首页 > 最新文献

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Experimental evaluation of RPL protocol RPL协议的实验评价
Belghachi Mohamed, Feham Mohamed
RPL is a routing protocol for low power and lossy networks. It is an extensible proactive IPv6 distance vector protocol, which is a brand new proposed standard for including low power and lossy networks in the global realm of IPv6 networks. RPL has been implemented and tested in wireless sensor networks (WSNs) simulations with up to a thousand nodes. Recently, some of the research process has studied the operation of the protocol experimentally in small networks, which is not enough to illustrate the whole features of RPL. So, it is important to implement real large scenarios. In this paper, we present an experimental performance evaluation of RPL for different network settings to understand the impact of the protocol attributes on the network behavior, namely in terms of convergence time, energy, packet loss and packet delay.
RPL是一种用于低功耗和有损网络的路由协议。它是一种可扩展的主动IPv6距离矢量协议,是在全球IPv6网络领域中包含低功耗和有损网络的全新提出的标准。RPL已经在多达一千个节点的无线传感器网络(wsn)模拟中实现和测试。目前,部分研究工作只是在小型网络中对协议的运行进行了实验研究,这还不足以说明RPL的全部特点。因此,实现真正的大型场景非常重要。在本文中,我们提出了RPL在不同网络设置下的实验性能评估,以了解协议属性对网络行为的影响,即在收敛时间,能量,丢包和包延迟方面。
{"title":"Experimental evaluation of RPL protocol","authors":"Belghachi Mohamed, Feham Mohamed","doi":"10.1109/ICITST.2016.7856752","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856752","url":null,"abstract":"RPL is a routing protocol for low power and lossy networks. It is an extensible proactive IPv6 distance vector protocol, which is a brand new proposed standard for including low power and lossy networks in the global realm of IPv6 networks. RPL has been implemented and tested in wireless sensor networks (WSNs) simulations with up to a thousand nodes. Recently, some of the research process has studied the operation of the protocol experimentally in small networks, which is not enough to illustrate the whole features of RPL. So, it is important to implement real large scenarios. In this paper, we present an experimental performance evaluation of RPL for different network settings to understand the impact of the protocol attributes on the network behavior, namely in terms of convergence time, energy, packet loss and packet delay.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131320843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing services 评估用于众包服务的配置文件感知微任务平台的开发和实现
Sophia Moganedi, Njabulo Mkhonto, J. Mtsweni
Crowdsourcing platforms have changed the assignment and completion of tasks from a known crowd to the anonymous crowd, which is the public. These crowdsourcing platforms allow organizations to focus on other tasks that need to be completed by a large crowd instead of the employees. However, many crowdsourcing platforms have not addressed challenges related to target audience with regards to task assignment, whereby the tasks are assigned to relevant people with appropriate core skills and qualifications. Our proposed microtasking platform from previous research is meant to address some of these challenges. This microtasking platform allows a micro-employer to design a task and assign it to be completed by a specific crowd of a specific skill and qualification. The purpose of this paper is thus to explore the proposed microtasking platform implementation, evaluating its task assignment improvements and task quality, as it was designed to improve the task assigning model and ensure better utilization of the crowd while preserving anonymity. The results obtained from this paper indicate the implementation concept from the proposed approach and revealed other shortcomings.
