首页 > 最新文献

Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)最新文献

英文 中文
Retrofitting Cyber Physical Systems for Survivability through External Coordination 通过外部协调改进网络物理系统的生存能力
Kun Xiao, Shangping Ren, K. Kwiat
Most supervisory control and data acquisition (SCADA) systems have been in operation for decades and they in general have 24times7 availability requirement, hence upgrading or adding new fault tolerant logic into the systems to sustain faults caused by cyber attacks when these systems evolve into a cyber environment is often difficult to achieve. In the proposed approach, an external coordination layer is constructed that only interfaces with the SCADA systems through events and separate from the process under control. The coordination layer is a combination of transparent management of fault-tolerant schemes of critical services of a SCADA system and a model for coordinating different critical services when faults caused by cyber attack occur in that system. In addition, security-related knowledge, such as cyber attack patterns and potential fatal states, etc., are also modeled and built into the coordination layer. The advantages of our approach are twofold: (1) the survivability-related knowledge and protection scheme are built in the coordination layer which is external to the SCADA systems and therefore the disturbance to the underlying systems is greatly reduced; (2) "separation of concern" principle is truly reflected in our model in that fault- tolerance, security and survivability concerns are separated from supervisory and acquisition. In addition, the external coordination model will enable us to accommodate future requirements that may not even be anticipated today.
大多数监控和数据采集(SCADA)系统已经运行了几十年,它们通常具有24times7的可用性要求,因此,当这些系统演变为网络环境时,升级或添加新的容错逻辑到系统中以维持由网络攻击引起的故障通常很难实现。在该方法中,构建了一个外部协调层,该协调层仅通过事件与SCADA系统接口,并与被控制的过程分离。协调层是SCADA系统关键服务容错方案的透明管理和系统发生网络攻击导致故障时协调不同关键服务的模型的结合。此外,与安全相关的知识,如网络攻击模式和潜在致命状态等,也被建模并内置于协调层中。该方法具有两方面的优势:(1)将生存能力相关的知识和保护方案建立在SCADA系统外部的协调层,从而大大减少了对底层系统的干扰;(2) “关注点分离”原则在我们的模型中得到了真正的体现,即容错性、安全性和生存性关注点与监管和收购分离。此外,外部协调模型将使我们能够适应今天甚至没有预料到的未来需求。
{"title":"Retrofitting Cyber Physical Systems for Survivability through External Coordination","authors":"Kun Xiao, Shangping Ren, K. Kwiat","doi":"10.1109/HICSS.2008.377","DOIUrl":"https://doi.org/10.1109/HICSS.2008.377","url":null,"abstract":"Most supervisory control and data acquisition (SCADA) systems have been in operation for decades and they in general have 24times7 availability requirement, hence upgrading or adding new fault tolerant logic into the systems to sustain faults caused by cyber attacks when these systems evolve into a cyber environment is often difficult to achieve. In the proposed approach, an external coordination layer is constructed that only interfaces with the SCADA systems through events and separate from the process under control. The coordination layer is a combination of transparent management of fault-tolerant schemes of critical services of a SCADA system and a model for coordinating different critical services when faults caused by cyber attack occur in that system. In addition, security-related knowledge, such as cyber attack patterns and potential fatal states, etc., are also modeled and built into the coordination layer. The advantages of our approach are twofold: (1) the survivability-related knowledge and protection scheme are built in the coordination layer which is external to the SCADA systems and therefore the disturbance to the underlying systems is greatly reduced; (2) \"separation of concern\" principle is truly reflected in our model in that fault- tolerance, security and survivability concerns are separated from supervisory and acquisition. In addition, the external coordination model will enable us to accommodate future requirements that may not even be anticipated today.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115759180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Smarter Blogroll: An Exploration of Social Topic Extraction for Manageable Blogrolls 更聪明的Blogroll:对可管理的Blogroll的社会主题提取的探索
E. Baumer, Danyel Fisher
The already huge number of blogs in existence is increasing rapidly, and many users are struggling to find a way to keep up with the expansion. A number of existing tools aim to capture the general topics of all currently popular topics among the entire blogosphere, while others allow individuals to read a fixed list of blogs. However, few personalized tools exist to help the individual get an overview of the specific blogs he or she reads. This paper presents the concept of social topic extraction via the Smarter Blogroll, which displays current topics for a selection of blogs. While there was little difference in users' ability to identify topics using the smarter blogroll, the results of our user study point to design recommendations for improving the use of metadata within blogroll entries, thereby facilitating blog reading. The paper concludes with implications for the design of tools to aid in blog navigation and reading, as well as recommended directions for future research.
