首页 > 最新文献

IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004最新文献

英文 中文
An encoding scheme for indexing XML data 索引XML数据的编码方案
Wan-Song Zhang, Daxin Liu, J. Li
E-services are becoming a promising technology for the effective automation of application integration across the Web. They build upon XML, as data format for exchanging messages between applications. Accompanied with WSDL, UDDI, and SOAP, XML has clearly influenced positively the development of applications running on the Web. As the basic technology, indexing scheme for XML data have been studied in recent years to optimize path query processing by summarizing path information. However, most of these schemes based on tree traversals may not meet the processing requirements under heavy access requests. In this paper, we proposed a new scheme for indexing XML data using encoding elements, termed ES-index, and its algorithms. This encoding scheme quickly determines the siblings-siblings and ancestor-descendant relationship in hierarchy of XML data. Our experiment results over a wide range of XML documents demonstrate that ES-index structure is efficient for data access.
电子服务正在成为一种很有前途的技术,可以实现跨Web应用程序集成的有效自动化。它们以XML为基础,作为应用程序之间交换消息的数据格式。与WSDL、UDDI和SOAP一起,XML显然对运行在Web上的应用程序的开发产生了积极的影响。XML数据索引方案是近年来研究的基础技术,通过汇总路径信息来优化路径查询处理。然而,大多数基于树遍历的方案可能无法满足大量访问请求下的处理需求。在本文中,我们提出了一种使用编码元素(称为ES-index)索引XML数据的新方案及其算法。这种编码模式可以快速确定XML数据层次结构中的兄弟-兄弟和祖先-后代关系。我们对各种XML文档的实验结果表明,ES-index结构对于数据访问是有效的。
{"title":"An encoding scheme for indexing XML data","authors":"Wan-Song Zhang, Daxin Liu, J. Li","doi":"10.1109/EEE.2004.1287357","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287357","url":null,"abstract":"E-services are becoming a promising technology for the effective automation of application integration across the Web. They build upon XML, as data format for exchanging messages between applications. Accompanied with WSDL, UDDI, and SOAP, XML has clearly influenced positively the development of applications running on the Web. As the basic technology, indexing scheme for XML data have been studied in recent years to optimize path query processing by summarizing path information. However, most of these schemes based on tree traversals may not meet the processing requirements under heavy access requests. In this paper, we proposed a new scheme for indexing XML data using encoding elements, termed ES-index, and its algorithms. This encoding scheme quickly determines the siblings-siblings and ancestor-descendant relationship in hierarchy of XML data. Our experiment results over a wide range of XML documents demonstrate that ES-index structure is efficient for data access.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125695852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security specification and implementation for mobile e-health services 移动电子医疗服务的安全规范和实现
R. Martí, J. Delgado, X. Perramon
Different IT applications require different security services. We have been working in the area of e-health applications in a mobile environment, and we have needed to integrate specific security services. We present those security services for mobile e-health services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the mobile e-health services are described. As an example of security services integrated into an e-health system, we include the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth project, cofunded by the European Commission (IST-2001-36006), focused on the security services added to it.
