Pub Date : 2011-06-28DOI: 10.1007/978-3-642-22339-6_9
Georgios Karopoulos, F. Martinelli
{"title":"IMS Session Management Based on Usage Control","authors":"Georgios Karopoulos, F. Martinelli","doi":"10.1007/978-3-642-22339-6_9","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_9","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"51 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124533623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-28DOI: 10.1007/978-3-642-22339-6_4
B. Aziz, Á. Arenas, Michael D. Wilson
{"title":"SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements","authors":"B. Aziz, Á. Arenas, Michael D. Wilson","doi":"10.1007/978-3-642-22339-6_4","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_4","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121103925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-28DOI: 10.1007/978-3-642-22339-6_25
Younghee Kim, K. Cho, J. Yoon, I. Kim, U. Kim
{"title":"Using Bloom Filters for Mining Top-k Frequent Itemsets in Data Streams","authors":"Younghee Kim, K. Cho, J. Yoon, I. Kim, U. Kim","doi":"10.1007/978-3-642-22339-6_25","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_25","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121023873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-28DOI: 10.1007/978-3-642-22339-6_28
Lingli Deng, Qing Yu, Jin Peng
{"title":"Adaptive Optimal Global Resource Scheduling for a Cloud-Based Virtualized Resource Pool","authors":"Lingli Deng, Qing Yu, Jin Peng","doi":"10.1007/978-3-642-22339-6_28","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_28","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122050069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Network Data Abstraction Method for Data Set Verification","authors":"Jaeik Cho, Kyuwon Choi, Taeshik Shon, Jongsub Moon","doi":"10.1007/978-3-642-22339-6_7","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_7","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131648000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-28DOI: 10.1007/978-3-642-22339-6_15
L. Leng, Jiashu Zhang, Gao Chen, M. Khan, Ping Bai
{"title":"Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion","authors":"L. Leng, Jiashu Zhang, Gao Chen, M. Khan, Ping Bai","doi":"10.1007/978-3-642-22339-6_15","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_15","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122859489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-28DOI: 10.1007/978-3-642-22339-6_6
Siegfried Podesser, Ronald Toegl
{"title":"A Software Architecture for Introducing Trust in Java-Based Clouds","authors":"Siegfried Podesser, Ronald Toegl","doi":"10.1007/978-3-642-22339-6_6","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_6","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-28DOI: 10.1007/978-3-642-22339-6_29
Seung Kwan Kim, Younghee Kim, U. Kim
{"title":"Maximal Cliques Generating Algorithm for Spatial Co-location Pattern Mining","authors":"Seung Kwan Kim, Younghee Kim, U. Kim","doi":"10.1007/978-3-642-22339-6_29","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_29","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"120 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-28DOI: 10.1007/978-3-642-22339-6_26
W. Ryu, Joonho Kwon, B. Hong
{"title":"An RSN Tool : A Test Dataset Generator for Evaluating RFID Middleware","authors":"W. Ryu, Joonho Kwon, B. Hong","doi":"10.1007/978-3-642-22339-6_26","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_26","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122776654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}