首页 > 最新文献

2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

英文 中文
The Relation on Prefix Hijacking and the Internet Hierarchy 前缀劫持与网络层级的关系
Jinjing Zhao, Yan Wen, Xiang Li, Wei Peng, Feng Zhao
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation on prefix hijacking and the Internet hierarchy is presented in this paper. The Internet is classified into three hierarchies based on the power-law and commercial relations of autonomous systems. The relation of network topology and prefix hijacking influence is presented for all sorts of hijacking events in different layers. The result shows that the hierarchical nature of network influences the prefix hijacking greatly.
边界网关协议BGP (Border Gateway Protocol)是事实上的域间路由协议。在互联网上,BGP协议劫持IP前缀的事件时有发生。攻击可能会劫持受害者的地址空间,以破坏网络服务,或在不披露身份的情况下进行恶意活动,如垃圾邮件和DoS攻击。提出了前缀劫持与网络层次结构的关系。根据自治系统的幂律和商业关系,将互联网划分为三个层次。针对不同层次的各种劫持事件,给出了网络拓扑结构与前缀劫持影响的关系。结果表明,网络的层次性对前缀劫持的影响很大。
{"title":"The Relation on Prefix Hijacking and the Internet Hierarchy","authors":"Jinjing Zhao, Yan Wen, Xiang Li, Wei Peng, Feng Zhao","doi":"10.1109/IMIS.2012.40","DOIUrl":"https://doi.org/10.1109/IMIS.2012.40","url":null,"abstract":"Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation on prefix hijacking and the Internet hierarchy is presented in this paper. The Internet is classified into three hierarchies based on the power-law and commercial relations of autonomous systems. The relation of network topology and prefix hijacking influence is presented for all sorts of hijacking events in different layers. The result shows that the hierarchical nature of network influences the prefix hijacking greatly.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Secure Secondary Backup Storage with an Isolated Authentication 具有隔离身份验证的安全辅助备份存储
Kwangjin Bae, I. You, Kangbin Yim, Taeho Son
The primary backup disks store sensitive data such as privacy information and enterprise secrets. However, they are not encrypted usually because they are shared among multiple users in real time. Nevertheless, there is no concept of additional backing up the disks except the RAID support. This paper introduces a secure secondary backup system for the primary backup disks. The proposed system encrypts the scheduled files and backups them into the secondary backup disks. The encryption process uses the encryption key provided from hardware security modules that were directly plugged into the disks during the synchronization step in which the HSMs authenticate the disk owners and then unplugged. This architecture mechanically separates the HSM from the host, makes it immune to the reverse attack at the host side and keeps the disks safe from the insider's attack combined with a physical theft.
主备份磁盘存储敏感数据,如隐私信息、企业机密等。但是,它们通常不加密,因为它们在多个用户之间实时共享。然而,除了RAID支持之外,没有额外备份磁盘的概念。介绍了一种安全的主备份磁盘辅助备份系统。建议系统对计划文件进行加密,并将其备份到辅助备份磁盘中。加密过程使用硬件安全模块提供的加密密钥,这些加密密钥是在同步步骤中直接插入磁盘的,在同步步骤中,hsm对磁盘所有者进行身份验证,然后拔出。这种体系结构机械地将HSM与主机分离,使其免受主机端的反向攻击,并使磁盘免受内部人员的攻击和物理盗窃。
{"title":"A Secure Secondary Backup Storage with an Isolated Authentication","authors":"Kwangjin Bae, I. You, Kangbin Yim, Taeho Son","doi":"10.1109/IMIS.2012.195","DOIUrl":"https://doi.org/10.1109/IMIS.2012.195","url":null,"abstract":"The primary backup disks store sensitive data such as privacy information and enterprise secrets. However, they are not encrypted usually because they are shared among multiple users in real time. Nevertheless, there is no concept of additional backing up the disks except the RAID support. This paper introduces a secure secondary backup system for the primary backup disks. The proposed system encrypts the scheduled files and backups them into the secondary backup disks. The encryption process uses the encryption key provided from hardware security modules that were directly plugged into the disks during the synchronization step in which the HSMs authenticate the disk owners and then unplugged. This architecture mechanically separates the HSM from the host, makes it immune to the reverse attack at the host side and keeps the disks safe from the insider's attack combined with a physical theft.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ILSRO: Identifier/Location Split-Based Route Optimization for PMIPv6 ILSRO:基于标识符/位置分割的PMIPv6路由优化
Jianfeng Guan, Changqiao Xu, Kai Wang, Huachun Zhou, Hongke Zhang
As a network-based mobility management solution, Proxy Mobile IPv6 (PMIPv6) has been adopted by IETF, 3GPP and WiMAX to complement the host-based approach. In PMIPv6, the Local Mobility Anchor (LMA) is introduced to perform the mobility management and data forwarding, thus achieving the transparent mobility support. However, it results in the sub optimal routing path and single node failure. To realize the optimal routing and separate the forwarding function from the LMA, several routing optimization solutions have been proposed, but most of them are based on the MIPv6 built-in route optimization mechanism or MAGs tunnel, which incurs the additional overhead. In this paper, we propose a PMIPv6 route optimization solution based on the Identify/Location Split mechanism. Especially, in the proposed solution, a Location Identifier (LID) is assigned to each mobile node and mapped to its Home Network Prefix (HNP) to accomplish the optimal routing and reduce the additional tunnel overhead. The analytical results show that the proposed scheme is better than other schemes in terms of signaling cost, delivery cost and LMA service blocking probability.
