Through analyzing the basic characters of Trustworthy Software, the index system of Trustworthy Software Process Measurement is set up, the correlation among Trustworthy Software, Trustworthy Process and Measurement Indexes is described formally, the model of Trustworthy Process Improvement and Measurement is introduced. Some instances researches show the model can not only estimate the trustworthy degree of software process, but also identify potential risk factors in software developing process, and provide trusty decision-making reference for software process improvement and risk prevention.
{"title":"The Study of Trustworthy Software Process Improvement Model","authors":"Benhai Yu, Qing Wang, Ye Yang","doi":"10.1109/NSWCTC.2009.338","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.338","url":null,"abstract":"Through analyzing the basic characters of Trustworthy Software, the index system of Trustworthy Software Process Measurement is set up, the correlation among Trustworthy Software, Trustworthy Process and Measurement Indexes is described formally, the model of Trustworthy Process Improvement and Measurement is introduced. Some instances researches show the model can not only estimate the trustworthy degree of software process, but also identify potential risk factors in software developing process, and provide trusty decision-making reference for software process improvement and risk prevention.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122427594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A blind multiuser receiver is proposed for multiuser detection of UWB systems in a realistic indoor channel. The proposed blind multiuser receiver is based on the constant-modulus algorithm (CMA), which is known to provide satisfactory performances in a blind setting. In order to overcome the CMA interference capture problem typical of a multiuser scenario, we propose to adopt a two stage receiver: in the first stage, partial ISI and MA1 suppression is achieved by exploiting the desired user signature structure properties; in the second stage, based on CMA, the residual MAI and the ISI are removed, and the desired symbols are reliably recovered. Computer simulations show that, the proposed detector achieves good performances .
{"title":"Two-Stage Blind Multiuser Detection for Ultra Wideband in a Realistic Indoor Channel","authors":"Zheng-qiang Wang, Ling-yuan Li, Lixin Song","doi":"10.1109/NSWCTC.2009.171","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.171","url":null,"abstract":"A blind multiuser receiver is proposed for multiuser detection of UWB systems in a realistic indoor channel. The proposed blind multiuser receiver is based on the constant-modulus algorithm (CMA), which is known to provide satisfactory performances in a blind setting. In order to overcome the CMA interference capture problem typical of a multiuser scenario, we propose to adopt a two stage receiver: in the first stage, partial ISI and MA1 suppression is achieved by exploiting the desired user signature structure properties; in the second stage, based on CMA, the residual MAI and the ISI are removed, and the desired symbols are reliably recovered. Computer simulations show that, the proposed detector achieves good performances .","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122951952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile handheld device, as small screen, limited user interface and hardware power, can not browse web pages designed for PCs comfortably. By means of mobile web 2.0, a new mobile web presentation with better user experience is proposed. A thumbnail view of the original web page is firstly presented to mobile user. While mobile user browsing the thumbnail view page, moving his mouse pointer, the original block which the pointer is focusing will be gotten from the proxy asynchronously and zoomed in automatically. The mode does not charge the layout of the web page and make mobile user can browse specific web information block clearly and conveniently. Using the mode, mobile user’s behavior is very similar to PC user’s. Moreover, a prototype system and a set of evaluation experiments have been implemented to verify the scheme and show its values in both technical and economical viewpoints.
{"title":"A New Mobile Web Presentation with Better User Experience","authors":"Yunpeng Xiao, Yang Tao, Qian Li","doi":"10.1109/NSWCTC.2009.333","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.333","url":null,"abstract":"Mobile handheld device, as small screen, limited user interface and hardware power, can not browse web pages designed for PCs comfortably. By means of mobile web 2.0, a new mobile web presentation with better user experience is proposed. A thumbnail view of the original web page is firstly presented to mobile user. While mobile user browsing the thumbnail view page, moving his mouse pointer, the original block which the pointer is focusing will be gotten from the proxy asynchronously and zoomed in automatically. The mode does not charge the layout of the web page and make mobile user can browse specific web information block clearly and conveniently. Using the mode, mobile user’s behavior is very similar to PC user’s. Moreover, a prototype system and a set of evaluation experiments have been implemented to verify the scheme and show its values in both technical and economical viewpoints.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rui-dan Su, XiangQuan Che, Shaofeng Fu, Longhai Li, Lihua Zhou
Goh has proposed a protocol-based mechanism which can add key recovery to existing security protocols and possesses valuable properties such as unfilterability, inter-operability, hidden key recovery and real time key recovery. He presented key recovery implementation of SSL/TLS and SSH. This paper exploits identity based encryption to implement hidden key recovery and shows how to implement key recovery in IPSec roundly. We conclude that IBE is possible to be used in key recovery as we expected and it is easy to embed key recovery into IPSec. At last, we discuss some issues about practical deployment of IPSec key recovery.
