首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Revocable Identity-Based Signature without Pairing 可撤销的基于身份的无配对签名
Yinxia Sun, Futai Zhang, Limin Shen, R. Deng
In an identity based cryptosystem, a user's identity is used as its public key. So, a digital certificate is no longer needed for the authenticity of a public key. However, a necessary problem arises: how to prove that a user is revoked or non-revoked? The ideal revocation mechanism is to update every user's private key at every time period by the private key generater (PKG). Most of the existing works are revocable identity based encryption. In this paper, we present a revocable identity based signature scheme, which is more efficient than previous solutions. In our scheme, a user's private key is composed of both an initial private key and a time key. The time key is periodically updated by PKG, and is transmitted over a public channel. In addition, the new scheme does not use the expensive bilinear pairings. Formal security proofs are provided in the random oracle model under the standard Discrete Logarithm assumption. We also extend the new scheme to be decryption-key-exposure resilient.
在基于身份的密码系统中,用户的身份被用作其公钥。因此,不再需要数字证书来保证公钥的真实性。但是,出现了一个必要的问题:如何证明用户已被撤销或未被撤销?理想的撤销机制是由私钥生成器(PKG)在每个时间段更新每个用户的私钥。现有的大部分工作都是基于可撤销身份的加密。在本文中,我们提出了一个可撤销的基于身份的签名方案,该方案比以前的方案更有效。在我们的方案中,用户的私钥由初始私钥和时间密钥组成。时间密钥由PKG定期更新,并通过公共通道传输。此外,新方案不使用昂贵的双线性对。在标准离散对数假设下,给出了随机oracle模型的形式化安全性证明。我们还扩展了新方案,使其具有解密密钥暴露的弹性。
{"title":"Revocable Identity-Based Signature without Pairing","authors":"Yinxia Sun, Futai Zhang, Limin Shen, R. Deng","doi":"10.1109/INCoS.2013.68","DOIUrl":"https://doi.org/10.1109/INCoS.2013.68","url":null,"abstract":"In an identity based cryptosystem, a user's identity is used as its public key. So, a digital certificate is no longer needed for the authenticity of a public key. However, a necessary problem arises: how to prove that a user is revoked or non-revoked? The ideal revocation mechanism is to update every user's private key at every time period by the private key generater (PKG). Most of the existing works are revocable identity based encryption. In this paper, we present a revocable identity based signature scheme, which is more efficient than previous solutions. In our scheme, a user's private key is composed of both an initial private key and a time key. The time key is periodically updated by PKG, and is transmitted over a public channel. In addition, the new scheme does not use the expensive bilinear pairings. Formal security proofs are provided in the random oracle model under the standard Discrete Logarithm assumption. We also extend the new scheme to be decryption-key-exposure resilient.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127349216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On Three-Dimensional Digital Earth Application Development Framework and Its Applications 三维数字地球应用开发框架及其应用
Zenghui Zhao, Jingnong Weng, Huaizhou Wang, Junyi Zhao, Jingui Li, Anda Li
Digital Earth has the extraordinary ability of integrating multi-source, heterogeneous, multi-scale spatial and temporal information with three dimensional, dynamic and interactive features and provides abundant visualization methods of temporal analysis and statistics. A kind of novel applications were developed based on Three-dimensional Digital Earth Application Development Framework, namely WikiGlobe ADF. It provides a new perspective for people understand and discover various kinds of knowledge about our living planet. These applications can be widely used in fields of education, humanity, history and tourism. Their properties of user participation and lightweight can satisfy the needs of developing personalized thematic applications and provide a well-interactive platform of spatial information service for the public. In this paper, the application characters and current trends of digital earth was analyzed, and architecture of WikiGlobe ADF was described then, the features and the realization mechanism of the framework were discussed. Based on the work above, several examples developed through the WikiGlobe ADF were presented.
