首页 > 最新文献

2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)最新文献

英文 中文
A trust model for resource selection in cloud computing environment 云计算环境下资源选择的信任模型
A. Gholami, Mostafa Ghobaei Arani
In recent years, cloud computing technology has been increasingly embraced by people and most organizations tend to use this technology in their business processes. On the other hand, the use of this technology is not so easy and many organizations are concerned about the storage of their sensitive data in their data centers instead of storing them in the cloud storage centers. Today, one of the most important factors for the success of cloud computing is to create trust and security. Cloud computing will face a lot of challenges when the key element trust is absent. Trust is one of the most important ways to improve the reliability of cloud computing resources provided in the cloud environment and plays an important role in business carried out in the cloud business environments. User trust contributes to selection of appropriate sources in heterogeneous cloud infrastructure. In this paper, we present the trust model based on standards of appropriate service quality and speed of implementation for choose the best source. The proposed approach, in addition to taking into account criteria of quality of service such as cost, response time, bandwidth, and processor speed. Simulation results show that the proposed approach compared with similar approaches, in addition to taking into account measures of the quality of service, selects the most reliable source in a cloud environment by taking into account the speed of things.
近年来,云计算技术越来越受到人们的欢迎,大多数组织倾向于在其业务流程中使用该技术。另一方面,这种技术的使用并不容易,许多组织关心的是将其敏感数据存储在其数据中心,而不是存储在云存储中心。今天,云计算成功的最重要因素之一是创建信任和安全性。当关键要素信任缺失时,云计算将面临许多挑战。信任是提高云环境中提供的云计算资源可靠性的最重要途径之一,在云业务环境中开展业务具有重要作用。用户信任有助于在异构云基础设施中选择适当的源。本文提出了一种基于适当服务质量和实现速度标准的信任模型,用于选择最佳信息源。除了考虑服务质量标准(如成本、响应时间、带宽和处理器速度)之外,所建议的方法。仿真结果表明,与同类方法相比,该方法除了考虑服务质量的度量外,还通过考虑事物的速度来选择云环境中最可靠的源。
{"title":"A trust model for resource selection in cloud computing environment","authors":"A. Gholami, Mostafa Ghobaei Arani","doi":"10.1109/KBEI.2015.7436036","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436036","url":null,"abstract":"In recent years, cloud computing technology has been increasingly embraced by people and most organizations tend to use this technology in their business processes. On the other hand, the use of this technology is not so easy and many organizations are concerned about the storage of their sensitive data in their data centers instead of storing them in the cloud storage centers. Today, one of the most important factors for the success of cloud computing is to create trust and security. Cloud computing will face a lot of challenges when the key element trust is absent. Trust is one of the most important ways to improve the reliability of cloud computing resources provided in the cloud environment and plays an important role in business carried out in the cloud business environments. User trust contributes to selection of appropriate sources in heterogeneous cloud infrastructure. In this paper, we present the trust model based on standards of appropriate service quality and speed of implementation for choose the best source. The proposed approach, in addition to taking into account criteria of quality of service such as cost, response time, bandwidth, and processor speed. Simulation results show that the proposed approach compared with similar approaches, in addition to taking into account measures of the quality of service, selects the most reliable source in a cloud environment by taking into account the speed of things.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating NFC technology from the perspective of security, analysis of attacks and existing risk 从安全角度研究NFC技术,分析攻击和存在的风险
S. Shariati, A. Abouzarjomehri, M. Hossein Ahmadzadegan
Near Field Communication (NFC) is a short-range wireless communications technology that is usually less than 10 cm. This technology has many applications in commercial applications like electronic payments through smartphones, transfer images via mobile phones and tablets, direct print from mobile phones and tablets, etc. Today, with the development of mobile devices such as mobile phones, tablets and the increasing demand and popularity of these types of devices on the market, every day applications develop in this area to accelerate the current affairs of users as well as higher work efficiency. The transfer in technology is done by bringing two NFC-enabled devices to each other at a distance of 3 to 5 inches. In this paper, the NFC technology with approach of security, analysis of attacks and the risk is assessed.
