首页 > 最新文献

2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)最新文献

英文 中文
Social testing: A framework to support adoption of continuous delivery by small medium enterprises 社会测试:支持中小型企业采用持续交付的框架
J. Dunne, David Malone, J. Flood
Continuous delivery (CD) represents a challenge for software test teams, because of the continuous introduction of new features and feedback from customers. We consider testing in a framework where users are encouraged to report defects through social or other incentive schemes. Using an enterprise dataset, we address the question of which types of defects can best be found in the field, allowing in-house test resources to be refocused. Validation of these touch points ultimately interweaves both customer and business needs. The proposed framework is one which can help small to medium software businesses, which typically have limited resources to test and release software via CD.
持续交付(CD)对软件测试团队来说是一个挑战,因为不断地引入新特性和来自客户的反馈。我们考虑在一个框架中进行测试,在这个框架中,通过社交或其他激励机制鼓励用户报告缺陷。使用企业数据集,我们解决了在领域中可以最好地发现哪种类型的缺陷的问题,允许内部测试资源重新集中。这些接触点的验证最终将客户和业务需求交织在一起。所建议的框架可以帮助中小型软件企业,这些企业通常只有有限的资源来通过CD测试和发布软件。
{"title":"Social testing: A framework to support adoption of continuous delivery by small medium enterprises","authors":"J. Dunne, David Malone, J. Flood","doi":"10.1109/CSCESM.2015.7331827","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331827","url":null,"abstract":"Continuous delivery (CD) represents a challenge for software test teams, because of the continuous introduction of new features and feedback from customers. We consider testing in a framework where users are encouraged to report defects through social or other incentive schemes. Using an enterprise dataset, we address the question of which types of defects can best be found in the field, allowing in-house test resources to be refocused. Validation of these touch points ultimately interweaves both customer and business needs. The proposed framework is one which can help small to medium software businesses, which typically have limited resources to test and release software via CD.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The usage of social media in crisis communication 危机传播中社交媒体的使用
A. Miettinen, J. Nousiainen, J. Rajamäki, J. Knuuttila
The usage of social media (SOME) has increased during the last few years due the increase in the amount of smartphones. SOME has emerged alongside the traditional channels of communication in crisis communication. SOME has become extremely popular in recent years and the authorities have adopted it as part of their communication strategy. This paper explains how SOME is used in crisis situations, what kind of strengths, weaknesses, opportunities and threats (SWOT) it has, and how its use could be improved.
由于智能手机数量的增加,社交媒体(SOME)的使用在过去几年中有所增加。在危机传播中,SOME与传统的传播渠道同时出现。近年来,SOME已变得非常流行,当局已将其作为其传播策略的一部分。本文解释了SOME在危机情况下是如何使用的,它有什么样的优势、劣势、机会和威胁(SWOT),以及如何改进它的使用。
{"title":"The usage of social media in crisis communication","authors":"A. Miettinen, J. Nousiainen, J. Rajamäki, J. Knuuttila","doi":"10.1109/CSCESM.2015.7331820","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331820","url":null,"abstract":"The usage of social media (SOME) has increased during the last few years due the increase in the amount of smartphones. SOME has emerged alongside the traditional channels of communication in crisis communication. SOME has become extremely popular in recent years and the authorities have adopted it as part of their communication strategy. This paper explains how SOME is used in crisis situations, what kind of strengths, weaknesses, opportunities and threats (SWOT) it has, and how its use could be improved.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"33 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Leveraging Complex Event Processing for supporting small and medium-sized e-commerce enterprises 利用复杂事件处理来支持中小型电子商务企业
Christopher Ruff, Florian Maier, Tobias Muller, H. Kett
E-shop operators have a particular high interest in using web-analytics software to gain deeper insight in their visitor and customer base and to use this knowledge to optimize their sales through various activities. Compared to larger-scale companies, small and medium enterprises often lack the ability, time or resources to do the necessary data analysis to effectively use and understand the available data. In order to support these smaller enterprises, a tool was designed and implemented in a prototype, which uses Complex Event Processing (CEP) in order to automate the evaluation of relevant business data originating from web-analytics software, competitor website analysis tools, real-time user interaction data and potentially additional data sources. Rules can be defined and configured, that automatically and immediately notify the user when relevant changes in the visitor or competitor behavior occur. Additional rules were implemented, aimed at directly increasing sales by dynamically changing the shop-site, based on the analysis of the individual visitor's behavior. This allows the e-shop operators to concentrate on their main business while still benefiting from the available analytics data. The tool is developed as part of the SME E-Compass [1] project.
