首页 > 最新文献

INFOCOMP Journal of Computer Science最新文献

英文 中文
Formalization of web security patterns web安全模式的形式化
Pub Date : 2015-06-01 DOI: 10.18760/IC.14120152
A. Dwivedi, S. K. Rath
Security issues in software industries become more and more challenging due to malicious attacks and as a result, it leads to exploration of various security holes in software system. In order to secure the information assets associated with any software system, organizations plan to design the system based on a number of security patterns, useful to build and test new security mechanisms. These patterns are nothing but certain design guidelines. But they have certain limitations in terms of consistency and usability. Hence, these security patterns may sometimes act as insecure. In this study, an attempt has been made to compose security patterns for the web-based application. Subsequently, a formal modeling approach for the composition of security patterns is presented. In order to maximize comprehensibility, Unified Modeling Language (UML) notations are used to represent structural and behavioral aspects of a web-based system. A formal modeling language i.e., Alloy has been taken into consideration for analyzing web-based security pattens. For the demonstration of this approach, a case study i.e., an online banking system is considered. A qualitative evaluation is performed for the identified security patterns against the critical security properties. In this study a model-driven framework is presented, which helps to automate the process of analyzing web security patterns.
由于恶意攻击的不断发生,软件行业的安全问题变得越来越具有挑战性,从而导致人们对软件系统中各种安全漏洞的探索。为了保护与任何软件系统相关的信息资产,组织计划基于许多安全模式来设计系统,这些模式对构建和测试新的安全机制很有用。这些模式只不过是特定的设计准则。但它们在一致性和可用性方面有一定的局限性。因此,这些安全模式有时可能表现得不安全。在本研究中,尝试为基于web的应用程序编写安全模式。在此基础上,提出了安全模式组合的形式化建模方法。为了最大限度地提高可理解性,使用统一建模语言(UML)符号来表示基于web的系统的结构和行为方面。在分析基于web的安全模式时,考虑了一种正式的建模语言,例如Alloy。为了演示这种方法,我们考虑了一个案例研究,即一个在线银行系统。针对关键安全属性,对已识别的安全模式执行定性评估。本研究提出了一个模型驱动的框架,该框架有助于web安全模式分析过程的自动化。
{"title":"Formalization of web security patterns","authors":"A. Dwivedi, S. K. Rath","doi":"10.18760/IC.14120152","DOIUrl":"https://doi.org/10.18760/IC.14120152","url":null,"abstract":"Security issues in software industries become more and more challenging due to malicious attacks and as a result, it leads to exploration of various security holes in software system. In order to secure the information assets associated with any software system, organizations plan to design the system based on a number of security patterns, useful to build and test new security mechanisms. These patterns are nothing but certain design guidelines. But they have certain limitations in terms of consistency and usability. Hence, these security patterns may sometimes act as insecure. In this study, an attempt has been made to compose security patterns for the web-based application. Subsequently, a formal modeling approach for the composition of security patterns is presented. In order to maximize comprehensibility, Unified Modeling Language (UML) notations are used to represent structural and behavioral aspects of a web-based system. A formal modeling language i.e., Alloy has been taken into consideration for analyzing web-based security pattens. For the demonstration of this approach, a case study i.e., an online banking system is considered. A qualitative evaluation is performed for the identified security patterns against the critical security properties. In this study a model-driven framework is presented, which helps to automate the process of analyzing web security patterns.","PeriodicalId":320111,"journal":{"name":"INFOCOMP Journal of Computer Science","volume":"460 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122969173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Priority driven Call Scheduling in Mobile Networks: A MOGA based approach 移动网络中优先级驱动的呼叫调度:基于MOGA的方法
Pub Date : 2015-06-01 DOI: 10.18760/IC.14120151
P. Thakurta, S. Sett
Enhanced mobile communication in current days demands a drastic evolution in resource  management strategies to meet the quality of service (QoS) requirements for the network. Call scheduling is such an important scheme for efficient utilization in spite of scarcity of resources. In this paper, a priority driven call scheduling technique is proposed for efficient routing in mobile networks. The proposed scheduler is addressed with two conflicting objectives: to minimize the mean routing cost, and to achieve uniformity in the overall system utilization. In this context, a Multi Objective Genetic algorithm (MOGA) based approach is introduced for finding an optimal route from several alternatives pertaining to the network constraints. This results in effective scheduling and simultaneous improvement in call acceptance for the system. The proposed model takes into account the significance of priority in a comprehensive manner. The performance of the proposed model is evaluated in network scenarios with different parameters and service requirements. In addition, results from simulation studies show the quality of approximation obtained by the proposed model.
