首页 > 最新文献

2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
Disruption-tolerant Local Authentication Method for Continuous and Secure In-Flight Wireless LAN 连续安全飞行无线局域网的容错本地认证方法
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00252
Hideaki Goto
In-Flight Wi-Fi today is suffering from various problems regarding security and usability. One of the obstacles is the disruption of the backhaul network for internet connection. Introducing a secure connection means like WPA2/WPA3 En-terprise, preferably combined with roaming capability, can solve most security problems and some usability issues. However, user authentication in the current roaming systems depends on the servers on the ground and suffers from network disruption. Since In-Flight Wi-Fi is becoming indispensable not only for internet connection but also for various in-flight services, user devices need to stay connected to the access points during the entire flight. A disruption-tolerant Public Wi-Fi system was proposed earlier to realize secure user authentication and to maintain local network use in temporary isolated areas affected by natural disasters. Based on this system, we have developed a user authentication system with roaming for continuous and secure In-Flight Wi-Fi. This paper provides an overview of prospective use cases and challenges, and proposes a certificate-based roaming system.
目前,机上Wi-Fi在安全性和可用性方面存在各种问题。其中一个障碍是互联网连接回程网络的中断。引入安全连接方式,如WPA2/WPA3 enterprise,最好结合漫游功能,可以解决大多数安全问题和一些可用性问题。然而,目前漫游系统中的用户认证依赖于地面服务器,并且受到网络中断的影响。由于机上Wi-Fi不仅对互联网连接,而且对各种机上服务都是不可或缺的,因此用户设备需要在整个飞行过程中保持与接入点的连接。为了在受自然灾害影响的临时隔离地区实现安全的用户认证和维持本地网络的使用,之前提出了一种可容忍中断的公共Wi-Fi系统。在此系统的基础上,我们开发了一个具有漫游功能的用户认证系统,以实现持续安全的机上Wi-Fi。本文概述了未来的用例和挑战,并提出了一个基于证书的漫游系统。
{"title":"Disruption-tolerant Local Authentication Method for Continuous and Secure In-Flight Wireless LAN","authors":"Hideaki Goto","doi":"10.1109/COMPSAC54236.2022.00252","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00252","url":null,"abstract":"In-Flight Wi-Fi today is suffering from various problems regarding security and usability. One of the obstacles is the disruption of the backhaul network for internet connection. Introducing a secure connection means like WPA2/WPA3 En-terprise, preferably combined with roaming capability, can solve most security problems and some usability issues. However, user authentication in the current roaming systems depends on the servers on the ground and suffers from network disruption. Since In-Flight Wi-Fi is becoming indispensable not only for internet connection but also for various in-flight services, user devices need to stay connected to the access points during the entire flight. A disruption-tolerant Public Wi-Fi system was proposed earlier to realize secure user authentication and to maintain local network use in temporary isolated areas affected by natural disasters. Based on this system, we have developed a user authentication system with roaming for continuous and secure In-Flight Wi-Fi. This paper provides an overview of prospective use cases and challenges, and proposes a certificate-based roaming system.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technology as a Distracter for Providing Humanistic Care in Technology Dependent Care Units 技术对技术依赖型护理单位提供人文关怀的干扰作用
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00071
A. Saifan, N. Al Yateem, J. Dias, F. Ahmed, M. Subu, S. Rahman, A. A. Al Marzouqi, Sheikh Iqbal Ahamed
Medical technology advances quickly, and new machines are introduced into the industry on a regular basis. The impact of technology on healthcare providers' attitudes toward family members in critical care settings is investigated in this paper. Given the modern technology environment of critical care, multiple studies have indicated that many healthcare personnel place a greater emphasis on technology than on contact with patients or family members. Because of this emphasis on technology, critical care specialists may overlook other parts of care, such as family-centered care. This could also explain why critical care workers are averse to allowing family members to participate in operations like CPR.