众包平台将任务的分配和完成从已知人群转变为匿名人群,即公众。这些众包平台使组织能够专注于需要大量人群而不是员工完成的其他任务。然而,许多众包平台在任务分配方面没有解决与目标受众相关的挑战,即将任务分配给具有适当核心技能和资格的相关人员。我们从之前的研究中提出的微任务平台旨在解决其中的一些挑战。这个微任务平台允许微型雇主设计一项任务,并将其分配给具有特定技能和资格的特定人群来完成。因此,本文的目的是探索所提出的微任务平台实现,评估其任务分配改进和任务质量,因为它旨在改进任务分配模型,在保持匿名的同时确保更好地利用人群。本文的研究结果表明了该方法的实施理念,同时也揭示了该方法的不足之处。
{"title":"Evaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing services","authors":"Sophia Moganedi, Njabulo Mkhonto, J. Mtsweni","doi":"10.1109/ICITST.2016.7856725","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856725","url":null,"abstract":"Crowdsourcing platforms have changed the assignment and completion of tasks from a known crowd to the anonymous crowd, which is the public. These crowdsourcing platforms allow organizations to focus on other tasks that need to be completed by a large crowd instead of the employees. However, many crowdsourcing platforms have not addressed challenges related to target audience with regards to task assignment, whereby the tasks are assigned to relevant people with appropriate core skills and qualifications. Our proposed microtasking platform from previous research is meant to address some of these challenges. This microtasking platform allows a micro-employer to design a task and assign it to be completed by a specific crowd of a specific skill and qualification. The purpose of this paper is thus to explore the proposed microtasking platform implementation, evaluating its task assignment improvements and task quality, as it was designed to improve the task assigning model and ensure better utilization of the crowd while preserving anonymity. The results obtained from this paper indicate the implementation concept from the proposed approach and revealed other shortcomings.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A commercial application of a chaos-based-stream cipher: Performance and Security analysis 基于混沌的流密码的商业应用:性能和安全性分析
G. Vidal, Rabei Bechikh, Rhouma Rhouma, S. Belghith
We present a commercial software based product that allows making audio and video conferences as well as sending encrypted instant messages that are based in a chaos stream cipher. This paper shows measurements on battery and bandwidth consumption and compares them with current state-of-the-art and widely used solutions. Results point that the chaos based system is more efficient than others. We also describe the lightweight encryption algorithm used in the application as well as some results concerning its security analysis. This system achieves savings of 95% on the CPU compared to AES-256-CBC.
我们提出了一种基于商业软件的产品,它允许进行音频和视频会议,以及发送基于混沌流密码的加密即时消息。本文展示了对电池和带宽消耗的测量,并将其与当前最先进和广泛使用的解决方案进行了比较。结果表明,基于混沌的系统比基于混沌的系统效率更高。我们还描述了应用程序中使用的轻量级加密算法,以及有关其安全性分析的一些结果。与AES-256-CBC相比,该系统在CPU上节省了95%。
{"title":"A commercial application of a chaos-based-stream cipher: Performance and Security analysis","authors":"G. Vidal, Rabei Bechikh, Rhouma Rhouma, S. Belghith","doi":"10.1109/ICITST.2016.7856661","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856661","url":null,"abstract":"We present a commercial software based product that allows making audio and video conferences as well as sending encrypted instant messages that are based in a chaos stream cipher. This paper shows measurements on battery and bandwidth consumption and compares them with current state-of-the-art and widely used solutions. Results point that the chaos based system is more efficient than others. We also describe the lightweight encryption algorithm used in the application as well as some results concerning its security analysis. This system achieves savings of 95% on the CPU compared to AES-256-CBC.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132172802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey of cyber-security awareness in Saudi Arabia 沙特阿拉伯网络安全意识调查
F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki
Rapid development has been observed in the deployment of communication technologies and the use of the Internet across the globe. Information exchange is the main aspect of use of such technologies in everyday life. Crimes associated with the misuse of information on the Internet are on the increase and are resulting in various losses. Saudi Arabia is one of the fastest developing countries in the Middle East, where the uptake of communication technologies such as the Internet and mobile technologies has risen sharply in recent years. These technologies are relatively new to the region when compared to developed countries. Therefore, the crimes associated with these technologies may be new to the people in the region. This paper investigates the cyber security awareness of the people in Saudi Arabia within different contexts. A quantitative online based survey was conducted to gather information related to cyber security awareness in Saudi Arabia. The study found that, although the participants had a good knowledge of IT, their awareness of the threats associated with cybercrime, cyber security practices, and the role of government and organisations in ensuring information safety across the Internet, is very limited. An application based model to create cyber security awareness in the region was preferred by the majority. The results indicated that, although cybercrime is on the rise, no specific approach is being followed to increase cyber security awareness in the region except for CERT regulations and online information on government websites. Additionally, Chi-Square test results (t(627)=3.85, p=0.013) indicated that Internet skills have an effect on cyber security practices from the users' end and there is an association between skill level and the security measures being implemented by organisations in the region. The study found that there is an immediate need to develop a model to create cyber security awareness in the region in order to combat cybercrime.