电子商店经营者对使用网络分析软件获得更深入的访客和客户基础的兴趣特别高,并利用这些知识通过各种活动优化他们的销售。与大型公司相比,中小型企业往往缺乏能力、时间或资源来进行必要的数据分析,以有效地利用和理解可用的数据。为了支持这些小型企业,在原型中设计并实现了一个工具,该工具使用复杂事件处理(CEP)来自动评估来自网络分析软件、竞争对手网站分析工具、实时用户交互数据和潜在的其他数据源的相关业务数据。可以定义和配置规则,当访问者或竞争对手的行为发生相关变化时,这些规则会自动并立即通知用户。还实施了一些附加规则,旨在根据对单个访问者行为的分析,通过动态改变商店站点来直接增加销售额。这使得电子商店经营者可以专注于他们的主要业务,同时仍然受益于可用的分析数据。该工具是作为中小企业电子罗盘[1]项目的一部分开发的。
{"title":"Leveraging Complex Event Processing for supporting small and medium-sized e-commerce enterprises","authors":"Christopher Ruff, Florian Maier, Tobias Muller, H. Kett","doi":"10.1109/CSCESM.2015.7331829","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331829","url":null,"abstract":"E-shop operators have a particular high interest in using web-analytics software to gain deeper insight in their visitor and customer base and to use this knowledge to optimize their sales through various activities. Compared to larger-scale companies, small and medium enterprises often lack the ability, time or resources to do the necessary data analysis to effectively use and understand the available data. In order to support these smaller enterprises, a tool was designed and implemented in a prototype, which uses Complex Event Processing (CEP) in order to automate the evaluation of relevant business data originating from web-analytics software, competitor website analysis tools, real-time user interaction data and potentially additional data sources. Rules can be defined and configured, that automatically and immediately notify the user when relevant changes in the visitor or competitor behavior occur. Additional rules were implemented, aimed at directly increasing sales by dynamically changing the shop-site, based on the analysis of the individual visitor's behavior. This allows the e-shop operators to concentrate on their main business while still benefiting from the available analytics data. The tool is developed as part of the SME E-Compass [1] project.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The cascading knowledge discovery in databases process in the information system development 信息系统开发过程中数据库中的级联知识发现
M. Mirończuk
This article describes a proposal of information system project method. This method based on author's cascading knowledge discovery in databases process. In this article, the author also to presented use case of this process. All analysis presented in this article based on text reports from the rescue fire service.
本文提出了一种信息系统项目方法。该方法基于作者在数据库过程中的级联知识发现。在本文中,作者还将介绍该过程的用例。本文的所有分析都是基于救援消防部门的文本报告。
{"title":"The cascading knowledge discovery in databases process in the information system development","authors":"M. Mirończuk","doi":"10.1109/CSCESM.2015.7331873","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331873","url":null,"abstract":"This article describes a proposal of information system project method. This method based on author's cascading knowledge discovery in databases process. In this article, the author also to presented use case of this process. All analysis presented in this article based on text reports from the rescue fire service.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The real time picture sharing in the cloud service 云服务中的实时图片共享
Mikko Taponen, Mari Liiri-Forsberg, Ilkka Tikanmaki
The goal of this study is to define the cloud service model when sharing real time pictures in governmental information sharing to different authorities. This article includes different kinds of viewpoints how to approach distinct cloud service models, what are the data security and legislation issues, concept level approach and benefits for real time picture sharing. The concept study of a real time picture was concluded using Needs, Approach, Benefits and Competition (NABC) framework. Swot analysis is used for Cloud service model survey. The application presented in this study may help future innovations to approach this complex mix of legal, secure and technical obstacles with accumulated information.