近场通信(NFC)是一种通常小于10厘米的短距离无线通信技术。该技术在商业应用中有许多应用,如通过智能手机进行电子支付,通过手机和平板电脑传输图像,从手机和平板电脑直接打印等。如今,随着手机、平板电脑等移动设备的发展,以及这类设备在市场上的需求日益增加和普及,每天都在开发这方面的应用程序,以加快用户的时事处理,提高工作效率。技术的转移是通过将两个支持nfc的设备放在3到5英寸的距离上来完成的。本文对NFC技术进行了安全分析、攻击分析和风险评估。
{"title":"Investigating NFC technology from the perspective of security, analysis of attacks and existing risk","authors":"S. Shariati, A. Abouzarjomehri, M. Hossein Ahmadzadegan","doi":"10.1109/KBEI.2015.7436197","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436197","url":null,"abstract":"Near Field Communication (NFC) is a short-range wireless communications technology that is usually less than 10 cm. This technology has many applications in commercial applications like electronic payments through smartphones, transfer images via mobile phones and tablets, direct print from mobile phones and tablets, etc. Today, with the development of mobile devices such as mobile phones, tablets and the increasing demand and popularity of these types of devices on the market, every day applications develop in this area to accelerate the current affairs of users as well as higher work efficiency. The transfer in technology is done by bringing two NFC-enabled devices to each other at a distance of 3 to 5 inches. In this paper, the NFC technology with approach of security, analysis of attacks and the risk is assessed.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126567281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A low-phase-noise millimeter wave quadrature VCO in 180nm CMOS process 一种180nm CMOS制程的毫米波正交压控振荡器
Z. Kashani, A. Nabavi
This paper presents a new circuit topology for a 58-GHz low phase noise quadrature voltage control oscillator (QVCO) in a standard 180nm CMOS technology. Selecting a low phase noise Colpitts oscillator core with low power consumption and improved phase noise performance, and using self-injection coupling result in a phase noise of -106 dBc/Hz at 1MHz offset of a 58GHZ carrier. The power consumption for the entire circuit, including the buffers and main cores, is 10.6mA from a 1.8V supply. This design has the lowest phase noise and better figure-of-merits compared to previous works.
本文提出了一种适用于标准180nm CMOS技术的58 ghz低相位噪声正交压控振荡器(QVCO)的新电路拓扑结构。选择低功耗、提高相位噪声性能的低相位噪声Colpitts振荡器核心,并采用自注入耦合,在58GHZ载波1MHz偏移时相位噪声为-106 dBc/Hz。整个电路的功耗,包括缓冲器和主核心,在1.8V电源下为10.6mA。与以往的设计相比,该设计具有最低的相位噪声和更好的性能指标。
{"title":"A low-phase-noise millimeter wave quadrature VCO in 180nm CMOS process","authors":"Z. Kashani, A. Nabavi","doi":"10.1109/KBEI.2015.7436217","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436217","url":null,"abstract":"This paper presents a new circuit topology for a 58-GHz low phase noise quadrature voltage control oscillator (QVCO) in a standard 180nm CMOS technology. Selecting a low phase noise Colpitts oscillator core with low power consumption and improved phase noise performance, and using self-injection coupling result in a phase noise of -106 dBc/Hz at 1MHz offset of a 58GHZ carrier. The power consumption for the entire circuit, including the buffers and main cores, is 10.6mA from a 1.8V supply. This design has the lowest phase noise and better figure-of-merits compared to previous works.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127497085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient modeling algorithm for intrusion detection systems using C5.0 and Bayesian Network structures 基于C5.0和贝叶斯网络结构的入侵检测系统高效建模算法
Fariba Younes Nia, M. Khalili
Although different models have been offered for intrusion detection systems (IDSs) in computer networks, it is difficult to distinct unauthorized connections from authorized ones because intruders act similar to normal users. In this paper we propose an efficient modeling algorithm for applying in IDSs to improve the quality of detections. In the proposed algorithm, the integration of Tree Augmented Naive Bayes (TAN) in Bayesian Network (BN) and Boosting in C5.0 decision tree structures are used to take their advantages and avoid their weaknesses. These structures are adopted once individually. Then the agreements of their combination are considered. In addition, in implementation process, the KDDCUP'99 data set and the other widely-used measures in IDSs problem are used. The experimental results show that the proposed algorithm not only achieves satisfactory results in accuracy and false alarm rate, but also improves the existing works.