数字地球具有非凡的多源、异构、多尺度时空信息的三维、动态、交互集成能力,提供了丰富的时间分析和统计可视化方法。基于三维数字地球应用开发框架WikiGlobe ADF开发了一种新型应用。它为人们了解和发现我们生活的星球的各种知识提供了一个新的视角。这些应用可以广泛应用于教育、人文、历史、旅游等领域。其用户参与性和轻量化的特点可以满足开发个性化专题应用的需求,为公众提供一个交互性良好的空间信息服务平台。分析了数字地球的应用特点和发展趋势,介绍了WikiGlobe ADF的体系结构,讨论了该框架的特点和实现机制。基于上述工作,介绍了通过WikiGlobe ADF开发的几个示例。
{"title":"On Three-Dimensional Digital Earth Application Development Framework and Its Applications","authors":"Zenghui Zhao, Jingnong Weng, Huaizhou Wang, Junyi Zhao, Jingui Li, Anda Li","doi":"10.1109/INCoS.2013.147","DOIUrl":"https://doi.org/10.1109/INCoS.2013.147","url":null,"abstract":"Digital Earth has the extraordinary ability of integrating multi-source, heterogeneous, multi-scale spatial and temporal information with three dimensional, dynamic and interactive features and provides abundant visualization methods of temporal analysis and statistics. A kind of novel applications were developed based on Three-dimensional Digital Earth Application Development Framework, namely WikiGlobe ADF. It provides a new perspective for people understand and discover various kinds of knowledge about our living planet. These applications can be widely used in fields of education, humanity, history and tourism. Their properties of user participation and lightweight can satisfy the needs of developing personalized thematic applications and provide a well-interactive platform of spatial information service for the public. In this paper, the application characters and current trends of digital earth was analyzed, and architecture of WikiGlobe ADF was described then, the features and the realization mechanism of the framework were discussed. Based on the work above, several examples developed through the WikiGlobe ADF were presented.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126583485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods for Determining the Restoration Order of Base Nodes in the Virtual Segment Network 虚拟网段中基本节点恢复顺序的确定方法
H. Tsuji, A. Fujihara, H. Miwa
Virtual Segment (VS) is an architecture design for delay tolerant network to efficiently perform the store-carry-and-forward routing along traffic flows of vehicles on roadway networks. VS network consists of three types of node: Corresponding Node (CN), Relay Node (RN), and Base Node (BN). CN is a stationary node as the roles of a sender and a receiver of messages, RN is a movable node as a vehicle to relay the messages, and BN is a stationary gateway to the core backbone network connecting all the BNs as a reliable high-speed communication network. The VS network is considered to be effective for message forwarding in disaster situations since RNs are flexible to transfer messages between CNs and BNs. However, effects of breakdown of BNs by disaster have not been well studied even though the failure of message transfer between BNs seriously degrade the performance of the arrival rate of forwarding messages. In this paper, we investigate some disaster scenarios using our traffic simulator of vehicles and also our mathematical model of the VS network to simulate the effects of the disruption of BNs on the performance. We consider some methods to determine the restoration order of broken BNs and numerically compare the performance of the arrival rate. As a result, we found that the performance of the arrival rate is quickly recovered by the preferential restoration of frequently used BNs.