本研究的目的是定义政府信息共享中实时图片的云服务模型。这篇文章包括了不同的观点,如何处理不同的云服务模型,什么是数据安全和立法问题,概念级的方法和实时图片共享的好处。运用需求、途径、效益和竞争(NABC)框架对实时图像的概念进行了研究。运用Swot分析法对云服务模式进行调研。本研究中提出的应用可能有助于未来的创新,通过积累的信息来处理这种复杂的法律、安全和技术障碍。
{"title":"The real time picture sharing in the cloud service","authors":"Mikko Taponen, Mari Liiri-Forsberg, Ilkka Tikanmaki","doi":"10.1109/CSCESM.2015.7331886","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331886","url":null,"abstract":"The goal of this study is to define the cloud service model when sharing real time pictures in governmental information sharing to different authorities. This article includes different kinds of viewpoints how to approach distinct cloud service models, what are the data security and legislation issues, concept level approach and benefits for real time picture sharing. The concept study of a real time picture was concluded using Needs, Approach, Benefits and Competition (NABC) framework. Swot analysis is used for Cloud service model survey. The application presented in this study may help future innovations to approach this complex mix of legal, secure and technical obstacles with accumulated information.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet addiction: A structured literature review and future research directions 网络成瘾:结构化文献综述及未来研究方向
Sulaiman Al Sheibani
Internet Addiction (IA) has been a significant topical area for research since 1996. Considerable research has been done on IA across many nations around the world. Hence, there currently exists a rich body of literature addressing various aspects of IA. The study described in this report seeks to analyze the key findings expressed in the existing IA literature. In doing so, this study addresses four specific concerns relating to: a) reviewing various definitions of IA, b) growth of IA research over time in different parts of the world, c) the major themes identified in the literature, and d) future opportunities for research into IA. These concerns were addressed using a rigorous literature analysis involving 64 studies on IA selected from various scholarly sources. The outcomes of literature analysis are discussed in detail and some useful observations and insightful reflections are made. The findings reported in this study are useful because it offers a number of important recommendations for future research in this area.
自1996年以来,网络成瘾(IA)一直是一个重要的研究领域。世界上许多国家都对IA进行了大量的研究。因此,目前存在丰富的文献体,涉及IA的各个方面。本报告中描述的研究旨在分析现有IA文献中表达的主要发现。在此过程中,本研究解决了四个具体问题,涉及到:a)回顾IA的各种定义,b)随着时间的推移,世界不同地区IA研究的增长,c)文献中确定的主要主题,以及d)未来IA研究的机会。这些问题是通过严格的文献分析来解决的,这些文献分析涉及从各种学术来源中选择的64项关于IA的研究。对文献分析的结果进行了详细的讨论,并提出了一些有益的观察和深刻的思考。本研究报告的发现是有用的,因为它为该领域的未来研究提供了许多重要的建议。
{"title":"Internet addiction: A structured literature review and future research directions","authors":"Sulaiman Al Sheibani","doi":"10.1109/CSCESM.2015.7331889","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331889","url":null,"abstract":"Internet Addiction (IA) has been a significant topical area for research since 1996. Considerable research has been done on IA across many nations around the world. Hence, there currently exists a rich body of literature addressing various aspects of IA. The study described in this report seeks to analyze the key findings expressed in the existing IA literature. In doing so, this study addresses four specific concerns relating to: a) reviewing various definitions of IA, b) growth of IA research over time in different parts of the world, c) the major themes identified in the literature, and d) future opportunities for research into IA. These concerns were addressed using a rigorous literature analysis involving 64 studies on IA selected from various scholarly sources. The outcomes of literature analysis are discussed in detail and some useful observations and insightful reflections are made. The findings reported in this study are useful because it offers a number of important recommendations for future research in this area.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116803731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated color image arrangement method for multiple-peak image 多峰图像的自动彩色图像排列方法
Yusuke Kawakami, T. Hattori, Y. Horikawa, Janaka Rajapakse
This paper proposes the Histogram Matching based on the Gaussian Distribution (HMGD) method to improve feeling (or Kansei) impression for multiple-peak images. In the previous papers, we have described the HMGD processing. And we also proposed how calculate whether the processing results good or not, using curvature computation. As the results, we have understood that the HMGD processing works well for single-peak images. In this paper, we describe the principle and processing method of HMGD processing to correspond multiple-peak images. And we also illustrate experimental results.