不同的IT应用需要不同的安全服务。我们一直致力于移动环境中的电子保健应用领域,我们需要集成特定的安全服务。我们介绍了移动电子医疗服务的这些安全服务以及我们是如何实现它们的。首先,描述了针对电子医疗应用的不同安全威胁,如患者数据窃听和操纵。然后,介绍了解决这些特定安全威胁的不同安全机制,例如数据机密性和完整性,以及动态IP地址的限制。下面描述了安全服务需求的规范以及在移动电子医疗服务中解决这些需求的实现可能性。作为将安全服务集成到电子保健系统中的一个示例,我们包括对移动电子保健服务MobiHealth的描述,这是在MobiHealth项目下开发的一个应用程序,由欧洲委员会(IST-2001-36006)共同资助,重点关注添加到其中的安全服务。
{"title":"Security specification and implementation for mobile e-health services","authors":"R. Martí, J. Delgado, X. Perramon","doi":"10.1109/EEE.2004.1287316","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287316","url":null,"abstract":"Different IT applications require different security services. We have been working in the area of e-health applications in a mobile environment, and we have needed to integrate specific security services. We present those security services for mobile e-health services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the mobile e-health services are described. As an example of security services integrated into an e-health system, we include the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth project, cofunded by the European Commission (IST-2001-36006), focused on the security services added to it.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121486585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A privacy-friendly loyalty system for electronic marketplaces 电子市场的隐私友好型忠诚系统
M. Enzmann, Markus Schneider
Loyalty systems provide an interesting possibility for vendors in customer relationship management. This holds for both real world and online vendors. Beside potential benefits of loyalty systems, customers may fear an invasion of privacy, and thus often refuse to participate in such programs. We present two variants of a privacy-friendly loyalty system to be used by online vendors for issuing loyalty points. The systems prevent vendors from exploiting data for the creation of customer profiles by providing unconditional unlinkability of loyalty points with regard to purchases. We propose a simple token-based approach and a counter-based approach which is much more efficient while preserving the privacy and security properties. Furthermore, the counter-based loyalty system prevents pooling of loyalty points issued to distinct customers.
忠诚系统为供应商在客户关系管理方面提供了一种有趣的可能性。这对现实世界和在线供应商都适用。除了忠诚度系统的潜在好处外,客户可能担心隐私被侵犯,因此通常拒绝参加此类计划。我们提出了一个隐私友好的忠诚系统的两个变体,将被在线供应商用于发布忠诚积分。该系统通过提供有关购买的无条件不可链接的忠诚积分,防止供应商利用数据创建客户档案。我们提出了一种简单的基于令牌的方法和一种基于计数器的方法,它们在保持隐私和安全属性的同时效率更高。此外,基于柜台的忠诚系统防止了向不同客户发放的忠诚积分池。
{"title":"A privacy-friendly loyalty system for electronic marketplaces","authors":"M. Enzmann, Markus Schneider","doi":"10.1109/EEE.2004.1287337","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287337","url":null,"abstract":"Loyalty systems provide an interesting possibility for vendors in customer relationship management. This holds for both real world and online vendors. Beside potential benefits of loyalty systems, customers may fear an invasion of privacy, and thus often refuse to participate in such programs. We present two variants of a privacy-friendly loyalty system to be used by online vendors for issuing loyalty points. The systems prevent vendors from exploiting data for the creation of customer profiles by providing unconditional unlinkability of loyalty points with regard to purchases. We propose a simple token-based approach and a counter-based approach which is much more efficient while preserving the privacy and security properties. Furthermore, the counter-based loyalty system prevents pooling of loyalty points issued to distinct customers.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125465651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A mobile ticket validation by VSS tech with time-stamp 一个移动票证验证由VSS技术与时间戳
Chun-Te Chen, Te-Chung Lu
Mobile commerce is becoming increasingly important in business. We find the e-ticket to be a popular way of implementing m-com. In order to solve some authentication drawback we propose a mobile ticket validation method using VSS (Visual Secret Sharing) technology with a time-stamp protocol on the mobile environment. The VSS encryption technology separates the ticket into two parts; one part of the ticket is sent to the user after purchasing. The other part is sent to the user when the time-stamp is reached. The time-stamp protocol can provide secure and fast verification. In our validation method, we offer lightweight load for a mobile device and simple identification work.