医疗技术进步很快,新机器经常被引入这个行业。本文调查了技术对医疗保健提供者对重症监护环境中家庭成员态度的影响。鉴于现代危重病护理的技术环境,多项研究表明,许多医护人员更重视技术,而不是与患者或家庭成员的接触。由于对技术的重视,重症监护专家可能会忽视护理的其他部分,例如以家庭为中心的护理。这也可以解释为什么重症监护人员不愿意让家庭成员参与心肺复苏术这样的手术。
{"title":"Technology as a Distracter for Providing Humanistic Care in Technology Dependent Care Units","authors":"A. Saifan, N. Al Yateem, J. Dias, F. Ahmed, M. Subu, S. Rahman, A. A. Al Marzouqi, Sheikh Iqbal Ahamed","doi":"10.1109/COMPSAC54236.2022.00071","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00071","url":null,"abstract":"Medical technology advances quickly, and new machines are introduced into the industry on a regular basis. The impact of technology on healthcare providers' attitudes toward family members in critical care settings is investigated in this paper. Given the modern technology environment of critical care, multiple studies have indicated that many healthcare personnel place a greater emphasis on technology than on contact with patients or family members. Because of this emphasis on technology, critical care specialists may overlook other parts of care, such as family-centered care. This could also explain why critical care workers are averse to allowing family members to participate in operations like CPR.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"46 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125699973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification* TI-Prompt:对少数射击威胁情报Twitter分类的提示调整方法*
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00046
Yizhe You, Zhengwei Jiang, Kai Zhang, Jun Jiang, Xuren Wang, Zheyu Zhang, Shirui Wang, Huamin Feng
Obtaining the latest Threat Intelligence (TI) via Twitter has become one of the most important methods for defenders to catch up with emerging cyber threats. Existing TI Twitter classification works mainly based on supervised learning methods. Such approaches require large amounts of annotated data and are difficult to be transferred to other TI Twitter classification tasks. This paper proposes a prompt-based method for classifying TI on Twitter, named TI-Prompt. TI-Prompt lever-ages the prompt-tuning method with two templates in different TI Twitter classification tasks. TI-Prompt also uses a semantic similarity-based approach to automatically enrich the prompt verbalizer without expert knowledge and a verbalizer refinement method to calibrate the verbalizer based on the training data. We evaluate TI-Prompt with binary and multi-classification tasks on two Twitter Threat Intelligence datasets. Evaluation results show that the proposed TI-Prompt improves 5-10% over the best performance of previous supervised learning methods under the few-shot settings. Compared to the general prompt-tuning methods, the proposed prompt-tuning templates can also improve the classification performance by 2–5%. Meanwhile, the proposed verbalizer enrichment method and refinement method improve classification accuracy by 1–4% compared with the general single-word verbalizer prompt method. Therefore, TI-Prompt can be extended to other Threat Intelligence classification tasks without requiring large amounts of training data, significantly reducing the annotation cost.
