Pub Date : 2008-12-01DOI: 10.1109/ICDIM.2008.4746756
A. Naseer, L. Stergioulas, Suhel Hammoud, Maozhen Li
Healthcare data and medical information need to be seamlessly accessible and available at all times to the various healthcare stakeholders. Inability to share, integrate and access critical healthcare information is a challenge for the healthcare IT. Moreover, semantic interoperability of health-related heterogeneous data sources is a challenging issue and healthGrids are expected to address this challenge in a systematic manner. This paper proposes a new architecture: ASIDS (architecture for semantic integration of data sources), that could be a potential candidate for solving the challenge of semantic interoperability of geographically distributed heterogeneous data sources. ASIDS has three main components that are loosely coupled (through interfaces) in a distributed manner. This architecture sets the basis for future research in terms of implementing a healthGrid application in real environments.
{"title":"Grid-based Semantic Integration and dissemination of medical information","authors":"A. Naseer, L. Stergioulas, Suhel Hammoud, Maozhen Li","doi":"10.1109/ICDIM.2008.4746756","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746756","url":null,"abstract":"Healthcare data and medical information need to be seamlessly accessible and available at all times to the various healthcare stakeholders. Inability to share, integrate and access critical healthcare information is a challenge for the healthcare IT. Moreover, semantic interoperability of health-related heterogeneous data sources is a challenging issue and healthGrids are expected to address this challenge in a systematic manner. This paper proposes a new architecture: ASIDS (architecture for semantic integration of data sources), that could be a potential candidate for solving the challenge of semantic interoperability of geographically distributed heterogeneous data sources. ASIDS has three main components that are loosely coupled (through interfaces) in a distributed manner. This architecture sets the basis for future research in terms of implementing a healthGrid application in real environments.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-13DOI: 10.1109/ICDIM.2008.4746832
D. Monekosso
In this paper, we describe a model-based system for context discovery and behavior modeling for the purpose of monitoring well-being. In modeling behavior in a smart home, the system must detect atypical (anomalous) patterns of behavior resulting from failure of equipment as well as those deviations resulting from significant variations atypical of the human inhabitant. In the context of a smart home, both situations require human intervention although the response will differ. The home is embedded with sensors that unobtrusively record various environmental parameters. Models of behavior are generated from the sensor data. These models are employed to infer atypical behavior.
{"title":"A hierarchical model-based system for discovering atypical behavior","authors":"D. Monekosso","doi":"10.1109/ICDIM.2008.4746832","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746832","url":null,"abstract":"In this paper, we describe a model-based system for context discovery and behavior modeling for the purpose of monitoring well-being. In modeling behavior in a smart home, the system must detect atypical (anomalous) patterns of behavior resulting from failure of equipment as well as those deviations resulting from significant variations atypical of the human inhabitant. In the context of a smart home, both situations require human intervention although the response will differ. The home is embedded with sensors that unobtrusively record various environmental parameters. Models of behavior are generated from the sensor data. These models are employed to infer atypical behavior.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746714
H. Jerbi, F. Ravat, O. Teste, G. Zurfluh
Personalization of information systems brings new challenges to OLAP technology. A key characteristic of emerging OLAP database systems will be customizability of their behaviour taking into account users preferences as well as their context of analysis. In this paper we define a personalization framework for OLAP database systems based on user context-aware preferences. We consider a qualitative preference model which handles user preferences on the multidimensional schema. Context is modelled as a tree of multidimensional components of an OLAP analysis (fact, measures, dimensions, parameters). We define some OLAP operations that support personalization. User queries are dynamically enhanced with his preferences and are aware of the analysis context.
{"title":"Management of context-aware preferences in multidimensional databases","authors":"H. Jerbi, F. Ravat, O. Teste, G. Zurfluh","doi":"10.1109/ICDIM.2008.4746714","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746714","url":null,"abstract":"Personalization of information systems brings new challenges to OLAP technology. A key characteristic of emerging OLAP database systems will be customizability of their behaviour taking into account users preferences as well as their context of analysis. In this paper we define a personalization framework for OLAP database systems based on user context-aware preferences. We consider a qualitative preference model which handles user preferences on the multidimensional schema. Context is modelled as a tree of multidimensional components of an OLAP analysis (fact, measures, dimensions, parameters). We define some OLAP operations that support personalization. User queries are dynamically enhanced with his preferences and are aware of the analysis context.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121794027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746739
Taketo Sasaki, T. Fukushima, Daeil Park, Motomichi Toyama
In this paper, we propose a fine-grained access control based on logic programming in hybrid relational-XML database. Hybrid relational-XML database such as IBM DB2 can manage and query both XML and relational data. Our access control model provides a way to restrict data access at the cell-level for relational data and also at the node-level for XML data in a cell. Since our access control model dynamically produce authorization-views using logic programming when each user queries to the system, it enables us to manage views easily, unity management of databasepsilas contents and access policy. Finally we show the implementation our model and evaluate its performance.
