首页 > 最新文献

2014 14th International Conference on Innovations for Community Services (I4CS)最新文献

英文 中文
About including a virtual teacher in a competitive or collaborative context in AlgoPath 关于在AlgoPath的竞争或协作环境中包括虚拟教师
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860555
Sebastien Linck, E. Perrin, Dimitry Zekrouf
AlgoPath is an entertainment program to help students with no classical computer science background understand the main concepts of algorithmics. It looks like a serious game in which the player builds a world of concrete, paths and grass. We show in this paper that the inner model of AlgoPath is based on the Model-View-Controller architecture (MVC). We intend to add a virtual teacher in this architecture, who oversees the players' interactions and intervenes when the interactions do not correspond to what is expected by a real teacher. We explain how the model of the virtual teacher interacts with the Controller component of the architecture. We describe the model that lets a real teacher add his particular comments for the various mistakes that can be made by a player. We explore the solutions to implement two multiplayer gameplay types: a competitive one, in which two or several players fight against one another to be the first to find the best algorithm, and a collaborative one, in which they have to find the best algorithm as a team. Finally, we explain our choice to develop the distributed version of AlgoPath with Unity.
AlgoPath是一个娱乐程序,帮助没有经典计算机科学背景的学生理解算法的主要概念。它看起来像是一款严肃的游戏,玩家在其中建造一个由混凝土、道路和草地组成的世界。在本文中,我们展示了AlgoPath的内部模型是基于模型-视图-控制器架构(MVC)的。我们打算在这个架构中添加一个虚拟老师,他监督玩家的互动,并在互动不符合真实老师的期望时进行干预。我们解释了虚拟教师模型如何与体系结构的控制器组件交互。我们描述了一个模型,让一个真正的老师为玩家可能犯的各种错误添加他的特殊评论。我们探索了执行两种多人游戏玩法类型的解决方案:一种是竞争型,即两个或多个玩家为了第一个找到最佳算法而相互对抗;另一种是协作型,即他们必须以团队的形式找到最佳算法。最后,我们解释了我们选择使用Unity开发分布式版本的AlgoPath。
{"title":"About including a virtual teacher in a competitive or collaborative context in AlgoPath","authors":"Sebastien Linck, E. Perrin, Dimitry Zekrouf","doi":"10.1109/I4CS.2014.6860555","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860555","url":null,"abstract":"AlgoPath is an entertainment program to help students with no classical computer science background understand the main concepts of algorithmics. It looks like a serious game in which the player builds a world of concrete, paths and grass. We show in this paper that the inner model of AlgoPath is based on the Model-View-Controller architecture (MVC). We intend to add a virtual teacher in this architecture, who oversees the players' interactions and intervenes when the interactions do not correspond to what is expected by a real teacher. We explain how the model of the virtual teacher interacts with the Controller component of the architecture. We describe the model that lets a real teacher add his particular comments for the various mistakes that can be made by a player. We explore the solutions to implement two multiplayer gameplay types: a competitive one, in which two or several players fight against one another to be the first to find the best algorithm, and a collaborative one, in which they have to find the best algorithm as a team. Finally, we explain our choice to develop the distributed version of AlgoPath with Unity.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"84 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126078629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Structuring complex data using representativeness graphs 使用代表性图构建复杂数据
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860561
Frédéric Blanchard, A. A. Younes, M. Herbin
This contribution addresses the problem of extracting some representative data from complex datasets and connecting them in a directed forest. First we define a degree of representativeness (DoR) based on the Borda aggregation procedure. Secondly we present a method to connect pairwise data using neighborhoods and the DoR as an objective function. We then present three case studies as a proof of concept: unsupervised grouping of binary images, analysis of co-authorships in a research team and structuration of a medical patient-oriented database for a case-based reasoning use.