为了满足网络对服务质量(QoS)的要求,增强的移动通信要求资源管理策略发生巨大变化。在资源稀缺的情况下,调用调度是一种有效利用资源的重要方案。本文提出了一种优先级驱动的呼叫调度技术,用于移动网络中的高效路由。提出的调度程序有两个相互冲突的目标:最小化平均路由成本,并在整个系统利用率中实现一致性。在此背景下,介绍了一种基于多目标遗传算法(MOGA)的方法,用于从与网络约束相关的多个备选路径中寻找最优路径。这导致了有效的调度,并同时提高了系统的呼叫接受度。建议的模型全面考虑了优先次序的重要性。在具有不同参数和业务需求的网络场景下,对该模型的性能进行了评估。此外,仿真结果表明了所提模型的逼近质量。
{"title":"Priority driven Call Scheduling in Mobile Networks: A MOGA based approach","authors":"P. Thakurta, S. Sett","doi":"10.18760/IC.14120151","DOIUrl":"https://doi.org/10.18760/IC.14120151","url":null,"abstract":"Enhanced mobile communication in current days demands a drastic evolution in resource  management strategies to meet the quality of service (QoS) requirements for the network. Call scheduling is such an important scheme for efficient utilization in spite of scarcity of resources. In this paper, a priority driven call scheduling technique is proposed for efficient routing in mobile networks. The proposed scheduler is addressed with two conflicting objectives: to minimize the mean routing cost, and to achieve uniformity in the overall system utilization. In this context, a Multi Objective Genetic algorithm (MOGA) based approach is introduced for finding an optimal route from several alternatives pertaining to the network constraints. This results in effective scheduling and simultaneous improvement in call acceptance for the system. The proposed model takes into account the significance of priority in a comprehensive manner. The performance of the proposed model is evaluated in network scenarios with different parameters and service requirements. In addition, results from simulation studies show the quality of approximation obtained by the proposed model.","PeriodicalId":320111,"journal":{"name":"INFOCOMP Journal of Computer Science","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122036240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematic Modeling and Performance Analysis of an Adaptive Congestion Control in Intelligent Transportation Systems 智能交通系统中自适应拥塞控制的数学建模与性能分析
Pub Date : 2015-06-01 DOI: 10.18760/IC.14120154
R. Naja
In this paper, we develop a preventive congestion control mechanism applied at highway entrances and devised for Intelligent Transportation Systems (ITS). The proposed mechanism provides a vehicular admission control, regulates input traffic and performs vehicular traffic shaping. Our congestion control mechanism includes two classes of vehicles and is based on a specific priority ticket pool scheme with queue-length threshold scheduling policy, tailored to vehicular networks. In an attempt to cope with vehicular traffic fluctuation, we integrate an adaptation ticket generation module. The enhanced mechanism is then able to detect road congestion and provide performance metrics to road site units at the highway entrance. Mathematical modeling based on the embedded Markov chain method highlights the benefits of the proposed scheme. Performance analysis demonstrates the mechanism capability to accurately characterize road traffic congestion conditions, shape vehicular traffic and reduce travel time.
在本文中,我们开发了一种应用于高速公路入口的预防性拥塞控制机制,并为智能交通系统(ITS)设计。所提出的机制提供车辆准入控制,调节输入交通并执行车辆交通整形。我们的拥塞控制机制包括两类车辆,并基于特定的优先票池方案和队列长度阈值调度策略,为车辆网络量身定制。为了应对车辆流量的波动,我们集成了一个自适应票据生成模块。然后,增强的机制能够检测道路拥堵,并向高速公路入口的道路现场单位提供性能指标。基于嵌入式马尔可夫链方法的数学建模突出了该方案的优点。性能分析表明,该机制能够准确表征道路交通拥堵状况,塑造车辆交通,减少出行时间。
{"title":"Mathematic Modeling and Performance Analysis of an Adaptive Congestion Control in Intelligent Transportation Systems","authors":"R. Naja","doi":"10.18760/IC.14120154","DOIUrl":"https://doi.org/10.18760/IC.14120154","url":null,"abstract":"In this paper, we develop a preventive congestion control mechanism applied at highway entrances and devised for Intelligent Transportation Systems (ITS). The proposed mechanism provides a vehicular admission control, regulates input traffic and performs vehicular traffic shaping. Our congestion control mechanism includes two classes of vehicles and is based on a specific priority ticket pool scheme with queue-length threshold scheduling policy, tailored to vehicular networks. In an attempt to cope with vehicular traffic fluctuation, we integrate an adaptation ticket generation module. The enhanced mechanism is then able to detect road congestion and provide performance metrics to road site units at the highway entrance. Mathematical modeling based on the embedded Markov chain method highlights the benefits of the proposed scheme. Performance analysis demonstrates the mechanism capability to accurately characterize road traffic congestion conditions, shape vehicular traffic and reduce travel time.","PeriodicalId":320111,"journal":{"name":"INFOCOMP Journal of Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130104829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Transmission of Medical Images by Single Label SWT and SVD based Non-Blind Watermarking Technique 基于单标签SWT和SVD的医学图像非盲水印安全传输
