首页 > 最新文献

2010 International Conference on Multimedia Computing and Information Technology (MCIT)最新文献

英文 中文
Quantifying Quality of Service differentiation for WiMAX networks 量化WiMAX网络的服务质量差异
A. Esmailpour, N. Nasser
Quality of Service (QoS) differentiation in WiMAX networks is a critically important part of QoS support that has not been properly addressed in the literature. Radio Resource Management (RRM) techniques such as packet scheduling and admission control have been studied by many research groups, and although they claim to provide QoS differentiation in their schemes, no studies have truly evaluated and measured the QoS differentiations among various service classes. In this study, we propose quantifying QoS differentiation using a new parameter called Fairness, which could measure QoS differentiation among various service classes. By simulation results, we show that Fairness values could provide detailed information about QoS differentiation, where throughput and delay fall short of comparison analysis for QoS support among Real Time (RT) versus Non-RT (NRT) applications.
WiMAX网络中的服务质量(QoS)差异是QoS支持的一个至关重要的部分,在文献中尚未得到适当的解决。无线电资源管理(RRM)技术,如分组调度和允许控制,已经被许多研究小组研究过,尽管他们声称在他们的方案中提供QoS差异,但没有研究真正评估和测量各种服务类别之间的QoS差异。在本研究中,我们提出使用一个称为公平性的新参数来量化QoS差异,该参数可以衡量不同服务类别之间的QoS差异。通过仿真结果,我们表明公平性值可以提供有关QoS差异的详细信息,其中吞吐量和延迟不足以对实时(RT)与非RT (NRT)应用程序之间的QoS支持进行比较分析。
{"title":"Quantifying Quality of Service differentiation for WiMAX networks","authors":"A. Esmailpour, N. Nasser","doi":"10.1109/MCIT.2010.5444867","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444867","url":null,"abstract":"Quality of Service (QoS) differentiation in WiMAX networks is a critically important part of QoS support that has not been properly addressed in the literature. Radio Resource Management (RRM) techniques such as packet scheduling and admission control have been studied by many research groups, and although they claim to provide QoS differentiation in their schemes, no studies have truly evaluated and measured the QoS differentiations among various service classes. In this study, we propose quantifying QoS differentiation using a new parameter called Fairness, which could measure QoS differentiation among various service classes. By simulation results, we show that Fairness values could provide detailed information about QoS differentiation, where throughput and delay fall short of comparison analysis for QoS support among Real Time (RT) versus Non-RT (NRT) applications.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125761247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Associative Classification techniques for predicting e-banking phishing websites 预测电子银行网络钓鱼网站的关联分类技术
M. Aburrous, M. A. Hossain, K. Dahal, F. Thabtah
This paper presents a novel approach to overcome the difficulty and complexity in detecting and predicting e-banking phishing website. We proposed an intelligent resilient and effective model that is based on using association and classification Data Mining algorithms. These algorithms were used to characterize and identify all the factors and rules in order to classify the phishing website and the relationship that correlate them with each other. We implemented six different classification algorithm and techniques to extract the phishing training data sets criteria to classify their legitimacy. We also compared their performances, accuracy, number of rules generated and speed. The rules generated from the associative classification model showed the relationship between some important characteristics like URL and Domain Identity, and Security and Encryption criteria in the final phishing detection rate. The experimental results demonstrated the feasibility of using Associative Classification techniques in real applications and its better performance as compared to other traditional classifications algorithms.