通过Twitter获取最新的威胁情报(TI)已经成为防御者追赶新兴网络威胁的最重要方法之一。现有的TI Twitter分类工作主要基于监督学习方法。这种方法需要大量带注释的数据,并且很难转移到其他TI Twitter分类任务中。本文提出了一种基于提示的Twitter上TI分类方法,命名为TI- prompt。TI- prompt利用提示调优方法,在不同的TI Twitter分类任务中使用两个模板。TI-Prompt还采用了基于语义相似度的方法,在没有专家知识的情况下自动丰富提示语表达器,并采用了基于训练数据的表达器优化方法来校准表达器。我们在两个Twitter威胁情报数据集上使用二元和多分类任务评估TI-Prompt。评估结果表明,在少数镜头设置下,所提出的TI-Prompt比之前的监督学习方法的最佳性能提高了5-10%。与一般的提示调优方法相比,本文提出的提示调优模板还可以将分类性能提高2-5%。同时,与一般的单词提示方法相比,本文所提出的词汇浓缩法和精炼法的分类准确率提高了1-4%。因此,TI-Prompt可以扩展到其他威胁情报分类任务,而不需要大量的训练数据,大大降低了标注成本。
{"title":"TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*","authors":"Yizhe You, Zhengwei Jiang, Kai Zhang, Jun Jiang, Xuren Wang, Zheyu Zhang, Shirui Wang, Huamin Feng","doi":"10.1109/COMPSAC54236.2022.00046","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00046","url":null,"abstract":"Obtaining the latest Threat Intelligence (TI) via Twitter has become one of the most important methods for defenders to catch up with emerging cyber threats. Existing TI Twitter classification works mainly based on supervised learning methods. Such approaches require large amounts of annotated data and are difficult to be transferred to other TI Twitter classification tasks. This paper proposes a prompt-based method for classifying TI on Twitter, named TI-Prompt. TI-Prompt lever-ages the prompt-tuning method with two templates in different TI Twitter classification tasks. TI-Prompt also uses a semantic similarity-based approach to automatically enrich the prompt verbalizer without expert knowledge and a verbalizer refinement method to calibrate the verbalizer based on the training data. We evaluate TI-Prompt with binary and multi-classification tasks on two Twitter Threat Intelligence datasets. Evaluation results show that the proposed TI-Prompt improves 5-10% over the best performance of previous supervised learning methods under the few-shot settings. Compared to the general prompt-tuning methods, the proposed prompt-tuning templates can also improve the classification performance by 2–5%. Meanwhile, the proposed verbalizer enrichment method and refinement method improve classification accuracy by 1–4% compared with the general single-word verbalizer prompt method. Therefore, TI-Prompt can be extended to other Threat Intelligence classification tasks without requiring large amounts of training data, significantly reducing the annotation cost.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"17 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125731738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
External Service Sensing in an Uncertain World 不确定世界中的外部服务感知
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00058
Mingyi Liu, Zhongjie Wang, Tianyu Jiang, Xiaofei Xu, Quan.Z Sheng, S. Reiff-Marganiec
The flourish of web-based service has led to an increasing number of user requirements that can be satisfied by an increasing variety of ways. To study how services can better satisfy user requirements, a research area called service computing was born. An obvious fact is that in an uncertain world, most services evolve constantly in order to adapt to various types of internal and external changes in a timely manner. However, traditional services computing techniques do not systematically consider the significant implications of service changes and many widely-accepted models/approaches do not work well in uncertain world. Sensing various types of service changes is of great significance to the practicability and rationality of services computing research. In this paper, a new research problem External Service Sensing (ESS) is defined to cope with various changes in services, and a research framework of ESS is presented to elaborate the scope and boundary of ESS. This framework is composed of four orthogonal dimensions: sensing objects, sensing contents, sensing channels, and sensing techniques. Each concrete ESS problem is defined by combining different values in these dimensions, and existing research work related to service changes can be well adapted to this framework. Real-world case studies demonstrate the soundness of ESS and its framework. Finally, some challenges and opportunities in ESS research are listed for researchers in the services computing community. To the best of our knowledge, this is the first time to systematically define service change-related research as a standard services computing problem, and thus broadening the research scope of services computing.