尽管针对计算机网络中的入侵检测系统(ids)提出了不同的模型,但由于入侵者的行为与正常用户相似,因此很难区分未经授权的连接和授权的连接。在本文中,我们提出了一种有效的建模算法用于ids,以提高检测质量。该算法将贝叶斯网络(BN)中的树增广朴素贝叶斯(TAN)与C5.0决策树结构中的Boosting相结合,取长补短。这些结构单独采用一次。然后考虑两者合并的一致性。此外,在实施过程中,还使用了KDDCUP'99数据集和其他在IDSs问题中广泛使用的测量方法。实验结果表明,该算法不仅在准确率和虚警率方面取得了令人满意的效果,而且对现有的工作进行了改进。
{"title":"An efficient modeling algorithm for intrusion detection systems using C5.0 and Bayesian Network structures","authors":"Fariba Younes Nia, M. Khalili","doi":"10.1109/KBEI.2015.7436203","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436203","url":null,"abstract":"Although different models have been offered for intrusion detection systems (IDSs) in computer networks, it is difficult to distinct unauthorized connections from authorized ones because intruders act similar to normal users. In this paper we propose an efficient modeling algorithm for applying in IDSs to improve the quality of detections. In the proposed algorithm, the integration of Tree Augmented Naive Bayes (TAN) in Bayesian Network (BN) and Boosting in C5.0 decision tree structures are used to take their advantages and avoid their weaknesses. These structures are adopted once individually. Then the agreements of their combination are considered. In addition, in implementation process, the KDDCUP'99 data set and the other widely-used measures in IDSs problem are used. The experimental results show that the proposed algorithm not only achieves satisfactory results in accuracy and false alarm rate, but also improves the existing works.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127852605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A new algorithm for mining frequent patterns in Can Tree 一种新的Can树频繁模式挖掘算法
M. Hoseini, M. N. Shahraki, Behzad Soleimani Neysiani
Association Rule Mining is concerned with the search for relationships between item-sets based on co-occurrence of patterns. Since transactional databases are being updated all the time and there are always data being added or deleted, so Incremental Association Rule Mining is very importance. Many methods have been presented so far for incremental frequent patterns mining, one of these methods is the frequent patterns mining base on the CanTree (CANonical-order TREE). Related works on CanTree, didn't discuss about extraction of frequent patterns from the tree and it has only been suggested that the mining method would be similar to FP-growth. In this paper, a new method is presented for mining CanTree, and it is evaluated to show its improvement over the FP-growth method that mine FP tree. The evaluation results have demonstrated that performance of the presented algorithm is better than the FP-growth algorithm at high minimum support thresholds and for future work can try to improve it for lower minimum support threshold.
关联规则挖掘关注的是基于模式共现的项集之间的关系的搜索。由于事务性数据库是不断更新的,总是有数据被添加或删除,因此增量关联规则挖掘是非常重要的。目前已经提出了许多用于增量频繁模式挖掘的方法,其中一种方法是基于CanTree(标准顺序树)的频繁模式挖掘。CanTree的相关工作,没有讨论从树中提取频繁模式,只是建议挖掘方法类似于fp增长。本文提出了一种挖掘CanTree的新方法,并对其进行了评价,证明了该方法比挖掘FP树的FP-growth方法有改进。评价结果表明,该算法在较高的最小支持度阈值下的性能优于FP-growth算法,在今后的工作中可以尝试在较低的最小支持度阈值下对其进行改进。
{"title":"A new algorithm for mining frequent patterns in Can Tree","authors":"M. Hoseini, M. N. Shahraki, Behzad Soleimani Neysiani","doi":"10.1109/KBEI.2015.7436153","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436153","url":null,"abstract":"Association Rule Mining is concerned with the search for relationships between item-sets based on co-occurrence of patterns. Since transactional databases are being updated all the time and there are always data being added or deleted, so Incremental Association Rule Mining is very importance. Many methods have been presented so far for incremental frequent patterns mining, one of these methods is the frequent patterns mining base on the CanTree (CANonical-order TREE). Related works on CanTree, didn't discuss about extraction of frequent patterns from the tree and it has only been suggested that the mining method would be similar to FP-growth. In this paper, a new method is presented for mining CanTree, and it is evaluated to show its improvement over the FP-growth method that mine FP tree. The evaluation results have demonstrated that performance of the presented algorithm is better than the FP-growth algorithm at high minimum support thresholds and for future work can try to improve it for lower minimum support threshold.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123030092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Combining wireless sensor networks and cloud computing: Security perspective 结合无线传感器网络和云计算:安全视角
Zahra Shojaeerad, Saloomeh Taherifard, S. M. Jameii
At the present study, in order to ease analysis of real time data and to ease sharing data, combination of wireless sensor network and cloud computing has been applied. In addition, in order to be able to support large amount of data and in order to meet limitations of wireless sensor networks in regard with ability to process and acceleration of communications, cloud computing would be applied. Here, functions of integration of the two technologies of wireless sensor network and cloud computing would be referred and types of clouds, functions, their properties and threats of cloud computing would be also discussed.