在全球范围内,通信技术的部署和互联网的使用得到了迅速发展。信息交换是这些技术在日常生活中使用的主要方面。与滥用互联网信息有关的犯罪正在增加,并造成各种损失。沙特阿拉伯是中东发展最快的国家之一,近年来,互联网和移动技术等通信技术的普及程度急剧上升。与发达国家相比,这些技术对本区域来说相对较新。因此,与这些技术相关的犯罪对该地区的人们来说可能是新的。本文调查了不同背景下沙特阿拉伯人民的网络安全意识。为了收集沙特阿拉伯的网络安全意识相关信息,进行了一项定量在线调查。研究发现,虽然受访者对资讯科技有很好的了解,但他们对与网络犯罪有关的威胁、网络安全措施,以及政府和机构在确保互联网信息安全方面的作用的认识非常有限。大多数人更喜欢基于应用程序的模式,以在该地区建立网络安全意识。结果表明,尽管网络犯罪呈上升趋势,但除了CERT法规和政府网站上的在线信息外,没有采取任何具体措施来提高该地区的网络安全意识。此外,卡方检验结果(t(627)=3.85, p=0.013)表明,互联网技能对用户端的网络安全实践有影响,技能水平与该地区组织实施的安全措施之间存在关联。该研究发现,为了打击网络犯罪,迫切需要开发一种模式,在该地区建立网络安全意识。
{"title":"A survey of cyber-security awareness in Saudi Arabia","authors":"F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki","doi":"10.1109/ICITST.2016.7856687","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856687","url":null,"abstract":"Rapid development has been observed in the deployment of communication technologies and the use of the Internet across the globe. Information exchange is the main aspect of use of such technologies in everyday life. Crimes associated with the misuse of information on the Internet are on the increase and are resulting in various losses. Saudi Arabia is one of the fastest developing countries in the Middle East, where the uptake of communication technologies such as the Internet and mobile technologies has risen sharply in recent years. These technologies are relatively new to the region when compared to developed countries. Therefore, the crimes associated with these technologies may be new to the people in the region. This paper investigates the cyber security awareness of the people in Saudi Arabia within different contexts. A quantitative online based survey was conducted to gather information related to cyber security awareness in Saudi Arabia. The study found that, although the participants had a good knowledge of IT, their awareness of the threats associated with cybercrime, cyber security practices, and the role of government and organisations in ensuring information safety across the Internet, is very limited. An application based model to create cyber security awareness in the region was preferred by the majority. The results indicated that, although cybercrime is on the rise, no specific approach is being followed to increase cyber security awareness in the region except for CERT regulations and online information on government websites. Additionally, Chi-Square test results (t(627)=3.85, p=0.013) indicated that Internet skills have an effect on cyber security practices from the users' end and there is an association between skill level and the security measures being implemented by organisations in the region. The study found that there is an immediate need to develop a model to create cyber security awareness in the region in order to combat cybercrime.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128223479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Efficient parallel Stochastic Gradient Descent for matrix factorization using GPU 基于GPU的矩阵分解的高效并行随机梯度下降算法
Mohamed A. Nassar, Layla A. A. El-Sayed, Y. Taha
Matrix factorization is an advanced and efficient technique for recommender systems. Recently, Stochastic Gradient Descent (SGD) method is considered to be one of the most popular techniques for matrix factorization. SGD is a sequential algorithm, which is difficult to be parallelized for large-scale problems. Nowadays, researches focus on efficiently parallelizing SGD. In this research, we propose an efficient parallel SGD method, ESGD, for GPU. ESGD is more efficient than recent parallel methods because it utilizes GPU, reducing non-coalesced access of global memory and achieving load balance of threads. In addition, ESGD does not require any sorting and/or data shuffling as preprocessing phase. Although platform used for ESGD implementation is old, ESGD demonstrates 12.5× speedup over state-of-the-art GPU method, BSGD.