虚拟网段(Virtual Segment, VS)是一种针对容延迟网络的架构设计,目的是为了在道路网络中有效地执行车辆的存储-携带-转发路由。VS网络由三种类型的节点组成:对应节点(CN)、中继节点(RN)和基础节点(BN)。CN是作为消息发送者和接收者角色的固定节点,RN是作为中继消息载体的移动节点,BN是连接所有BN的核心骨干网的固定网关,作为可靠的高速通信网络。由于RNs可以灵活地在CNs和bn之间传递消息,因此VS网络被认为是在灾难情况下有效的消息转发。然而,尽管在bn之间的消息传递失败严重降低了转发消息到达率的性能,但由于灾难导致的bn故障的影响尚未得到很好的研究。在本文中,我们使用我们的车辆交通模拟器和我们的VS网络数学模型来研究一些灾难场景,以模拟bn中断对性能的影响。我们考虑了几种确定破损bn恢复顺序的方法,并对到达率的性能进行了数值比较。结果发现,通过优先恢复频繁使用的bn,可以快速恢复到达率的性能。
{"title":"Methods for Determining the Restoration Order of Base Nodes in the Virtual Segment Network","authors":"H. Tsuji, A. Fujihara, H. Miwa","doi":"10.1109/INCoS.2013.85","DOIUrl":"https://doi.org/10.1109/INCoS.2013.85","url":null,"abstract":"Virtual Segment (VS) is an architecture design for delay tolerant network to efficiently perform the store-carry-and-forward routing along traffic flows of vehicles on roadway networks. VS network consists of three types of node: Corresponding Node (CN), Relay Node (RN), and Base Node (BN). CN is a stationary node as the roles of a sender and a receiver of messages, RN is a movable node as a vehicle to relay the messages, and BN is a stationary gateway to the core backbone network connecting all the BNs as a reliable high-speed communication network. The VS network is considered to be effective for message forwarding in disaster situations since RNs are flexible to transfer messages between CNs and BNs. However, effects of breakdown of BNs by disaster have not been well studied even though the failure of message transfer between BNs seriously degrade the performance of the arrival rate of forwarding messages. In this paper, we investigate some disaster scenarios using our traffic simulator of vehicles and also our mathematical model of the VS network to simulate the effects of the disruption of BNs on the performance. We consider some methods to determine the restoration order of broken BNs and numerically compare the performance of the arrival rate. As a result, we found that the performance of the arrival rate is quickly recovered by the preferential restoration of frequently used BNs.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127892096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Security Framework on MapReduce MapReduce安全框架的设计
Zhen Guo, Xudong Zhu, Lijun Guo, S. Kang
To deploy Map-Reduce as a data processing service over cloud computing, we must provide necessary security mechanisms to protect customers confidential data processed. In this paper, we present Map-Reduce based framework which provides strong security and privacy guarantees for distributed computations on sensitive data. The framework is a novel integration of access control via attribute-based encryption, and privacy-preserving aggregate computation via homomorphic encryption. Data providers control the security policy for their sensitive data. Users without security expertise can perform computations on the data, but the framework confines these computations, preventing information leakage beyond the data provider's policy. Our prototype implementation demonstrates the flexibility of the framework on several case studies. It was proved more efficient than fully homomorphic encryption.
为了在云计算上部署Map-Reduce作为数据处理服务,我们必须提供必要的安全机制来保护处理的客户机密数据。本文提出了基于Map-Reduce的分布式计算框架,为敏感数据的分布式计算提供了强大的安全和隐私保障。该框架是通过基于属性的加密实现访问控制和通过同态加密实现保护隐私的聚合计算的新颖集成。数据提供者控制其敏感数据的安全策略。没有安全专业知识的用户可以对数据执行计算,但是框架限制了这些计算,防止信息泄露超出数据提供者的策略。我们的原型实现在几个案例研究中展示了框架的灵活性。它被证明比完全同态加密更有效。
{"title":"Design of a Security Framework on MapReduce","authors":"Zhen Guo, Xudong Zhu, Lijun Guo, S. Kang","doi":"10.1109/INCoS.2013.29","DOIUrl":"https://doi.org/10.1109/INCoS.2013.29","url":null,"abstract":"To deploy Map-Reduce as a data processing service over cloud computing, we must provide necessary security mechanisms to protect customers confidential data processed. In this paper, we present Map-Reduce based framework which provides strong security and privacy guarantees for distributed computations on sensitive data. The framework is a novel integration of access control via attribute-based encryption, and privacy-preserving aggregate computation via homomorphic encryption. Data providers control the security policy for their sensitive data. Users without security expertise can perform computations on the data, but the framework confines these computations, preventing information leakage beyond the data provider's policy. Our prototype implementation demonstrates the flexibility of the framework on several case studies. It was proved more efficient than fully homomorphic encryption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121180954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IDPKC-to-TPKC Construction of Multi-receiver Signcryption 多接收方签名的IDPKC-to-TPKC构造
Xiaotong Fu, Xiaowei Li, Wen Liu
Multi-receiver signcrption is useful in many applications such as secure email systems. In this paper, we propose a new efficient construction of multi-receiver signcryption from identity-based public key cryptosystem to traditional public key cryptosystem. The new scheme enables a user in IDPKC successfully broadcast messages, not only in authentic way but also in privately way, to users in TPKC. Furthermore, the security proof shows the proposed scheme is secure under the hardness of Generalized Bilinear Diffie-Hellman Problem in the random oracle.
