Searchable Encryption(SE) schemes allow users to perform keyword search on encrypted data without leakage of the sensitive information. Most of the existing SE schemes are limited to single-user setting or multi-user setting with coarser-grained access control. However, the application that multiple users with different access rights to the sharing data is more practical under the cloud environment. To bridge this gap, we consider searchable encryption with fine-grained access control under multi-user setting in this paper. The proposed scheme requires less computation cost at user side but provides fine-grained access control to authorized users under a new hybrid architecture. Combining symmetric encryption and Cipher text-Policy Attribute based Encryption(CP-ABE), we achieve a user collusion resistant scheme with the help of the private cloud. Our scheme solves a prevalent problem of key sharing. And the exposure of attribute secret key to the public cloud will not affect the system security. Dynamic and efficient user revocation is also provided. Security analysis shows that our scheme is secure.
可搜索加密(SE)方案允许用户在不泄露敏感信息的情况下对加密数据进行关键字搜索。现有的SE方案大多局限于单用户设置或多用户设置,具有粗粒度的访问控制。但是,在云环境下,多个具有不同访问权限的用户对共享数据进行访问的应用更加实用。为了弥补这一缺陷,本文考虑了在多用户设置下具有细粒度访问控制的可搜索加密。该方案减少了用户端的计算成本,同时在新的混合架构下为授权用户提供了细粒度的访问控制。结合对称加密和密码文本-策略属性加密(Cipher text-Policy Attribute based encryption, CP-ABE),在私有云的帮助下实现了一种抗用户合谋的方案。我们的方案解决了一个普遍存在的密钥共享问题。并且属性秘钥向公有云公开不会影响系统的安全性。还提供了动态和有效的用户撤销。安全性分析表明,该方案是安全的。
{"title":"Multi-user Searchable Encryption with Fine-Grained Access Control without Key Sharing","authors":"Qinqin Wang, Yanqin Zhu, Xizhao Luo","doi":"10.1109/ACSAT.2014.32","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.32","url":null,"abstract":"Searchable Encryption(SE) schemes allow users to perform keyword search on encrypted data without leakage of the sensitive information. Most of the existing SE schemes are limited to single-user setting or multi-user setting with coarser-grained access control. However, the application that multiple users with different access rights to the sharing data is more practical under the cloud environment. To bridge this gap, we consider searchable encryption with fine-grained access control under multi-user setting in this paper. The proposed scheme requires less computation cost at user side but provides fine-grained access control to authorized users under a new hybrid architecture. Combining symmetric encryption and Cipher text-Policy Attribute based Encryption(CP-ABE), we achieve a user collusion resistant scheme with the help of the private cloud. Our scheme solves a prevalent problem of key sharing. And the exposure of attribute secret key to the public cloud will not affect the system security. Dynamic and efficient user revocation is also provided. Security analysis shows that our scheme is secure.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116565923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a conceptual framework for owner- contractor relationship and time-cost trade-off analysis of construction project control system using fuzzy logic approach. Construction projects require a well-defined starting point and well-defined finish point with accurate resource allocation to avoid any cost overrun. During the life cycle of the project, different problems can appear. The most important ones are delay and construction cost overrun during the executing phase of the project. To avoid that, an effective planning system with effective control technique is a crucial issue. The main objectives of this research are to develop and design a conceptual framework that may be a guide for the contractor and the owner for controlling the construction projects. The results show that a good conceptual framework need to start with breaking down the project in conjunction with analyzing the cost and time to have both the contractor and the owner the better and less risk in having a good proposal in time, cost and quality. However the final framework show that a need for continuous feedback from the owner to the contractor during the planning process and also can help in designing and developing a proposal that satisfy both the contractor and the owner in terms in time, cost and quality. Risk assessment should be one of the main factors that should be considered during all steps in monitoring, planning and controlling the project. Finally a simulation has been done using the Fuzzy logic approach to validate the conceptual framework).
