首页 > 最新文献

2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

英文 中文
A Secure Authentication Scheme of Health Care Based on the Cloud 基于云的医疗安全认证方案
Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu
In recent years, many researcher have devoted to use the known technologies to enhance the quality of the health care. The health care become an important issue. But their scheme also still has some flaws need to be improved. As the result, we propose a secure authentication scheme of health care based on the cloud. Our scheme can help the patient and the caregiver transmit the private health information via secure authentication. The caregiver need not always accompany the patient and can use the mobile device to monitor the patient's health care status. Our scheme can also avoid known attacks.
近年来,许多研究者致力于利用已知技术来提高医疗保健的质量。医疗保健成为一个重要的问题。但是他们的方案也有一些需要改进的缺陷。因此,我们提出了一种基于云的医疗安全认证方案。我们的方案可以帮助患者和护理人员通过安全认证传输私人健康信息。护理人员不需要总是陪伴患者,并且可以使用移动设备来监测患者的医疗状况。我们的方案还可以避免已知的攻击。
{"title":"A Secure Authentication Scheme of Health Care Based on the Cloud","authors":"Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu","doi":"10.1109/IMIS.2014.72","DOIUrl":"https://doi.org/10.1109/IMIS.2014.72","url":null,"abstract":"In recent years, many researcher have devoted to use the known technologies to enhance the quality of the health care. The health care become an important issue. But their scheme also still has some flaws need to be improved. As the result, we propose a secure authentication scheme of health care based on the cloud. Our scheme can help the patient and the caregiver transmit the private health information via secure authentication. The caregiver need not always accompany the patient and can use the mobile device to monitor the patient's health care status. Our scheme can also avoid known attacks.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Chronic Patients Monitoring Using Wireless Sensors and Big Data Processing 利用无线传感器和大数据处理技术监测慢性病患者
Diego Gachet, Fernando Aparicio, M. Rodríguez, Juan R. Ascanio
Developed countries are characterized by aging population and economical crisis, so it is desirable to reduce the costs of public and private healthcare systems. It is necessary to streamline the health system resources leading to the development of new medical services based on telemedicine, remote monitoring of chronic patients, personalized health services, new services for dependants, etc. New medical applications based on remote monitoring will significantly increasing the volume of health information to manage, including data from medical and biological sensors, is then necessary process this huge volume of data using techniques from Big Data. In this paper we propose one potential solution for creating those new services, based on Big Data processing and vital signs monitoring.
发达国家的特点是人口老龄化和经济危机,因此降低公共和私人医疗保健系统的成本是可取的。有必要精简卫生系统资源,从而发展基于远程医疗、慢性病患者远程监测、个性化卫生服务、家属新服务等的新型医疗服务。基于远程监控的新医疗应用将大大增加需要管理的健康信息的数量,包括来自医疗和生物传感器的数据,因此有必要使用大数据技术处理这大量数据。在本文中,我们提出了一种基于大数据处理和生命体征监测的潜在解决方案来创建这些新服务。
{"title":"Chronic Patients Monitoring Using Wireless Sensors and Big Data Processing","authors":"Diego Gachet, Fernando Aparicio, M. Rodríguez, Juan R. Ascanio","doi":"10.1109/IMIS.2014.54","DOIUrl":"https://doi.org/10.1109/IMIS.2014.54","url":null,"abstract":"Developed countries are characterized by aging population and economical crisis, so it is desirable to reduce the costs of public and private healthcare systems. It is necessary to streamline the health system resources leading to the development of new medical services based on telemedicine, remote monitoring of chronic patients, personalized health services, new services for dependants, etc. New medical applications based on remote monitoring will significantly increasing the volume of health information to manage, including data from medical and biological sensors, is then necessary process this huge volume of data using techniques from Big Data. In this paper we propose one potential solution for creating those new services, based on Big Data processing and vital signs monitoring.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122264847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Credit-Based Incentive Protocol for Stimulating Network-Coded Cooperative Content Distribution in VANET 基于信用的VANET网络编码合作内容分发激励协议
Ing-Chau Chang, Jacky Lo