多接收者签名在安全电子邮件系统等许多应用中都很有用。本文提出了一种从基于身份的公钥密码体制到传统公钥密码体制的高效的多接收方签名加密结构。新方案使IDPKC中的用户能够成功地向TPKC中的用户广播消息,不仅以真实的方式,而且以私有的方式。此外,安全性证明表明,该方案在随机预测中的广义双线性Diffie-Hellman问题的硬度下是安全的。
{"title":"IDPKC-to-TPKC Construction of Multi-receiver Signcryption","authors":"Xiaotong Fu, Xiaowei Li, Wen Liu","doi":"10.1109/INCoS.2013.62","DOIUrl":"https://doi.org/10.1109/INCoS.2013.62","url":null,"abstract":"Multi-receiver signcrption is useful in many applications such as secure email systems. In this paper, we propose a new efficient construction of multi-receiver signcryption from identity-based public key cryptosystem to traditional public key cryptosystem. The new scheme enables a user in IDPKC successfully broadcast messages, not only in authentic way but also in privately way, to users in TPKC. Furthermore, the security proof shows the proposed scheme is secure under the hardness of Generalized Bilinear Diffie-Hellman Problem in the random oracle.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116699818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information Entropy Model for Anonymity Measurement 匿名度量的信息熵模型
Jun Ye, Yong Ding, Xin-Guo Li
Along with anonymous communications system being widely researched, anonymity measurement becomes more and more significant. However, there is still no desired mathematical model for this. In this paper, some necessary features for anonymity measurement model are analyzed and a dynamic model based on information entropy is proposed. Then some analyses, as well as the practicality of our model illustrated with some examples are given. Finally, comparisons with other models are made to show advantages of our model.
随着匿名通信系统的广泛研究,匿名度量变得越来越重要。然而,仍然没有理想的数学模型。本文分析了匿名度量模型的一些必要特征,提出了一个基于信息熵的动态模型。然后对该模型进行了分析,并通过实例说明了该模型的实用性。最后,通过与其他模型的比较,说明了本模型的优越性。
{"title":"Information Entropy Model for Anonymity Measurement","authors":"Jun Ye, Yong Ding, Xin-Guo Li","doi":"10.1109/INCoS.2013.58","DOIUrl":"https://doi.org/10.1109/INCoS.2013.58","url":null,"abstract":"Along with anonymous communications system being widely researched, anonymity measurement becomes more and more significant. However, there is still no desired mathematical model for this. In this paper, some necessary features for anonymity measurement model are analyzed and a dynamic model based on information entropy is proposed. Then some analyses, as well as the practicality of our model illustrated with some examples are given. Finally, comparisons with other models are made to show advantages of our model.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125609456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BDI Goal Recognition for Agent Program Learning 智能体程序学习的BDI目标识别
Hongyun Xu, Youqun Shi, Qiying Cao
Agent applications are often viewed as unduly expensive to develop and maintain in commercial contexts. Organizations often settle for less sophisticated and more traditional software in place of agent technology because of (often misplaced) fears about the development and maintenance costs of agent technology, and the often mistaken perception that traditional software offers better returns on investment. This paper aims to redress this by developing a plan recognition framework for agent program learning, where behavior logs of legacy applications (or even manually executed processes) are mined to extract a 'draft' version of agent code that could eventually replace these applications or processes. We develop and implement techniques for inferring agent plans, specifically inferring agent goals. We propose two ways to infer goals for plans without and with a goal library respectively. Besides, a preferred goal is considered when a goal library is provided, using the notions of consistency, maximal entailment and minimality. The complexity of the plan recognition framework is analyzed and the experimental results show that the average runtime for generating Belief-Desire-Intention (BDI) plans relying on the number of expansion nodes, choice branching factor and parallel branching factor in workflow nets (WF-nets), and that the plan recognition framework is feasible and computable.