作为一种基于网络的移动管理解决方案,代理移动IPv6 (PMIPv6)已被IETF、3GPP和WiMAX采用,以补充基于主机的方法。在PMIPv6中,引入了本地移动锚(Local Mobility Anchor, LMA)来进行移动管理和数据转发,从而实现透明的移动支持。然而,它会导致次优路由路径和单节点故障。为了实现最优路由并将转发功能从LMA中分离出来,已经提出了几种路由优化方案,但大多数都是基于MIPv6内置的路由优化机制或MAGs隧道,这带来了额外的开销。本文提出了一种基于身份/位置分割机制的PMIPv6路由优化方案。该方案为每个移动节点分配了位置标识符(LID),并将其映射到其Home Network Prefix (HNP),从而实现了最优路由,减少了额外的隧道开销。分析结果表明,该方案在信令成本、投递成本和LMA业务阻塞概率方面均优于其他方案。
{"title":"ILSRO: Identifier/Location Split-Based Route Optimization for PMIPv6","authors":"Jianfeng Guan, Changqiao Xu, Kai Wang, Huachun Zhou, Hongke Zhang","doi":"10.1109/IMIS.2012.65","DOIUrl":"https://doi.org/10.1109/IMIS.2012.65","url":null,"abstract":"As a network-based mobility management solution, Proxy Mobile IPv6 (PMIPv6) has been adopted by IETF, 3GPP and WiMAX to complement the host-based approach. In PMIPv6, the Local Mobility Anchor (LMA) is introduced to perform the mobility management and data forwarding, thus achieving the transparent mobility support. However, it results in the sub optimal routing path and single node failure. To realize the optimal routing and separate the forwarding function from the LMA, several routing optimization solutions have been proposed, but most of them are based on the MIPv6 built-in route optimization mechanism or MAGs tunnel, which incurs the additional overhead. In this paper, we propose a PMIPv6 route optimization solution based on the Identify/Location Split mechanism. Especially, in the proposed solution, a Location Identifier (LID) is assigned to each mobile node and mapped to its Home Network Prefix (HNP) to accomplish the optimal routing and reduce the additional tunnel overhead. The analytical results show that the proposed scheme is better than other schemes in terms of signaling cost, delivery cost and LMA service blocking probability.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115274696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Service and Management for Security-Critical Wireless Sensor Network 安全关键型无线传感器网络的安全服务与管理
Qiang Liu, Li Liu, Xiaohui Kuang, Yan Wen
For Security-Critical Wireless Sensor Network (SCWSN), security should be given priority in design. In this paper, we analyze the essential security demands for security-critical WSN. Then, we propose our integrated approaches, which are built based on security service and management, to achieve security for security-critical WSN. Finally, we describe how our security solution works against typical attacks. There are four advantage characters to provide against attacks in the SCWSN we designed: feather-weight public key and share key combined key pre-distribution scheme, hop by hop packet signature and encryption in the route path, remote management of nodes and network route, data confidence analysis.