已经存在的大量博客正在迅速增加,许多用户正在努力寻找一种方法来跟上扩张的步伐。许多现有工具旨在捕获整个博客圈中所有当前流行主题的一般主题,而其他工具则允许个人阅读固定的博客列表。然而,很少有个性化的工具可以帮助个人获得他或她所阅读的特定博客的概览。本文提出了通过Smarter Blogroll进行社会主题提取的概念,该工具可以显示选定博客的当前主题。虽然使用更智能的blogroll用户识别主题的能力差别不大,但我们的用户研究结果指出,设计建议可以改进blogroll条目中元数据的使用,从而促进博客阅读。本文最后对博客导航和阅读工具的设计提出了建议,并对未来的研究方向提出了建议。
{"title":"Smarter Blogroll: An Exploration of Social Topic Extraction for Manageable Blogrolls","authors":"E. Baumer, Danyel Fisher","doi":"10.1109/HICSS.2008.398","DOIUrl":"https://doi.org/10.1109/HICSS.2008.398","url":null,"abstract":"The already huge number of blogs in existence is increasing rapidly, and many users are struggling to find a way to keep up with the expansion. A number of existing tools aim to capture the general topics of all currently popular topics among the entire blogosphere, while others allow individuals to read a fixed list of blogs. However, few personalized tools exist to help the individual get an overview of the specific blogs he or she reads. This paper presents the concept of social topic extraction via the Smarter Blogroll, which displays current topics for a selection of blogs. While there was little difference in users' ability to identify topics using the smarter blogroll, the results of our user study point to design recommendations for improving the use of metadata within blogroll entries, thereby facilitating blog reading. The paper concludes with implications for the design of tools to aid in blog navigation and reading, as well as recommended directions for future research.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122131000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cross-Language Information Retrieval by Domain Restriction Using Web Directory Structure 基于Web目录结构的域限制跨语言信息检索
Fuminori Kimura, Akira Maeda, K. Hatano, Jun Miyazaki, Shunsuke Uemura
In this paper, we propose a cross-language information retrieval (CLIR) method based on estimating for domains of the query using hierarchic structures of Web directories. To get the most appropriate translation of the queries, we utilize the Web directories written in many different languages as multilingual corpus for disambiguating translation of the query and for estimating the domain of search results using hierarchic structures of Web directories. From experimental evaluations, we found that there is an advantage in retrieval accuracy using our proposal for disambiguating translation in CLIR system. We found that it is effective to restrict to target fields of the query using lower level merged categories in order to acquire suited translation of the query.
本文提出了一种基于Web目录层次结构查询域估计的跨语言信息检索(CLIR)方法。为了获得最合适的查询翻译,我们利用用多种不同语言编写的Web目录作为多语言语料库,用于消除查询翻译的歧义,并使用Web目录的层次结构估计搜索结果的域。通过实验评估,我们发现我们提出的消歧翻译在CLIR系统中具有检索精度上的优势。我们发现,为了获得合适的查询翻译,使用较低级别的合并类别来限制查询的目标字段是有效的。
{"title":"Cross-Language Information Retrieval by Domain Restriction Using Web Directory Structure","authors":"Fuminori Kimura, Akira Maeda, K. Hatano, Jun Miyazaki, Shunsuke Uemura","doi":"10.1109/HICSS.2008.108","DOIUrl":"https://doi.org/10.1109/HICSS.2008.108","url":null,"abstract":"In this paper, we propose a cross-language information retrieval (CLIR) method based on estimating for domains of the query using hierarchic structures of Web directories. To get the most appropriate translation of the queries, we utilize the Web directories written in many different languages as multilingual corpus for disambiguating translation of the query and for estimating the domain of search results using hierarchic structures of Web directories. From experimental evaluations, we found that there is an advantage in retrieval accuracy using our proposal for disambiguating translation in CLIR system. We found that it is effective to restrict to target fields of the query using lower level merged categories in order to acquire suited translation of the query.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"610 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
KMS Quality Impact on Competitive Advantage KMS质量对竞争优势的影响
Belbaly Nassim
This article demonstrates the way in which knowledge management system (KMS) quality influences effective competitive advantage through decision making and through organizational learning. The results indicate strong support for the research model consisting of the independent variable (KMS quality) and the dependent variables (decision making, organization learning capability and competitive advantage). The model explains respectively 45% of the decision making, 41% of the organization learning capability and 78% of the competitive advantage variance. It concludes that KMS quality plays an important role in sustaining competitive advantage. In light of these findings, implications for theory and practice are discussed.