矩阵分解是一种先进、高效的推荐系统技术。随机梯度下降法(SGD)是目前最流行的矩阵分解方法之一。SGD算法是一种顺序算法,难以对大规模问题进行并行化。目前研究的重点是高效并行化SGD。在本研究中,我们提出了一种高效的GPU并行SGD方法ESGD。ESGD比最近的并行方法更高效,因为它利用了GPU,减少了对全局内存的非合并访问,实现了线程的负载平衡。此外,ESGD不需要任何排序和/或数据变换作为预处理阶段。虽然用于ESGD实现的平台是旧的,但ESGD比最先进的GPU方法BSGD的速度提高了12.5倍。
{"title":"Efficient parallel Stochastic Gradient Descent for matrix factorization using GPU","authors":"Mohamed A. Nassar, Layla A. A. El-Sayed, Y. Taha","doi":"10.1109/ICITST.2016.7856668","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856668","url":null,"abstract":"Matrix factorization is an advanced and efficient technique for recommender systems. Recently, Stochastic Gradient Descent (SGD) method is considered to be one of the most popular techniques for matrix factorization. SGD is a sequential algorithm, which is difficult to be parallelized for large-scale problems. Nowadays, researches focus on efficiently parallelizing SGD. In this research, we propose an efficient parallel SGD method, ESGD, for GPU. ESGD is more efficient than recent parallel methods because it utilizes GPU, reducing non-coalesced access of global memory and achieving load balance of threads. In addition, ESGD does not require any sorting and/or data shuffling as preprocessing phase. Although platform used for ESGD implementation is old, ESGD demonstrates 12.5× speedup over state-of-the-art GPU method, BSGD.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information security policies: A review of challenges and influencing factors 信息安全策略:挑战与影响因素综述
M. Alotaibi, S. Furnell, N. Clarke
Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one of the biggest potential threats to their cyber security. Employees are widely acknowledged to be responsible for security breaches in organisations, and it is important that these are given as much attention as are technical issues. A significant number of researchers have argued that non-compliance with information security policy is one of the major challenges facing organisations. This is primarily considered to be a human problem rather than a technical issue. Thus, it is not surprising that employees are one of the major underlying causes of breaches in information security. In this paper, academic literature and reports of information security institutes relating to policy compliance are reviewed. The objective is to provide an overview of the key challenges surrounding the successful implementation of information security policies. A further aim is to investigate the factors that may have an influence upon employees' behaviour in relation to information security policy. As a result, challenges to information security policy have been classified into four main groups: security policy promotion; noncompliance with security policy; security policy management and updating; and shadow security. Furthermore, the factors influencing behaviour have been divided into organisational and human factors. Ultimately, this paper concludes that continuously subjecting users to targeted awareness raising and dynamically monitoring their adherence to information security policy should increase the compliance level.
