowered quality and even failure of a GSD project. A solid integration strategy can be an effective solution to overcome integration challenges, but this requires a good understanding of what causes failure and how the failures can be mitigated. The aim of this study is to investigate integration problems that occurred in different phases of GSD, and successful integration practices with their relative importance through an extensive literature review and a Delphi survey. As a result, a prioritized list of failure and success factors is obtained. The findings are applicable for planning new projects at an early stage of GSD or improving ongoing projects.
全球软件开发(GSD)的主要挑战之一是克服集成问题,这些问题在整个开发过程中一直隐藏着,并在项目结束时浮出水面。不兼容性和其他集成复杂性可能导致额外的成本、延迟、质量降低,甚至导致GSD项目失败。可靠的集成策略可以成为克服集成挑战的有效解决方案,但是这需要对导致失败的原因以及如何减轻失败有很好的理解。本研究的目的是通过广泛的文献综述和德尔菲调查来调查在GSD的不同阶段发生的整合问题,以及成功的整合实践及其相对重要性。结果,获得了失败和成功因素的优先级列表。研究结果适用于在政府发展规划的早期阶段规划新项目或改善正在进行的项目。
{"title":"Investigating integration challenges and solutions in global software development","authors":"A. Zafar, Sajad Ali, R. Shahzad","doi":"10.1109/FIT.2011.61","DOIUrl":"https://doi.org/10.1109/FIT.2011.61","url":null,"abstract":"One of the major challenges of Global Software Development (GSD) is associated with overcoming integration problems that remain hidden throughout development and surface at the end of a project. Incompatibilities and other integration complexities can lead to extra costs, delays, lowered quality and even failure of a GSD project. A solid integration strategy can be an effective solution to overcome integration challenges, but this requires a good understanding of what causes failure and how the failures can be mitigated. The aim of this study is to investigate integration problems that occurred in different phases of GSD, and successful integration practices with their relative importance through an extensive literature review and a Delphi survey. As a result, a prioritized list of failure and success factors is obtained. The findings are applicable for planning new projects at an early stage of GSD or improving ongoing projects.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130043987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Secure Solution to Data Transfer from Sensor Node to Sink against Aggregator Compromises 从传感器节点到汇聚器的数据传输安全解决方案
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.53
Sarfraz Azam, Rizwan Manzoor, M. Rehman
Energy is an igniting issue in the domain of wireless sensor networks. To overcome this issue, the technique of data aggregation is introduced. As the aggregator node collects data from many sensors so it becomes very interesting for compromisers. Unfortunately these aggregator nodes could be under the influence of various attacks. Under such circumstances, we have to make our data more secure, to protect it from adversary attacks. Proposed RSS (Re-Sequencing Scheme) provides secure data aggregation. It is based on symmetric key, information dispersal algorithm and multipath routing. Symmetric key is injected in the node at deployment time and it is shared only between the node and sink. Node sense data places it in buffer then disrupts the data sequence according to symmetric key. It splits data into many shares and routes them on multiple paths. On receiving, these aggregated shares are reconstructed by the sink and arrange the data in order, with the help of symmetric key. The RSS provides authenticity, data availability and protection against eavesdropping, data tampering and denial of service attacks, even in the presence of compromised nodes.
