Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982273
Liu Xin
To date, one interesting research topic in constructing anonymous subscription systems is how to allow client profiling, while keeping customers anonymous when they access one service. Though several solutions have been proposed, the service providers are only endowed with limited ability of utilizing and analyzing accumulated transaction transcripts at the cost of weakened privacy protection. To overcome this obstacle, we put forth the first anonymous subscription system with privacy preserving data mining, which is derived by applying the technique of Kiayias-Xu-Yung data mining group signature to the underlying multi-service subscription system by Canard and Jambert. The most prominent benefit of the new system is that service providers can obtain the desired output by a quorum of trusted data mining servers, and at the same time the customers can preserve maximum possible anonymity. Performance comparison shows that the proposed system is more practical than several related schemes published recently.
{"title":"Practical anonymous subscription system with privacy preserving data mining","authors":"Liu Xin","doi":"10.1109/ICSESS.2011.5982273","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982273","url":null,"abstract":"To date, one interesting research topic in constructing anonymous subscription systems is how to allow client profiling, while keeping customers anonymous when they access one service. Though several solutions have been proposed, the service providers are only endowed with limited ability of utilizing and analyzing accumulated transaction transcripts at the cost of weakened privacy protection. To overcome this obstacle, we put forth the first anonymous subscription system with privacy preserving data mining, which is derived by applying the technique of Kiayias-Xu-Yung data mining group signature to the underlying multi-service subscription system by Canard and Jambert. The most prominent benefit of the new system is that service providers can obtain the desired output by a quorum of trusted data mining servers, and at the same time the customers can preserve maximum possible anonymity. Performance comparison shows that the proposed system is more practical than several related schemes published recently.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116288937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982392
Xiao-hui Cheng, Cuina Zhang, Maojie Zhou
Image retrieval is to find similar images in image library, LBP texture spectrum is sensitive to the rotation for this problem, a primitive rotating LBP texture spectrum obtained after a certain point of view as a new texture spectrum consistent with the visual texture primitive spectrum, will have all the texture spectrum of visual consistency primitives into one, this can reduce the dimension of feature values, and image rotation can solve the problem of similarity calculation, using the texture spectrum for texture image description, and finally histogram with the texture primitive search, the results show that the precision than the traditional LBP has significantly improved, better search results.
{"title":"Rotation invariant texture spectrum-based image retrieval algorithm","authors":"Xiao-hui Cheng, Cuina Zhang, Maojie Zhou","doi":"10.1109/ICSESS.2011.5982392","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982392","url":null,"abstract":"Image retrieval is to find similar images in image library, LBP texture spectrum is sensitive to the rotation for this problem, a primitive rotating LBP texture spectrum obtained after a certain point of view as a new texture spectrum consistent with the visual texture primitive spectrum, will have all the texture spectrum of visual consistency primitives into one, this can reduce the dimension of feature values, and image rotation can solve the problem of similarity calculation, using the texture spectrum for texture image description, and finally histogram with the texture primitive search, the results show that the precision than the traditional LBP has significantly improved, better search results.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130403020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982450
Liangfang Huang, Lingling Wang
E-commerce is developing very fast and has achieved remarkable achievement in China. However, a series of ethical issues especially true crisis occur in e-commerce development. And trust issue is the biggest concern in e-commerce. For the long term, creating the integrity image for transaction parties is an important approach for keeping e-commerce developing healthily in China. The paper discusses the trust issue and uses the Trust Principles to analyze the trust situation in Chinese e-commerce. As the result, the paper proposes some suggestions and solutions to address the trust crisis in e-commerce.
{"title":"The trust principles: The guidance of trust creation in e-commerce","authors":"Liangfang Huang, Lingling Wang","doi":"10.1109/ICSESS.2011.5982450","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982450","url":null,"abstract":"E-commerce is developing very fast and has achieved remarkable achievement in China. However, a series of ethical issues especially true crisis occur in e-commerce development. And trust issue is the biggest concern in e-commerce. For the long term, creating the integrity image for transaction parties is an important approach for keeping e-commerce developing healthily in China. The paper discusses the trust issue and uses the Trust Principles to analyze the trust situation in Chinese e-commerce. As the result, the paper proposes some suggestions and solutions to address the trust crisis in e-commerce.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130614128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982335
Bakhtiari Shaghayegh
Currently, with the emergence of mobile payment systems and service-oriented architecture, the focus has shifted to utilizing modern service industry in mobile commerce. One of the important uses of mobile applications is transforming the mobile phone into a mobile wallet with digital cash that supports both anonymity (as real cash) and security [3]. Hence, in this article we propose applying service-oriented architecture in a mobile payment system called MobiCash to provide fully anonymity for mobile users.
