首页 > 最新文献

2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)最新文献

英文 中文
Solving maximum clique problem in stochastic graphs using learning automata 用学习自动机求解随机图中的最大团问题
Mohammad Soleimani-Pouri, Alireza Rezvanian, M. Meybodi
The maximum clique of a given graph G is the subgraph C of G such that two vertices in C are adjacent in G with maximum cardinality. Finding the maximum clique in an arbitrary graph is an NP-Hard problem, motivated by the social networks analysis. In the real world applications, the nature of interaction between nodes is stochastic and the probability distribution function of the vertex weight is unknown. In this paper a learning automata-based algorithm is proposed for solving maximum clique problem in the stochastic graph. The simulation results on stochastic graph demonstrate that the proposed algorithm outperforms standard sampling method in terms of the number of samplings taken by algorithm.
给定图G的最大团是G的子图C,使得C中的两个顶点在G中相邻且具有最大基数。在任意图中找到最大的团是一个np困难问题,由社会网络分析驱动。在实际应用中,节点间相互作用的性质是随机的,顶点权重的概率分布函数是未知的。本文提出了一种基于学习自动机的随机图最大团问题求解算法。在随机图上的仿真结果表明,该算法在采样次数方面优于标准采样方法。
{"title":"Solving maximum clique problem in stochastic graphs using learning automata","authors":"Mohammad Soleimani-Pouri, Alireza Rezvanian, M. Meybodi","doi":"10.1109/CASoN.2012.6412388","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412388","url":null,"abstract":"The maximum clique of a given graph G is the subgraph C of G such that two vertices in C are adjacent in G with maximum cardinality. Finding the maximum clique in an arbitrary graph is an NP-Hard problem, motivated by the social networks analysis. In the real world applications, the nature of interaction between nodes is stochastic and the probability distribution function of the vertex weight is unknown. In this paper a learning automata-based algorithm is proposed for solving maximum clique problem in the stochastic graph. The simulation results on stochastic graph demonstrate that the proposed algorithm outperforms standard sampling method in terms of the number of samplings taken by algorithm.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133518060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Securing password recovery through dispersion 通过分散保护密码恢复
S. Jajodia, W. Litwin, T. Schwarz
Passwords form the Achilles heel of most uses of modern cryptography. Key recovery is necessary to provide continuous access to documents and other electronic assets in spite of possible loss of a password. Key escrow services provide key recovery for the owner, but need to be trusted. Additionally, a user might want to divulge passwords in case of his/her death or incapacitation, but not before. We present here a scheme that uses dispersion to provide trusted escrow services. Our scheme uses secret sharing to disperse password recovery information over several escrow services that authenticate based on a weak password. To protect against dictionary attacks, each authentication attempt takes a noticeable, but tolerable time (e.g. minutes). We achieve this by having the share of the secret be the solution of a puzzle that is solved by brute force in time depending on the number of processors employed. This additionally prevents escrow agencies from optimizing their part in recovering a password by pre-computing and storing their share in a more accessible and hence vulnerable format.
密码是现代密码学的致命弱点。密钥恢复是必要的,以便在可能丢失密码的情况下继续访问文件和其他电子资产。密钥托管服务为所有者提供密钥恢复,但需要得到信任。此外,用户可能希望在他/她死亡或丧失行为能力的情况下泄露密码,而不是在此之前。我们在这里提出了一个使用分散来提供可信托管服务的方案。我们的方案使用秘密共享将密码恢复信息分散到几个基于弱密码进行身份验证的托管服务上。为了防止字典攻击,每次身份验证尝试都需要一个明显的,但可以容忍的时间(例如分钟)。我们通过将秘密的共享作为一个谜题的解决方案来实现这一点,这个谜题的解决方案取决于所使用的处理器的数量。这还阻止了托管机构通过预先计算和以更容易访问的易受攻击的格式存储其份额来优化其在恢复密码方面的作用。
{"title":"Securing password recovery through dispersion","authors":"S. Jajodia, W. Litwin, T. Schwarz","doi":"10.1109/CASoN.2012.6412407","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412407","url":null,"abstract":"Passwords form the Achilles heel of most uses of modern cryptography. Key recovery is necessary to provide continuous access to documents and other electronic assets in spite of possible loss of a password. Key escrow services provide key recovery for the owner, but need to be trusted. Additionally, a user might want to divulge passwords in case of his/her death or incapacitation, but not before. We present here a scheme that uses dispersion to provide trusted escrow services. Our scheme uses secret sharing to disperse password recovery information over several escrow services that authenticate based on a weak password. To protect against dictionary attacks, each authentication attempt takes a noticeable, but tolerable time (e.g. minutes). We achieve this by having the share of the secret be the solution of a puzzle that is solved by brute force in time depending on the number of processors employed. This additionally prevents escrow agencies from optimizing their part in recovering a password by pre-computing and storing their share in a more accessible and hence vulnerable format.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"98 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic sentiment analysis of Twitter messages Twitter消息的自动情感分析