在无线传感器网络领域,能量是一个热点问题。为了克服这一问题,引入了数据聚合技术。由于聚合器节点从许多传感器收集数据,因此对妥协者来说变得非常有趣。不幸的是,这些聚合器节点可能受到各种攻击的影响。在这种情况下,我们必须使我们的数据更加安全,以保护它免受对手的攻击。建议的RSS(重新排序方案)提供安全的数据聚合。它基于对称密钥、信息分散算法和多径路由。对称密钥在部署时注入节点中,并且仅在节点和接收器之间共享。节点感知数据将其放入缓冲区,然后根据对称密钥打乱数据序列。它将数据分成许多共享,并在多条路径上进行路由。在接收到这些聚合共享后,接收器利用对称密钥对其进行重构,并对数据进行排序。RSS提供真实性、数据可用性和防止窃听、数据篡改和拒绝服务攻击的保护,即使在存在受损节点的情况下也是如此。
{"title":"Secure Solution to Data Transfer from Sensor Node to Sink against Aggregator Compromises","authors":"Sarfraz Azam, Rizwan Manzoor, M. Rehman","doi":"10.1109/FIT.2011.53","DOIUrl":"https://doi.org/10.1109/FIT.2011.53","url":null,"abstract":"Energy is an igniting issue in the domain of wireless sensor networks. To overcome this issue, the technique of data aggregation is introduced. As the aggregator node collects data from many sensors so it becomes very interesting for compromisers. Unfortunately these aggregator nodes could be under the influence of various attacks. Under such circumstances, we have to make our data more secure, to protect it from adversary attacks. Proposed RSS (Re-Sequencing Scheme) provides secure data aggregation. It is based on symmetric key, information dispersal algorithm and multipath routing. Symmetric key is injected in the node at deployment time and it is shared only between the node and sink. Node sense data places it in buffer then disrupts the data sequence according to symmetric key. It splits data into many shares and routes them on multiple paths. On receiving, these aggregated shares are reconstructed by the sink and arrange the data in order, with the help of symmetric key. The RSS provides authenticity, data availability and protection against eavesdropping, data tampering and denial of service attacks, even in the presence of compromised nodes.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114522460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gradient Adjusted Predictor with Pseudo-Distance Technique for Lossless Compression of Color-Mapped Images 基于伪距离技术的梯度调整预测器用于彩色映射图像的无损压缩
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.58
B. Koc, Z. Arnavut
Color-mapped images are widely used in many applications. Unlike most of the color-mapped image compression techniques, which require two passes, the pseudo-distance compression technique requires one pass and runs in linear time. Recently, we showed that when a structured arithmetic coder is used, after a color-mapped image is transformed with a pseudo-distance technique, better compression gains can be achieved over GIF and Huffman coder. In this work, we show that further compression gains are possible when a Gradient Adjusted Predictor is employed along with the pseudo-distance technique.
彩色映射图像广泛应用于许多应用中。与大多数需要两次处理的彩色映射图像压缩技术不同,伪距离压缩技术只需要一次处理,并且在线性时间内运行。最近,我们证明了当使用结构化算术编码器时,在使用伪距离技术对彩色映射图像进行变换后,可以比GIF和霍夫曼编码器获得更好的压缩增益。在这项工作中,我们表明,当梯度调整预测器与伪距离技术一起使用时,进一步的压缩增益是可能的。
{"title":"Gradient Adjusted Predictor with Pseudo-Distance Technique for Lossless Compression of Color-Mapped Images","authors":"B. Koc, Z. Arnavut","doi":"10.1109/FIT.2011.58","DOIUrl":"https://doi.org/10.1109/FIT.2011.58","url":null,"abstract":"Color-mapped images are widely used in many applications. Unlike most of the color-mapped image compression techniques, which require two passes, the pseudo-distance compression technique requires one pass and runs in linear time. Recently, we showed that when a structured arithmetic coder is used, after a color-mapped image is transformed with a pseudo-distance technique, better compression gains can be achieved over GIF and Huffman coder. In this work, we show that further compression gains are possible when a Gradient Adjusted Predictor is employed along with the pseudo-distance technique.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131797809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of Fast Parallel Sorting Algorithms for GPU Architectures' 面向GPU架构的快速并行排序算法分析
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.39
F. Khan, O. Khan, B. Montrucchio, P. Giaccone
Sorting algorithms have been studied extensively since past three decades. Their uses are found in many applications including real-time systems, operating systems, and discrete event simulations. In most cases, the efficiency of an application itself depends on usage of a sorting algorithm. Lately, the usage of graphic cards for general purpose computing has again revisited sorting algorithms. In this paper we extended our previous work regarding parallel sorting algorithms on GPU, and are presenting an analysis of parallel and sequential bitonic, odd-even and rank-sort algorithms on different GPU and CPU architectures. Their performance for various queue sizes is measured with respect to sorting time and rate and also the speed up of bitonic sort over odd-even sorting algorithms is shown on different GPUs and CPU. The algorithms have been written to exploit task parallelism model as available on multi-core GPUs using the OpenCL specification. Our findings report minimum of 19x speed-up of bitonic sort against odd-even sorting technique for small queue sizes on CPU and maximum of 2300x speed-up for very large queue sizes on Nvidia Quadro 6000 GPU architecture.