对于安全关键型无线传感器网络(SCWSN),在设计时应优先考虑安全性。本文分析了安全关键型无线传感器网络的基本安全需求。在此基础上,提出了基于安全服务和安全管理的集成方案,以实现对安全至关重要的无线传感器网络的安全。最后,我们将描述我们的安全解决方案如何应对典型的攻击。所设计的SCWSN具有四个优点:羽毛级公钥和共享密钥组合密钥预分发方案、路由路径中逐跳数据包签名和加密、节点和网络路由远程管理、数据置信度分析。
{"title":"Secure Service and Management for Security-Critical Wireless Sensor Network","authors":"Qiang Liu, Li Liu, Xiaohui Kuang, Yan Wen","doi":"10.1109/IMIS.2012.94","DOIUrl":"https://doi.org/10.1109/IMIS.2012.94","url":null,"abstract":"For Security-Critical Wireless Sensor Network (SCWSN), security should be given priority in design. In this paper, we analyze the essential security demands for security-critical WSN. Then, we propose our integrated approaches, which are built based on security service and management, to achieve security for security-critical WSN. Finally, we describe how our security solution works against typical attacks. There are four advantage characters to provide against attacks in the SCWSN we designed: feather-weight public key and share key combined key pre-distribution scheme, hop by hop packet signature and encryption in the route path, remote management of nodes and network route, data confidence analysis.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a Context-Aware and Adaptable Room System for Intelligent "Trusted" Office-Spaces in Smart Cities 面向智慧城市中智能“可信”办公空间的环境感知和适应性房间系统
Timothy French, N. Bessis
This visionary paper outlines a future intelligent building office space room system that seeks to ensure that the users of a rent able and/or shared office space do not perform actions that are likely to compromise IT security. We propose that a novel room agent leverages the emergent"smart" city paradigm so as to form an accurate a measure as possible of the trustworthiness of the human agents using the office space. Namely, by leveraging pervasive urban sensors embedded in a smart city built environment, data obtained by crowd sourcing as well as data gathered via Web 2.0. Human actions detected within the room itself and its immediate environs, together with the behavioural traces and patterns of a given individual embedded within a smart city context, can be used to calculate a measurable confidence trust level. We suggest that the use of a Linking Open (or object) Data (LOD) publishing approach can be used to integrate trust related distributed data in a collective and intelligent manner. Furthermore, we suggest the use of cloud diagram and tree map visualisation approaches to depict individual and environs trust levels at both coarse and fine grain levels. To achieve this, we illustrate the approach using a low-level architecture model. We then conclude by outlining our theoretical lightweight trust model which aims to demonstrate how a smart city in general and a smart space in particular can provide an increased level of trust visualisation for it's citizens, through collective intelligence gathering.
这篇有远见的论文概述了未来的智能建筑办公空间房间系统,旨在确保可出租和/或共享办公空间的用户不会执行可能危及IT安全的操作。我们提出一种新型的房间代理利用新兴的“智慧”城市范式,以形成一个尽可能准确的衡量使用办公空间的人类代理的可信度。也就是说,通过利用嵌入在智慧城市建筑环境中的无处不在的城市传感器,通过众包获得的数据以及通过Web 2.0收集的数据。在房间内及其周围环境中检测到的人类行为,以及嵌入在智能城市环境中的特定个体的行为痕迹和模式,可用于计算可测量的信心信任水平。我们建议使用链接开放(或对象)数据(LOD)发布方法,以集体和智能的方式集成与信任相关的分布式数据。此外,我们建议使用云图和树图可视化方法来描述粗粒度和细粒度级别的个人和环境信任水平。为了实现这一点,我们使用一个低级体系结构模型来说明这种方法。最后,我们概述了我们的理论轻量级信任模型,该模型旨在展示智慧城市,特别是智能空间如何通过集体情报收集为其公民提供更高水平的信任可视化。
{"title":"Towards a Context-Aware and Adaptable Room System for Intelligent \"Trusted\" Office-Spaces in Smart Cities","authors":"Timothy French, N. Bessis","doi":"10.1109/IMIS.2012.62","DOIUrl":"https://doi.org/10.1109/IMIS.2012.62","url":null,"abstract":"This visionary paper outlines a future intelligent building office space room system that seeks to ensure that the users of a rent able and/or shared office space do not perform actions that are likely to compromise IT security. We propose that a novel room agent leverages the emergent\"smart\" city paradigm so as to form an accurate a measure as possible of the trustworthiness of the human agents using the office space. Namely, by leveraging pervasive urban sensors embedded in a smart city built environment, data obtained by crowd sourcing as well as data gathered via Web 