A. C. E. S. Lima, L. Castro
Twitter® is a microblogging service usually used as an instant communication platform. The capacity to provide information in real time has stimulated many companies to use this service to understand their consumers. In this direction, TV stations have adopted Twitter for shortening the distance between them and their viewers, and use such information as a feedback mechanism for their shows. The sentiment analysis task can be used as one such feedback mechanism. This task corresponds to classifying a text according to the sentiment that the writer intended to transmit. A classifier usually requires a pre-classifled data sample to determine the class of new data. Typically, the sample is pre-classified manually, making the process time consuming and reducing its real time applicability for big data. This paper proposes an automatic sentiment classifier for Twitter messages, and uses TV shows from Brazilian stations for benchmarking. The automatic sentiment analysis reduces human intervention and, thus, the complexity and cost of the whole process. To assess the performance of the proposed system tweets related to a Brazilian TV show were captured in a 24h interval and fed into the system. The proposed technique achieved an average accuracy of 90%.
Twitter®是一种微博服务,通常用作即时通信平台。实时提供信息的能力刺激了许多公司使用这项服务来了解他们的消费者。在这个方向上,电视台采用Twitter来缩短他们与观众之间的距离,并将这些信息作为他们节目的反馈机制。情感分析任务可以用作这样一种反馈机制。这个任务对应于根据作者想要传递的情感对文本进行分类。分类器通常需要一个预分类的数据样本来确定新数据的类别。通常,样本是人工预分类的,这一过程耗时,降低了其对大数据的实时适用性。本文提出了一种针对Twitter消息的自动情感分类器,并使用巴西电视台的电视节目作为基准。自动情感分析减少了人为干预,从而降低了整个过程的复杂性和成本。为了评估拟议系统的性能,在24小时的间隔内捕获与巴西电视节目相关的tweet并将其输入系统。该方法的平均准确率达到90%。
{"title":"Automatic sentiment analysis of Twitter messages","authors":"A. C. E. S. Lima, L. Castro","doi":"10.1109/CASoN.2012.6412377","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412377","url":null,"abstract":"Twitter® is a microblogging service usually used as an instant communication platform. The capacity to provide information in real time has stimulated many companies to use this service to understand their consumers. In this direction, TV stations have adopted Twitter for shortening the distance between them and their viewers, and use such information as a feedback mechanism for their shows. The sentiment analysis task can be used as one such feedback mechanism. This task corresponds to classifying a text according to the sentiment that the writer intended to transmit. A classifier usually requires a pre-classifled data sample to determine the class of new data. Typically, the sample is pre-classified manually, making the process time consuming and reducing its real time applicability for big data. This paper proposes an automatic sentiment classifier for Twitter messages, and uses TV shows from Brazilian stations for benchmarking. The automatic sentiment analysis reduces human intervention and, thus, the complexity and cost of the whole process. To assess the performance of the proposed system tweets related to a Brazilian TV show were captured in a 24h interval and fed into the system. The proposed technique achieved an average accuracy of 90%.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115343497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Security controls for Android Android的安全控制
Ruben Jonathan Garcia Vargas, Eleazar Aguirre Anaya, Ramon Galeana Huerta, Alba Felix Moreno Hernandez
The use of Smartphones in business has grown in the recent years bringing new ways to create and share information. Among the operating systems used by smartphones, Android has the most growing usage rate. Most recent Android versions have some security controls; however, there is a lack in the use of strong security controls for Android 2.3 (Gingerbread), which is the most spread version of this operating system. This leaves vulnerable company and user information stored in such devices. This work presents how to improve Android's security by adding more security controls to devices using the version 2.3 and by this way meet the security levels needed for the business and secure users environments. The security polices where added to Android's source code and to the data space.