在目前的研究中,为了便于实时数据的分析和便于数据共享,采用了无线传感器网络与云计算相结合的方法。此外,为了能够支持大量数据,并为了满足无线传感器网络在处理和加速通信能力方面的限制,将应用云计算。本文将介绍无线传感器网络与云计算两种技术融合的功能,并讨论云的类型、功能、性质和云计算的威胁。
{"title":"Combining wireless sensor networks and cloud computing: Security perspective","authors":"Zahra Shojaeerad, Saloomeh Taherifard, S. M. Jameii","doi":"10.1109/KBEI.2015.7436171","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436171","url":null,"abstract":"At the present study, in order to ease analysis of real time data and to ease sharing data, combination of wireless sensor network and cloud computing has been applied. In addition, in order to be able to support large amount of data and in order to meet limitations of wireless sensor networks in regard with ability to process and acceleration of communications, cloud computing would be applied. Here, functions of integration of the two technologies of wireless sensor network and cloud computing would be referred and types of clouds, functions, their properties and threats of cloud computing would be also discussed.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124235090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A method for securing username and password against the Keylogger software using the logistic map chaos function 一种使用逻辑地图混沌功能保护用户名和密码免受键盘记录器软件攻击的方法
M. Hossein Ahmadzadegan, Ali-asghar Khorshidvand, Mehrdad Pezeshki
Secure login by passwords in the sites and applications has always been a major concern by users. Meanwhile, many spywares like Keylogger have been developed that can record the users' input characters and then have access to their passwords. In this method, a capability has been created in which Keylogger Software cannot login the user system as they record input characters. The method is in the way that one-time passwords (OTP) are generated for the users utilizing the Logistic Map Chaos Function; these passwords are expired after being used by the user and they are not valid any more. An Android Software was used to generate one-time passwords. The user generates the one-time password by installing this Android Software on his/her smart phone and enters the password into the computer without any concern of the Keylogger. The results demonstrate the success for this method.
在网站和应用程序中使用密码安全登录一直是用户关注的主要问题。与此同时,像Keylogger这样的间谍软件已经被开发出来,可以记录用户的输入字符,然后获得他们的密码。在这种方法中,键盘记录器软件在记录输入字符时无法登录用户系统。该方法是利用Logistic映射混沌函数为用户生成一次性密码(OTP);这些密码在被用户使用后过期,不再有效。使用Android软件生成一次性密码。用户通过在其智能手机上安装此Android软件生成一次性密码,并将密码输入计算机,而无需担心Keylogger。结果表明,该方法是成功的。
{"title":"A method for securing username and password against the Keylogger software using the logistic map chaos function","authors":"M. Hossein Ahmadzadegan, Ali-asghar Khorshidvand, Mehrdad Pezeshki","doi":"10.1109/KBEI.2015.7436194","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436194","url":null,"abstract":"Secure login by passwords in the sites and applications has always been a major concern by users. Meanwhile, many spywares like Keylogger have been developed that can record the users' input characters and then have access to their passwords. In this method, a capability has been created in which Keylogger Software cannot login the user system as they record input characters. The method is in the way that one-time passwords (OTP) are generated for the users utilizing the Logistic Map Chaos Function; these passwords are expired after being used by the user and they are not valid any more. An Android Software was used to generate one-time passwords. The user generates the one-time password by installing this Android Software on his/her smart phone and enters the password into the computer without any concern of the Keylogger. The results demonstrate the success for this method.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128739275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance evaluation of PIDD controller for automatic generation control in interconnected thermal system with reheat turbine in deregulated environment 无调节环境下带再热汽轮机的互联热力系统自动发电控制pid控制器性能评价
S. Khakpour, D. Mirabbasi
This paper present automatic generation control (AGC) of interconnected two equal area thermal system with reheat turbine in deregulated environment and using PIDD controller that compared with other classical controllers. With existence of Electrical industry deregulation, the AGC system has been considered by taking the effect of bilateral contracts into account; it means that any distribution companies (DISCO) may have contracts with any generation companies (GENCO) in other areas. The goal is to improve system parameters such as frequency deviation error, area control error and line transmitted power using above - mentioned controllers. The simulation in MATLAB/Simulink shows that the AGC with PIDD controller results in increased dynamic efficiency and improvement in responses.