移动商务在商业中变得越来越重要。我们发现电子票是一种流行的实现移动通信的方式。为了解决一些身份验证的缺陷,我们提出了一种在移动环境下使用带有时间戳协议的VSS(可视秘密共享)技术的移动票据验证方法。VSS加密技术将票证分成两部分;用户购买后,票券的一部分被发送给用户。另一部分在达到时间戳时发送给用户。时间戳协议可以提供安全、快速的验证。在我们的验证方法中,我们为移动设备提供轻量级负载和简单的识别工作。
{"title":"A mobile ticket validation by VSS tech with time-stamp","authors":"Chun-Te Chen, Te-Chung Lu","doi":"10.1109/EEE.2004.1287321","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287321","url":null,"abstract":"Mobile commerce is becoming increasingly important in business. We find the e-ticket to be a popular way of implementing m-com. In order to solve some authentication drawback we propose a mobile ticket validation method using VSS (Visual Secret Sharing) technology with a time-stamp protocol on the mobile environment. The VSS encryption technology separates the ticket into two parts; one part of the ticket is sent to the user after purchasing. The other part is sent to the user when the time-stamp is reached. The time-stamp protocol can provide secure and fast verification. In our validation method, we offer lightweight load for a mobile device and simple identification work.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134233857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Model-driven Web services development 模型驱动的Web服务开发
Roy Grønmo, D. Skogan, I. Solheim, Jon Oldevik
Web service technologies are becoming increasingly important for integrating systems and services. There is much activity and interest around standardization and usage of Web service technologies. The unified modeling language (UML) and the model driven architecture (MDA)/spl trade/ provide a framework that can be applied to Web service development. We describe a model-driven Web service development process, where Web service descriptions are imported into UML models; integrated into composite Web services; and the new Web service descriptions are exported. The main contributions are conversion rules between UML and Web services described by Web service description language (WSDL) documents and XML schema.
Web服务技术对于集成系统和服务变得越来越重要。围绕Web服务技术的标准化和使用有很多活动和兴趣。统一建模语言(UML)和模型驱动体系结构(MDA)/spl交换/提供了一个可以应用于Web服务开发的框架。我们描述了一个模型驱动的Web服务开发过程,其中Web服务描述被导入到UML模型中;集成到复合Web服务中;并导出新的Web服务描述。主要贡献是UML与Web服务描述语言(WSDL)文档和XML模式描述的Web服务之间的转换规则。
{"title":"Model-driven Web services development","authors":"Roy Grønmo, D. Skogan, I. Solheim, Jon Oldevik","doi":"10.1109/EEE.2004.1287288","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287288","url":null,"abstract":"Web service technologies are becoming increasingly important for integrating systems and services. There is much activity and interest around standardization and usage of Web service technologies. The unified modeling language (UML) and the model driven architecture (MDA)/spl trade/ provide a framework that can be applied to Web service development. We describe a model-driven Web service development process, where Web service descriptions are imported into UML models; integrated into composite Web services; and the new Web service descriptions are exported. The main contributions are conversion rules between UML and Web services described by Web service description language (WSDL) documents and XML schema.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 148
Multifunctioal ICMP messages for e-commerce 用于电子商务的多功能ICMP消息
B. Wang, H. Schulzrinne
Denial-of-Service (DoS) attacks has been threatening our evolving eCommerce and eServices on the Internet for years. Regarding today's stateless Internet environment, researchers have designed various schemes carrying additional information to providing information for defending packet flooding attacks, packet dropping attacks, and routing protocol attacks. We present a multifunctional scheme, the ICMP Caddie message scheme (iCaddie), which loads specialized ICMP messages with route information of randomly-selected IP packets, to support IP traceback, packet dropping detention, routing protocol protection, differential services as well as message authentication and authorization.