基于web的服务的蓬勃发展导致了越来越多的用户需求,这些需求可以通过越来越多的方式得到满足。为了研究服务如何更好地满足用户需求,一个叫做服务计算的研究领域应运而生。一个明显的事实是,在一个不确定的世界中,大多数服务不断发展,以便及时适应各种类型的内部和外部变化。然而,传统的服务计算技术没有系统地考虑服务变化的重要影响,许多被广泛接受的模型/方法在不确定的世界中不能很好地工作。感知各类服务的变化对服务计算研究的实用性和合理性具有重要意义。本文提出了一个新的研究问题——外部服务感知(ESS),以应对服务的各种变化,并提出了外部服务感知的研究框架,阐述了外部服务感知的范围和边界。该框架由传感对象、传感内容、传感通道和传感技术四个正交维度组成。每个具体的ESS问题都是通过结合这些维度中的不同值来定义的,现有的与服务变化相关的研究工作可以很好地适应这个框架。实际案例研究证明了ESS及其框架的合理性。最后,为服务计算界的研究人员列出了ESS研究中的一些挑战和机遇。据我们所知,这是第一次系统地将服务变化相关的研究定义为一个标准的服务计算问题,从而拓宽了服务计算的研究范围。
{"title":"External Service Sensing in an Uncertain World","authors":"Mingyi Liu, Zhongjie Wang, Tianyu Jiang, Xiaofei Xu, Quan.Z Sheng, S. Reiff-Marganiec","doi":"10.1109/COMPSAC54236.2022.00058","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00058","url":null,"abstract":"The flourish of web-based service has led to an increasing number of user requirements that can be satisfied by an increasing variety of ways. To study how services can better satisfy user requirements, a research area called service computing was born. An obvious fact is that in an uncertain world, most services evolve constantly in order to adapt to various types of internal and external changes in a timely manner. However, traditional services computing techniques do not systematically consider the significant implications of service changes and many widely-accepted models/approaches do not work well in uncertain world. Sensing various types of service changes is of great significance to the practicability and rationality of services computing research. In this paper, a new research problem External Service Sensing (ESS) is defined to cope with various changes in services, and a research framework of ESS is presented to elaborate the scope and boundary of ESS. This framework is composed of four orthogonal dimensions: sensing objects, sensing contents, sensing channels, and sensing techniques. Each concrete ESS problem is defined by combining different values in these dimensions, and existing research work related to service changes can be well adapted to this framework. Real-world case studies demonstrate the soundness of ESS and its framework. Finally, some challenges and opportunities in ESS research are listed for researchers in the services computing community. To the best of our knowledge, this is the first time to systematically define service change-related research as a standard services computing problem, and thus broadening the research scope of services computing.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134325887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A virtual coaching platform to support therapy compliance in obesity 一个支持肥胖治疗依从性的虚拟指导平台
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00118
L. Bissoli, Davide Bonacina, Nicolò Dalla Riva, Florenc Demrozi, Marin Jereghi, Nicola Marchiotto, Giovanni Perbellini, Bruno Pernice, Erica Pizzocaro, G. Pravadelli, G. Recchia, Anna Lia Sacerdoti, Cristian Turetta, M. Zamboni
Obesity is a real health emergency with significant consequences for individuals and society, reducing expectations and quality of life or even the death for 2.8 million people each year. Being a chronic condition with limited pharmacological options, weight loss therapies are mainly based on dietary and cognitive-behavioral interventions delivered at specialist public and/or private centers. In order to promote and facilitate weight loss, this paper proposes a virtual coaching system to motivate and guide the patients during the therapy and to support the clinicians in monitoring its effectiveness. The system has three components: a) the clinician's web application, which is used to monitor and modify the therapy for each patient; b) a mobile application for patients, used to log nutrition intakes and physical activities, and to consult motivational documents/videos; and c) a cloud server, which collects data and implements smart monitoring features. The platform is adopted in a clinical trial involving 120 patients with obesity (Body Mass Index 2> 30) that has recently started.