本文介绍了无调节环境下带再热汽轮机的两等面积互联热力系统的自动发电控制(AGC),并采用pid控制器与其它经典控制器进行了比较。随着电力行业放松管制的存在,AGC制度已经考虑到双边合同的影响;这意味着任何配电公司(DISCO)都可以在其他地区与任何发电公司(GENCO)签订合同。目的是利用上述控制器改善系统参数,如频率偏差误差、区域控制误差和线路传输功率。在MATLAB/Simulink中的仿真结果表明,采用pid控制器的AGC提高了动态效率,改善了响应。
{"title":"Performance evaluation of PIDD controller for automatic generation control in interconnected thermal system with reheat turbine in deregulated environment","authors":"S. Khakpour, D. Mirabbasi","doi":"10.1109/KBEI.2015.7436221","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436221","url":null,"abstract":"This paper present automatic generation control (AGC) of interconnected two equal area thermal system with reheat turbine in deregulated environment and using PIDD controller that compared with other classical controllers. With existence of Electrical industry deregulation, the AGC system has been considered by taking the effect of bilateral contracts into account; it means that any distribution companies (DISCO) may have contracts with any generation companies (GENCO) in other areas. The goal is to improve system parameters such as frequency deviation error, area control error and line transmitted power using above - mentioned controllers. The simulation in MATLAB/Simulink shows that the AGC with PIDD controller results in increased dynamic efficiency and improvement in responses.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116159052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A query ontology to facilitate web service discovery 方便web服务发现的查询本体
K. Moradyan, O. Bushehrian, R. Akbari
Service Oriented Architecture proposes a new paradigm to achieve building complex web based applications. It uses web services as building blocks in order to create a composition. Although, before composing web services to build a complex application, proper web services should be discovered. Effective web service discovery heavily depends on the algorithm used to match services and also accuracy and adequacy of information gathered from user's request. In this paper a query ontology in accordance with web service description documents based on WSDL to facilitate web service discovery proposed.
面向服务的体系结构为构建复杂的基于web的应用程序提供了一种新的范式。它使用web服务作为构建块来创建组合。但是,在组合web服务以构建复杂的应用程序之前,应该发现合适的web服务。有效的web服务发现在很大程度上取决于用于匹配服务的算法,以及从用户请求中收集的信息的准确性和充分性。本文提出了一种基于WSDL的符合web服务描述文档的查询本体,以方便web服务的发现。
{"title":"A query ontology to facilitate web service discovery","authors":"K. Moradyan, O. Bushehrian, R. Akbari","doi":"10.1109/KBEI.2015.7436046","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436046","url":null,"abstract":"Service Oriented Architecture proposes a new paradigm to achieve building complex web based applications. It uses web services as building blocks in order to create a composition. Although, before composing web services to build a complex application, proper web services should be discovered. Effective web service discovery heavily depends on the algorithm used to match services and also accuracy and adequacy of information gathered from user's request. In this paper a query ontology in accordance with web service description documents based on WSDL to facilitate web service discovery proposed.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114232854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-user searchable encryption scheme with general access structure 具有通用访问结构的多用户可搜索加密方案
Kobra Amiri Zirtol, Mahnaz Noroozi, Ziba Eslami
Searchable encryption is a cryptographic primitive that enables searching over encrypted data. Think over an organization that has outsourced its encrypted database. Consider the scenario in which each member of this organization can add encrypted data to the database but accessing the data is limited to certain predefined access structure. That is, only the members of authorized subsets of members can collaborate to search for a desired data and then decrypt the received ciphertexts. In this paper, we construct a scheme that enables such a scenario and supports general access structure.
可搜索加密是一种允许对加密数据进行搜索的加密原语。考虑一个将其加密数据库外包的组织。考虑这样一个场景:该组织的每个成员都可以向数据库中添加加密数据,但访问数据仅限于某些预定义的访问结构。也就是说,只有授权成员子集的成员才能协作搜索所需的数据,然后解密接收到的密文。在本文中,我们构建了一个方案来实现这种场景,并支持通用的访问结构。
{"title":"Multi-user searchable encryption scheme with general access structure","authors":"Kobra Amiri Zirtol, Mahnaz Noroozi, Ziba Eslami","doi":"10.1109/KBEI.2015.7436078","DOIUrl":"https://doi.org/10.1109/KBEI.2015.7436078","url":null,"abstract":"Searchable encryption is a cryptographic primitive that enables searching over encrypted data. Think over an organization that has outsourced its encrypted database. Consider the scenario in which each member of this organization can add encrypted data to the database but accessing the data is limited to certain predefined access structure. That is, only the members of authorized subsets of members can collaborate to search for a desired data and then decrypt the received ciphertexts. In this paper, we construct a scheme that enables such a scenario and supports general access structure.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125450915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1