2.0. Human actions detected within the room itself and its immediate environs, together with the behavioural traces and patterns of a given individual embedded within a smart city context, can be used to calculate a measurable confidence trust level. We suggest that the use of a Linking Open (or object) Data (LOD) publishing approach can be used to integrate trust related distributed data in a collective and intelligent manner. Furthermore, we suggest the use of cloud diagram and tree map visualisation approaches to depict individual and environs trust levels at both coarse and fine grain levels. To achieve this, we illustrate the approach using a low-level architecture model. We then conclude by outlining our theoretical lightweight trust model which aims to demonstrate how a smart city in general and a smart space in particular can provide an increased level of trust visualisation for it's citizens, through collective intelligence gathering.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129399341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Heterogeneous Sensors Become Homogeneous Things in Smart Cities 在智慧城市中,异构传感器变成同质物
M. Fazio, M. Paone, A. Puliafito, M. Villari
Smart Cities offer a new approach for optimizing services, reducing costs, simplifying the management of Future Cities, enabling new services for citizens. In the Future Internet initiatives, Sensors Networks assume even more a crucial role, especially for making smarter cities. Sensors, becoming smart, will represent the peripheral elements of a complex future ICT world. However, due to the specific application field, smart sensors are very heterogeneous in terms of communication technologies, sensing features and elaboration capabilities. To overcome issues due to the high heterogeneity in this paper we present a new architecture able to make a dual abstraction of complex sensing infrastructures along with data they collect. An important key of this work is to provide a service at world wide level, that is scalable and flexible. The architecture implementation is based on Sensor Web Enablement standard specifications and makes use of the Contiki Operating System for accomplishing the Internet of Things.
智慧城市提供了一种优化服务、降低成本、简化未来城市管理、为市民提供新服务的新方法。在未来的互联网计划中,传感器网络将扮演更重要的角色,尤其是在打造更智能的城市方面。智能传感器将成为未来复杂ICT世界的外围元素。然而,由于特定的应用领域,智能传感器在通信技术、传感特性和细化能力等方面存在很大的差异性。为了克服由于高异构性而导致的问题,本文提出了一种新的架构,能够对复杂的传感基础设施及其收集的数据进行双重抽象。这项工作的一个重要关键是在全球范围内提供可扩展和灵活的服务。该体系结构实现基于传感器Web使能标准规范,并利用Contiki操作系统实现物联网。
{"title":"Heterogeneous Sensors Become Homogeneous Things in Smart Cities","authors":"M. Fazio, M. Paone, A. Puliafito, M. Villari","doi":"10.1109/IMIS.2012.136","DOIUrl":"https://doi.org/10.1109/IMIS.2012.136","url":null,"abstract":"Smart Cities offer a new approach for optimizing services, reducing costs, simplifying the management of Future Cities, enabling new services for citizens. In the Future Internet initiatives, Sensors Networks assume even more a crucial role, especially for making smarter cities. Sensors, becoming smart, will represent the peripheral elements of a complex future ICT world. However, due to the specific application field, smart sensors are very heterogeneous in terms of communication technologies, sensing features and elaboration capabilities. To overcome issues due to the high heterogeneity in this paper we present a new architecture able to make a dual abstraction of complex sensing infrastructures along with data they collect. An important key of this work is to provide a service at world wide level, that is scalable and flexible. The architecture implementation is based on Sensor Web Enablement standard specifications and makes use of the Contiki Operating System for accomplishing the Internet of Things.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128391086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Botnet Topology Reconstruction: A Case Study 僵尸网络拓扑重建:一个案例研究
Ming-Yi Liao, Jynu-Hao Li, Chu-Sing Yang, Min Chen, Chun-Wei Tsai, Ming-Cho Chang
Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the bot net and the infection period can be observed and analyzed so that better defense tools can be built.
