首页 > 最新文献

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Which metrics for vertex-cut partitioning? 哪些指标用于顶点切割分区?
H. Mykhailenko, G. Neglia, F. Huet
In this paper we focus on vertex-cut graph partitioning and we investigate how it is possible to evaluate the quality of a partition before running the computation. To this purpose we scrutinize a set of metrics proposed in literature. We carry experiments with the widely-used framework for graph processing Apache GraphX and we perform an accurate statistical analysis. Our preliminary experimental results show that communication metrics like vertex-cut and communication cost are effective predictors on most of the cases.
在本文中,我们关注于点切图分区,并研究了在运行计算之前如何评估分区的质量。为此,我们仔细研究了文献中提出的一组度量标准。我们使用广泛使用的图形处理框架Apache GraphX进行实验,并执行准确的统计分析。我们的初步实验结果表明,像顶点切割和通信成本这样的通信指标在大多数情况下都是有效的预测指标。
{"title":"Which metrics for vertex-cut partitioning?","authors":"H. Mykhailenko, G. Neglia, F. Huet","doi":"10.1109/ICITST.2016.7856670","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856670","url":null,"abstract":"In this paper we focus on vertex-cut graph partitioning and we investigate how it is possible to evaluate the quality of a partition before running the computation. To this purpose we scrutinize a set of metrics proposed in literature. We carry experiments with the widely-used framework for graph processing Apache GraphX and we perform an accurate statistical analysis. Our preliminary experimental results show that communication metrics like vertex-cut and communication cost are effective predictors on most of the cases.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128555001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Heuristic evaluation of mobile government portal services: An experts' review 移动政务门户服务的启发式评价:专家综述
Ibrahim Almarashdeh, M. Alsmadi
The rapid development of wireless and mobile technologies indicate the use of mobile as a supplement is very important to increase the accessibility and usage of the e-government services. To increase the usage of the mobile services, the m-government should be useful and ease to use and ease to navigate and compatible with the limitations of the mobile devices. This paper presents an important verification method towards a comprehensive m-Government success. Hence, the a usability studies on mobile governments has focused on limited aspects of services. This study conducted an exploratory study to examine usability problems that might faced the m-government design and performance using heuristic evaluation methods. The result indicates that the usability of the m-government is good. This study stand on some usability issues which can enhance the design and performance of the m-government before release it to the end user.
无线和移动技术的快速发展表明,利用移动作为补充,对于提高电子政务服务的可及性和利用率是非常重要的。为了增加移动服务的使用,移动政府应该是有用的,易于使用,易于导航,并与移动设备的限制兼容。本文提出了一个重要的验证方法,以全面的移动政府的成功。因此,关于移动政府的可用性研究侧重于服务的有限方面。本研究采用启发式评估方法对移动政府设计和性能可能面临的可用性问题进行了探索性研究。结果表明,移动政府的可用性良好。本研究提出了一些可用性问题,这些问题可以在移动政务向终端用户发布之前提高其设计和性能。
{"title":"Heuristic evaluation of mobile government portal services: An experts' review","authors":"Ibrahim Almarashdeh, M. Alsmadi","doi":"10.1109/ICITST.2016.7856746","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856746","url":null,"abstract":"The rapid development of wireless and mobile technologies indicate the use of mobile as a supplement is very important to increase the accessibility and usage of the e-government services. To increase the usage of the mobile services, the m-government should be useful and ease to use and ease to navigate and compatible with the limitations of the mobile devices. This paper presents an important verification method towards a comprehensive m-Government success. Hence, the a usability studies on mobile governments has focused on limited aspects of services. This study conducted an exploratory study to examine usability problems that might faced the m-government design and performance using heuristic evaluation methods. The result indicates that the usability of the m-government is good. This study stand on some usability issues which can enhance the design and performance of the m-government before release it to the end user.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124911836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Dynamically visualizing the relationships between Web pages depending on user's search viewpoints 根据用户的搜索视点动态可视化Web页面之间的关系
Daisuke Arakawa, H. Nakayama, R. Onuma, H. Kaminaga, Y. Miyadera, Shoichi Nakamura
Opportunities of continuous Web exploration with trial and error have been increased in intellectual creative activities such as research work and PBL. However, it is often difficult to pick up useful pages. In such exploration, information that a user particularly needs and his/her viewpoints changes in accordance with progress of the work and trial and error in it. Therefore, it is important but difficult to understand the relationships between obtained pages and to examine the promising information based on the latest perspectives. We aimed to develop the mechanism for dynamic visualization of the relationships between the pages. This paper mainly describes the outline of our dynamic visualization and methods for extracting the relationships between the pages using focused page of a user as a base point.