代理应用程序通常被认为在商业环境中开发和维护成本过高。组织经常满足于使用不那么复杂和更传统的软件来代替代理技术,因为(通常是错误的)担心代理技术的开发和维护成本,并且经常错误地认为传统软件提供更好的投资回报。本文旨在通过开发一个智能体程序学习的计划识别框架来纠正这一问题,其中挖掘遗留应用程序(甚至手动执行的过程)的行为日志,以提取最终可能取代这些应用程序或过程的智能体代码的“草案”版本。我们开发并实现了推断代理计划的技术,特别是推断代理目标的技术。我们分别提出了两种方法来推断没有目标库和有目标库的计划的目标。此外,在提供目标库时,使用一致性、最大蕴涵和最小性的概念考虑首选目标。分析了该计划识别框架的复杂性,实验结果表明,基于工作流网络(WF-nets)中扩展节点数、选择分支因子和并行分支因子的BDI (Belief-Desire-Intention)计划生成的平均运行时间,证明了该计划识别框架的可行性和可计算性。
{"title":"BDI Goal Recognition for Agent Program Learning","authors":"Hongyun Xu, Youqun Shi, Qiying Cao","doi":"10.1109/INCoS.2013.72","DOIUrl":"https://doi.org/10.1109/INCoS.2013.72","url":null,"abstract":"Agent applications are often viewed as unduly expensive to develop and maintain in commercial contexts. Organizations often settle for less sophisticated and more traditional software in place of agent technology because of (often misplaced) fears about the development and maintenance costs of agent technology, and the often mistaken perception that traditional software offers better returns on investment. This paper aims to redress this by developing a plan recognition framework for agent program learning, where behavior logs of legacy applications (or even manually executed processes) are mined to extract a 'draft' version of agent code that could eventually replace these applications or processes. We develop and implement techniques for inferring agent plans, specifically inferring agent goals. We propose two ways to infer goals for plans without and with a goal library respectively. Besides, a preferred goal is considered when a goal library is provided, using the notions of consistency, maximal entailment and minimality. The complexity of the plan recognition framework is analyzed and the experimental results show that the average runtime for generating Belief-Desire-Intention (BDI) plans relying on the number of expansion nodes, choice branching factor and parallel branching factor in workflow nets (WF-nets), and that the plan recognition framework is feasible and computable.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127722413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed SR-LDPC Codes over Multiple-Access Relay Channel 多址中继信道上的分布式SR-LDPC码
Rong Sun, Jingwei Liu
This paper proposes a novel encoding procedure to realize codes that resemble SR-LDPC codes (rate less codes for erasure correction). For the case of two sources communicating with a single destination via a common relay, the two sources separately encode their own symbols of information using SR-LDPC codes. The two code words are then XOR-ed at the relay. The destination can recover the information from the two sources.