{"title":"Modeling a Conceptual Framework for Owner-Contractor Relationship and Time-Cost Trade-Off Using Fuzzy Logic Techniques","authors":"M. A. Al Hazza, Mohammad Al Fadel, E. Adesta","doi":"10.1109/ACSAT.2014.38","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.38","url":null,"abstract":"This paper proposes a conceptual framework for owner- contractor relationship and time-cost trade-off analysis of construction project control system using fuzzy logic approach. Construction projects require a well-defined starting point and well-defined finish point with accurate resource allocation to avoid any cost overrun. During the life cycle of the project, different problems can appear. The most important ones are delay and construction cost overrun during the executing phase of the project. To avoid that, an effective planning system with effective control technique is a crucial issue. The main objectives of this research are to develop and design a conceptual framework that may be a guide for the contractor and the owner for controlling the construction projects. The results show that a good conceptual framework need to start with breaking down the project in conjunction with analyzing the cost and time to have both the contractor and the owner the better and less risk in having a good proposal in time, cost and quality. However the final framework show that a need for continuous feedback from the owner to the contractor during the planning process and also can help in designing and developing a proposal that satisfy both the contractor and the owner in terms in time, cost and quality. Risk assessment should be one of the main factors that should be considered during all steps in monitoring, planning and controlling the project. Finally a simulation has been done using the Fuzzy logic approach to validate the conceptual framework).","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128452035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The improvements and capabilities of Business Intelligence (BI) systems are making them highly required by organizations in many of the fields. Day by day, the demand is increasing on these systems. Figures show that billions of US dollars are spent annually on BI systems. However, half of these BI projects are ending with unrealized benefit, according to some studies. As a participation to reduce this failure rate, the authors have developed a conceptual model, based on the existing studies in the field, which may help organizations to assess their readiness toward BI systems. The conceptual model is tested empirically on the Context of Malaysian Organizations(CMOs) as they are emerging widely to BI systems and they lack for this kind of studies to be done them. The conceptual model is consisting of seven dimensions. Depending on the results of the conducted study, this paper will disclose the results of management dimension, which will help to know the degree of its importance for organizations' to be ready for such systems. A brief introduction on BI systems and the challenges of their implementation will be presented. In Addition, this paper will go through some important studies have been done in the field. The details of the study will be provided as well.
{"title":"Management Dimension for Assessing Organizations' Readiness toward Business Intelligence Systems","authors":"A. H. Anjariny, A. Zeki","doi":"10.1109/ACSAT.2014.11","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.11","url":null,"abstract":"The improvements and capabilities of Business Intelligence (BI) systems are making them highly required by organizations in many of the fields. Day by day, the demand is increasing on these systems. Figures show that billions of US dollars are spent annually on BI systems. However, half of these BI projects are ending with unrealized benefit, according to some studies. As a participation to reduce this failure rate, the authors have developed a conceptual model, based on the existing studies in the field, which may help organizations to assess their readiness toward BI systems. The conceptual model is tested empirically on the Context of Malaysian Organizations(CMOs) as they are emerging widely to BI systems and they lack for this kind of studies to be done them. The conceptual model is consisting of seven dimensions. Depending on the results of the conducted study, this paper will disclose the results of management dimension, which will help to know the degree of its importance for organizations' to be ready for such systems. A brief introduction on BI systems and the challenges of their implementation will be presented. In Addition, this paper will go through some important studies have been done in the field. The details of the study will be provided as well.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, S. AlDabbagh
The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps, reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks.
{"title":"Cyber-Attacks Detection & Protection in Kuwait Government Sectors","authors":"Khalid Abdulkareem Al-Enezi, I. Al-Shaikhli, A. Al-kandari, S. AlDabbagh","doi":"10.1109/ACSAT.2014.16","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.16","url":null,"abstract":"The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of protection from cyber-attacks can be identified based on three main steps, reactive services, proactive services and security quality management. Such issues will be discussed in this research to help companies identify different risks against their computer systems to put an end to such attacks.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a designing of a web based system for Career Guidance and Employment Management System (CGEMS). Basically, CGEMS is tries to help a user who is looking for career advice guidance, or looking for their opportune job. CGEMS tries to make one place where student, job seeker, career advisor or consultant, and various company or organization can meet and help. In order to help the users to determine their best career choice, this system also offers some tests or quizzes that are related to such career and the user personality which will be useful for the career path. Furthermore, users of CGEMS such as company or organization can post a job description, when they look for employee.
{"title":"Career Guidance and Employment Management System","authors":"K. Seng, A. Zeki","doi":"10.1109/ACSAT.2014.20","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.20","url":null,"abstract":"This paper presents a designing of a web based system for Career Guidance and Employment Management System (CGEMS). Basically, CGEMS is tries to help a user who is looking for career advice guidance, or looking for their opportune job. CGEMS tries to make one place where student, job seeker, career advisor or consultant, and various company or organization can meet and help. In order to help the users to determine their best career choice, this system also offers some tests or quizzes that are related to such career and the user personality which will be useful for the career path. Furthermore, users of CGEMS such as company or organization can post a job description, when they look for employee.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123223514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Mantoro, Feriadi, Nazori Agani, M. A. Ayu, D. Jatikusumo
Recently the number of accidents and crimes are arising in many big cities. Mobile applications with location aware systems can be utilized in providing location information of the crime. The problem is that location information provided by mobile phones has not been fully utilized. Mostly mobile phones used for its main functions which are for calling and messaging. This paper argues that location information can be used for reporting accident and crime, so that a quick and fast response can be achieved. This study proposes a framework of mobile crime information assistance to help the users (victim) from locus delicti (location where accident or crime happened) with location aware capabilities. Using this framework, mobile app can send and receive location of crimes including the scenes (images) to the nearest police station or central police station. The system can offer a facility to track the location of the nearest police station by accessing a built-in database with a combination of Google map APIs and send the scene/image of the crime location as one complete set of report to the police station. This will allow the police to find the location of the accident right away and increase the safety of the resident in big cities.