{"title":"Fine-grained access control in hybrid relational-XML database","authors":"Taketo Sasaki, T. Fukushima, Daeil Park, Motomichi Toyama","doi":"10.1109/ICDIM.2008.4746739","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746739","url":null,"abstract":"In this paper, we propose a fine-grained access control based on logic programming in hybrid relational-XML database. Hybrid relational-XML database such as IBM DB2 can manage and query both XML and relational data. Our access control model provides a way to restrict data access at the cell-level for relational data and also at the node-level for XML data in a cell. Since our access control model dynamically produce authorization-views using logic programming when each user queries to the system, it enables us to manage views easily, unity management of databasepsilas contents and access policy. Finally we show the implementation our model and evaluate its performance.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746830
T. Cioara, I. Anghel, I. Salomie, M. Dînsoreanu
This paper addresses two fundamental research problems in the domain of pervasive autonomic systems: the development of a generic context model that can be used to represent general purpose contexts in a system interpretable way and the autonomic context model management. The context model is generically represented using a triple set consisting of context resources, actors and policies. The model is mapped onto real contexts by populating the sets with context specific elements. A context situation to which a pervasive system must adapt is represented by a specific context model instance. To ease the context reasoning and adaptation processes, the context model concepts and relationships are represented using a core ontology. The increasing complexity of the pervasive systems, and the difficulties of their management, administration and adaptation have headed us towards the necessity of integrating autonomic computing paradigms in the context model management process.
{"title":"A generic context model with autonomic features","authors":"T. Cioara, I. Anghel, I. Salomie, M. Dînsoreanu","doi":"10.1109/ICDIM.2008.4746830","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746830","url":null,"abstract":"This paper addresses two fundamental research problems in the domain of pervasive autonomic systems: the development of a generic context model that can be used to represent general purpose contexts in a system interpretable way and the autonomic context model management. The context model is generically represented using a triple set consisting of context resources, actors and policies. The model is mapped onto real contexts by populating the sets with context specific elements. A context situation to which a pervasive system must adapt is represented by a specific context model instance. To ease the context reasoning and adaptation processes, the context model concepts and relationships are represented using a core ontology. The increasing complexity of the pervasive systems, and the difficulties of their management, administration and adaptation have headed us towards the necessity of integrating autonomic computing paradigms in the context model management process.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"2 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120898539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746742
A. Cheddad, J. Condell, K. Curran, P. Kevitt
This paper proposes a novel encryption method with password protection based on an extended version of SHA-1 (secure hash algorithm) that is able to encrypt 2D bulk data such as images. There has been a modest research in the literature on encryption of digital images though. The algorithm benefits also from the conjugate symmetry exhibited in what is termed, herein, an irreversible fast Fourier transform (IrFFT). The proposed encryption method is a preprocessing phase which aims at increasing the robustness of image steganography against hackers. This scenario lays down a multi layer of security which forms a strong shield, against eavesdroppers, that is impossible to break. Both Shannon law requirements are met and results show promising results.
{"title":"Securing information content using new encryption method and Steganography","authors":"A. Cheddad, J. Condell, K. Curran, P. Kevitt","doi":"10.1109/ICDIM.2008.4746742","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746742","url":null,"abstract":"This paper proposes a novel encryption method with password protection based on an extended version of SHA-1 (secure hash algorithm) that is able to encrypt 2D bulk data such as images. There has been a modest research in the literature on encryption of digital images though. The algorithm benefits also from the conjugate symmetry exhibited in what is termed, herein, an irreversible fast Fourier transform (IrFFT). The proposed encryption method is a preprocessing phase which aims at increasing the robustness of image steganography against hackers. This scenario lays down a multi layer of security which forms a strong shield, against eavesdroppers, that is impossible to break. Both Shannon law requirements are met and results show promising results.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124906046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746769
Noor-ul-Qayyum, Farooq Ahmad
Mobile agents are autonomous complex software entities with the ability to travel across different nodes in the network to carry out computations on behalf of the user. Although mobile agents have proven to be very useful approach for distributed computation, yet in practice there are several technical challenges involved to implement them on a large scale. Most of these challenges involve security aspect in one way or the other. Protecting mobile agents against the eavesdropping attacks by malicious hosts is considered the most difficult security problem to solve. The approach that is presented here secures the agentpsilas data against eavesdropping attacks and detects the malicious hosts. Our approach is based on public-key encryption to convert the executing host results into cipher text. The ciphered results are then represented by a dynamic watermark graph structure that aids to detect the manipulation attacks performed on the agentpsilas data by the malicious hosts. Our proposed twofold technique ensures the integrity of the agentpsilas data.