在诸如研究工作和PBL之类的智力创造性活动中,不断尝试和错误地进行Web探索的机会增加了。然而,通常很难找到有用的页面。在这种探索中,用户特别需要的信息和他/她的观点会随着工作的进展和其中的试错而变化。因此,理解所获得的页面之间的关系和根据最新的观点检查有希望的信息是重要的,但也是困难的。我们的目标是开发页面之间关系的动态可视化机制。本文主要介绍了动态可视化的概要,以及以用户的焦点页面为基点提取页面间关系的方法。
{"title":"Dynamically visualizing the relationships between Web pages depending on user's search viewpoints","authors":"Daisuke Arakawa, H. Nakayama, R. Onuma, H. Kaminaga, Y. Miyadera, Shoichi Nakamura","doi":"10.1109/ICITST.2016.7856757","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856757","url":null,"abstract":"Opportunities of continuous Web exploration with trial and error have been increased in intellectual creative activities such as research work and PBL. However, it is often difficult to pick up useful pages. In such exploration, information that a user particularly needs and his/her viewpoints changes in accordance with progress of the work and trial and error in it. Therefore, it is important but difficult to understand the relationships between obtained pages and to examine the promising information based on the latest perspectives. We aimed to develop the mechanism for dynamic visualization of the relationships between the pages. This paper mainly describes the outline of our dynamic visualization and methods for extracting the relationships between the pages using focused page of a user as a base point.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125871999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for evaluating trust in X.509 certificates 一种评估X.509证书信任的方法
Zakia El Uahhabi, H. Bakkali
Today, X.509 certificates is largely adopted for the identity verification of an entity. Such organizations and people use it to confirm their identities in online transaction. Then, it is necessary to verify the certificate trustworthiness in order to accept or reject it for a particular transaction. Besides, certificates are issued by the certificate authority based on the procedures which are described in a certificate policy. Any deficiency in these procedures may influence a certificate authority trustworthiness, which creates a trust lack in the certificates signed by this authority. In this context, relying parties need an automated mechanism to evaluate a trust level of certificate which come into question. In this paper, we grant them this mechanism to have information about its trustworthiness. In fact, we propose a trust framework architecture which is composed from the several components involved in the trust level calculation. Then, we suggest a trust level calculation algorithm which is based on three parameters that are the calculated CA trust level, the quality of procedures indicated in the certificate policy and the rating assigned to certification fields content. Our proposed solution allows relying parties to make a decision about certificate trustworthiness.