As the high-speed vehicular node passes the coverage area of a road side unit in the vehicular ad hoc network, it may not be able to receive all content information broadcast by the RSU during the short contact duration with the RSU. Hence, when the vehicular node leaves the coverage area of the RSU, it has to adopt the cooperative content distribution approach to share its received content pieces, which are encoded by the network coding technology, with all neighboring nodes. However, these approaches do not consider that vehicular nodes in reality may have different degrees of selfishness and interests on various types of content information, which in turn hinders those selfish nodes from sharing their contents with others. In this paper, we will propose the Social Code scheme, adopting the content bitmap, for each node to calculate the number of different network-coded content pieces, its corresponding re-broadcast priority and the correct number of re-encoded NC content pieces with all neighbor nodes first. Social Code then classifies vehicular nodes into four types and further integrates corresponding credit-based incentive protocols to stimulate nodes' willingness to re-broadcast their content pieces. Finally simulation results show that Social Code outperforms over traditional NC-based cooperative content distribution schemes, if they adopt the credit-based incentive protocols without considering node selfishness and interests.
由于高速车辆节点经过车载自组网中某个路侧单元的覆盖区域,在与RSU短暂的接触时间内,可能无法接收到RSU广播的所有内容信息。因此,当车辆节点离开RSU覆盖区域时,必须采用协作式内容分发方式,将其接收到的经过网络编码技术编码的内容片段共享给所有相邻节点。然而,这些方法没有考虑到现实中的车载节点对各种类型的内容信息可能存在不同程度的自私和利益,从而阻碍了这些自私节点与他人共享其内容。在本文中,我们将提出采用内容位图的Social Code方案,对每个节点计算不同网络编码的内容片段的数量,其对应的重播优先级以及所有相邻节点优先重新编码NC内容片段的正确数量。然后,Social Code将车辆节点分为四种类型,并进一步整合相应的基于信用的激励协议,以刺激节点对其内容片段进行重播的意愿。仿真结果表明,在不考虑节点自利和利益的情况下,采用基于信用的激励协议,社会代码方案优于传统的基于网络的合作内容分发方案。
{"title":"A Credit-Based Incentive Protocol for Stimulating Network-Coded Cooperative Content Distribution in VANET","authors":"Ing-Chau Chang, Jacky Lo","doi":"10.1109/IMIS.2014.65","DOIUrl":"https://doi.org/10.1109/IMIS.2014.65","url":null,"abstract":"As the high-speed vehicular node passes the coverage area of a road side unit in the vehicular ad hoc network, it may not be able to receive all content information broadcast by the RSU during the short contact duration with the RSU. Hence, when the vehicular node leaves the coverage area of the RSU, it has to adopt the cooperative content distribution approach to share its received content pieces, which are encoded by the network coding technology, with all neighboring nodes. However, these approaches do not consider that vehicular nodes in reality may have different degrees of selfishness and interests on various types of content information, which in turn hinders those selfish nodes from sharing their contents with others. In this paper, we will propose the Social Code scheme, adopting the content bitmap, for each node to calculate the number of different network-coded content pieces, its corresponding re-broadcast priority and the correct number of re-encoded NC content pieces with all neighbor nodes first. Social Code then classifies vehicular nodes into four types and further integrates corresponding credit-based incentive protocols to stimulate nodes' willingness to re-broadcast their content pieces. Finally simulation results show that Social Code outperforms over traditional NC-based cooperative content distribution schemes, if they adopt the credit-based incentive protocols without considering node selfishness and interests.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134637939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The GEO-Cloud Experiment: Global Earth Observation System Computed in Cloud GEO-Cloud实验:云中计算的全球地球观测系统
J. Becedas
Earth Observation (EO) is considered a key element in the European Research Roadmap and an opportunity market for the next years. However, this field presents some critical challenges to cover the current demand of services: i) there is massive and large-sized data from Earth Observation recordings, ii) On demand storage, processing and distribution of geo-information generated with the recorded data are required. Conventional infrastructures have the risks of over/under size the infrastructure when big data is used, they are not flexible to cover sudden changes in the demand of services and the access to the information presents large latencies. These aspects limit the use of EO technology for real time use. The use of cloud computing technology can overcome the previously defined limitations. The GEO-Cloud experiment emerged to find viable solutions to provide highly demanding EO services by using future internet technologies. It is a close to reality experiment, part of the FP7 Fed4FIRE project. GEO-Cloud consists of the design, implementation and testing in cloud a complete EO system, from the acquisition of geo-data with a constellation of satellites to its on demand distribution to end users with remote access. This paper presents the GEO-Cloud experiment design, architecture and foreseen research activity.