Pub Date : 2015-06-01 DOI: 10.18760/IC.14120155
Yatindra Pathak, Y. K. Jain, Satish Dehariya
Healthcare plays a most important part in human life today. Due to high quality of health-care, several dangerous diseases became curable now. But a major concerned problem with high quality healthcare is that it is not equally accessible throughout the world. The part of the problem is that the recipient and also the provider must be physically present within the same place. To overcome this problem information and communication technology has been used as a way by which healthcare can be delivered throughout the world. With the help of internet, medical professionals can be share medical reports and taking advice of experts before diagnosed that person. But use of internet also creates some issues such as security and safety of the medical data and protects their confidentiality, integrity and authenticity. Digital watermarking can be used as an important tool for the security and copyright protection of medical images. A new scheme for non-blind image watermarking is offered in this article that is robust against affine transformation and ordinary image manipulation. The suggested watermarking scheme based on Singular Value Decomposition(SVD) and Stationary Wavelet Transform(SWT). Once SWT is applied to both watermark and cover images, SVD is applied to the lower frequency LL subbands of both images. Now alter singular matrix (a diagonal matrix which contains singular values of image as its diagonal elements) of the cover image using singular matrix of the visual watermark. The proposed technique is robust against nearly all common attacks. Study and experimental results illustrate higher performance of the proposed method in comparison with the DWT method.
医疗保健在当今人类生活中扮演着最重要的角色。由于高质量的医疗保健,一些危险的疾病现在可以治愈了。但是,高质量医疗保健的一个主要问题是,它在世界各地并不是平等的。问题的一部分是,接收方和提供方必须实际出现在同一个地方。为了克服这一问题,信息和通信技术已被用作在世界各地提供医疗保健的一种方式。在互联网的帮助下,医疗专业人员可以分享医疗报告,并在诊断该人之前听取专家的建议。但互联网的使用也产生了一些问题,如医疗数据的安全性和安全性,保护他们的保密性,完整性和真实性。数字水印可以作为医学图像安全和版权保护的重要工具。提出了一种对仿射变换和普通图像处理具有鲁棒性的非盲图像水印方案。提出了基于奇异值分解和平稳小波变换的水印方案。将SWT分别应用于水印图像和覆盖图像后,再将SVD应用于两幅图像的低频LL子带。现在用视觉水印的奇异矩阵改变封面图像的奇异矩阵(以图像的奇异值作为其对角元素的对角矩阵)。所提出的技术对几乎所有常见的攻击都具有鲁棒性。研究和实验结果表明,该方法与小波变换方法相比具有更高的性能。
{"title":"A Secure Transmission of Medical Images by Single Label SWT and SVD based Non-Blind Watermarking Technique","authors":"Yatindra Pathak, Y. K. Jain, Satish Dehariya","doi":"10.18760/IC.14120155","DOIUrl":"https://doi.org/10.18760/IC.14120155","url":null,"abstract":"Healthcare plays a most important part in human life today. Due to high quality of health-care, several dangerous diseases became curable now. But a major concerned problem with high quality healthcare is that it is not equally accessible throughout the world. The part of the problem is that the recipient and also the provider must be physically present within the same place. To overcome this problem information and communication technology has been used as a way by which healthcare can be delivered throughout the world. With the help of internet, medical professionals can be share medical reports and taking advice of experts before diagnosed that person. But use of internet also creates some issues such as security and safety of the medical data and protects their confidentiality, integrity and authenticity. Digital watermarking can be used as an important tool for the security and copyright protection of medical images. A new scheme for non-blind image watermarking is offered in this article that is robust against affine transformation and ordinary image manipulation. The suggested watermarking scheme based on Singular Value Decomposition(SVD) and Stationary Wavelet Transform(SWT). Once SWT is applied to both watermark and cover images, SVD is applied to the lower frequency LL subbands of both images. Now alter singular matrix (a diagonal matrix which contains singular values of image as its diagonal elements) of the cover image using singular matrix of the visual watermark. The proposed technique is robust against nearly all common attacks. Study and experimental results illustrate higher performance of the proposed method in comparison with the DWT method.","PeriodicalId":320111,"journal":{"name":"INFOCOMP Journal of Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121188487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
INFOCOMP Journal of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1