企业越来越将员工视为需要呵护的宝贵资产;然而,与此同时,他们将员工视为网络安全的最大潜在威胁之一。人们普遍认为,员工要对组织中的安全漏洞负责,重要的是,这些问题要像技术问题一样受到重视。相当数量的研究人员认为,不遵守信息安全政策是组织面临的主要挑战之一。这主要被认为是一个人的问题,而不是一个技术问题。因此,员工是破坏信息安全的主要潜在原因之一也就不足为奇了。本文回顾了信息安全机构在政策遵从方面的学术文献和报告。目标是提供围绕成功实现信息安全策略的主要挑战的概述。进一步的目的是调查可能影响员工在信息安全政策方面的行为的因素。因此,信息安全政策面临的挑战被分为四大类:安全政策的推广;不符合安全策略;安全策略的管理和更新;还有影子安全。此外,还将影响行为的因素分为组织因素和人的因素。最后,本文得出的结论是,不断地让用户有针对性地提高意识,并动态地监控他们对信息安全策略的遵守情况,应该提高遵从性水平。
{"title":"Information security policies: A review of challenges and influencing factors","authors":"M. Alotaibi, S. Furnell, N. Clarke","doi":"10.1109/ICITST.2016.7856729","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856729","url":null,"abstract":"Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one of the biggest potential threats to their cyber security. Employees are widely acknowledged to be responsible for security breaches in organisations, and it is important that these are given as much attention as are technical issues. A significant number of researchers have argued that non-compliance with information security policy is one of the major challenges facing organisations. This is primarily considered to be a human problem rather than a technical issue. Thus, it is not surprising that employees are one of the major underlying causes of breaches in information security. In this paper, academic literature and reports of information security institutes relating to policy compliance are reviewed. The objective is to provide an overview of the key challenges surrounding the successful implementation of information security policies. A further aim is to investigate the factors that may have an influence upon employees' behaviour in relation to information security policy. As a result, challenges to information security policy have been classified into four main groups: security policy promotion; noncompliance with security policy; security policy management and updating; and shadow security. Furthermore, the factors influencing behaviour have been divided into organisational and human factors. Ultimately, this paper concludes that continuously subjecting users to targeted awareness raising and dynamically monitoring their adherence to information security policy should increase the compliance level.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"53 98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A framework for personal data protection in the IoT 物联网中个人数据保护的框架
Ilaria Torre, Frosina Koceva, Odnan Ref Sanchez, G. Adorni
IoT personal devices are having an undoubtedly explosive growth as many different products become available on the market such as smart watches, contact lenses, fitness bands, microchips under skin, among others. These devices and their related applications process the collected sensor data and use them to provide services to their users; in addition most of them require data from other applications in order to enhance their service. However, data sharing increases the risk for privacy protection since the aggregation of multiple data may favor the prediction of unrevealed private information. This paper presents a general framework for managing the issue of privacy protection from unwanted disclosure of personal data. The framework integrates two approaches in privacy protection: the use of personal data managers to control and manage user data sharing and the use of techniques for inference prevention. The contribution of the framework is to exploit the advantages of the two mentioned lines of research in a user-centric approach that empowers users with higher control of their data and makes them aware about data-sharing decisions.
随着市场上出现许多不同的产品,如智能手表、隐形眼镜、健身手环、皮下微芯片等,物联网个人设备无疑正在爆炸式增长。这些设备及其相关应用程序处理收集到的传感器数据,并使用这些数据向用户提供服务;此外,它们中的大多数都需要来自其他应用程序的数据来增强它们的服务。然而,数据共享增加了隐私保护的风险,因为多个数据的聚合可能有利于对未披露的隐私信息的预测。本文提出了一个管理隐私保护问题的一般框架,以防止不必要的个人数据披露。该框架在隐私保护方面集成了两种方法:使用个人数据管理器来控制和管理用户数据共享,以及使用推断预防技术。该框架的贡献在于以用户为中心的方法利用上述两种研究方向的优势,使用户能够更好地控制他们的数据,并使他们了解数据共享决策。
{"title":"A framework for personal data protection in the IoT","authors":"Ilaria Torre, Frosina Koceva, Odnan Ref Sanchez, G. Adorni","doi":"10.1109/ICITST.2016.7856735","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856735","url":null,"abstract":"IoT personal devices are having an undoubtedly explosive growth as many different products become available on the market such as smart watches, contact lenses, fitness bands, microchips under skin, among others. These devices and their related applications process the collected sensor data and use them to provide services to their users; in addition most of them require data from other applications in order to enhance their service. However, data sharing increases the risk for privacy protection since the aggregation of multiple data may favor the prediction of unrevealed private information. This paper presents a general framework for managing the issue of privacy protection from unwanted disclosure of personal data. The framework integrates two approaches in privacy protection: the use of personal data managers to control and manage user data sharing and the use of techniques for inference prevention. The contribution of the framework is to exploit the advantages of the two mentioned lines of research in a user-centric approach that empowers users with higher control of their data and makes them aware about data-sharing decisions.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130541403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review 南非中小型企业不愿采用和使用基于云的商业智能系统:文献综述
M. Moyo, Marianne Loock
The research work in this paper focused on cloud security challenges that prevented South African small and medium-sized enterprises from adopting and using various cloud-based business intelligence systems. The study conducted a literature review on 39 publications which were meticulously extracted from various electronic databases. Only 7 publications (5 journal articles, 1 conference proceeding, and 1 report) focused on security as a challenge to adoption of cloud-based services and BI systems by small and medium-sized enterprises. The results of the literature review indicated that security threats and vulnerabilities in various cloud deployments and services, and mistrust of cloud service providers by small and medium-sized enterprises were the main security challenges to adoption of cloud-based BIs by small and medium-sized enterprises in South Africa. The study also established that standard tools used by large business enterprises were unavailable or inapplicable to small and medium-sized enterprises which intended to adopt and utilise cloud-based BI systems.