地球观测(EO)被认为是欧洲研究路线图的一个关键要素,也是未来几年的一个机会市场。然而,为了满足当前的服务需求,这一领域提出了一些关键挑战:1)地球观测记录中有大量和大尺寸的数据;2)需要按需存储、处理和分发由记录数据生成的地理信息。传统基础设施在使用大数据时存在规模过大或过小的风险,它们不能灵活应对服务需求的突然变化,并且对信息的访问存在较大的延迟。这些方面限制了EO技术的实时使用。使用云计算技术可以克服以前定义的限制。GEO-Cloud实验的出现是为了寻找可行的解决方案,利用未来的互联网技术提供高要求的EO服务。这是一个接近现实的实验,是FP7 Fed4FIRE项目的一部分。GEO-Cloud包括在云中设计、实现和测试一个完整的EO系统,从卫星星座的地理数据采集到其按需分发到具有远程访问的最终用户。本文介绍了GEO-Cloud的实验设计、体系结构和预期的研究活动。
{"title":"The GEO-Cloud Experiment: Global Earth Observation System Computed in Cloud","authors":"J. Becedas","doi":"10.1109/IMIS.2014.2","DOIUrl":"https://doi.org/10.1109/IMIS.2014.2","url":null,"abstract":"Earth Observation (EO) is considered a key element in the European Research Roadmap and an opportunity market for the next years. However, this field presents some critical challenges to cover the current demand of services: i) there is massive and large-sized data from Earth Observation recordings, ii) On demand storage, processing and distribution of geo-information generated with the recorded data are required. Conventional infrastructures have the risks of over/under size the infrastructure when big data is used, they are not flexible to cover sudden changes in the demand of services and the access to the information presents large latencies. These aspects limit the use of EO technology for real time use. The use of cloud computing technology can overcome the previously defined limitations. The GEO-Cloud experiment emerged to find viable solutions to provide highly demanding EO services by using future internet technologies. It is a close to reality experiment, part of the FP7 Fed4FIRE project. GEO-Cloud consists of the design, implementation and testing in cloud a complete EO system, from the acquisition of geo-data with a constellation of satellites to its on demand distribution to end users with remote access. This paper presents the GEO-Cloud experiment design, architecture and foreseen research activity.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract) 传感器数据安全利用的隐私保护技术(扩展摘要)
T. Izu, T. Ogura, Y. Sakemi, M. Takenaka, H. Tsuda
As the number of scenarios for utilizing sensor data from home appliances, privacy issues such as leakage of private information from sensor data are arising. In this paper, we introduce a new technology, partial decryption, which enables parts of the data to be masked while still encrypted, so other data can be substituted or the encryption key can be changed.