该贡献解决了从复杂数据集中提取一些代表性数据并将它们连接到有向森林中的问题。首先,我们基于Borda聚合过程定义了代表性度(DoR)。其次,我们提出了一种以邻域和DoR作为目标函数来连接成对数据的方法。然后,我们提出了三个案例研究作为概念证明:二值图像的无监督分组,研究团队中共同作者的分析以及基于案例推理使用的面向患者的医疗数据库的结构。
{"title":"Structuring complex data using representativeness graphs","authors":"Frédéric Blanchard, A. A. Younes, M. Herbin","doi":"10.1109/I4CS.2014.6860561","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860561","url":null,"abstract":"This contribution addresses the problem of extracting some representative data from complex datasets and connecting them in a directed forest. First we define a degree of representativeness (DoR) based on the Borda aggregation procedure. Secondly we present a method to connect pairwise data using neighborhoods and the DoR as an objective function. We then present three case studies as a proof of concept: unsupervised grouping of binary images, analysis of co-authorships in a research team and structuration of a medical patient-oriented database for a case-based reasoning use.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User-centered design for smart solar-powered micro-grid communities 以用户为中心的智能太阳能微电网社区设计
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860551
Leendert W. M. Wienhofen, C. Lindkvist, M. Noebels
CoSSMic (Collaborating Smart Solar powered Micro-grids) is an EU funded project aimed at developing a system for smart management and control of solar energy. The system must be relevant to a community of end-users and other stakeholders. Two processes are described here to contribute in meeting this aim, user-centered design and lean startup product design. We describe an iterative approach to the design of the system which incorporates these two processes and the impact it has had on results.
CoSSMic(协作智能太阳能微电网)是一个欧盟资助的项目,旨在开发太阳能智能管理和控制系统。该系统必须与最终用户和其他利益相关者的社区相关。这里描述了两个有助于实现这一目标的过程,以用户为中心的设计和精益启动产品设计。我们描述了一种迭代的方法来设计系统,它结合了这两个过程及其对结果的影响。
{"title":"User-centered design for smart solar-powered micro-grid communities","authors":"Leendert W. M. Wienhofen, C. Lindkvist, M. Noebels","doi":"10.1109/I4CS.2014.6860551","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860551","url":null,"abstract":"CoSSMic (Collaborating Smart Solar powered Micro-grids) is an EU funded project aimed at developing a system for smart management and control of solar energy. The system must be relevant to a community of end-users and other stakeholders. Two processes are described here to contribute in meeting this aim, user-centered design and lean startup product design. We describe an iterative approach to the design of the system which incorporates these two processes and the impact it has had on results.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122584565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Designing of next-generation hybrid optical-wireless access network 下一代光无线混合接入网的设计
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860546
Rejaul Chowdhury, A. Shami, K. Almustafa
Due to the emergence of numerous bandwidth-hungry applications, we are motivated to investigate cheaper and faster Internet access solutions to serve in a neighborhood. We concentrate on the convergence of optical and wireless networks for the deployment of Internet access networks so that we can exploit the opportunities of both technologies. We focus on network dimensioning and placement of equipment in hybrid optical-wireless access networks. A number of integrated optical-wireless architectures have been investigated for the greenfield deployment of future access networks. A novel hybrid network infrastructure, namely PON-LTE-WiFi, has been proposed where fiber will be deployed as deeply as affordable/practical and then, wireless systems will be used to extend this connectivity to a large number of locations and ultimately connect the wireless end users. We propose a 3-phase network design optimization scheme for greenfield deployment of PON-LTE-WiFi access network infrastructure. Finally, we propose an ILP model which optimizes the greenfield deployment of LTE network based on the static distribution of mobile user equipment (MUE). The proposed model takes into account various physical layer constraints of LTE network and determines the optimal clustering of MUEs as well as the location of eNBs in a neighborhood. Computational experiments have been conducted on three different data sets consisting of 128, 256 and 512 mobile user equipment in order to evaluate the performance of the proposed scheme.