本文提出了基于高斯分布的直方图匹配(HMGD)方法来改善多峰图像的感觉(或感性)印象。在前面的文章中,我们描述了HMGD的处理。并提出了如何利用曲率计算来计算加工效果的好坏。结果表明,HMGD处理单峰图像效果良好。本文介绍了多峰图像对应的HMGD处理原理和处理方法。并举例说明实验结果。
{"title":"Automated color image arrangement method for multiple-peak image","authors":"Yusuke Kawakami, T. Hattori, Y. Horikawa, Janaka Rajapakse","doi":"10.1109/CSCESM.2015.7331823","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331823","url":null,"abstract":"This paper proposes the Histogram Matching based on the Gaussian Distribution (HMGD) method to improve feeling (or Kansei) impression for multiple-peak images. In the previous papers, we have described the HMGD processing. And we also proposed how calculate whether the processing results good or not, using curvature computation. As the results, we have understood that the HMGD processing works well for single-peak images. In this paper, we describe the principle and processing method of HMGD processing to correspond multiple-peak images. And we also illustrate experimental results.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TB±tree: Index structure for Information Retrieval Systems TB±tree:信息检索系统的索引结构
M. Fekihal, I. Jaluta, Dinesh Kumar Saini
Information Retrieval Systems (IR) is using different indexing techniques to retrieve information such as, Inverted files, and Signature files. However, Signature files are suitable for small IR systems due to its slow response, while inverted file have better response time but its space overhead is high. Moreover, inverted files use B±trees for single-word queries. In this paper, a new indexing structure called TB±tree to be used in the design of inverted files for large information retrieval systems. The TB±tree is a variant of the B±tree that supports single key-word queries and phrase queries efficiently. In TB±tree algorithms which represent each key-word stored in the index by a numeric value, and this numeric value can be used as encryption and inforce security. The numeric value for each keyword is stored in binary format, which may reduce the size of the index file by 19%. The records in TB±tree may be of variable length.
信息检索系统(Information Retrieval Systems, IR)使用不同的索引技术来检索信息,如反向文件和签名文件。签名文件响应速度慢,适用于小型红外系统,而反向文件响应时间较好,但空间开销较大。此外,反向文件使用B±树进行单词查询。本文提出了一种新的索引结构TB±tree,用于大型信息检索系统的倒排文件设计。TB±树是B±树的变体,它有效地支持单个关键字查询和短语查询。在TB±tree算法中,用一个数值表示存储在索引中的每个关键字,这个数值可以用作加密和增强安全性。每个关键字的数值以二进制格式存储,这可以将索引文件的大小减少19%。TB±tree中的记录可以是可变长度的。
{"title":"TB±tree: Index structure for Information Retrieval Systems","authors":"M. Fekihal, I. Jaluta, Dinesh Kumar Saini","doi":"10.1109/CSCESM.2015.7331890","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331890","url":null,"abstract":"Information Retrieval Systems (IR) is using different indexing techniques to retrieve information such as, Inverted files, and Signature files. However, Signature files are suitable for small IR systems due to its slow response, while inverted file have better response time but its space overhead is high. Moreover, inverted files use B±trees for single-word queries. In this paper, a new indexing structure called TB±tree to be used in the design of inverted files for large information retrieval systems. The TB±tree is a variant of the B±tree that supports single key-word queries and phrase queries efficiently. In TB±tree algorithms which represent each key-word stored in the index by a numeric value, and this numeric value can be used as encryption and inforce security. The numeric value for each keyword is stored in binary format, which may reduce the size of the index file by 19%. The records in TB±tree may be of variable length.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"50 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combination of histogram of oriented gradients and hierarchical centroid for sketch-based image retrieval 结合定向梯度直方图和分层质心的素描图像检索
Norah M. Asiri, Nourah AlHumaidi, Nourah AlOsaim
The sketch based image retrieval (SBIR) systems is still little argued and debated. Histogram of oriented gradients (HOG) has shown good performance in sketch based retrieval systems over all other methods. In this paper, we propose an enhancement of HOG by using HOG combined with hierarchical centroid of irregular shape. We also compare the result with original HOG, edge histogram and the shape properties descriptors. The system uses free-hand sketched queries as input and matches it with images from different 12 classes.