本文论证了知识管理系统(KMS)质量如何通过决策和组织学习影响有效的竞争优势。结果表明,由自变量(知识管理系统质量)和因变量(决策、组织学习能力和竞争优势)组成的研究模型得到了强有力的支持。该模型分别解释了45%的决策、41%的组织学习能力和78%的竞争优势方差。结果表明,知识管理体系质量对企业保持竞争优势具有重要作用。根据这些发现,对理论和实践的影响进行了讨论。
{"title":"KMS Quality Impact on Competitive Advantage","authors":"Belbaly Nassim","doi":"10.1109/HICSS.2008.225","DOIUrl":"https://doi.org/10.1109/HICSS.2008.225","url":null,"abstract":"This article demonstrates the way in which knowledge management system (KMS) quality influences effective competitive advantage through decision making and through organizational learning. The results indicate strong support for the research model consisting of the independent variable (KMS quality) and the dependent variables (decision making, organization learning capability and competitive advantage). The model explains respectively 45% of the decision making, 41% of the organization learning capability and 78% of the competitive advantage variance. It concludes that KMS quality plays an important role in sustaining competitive advantage. In light of these findings, implications for theory and practice are discussed.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133351575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
What, Who and Where: Insights into Personalization 什么,谁,在哪里:洞察个性化
Anne Sunikka, J. Bragge
Personalization is a phenomenon that intrigues and confuses. Personalized offerings promise customer attention, loyalty and safe haven against commoditization. However, these promises do not materialize unless customers accept personalization as a means to enhance their consuming experience. Three points of views are offered to personalization in this paper. An analysis of various personalization concepts shows that the basic concept of personalization is reaching maturity even though fresh views are added to it, e.g. context-based personalization. Secondly, a text-mining based approach profiles the personalization research based on bibliometric data on nearly 800 articles, and indicates that the research field is fairly fragmented, and that mass customization and customization research clearly diverges from personalization research. Based on a selection of articles, a further analysis classifies the type of research and research contexts that are the most common. Finally, this research also suggests a conceptualization of personalization.
个性化是一种既有趣又令人困惑的现象。个性化的产品保证了客户的关注、忠诚和远离商品化的避风港。然而,除非客户接受个性化作为提高消费体验的一种手段,否则这些承诺不会实现。本文对个性化提出了三点观点。对各种个性化概念的分析表明,个性化的基本概念正在走向成熟,尽管有新的观点加入其中,例如基于上下文的个性化。其次,基于文本挖掘的方法分析了基于近800篇文献计量数据的个性化研究,发现研究领域相当碎片化,大规模定制和定制研究明显偏离个性化研究;根据文章的选择,进一步的分析分类的研究类型和研究背景是最常见的。最后,本研究还提出了个性化的概念化。
{"title":"What, Who and Where: Insights into Personalization","authors":"Anne Sunikka, J. Bragge","doi":"10.1109/HICSS.2008.500","DOIUrl":"https://doi.org/10.1109/HICSS.2008.500","url":null,"abstract":"Personalization is a phenomenon that intrigues and confuses. Personalized offerings promise customer attention, loyalty and safe haven against commoditization. However, these promises do not materialize unless customers accept personalization as a means to enhance their consuming experience. Three points of views are offered to personalization in this paper. An analysis of various personalization concepts shows that the basic concept of personalization is reaching maturity even though fresh views are added to it, e.g. context-based personalization. Secondly, a text-mining based approach profiles the personalization research based on bibliometric data on nearly 800 articles, and indicates that the research field is fairly fragmented, and that mass customization and customization research clearly diverges from personalization research. Based on a selection of articles, a further analysis classifies the type of research and research contexts that are the most common. Finally, this research also suggests a conceptualization of personalization.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121312782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
The Impact of Directionality in Predications on Text Mining 预测中方向性对文本挖掘的影响
G. Leroy, M. Fiszman, T. Rindflesch
The number of publications in biomedicine is increasing enormously each year. To help researchers digest the information in these documents, text mining tools are being developed that present co-occurrence relations between concepts. Statistical measures are used to mine interesting subsets of relations. We demonstrate how directionality of these relations affects interestingness. Support and confidence, simple data mining statistics, are used as proxies for interestingness metrics. We first built a test bed of 126,404 directional relations extracted from biomedical abstracts, which we represent as graphs containing a central starting concept and 2 rings of associated relations. We manipulated directionality in four ways and randomly selected 100 starting concepts as a test sample for each graph type. Finally, we calculated the number of relations and their support and confidence. Variation in directionality significantly affected the number of relations as well as the support and confidence of the four graph types.