在过去的十年里,僵尸网络对互联网构成了严重的威胁,因为它可以被用来对互联网发动各种攻击。为了防止僵尸网络的攻击,我们必须充分了解僵尸网络的感染路径和攻击方法。因此,本研究旨在重建僵尸网络在Testbed@TWISC平台上进行攻击的场景,从而观察和分析僵尸网络的行为和感染周期,从而构建更好的防御工具。
{"title":"Botnet Topology Reconstruction: A Case Study","authors":"Ming-Yi Liao, Jynu-Hao Li, Chu-Sing Yang, Min Chen, Chun-Wei Tsai, Ming-Cho Chang","doi":"10.1109/IMIS.2012.114","DOIUrl":"https://doi.org/10.1109/IMIS.2012.114","url":null,"abstract":"Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the bot net and the infection period can be observed and analyzed so that better defense tools can be built.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124994179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Proposal to Realize the Provision of Secure Android Applications -- ADMS: An Application Development and Management System 一种实现提供安全Android应用程序的方案——ADMS:一个应用程序开发与管理系统
Harunobu Agematsu, Junya Kani, Kohei Nasaka, Hideaki Kawabata, T. Isohara, K. Takemori, M. Nishigaki
To realize the provision of secure Android applications, this paper proposes an application development and management system, or ADMS for short, that is operated and maintained by application developers and the market manager. ADMS requires (i) Android OS to be equipped with a "security manager", (ii) all application developers to embed a code for event notification into applications to tell every event to the security manager whenever an application launches a security-related event, and (iii) market manager to remove all such applications that don't include the event notification code.
为了实现安全的Android应用程序的提供,本文提出了一个由应用程序开发人员和市场管理者共同操作和维护的应用程序开发和管理系统(简称ADMS)。ADMS要求(i) Android操作系统配备“安全管理器”,(ii)所有应用程序开发人员在应用程序中嵌入事件通知代码,以便在应用程序启动与安全相关的事件时将每个事件通知给安全管理器,(iii)市场管理器删除所有不包含事件通知代码的此类应用程序。
{"title":"A Proposal to Realize the Provision of Secure Android Applications -- ADMS: An Application Development and Management System","authors":"Harunobu Agematsu, Junya Kani, Kohei Nasaka, Hideaki Kawabata, T. Isohara, K. Takemori, M. Nishigaki","doi":"10.1109/IMIS.2012.143","DOIUrl":"https://doi.org/10.1109/IMIS.2012.143","url":null,"abstract":"To realize the provision of secure Android applications, this paper proposes an application development and management system, or ADMS for short, that is operated and maintained by application developers and the market manager. ADMS requires (i) Android OS to be equipped with a \"security manager\", (ii) all application developers to embed a code for event notification into applications to tell every event to the security manager whenever an application launches a security-related event, and (iii) market manager to remove all such applications that don't include the event notification code.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Privacy-Preserving Collaborative Filtering Using Randomized Response 基于随机响应的隐私保护协同过滤
H. Kikuchi, Anna Mochizuki
This paper proposes a new privacy-preserving recommendation method classified into a randomized perturbation scheme in which a user adds random noise to the original rating value and a server provides a disguised data to allow users to predict rating value for unseen items. The proposed scheme performs perturbation in randomized response scheme, which preserves higher degree of privacy than that of additive perturbation. To address the accuracy reduction of the randomized response, the proposed scheme uses a posterior probability distribution function, derived from Bayes' estimation to reconstruction of the original distribution, to revise the similarity between items computed from the disguised matrix. A simple experiment shows the accuracy improvement of the proposed scheme.