{"title":"Integrity assurance of mobile agents through public-key encryption and watermarking","authors":"Noor-ul-Qayyum, Farooq Ahmad","doi":"10.1109/ICDIM.2008.4746769","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746769","url":null,"abstract":"Mobile agents are autonomous complex software entities with the ability to travel across different nodes in the network to carry out computations on behalf of the user. Although mobile agents have proven to be very useful approach for distributed computation, yet in practice there are several technical challenges involved to implement them on a large scale. Most of these challenges involve security aspect in one way or the other. Protecting mobile agents against the eavesdropping attacks by malicious hosts is considered the most difficult security problem to solve. The approach that is presented here secures the agentpsilas data against eavesdropping attacks and detects the malicious hosts. Our approach is based on public-key encryption to convert the executing host results into cipher text. The ciphered results are then represented by a dynamic watermark graph structure that aids to detect the manipulation attacks performed on the agentpsilas data by the malicious hosts. Our proposed twofold technique ensures the integrity of the agentpsilas data.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746811
Julie Doyle, H. Viktor, E. Paquet
Preservation metadata, information that supports and documents the long term preservation of a digital object, is an essential component of any preservation environment that must manage knowledge over time. It describes the digital objectpsilas associated semantic information. Furthermore, in the case of preserving 3D data, it can also support future post-processing of the preserved 3D object. However, a preservation metadata framework to support semantic data associated with a 3D object is currently lacking. Developing such a framework, and anticipating what semantic information should be included within this framework, is the focus of this paper.
{"title":"Preservation metadata - a framework for 3D data based on the Semantic Web","authors":"Julie Doyle, H. Viktor, E. Paquet","doi":"10.1109/ICDIM.2008.4746811","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746811","url":null,"abstract":"Preservation metadata, information that supports and documents the long term preservation of a digital object, is an essential component of any preservation environment that must manage knowledge over time. It describes the digital objectpsilas associated semantic information. Furthermore, in the case of preserving 3D data, it can also support future post-processing of the preserved 3D object. However, a preservation metadata framework to support semantic data associated with a 3D object is currently lacking. Developing such a framework, and anticipating what semantic information should be included within this framework, is the focus of this paper.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126648686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746831
Luke Docksteader, R. Benlamri
Over the past few years many medical professionals have shifted their focus to ubiquitous health monitoring systems. With continuous advancements in both bio-medical and information technologies, such futuristic monitoring systems have become a present reality. When intermixed with ubiquitous computing, a mobile health monitoring system provides unrestrained potential and innumerable applications. This research aims to improve upon and advance beyond modern medical monitoring systems by incorporating ontology-based reasoning to make the system independent and automated. In this paper, we present the main features of our ubiquitous mobile health monitoring system, its hardware and software design, and potential applications.
{"title":"Mobile Ontology-based Reasoning and Feedback (MORF) Health Monitoring System","authors":"Luke Docksteader, R. Benlamri","doi":"10.1109/ICDIM.2008.4746831","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746831","url":null,"abstract":"Over the past few years many medical professionals have shifted their focus to ubiquitous health monitoring systems. With continuous advancements in both bio-medical and information technologies, such futuristic monitoring systems have become a present reality. When intermixed with ubiquitous computing, a mobile health monitoring system provides unrestrained potential and innumerable applications. This research aims to improve upon and advance beyond modern medical monitoring systems by incorporating ontology-based reasoning to make the system independent and automated. In this paper, we present the main features of our ubiquitous mobile health monitoring system, its hardware and software design, and potential applications.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114899235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746799
A. Al-Tameem
This paper explores and predicts the link between the motives and the nature of the governance structure in the strategic alliances between the UAE (United Arab Emirates) organizations and the foreign companies in the field of information technology (IT). The hypotheses were tested to predict whether functions and sectors influence the formal of governance between relational versus classical. The findings suggest that development purpose and high sectors predict relational governance, while marketing/sales functions and low technology sector predict classical (arms-length) alliances. However, contrary to the expectation, real estate as a low technology sector predicts relational rather than classical alliances.
本文探讨并预测了阿联酋(United Arab Emirates)组织与信息技术(IT)领域的外国公司之间战略联盟的动机和治理结构性质之间的联系。我们对假设进行了检验,以预测职能和部门是否会影响关系型与经典型之间的治理形式。研究结果表明,发展目的和高部门预测关系治理,而营销/销售职能和低技术部门预测经典(适度)联盟。然而,与预期相反,房地产作为一个低技术行业预测关系而不是经典联盟。
{"title":"Identification of influence factors in the information technology formation in United Arab Emirates","authors":"A. Al-Tameem","doi":"10.1109/ICDIM.2008.4746799","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746799","url":null,"abstract":"This paper explores and predicts the link between the motives and the nature of the governance structure in the strategic alliances between the UAE (United Arab Emirates) organizations and the foreign companies in the field of information technology (IT). The hypotheses were tested to predict whether functions and sectors influence the formal of governance between relational versus classical. The findings suggest that development purpose and high sectors predict relational governance, while marketing/sales functions and low technology sector predict classical (arms-length) alliances. However, contrary to the expectation, real estate as a low technology sector predicts relational rather than classical alliances.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"57 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}