由于出现了大量需要带宽的应用程序,我们有动力研究更便宜、更快的互联网接入解决方案,为社区提供服务。我们专注于光和无线网络的融合,以部署互联网接入网,以便我们可以利用这两种技术的机会。我们关注的是光无线混合接入网络的网络尺寸和设备的放置。为了未来接入网的绿地部署,研究了许多集成的光无线架构。提出了一种新的混合网络基础设施,即PON-LTE-WiFi,其中光纤将尽可能深入地部署,然后,无线系统将用于将这种连接扩展到大量位置,并最终连接无线终端用户。针对PON-LTE-WiFi接入网基础设施的绿地部署,提出了一种3阶段网络设计优化方案。最后,我们提出了一个基于移动用户设备静态分布优化LTE网络绿地部署的ILP模型。该模型考虑了LTE网络的各种物理层约束,确定了最大节点的最优聚类以及最小节点在邻域中的位置。为了评估所提出方案的性能,在由128、256和512个移动用户设备组成的三个不同数据集上进行了计算实验。
{"title":"Designing of next-generation hybrid optical-wireless access network","authors":"Rejaul Chowdhury, A. Shami, K. Almustafa","doi":"10.1109/I4CS.2014.6860546","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860546","url":null,"abstract":"Due to the emergence of numerous bandwidth-hungry applications, we are motivated to investigate cheaper and faster Internet access solutions to serve in a neighborhood. We concentrate on the convergence of optical and wireless networks for the deployment of Internet access networks so that we can exploit the opportunities of both technologies. We focus on network dimensioning and placement of equipment in hybrid optical-wireless access networks. A number of integrated optical-wireless architectures have been investigated for the greenfield deployment of future access networks. A novel hybrid network infrastructure, namely PON-LTE-WiFi, has been proposed where fiber will be deployed as deeply as affordable/practical and then, wireless systems will be used to extend this connectivity to a large number of locations and ultimately connect the wireless end users. We propose a 3-phase network design optimization scheme for greenfield deployment of PON-LTE-WiFi access network infrastructure. Finally, we propose an ILP model which optimizes the greenfield deployment of LTE network based on the static distribution of mobile user equipment (MUE). The proposed model takes into account various physical layer constraints of LTE network and determines the optimal clustering of MUEs as well as the location of eNBs in a neighborhood. Computational experiments have been conducted on three different data sets consisting of 128, 256 and 512 mobile user equipment in order to evaluate the performance of the proposed scheme.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133122289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Time-weighted Social Network: Predict when an item will meet a collector 时间加权社会网络:预测某件物品何时会遇到收藏家
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860562
G. Blot, P. Saurel, F. Rousseaux
“For what else is this collection but a disorder to which habit has accommodated itself to such an extent that it can appear as order?”. Unpacking his library, Walter Benjamin describes how a collection is singular [2]. Collections are not unified wholes, but rather chains of undefined objects. Classify, search, arrange or browse collections are personal processes influenced by internal reflexions. Working on figural and non-figural collections, Piaget and Inhelder explain how space and time influence the way a collector looks to his collection [13]. As a result, representing collections is an issue for computer scientists. Here, we propose a time-based method, which consideres chronological events and draws a time-weighted graph defining patterns of items. We therefore show how this graph outputs different results depending on when it is requested. This work is based on an architecture, designed by Openrendezvous.com, a collaborative web-based application helping to make appointments. Our goal is to adapt a social graph used to define the perfect moment for two people to meet, to the collection case. We discuss how we can build a structure that helps to compute the ideal moment for an item to meet a collector.