本文提出了一种新的隐私保护推荐方法,将其分类为随机扰动方案,其中用户在原始评分值中加入随机噪声,服务器提供伪装数据,允许用户预测未见项目的评分值。该方案在随机响应方案中进行摄动,比加性摄动保留了更高的隐私度。为了解决随机响应精度降低的问题,该方案使用由贝叶斯估计得到的后验概率分布函数来重建原始分布,以修正由伪装矩阵计算的项目之间的相似度。一个简单的实验表明,该方案提高了精度。
{"title":"Privacy-Preserving Collaborative Filtering Using Randomized Response","authors":"H. Kikuchi, Anna Mochizuki","doi":"10.1109/IMIS.2012.141","DOIUrl":"https://doi.org/10.1109/IMIS.2012.141","url":null,"abstract":"This paper proposes a new privacy-preserving recommendation method classified into a randomized perturbation scheme in which a user adds random noise to the original rating value and a server provides a disguised data to allow users to predict rating value for unseen items. The proposed scheme performs perturbation in randomized response scheme, which preserves higher degree of privacy than that of additive perturbation. To address the accuracy reduction of the randomized response, the proposed scheme uses a posterior probability distribution function, derived from Bayes' estimation to reconstruction of the original distribution, to revise the similarity between items computed from the disguised matrix. A simple experiment shows the accuracy improvement of the proposed scheme.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Collaborative Decision-Making Framework for Supporting Multi-mobile Decision-Makers Using Ontology 基于本体支持多移动决策者的协同决策框架
Hyun Jung Lee, Mye M. Sohn
We propose a framework to support collaborative decision-making among multi-mobile users. This framework is comprised of an Agent's Case-based Reasoning, Integrated Ontology Generation and a Value Unification Module. The case-based reasoning module used to semantic similarity calculation and is applied to the extraction of the most similar case from each decision maker's case-base. Each the most similar case can be an alternative solution for the new requirement which makes the collaborative decision among the decision-makers. The number of alternative solutions depends on the number of the collaborative decision-makers. Each extracted case is mapped on a personalized personal ontology by projecting each of the cases onto the meta-ontology for deriving an appropriate solution for the new requirement. The personal ontology consists of the classes and/or instances and their relationships that are common in all the personalized personal ontologies. It is named an integrated ontology. As the next step, to find a collaboratively satisfactory solution, we need to determine the degree of unification of classes or instances on the integrated ontology. The weight of unification means the extent to which the classes and/or instances are shared among the decision-makers. The propagation of unification is performed by the value that has maximum weight of unification using the integrated ontology. The unification is executed recursively until it reaches a collaborative decision. To do so, we propose the ontology-based value unification algorithm. However, if we cannot find the solution after the unification is finished, the real-time interactive negotiation algorithm that is newly proposed by us is applied.
我们提出了一个框架来支持多移动用户之间的协作决策。该框架由智能体基于案例的推理、集成本体生成和价值统一模块组成。基于案例的推理模块用于语义相似度计算,用于从每个决策者的案例库中提取最相似的案例。每个最相似的情况都可以作为新需求的备选解决方案,从而使决策者之间进行协作决策。备选解决方案的数量取决于协作决策者的数量。每个提取的案例都映射到个性化的个人本体上,方法是将每个案例投影到元本体上,以便为新需求导出适当的解决方案。个人本体由所有个性化个人本体中常见的类和/或实例及其关系组成。它被命名为集成本体。下一步,为了找到一个令人满意的协作解决方案,我们需要确定集成本体上的类或实例的统一程度。统一的权重意味着类和/或实例在决策者之间共享的程度。使用集成本体,通过统一权值最大的值进行统一传播。统一将递归地执行,直到达成协作决策。为此,我们提出了基于本体的值统一算法。但是,如果在统一完成后无法找到解,则采用我们新提出的实时交互协商算法。
{"title":"Collaborative Decision-Making Framework for Supporting Multi-mobile Decision-Makers Using Ontology","authors":"Hyun Jung Lee, Mye M. Sohn","doi":"10.1109/IMIS.2012.189","DOIUrl":"https://doi.org/10.1109/IMIS.2012.189","url":null,"abstract":"We propose a framework to support collaborative decision-making among multi-mobile users. This framework is comprised of an Agent's Case-based Reasoning, Integrated Ontology Generation and a Value Unification Module. The case-based reasoning module used to semantic similarity calculation and is applied to the extraction of the most similar case from each decision maker's case-base. Each the most similar case can be an alternative solution for the new requirement which makes the collaborative decision among the decision-makers. The number of alternative solutions depends on the number of the collaborative decision-makers. Each extracted case is mapped on a personalized personal ontology by projecting each of the cases onto the meta-ontology for deriving an appropriate solution for the new requirement. The personal ontology consists of the classes and/or instances and their relationships that are common in all the personalized personal ontologies. It is named an integrated ontology. As the next step, to find a collaboratively satisfactory solution, we need to determine the degree of unification of classes or instances on the integrated ontology. The weight of unification means the extent to which the classes and/or instances are shared among the decision-makers. The propagation of unification is performed by the value that has maximum weight of unification using the integrated ontology. The unification is executed recursively until it reaches a collaborative decision. To do so, we propose the ontology-based value unification algorithm. However, if we cannot find the solution after the unification is finished, the real-time interactive negotiation algorithm that is newly proposed by us is applied.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1