今天,X.509证书主要用于实体的身份验证。这些组织和个人在网上交易中使用它来确认自己的身份。然后,有必要验证证书的可信度,以便接受或拒绝特定交易的证书。此外,证书由证书颁发机构根据证书策略中描述的程序颁发。这些过程中的任何缺陷都可能影响证书颁发机构的可信度,从而在由该机构签署的证书中造成信任缺失。在这种情况下,依赖方需要一个自动机制来评估有问题的证书的信任级别。在本文中,我们赋予他们这种机制,以获得有关其可信度的信息。实际上,我们提出了一个信任框架体系结构,该体系结构由涉及信任级别计算的几个组件组成。然后,我们提出了一种基于计算出的CA信任级别、证书策略中指示的程序质量和分配给认证字段内容的评级三个参数的信任级别计算算法。我们提出的解决方案允许依赖方对证书的可信度做出决定。
{"title":"An approach for evaluating trust in X.509 certificates","authors":"Zakia El Uahhabi, H. Bakkali","doi":"10.1109/ICITST.2016.7856696","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856696","url":null,"abstract":"Today, X.509 certificates is largely adopted for the identity verification of an entity. Such organizations and people use it to confirm their identities in online transaction. Then, it is necessary to verify the certificate trustworthiness in order to accept or reject it for a particular transaction. Besides, certificates are issued by the certificate authority based on the procedures which are described in a certificate policy. Any deficiency in these procedures may influence a certificate authority trustworthiness, which creates a trust lack in the certificates signed by this authority. In this context, relying parties need an automated mechanism to evaluate a trust level of certificate which come into question. In this paper, we grant them this mechanism to have information about its trustworthiness. In fact, we propose a trust framework architecture which is composed from the several components involved in the trust level calculation. Then, we suggest a trust level calculation algorithm which is based on three parameters that are the calculated CA trust level, the quality of procedures indicated in the certificate policy and the rating assigned to certification fields content. Our proposed solution allows relying parties to make a decision about certificate trustworthiness.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"445 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116231905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security analysis of forwarding strategies in network time measurements using Openflow 基于Openflow的网络时间测量中转发策略的安全性分析
Alex M. S. Orozco, C. V. Neu, Regio A. Michelin, A. Zorzo
Reliable network time measurement tools are important to ensure that monitoring network systems work properly, but their development do not consider security as a concern and, for example, delay attacks could compromise those tools effectiveness. Indeed, nowadays the network time measurement is not always reliable. Some researches do propose to increase network time measurement reliability using Openflow. Nonetheless, those researches do not consider the impact of altering some of the Openflow controller algorithms in their analysis. On one hand, this paper investigates how the provided POX Openflow Controller packet forwarding strategies could be applied to compromise network time measurement reliability. On the other hand, this paper also shows that the way those strategies are applied could prevent against new attacks that need to trust on network time measurement. Therefore, some experiments were performed to show the impact of the POX packet forwarding algorithms on network time measurement, either to compromise or to help in protecting the network.
可靠的网络时间测量工具对于确保监视网络系统正常工作非常重要,但是它们的开发并没有考虑安全性,例如,延迟攻击可能会损害这些工具的有效性。事实上,目前的网络时间测量并不总是可靠的。一些研究提出使用Openflow来提高网络时间测量的可靠性。尽管如此,这些研究并没有在分析中考虑改变一些Openflow控制器算法的影响。一方面,本文研究了所提供的POX Openflow Controller数据包转发策略如何影响网络时间测量的可靠性。另一方面,本文还证明了这些策略的应用方式可以防止需要信任网络时间度量的新攻击。因此,我们进行了一些实验来证明POX包转发算法对网络时间测量的影响,或者是危害网络,或者是帮助保护网络。
{"title":"Security analysis of forwarding strategies in network time measurements using Openflow","authors":"Alex M. S. Orozco, C. V. Neu, Regio A. Michelin, A. Zorzo","doi":"10.1109/ICITST.2016.7856686","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856686","url":null,"abstract":"Reliable network time measurement tools are important to ensure that monitoring network systems work properly, but their development do not consider security as a concern and, for example, delay attacks could compromise those tools effectiveness. Indeed, nowadays the network time measurement is not always reliable. Some researches do propose to increase network time measurement reliability using Openflow. Nonetheless, those researches do not consider the impact of altering some of the Openflow controller algorithms in their analysis. On one hand, this paper investigates how the provided POX Openflow Controller packet forwarding strategies could be applied to compromise network time measurement reliability. On the other hand, this paper also shows that the way those strategies are applied could prevent against new attacks that need to trust on network time measurement. Therefore, some experiments were performed to show the impact of the POX packet forwarding algorithms on network time measurement, either to compromise or to help in protecting the network.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Developing Domain-Specific Language for Wireless Sensor Network application development 为无线传感器网络应用开发开发领域专用语言
Aymen J. Salman, A. Al-Yasiri
Wireless Sensor Networks (WSNs) have a potential for a wide scope of uses in the real-world environment. However, WSN application development is considered a challenging and complex task because of the complexity in low-level details, which a developer must deal with. Besides most of the current application development is done using node-centric, low-level languages such as C. In order to make the WSN technology more ubiquitous, application development complexity needs to be reduced, and development efficiency increased. This paper describes SenNet language, which is a new approach to WSN application development using a Domain-Specific Language (DSL). SenNet empowers application developers by allowing them to focus on modelling the application logic rather than the programming and low-level technical details. The new approach gives the ability to write applications using multi-abstraction levels (i.e. network, group, and node-level). Furthermore, evaluation results show that SenNet reduces the cognitive effort needed for learning WSN application development in addition to the time required to write the application by using automated code generation from abstracted language commands.