多年来,拒绝服务(DoS)攻击一直威胁着我们不断发展的互联网电子商务和电子服务。针对当今无状态的互联网环境,研究人员设计了各种携带附加信息的方案,为防御包洪攻击、丢包攻击和路由协议攻击提供信息。提出了一种多功能的ICMP Caddie消息方案(iCaddie),该方案将随机选择的IP数据包的路由信息加载到特定的ICMP消息中,以支持IP回溯、丢包滞留、路由协议保护、差分服务以及消息认证和授权。
{"title":"Multifunctioal ICMP messages for e-commerce","authors":"B. Wang, H. Schulzrinne","doi":"10.1109/EEE.2004.1287330","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287330","url":null,"abstract":"Denial-of-Service (DoS) attacks has been threatening our evolving eCommerce and eServices on the Internet for years. Regarding today's stateless Internet environment, researchers have designed various schemes carrying additional information to providing information for defending packet flooding attacks, packet dropping attacks, and routing protocol attacks. We present a multifunctional scheme, the ICMP Caddie message scheme (iCaddie), which loads specialized ICMP messages with route information of randomly-selected IP packets, to support IP traceback, packet dropping detention, routing protocol protection, differential services as well as message authentication and authorization.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Portfolio management using hybrid recommendation system 使用混合推荐系统的投资组合管理
Chiu-Che Tseng
The goal of a decision support system is to provide the human user with an optimized decision recommendation when operating under uncertainty in complex environments. The particular focus of our discussion is the investment domain - the goal of investment decision-making is to select an optimal portfolio that satisfies the investor's objective, or, in other words, to maximize the investment returns under the constraints given by investors. The investment domain contains numerous and diverse information sources, such as expert opinions, news releases and economic figures, and so on. This presents the potential for better decision support, but poses the challenge of building a decision support agent for accessing, filtering, evaluating, incorporating information from different sources, and for making final investment recommendations. We proposed a hybrid recommendation system that utilized two different artificial intelligence techniques to provide human user a decision recommendation on stock portfolio management.
决策支持系统的目标是在复杂的不确定环境下为人类用户提供优化的决策建议。我们讨论的重点是投资领域——投资决策的目标是选择一个满足投资者目标的最优投资组合,换句话说,在投资者给定的约束条件下,使投资回报最大化。投资领域包含大量不同的信息来源,如专家意见、新闻发布和经济数据等。这提供了更好的决策支持的潜力,但也提出了构建决策支持代理的挑战,以便访问、过滤、评估、合并来自不同来源的信息,并提出最终的投资建议。我们提出了一种混合推荐系统,利用两种不同的人工智能技术为人类用户提供股票投资组合管理决策推荐。
{"title":"Portfolio management using hybrid recommendation system","authors":"Chiu-Che Tseng","doi":"10.1109/EEE.2004.1287310","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287310","url":null,"abstract":"The goal of a decision support system is to provide the human user with an optimized decision recommendation when operating under uncertainty in complex environments. The particular focus of our discussion is the investment domain - the goal of investment decision-making is to select an optimal portfolio that satisfies the investor's objective, or, in other words, to maximize the investment returns under the constraints given by investors. The investment domain contains numerous and diverse information sources, such as expert opinions, news releases and economic figures, and so on. This presents the potential for better decision support, but poses the challenge of building a decision support agent for accessing, filtering, evaluating, incorporating information from different sources, and for making final investment recommendations. We proposed a hybrid recommendation system that utilized two different artificial intelligence techniques to provide human user a decision recommendation on stock portfolio management.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126128856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Structure-based analysis of Web sites 基于结构的网站分析
B. Yen
The performance of information retrieval on the Web is heavily influenced by the organization of Web pages, user navigation patterns, and guidance-related functions. Having observed the lack of measures to reflect this factor, this paper focuses on an approach based on both structure properties and navigation data to analyze and improve the performance of Web site. Two types of indices are defined two major factors for analysis and improvement - "accessibility" reflects the structure property to measure how easy the user can access the pages and "popularity" implies the navigation data primarily based on the log statistics. The accessibility and popularity (A-P) plot serves as a compass for the Web designer to get an overview of current performance status and explore in the possible directions for improvement to balance the design anticipation and navigation expectation.