“因为这种集合除了是一种无序之外,还能是什么呢?习惯已经适应了这种无序,以至于它可以表现为有序。”沃尔特·本雅明(Walter Benjamin)打开他的图书馆,描述了馆藏是如何单一的[2]。集合不是统一的整体,而是一系列未定义的对象。分类、搜索、排列或浏览集合是受内部反射影响的个人过程。皮亚杰(Piaget)和因赫尔德(Inhelder)在研究人物和非人物收藏时,解释了空间和时间如何影响收藏家对其藏品的看法[13]。因此,表示集合对计算机科学家来说是一个问题。在这里,我们提出了一种基于时间的方法,它考虑了时间顺序事件,并绘制了一个定义项目模式的时间加权图。因此,我们将展示此图如何根据请求时间输出不同的结果。这项工作是基于一个架构,由open幽会网站设计的,这是一个基于网络的协作应用程序,帮助约会。我们的目标是将用来定义两个人相遇的完美时刻的社交图谱应用到收藏案例中。我们将讨论如何构建一个结构来帮助计算物品与收藏家见面的理想时刻。
{"title":"Time-weighted Social Network: Predict when an item will meet a collector","authors":"G. Blot, P. Saurel, F. Rousseaux","doi":"10.1109/I4CS.2014.6860562","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860562","url":null,"abstract":"“For what else is this collection but a disorder to which habit has accommodated itself to such an extent that it can appear as order?”. Unpacking his library, Walter Benjamin describes how a collection is singular [2]. Collections are not unified wholes, but rather chains of undefined objects. Classify, search, arrange or browse collections are personal processes influenced by internal reflexions. Working on figural and non-figural collections, Piaget and Inhelder explain how space and time influence the way a collector looks to his collection [13]. As a result, representing collections is an issue for computer scientists. Here, we propose a time-based method, which consideres chronological events and draws a time-weighted graph defining patterns of items. We therefore show how this graph outputs different results depending on when it is requested. This work is based on an architecture, designed by Openrendezvous.com, a collaborative web-based application helping to make appointments. Our goal is to adapt a social graph used to define the perfect moment for two people to meet, to the collection case. We discuss how we can build a structure that helps to compute the ideal moment for an item to meet a collector.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125430744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A matrix-based damage assessment and recovery algorithm 一种基于矩阵的损伤评估与恢复算法
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860548
R. Haraty, Mirna Zbib
With the advancement of Internet technology, securing information systems from electronic attacks has become a significant concern. With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. We also compare the various approaches and present the performance results.
随着互联网技术的进步,保护信息系统免受电子攻击已成为一个重要的问题。尽管有了各种预防措施,恶意用户仍然会找到新的方法来克服系统的安全性,访问和修改敏感信息。为了使损伤评估和恢复过程快速有效(而不是扫描整个日志),研究人员提出了不同的日志文件分割方法,并相应地提出了不同的损伤评估和恢复算法。在这项工作中,我们提出了基于矩阵概念的有效的损害评估和恢复算法,以从数据库中的恶意事务中恢复。我们还比较了各种方法并给出了性能结果。
{"title":"A matrix-based damage assessment and recovery algorithm","authors":"R. Haraty, Mirna Zbib","doi":"10.1109/I4CS.2014.6860548","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860548","url":null,"abstract":"With the advancement of Internet technology, securing information systems from electronic attacks has become a significant concern. With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. We also compare the various approaches and present the performance results.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Predicting route targets based on optimality considerations 基于最优性考虑的路径目标预测
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860554
J. Roth
In this paper we present an approach to predict a target of a mobile user on the move. After observing the movement from a starting point, we are able to create possible extrapolations of routes. Our basic assumption: a mobile user tries to move efficiently, thus only a certain set of destinations is reasonable. We use a road network that contains information about movement costs to detect reasonable movements, but we do not expect theoretical optimal paths. We are able to model different efficiency goals and different degrees of optimality. We present an efficient algorithm to actually compute the set of reasonable targets that avoids brute force computation. In contrast to existing work to predict route destinations, we do not require a learning phase to collect an archive of former routes.