近年来,智能手机在商业中的使用越来越多,带来了创造和共享信息的新方式。在智能手机使用的操作系统中,Android的使用率增长最快。大多数最新的Android版本都有一些安全控制;然而,Android 2.3 (Gingerbread)缺乏强大的安全控制,这是该操作系统最流行的版本。这使得易受攻击的公司和用户信息存储在这些设备中。这项工作展示了如何通过在2.3版本的设备上添加更多的安全控制来提高Android的安全性,并通过这种方式满足商业和安全用户环境所需的安全级别。安全策略被添加到Android的源代码和数据空间中。
{"title":"Security controls for Android","authors":"Ruben Jonathan Garcia Vargas, Eleazar Aguirre Anaya, Ramon Galeana Huerta, Alba Felix Moreno Hernandez","doi":"10.1109/CASoN.2012.6412404","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412404","url":null,"abstract":"The use of Smartphones in business has grown in the recent years bringing new ways to create and share information. Among the operating systems used by smartphones, Android has the most growing usage rate. Most recent Android versions have some security controls; however, there is a lack in the use of strong security controls for Android 2.3 (Gingerbread), which is the most spread version of this operating system. This leaves vulnerable company and user information stored in such devices. This work presents how to improve Android's security by adding more security controls to devices using the version 2.3 and by this way meet the security levels needed for the business and secure users environments. The security polices where added to Android's source code and to the data space.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Comparing two local methods for community detection in social networks 比较社会网络中两种局部社区检测方法
S. Zehnalova, M. Kudelka, M. Kudelka, V. Snás̃el
One of the most obvious features of social networks is their community structure. Several types of methods were developed for discovering communities in the networks, either from the global perspective or based on local information only. Local methods are appropriate when working with large and dynamic networks or when real-time results are expected. In this paper we explore two such methods and compare the results obtained on the sample of a co-authorship network. We study how much may detected communities vary according to the method used for computation.
社交网络最明显的特征之一是其社区结构。开发了几种类型的方法来发现网络中的社区,或者从全局角度来看,或者仅基于本地信息。当使用大型动态网络或期望实时结果时,本地方法是合适的。在本文中,我们探讨了两种这样的方法,并比较了在一个合著网络样本上获得的结果。我们根据所使用的计算方法研究可能检测到的社区变化的程度。
{"title":"Comparing two local methods for community detection in social networks","authors":"S. Zehnalova, M. Kudelka, M. Kudelka, V. Snás̃el","doi":"10.1109/CASoN.2012.6412395","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412395","url":null,"abstract":"One of the most obvious features of social networks is their community structure. Several types of methods were developed for discovering communities in the networks, either from the global perspective or based on local information only. Local methods are appropriate when working with large and dynamic networks or when real-time results are expected. In this paper we explore two such methods and compare the results obtained on the sample of a co-authorship network. We study how much may detected communities vary according to the method used for computation.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121783689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Graph-based cross-validated committees ensembles 基于图形的交叉验证委员会集成
Nils Murrugarra-Llerena, Lilian Berton, A. Lopes
Ensemble techniques combine several individual classifiers to obtain a composite classifier that outperforms each of them alone. Despite of these techniques have been successfully applied to many domains, their applications on networked data still need investigation. There are not many known strategies for sampling with replacement from interconnected relational data. To contribute in this direction, we propose a cross-validated committee ensemble procedure applied to graph-based classifiers. The proposed ensemble either maintains or significantly improves the accuracy of the tested relational graph-based classifiers. We also investigate the role played by diversity among the several individual classifiers, i.e., how much they agree in their predictions, to explain the technique success or failure.