无线传感器网络(WSNs)在现实环境中具有广泛应用的潜力。然而,WSN应用程序的开发被认为是一项具有挑战性和复杂的任务,因为开发人员必须处理底层细节的复杂性。此外,目前大多数应用程序开发都是使用以节点为中心的低级语言(如c语言)完成的。为了使WSN技术更加普及,需要降低应用程序开发的复杂性,提高开发效率。SenNet语言是利用领域特定语言(DSL)开发WSN应用程序的一种新方法。SenNet允许应用程序开发人员专注于应用程序逻辑的建模,而不是编程和底层技术细节,从而增强了他们的能力。新方法提供了使用多抽象级别(即网络级、组级和节点级)编写应用程序的能力。此外,评估结果表明,SenNet减少了学习WSN应用程序开发所需的认知努力,以及通过使用从抽象语言命令生成的自动代码编写应用程序所需的时间。
{"title":"Developing Domain-Specific Language for Wireless Sensor Network application development","authors":"Aymen J. Salman, A. Al-Yasiri","doi":"10.1109/ICITST.2016.7856718","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856718","url":null,"abstract":"Wireless Sensor Networks (WSNs) have a potential for a wide scope of uses in the real-world environment. However, WSN application development is considered a challenging and complex task because of the complexity in low-level details, which a developer must deal with. Besides most of the current application development is done using node-centric, low-level languages such as C. In order to make the WSN technology more ubiquitous, application development complexity needs to be reduced, and development efficiency increased. This paper describes SenNet language, which is a new approach to WSN application development using a Domain-Specific Language (DSL). SenNet empowers application developers by allowing them to focus on modelling the application logic rather than the programming and low-level technical details. The new approach gives the ability to write applications using multi-abstraction levels (i.e. network, group, and node-level). Furthermore, evaluation results show that SenNet reduces the cognitive effort needed for learning WSN application development in addition to the time required to write the application by using automated code generation from abstracted language commands.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comparison of color profile gamut coverage for computer monitors 计算机显示器的色域覆盖比较
Radu Velea, N. Gordon
Color characteristics of computer monitors and similar display devices can significantly alter the way an image is perceived by the human eye. Modern cameras and software applications are able to create vibrant scenes and retain their original colorfulness through an embedded ICC[1] profile. Gamut differences between input and output mediums require color management techniques in order to preserve the accuracy of the original content. It is thus useful to be able to determine the nature of the display a user is exposed to through gamut area measurement. This paper analyzes several metrics and provides a suggestion on how to measure and assess the gamut of an ICCv2 color profile. The work this article is based on has been integrated into Chromium browser's Quick Color Management System library.