排序算法在过去的三十年里得到了广泛的研究。它们在许多应用程序中都有使用,包括实时系统、操作系统和离散事件模拟。在大多数情况下,应用程序本身的效率取决于排序算法的使用。最近,图形卡在通用计算中的使用再次重新审视了排序算法。在本文中,我们扩展了之前关于GPU上并行排序算法的工作,并对不同GPU和CPU架构上的并行和顺序双位、奇偶和秩排序算法进行了分析。在不同的gpu和CPU上测量了不同队列大小的排序时间和排序速率的性能,并显示了双元排序比奇偶排序算法的速度。这些算法是利用OpenCL规范在多核gpu上可用的任务并行模型编写的。我们的研究结果表明,对于CPU上的小队列大小,bitonic排序相对于奇偶排序技术的速度提高最少19倍,对于Nvidia Quadro 6000 GPU架构上的非常大的队列大小,速度提高最多2300倍。
{"title":"Analysis of Fast Parallel Sorting Algorithms for GPU Architectures'","authors":"F. Khan, O. Khan, B. Montrucchio, P. Giaccone","doi":"10.1109/FIT.2011.39","DOIUrl":"https://doi.org/10.1109/FIT.2011.39","url":null,"abstract":"Sorting algorithms have been studied extensively since past three decades. Their uses are found in many applications including real-time systems, operating systems, and discrete event simulations. In most cases, the efficiency of an application itself depends on usage of a sorting algorithm. Lately, the usage of graphic cards for general purpose computing has again revisited sorting algorithms. In this paper we extended our previous work regarding parallel sorting algorithms on GPU, and are presenting an analysis of parallel and sequential bitonic, odd-even and rank-sort algorithms on different GPU and CPU architectures. Their performance for various queue sizes is measured with respect to sorting time and rate and also the speed up of bitonic sort over odd-even sorting algorithms is shown on different GPUs and CPU. The algorithms have been written to exploit task parallelism model as available on multi-core GPUs using the OpenCL specification. Our findings report minimum of 19x speed-up of bitonic sort against odd-even sorting technique for small queue sizes on CPU and maximum of 2300x speed-up for very large queue sizes on Nvidia Quadro 6000 GPU architecture.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129375333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Dynamic Collaborations for Information Sharing within and across Virtual Teams 在虚拟团队内部和跨虚拟团队之间实现信息共享的动态协作
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.45
Ahmad Kamran Malik, S. Dustdar
Dynamic teams created by different enterprises collaborate to achieve their mutual goals. User-based collaborations for a specific task, within and across teams, result in a new team represented as dynamic collaboration (c). These inter-team and intra-team collaborations are mostly temporary which are based on specific task or goal. Collaborations among different teams, within a team, or across teams can take different forms when some or all of the users belonging to one or more teams collaborate for a common goal having diverse access control and sharing requirements imposed by themselves, their teams, or their parent enterprises. In such a dynamic environment, information sharing and privacy are critical issues for users, their teams and enterprises. We propose a dynamic sharing and privacy-aware model that supports enhanced sharing and preserves the privacy of users, their teams, and enterprises. We extend the widely used Role-Based Access Control (RBAC) model with team and task entities in addition to sharing and privacy data elements. In this model, using context constraints and hybrid access control policy, a user can control what to share with whom in which context conditions. We present a Dynamic Sharing and Privacy-aware Role-Based Access Control (DySP-RBAC) model that extends the RBAC model for enhanced sharing and privacy of information among collaborating users within and across virtual teams.