{"title":"Location-Aware Mobile Crime Information Framework for Fast Tracking Response to Accidents and Crimes in Big Cities","authors":"T. Mantoro, Feriadi, Nazori Agani, M. A. Ayu, D. Jatikusumo","doi":"10.1109/ACSAT.2014.41","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.41","url":null,"abstract":"Recently the number of accidents and crimes are arising in many big cities. Mobile applications with location aware systems can be utilized in providing location information of the crime. The problem is that location information provided by mobile phones has not been fully utilized. Mostly mobile phones used for its main functions which are for calling and messaging. This paper argues that location information can be used for reporting accident and crime, so that a quick and fast response can be achieved. This study proposes a framework of mobile crime information assistance to help the users (victim) from locus delicti (location where accident or crime happened) with location aware capabilities. Using this framework, mobile app can send and receive location of crimes including the scenes (images) to the nearest police station or central police station. The system can offer a facility to track the location of the nearest police station by accessing a built-in database with a combination of Google map APIs and send the scene/image of the crime location as one complete set of report to the police station. This will allow the police to find the location of the accident right away and increase the safety of the resident in big cities.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is a model that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Numerous studies have shown that by replacing traditional computing with cloud infrastructure, the total power consumption can be decreased because cloud computing power consumption is influenced by four key cloud factors: dynamic provisioning, multi-tenancy, server utilization, and data center efficiency. Considering the huge amount of energy consumed by computing equipment in the last several years, energy consumption and sustainability have become one of the main areas of research. Thus, obtaining high performance at a reduced cost in cloud environments has reached a turning point where computing power is no longer the most important concern. Calculate the amount of energy consumption in a real cloud computing infrastructure is difficult. Thus, simulation tools have been developed in recent years to enable cloud computing researchers to analyze a cloud computing environment. This paper will introduce and compare the two popular cloud simulators: Cloud Sim and Green Cloud. Both simulators provide scenarios for cloud computing based on utilization, virtualization, and load and energy consumption of the server. The comparison showed that the Green Cloud simulator is more advantageous than the Cloud Sim simulator based on an accurate measurement of energy consumption in a cloud computing environment.
{"title":"Comparison between Cloud Sim and Green Cloud in Measuring Energy Consumption in a Cloud Environment","authors":"Saleh Atiewi, S. Yussof","doi":"10.1109/ACSAT.2014.9","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.9","url":null,"abstract":"Cloud computing is a model that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Numerous studies have shown that by replacing traditional computing with cloud infrastructure, the total power consumption can be decreased because cloud computing power consumption is influenced by four key cloud factors: dynamic provisioning, multi-tenancy, server utilization, and data center efficiency. Considering the huge amount of energy consumed by computing equipment in the last several years, energy consumption and sustainability have become one of the main areas of research. Thus, obtaining high performance at a reduced cost in cloud environments has reached a turning point where computing power is no longer the most important concern. Calculate the amount of energy consumption in a real cloud computing infrastructure is difficult. Thus, simulation tools have been developed in recent years to enable cloud computing researchers to analyze a cloud computing environment. This paper will introduce and compare the two popular cloud simulators: Cloud Sim and Green Cloud. Both simulators provide scenarios for cloud computing based on utilization, virtualization, and load and energy consumption of the server. The comparison showed that the Green Cloud simulator is more advantageous than the Cloud Sim simulator based on an accurate measurement of energy consumption in a cloud computing environment.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130790571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social Networks (SNs) becomes one of the essential platform for reporting real time events now a days. SNs has been used by millions of people around the world for sharing thoughts and daily life events on many topics, either it is political, crisis, Peace building (Pb). The objective of this paper is to get insight of Pb Event Mining (EM) from SNs (e.g., Tweets, Fb posts, etc) by conducting the Systematic Literature Review (SLR) process. The paper aims to answer some research questions (RQs) that includes, 1) Which SN's has been widely used for Textual Pb Event Mining PbEM?, 2) What Context or setting has been focussed of PbEM studies and how to categorize Pb events?, and 3) What other types of events (non-Pb) are reported? The SLR process has been used to identify the related literature and for analysis of evidences in order to answer the RQs. This paper concluded on the basis of SLR studies that the "Twitter" is widely used SN for Textual PbEM because 54 out of 64 studies on PbEM uses Twitter. SLR resulted that earth quake (EQ) events are the major concerned events that effect country's economy and peace therefore most of studies uses the EQ as context/setting. The paper presents the details on categories of Pb events, contexts/settings and the list of other types of events or topics that are the center of the research now a days based on synthesis of evidences.