肥胖是一种真正的健康紧急情况,对个人和社会都有重大影响,每年有280万人的期望和生活质量降低,甚至死亡。作为一种慢性疾病,药物选择有限,减肥治疗主要基于饮食和认知行为干预,由专业的公共和/或私人中心提供。为了促进和促进减肥,本文提出了一个虚拟教练系统,在治疗过程中激励和指导患者,并支持临床医生监测其效果。该系统由三个部分组成:a)临床医生的web应用程序,用于监控和修改每个患者的治疗方案;B)患者的移动应用程序,用于记录营养摄入量和身体活动,并查阅激励文件/视频;c)云服务器,用于收集数据并实现智能监控功能。该平台被用于最近开始的120例肥胖患者(身体质量指数2> 30)的临床试验。
{"title":"A virtual coaching platform to support therapy compliance in obesity","authors":"L. Bissoli, Davide Bonacina, Nicolò Dalla Riva, Florenc Demrozi, Marin Jereghi, Nicola Marchiotto, Giovanni Perbellini, Bruno Pernice, Erica Pizzocaro, G. Pravadelli, G. Recchia, Anna Lia Sacerdoti, Cristian Turetta, M. Zamboni","doi":"10.1109/COMPSAC54236.2022.00118","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00118","url":null,"abstract":"Obesity is a real health emergency with significant consequences for individuals and society, reducing expectations and quality of life or even the death for 2.8 million people each year. Being a chronic condition with limited pharmacological options, weight loss therapies are mainly based on dietary and cognitive-behavioral interventions delivered at specialist public and/or private centers. In order to promote and facilitate weight loss, this paper proposes a virtual coaching system to motivate and guide the patients during the therapy and to support the clinicians in monitoring its effectiveness. The system has three components: a) the clinician's web application, which is used to monitor and modify the therapy for each patient; b) a mobile application for patients, used to log nutrition intakes and physical activities, and to consult motivational documents/videos; and c) a cloud server, which collects data and implements smart monitoring features. The platform is adopted in a clinical trial involving 120 patients with obesity (Body Mass Index 2> 30) that has recently started.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Clustering-Aided Approach for Diagnosis Prediction: A Case Study of Elderly Fall 聚类辅助诊断预测方法:以老年人跌倒为例
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00054
L. Tong, Jake Luo, Jazzmyne Adams, K. Osinski, Xiaoyu Liu, D. Friedland
Data-driven diagnosis prediction has been adopted in clinical decision support systems. However, only a few studies have focused on non-supervised clustering approaches to building a high-quality patient data set. This study focused on a clustering-aided approach to diagnosis prediction. We leveraged clustering-aided machine learning models to predict elderly falls. First, we used patients' risk factors to build a feature set. The feature set showed a clustering-aided approach could aggregate patient factors that shared similar clinical and demographic characteristics. Subsequently, a K-means clustering approach significantly improved the data set quality. Overall, our study demonstrated that clustering approaches improve the prediction performance of elderly falls. A clustering-aided approach can be applied to similar clinical healthcare practices to potentially improve elderly care.
数据驱动诊断预测已被应用于临床决策支持系统。然而,只有少数研究关注于非监督聚类方法来构建高质量的患者数据集。本研究的重点是聚类辅助诊断预测方法。我们利用聚类辅助机器学习模型来预测老年人跌倒。首先,我们使用患者的危险因素来构建特征集。特征集显示,聚类辅助方法可以聚集具有相似临床和人口统计学特征的患者因素。随后,K-means聚类方法显著提高了数据集质量。总体而言,我们的研究表明,聚类方法提高了老年人跌倒的预测性能。聚类辅助方法可以应用于类似的临床医疗保健实践,以潜在地改善老年人护理。
{"title":"A Clustering-Aided Approach for Diagnosis Prediction: A Case Study of Elderly Fall","authors":"L. Tong, Jake Luo, Jazzmyne Adams, K. Osinski, Xiaoyu Liu, D. Friedland","doi":"10.1109/COMPSAC54236.2022.00054","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00054","url":null,"abstract":"Data-driven diagnosis prediction has been adopted in clinical decision support systems. However, only a few studies have focused on non-supervised clustering approaches to building a high-quality patient data set. This study focused on a clustering-aided approach to diagnosis prediction. We leveraged clustering-aided machine learning models to predict elderly falls. First, we used patients' risk factors to build a feature set. The feature set showed a clustering-aided approach could aggregate patient factors that shared similar clinical and demographic characteristics. Subsequently, a K-means clustering approach significantly improved the data set quality. Overall, our study demonstrated that clustering approaches improve the prediction performance of elderly falls. A clustering-aided approach can be applied to similar clinical healthcare practices to potentially improve elderly care.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131157154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Provenance for healthcare: a blockchain-based approach 医疗保健的数据来源:基于区块链的方法