{"title":"Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case","authors":"Rui-dan Su, XiangQuan Che, Shaofeng Fu, Longhai Li, Lihua Zhou","doi":"10.1109/NSWCTC.2009.137","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.137","url":null,"abstract":"Goh has proposed a protocol-based mechanism which can add key recovery to existing security protocols and possesses valuable properties such as unfilterability, inter-operability, hidden key recovery and real time key recovery. He presented key recovery implementation of SSL/TLS and SSH. This paper exploits identity based encryption to implement hidden key recovery and shows how to implement key recovery in IPSec roundly. We conclude that IBE is possible to be used in key recovery as we expected and it is easy to embed key recovery into IPSec. At last, we discuss some issues about practical deployment of IPSec key recovery.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor networks(WSNs)have received more and more attention on the object tracking system,but the performance of active routing is low.In this paper,we present an novel energy efficient dynamic target tracking (EE-DTT) protocol for wireless sensor network, EE-DTT has three obvious features: Firstly, it improves virtual grid ideas to divide each cluster into M×N square area and select a working node in each grid to reduce redundant information and economize energy. Secondly, EE-DTT improves energy utility by changing the activity of wireless communication module of sensor nodes, energy model and state transition of sensor nodes.last,it adopts initiative optimization method to optimize routing.Simulation results show that,compared with AODV and TSR, EE-DTT significantly reduce in energy consumption and prolong the network lifetime.
{"title":"A Novel Energy-Efficient Dynamic Target Tracking Protocol for Wireless Sensor Networks","authors":"Ming Zhang, Chenglong Gong, Yuan Feng, Yanhong Lu","doi":"10.1109/NSWCTC.2009.319","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.319","url":null,"abstract":"Wireless sensor networks(WSNs)have received more and more attention on the object tracking system,but the performance of active routing is low.In this paper,we present an novel energy efficient dynamic target tracking (EE-DTT) protocol for wireless sensor network, EE-DTT has three obvious features: Firstly, it improves virtual grid ideas to divide each cluster into M×N square area and select a working node in each grid to reduce redundant information and economize energy. Secondly, EE-DTT improves energy utility by changing the activity of wireless communication module of sensor nodes, energy model and state transition of sensor nodes.last,it adopts initiative optimization method to optimize routing.Simulation results show that,compared with AODV and TSR, EE-DTT significantly reduce in energy consumption and prolong the network lifetime.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117055725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) is the key technique for generation communications systems. In this paper an enhanced signal detection scheme is proposed for MIMO-OFDM systems. A combining QR and PIC MIMO detection scheme was directly applied to MIMO-OFDM systems. The performance of algorithm is evaluated based on computer simulation. The simulation results indicate that the performance of the propose wideband receiver outperforms the V-BLAST in MIMO-OFDM systems. At symbol error rate 1e-3, the proposed scheme can obtain the 2dB gain to V-BLAST algorithms based on MIMO-OFDM systems.
{"title":"A Hybrid QR and PIC Detection Scheme Based on MIMO-OFDM Systems","authors":"Zhongpeng Wang","doi":"10.1109/NSWCTC.2009.386","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.386","url":null,"abstract":"Multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) is the key technique for generation communications systems. In this paper an enhanced signal detection scheme is proposed for MIMO-OFDM systems. A combining QR and PIC MIMO detection scheme was directly applied to MIMO-OFDM systems. The performance of algorithm is evaluated based on computer simulation. The simulation results indicate that the performance of the propose wideband receiver outperforms the V-BLAST in MIMO-OFDM systems. At symbol error rate 1e-3, the proposed scheme can obtain the 2dB gain to V-BLAST algorithms based on MIMO-OFDM systems.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129595866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Components are considered as black boxes and are connected with other components through required interfaces and provided interfaces. Therefore, the correct specifications of components are the basis of using and assembling components. The connection between two components is trustworthy only if all their interfaces are correctly compatible. B method is applied to define the specification of component interfaces and verify trustworthiness of component connections in this paper. UML class diagram and state diagram are firstly applied to intuitively describe the syntactic and semantic information of component interface, then the formal specification of component interface defined by B abstract machine is presented. The trustworthiness of component connection is further verified in terms of B refinement mechanism which can prove that the machine of the provided interface is a correct refinement of the machine of the required interface. Since B tools could be used to verify whether a provided interface is a correct refinement of a required interface, the complex manual verifying process could be simplified, and the verifying result is more accurate and reliable.