生物医学方面的出版物数量每年都在急剧增加。为了帮助研究人员消化这些文档中的信息,正在开发文本挖掘工具来呈现概念之间的共现关系。统计度量用于挖掘关系的有趣子集。我们展示了这些关系的方向性如何影响趣味性。支持度和置信度(简单的数据挖掘统计)被用作兴趣度量的代理。我们首先从生物医学摘要中提取了126404个方向关系,建立了一个测试平台,我们将其表示为包含一个中心起始概念和2个关联关系环的图。我们以四种方式操纵方向性,并随机选择100个初始概念作为每种图类型的测试样本。最后,我们计算了关系的数量及其支持度和置信度。方向性的变化显著影响关系的数量以及四种图类型的支持度和置信度。
{"title":"The Impact of Directionality in Predications on Text Mining","authors":"G. Leroy, M. Fiszman, T. Rindflesch","doi":"10.1109/hicss.2008.443","DOIUrl":"https://doi.org/10.1109/hicss.2008.443","url":null,"abstract":"The number of publications in biomedicine is increasing enormously each year. To help researchers digest the information in these documents, text mining tools are being developed that present co-occurrence relations between concepts. Statistical measures are used to mine interesting subsets of relations. We demonstrate how directionality of these relations affects interestingness. Support and confidence, simple data mining statistics, are used as proxies for interestingness metrics. We first built a test bed of 126,404 directional relations extracted from biomedical abstracts, which we represent as graphs containing a central starting concept and 2 rings of associated relations. We manipulated directionality in four ways and randomly selected 100 starting concepts as a test sample for each graph type. Finally, we calculated the number of relations and their support and confidence. Variation in directionality significantly affected the number of relations as well as the support and confidence of the four graph types.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Service Oriented Architecture: Challenges for Business and Academia 面向服务的体系结构:商业和学术界面临的挑战
Amelia Maurizio, James Sager, Peter Jones, G. Corbitt, L. Girolami
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways to collaborate with industry partners to provide products and services to markets that are otherwise uneconomical to pursue. Current IT challenges center on ways to integrate diverse systems into function rich business processes that span organizational boundaries. Though service oriented architecture (SOA) is poised to become a mainstream technology, its success may hinge on a meeting of the minds between the architects and developers of Web services and business process modelers who map out corporate requirements. This paper defines SOA, discusses how SOA relates to business process management, and provides an illustration of enterprise SOA applied in an enterprise resource planning (ERP) environment. The paper also describes how SOA motivates change in IT governance, enumerates the fundamentals of SOA success, and reflects on implications for IT education.
今天,通过信息技术(IT)获得竞争优势的手段已经从有效地管理组织的运营转变为发现与行业伙伴合作的方法,以向市场提供产品和服务,否则将不经济地追求。当前的IT挑战集中在如何将不同的系统集成到跨越组织边界的功能丰富的业务流程中。尽管面向服务的体系结构(SOA)即将成为一种主流技术,但它的成功可能取决于Web服务的架构师和开发人员以及规划公司需求的业务流程建模师之间的思想交流。本文定义了SOA,讨论了SOA与业务流程管理的关系,并提供了在企业资源规划(ERP)环境中应用企业SOA的示例。本文还描述了SOA如何激发IT治理中的变化,列举了SOA成功的基本要素,并反映了对IT教育的影响。
{"title":"Service Oriented Architecture: Challenges for Business and Academia","authors":"Amelia Maurizio, James Sager, Peter Jones, G. Corbitt, L. Girolami","doi":"10.1109/HICSS.2008.387","DOIUrl":"https://doi.org/10.1109/HICSS.2008.387","url":null,"abstract":"Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways to collaborate with industry partners to provide products and services to markets that are otherwise uneconomical to pursue. Current IT challenges center on ways to integrate diverse systems into function rich business processes that span organizational boundaries. Though service oriented architecture (SOA) is poised to become a mainstream technology, its success may hinge on a meeting of the minds between the architects and developers of Web services and business process modelers who map out corporate requirements. This paper defines SOA, discusses how SOA relates to business process management, and provides an illustration of enterprise SOA applied in an enterprise resource planning (ERP) environment. The paper also describes how SOA motivates change in IT governance, enumerates the fundamentals of SOA success, and reflects on implications for IT education.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116022052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Interoperability Registries in eGovernment: Developing a Semantically Rich Repository for Electronic Services and Documents of the New Public Administration 电子政务中的互操作性注册:为新公共行政的电子服务和文件开发语义丰富的存储库
Y. Charalabidis, D. Askounis
As electronic government is increasing its momentum internationally, there is a growing need for the systematic management of the newly defined and constantly transforming services. eGovernment interoperability frameworks usually cater for the technical standards of eGovernment systems interconnection, but do not address service composition and use by citizens, businesses or other administrations. An interoperability registry is a system devoted to the formal description, composition and publishing of traditional or electronic services, together with the relevant document and process descriptions in an integrated schema. Through such a repository, the discovery of services by users or systems can be automated, resulting in an important tool for managing eGovernment transformation towards achieving interoperability. The paper goes beyond the methodology and tools used for developing such a system for the Greek government, to population with services and documents, application and extraction of useful conclusions for electronic government transformation at global level.