本文提出了一种新的方法来克服检测和预测电子银行网络钓鱼网站的困难和复杂性。提出了一种基于关联和分类数据挖掘算法的智能弹性有效模型。这些算法用于表征和识别所有因素和规则,以便对网络钓鱼网站进行分类,并确定它们之间的相互关联关系。我们实现了六种不同的分类算法和技术来提取网络钓鱼训练数据集的标准,对其合法性进行分类。我们还比较了它们的性能、准确性、生成的规则数量和速度。关联分类模型生成的规则显示了URL和Domain Identity、Security和Encryption标准等重要特征在最终网络钓鱼检测率中的关系。实验结果表明,在实际应用中使用关联分类技术是可行的,并且与其他传统分类算法相比具有更好的性能。
{"title":"Associative Classification techniques for predicting e-banking phishing websites","authors":"M. Aburrous, M. A. Hossain, K. Dahal, F. Thabtah","doi":"10.1109/MCIT.2010.5444840","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444840","url":null,"abstract":"This paper presents a novel approach to overcome the difficulty and complexity in detecting and predicting e-banking phishing website. We proposed an intelligent resilient and effective model that is based on using association and classification Data Mining algorithms. These algorithms were used to characterize and identify all the factors and rules in order to classify the phishing website and the relationship that correlate them with each other. We implemented six different classification algorithm and techniques to extract the phishing training data sets criteria to classify their legitimacy. We also compared their performances, accuracy, number of rules generated and speed. The rules generated from the associative classification model showed the relationship between some important characteristics like URL and Domain Identity, and Security and Encryption criteria in the final phishing detection rate. The experimental results demonstrated the feasibility of using Associative Classification techniques in real applications and its better performance as compared to other traditional classifications algorithms.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Vehicle detection using morphological image processing technique 车辆检测采用形态学图像处理技术
A. Ajmal, I. Hussain
Vehicle detection and classification of vehicles play an important role in decision making for the purpose of traffic control and management. In this paper we propose a novel and efficient algorithm based on image processing using aerial cameras for vehicle detection and classification especially in highways. The algorithm is mainly based on a sequence of morphological methods being applied on an image taken by an aerial camera of a road segment. The algorithm also uses thresholding and edge detection techniques for vehicle detection. Experiments are carried out over a wide range of vehicles, road segments and camera heights. A success rate of more than 85% and proper vehicle classification is achieved.
车辆检测和分类对交通控制和管理的决策起着重要的作用。本文提出了一种新的基于图像处理的航拍相机车辆检测与分类算法。该算法主要基于应用于航拍相机拍摄的道路段图像的一系列形态学方法。该算法还使用阈值和边缘检测技术进行车辆检测。实验在广泛的车辆、路段和相机高度上进行。实现了85%以上的成功率和适当的车辆分类。
{"title":"Vehicle detection using morphological image processing technique","authors":"A. Ajmal, I. Hussain","doi":"10.1109/MCIT.2010.5444851","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444851","url":null,"abstract":"Vehicle detection and classification of vehicles play an important role in decision making for the purpose of traffic control and management. In this paper we propose a novel and efficient algorithm based on image processing using aerial cameras for vehicle detection and classification especially in highways. The algorithm is mainly based on a sequence of morphological methods being applied on an image taken by an aerial camera of a road segment. The algorithm also uses thresholding and edge detection techniques for vehicle detection. Experiments are carried out over a wide range of vehicles, road segments and camera heights. A success rate of more than 85% and proper vehicle classification is achieved.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Qualitative comparison of audio and visual descriptors distributions 音频和视觉描述符分布的定性比较
S. Barton, V. Gouet-Brunet, M. Rukoz, C. Charbuillet, G. Peeters
A comparative study of distributions and properties of datasets representing public domain audio and visual content is presented. The criteria adopted in this study incorporate the analysis of the pairwise distance distribution histograms and estimation of intrinsic dimensionality. In order to better understand the results, auxiliary datasets have been also considered and analyzed. The results of this study provide a solid ground for further research using the presented datasets such as their indexability with index structures.