本文的研究工作集中在阻碍南非中小型企业采用和使用各种基于云的商业智能系统的云安全挑战上。本研究对从各种电子数据库中精心提取的39份出版物进行了文献综述。只有7份出版物(5篇期刊文章、1篇会议论文集和1篇报告)将安全作为中小型企业采用基于云的服务和BI系统的挑战。文献综述的结果表明,各种云部署和服务中的安全威胁和漏洞,以及中小企业对云服务提供商的不信任,是南非中小企业采用基于云的BIs的主要安全挑战。该研究还确定,大型企业使用的标准工具对于打算采用和利用基于云的BI系统的中小型企业来说是不可用的或不适用的。
{"title":"South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review","authors":"M. Moyo, Marianne Loock","doi":"10.1109/ICITST.2016.7856706","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856706","url":null,"abstract":"The research work in this paper focused on cloud security challenges that prevented South African small and medium-sized enterprises from adopting and using various cloud-based business intelligence systems. The study conducted a literature review on 39 publications which were meticulously extracted from various electronic databases. Only 7 publications (5 journal articles, 1 conference proceeding, and 1 report) focused on security as a challenge to adoption of cloud-based services and BI systems by small and medium-sized enterprises. The results of the literature review indicated that security threats and vulnerabilities in various cloud deployments and services, and mistrust of cloud service providers by small and medium-sized enterprises were the main security challenges to adoption of cloud-based BIs by small and medium-sized enterprises in South Africa. The study also established that standard tools used by large business enterprises were unavailable or inapplicable to small and medium-sized enterprises which intended to adopt and utilise cloud-based BI systems.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The evolution of distributed systems towards microservices architecture 分布式系统向微服务架构的演变
Tasneem Salah, M. Zemerly, C. Yeun, M. Al-Qutayri, Yousof Al-Hammadi
Applications developed to fulfil distributed systems needs have been growing rapidly. Major evolutions have happened beginning with basic architecture relying on initiated request by a client to a processing side referred to as the server. Such architectures were not enough to cope up with the fast ever-increasing number of requests and need to utilize network bandwidth. Mobile agents attempted to overcome such drawbacks but did cope up for so long with the growing technology platforms. Service Oriented Architecture (SOA) then evolved to be one of the most successful representations of the client-server architecture with an added business value that provides reusable and loosely coupled services. SOA did not meet customers and business expectations as it was still relying on monolithic systems. Resilience, scalability, fast software delivery and the use of fewer resources are highly desirable features. Microservices architecture came to fulfil those expectations of system development, yet it comes with many challenges. This paper illustrates how distributed systems evolved from the traditional client-server model to the recently proposed microservices architecture. All architectures are reviewed containing brief definitions, some related work and reasoning of why they had to evolve. A feature comparison of all architectures is also provided.