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00263
S. D'Antonio, Federica Uccello
With the advent of Industry 4.0, information has become a key aspect for virtually any system. Critical infrastructures haven't been excluded by this technological revolution, which has led to several advantages in terms of communication, interoperability, and scalability. On the other hand, these systems are now targeted by new attacks, previously exclusive to cybersystems. The potential of data violation ranges from the interruption of the service provided to, in the worst cases, disastrous consequences in environmental, economic and safety terms. Consequently, ensuring data reliability is an essential task to prevent these kinds of attacks. Data provenance, a kind of metadata that identifies the derivation history of a data, can provide a possible solution. This paper aims to discuss solutions for a tamper proof data provenance extended, but not limited, to the healthcare scenario. The proposed approach is based on blockchain technology to ensure protection of sensitive data, such as medical records and healthcare data.
随着工业4.0的出现,信息已成为几乎任何系统的关键方面。关键基础设施并没有被这场技术革命排除在外,它在通信、互操作性和可伸缩性方面带来了一些优势。另一方面,这些系统现在成为新的攻击的目标,以前只有网络系统才会受到攻击。数据违规的可能性包括中断所提供的服务,在最坏的情况下,在环境、经济和安全方面造成灾难性后果。因此,确保数据可靠性是防止此类攻击的基本任务。数据来源是一种标识数据派生历史的元数据,它可以提供一种可能的解决方案。本文旨在讨论扩展但不限于医疗保健场景的防篡改数据来源的解决方案。拟议的方法基于区块链技术,以确保敏感数据的保护,如医疗记录和医疗保健数据。
{"title":"Data Provenance for healthcare: a blockchain-based approach","authors":"S. D'Antonio, Federica Uccello","doi":"10.1109/COMPSAC54236.2022.00263","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00263","url":null,"abstract":"With the advent of Industry 4.0, information has become a key aspect for virtually any system. Critical infrastructures haven't been excluded by this technological revolution, which has led to several advantages in terms of communication, interoperability, and scalability. On the other hand, these systems are now targeted by new attacks, previously exclusive to cybersystems. The potential of data violation ranges from the interruption of the service provided to, in the worst cases, disastrous consequences in environmental, economic and safety terms. Consequently, ensuring data reliability is an essential task to prevent these kinds of attacks. Data provenance, a kind of metadata that identifies the derivation history of a data, can provide a possible solution. This paper aims to discuss solutions for a tamper proof data provenance extended, but not limited, to the healthcare scenario. The proposed approach is based on blockchain technology to ensure protection of sensitive data, such as medical records and healthcare data.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133020619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impacts of Radio Frequency IDentification (RFID) Technology in Business Continuity 射频识别(RFID)技术对业务连续性的影响
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00245
Solomon J. Akuma, Eslam G. AbdAllah
Throughout the last few years, Radio Frequency IDentification (RFID) has constantly been a critical topic of academic research. RFID is a form of automatic identification system that uses electromagnetic waves to track, detect, identify, and manage a wide range of assets and items. Business Continuity (BC) refers to having a plan in place to deal with unexpected events so that your company can continue to operate with minimal disturbance. Recently, there has been a lot of interest in employing RFID technology which can impact BC operations positively. The paper discusses RFID, security attacks, challenges faced during BC and utilizing RFID in BC, and how to implement BC using RFID technology.