在本文中,我们提出了一种预测移动用户在移动中的目标的方法。在从起点观察运动之后,我们能够创建可能的路线外推。我们的基本假设是:移动用户试图高效移动,因此只有特定的目的地是合理的。我们使用包含移动成本信息的道路网络来检测合理的移动,但我们不期望理论上的最优路径。我们能够模拟不同的效率目标和不同程度的最优性。我们提出了一种有效的算法来实际计算一组合理的目标,避免了蛮力计算。与现有的预测路线目的地的工作相比,我们不需要一个学习阶段来收集以前路线的存档。
{"title":"Predicting route targets based on optimality considerations","authors":"J. Roth","doi":"10.1109/I4CS.2014.6860554","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860554","url":null,"abstract":"In this paper we present an approach to predict a target of a mobile user on the move. After observing the movement from a starting point, we are able to create possible extrapolations of routes. Our basic assumption: a mobile user tries to move efficiently, thus only a certain set of destinations is reasonable. We use a road network that contains information about movement costs to detect reasonable movements, but we do not expect theoretical optimal paths. We are able to model different efficiency goals and different degrees of optimality. We present an efficient algorithm to actually compute the set of reasonable targets that avoids brute force computation. In contrast to existing work to predict route destinations, we do not require a learning phase to collect an archive of former routes.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133572379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption 具有某种同态和可搜索加密的隐私友好型云审计
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860559
Jose M. Lopez, T. Rübsamen, D. Westhoff
In this paper, we provide privacy enhancements for a software agent-based audit system for clouds. We also propose a general privacy enhancing cloud audit concept which, we do present based on a recently proposed framework. This framework introduces the use of audit agents for collecting digital evidence from different sources in cloud environments. Obviously, the elicitation and storage of such evidence leads to new privacy concerns of cloud customers, since it may reveal sensitive information about the utilization of cloud services. We remedy this by applying Somewhat Homomorphic Encryption (SHE) and Public-Key Searchable Encryption (PEKS) to the collection of digital evidence. By considering prominent audit event use cases we show that the amount of cleartext information provided to an evidence storing entity and subsequently to a third-party auditor can be shaped in a good balance taking into account both, i) the customers' privacy and ii) the fact that stored information may need to have probative value. We believe that the administrative domain responsible for an evidence storing database falls under the adversary model "honest-but-curious" and thus should perform query responses from the auditor with respect to a given cloud audit use case by purely performing operations on encrypted digital evidence data.
在本文中,我们为基于软件代理的云审计系统提供了隐私增强功能。我们还提出了一个通用的增强隐私的云审计概念,我们基于最近提出的框架提出了这个概念。该框架介绍了使用审计代理从云环境中的不同来源收集数字证据。显然,这种证据的收集和存储引起了云客户新的隐私问题,因为它可能泄露有关云服务使用的敏感信息。我们通过对数字证据的收集应用某种同态加密(SHE)和公钥可搜索加密(PEKS)来解决这个问题。通过考虑突出的审计事件用例,我们表明,提供给证据存储实体和随后提供给第三方审计师的明确文本信息的数量可以在考虑到这两个方面的良好平衡中形成,i)客户的隐私和ii)存储的信息可能需要具有证明价值的事实。我们认为,负责证据存储数据库的管理域属于“诚实但好奇”的对手模型,因此应该通过纯粹对加密的数字证据数据执行操作来执行审计人员对给定云审计用例的查询响应。
{"title":"Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption","authors":"Jose M. Lopez, T. Rübsamen, D. Westhoff","doi":"10.1109/I4CS.2014.6860559","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860559","url":null,"abstract":"In this paper, we provide privacy enhancements for a software agent-based audit system for clouds. We also propose a general privacy enhancing cloud audit concept which, we do present based on a recently proposed framework. This framework introduces the use of audit agents for collecting digital evidence from different sources in cloud environments. Obviously, the elicitation and storage of such evidence leads to new privacy concerns of cloud customers, since it may reveal sensitive information about the utilization of cloud services. We remedy this by applying Somewhat Homomorphic Encryption (SHE) and Public-Key Searchable Encryption (PEKS) to the collection of digital evidence. By considering prominent audit event use cases we show that the amount of cleartext information provided to an evidence storing entity and subsequently to a third-party auditor can be shaped in a good balance taking into account both, i) the customers' privacy and ii) the fact that stored information may need to have probative value. We believe that the administrative domain responsible for an evidence storing database falls under the adversary model \"honest-but-curious\" and thus should perform query responses from the auditor with respect to a given cloud audit use case by purely performing operations on encrypted digital evidence data.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130352970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Low-cost wireless network architecture for developing countries 发展中国家的低成本无线网络架构
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860547
Y. Gourhant, E. Lukashova, Malla Reddy Sama, S. Wahed, Djamal-Eddine Meddour, D. Venmani
The emergence of Internet access and advanced wireless technologies has its limitations across the globe, i.e. today there exist several rural regions, especially in developing countries, that do not afford Internet connectivity. In this paper, we present a design of a cost-effective wireless network architecture that aims at providing Internet in fix-usage within those countries. We claim that with few design changes to the 3GPP architecture, it is possible to extend Internet connectivity within suburban and rural areas by deploying numerous hotspots based on sharing tasks and revenues with local actors.