为满足分布式系统需求而开发的应用程序正在迅速增长。主要的演变是从基本架构开始的,它依赖于客户端向称为服务器的处理端发起的请求。这样的架构不足以应付快速增长的请求数量和利用网络带宽的需求。移动代理试图克服这些缺点,但长期以来一直无法应对不断发展的技术平台。面向服务的体系结构(Service - Oriented Architecture, SOA)随后发展成为客户机-服务器体系结构最成功的表示形式之一,它具有附加的业务价值,可以提供可重用和松散耦合的服务。SOA没有满足客户和业务期望,因为它仍然依赖于整体系统。弹性、可伸缩性、快速软件交付和使用更少的资源是非常理想的特性。微服务体系结构的出现满足了人们对系统开发的期望,但它也带来了许多挑战。本文阐述了分布式系统是如何从传统的客户机-服务器模型发展到最近提出的微服务架构的。所有的体系结构都包含了简短的定义、一些相关的工作以及为什么它们必须发展的原因。还提供了所有体系结构的特性比较。
{"title":"The evolution of distributed systems towards microservices architecture","authors":"Tasneem Salah, M. Zemerly, C. Yeun, M. Al-Qutayri, Yousof Al-Hammadi","doi":"10.1109/ICITST.2016.7856721","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856721","url":null,"abstract":"Applications developed to fulfil distributed systems needs have been growing rapidly. Major evolutions have happened beginning with basic architecture relying on initiated request by a client to a processing side referred to as the server. Such architectures were not enough to cope up with the fast ever-increasing number of requests and need to utilize network bandwidth. Mobile agents attempted to overcome such drawbacks but did cope up for so long with the growing technology platforms. Service Oriented Architecture (SOA) then evolved to be one of the most successful representations of the client-server architecture with an added business value that provides reusable and loosely coupled services. SOA did not meet customers and business expectations as it was still relying on monolithic systems. Resilience, scalability, fast software delivery and the use of fewer resources are highly desirable features. Microservices architecture came to fulfil those expectations of system development, yet it comes with many challenges. This paper illustrates how distributed systems evolved from the traditional client-server model to the recently proposed microservices architecture. All architectures are reviewed containing brief definitions, some related work and reasoning of why they had to evolve. A feature comparison of all architectures is also provided.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
The role of machine learning in botnet detection 机器学习在僵尸网络检测中的作用
Sean T. Miller, Curtis Busby-Earle
Over the past ten to fifteen years botnets have gained the attention of researchers worldwide. A great deal of effort has been given to developing systems that would efficiently and effectively detect the presence of a botnet. This unique problem saw researchers applying machine learning (ML) to solve this problem. In this paper we provide a brief overview the different machine learning (ML) methods and the part they play in botnet detection. The main aim of this paper is to clearly define the role different ML methods play in Botnet detection. A clear understanding of these roles are critical for developing effective and efficient real-time online detection approaches and more robust models.
在过去的十到十五年里,僵尸网络已经引起了全世界研究人员的关注。人们已经付出了大量的努力来开发能够有效地检测僵尸网络存在的系统。这个独特的问题看到研究人员应用机器学习(ML)来解决这个问题。在本文中,我们简要概述了不同的机器学习(ML)方法及其在僵尸网络检测中的作用。本文的主要目的是明确定义不同的机器学习方法在僵尸网络检测中的作用。清楚地了解这些角色对于开发有效和高效的实时在线检测方法和更健壮的模型至关重要。
{"title":"The role of machine learning in botnet detection","authors":"Sean T. Miller, Curtis Busby-Earle","doi":"10.1109/ICITST.2016.7856730","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856730","url":null,"abstract":"Over the past ten to fifteen years botnets have gained the attention of researchers worldwide. A great deal of effort has been given to developing systems that would efficiently and effectively detect the presence of a botnet. This unique problem saw researchers applying machine learning (ML) to solve this problem. In this paper we provide a brief overview the different machine learning (ML) methods and the part they play in botnet detection. The main aim of this paper is to clearly define the role different ML methods play in Botnet detection. A clear understanding of these roles are critical for developing effective and efficient real-time online detection approaches and more robust models.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121021247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1