在过去的几年里,射频识别(RFID)一直是学术研究的一个关键话题。RFID是一种自动识别系统,它使用电磁波来跟踪、检测、识别和管理各种资产和物品。业务连续性(Business Continuity, BC)指的是有一个计划来处理意外事件,这样你的公司就可以在最小的干扰下继续运营。最近,人们对采用RFID技术产生了很大的兴趣,这种技术可以积极地影响BC的运营。本文讨论了RFID,安全攻击,在BC过程中面临的挑战和在BC中使用RFID,以及如何使用RFID技术实现BC。
{"title":"Impacts of Radio Frequency IDentification (RFID) Technology in Business Continuity","authors":"Solomon J. Akuma, Eslam G. AbdAllah","doi":"10.1109/COMPSAC54236.2022.00245","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00245","url":null,"abstract":"Throughout the last few years, Radio Frequency IDentification (RFID) has constantly been a critical topic of academic research. RFID is a form of automatic identification system that uses electromagnetic waves to track, detect, identify, and manage a wide range of assets and items. Business Continuity (BC) refers to having a plan in place to deal with unexpected events so that your company can continue to operate with minimal disturbance. Recently, there has been a lot of interest in employing RFID technology which can impact BC operations positively. The paper discusses RFID, security attacks, challenges faced during BC and utilizing RFID in BC, and how to implement BC using RFID technology.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132098445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of ROS-based Small Unmanned Platform for Acquiring Autonomous Driving Dataset in Various Places and Weather Conditions 基于ros的多地点多天气条件下自动驾驶数据采集小型无人平台的研制
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00013
Ji-il Park, Minseong Choi, Seungho Han, Yeongseok Lee, J. Cho, Hyoseo Choi, Min-Yyeong Cho, Minyoung Lee, Kyung-Soo Kim
As autonomous driving research has actively pro-gressed, software for autonomous vehicles and embedded systems such as Apollo and AutoWare have also been developed, providing a complete set of self-driving modules, including perception, localization and mapping, path planning, prediction, decision making, and control. Most of the researchers currently use these software programs, but many researchers have also studied autonomous driving based on the middleware software termed robot operating system (ROS) before such software was released, especially in academia. Accordingly, we intend to develop ROS-based unmanned RC car equipped with autonomous driving sensors such as LiDAR, radar, VIS/IR cameras, GPS, and IMUs that can provide ROS-based datasets to researchers studying self-driving cars and robots using ROS. In addition, unlike conventional datasets, we acquire dataset not only on road but also pedestrian paths that can be used in both vehicles and robots and provides extreme environmental datasets such as snowfall environments. In this sense, the ROS dataset we created will be helpful to researchers studying autonomous vehicles and robots by using ROS.
随着自动驾驶研究的积极推进,Apollo和AutoWare等自动驾驶汽车和嵌入式系统的软件也被开发出来,提供了一套完整的自动驾驶模块,包括感知、定位和地图绘制、路径规划、预测、决策和控制。目前大多数研究人员都在使用这些软件程序,但在机器人操作系统(ROS)中间件软件发布之前,许多研究人员也在研究基于这种中间件软件的自动驾驶,特别是在学术界。因此,我们计划开发基于ROS的无人驾驶RC汽车,配备激光雷达、雷达、VIS/IR相机、GPS和imu等自动驾驶传感器,可以为使用ROS研究自动驾驶汽车和机器人的研究人员提供基于ROS的数据集。此外,与传统数据集不同,我们不仅获取道路数据集,还获取可用于车辆和机器人的行人路径数据集,并提供极端环境数据集,如降雪环境。从这个意义上说,我们创建的ROS数据集将有助于研究人员使用ROS研究自动驾驶汽车和机器人。
{"title":"Development of ROS-based Small Unmanned Platform for Acquiring Autonomous Driving Dataset in Various Places and Weather Conditions","authors":"Ji-il Park, Minseong Choi, Seungho Han, Yeongseok Lee, J. Cho, Hyoseo Choi, Min-Yyeong Cho, Minyoung Lee, Kyung-Soo Kim","doi":"10.1109/COMPSAC54236.2022.00013","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00013","url":null,"abstract":"As autonomous driving research has actively pro-gressed, software for autonomous vehicles and embedded systems such as Apollo and AutoWare have also been developed, providing a complete set of self-driving modules, including perception, localization and mapping, path planning, prediction, decision making, and control. Most of the researchers currently use these software programs, but many researchers have also studied