随着利用家电传感器数据的场景越来越多,传感器数据的个人信息泄露等隐私问题也越来越多。在本文中,我们引入了一种新的技术——部分解密,它可以在加密的同时屏蔽部分数据,从而可以替换其他数据或更改加密密钥。
{"title":"Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract)","authors":"T. Izu, T. Ogura, Y. Sakemi, M. Takenaka, H. Tsuda","doi":"10.1109/IMIS.2014.86","DOIUrl":"https://doi.org/10.1109/IMIS.2014.86","url":null,"abstract":"As the number of scenarios for utilizing sensor data from home appliances, privacy issues such as leakage of private information from sensor data are arising. In this paper, we introduce a new technology, partial decryption, which enables parts of the data to be masked while still encrypted, so other data can be substituted or the encryption key can be changed.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131225283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Security-Effective and Global Mobility Management for FPMIPv6 Networks 安全有效的FPMIPv6网络全局移动管理研究
H. Chai, Jun-Dong Cho, Jongpil Jeong
In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. One of the protocols, Fast Handovers for Proxy Mobile IPv6 (FPMIPv6) [1] was studied by the Internet Engineering Task Force (IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6 (FMIPv6) in Proxy Mobile IPv6 (PMIPv6), it reduces the packet loss. The conventional scheme has been proposed to cooperate with an Authentication, Authorization and Accounting (AAA) infrastructure for authentication of a mobile node in PMIPv6. Despite the fact that this approach resulted in the best efficiency, without beginning secured signaling messages, The PMIPv6 is vulnerable to various security threats and it does not support global mobility. In this paper, the authors analyzed the Kang-Park & ESS-FH scheme, and proposed an Enhanced Security scheme for FPMIPv6 (ESS-FP). Based on the CGA method and the public key Cryptography, ESS-FP provides a strong key exchange and key independence in addition to improving the weaknesses of FPMIPv6 and its handover latency was analyzed and compared with that of the Kang-Park scheme & ESS-FH.
在基于pmipv6的网络中,由于网络节点代表移动节点执行与移动管理相关的功能,因此可以使移动节点更小、更轻。Internet工程任务组(IETF)研究了其中一种协议FPMIPv6[1]。由于FPMIPv6采用了Proxy Mobile IPv6 (PMIPv6)中的FMIPv6 (Fast hanvers for Mobile IPv6)的实体和概念,减少了丢包。在PMIPv6中,传统的方案是配合认证、授权和计费(Authentication, Authorization and Accounting, AAA)基础架构对移动节点进行认证。尽管这种方法产生了最佳的效率,但没有开始安全的信令消息,PMIPv6容易受到各种安全威胁,并且不支持全局移动性。在分析了Kang-Park和ESS-FH方案的基础上,提出了一种针对FPMIPv6的增强安全方案(ESS-FP)。基于CGA方法和公钥加密技术的ESS-FP在改善FPMIPv6的弱点的同时,提供了强大的密钥交换和密钥独立性,并与Kang-Park方案和ESS-FH方案的切换延迟进行了分析和比较。
{"title":"On Security-Effective and Global Mobility Management for FPMIPv6 Networks","authors":"H. Chai, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.91","DOIUrl":"https://doi.org/10.1109/IMIS.2014.91","url":null,"abstract":"In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. One of the protocols, Fast Handovers for Proxy Mobile IPv6 (FPMIPv6) [1] was studied by the Internet Engineering Task Force (IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6 (FMIPv6) in Proxy Mobile IPv6 (PMIPv6), it reduces the packet loss. The conventional scheme has been proposed to cooperate with an Authentication, Authorization and Accounting (AAA) infrastructure for authentication of a mobile node in PMIPv6. Despite the fact that this approach resulted in the best efficiency, without beginning secured signaling messages, The PMIPv6 is vulnerable to various security threats and it does not support global mobility. In this paper, the authors analyzed the Kang-Park & ESS-FH scheme, and proposed an Enhanced Security scheme for FPMIPv6 (ESS-FP). Based on the CGA method and the public key Cryptography, ESS-FP provides a strong key exchange and key independence in addition to improving the weaknesses of FPMIPv6 and its handover latency was analyzed and compared with that of the Kang-Park scheme & ESS-FH.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114838882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart City Data Stream Visualization Using Glyphs 使用字形的智慧城市数据流可视化
F. Villanueva, C. Aguirre, D. Villa, M. Santofimia, J. C. López
Real-time data stream visualization is a challenge in multiple application fields of Smart Cities. Examples of these streams are traffic, pollution, social media activity, citizens dynamic, etc. which show us what, where and when is happening in the city. The purpose of this paper is to apply different types of glyphs for showing real-time stream evolution of data gathered in the city. The use of glyphs is intended to make the most out human capability for outperforming in detecting visual patterns.