本文提出了一种新的编码方法来实现类似SR-LDPC码(用于擦除校正的低速率码)的编码。对于两个源通过公共中继与单个目的地通信的情况,两个源分别使用SR-LDPC码对自己的信息符号进行编码。然后,这两个码字在继电器上被异或截断。目的地可以从两个源恢复信息。
{"title":"Distributed SR-LDPC Codes over Multiple-Access Relay Channel","authors":"Rong Sun, Jingwei Liu","doi":"10.1109/INCoS.2013.117","DOIUrl":"https://doi.org/10.1109/INCoS.2013.117","url":null,"abstract":"This paper proposes a novel encoding procedure to realize codes that resemble SR-LDPC codes (rate less codes for erasure correction). For the case of two sources communicating with a single destination via a common relay, the two sources separately encode their own symbols of information using SR-LDPC codes. The two code words are then XOR-ed at the relay. The destination can recover the information from the two sources.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122776673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolution of Scale-Freeness in a Co-authorship Network 合作网络中无标度性的演化
P. Krömer, M. Kudelka, Z. Horak, V. Snás̃el
Many natural networks including social networks are scale-free, i.e. the distribution of node degrees in the network is heavy-tailed and follows the power law. In this work we analyze the scale-free properties of selected subnets of a complex co-authorship network induced by significant nodes (authors) and the evolution of these properties in time. The subnets induced by significant authors are sampled at different times and the power law parameters are estimated analytically. The study provides an empirical overview of the scale-freeness and evolution of power law parameters in a dynamic co-authorship network.
包括社交网络在内的许多自然网络都是无标度的,即网络中节点度的分布是重尾的,遵循幂律。在这项工作中,我们分析了由重要节点(作者)引起的复杂合著网络中选定子网的无标度特性以及这些特性随时间的演变。在不同时间对重要作者诱导的子网进行采样,并对幂律参数进行分析估计。该研究提供了动态合作网络中幂律参数的无标度性和演化的经验概述。
{"title":"Evolution of Scale-Freeness in a Co-authorship Network","authors":"P. Krömer, M. Kudelka, Z. Horak, V. Snás̃el","doi":"10.1109/INCoS.2013.127","DOIUrl":"https://doi.org/10.1109/INCoS.2013.127","url":null,"abstract":"Many natural networks including social networks are scale-free, i.e. the distribution of node degrees in the network is heavy-tailed and follows the power law. In this work we analyze the scale-free properties of selected subnets of a complex co-authorship network induced by significant nodes (authors) and the evolution of these properties in time. The subnets induced by significant authors are sampled at different times and the power law parameters are estimated analytically. The study provides an empirical overview of the scale-freeness and evolution of power law parameters in a dynamic co-authorship network.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Proof of Retrievability with Public Auditing in Cloud Computing 基于公共审计的云计算可检索性的有效证明
Jin Li, Xiao Tan, Xiaofeng Chen, D. Wong
Cloud Computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in Cloud Computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users to compute the public authentication tags of file blocks. To tackle the challenge, we propose a new cloud storage architecture with two independent cloud servers, that is, the cloud storage server and the cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. The introduction of cloud audit server eliminates the involvement of user in the auditing and in the pre-processing phases.
云计算将应用软件和数据库转移到集中的大型数据中心,在那里对数据和服务的管理可能不完全值得信赖。本文主要研究了云计算中数据存储完整性的保障问题。为了减少用户在数据完整性验证过程中的计算成本,提出了公共可验证性的概念。然而,其挑战在于计算量太大,用户无法计算文件块的公共身份验证标记。为了应对这一挑战,我们提出了一种新的云存储架构,它具有两个独立的云服务器,即云存储服务器和云审计服务器,其中后者被假设为半诚实的。我们特别考虑让云审计服务器代表云用户,在数据上传到云存储服务器之前对数据进行预处理,然后再验证数据的完整性。云审计服务器的引入消除了用户在审计和预处理阶段的参与。
{"title":"An Efficient Proof of Retrievability with Public Auditing in Cloud Computing","authors":"Jin Li, Xiao Tan, Xiaofeng Chen, D. Wong","doi":"10.1109/INCoS.2013.185","DOIUrl":"https://doi.org/10.1109/INCoS.2013.185","url":null,"abstract":"Cloud Computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in Cloud Computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users to compute the public authentication tags of file blocks. To tackle the challenge, we propose a new cloud storage architecture with two independent cloud servers, that is, the cloud storage server and the cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. The introduction of cloud audit server eliminates the involvement of user in the auditing and in the pre-processing phases.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1