计算机显示器和类似的显示设备的颜色特性可以显著地改变人眼感知图像的方式。现代相机和软件应用程序能够通过嵌入式ICC[1]配置文件创建充满活力的场景并保留其原始色彩。输入和输出介质之间的色域差异需要色彩管理技术,以保持原始内容的准确性。因此,能够通过色域面积测量来确定用户所暴露的显示的性质是有用的。本文分析了几个指标,并就如何测量和评估ICCv2颜色配置文件的色域提供了建议。本文所基于的工作已经集成到Chromium浏览器的Quick Color Management System库中。
{"title":"Comparison of color profile gamut coverage for computer monitors","authors":"Radu Velea, N. Gordon","doi":"10.1109/ICITST.2016.7856714","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856714","url":null,"abstract":"Color characteristics of computer monitors and similar display devices can significantly alter the way an image is perceived by the human eye. Modern cameras and software applications are able to create vibrant scenes and retain their original colorfulness through an embedded ICC[1] profile. Gamut differences between input and output mediums require color management techniques in order to preserve the accuracy of the original content. It is thus useful to be able to determine the nature of the display a user is exposed to through gamut area measurement. This paper analyzes several metrics and provides a suggestion on how to measure and assess the gamut of an ICCv2 color profile. The work this article is based on has been integrated into Chromium browser's Quick Color Management System library.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128566237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaze network extraction from bookmarks in accordance with search intentions 根据搜索意图从书签中提取注视网络
Takashi Amano, R. Onuma, H. Nakayama, H. Kaminaga, Y. Miyadera, Shoichi Nakamura
Opportunities for Web exploration have been remarkably increased. In particular, complicated Web search with a stack of search and acquisitions of Web pages is significant in long-term intellectual activity. In such exploration, it is important to identify the noteworthy pages and their relationships in increasing bookmark in accordance with change of search intentions. However, it is difficult to grasp them since bookmarks tends to increase according to various search intentions and their changes. In this research, we develop a method for extracting the relationships between Web page by several different related elements from bookmarks. We also develop a method for extracting the gaze network based on centrality analysis. This paper mainly describes the framework of our proposed methods.
Web探索的机会已经显著增加。特别是,包含大量搜索和获取Web页面的复杂Web搜索在长期智力活动中非常重要。在这种探索中,根据搜索意图的变化,确定值得注意的页面及其在增加书签中的关系是很重要的。但是,很难掌握它们,因为书签会根据各种搜索意图及其变化而增加。在本研究中,我们开发了一种通过书签中几个不同的相关元素来提取网页之间关系的方法。我们还开发了一种基于中心性分析的注视网络提取方法。本文主要描述了我们提出的方法的框架。
{"title":"Gaze network extraction from bookmarks in accordance with search intentions","authors":"Takashi Amano, R. Onuma, H. Nakayama, H. Kaminaga, Y. Miyadera, Shoichi Nakamura","doi":"10.1109/ICITST.2016.7856756","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856756","url":null,"abstract":"Opportunities for Web exploration have been remarkably increased. In particular, complicated Web search with a stack of search and acquisitions of Web pages is significant in long-term intellectual activity. In such exploration, it is important to identify the noteworthy pages and their relationships in increasing bookmark in accordance with change of search intentions. However, it is difficult to grasp them since bookmarks tends to increase according to various search intentions and their changes. In this research, we develop a method for extracting the relationships between Web page by several different related elements from bookmarks. We also develop a method for extracting the gaze network based on centrality analysis. This paper mainly describes the framework of our proposed methods.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125758141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An MMAS-GA for resource allocation in multi-cloud systems 面向多云系统资源分配的MMAS-GA
Lotfi Hajjem, S. Benabdallah
Delivering computing resources from multiple cloud providers to satisfy the users' needs, known as multi-cloud, gives the possibility for cloud consumers to get access to a wide variety of performing resources with competing costs. The main challenge of this infrastructure is the providers' systems interoperability. In this paper, cloud broker architecture is proposed, which aims on finding a providers coalition to satisfy a user's request with the minimal execution time and cost. The request is a set of independent tasks where no communication is considered. To solve this problem, a Max-Min Ant system (MMAS) and a Genetic Algorithm (GA) were developed as well as their hybrid, and a comparative study was established.