随着电子政务在国际上的发展势头日益增强,越来越需要对新定义和不断变化的服务进行系统管理。电子政府互操作性架构通常是为了配合电子政府系统互连的技术标准,但并不涉及市民、企业或其他行政部门的服务组成和使用。互操作性注册中心是一个系统,专门用于传统或电子服务的正式描述、组合和发布,以及集成模式中的相关文档和过程描述。通过这样一个存储库,用户或系统可以自动发现服务,从而产生一个重要的工具,用于管理电子政务向实现互操作性的转变。本文超越了为希腊政府开发这样一个系统所使用的方法和工具,涉及服务和文件的人口,应用和提取全球范围内电子政府转型的有用结论。
{"title":"Interoperability Registries in eGovernment: Developing a Semantically Rich Repository for Electronic Services and Documents of the New Public Administration","authors":"Y. Charalabidis, D. Askounis","doi":"10.1109/HICSS.2008.218","DOIUrl":"https://doi.org/10.1109/HICSS.2008.218","url":null,"abstract":"As electronic government is increasing its momentum internationally, there is a growing need for the systematic management of the newly defined and constantly transforming services. eGovernment interoperability frameworks usually cater for the technical standards of eGovernment systems interconnection, but do not address service composition and use by citizens, businesses or other administrations. An interoperability registry is a system devoted to the formal description, composition and publishing of traditional or electronic services, together with the relevant document and process descriptions in an integrated schema. Through such a repository, the discovery of services by users or systems can be automated, resulting in an important tool for managing eGovernment transformation towards achieving interoperability. The paper goes beyond the methodology and tools used for developing such a system for the Greek government, to population with services and documents, application and extraction of useful conclusions for electronic government transformation at global level.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115171584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Using FPGAs to Parallelize Dictionary Attacks for Password Cracking 利用fpga并行字典攻击破解密码
Yoginder S. Dandass
Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.
操作系统和数据保护工具正在采用复杂的密码衍生加密密钥技术来加密数据。这些技术给试图进行字典攻击的取证工具带来了巨大的计算负担,因为字典攻击需要为每个尝试的密码调用数千次加密散列生成函数。为了提高吞吐量,法医分析工具被设计成在专用工作站网络上以分布式方式运行。本文描述了RSA实验室发布的用于生成密码衍生加密密钥的标准cpsk# 5技术的基于fpga的硬件实现。当对现代密码保护系统执行字典攻击时,这是计算要求最高的步骤。最初的FPGA实现包含四个密码衍生加密密钥生成单元,工作频率为150 MHz,每秒能够处理超过510个密码。通过合并额外的密钥生成单元,可以很容易地提高实现的性能。
{"title":"Using FPGAs to Parallelize Dictionary Attacks for Password Cracking","authors":"Yoginder S. Dandass","doi":"10.1109/HICSS.2008.484","DOIUrl":"https://doi.org/10.1109/HICSS.2008.484","url":null,"abstract":"Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Software Piracy: Original Insights from a Criminological Perspective 软件盗版:犯罪学视角下的原创见解
R. Willison, M. Siponen
It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of 'Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.
众所周知,软件盗版现象十分普遍。虽然关于这一主题的现有研究已经应用了许多理论来理解和预防这种行为,但本文通过推进两种犯罪学理论提出了另一种观点。更具体地说,提出了一个新的理论模型,借鉴了这些理论,称为“中和和差异关联理论技术”。前者有助于解释个人如何能够使他们的犯罪行为合理化,从而使他们摆脱来自社会规范和内部控制的压力,如内疚和羞耻感。后者解释了犯罪是如何通过在个人群体中发生的学习过程发展起来的。虽然需要进一步的实证研究来检验该模型,但有人认为,这些理论不仅提供了对实施软件盗版意图的另一种看法,而且还可能为防止这种犯罪开辟了新的途径。
{"title":"Software Piracy: Original Insights from a Criminological Perspective","authors":"R. Willison, M. Siponen","doi":"10.1109/HICSS.2008.407","DOIUrl":"https://doi.org/10.1109/HICSS.2008.407","url":null,"abstract":"It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of 'Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115427793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1