对代表公共领域视听内容的数据集的分布和属性进行了比较研究。本研究采用的标准包括对两两距离分布直方图的分析和固有维数的估计。为了更好地理解结果,还考虑和分析了辅助数据集。本研究的结果为进一步研究提供了坚实的基础,使用所提出的数据集,如索引结构的可索引性。
{"title":"Qualitative comparison of audio and visual descriptors distributions","authors":"S. Barton, V. Gouet-Brunet, M. Rukoz, C. Charbuillet, G. Peeters","doi":"10.1109/MCIT.2010.5444870","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444870","url":null,"abstract":"A comparative study of distributions and properties of datasets representing public domain audio and visual content is presented. The criteria adopted in this study incorporate the analysis of the pairwise distance distribution histograms and estimation of intrinsic dimensionality. In order to better understand the results, auxiliary datasets have been also considered and analyzed. The results of this study provide a solid ground for further research using the presented datasets such as their indexability with index structures.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132862415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel coloring framework for grayscale images 一种新的灰度图像着色框架
I. Jafar, Ghazi Al Sukkar
Coloring of grayscale images finds its place in many areas such as medical imaging and coloring of black and white images and videos. However, manual coloring is time consuming and ill-posed problem. In this paper we present a semi-automatic framework for coloring of grayscale images. Given a grayscale image, the new framework operates by prompting the user to specify a source color image of similar content to that of the grayscale image. Then, it employs a large set of grey level features, K-means clustering, and a new color assignment approach to transfer color to the grayscale image. Subjective and objective evaluation revealed the capability of the proposed framework in producing faithful and true color images.
灰度图像的着色在医学成像、黑白图像和视频的着色等许多领域都占有一席之地。然而,手工上色是费时且不适定的问题。本文提出了一种用于灰度图像上色的半自动框架。给定灰度图像,新框架通过提示用户指定与灰度图像内容相似的源彩色图像来操作。然后,采用大量的灰度特征集、k均值聚类和一种新的颜色分配方法将颜色转移到灰度图像中。主观和客观的评价揭示了所提出的框架在产生忠实和真实的彩色图像的能力。
{"title":"A novel coloring framework for grayscale images","authors":"I. Jafar, Ghazi Al Sukkar","doi":"10.1109/MCIT.2010.5444849","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444849","url":null,"abstract":"Coloring of grayscale images finds its place in many areas such as medical imaging and coloring of black and white images and videos. However, manual coloring is time consuming and ill-posed problem. In this paper we present a semi-automatic framework for coloring of grayscale images. Given a grayscale image, the new framework operates by prompting the user to specify a source color image of similar content to that of the grayscale image. Then, it employs a large set of grey level features, K-means clustering, and a new color assignment approach to transfer color to the grayscale image. Subjective and objective evaluation revealed the capability of the proposed framework in producing faithful and true color images.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anticipation the consumed electrical power in Smart Home using evolutionary algorithms 利用进化算法预测智能家居耗电量
A. Elmahalawy, Newal Elfishawy, M. N. El-dien
One of the leading technologies is the Smart Home, where the home itself recognizes certain changes in home environment and provides adequate services to residents. Also, the Smart Home can anticipate the any dangerous state so it can adapt itself for this future case. Our goal is to anticipate states with too large power take-off; it means to eliminate power spikes. Program allows starting of simulation also without anticipation. The results are suitable for comparison with simulations with the block of anticipation. Anticipation based on evolutionary algorithms. So, we can see the quality of anticipation in the best way.
其中一项领先的技术是智能家居,在智能家居中,家庭本身可以识别家庭环境的某些变化,并为居民提供适当的服务。此外,智能家居可以预测任何危险的状态,因此它可以适应未来的情况。我们的目标是预测功率输出过大的状态;意思是消除能量峰值。程序允许启动模拟也没有预期。结果适合于与具有预期块的模拟进行比较。基于进化算法的预测。所以,我们可以用最好的方式来观察预期的质量。
{"title":"Anticipation the consumed electrical power in Smart Home using evolutionary algorithms","authors":"A. Elmahalawy, Newal Elfishawy, M. N. El-dien","doi":"10.1109/MCIT.2010.5444847","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444847","url":null,"abstract":"One of the leading technologies is the Smart Home, where the home itself recognizes certain changes in home environment and provides adequate services to residents. Also, the Smart Home can anticipate the any dangerous state so it can adapt itself for this future case. Our goal is to anticipate states with too large power take-off; it means to eliminate power spikes. Program allows starting of simulation also without anticipation. The results are suitable for comparison with simulations with the block of anticipation. Anticipation based on evolutionary algorithms. So, we can see the quality of anticipation in the best way.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125068324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Practical software project total cost estimation methods 实用的软件项目总成本估算方法
K. Hamdan, H. El Khatib, K. Shuaib
Software project management has become a crucial field of research due to the increasing role of software in today's world. When a project is insufficiently supported, the quality and speed of the project will suffer. Improving the functions of project management is a main concern in software development organizations. The essence of this paper is to estimate software project cost by Analogy estimation model, incorporating organizational and intercultural factors was developed and evaluated. Analysis was done to show how such added factors can improve the overall accuracy of estimating the cost of a project.