{"title":"Social Networks Peacebuilding Event Mining: A Systematic Literature Review","authors":"Muniba Shaikh, Norsaremah Salleh, Lili Marziana","doi":"10.1109/ACSAT.2014.28","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.28","url":null,"abstract":"Social Networks (SNs) becomes one of the essential platform for reporting real time events now a days. SNs has been used by millions of people around the world for sharing thoughts and daily life events on many topics, either it is political, crisis, Peace building (Pb). The objective of this paper is to get insight of Pb Event Mining (EM) from SNs (e.g., Tweets, Fb posts, etc) by conducting the Systematic Literature Review (SLR) process. The paper aims to answer some research questions (RQs) that includes, 1) Which SN's has been widely used for Textual Pb Event Mining PbEM?, 2) What Context or setting has been focussed of PbEM studies and how to categorize Pb events?, and 3) What other types of events (non-Pb) are reported? The SLR process has been used to identify the related literature and for analysis of evidences in order to answer the RQs. This paper concluded on the basis of SLR studies that the \"Twitter\" is widely used SN for Textual PbEM because 54 out of 64 studies on PbEM uses Twitter. SLR resulted that earth quake (EQ) events are the major concerned events that effect country's economy and peace therefore most of studies uses the EQ as context/setting. The paper presents the details on categories of Pb events, contexts/settings and the list of other types of events or topics that are the center of the research now a days based on synthesis of evidences.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131159943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Light weight block cipher algorithms are vital for constrained environment. It is easy to propose an algorithm that optimize any two factors like (security and cost), (security and performance) and (cost and performance) but it is difficult to optimize three factors together at the same time. In this paper, we propose a new lightweight block cipher algorithm called OLBCA. PRESENT lightweight block cipher algorithm is chosen because it is one of the most common and famous lightweight algorithms. Also, the International Organization for Standardization and the International Electro technical Commission (ISO/IEC 29192-2:2012) declared that PRESENT as a new international standard for lightweight cryptographic methods. We applied three attacks differential, integral attacks and boomerang attack. The results showed that OLBCA is better than PRESENT algorithms in three factors.
{"title":"OLBCA: A New Lightweight Block Cipher Algorithm","authors":"S. AlDabbagh, I. A. Al Shaikhli","doi":"10.1109/ACSAT.2014.10","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.10","url":null,"abstract":"Light weight block cipher algorithms are vital for constrained environment. It is easy to propose an algorithm that optimize any two factors like (security and cost), (security and performance) and (cost and performance) but it is difficult to optimize three factors together at the same time. In this paper, we propose a new lightweight block cipher algorithm called OLBCA. PRESENT lightweight block cipher algorithm is chosen because it is one of the most common and famous lightweight algorithms. Also, the International Organization for Standardization and the International Electro technical Commission (ISO/IEC 29192-2:2012) declared that PRESENT as a new international standard for lightweight cryptographic methods. We applied three attacks differential, integral attacks and boomerang attack. The results showed that OLBCA is better than PRESENT algorithms in three factors.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133411431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the most important fields in discrete mathematics is graph theory. Graph theory is discrete structures, consisting of vertices and edges that connect these vertices. Problems in almost every conceivable discipline can be solved using graph models. The field graph theory started its journey from the problem of Konigsberg Bridges in 1735. This paper is a guide for the applied mathematician who would like to know more about network security, cryptography and cyber security based of graph theory. The paper gives a brief overview of the subject and the applications of graph theory in computer security, and provides pointers to key research and recent survey papers in the area.
{"title":"Graph Theory and Cyber Security","authors":"Harith A. Dawood","doi":"10.1109/ACSAT.2014.23","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.23","url":null,"abstract":"One of the most important fields in discrete mathematics is graph theory. Graph theory is discrete structures, consisting of vertices and edges that connect these vertices. Problems in almost every conceivable discipline can be solved using graph models. The field graph theory started its journey from the problem of Konigsberg Bridges in 1735. This paper is a guide for the applied mathematician who would like to know more about network security, cryptography and cyber security based of graph theory. The paper gives a brief overview of the subject and the applications of graph theory in computer security, and provides pointers to key research and recent survey papers in the area.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}