由不同企业创建的动态团队通过协作来实现共同的目标。针对特定任务的基于用户的协作,在团队内部和团队之间,产生一个新的团队,表示为动态协作(c)。这些团队间和团队内部的协作大多是临时的,基于特定的任务或目标。当属于一个或多个团队的部分或全部用户为一个共同目标进行协作时,不同团队之间、团队内部或跨团队的协作可以采取不同的形式,这些用户具有由他们自己、他们的团队或他们的母公司强加的不同访问控制和共享需求。在这样一个动态的环境中,信息共享和隐私对于用户、他们的团队和企业都是至关重要的问题。我们提出了一种动态共享和隐私感知模型,该模型支持增强共享并保护用户、其团队和企业的隐私。除了共享和隐私数据元素外,我们还使用团队和任务实体扩展了广泛使用的基于角色的访问控制(RBAC)模型。在该模型中,使用上下文约束和混合访问控制策略,用户可以控制在什么上下文条件下与谁共享什么内容。我们提出了一个动态共享和隐私感知基于角色的访问控制(DySP-RBAC)模型,该模型扩展了RBAC模型,以增强虚拟团队内部和跨虚拟团队协作用户之间的信息共享和隐私。
{"title":"Dynamic Collaborations for Information Sharing within and across Virtual Teams","authors":"Ahmad Kamran Malik, S. Dustdar","doi":"10.1109/FIT.2011.45","DOIUrl":"https://doi.org/10.1109/FIT.2011.45","url":null,"abstract":"Dynamic teams created by different enterprises collaborate to achieve their mutual goals. User-based collaborations for a specific task, within and across teams, result in a new team represented as dynamic collaboration (c). These inter-team and intra-team collaborations are mostly temporary which are based on specific task or goal. Collaborations among different teams, within a team, or across teams can take different forms when some or all of the users belonging to one or more teams collaborate for a common goal having diverse access control and sharing requirements imposed by themselves, their teams, or their parent enterprises. In such a dynamic environment, information sharing and privacy are critical issues for users, their teams and enterprises. We propose a dynamic sharing and privacy-aware model that supports enhanced sharing and preserves the privacy of users, their teams, and enterprises. We extend the widely used Role-Based Access Control (RBAC) model with team and task entities in addition to sharing and privacy data elements. In this model, using context constraints and hybrid access control policy, a user can control what to share with whom in which context conditions. We present a Dynamic Sharing and Privacy-aware Role-Based Access Control (DySP-RBAC) model that extends the RBAC model for enhanced sharing and privacy of information among collaborating users within and across virtual teams.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"28 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132638558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Gender Classification Using Interlaced Derivative Pattern and Principal Component Analysis 基于交错导数模式和主成分分析的高效性别分类
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.57
S. Khan, Muhammad Nazir, Usman Asghar, Naveed Riaz Ansari
With the wealth of image data that is now becoming increasingly accessible through the advent of the world wide web and proliferation of cheap, high quality digital cameras it is becoming ever more desirable to be able to automatically classify Gender into appropriate category such that intelligent agents and other such intelligent software might make better informed decisions regarding them without a need for excessive human intervention. In this paper, we present a new technique which provides superior performance superior than existing gender classification techniques. We first detect the face portion using Voila Jones face detector and then Interlaced Derivative Pattern (IDP)extract discriminative facial features for gender which are passed through Principal Component Analysis (PCA) to eliminate redundant features and thus reduce dimension. Keeping in mind strengths of different classifiers three classifiers K-nearest neighbor, Support Vector Machine and Fisher Discriminant Analysis are combined, which minimizes the classification error rate. We have used Stanford University Medical students (SUMS) face database for our experiment. Comparing our results and performance with existing techniques our proposed method provides high accuracy rate and robustness to illumination change.