由于软件在当今世界的作用越来越大,软件项目管理已经成为一个重要的研究领域。当一个项目没有得到足够的支持时,项目的质量和速度就会受到影响。改进项目管理的功能是软件开发组织关注的主要问题。本文的实质是通过类比估算模型对软件项目成本进行估算,并结合组织和跨文化因素进行开发和评估。分析显示了这些增加的因素如何能够提高估算项目成本的整体准确性。
{"title":"Practical software project total cost estimation methods","authors":"K. Hamdan, H. El Khatib, K. Shuaib","doi":"10.1109/MCIT.2010.5444853","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444853","url":null,"abstract":"Software project management has become a crucial field of research due to the increasing role of software in today's world. When a project is insufficiently supported, the quality and speed of the project will suffer. Improving the functions of project management is a main concern in software development organizations. The essence of this paper is to estimate software project cost by Analogy estimation model, incorporating organizational and intercultural factors was developed and evaluated. Analysis was done to show how such added factors can improve the overall accuracy of estimating the cost of a project.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116740642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Extracting membership functions by ACS algorithm without specifying actual minimum support 在不指定实际最小支持度的情况下,通过ACS算法提取隶属函数
E. Vejdani, F. Saadatmand, M. Niazi, M. Yaghmaee
Ant Colony Systems (ACS) have been successfully utilized to optimization problems in recent years. However, few works have been done on applying ACS to data mining. This paper proposes an ACS-based algorithm to extract membership functions in fuzzy data mining. The membership functions are first encoded into binary bits and then given to the ACS to search for the optimal set of membership functions. With the proposed algorithm, a global search can be performed and system automation is implemented, because our model does not require the user-specified threshold of minimum support. We experimentally evaluate our approach and reveal that our algorithm significantly improve membership functions and reduce the computation costs.
近年来,蚁群系统(ACS)已成功地应用于优化问题。然而,将ACS应用于数据挖掘方面的工作却很少。提出了一种基于acs的模糊数据挖掘中的隶属函数提取算法。首先将隶属度函数编码成二进制,然后交给ACS来搜索最优的隶属度函数集。由于我们的模型不需要用户指定的最小支持度阈值,因此该算法可以执行全局搜索并实现系统自动化。实验结果表明,该算法显著改善了隶属函数,降低了计算成本。
{"title":"Extracting membership functions by ACS algorithm without specifying actual minimum support","authors":"E. Vejdani, F. Saadatmand, M. Niazi, M. Yaghmaee","doi":"10.1109/MCIT.2010.5444864","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444864","url":null,"abstract":"Ant Colony Systems (ACS) have been successfully utilized to optimization problems in recent years. However, few works have been done on applying ACS to data mining. This paper proposes an ACS-based algorithm to extract membership functions in fuzzy data mining. The membership functions are first encoded into binary bits and then given to the ACS to search for the optimal set of membership functions. With the proposed algorithm, a global search can be performed and system automation is implemented, because our model does not require the user-specified threshold of minimum support. We experimentally evaluate our approach and reveal that our algorithm significantly improve membership functions and reduce the computation costs.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114254315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Multi-Criteria Decision Making (MCDM) network selection model providing enhanced QoS differentiation to customers
H. Pervaiz
This paper proposes a radio resource management framework for integrated network selection mechanism control in multi- network environment as an interaction between the service providers and users in competitive manner to admit high priority users or the services that maximize their rewards. The proposed scheme comprises of three steps namely as user profile, service profile and access network selection. The priorities are assigned to the users depending on their grade and category. The users belonging to same categories have same preferences for the decision factors (or QoS parameters). Different policies are defined according to the network load to prioritize high priority users as compared to the type of service requested. The access network selection mechanism calculates the payoffs based on their relative weights calculated using AHP and a utility function evaluation by each wireless network for each user. The proposed model is preliminary and its contribution is to create an admission policy that can adapt to different coverage areas of a wireless network and depends on the priority of users and their requirements.