{"title":"A Formal Verification Model for Trustworthiness of Component Interface","authors":"Wang Dan, Zhao Jing","doi":"10.1109/NSWCTC.2009.53","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.53","url":null,"abstract":"Components are considered as black boxes and are connected with other components through required interfaces and provided interfaces. Therefore, the correct specifications of components are the basis of using and assembling components. The connection between two components is trustworthy only if all their interfaces are correctly compatible. B method is applied to define the specification of component interfaces and verify trustworthiness of component connections in this paper. UML class diagram and state diagram are firstly applied to intuitively describe the syntactic and semantic information of component interface, then the formal specification of component interface defined by B abstract machine is presented. The trustworthiness of component connection is further verified in terms of B refinement mechanism which can prove that the machine of the provided interface is a correct refinement of the machine of the required interface. Since B tools could be used to verify whether a provided interface is a correct refinement of a required interface, the complex manual verifying process could be simplified, and the verifying result is more accurate and reliable.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on matrix multiplication secret sharing method, a multi-secret images sharing scheme is presented. In our scheme, participants only need to pool their pseudo-shadow instead of disclosing his secret share when recovering secret images. That is to say, each participant can share many secret images with others by holding only one secret share. Unlike other known image sharing scheme, it doesn’t generating shadow images which are difficult to manage and identify. Integrating the above advantages, this scheme is a practical and effective multi-secret image sharing scheme.
{"title":"Multi-secret Images Sharing Based on Matrix Multiplication","authors":"Zhengfeng Hou, Hanjun Gao","doi":"10.1109/NSWCTC.2009.94","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.94","url":null,"abstract":"Based on matrix multiplication secret sharing method, a multi-secret images sharing scheme is presented. In our scheme, participants only need to pool their pseudo-shadow instead of disclosing his secret share when recovering secret images. That is to say, each participant can share many secret images with others by holding only one secret share. Unlike other known image sharing scheme, it doesn’t generating shadow images which are difficult to manage and identify. Integrating the above advantages, this scheme is a practical and effective multi-secret image sharing scheme.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Role based access control reduces the cost of security administration of large-scale systems. However, it mainly abstracts a user from the function aspect, which is not enough for some complex large-scale systems. In web-based IDRS (Infectious Disease Reporting System), access control is based on not only the function attribute, but domain and category attributes of a user. Meanwhile, the domain and category attributes of a user need to adapt to state changes. We present a state-adaptive access control model that uses role, domain and category attributes to enforce access control. Moreover, it supports dynamic adjustment of domain and category attributes of a user based on state transition.
{"title":"A State-Adaptive Access Control Model for Web-Based IDRS System","authors":"Xinsong Wu, Yeping He, Zhouyi Zhou","doi":"10.1109/NSWCTC.2009.32","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.32","url":null,"abstract":"Role based access control reduces the cost of security administration of large-scale systems. However, it mainly abstracts a user from the function aspect, which is not enough for some complex large-scale systems. In web-based IDRS (Infectious Disease Reporting System), access control is based on not only the function attribute, but domain and category attributes of a user. Meanwhile, the domain and category attributes of a user need to adapt to state changes. We present a state-adaptive access control model that uses role, domain and category attributes to enforce access control. Moreover, it supports dynamic adjustment of domain and category attributes of a user based on state transition.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, secondary usage methods have been proposed to utilize the spectrum holes in the licensed spectrum bands. In our previous works [6], based on the concept of spectrum pooling, an opportunistic spectrum sharing system with heterogeneous secondary users was proposed. In this paper, a spectrum sharing system with call admission control strategy is proposed. By analyzing the forced termination probability and blocked probability of secondary users, the QoS guarantee for secondary access is insightful studied. Numerical results show that the proposed call admission strategy can increase the throughput of secondary users significantly, as well as guarantee the access priority of primary user.
{"title":"Performance of Secondary Access in the Spectrum Sharing System with Call Admission Control Strategy","authors":"Xueyuan Jiang, Zhiyuan Shi, Wumei Wang, Lianfeng Huang","doi":"10.1109/NSWCTC.2009.206","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.206","url":null,"abstract":"Recently, secondary usage methods have been proposed to utilize the spectrum holes in the licensed spectrum bands. In our previous works [6], based on the concept of spectrum pooling, an opportunistic spectrum sharing system with heterogeneous secondary users was proposed. In this paper, a spectrum sharing system with call admission control strategy is proposed. By analyzing the forced termination probability and blocked probability of secondary users, the QoS guarantee for secondary access is insightful studied. Numerical results show that the proposed call admission strategy can increase the throughput of secondary users significantly, as well as guarantee the access priority of primary user.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130288030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}