互联网接入和先进无线技术的出现在全球范围内有其局限性,即今天有一些农村地区,特别是在发展中国家,没有负担得起互联网连接。在本文中,我们提出了一种具有成本效益的无线网络架构设计,旨在为这些国家提供固定使用的互联网。我们声称,只需对3GPP架构进行很少的设计更改,就可以通过部署基于与当地参与者共享任务和收入的众多热点,在郊区和农村地区扩展互联网连接。
{"title":"Low-cost wireless network architecture for developing countries","authors":"Y. Gourhant, E. Lukashova, Malla Reddy Sama, S. Wahed, Djamal-Eddine Meddour, D. Venmani","doi":"10.1109/I4CS.2014.6860547","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860547","url":null,"abstract":"The emergence of Internet access and advanced wireless technologies has its limitations across the globe, i.e. today there exist several rural regions, especially in developing countries, that do not afford Internet connectivity. In this paper, we present a design of a cost-effective wireless network architecture that aims at providing Internet in fix-usage within those countries. We claim that with few design changes to the 3GPP architecture, it is possible to extend Internet connectivity within suburban and rural areas by deploying numerous hotspots based on sharing tasks and revenues with local actors.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128797294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scalability & performances evaluation of LOCARN: Low Opex and Capex Architecture for Resilient Networks LOCARN的可扩展性和性能评估:弹性网络的低运营成本和资本支出架构
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860545
Damien Le Quéré, C. Betoule, R. Clavier, G. Thouénon, Y. H. Aoul, A. Ksentini
This paper proposes LOCARN: an alternative network architecture providing a packet connectivity layer, which is able to self-adapt its routing paths to both the effective traffics fluctuations and network resources changes. Moving close to a global maximization of available resources usage and assuming high resiliency under failures, this radical architecture focuses on architectural components coupling simplicity and plug-and-play guidance. Through analysis and computer simulation, several performance metrics focusing on scalability are evaluated.
本文提出了一种提供分组连接层的替代网络架构LOCARN,它能够根据有效流量的波动和网络资源的变化自适应其路由路径。这种激进的体系结构接近可用资源使用的全局最大化,并假设在故障情况下具有高弹性,它侧重于体系结构组件耦合的简单性和即插即用指导。通过分析和计算机仿真,评估了几种关注可扩展性的性能指标。
{"title":"Scalability & performances evaluation of LOCARN: Low Opex and Capex Architecture for Resilient Networks","authors":"Damien Le Quéré, C. Betoule, R. Clavier, G. Thouénon, Y. H. Aoul, A. Ksentini","doi":"10.1109/I4CS.2014.6860545","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860545","url":null,"abstract":"This paper proposes LOCARN: an alternative network architecture providing a packet connectivity layer, which is able to self-adapt its routing paths to both the effective traffics fluctuations and network resources changes. Moving close to a global maximization of available resources usage and assuming high resiliency under failures, this radical architecture focuses on architectural components coupling simplicity and plug-and-play guidance. Through analysis and computer simulation, several performance metrics focusing on scalability are evaluated.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"47 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 14th International Conference on Innovations for Community Services (I4CS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1