本文提出了一种用于多网环境下综合网络选择机制控制的无线电资源管理框架,作为服务提供商和用户之间以竞争方式进行交互,以接纳高优先级用户或收益最大化的服务。该方案包括用户配置、业务配置和接入网选择三个步骤。根据用户的等级和类别,将优先级分配给用户。属于同一类别的用户对决策因素(或QoS参数)的偏好相同。根据网络负载定义不同的策略,将高优先级用户与请求的服务类型进行比较。接入网选择机制根据每个无线网络对每个用户使用层次分析法计算的相对权重和效用函数评估来计算收益。所提出的模型是初步的,它的贡献是创建一个可以适应无线网络的不同覆盖区域的准入策略,并取决于用户的优先级和他们的需求。
{"title":"A Multi-Criteria Decision Making (MCDM) network selection model providing enhanced QoS differentiation to customers","authors":"H. Pervaiz","doi":"10.1109/MCIT.2010.5444854","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444854","url":null,"abstract":"This paper proposes a radio resource management framework for integrated network selection mechanism control in multi- network environment as an interaction between the service providers and users in competitive manner to admit high priority users or the services that maximize their rewards. The proposed scheme comprises of three steps namely as user profile, service profile and access network selection. The priorities are assigned to the users depending on their grade and category. The users belonging to same categories have same preferences for the decision factors (or QoS parameters). Different policies are defined according to the network load to prioritize high priority users as compared to the type of service requested. The access network selection mechanism calculates the payoffs based on their relative weights calculated using AHP and a utility function evaluation by each wireless network for each user. The proposed model is preliminary and its contribution is to create an admission policy that can adapt to different coverage areas of a wireless network and depends on the priority of users and their requirements.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130064636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Secure management layer for JXTA-based information sharing systems 基于jxta的信息共享系统的安全管理层
Yasseen Al Makady, H. Janicke
Information is becoming more and more critical to our businesses, governance and social life. Social networking and increasingly pervasive communication technologies lead to a variety of technologies to control and facilitate the exchange of information, many of them based on peer-to-peer concepts. Security issues, such as confidentiality and integrity, arising from the rapid increase of the information exchange are often secondary and not sufficiently addressed by the available technologies. In this paper we will use JXTA, a technology that facilitates communication, resource sharing and distribution amongst peers, to build an information management layer that focuses on the efficient and secure exchange of information.
信息对我们的商业、治理和社会生活变得越来越重要。社会网络和日益普及的通信技术导致了各种各样的技术来控制和促进信息交换,其中许多是基于点对点的概念。由于信息交换的迅速增加而产生的保密性和完整性等安全问题往往是次要的,现有技术没有充分解决这些问题。在本文中,我们将使用JXTA(一种促进对等体之间的通信、资源共享和分发的技术)来构建一个信息管理层,该层侧重于有效和安全的信息交换。
{"title":"Secure management layer for JXTA-based information sharing systems","authors":"Yasseen Al Makady, H. Janicke","doi":"10.1109/MCIT.2010.5444862","DOIUrl":"https://doi.org/10.1109/MCIT.2010.5444862","url":null,"abstract":"Information is becoming more and more critical to our businesses, governance and social life. Social networking and increasingly pervasive communication technologies lead to a variety of technologies to control and facilitate the exchange of information, many of them based on peer-to-peer concepts. Security issues, such as confidentiality and integrity, arising from the rapid increase of the information exchange are often secondary and not sufficiently addressed by the available technologies. In this paper we will use JXTA, a technology that facilitates communication, resource sharing and distribution amongst peers, to build an information management layer that focuses on the efficient and secure exchange of information.","PeriodicalId":285648,"journal":{"name":"2010 International Conference on Multimedia Computing and Information Technology (MCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134508275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 International Conference on Multimedia Computing and Information Technology (MCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1