Web上的信息检索性能在很大程度上受到Web页面的组织、用户导航模式和与指南相关的功能的影响。在观察到缺乏反映这一因素的度量后,本文重点研究了一种基于结构属性和导航数据的方法来分析和改进网站的性能。定义了两种类型的索引,用于分析和改进的两个主要因素——“可访问性”反映了用于衡量用户访问页面的容易程度的结构属性,而“流行度”意味着主要基于日志统计的导航数据。可访问性和流行度(a - p)图为Web设计人员提供了一个指南针,可以获得当前性能状态的概述,并探索可能的改进方向,以平衡设计预期和导航预期。
{"title":"Structure-based analysis of Web sites","authors":"B. Yen","doi":"10.1109/EEE.2004.1287358","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287358","url":null,"abstract":"The performance of information retrieval on the Web is heavily influenced by the organization of Web pages, user navigation patterns, and guidance-related functions. Having observed the lack of measures to reflect this factor, this paper focuses on an approach based on both structure properties and navigation data to analyze and improve the performance of Web site. Two types of indices are defined two major factors for analysis and improvement - \"accessibility\" reflects the structure property to measure how easy the user can access the pages and \"popularity\" implies the navigation data primarily based on the log statistics. The accessibility and popularity (A-P) plot serves as a compass for the Web designer to get an overview of current performance status and explore in the possible directions for improvement to balance the design anticipation and navigation expectation.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Suppressing false alarms of intrusion detection using improved text categorization method 基于改进文本分类方法的入侵检测虚警抑制
Zonghua Zhang, Hong Shen
Although some text processing techniques can be employed to intrusion detection based on the characterization of the frequencies of the system calls executed by the privileged programs, and achieve satisfactory detection accuracy, high false alarms make it hardly practicable in real life. We modify the traditional weighting method tf-idf for suppressing false alarms by considering the necessary information between the processes and sessions. Preliminary experiments with 1998 DARPA BSM auduit data show that our modified method can suppress high false alarms effectively while maintaining satisfactory detection accuracy, which thus make text categorization approaches more practicable for intrusion detection.
虽然一些文本处理技术可以根据特权程序执行的系统调用的频率特征进行入侵检测,并获得令人满意的检测精度,但高虚警使其在现实生活中难以实现。通过考虑进程和会话之间的必要信息,改进了传统的加权方法tf-idf来抑制虚警。对1998年DARPA BSM审计数据进行的初步实验表明,改进后的方法能够有效地抑制高虚警,同时保持较好的检测准确率,从而使文本分类方法在入侵检测中更加实用。
{"title":"Suppressing false alarms of intrusion detection using improved text categorization method","authors":"Zonghua Zhang, Hong Shen","doi":"10.1109/EEE.2004.1287303","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287303","url":null,"abstract":"Although some text processing techniques can be employed to intrusion detection based on the characterization of the frequencies of the system calls executed by the privileged programs, and achieve satisfactory detection accuracy, high false alarms make it hardly practicable in real life. We modify the traditional weighting method tf-idf for suppressing false alarms by considering the necessary information between the processes and sessions. Preliminary experiments with 1998 DARPA BSM auduit data show that our modified method can suppress high false alarms effectively while maintaining satisfactory detection accuracy, which thus make text categorization approaches more practicable for intrusion detection.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spreading activation models for trust propagation 用于信任传播的扩展激活模型
Cai-Nicolas Ziegler, G. Lausen
Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contributions to semantic Web trust management are twofold. First, we introduce our classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for semantic Web scenarios. Hereby, we devise our advocacy for local group trust metrics, guiding us to the second part which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion.
语义网的努力主要集中在与知识表示和本体设计有关的问题上。然而,除了理解主体陈述的信息元数据外,了解其可信度也同样至关重要。因此,信任和信任度量,被认为是评估个体之间信任关系的计算手段,开始发挥作用。我们对语义Web信任管理的主要贡献有两个方面。首先,我们沿着不同的轴介绍了我们的信任度量分类方案,并讨论了语义Web场景中现有方法的优缺点。在此,我们设计了我们对本地组信任度量的倡导,并引导我们进入第二部分,介绍了我们对本地组信任计算的新提议Appleseed。Appleseed从心理学的传播激活模型中借鉴了许多想法,并以直观的方式将其概念与信任评估联系起来,其简洁令人信服。
{"title":"Spreading activation models for trust propagation","authors":"Cai-Nicolas Ziegler, G. Lausen","doi":"10.1109/EEE.2004.1287293","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287293","url":null,"abstract":"Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contributions to semantic Web trust management are twofold. First, we introduce our classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for semantic Web scenarios. Hereby, we devise our advocacy for local group trust metrics, guiding us to the second part which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126610192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 346
期刊
IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1