实时数据流可视化是智慧城市多个应用领域面临的挑战。这些数据流的例子包括交通、污染、社交媒体活动、市民动态等,它们向我们展示了城市中发生的事情、地点和时间。本文的目的是应用不同类型的符号来显示城市中收集的数据的实时流演变。字形的使用是为了最大限度地发挥人类在检测视觉模式方面的能力。
{"title":"Smart City Data Stream Visualization Using Glyphs","authors":"F. Villanueva, C. Aguirre, D. Villa, M. Santofimia, J. C. López","doi":"10.1109/IMIS.2014.46","DOIUrl":"https://doi.org/10.1109/IMIS.2014.46","url":null,"abstract":"Real-time data stream visualization is a challenge in multiple application fields of Smart Cities. Examples of these streams are traffic, pollution, social media activity, citizens dynamic, etc. which show us what, where and when is happening in the city. The purpose of this paper is to apply different types of glyphs for showing real-time stream evolution of data gathered in the city. The use of glyphs is intended to make the most out human capability for outperforming in detecting visual patterns.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124493390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reusing Web-Enabled Actuators from a Semantic Space-Based Perspective 从基于语义空间的角度重用支持web的执行器
Aitor Gómez-Goiri, Íñigo Goiri, D. López-de-Ipiña
Ubiquitous Computing is characterized by heterogeneous devices of a dynamic nature. So far, semantics and space-based computing have been widely applied to cope with both aspects. However, the integration of these devices with the web has gained momentum in the last years. Therefore, the seamless reuse of these web-enabled devices drastically increases the actuation possibilities of any application. This paper explores how semantic space-based applications can perform the aforementioned reuse. This exploration is guided by the implementation of a scenario. The scenario shows a neat interoperation between nodes from both worlds: space-based computing and the web. In addition, the generalization of the proposed solution poses new challenges to be tackled.
泛在计算的特点是具有动态性质的异构设备。到目前为止,语义和空间计算已被广泛应用于处理这两个方面。然而,在过去的几年里,这些设备与网络的整合势头强劲。因此,这些支持网络的设备的无缝重用大大增加了任何应用程序的驱动可能性。本文探讨了基于语义空间的应用程序如何执行上述重用。这种探索以场景的实现为指导。这个场景展示了来自两个世界的节点之间的整齐的互操作:基于空间的计算和网络。此外,所提出的解决办法的普遍化提出了需要解决的新挑战。
{"title":"Reusing Web-Enabled Actuators from a Semantic Space-Based Perspective","authors":"Aitor Gómez-Goiri, Íñigo Goiri, D. López-de-Ipiña","doi":"10.1109/IMIS.2014.45","DOIUrl":"https://doi.org/10.1109/IMIS.2014.45","url":null,"abstract":"Ubiquitous Computing is characterized by heterogeneous devices of a dynamic nature. So far, semantics and space-based computing have been widely applied to cope with both aspects. However, the integration of these devices with the web has gained momentum in the last years. Therefore, the seamless reuse of these web-enabled devices drastically increases the actuation possibilities of any application. This paper explores how semantic space-based applications can perform the aforementioned reuse. This exploration is guided by the implementation of a scenario. The scenario shows a neat interoperation between nodes from both worlds: space-based computing and the web. In addition, the generalization of the proposed solution poses new challenges to be tackled.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
How to Find an Appropriate K for K-Anonymization 如何为K-匿名化找到一个合适的K
S. Kiyomoto, Yutaka Miyake
Personalization has been implemented in a variety of services. k-anonymity is the most common definition for the anonymization of personal data sets, and is considered to be a normal feature of personal data exchanges. However, there is an important issue: How to find an appropriate k for k-anonymity. In this paper, we present a model for finding an appropriate k in k-anonymization. The model suggests that an optimal k exists that is appropriate to the balance between value and risk when personal data are published. This is the first step towards realizing an optimized configuration for publication of personal data.