随着万维网的出现和廉价、高质量的数码相机的普及,越来越多的人可以获得丰富的图像数据,能够自动将性别分类到适当的类别,这样智能代理和其他智能软件就可以在不需要过多人为干预的情况下做出更明智的决定,这变得越来越可取。在本文中,我们提出了一种新的性别分类技术,其性能优于现有的性别分类技术。我们首先使用Voila Jones人脸检测器检测人脸部分,然后利用IDP (inter隔行导数模式)提取性别判别性人脸特征,并通过主成分分析(PCA)去除冗余特征,从而实现降维。考虑到不同分类器的优势,将k近邻分类器、支持向量机分类器和Fisher判别分析分类器相结合,使分类错误率最小化。我们使用Stanford University Medical students (sum)的人脸数据库进行实验。结果表明,该方法具有较高的准确率和对光照变化的鲁棒性。
{"title":"Efficient Gender Classification Using Interlaced Derivative Pattern and Principal Component Analysis","authors":"S. Khan, Muhammad Nazir, Usman Asghar, Naveed Riaz Ansari","doi":"10.1109/FIT.2011.57","DOIUrl":"https://doi.org/10.1109/FIT.2011.57","url":null,"abstract":"With the wealth of image data that is now becoming increasingly accessible through the advent of the world wide web and proliferation of cheap, high quality digital cameras it is becoming ever more desirable to be able to automatically classify Gender into appropriate category such that intelligent agents and other such intelligent software might make better informed decisions regarding them without a need for excessive human intervention. In this paper, we present a new technique which provides superior performance superior than existing gender classification techniques. We first detect the face portion using Voila Jones face detector and then Interlaced Derivative Pattern (IDP)extract discriminative facial features for gender which are passed through Principal Component Analysis (PCA) to eliminate redundant features and thus reduce dimension. Keeping in mind strengths of different classifiers three classifiers K-nearest neighbor, Support Vector Machine and Fisher Discriminant Analysis are combined, which minimizes the classification error rate. We have used Stanford University Medical students (SUMS) face database for our experiment. Comparing our results and performance with existing techniques our proposed method provides high accuracy rate and robustness to illumination change.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131051628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD) - Android's Malware Attack, Stealthiness and Defense: An Improvement 增强Android木马的隐身性和效率和防御可能性(EnSEAD) - Android的恶意软件攻击,隐身性和防御:一个改进
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.35
Mohammad Ali, H. Ali, Z. Anwar
In this work, we have studied Android Architecture from a security point of view. We have studied various defense mechanisms that are present in current Android Platform or are recently proposed. We took inspiration from Sound comber -- a recent Android Trojan that steals sensitive information using various techniques. We enhanced the capabilities of Sound comber in terms of its stealthiness and efficiency in malicious communication by identifying new covert channel and incorporating basic compression. We then developed a new Android Trojan -- Contact Archiver (steals user contacts) which inherits properties from Sound comber, i.e. uses few and innocuous permissions, circumvents already-known security defenses, conveys information remotely without direct network access plus incorporates enhancements proposed by us. We also propose some defense possibilities to detect Contact Archiver covert communication. Our future work will be to block security attacks performed using our enhancements, when they are used in any Android malware.
在这项工作中,我们从安全的角度研究了Android架构。我们研究了当前Android平台中存在的或最近提出的各种防御机制。我们的灵感来自Sound comber,这是一款最新的Android木马,可以通过各种技术窃取敏感信息。我们通过识别新的隐蔽信道并结合基本压缩,增强了声音梳理器在恶意通信中的隐身性和效率。然后我们开发了一种新的Android木马——Contact Archiver(窃取用户联系人),它继承了Sound comber的属性,即使用少量无害的权限,绕过已知的安全防御,在没有直接网络访问的情况下远程传递信息,并结合了我们提出的增强功能。我们还提出了一些防御可能性来检测接触归档器的秘密通信。我们未来的工作将是阻止使用我们增强的安全攻击,当它们被用于任何Android恶意软件时。
{"title":"Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD) - Android's Malware Attack, Stealthiness and Defense: An Improvement","authors":"Mohammad Ali, H. Ali, Z. Anwar","doi":"10.1109/FIT.2011.35","DOIUrl":"https://doi.org/10.1109/FIT.2011.35","url":null,"abstract":"In this work, we have studied Android Architecture from a security point of view. We have studied various defense mechanisms that are present in current Android Platform or are recently proposed. We took inspiration from Sound comber -- a recent Android Trojan that steals sensitive information using various techniques. We enhanced the capabilities of Sound comber in terms of its stealthiness and efficiency in malicious communication by identifying new covert channel and incorporating basic compression. We then developed a new Android Trojan -- Contact Archiver (steals user contacts) which inherits properties from Sound comber, i.e. uses few and innocuous permissions, circumvents already-known security defenses, conveys information remotely without direct network access plus incorporates enhancements proposed by us. We also propose some defense possibilities to detect Contact Archiver covert communication. Our future work will be to block security attacks performed using our enhancements, when they are used in any Android malware.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2011 Frontiers of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1