从多个云提供商交付计算资源以满足用户的需求(称为多云),使云消费者能够以竞争成本访问各种各样的性能资源。这种基础设施的主要挑战是提供者的系统互操作性。本文提出了云代理架构,其目的是寻找一个提供商联盟,以最小的执行时间和成本来满足用户的请求。请求是一组独立的任务,其中不考虑通信。为了解决这一问题,提出了一种最大最小蚂蚁系统(MMAS)和遗传算法(GA)及其混合算法,并进行了比较研究。
{"title":"An MMAS-GA for resource allocation in multi-cloud systems","authors":"Lotfi Hajjem, S. Benabdallah","doi":"10.1109/ICITST.2016.7856745","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856745","url":null,"abstract":"Delivering computing resources from multiple cloud providers to satisfy the users' needs, known as multi-cloud, gives the possibility for cloud consumers to get access to a wide variety of performing resources with competing costs. The main challenge of this infrastructure is the providers' systems interoperability. In this paper, cloud broker architecture is proposed, which aims on finding a providers coalition to satisfy a user's request with the minimal execution time and cost. The request is a set of independent tasks where no communication is considered. To solve this problem, a Max-Min Ant system (MMAS) and a Genetic Algorithm (GA) were developed as well as their hybrid, and a comparative study was established.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes 小尺寸随机(n, m)- s盒的线性和差分密码分析
Y. Alsalami, C. Yeun, T. Martin, M. Khonji
S-boxes are used in cryptography in order to provide non-linearity in the design of cryptographic primitives such as block ciphers and hash functions. Some cryptographic primitives use bijective S-boxes as in the Advanced Encryption Standard (AES), and others use surjective S-boxes as in the Data Encryption Standard (DES). That is, S-boxes can have inputs and outputs of the same length as in the (8,8)-S-box of AES, or alternatively the input length can be larger than the output as in the (6, 4)-S-boxes of DES. In this paper, we perform a statistical study of linear and differential properties of randomly generated (n, m)-S-boxes, where m ≤ n. We show that certain S-boxes with well-behaved linear and differential properties can be feasibly obtained via random search. We show further that certain types of S-boxes with specific desirable linear and differential properties are improbable.
在密码学中使用s -box是为了在密码学原语(如分组密码和哈希函数)的设计中提供非线性。一些加密原语使用双射s盒(如高级加密标准AES),而其他原语使用满射s盒(如数据加密标准DES)。即s -box的输入和输出长度可以与AES的(8,8)-S-box相同,或者输入长度可以大于DES的(6,4)-S-box的输出长度。本文对随机生成的(n, m)-S-box的线性和微分性质进行了统计研究,其中m≤n。我们证明了通过随机搜索可以获得某些具有良好线性和微分性质的s -box。我们进一步证明了具有特定理想线性和微分性质的某些类型的s盒是不可能的。
{"title":"Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes","authors":"Y. Alsalami, C. Yeun, T. Martin, M. Khonji","doi":"10.1109/ICITST.2016.7856751","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856751","url":null,"abstract":"S-boxes are used in cryptography in order to provide non-linearity in the design of cryptographic primitives such as block ciphers and hash functions. Some cryptographic primitives use bijective S-boxes as in the Advanced Encryption Standard (AES), and others use surjective S-boxes as in the Data Encryption Standard (DES). That is, S-boxes can have inputs and outputs of the same length as in the (8,8)-S-box of AES, or alternatively the input length can be larger than the output as in the (6, 4)-S-boxes of DES. In this paper, we perform a statistical study of linear and differential properties of randomly generated (n, m)-S-boxes, where m ≤ n. We show that certain S-boxes with well-behaved linear and differential properties can be feasibly obtained via random search. We show further that certain types of S-boxes with specific desirable linear and differential properties are improbable.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1