集成技术将几个单独的分类器组合在一起,以获得一个复合分类器,该分类器的性能优于单独使用它们中的任何一个。尽管这些技术已经成功地应用于许多领域,但它们在网络数据上的应用仍有待研究。对于从相互关联的关系数据中进行替换的采样,目前已知的策略并不多。为了在这个方向上做出贡献,我们提出了一个应用于基于图的分类器的交叉验证委员会集成过程。所提出的集成保持或显著提高了测试的基于关系图的分类器的准确性。我们还研究了几个单独分类器之间的多样性所起的作用,即,他们在预测中同意的程度,以解释技术的成功或失败。
{"title":"Graph-based cross-validated committees ensembles","authors":"Nils Murrugarra-Llerena, Lilian Berton, A. Lopes","doi":"10.1109/CASoN.2012.6412381","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412381","url":null,"abstract":"Ensemble techniques combine several individual classifiers to obtain a composite classifier that outperforms each of them alone. Despite of these techniques have been successfully applied to many domains, their applications on networked data still need investigation. There are not many known strategies for sampling with replacement from interconnected relational data. To contribute in this direction, we propose a cross-validated committee ensemble procedure applied to graph-based classifiers. The proposed ensemble either maintains or significantly improves the accuracy of the tested relational graph-based classifiers. We also investigate the role played by diversity among the several individual classifiers, i.e., how much they agree in their predictions, to explain the technique success or failure.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Threats models on biometri systems: A comparative study 生物识别系统的威胁模型:比较研究
D. Nabil, K. Benatchba, M. Koudil, A. Bouridane
Several biometric threats systems models have been proposed to facilitate the design, implementation and validation techniques for securing these systems. Some models classify threats by type of attacks, others by specific attacks and other by using vulnerabilities and threat agent. Each model proposes a vision and a different approach to identify these threats. For example, to design security techniques for wireless biometric card, one should identify all threats facing this kind of device. In this paper, a comparative study and synthesis to help choose the most fitting model, depending on the security problems addressed, is given.
已经提出了几种生物识别威胁系统模型,以促进设计,实现和验证技术,以保护这些系统。一些模型根据攻击类型对威胁进行分类,另一些模型根据特定的攻击对威胁进行分类,还有一些模型通过使用漏洞和威胁代理对威胁进行分类。每个模型都提出了一个愿景和不同的方法来识别这些威胁。例如,为了设计无线生物识别卡的安全技术,应该识别这类设备面临的所有威胁。在本文中,比较研究和综合,以帮助选择最合适的模型,根据所解决的安全问题,给出。
{"title":"Threats models on biometri systems: A comparative study","authors":"D. Nabil, K. Benatchba, M. Koudil, A. Bouridane","doi":"10.1109/CASoN.2012.6412400","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412400","url":null,"abstract":"Several biometric threats systems models have been proposed to facilitate the design, implementation and validation techniques for securing these systems. Some models classify threats by type of attacks, others by specific attacks and other by using vulnerabilities and threat agent. Each model proposes a vision and a different approach to identify these threats. For example, to design security techniques for wireless biometric card, one should identify all threats facing this kind of device. In this paper, a comparative study and synthesis to help choose the most fitting model, depending on the security problems addressed, is given.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CommonGOV: A consolidate approach for governance of service-oriented architecture CommonGOV:用于治理面向服务的体系结构的整合方法
H. Filho, L. Azevedo
Service-Oriented Architecture (SOA) is a paradigm used by organizations to reduce costs and foster agility through reuse of assets and an increase of alignment between business and IT. To achieve these benefits, a governance model is vital to ensure that technical actions and decisions of IT departments are aligned to organizations' business goals and requirements. There are several proposals of SOA governance models in academia and industry. However, there are important differences between them concerning process, elements and definitions they propose. This work analyzes the main current SOA governance models proposed by literature, and presents a consolidate approach aiming to create a governance model that addresses the most important issues for organizations.
面向服务的体系结构(Service-Oriented Architecture, SOA)是一种范例,组织使用它来通过重用资产和增加业务与IT之间的一致性来降低成本和促进敏捷性。为了实现这些好处,治理模型对于确保IT部门的技术行动和决策与组织的业务目标和需求保持一致至关重要。学术界和业界有几种SOA治理模型的建议。然而,它们之间在过程、要素和所提出的定义方面存在重要差异。本文分析了目前文献中提出的主要SOA治理模型,并提出了一种整合方法,旨在创建一个治理模型,解决组织中最重要的问题。
{"title":"CommonGOV: A consolidate approach for governance of service-oriented architecture","authors":"H. Filho, L. Azevedo","doi":"10.1109/CASoN.2012.6412434","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412434","url":null,"abstract":"Service-Oriented Architecture (SOA) is a paradigm used by organizations to reduce costs and foster agility through reuse of assets and an increase of alignment between business and IT. To achieve these benefits, a governance model is vital to ensure that technical actions and decisions of IT departments are aligned to organizations' business goals and requirements. There are several proposals of SOA governance models in academia and industry. However, there are important differences between them concerning process, elements and definitions they propose. This work analyzes the main current SOA governance models proposed by literature, and presents a consolidate approach aiming to create a governance model that addresses the most important issues for organizations.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129760235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards an automatic non-deterministic web Service Composition platform 迈向一个自动的非确定性web服务组合平台
G. Markou, I. Refanidis
This paper describes work in progress towards the implementation of an online Web Service Composition system. The system adheres to the reusable nature of web Services by utilizing existing open source projects as sub-elements and is based on the most prevalent web service standards. It will treat non-determinism as an inherent characteristic of the problem and tackle it through the use of contingency planning. To the best of our knowledge, the final system will be the first online application of its kind able to support various stages of Web Service Composition. In this paper we focus on the evaluation framework for the proposed system, based on an existing test collection and three detailed use case scenarios, and a manual composition module than can produce workflows corresponding to them.