autonomous driving based on the middleware software termed robot operating system (ROS) before such software was released, especially in academia. Accordingly, we intend to develop ROS-based unmanned RC car equipped with autonomous driving sensors such as LiDAR, radar, VIS/IR cameras, GPS, and IMUs that can provide ROS-based datasets to researchers studying self-driving cars and robots using ROS. In addition, unlike conventional datasets, we acquire dataset not only on road but also pedestrian paths that can be used in both vehicles and robots and provides extreme environmental datasets such as snowfall environments. In this sense, the ROS dataset we created will be helpful to researchers studying autonomous vehicles and robots by using ROS.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131403991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Impact of Smart Environments: Software Engineering Perspectives and Challenges 智能环境的社会影响:软件工程的观点和挑战
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00253
S. McDonald, D. Towey, V. Brusic
This article examines the impact of smart environments on society from a software engineering design perspective. Smart environments create significant design challenges due to their scalability, interconnectedness, and adaptivity of devices. Software engineering and existing standards typically address technical issues, while ethical and social issues have been neglected. This work argues that changing regulatory requirements shifts the responsibility for outcomes to the software engineering team, and therefore the definition of adequate guidelines is needed. These guidelines include consideration of ethical issues, harmonized ethically informed standards, principles that address compliance risks, and analyses of social impact. Our starting point is the seven harmonized standards defined by the European GDPR. Based on the existing literature and additional analyses, we identify ten key ethical issues, nine compliance risks, and twelve analyses of societal impact. These standards, issues, risks, and analyses make a starting point for the development of formal guidelines applicable to socially aware smart environment design.
本文从软件工程设计的角度探讨了智能环境对社会的影响。智能环境由于其可扩展性、互联性和设备的自适应性而带来了重大的设计挑战。软件工程和现有标准通常处理技术问题,而伦理和社会问题被忽视了。这项工作认为,变更法规需求将对结果的责任转移到软件工程团队,因此需要适当的指导方针的定义。这些指导方针包括对道德问题的考虑、统一的道德知情标准、解决合规风险的原则以及对社会影响的分析。我们的出发点是欧洲GDPR定义的七个协调标准。基于现有文献和其他分析,我们确定了10个关键的伦理问题,9个合规风险,以及12个社会影响分析。这些标准、问题、风险和分析为制定适用于具有社会意识的智能环境设计的正式指导方针提供了一个起点。
{"title":"Social Impact of Smart Environments: Software Engineering Perspectives and Challenges","authors":"S. McDonald, D. Towey, V. Brusic","doi":"10.1109/COMPSAC54236.2022.00253","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00253","url":null,"abstract":"This article examines the impact of smart environments on society from a software engineering design perspective. Smart environments create significant design challenges due to their scalability, interconnectedness, and adaptivity of devices. Software engineering and existing standards typically address technical issues, while ethical and social issues have been neglected. This work argues that changing regulatory requirements shifts the responsibility for outcomes to the software engineering team, and therefore the definition of adequate guidelines is needed. These guidelines include consideration of ethical issues, harmonized ethically informed standards, principles that address compliance risks, and analyses of social impact. Our starting point is the seven harmonized standards defined by the European GDPR. Based on the existing literature and additional analyses, we identify ten key ethical issues, nine compliance risks, and twelve analyses of societal impact. These standards, issues, risks, and analyses make a starting point for the development of formal guidelines applicable to socially aware smart environment design.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131914495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1