{"title":"Using service oriented architecture in a new anonymous mobile payment system","authors":"Bakhtiari Shaghayegh","doi":"10.1109/ICSESS.2011.5982335","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982335","url":null,"abstract":"Currently, with the emergence of mobile payment systems and service-oriented architecture, the focus has shifted to utilizing modern service industry in mobile commerce. One of the important uses of mobile applications is transforming the mobile phone into a mobile wallet with digital cash that supports both anonymity (as real cash) and security [3]. Hence, in this article we propose applying service-oriented architecture in a mobile payment system called MobiCash to provide fully anonymity for mobile users.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132792247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982289
Sasan Jiaqaeeyan, Monsen Kosnanzaden
This paper focuses on IEEE 802.1U that is the last released security standard for WLAN and tries to resolve bugs of previous security standards in wireless networks, but it is vulnerable against some DOS (Denial of Service) attacks. One of the attacks that is considered in this paper happens in the last phase of the authentication process called 4-way handshake blocking. In this paper, in order to prevent the DOS attack we propose two solutions; first one is a new statistical method against abnormally increase of Message1 and another solution changes Message3- one of the messages in 4-way handshake phase-. We use C#.Net 2010 programming Language to implement 802.1U platform and then solutions and final results will be compared together.
本文以最新发布的无线局域网安全标准IEEE 802.1U为研究对象,试图解决以往无线网络安全标准中存在的一些漏洞,但该标准容易受到DOS (Denial of Service)攻击。本文考虑的一种攻击发生在身份验证过程的最后阶段,称为4路握手阻断。为了防止DOS攻击,本文提出了两种解决方案;第一个解决方案是针对Message1异常增加的一种新的统计方法,另一个解决方案是对处于4路握手阶段的消息之一Message3进行更改。我们使用c#。Net 2010编程语言实现802.1U平台,然后将解决方案与最终结果进行比较。
{"title":"Prevention of 4-way handshake blocking in IEEE 802.1 li by an statistical method and changing Message3","authors":"Sasan Jiaqaeeyan, Monsen Kosnanzaden","doi":"10.1109/ICSESS.2011.5982289","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982289","url":null,"abstract":"This paper focuses on IEEE 802.1U that is the last released security standard for WLAN and tries to resolve bugs of previous security standards in wireless networks, but it is vulnerable against some DOS (Denial of Service) attacks. One of the attacks that is considered in this paper happens in the last phase of the authentication process called 4-way handshake blocking. In this paper, in order to prevent the DOS attack we propose two solutions; first one is a new statistical method against abnormally increase of Message1 and another solution changes Message3- one of the messages in 4-way handshake phase-. We use C#.Net 2010 programming Language to implement 802.1U platform and then solutions and final results will be compared together.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128220851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982378
Hongchang Zhang, Shujuan Jiang, Rong Jin
In order to improve the accuracy of the static program slicing which is used to locate the faults that cause an exception, we propose a new approach that uses the stack trace which is stored when an exception occurred. The proposed approach consists of three steps. First, it uses stack trace to infer the execution trace and figure out those methods and statements that have not been ever executed. Then, these methods which are not executed will be ignored when building the system dependence graph. Finally, the accurate slice will be got by adopting the improved program slicing algorithm. We perform an empirical study of our new approach by using four reported bugs of open-source project Ant. And the result shows that using our approach the slice is 8 percent less than using the general static program slicing algorithm on average.
{"title":"An improved static program slicing algorithm using stack trace","authors":"Hongchang Zhang, Shujuan Jiang, Rong Jin","doi":"10.1109/ICSESS.2011.5982378","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982378","url":null,"abstract":"In order to improve the accuracy of the static program slicing which is used to locate the faults that cause an exception, we propose a new approach that uses the stack trace which is stored when an exception occurred. The proposed approach consists of three steps. First, it uses stack trace to infer the execution trace and figure out those methods and statements that have not been ever executed. Then, these methods which are not executed will be ignored when building the system dependence graph. Finally, the accurate slice will be got by adopting the improved program slicing algorithm. We perform an empirical study of our new approach by using four reported bugs of open-source project Ant. And the result shows that using our approach the slice is 8 percent less than using the general static program slicing algorithm on average.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122899949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982257
Zhaojuan Yue, Yongmao Ren, Jun Li
The emergence of high speed long distance networks has promoted the development of various e-science applications. The traditional TCP protocol is not suitable for high bandwidth-delay product networks because of its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. This paper mainly introduces four kinds of typical UDP-based high speed transport protocols (RUBDP, Tsunami, UDT, and PA-UDP). By experiments on the test bed with end-to-end transport mode, the influence of the file size, loss ratio and RTT to the performance of the four protocols is evaluated. And, the intra-protocol fairness and inter-protocol fairness while transferring multiple parallel flows are also evaluated. The results show: PA-UDP protocol has the best transport performance; UDT protocol is the most convenient, because it does not require the users to set the initial sending rate, buffer size and other parameters.