基于草图的图像检索(SBIR)系统仍然很少争论和争论。直方图定向梯度(HOG)在基于草图的检索系统中表现出较好的性能。本文提出了将HOG与不规则形状的分层质心相结合来增强HOG的方法。我们还将结果与原始HOG、边缘直方图和形状属性描述符进行了比较。该系统使用手绘草图作为输入,并将其与来自12个不同类别的图像进行匹配。
{"title":"Combination of histogram of oriented gradients and hierarchical centroid for sketch-based image retrieval","authors":"Norah M. Asiri, Nourah AlHumaidi, Nourah AlOsaim","doi":"10.1109/CSCESM.2015.7331884","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331884","url":null,"abstract":"The sketch based image retrieval (SBIR) systems is still little argued and debated. Histogram of oriented gradients (HOG) has shown good performance in sketch based retrieval systems over all other methods. In this paper, we propose an enhancement of HOG by using HOG combined with hierarchical centroid of irregular shape. We also compare the result with original HOG, edge histogram and the shape properties descriptors. The system uses free-hand sketched queries as input and matches it with images from different 12 classes.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Secure Urgent Situation Propagation System using the Mobile Security Solution 基于移动安全解决方案的安全紧急情况传播系统
Geonlyang Kim, Yong-Sung Jeon, Jeongnyeo Kim
Many organizations want to support Bring Your Own Device initiatives to allow end-users to use personally owned devices at work. Organizations face significant challenges as users increasingly provide their own devices for work. So, interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smart mobile devices safely by separating the personal area and the business area. This paper describes the Secure Domain of the Mobile Security Solution which is designed based on the Trusted Execution Environment system architecture of the Global Platform, and it describes the architecture and the operating procedure of the Secure Urgent Situation Propagation System. The Secure Urgent Situation Propagation System uses the Mobile Security Solution having the Secure Domain isolated from the normal domain, and it provides safe storages, data cryptographic functions through Secure Functions of the Secure Domain, and so on.
许多组织希望支持自带设备计划,以允许最终用户在工作中使用个人拥有的设备。随着用户越来越多地为工作提供自己的设备,组织面临着重大挑战。因此,如何防止企业安全数据的泄露成为了很多人关注的焦点。通过将个人区域和业务区域分开,可以安全地使用智能移动设备。本文描述了基于全球平台可信执行环境体系结构设计的移动安全解决方案的安全域,描述了安全紧急情况传播系统的体系结构和操作流程。紧急情况安全传播系统采用安全域与正常域隔离的移动安全解决方案,通过安全域的安全功能提供安全存储、数据加密等功能。
{"title":"The Secure Urgent Situation Propagation System using the Mobile Security Solution","authors":"Geonlyang Kim, Yong-Sung Jeon, Jeongnyeo Kim","doi":"10.1109/CSCESM.2015.7331877","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331877","url":null,"abstract":"Many organizations want to support Bring Your Own Device initiatives to allow end-users to use personally owned devices at work. Organizations face significant challenges as users increasingly provide their own devices for work. So, interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smart mobile devices safely by separating the personal area and the business area. This paper describes the Secure Domain of the Mobile Security Solution which is designed based on the Trusted Execution Environment system architecture of the Global Platform, and it describes the architecture and the operating procedure of the Secure Urgent Situation Propagation System. The Secure Urgent Situation Propagation System uses the Mobile Security Solution having the Secure Domain isolated from the normal domain, and it provides safe storages, data cryptographic functions through Secure Functions of the Secure Domain, and so on.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1