个性化已经在各种服务中实现。k-匿名是个人数据集匿名化的最常见定义,被认为是个人数据交换的正常特征。然而,有一个重要的问题:如何为k-匿名找到一个合适的k。在本文中,我们提出了一个在k匿名化中寻找合适k的模型。该模型表明,当个人数据发布时,存在一个适合于价值与风险之间平衡的最优k。这是实现个人数据发布优化配置的第一步。
{"title":"How to Find an Appropriate K for K-Anonymization","authors":"S. Kiyomoto, Yutaka Miyake","doi":"10.1109/IMIS.2014.34","DOIUrl":"https://doi.org/10.1109/IMIS.2014.34","url":null,"abstract":"Personalization has been implemented in a variety of services. k-anonymity is the most common definition for the anonymization of personal data sets, and is considered to be a normal feature of personal data exchanges. However, there is an important issue: How to find an appropriate k for k-anonymity. In this paper, we present a model for finding an appropriate k in k-anonymization. The model suggests that an optimal k exists that is appropriate to the balance between value and risk when personal data are published. This is the first step towards realizing an optimized configuration for publication of personal data.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Identification of Windows Executable Programs to Prevent Software Piracy
Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han
Pirated software used to be distributed through physical exchange. The Internet, however, is increasingly being used to distributed pirate software. P2P networks, one-click hosting site, and bit-torrent indexing site are typical examples. To block illegal distribution of software through the Internet, we must identify software stored and distributed on such sites. In this paper, we propose a new scheme for identifying software. In this scheme, we concentrate on Microsoft Windows applications because most piracy targets MS Windows applications. The scheme analyzes PE header and PE (Portable Executable) is the executable file format of Windows. The scheme translates information in the header such as start address, the size of the initialized data, etc. into the unique value and uses the value to identify software in question. We show the proposed scheme can identify software effectively and efficiently through an experiment with 439 sample executable files.
盗版软件过去是通过实物交换的方式进行分发的。然而,互联网越来越多地被用来分发盗版软件。P2P网络、一键式托管网站、bit-torrent索引网站就是典型的例子。为了阻止通过互联网非法分发软件,我们必须识别在这些网站上存储和分发的软件。本文提出了一种新的软件识别方案。在此方案中,我们主要针对微软Windows应用程序,因为大多数盗版针对微软Windows应用程序。该方案分析了PE头文件,PE (Portable Executable)是Windows的可执行文件格式。该方案将头中的信息(如起始地址、初始化数据的大小等)转换为唯一值,并使用该值来识别有问题的软件。通过对439个可执行文件的实验,证明了该方法能够有效地识别软件。
{"title":"Efficient Identification of Windows Executable Programs to Prevent Software Piracy","authors":"Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han","doi":"10.1109/IMIS.2014.29","DOIUrl":"https://doi.org/10.1109/IMIS.2014.29","url":null,"abstract":"Pirated software used to be distributed through physical exchange. The Internet, however, is increasingly being used to distributed pirate software. P2P networks, one-click hosting site, and bit-torrent indexing site are typical examples. To block illegal distribution of software through the Internet, we must identify software stored and distributed on such sites. In this paper, we propose a new scheme for identifying software. In this scheme, we concentrate on Microsoft Windows applications because most piracy targets MS Windows applications. The scheme analyzes PE header and PE (Portable Executable) is the executable file format of Windows. The scheme translates information in the header such as start address, the size of the initialized data, etc. into the unique value and uses the value to identify software in question. We show the proposed scheme can identify software effectively and efficiently through an experiment with 439 sample executable files.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1