{"title":"Performance evaluation of UDP-based high-speed transport protocols","authors":"Zhaojuan Yue, Yongmao Ren, Jun Li","doi":"10.1109/ICSESS.2011.5982257","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982257","url":null,"abstract":"The emergence of high speed long distance networks has promoted the development of various e-science applications. The traditional TCP protocol is not suitable for high bandwidth-delay product networks because of its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. This paper mainly introduces four kinds of typical UDP-based high speed transport protocols (RUBDP, Tsunami, UDT, and PA-UDP). By experiments on the test bed with end-to-end transport mode, the influence of the file size, loss ratio and RTT to the performance of the four protocols is evaluated. And, the intra-protocol fairness and inter-protocol fairness while transferring multiple parallel flows are also evaluated. The results show: PA-UDP protocol has the best transport performance; UDT protocol is the most convenient, because it does not require the users to set the initial sending rate, buffer size and other parameters.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982357
Baofeng Zhang, Kuigang Zhang, Junchao Zhu, Xinzhi Li
TMS320DM642(DM642) is a widely used digital media DSP chip. As with no Universal Asynchronous Receiver/Transmitter(UART) provided, it is difficult to communicate with other UART devices,especially in wireless video surveillance system.This paper uses on-chip multichannel buffered serial port(McBSP) and enhanced direct memory access(EDMA) to implement UART function based on DM642 and wireless communication module LC6311. The initialization of the McBSP and the data coding/decoding inprocess of transmitting/receiving are discussed in detail.This method can implement the communication between DM642 and LC6311 with easy program flow and no other devices. It enriches interface function of the DM642 and provides a new interface design for wireless video monitoring system.
{"title":"UART interface design based on DM642 video surveillance system and wireless network module","authors":"Baofeng Zhang, Kuigang Zhang, Junchao Zhu, Xinzhi Li","doi":"10.1109/ICSESS.2011.5982357","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982357","url":null,"abstract":"TMS320DM642(DM642) is a widely used digital media DSP chip. As with no Universal Asynchronous Receiver/Transmitter(UART) provided, it is difficult to communicate with other UART devices,especially in wireless video surveillance system.This paper uses on-chip multichannel buffered serial port(McBSP) and enhanced direct memory access(EDMA) to implement UART function based on DM642 and wireless communication module LC6311. The initialization of the McBSP and the data coding/decoding inprocess of transmitting/receiving are discussed in detail.This method can implement the communication between DM642 and LC6311 with easy program flow and no other devices. It enriches interface function of the DM642 and provides a new interface design for wireless video monitoring system.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124428666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982240
Quanhui Jia, Lieli Liu
Quality and safety of consumer products have drawn wide attention from scholars in related domain, this issue is based on the subject of the quality and safety of consumer goods, in accordance with characteristics of cases, and put forward a hierarchical support vector machine classification algorithm based on the relative separability of the feature space, to solve the low classification performance and high rate of misclassification of the existing algorithms. The weight of Binary Search Tree is the separability of samples, determining the order of categories by a selective set of training samples to construct SVM classifier and the final formation of a binary classification of the larger interval multi-valued SVM classifier tree. Simulation results show that the method has a faster test speed, relatively perfect good classification accuracy and generalization performance.
{"title":"BS-SVM multi-classification model in the application of consumer goods","authors":"Quanhui Jia, Lieli Liu","doi":"10.1109/ICSESS.2011.5982240","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982240","url":null,"abstract":"Quality and safety of consumer products have drawn wide attention from scholars in related domain, this issue is based on the subject of the quality and safety of consumer goods, in accordance with characteristics of cases, and put forward a hierarchical support vector machine classification algorithm based on the relative separability of the feature space, to solve the low classification performance and high rate of misclassification of the existing algorithms. The weight of Binary Search Tree is the separability of samples, determining the order of categories by a selective set of training samples to construct SVM classifier and the final formation of a binary classification of the larger interval multi-valued SVM classifier tree. Simulation results show that the method has a faster test speed, relatively perfect good classification accuracy and generalization performance.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129003764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-15DOI: 10.1109/ICSESS.2011.5982482
Feng Tian, Youwei Zhang, Dengwei Ma
The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code's equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.
{"title":"Research on the technology of concealing the character of binary codes based on equal transposition","authors":"Feng Tian, Youwei Zhang, Dengwei Ma","doi":"10.1109/ICSESS.2011.5982482","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982482","url":null,"abstract":"The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code's equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}