本文描述了在线Web服务组合系统的实现过程。通过利用现有的开源项目作为子元素,该系统坚持web服务的可重用性,并基于最流行的web服务标准。它将把不确定性视为问题的固有特征,并通过使用应急计划来解决这个问题。据我们所知,最终的系统将是同类中第一个能够支持Web服务组合各个阶段的在线应用程序。在本文中,我们将重点放在基于一个现有的测试集合和三个详细的用例场景的系统的评估框架上,以及一个可以生成与它们相对应的工作流的手动组合模块。
{"title":"Towards an automatic non-deterministic web Service Composition platform","authors":"G. Markou, I. Refanidis","doi":"10.1109/CASoN.2012.6412431","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412431","url":null,"abstract":"This paper describes work in progress towards the implementation of an online Web Service Composition system. The system adheres to the reusable nature of web Services by utilizing existing open source projects as sub-elements and is based on the most prevalent web service standards. It will treat non-determinism as an inherent characteristic of the problem and tackle it through the use of contingency planning. To the best of our knowledge, the final system will be the first online application of its kind able to support various stages of Web Service Composition. In this paper we focus on the evaluation framework for the proposed system, based on an existing test collection and three detailed use case scenarios, and a manual composition module than can produce workflows corresponding to them.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Further cryptanalysis of ‘A remote authentication scheme using mobile device’ “使用移动设备的远程认证方案”的进一步密码分析
M. Khan, S. Kumari, M. Gupta
In 2008, Khan et al. proposed a remote user authentication scheme on mobile device, using hash-function and fingerprint biometric. In 2010, Chen et al. discussed some security weaknesses of Khan et al.'s scheme and subsequently proposed an improved scheme. Recently, Truong et al. have demonstrated that in Chen et al.'s scheme, an adversary can successfully replay an intercepted login request. They also showed how an adversary can cheat both the legal participants, by taking advantage of the fact that the scheme does not provide anonymity to the user. In this paper, we show that Chen et al.'s scheme suffers from some additional drawbacks which were not presented by Truong et al. in its analysis.
2008年,Khan等人利用哈希函数和指纹生物识别技术在移动设备上提出了一种远程用户认证方案。2010年,Chen等人讨论了Khan等人方案的一些安全弱点,随后提出了一种改进方案。最近,Truong等人已经证明,在Chen等人的方案中,攻击者可以成功地重放被截获的登录请求。他们还展示了对手如何利用该方案不向用户提供匿名性的事实来欺骗合法参与者。在本文中,我们表明Chen等人的方案存在一些Truong等人在其分析中没有提出的额外缺陷。
{"title":"Further cryptanalysis of ‘A remote authentication scheme using mobile device’","authors":"M. Khan, S. Kumari, M. Gupta","doi":"10.1109/CASoN.2012.6412408","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412408","url":null,"abstract":"In 2008, Khan et al. proposed a remote user authentication scheme on mobile device, using hash-function and fingerprint biometric. In 2010, Chen et al. discussed some security weaknesses of Khan et al.'s scheme and subsequently proposed an improved scheme. Recently, Truong et al. have demonstrated that in Chen et al.'s scheme, an adversary can successfully replay an intercepted login request. They also showed how an adversary can cheat both the legal participants, by taking advantage of the fact that the scheme does not provide anonymity to the user. In this paper, we show that Chen et al.'s scheme suffers from some additional drawbacks which were not presented by Truong et al. in its analysis.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1