首页 > 最新文献

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
New keyed chaotic neural network hash function based on sponge construction 基于海绵构造的新型键控混沌神经网络哈希函数
Nabil Abdoun, S. E. Assad, Khodor Hammoud, R. Assaf, Mohamad Khalil, O. Déforges
This paper presents a new structure for keyed hash function based on chaotic maps, neural network and sponge construction. The structure of proposed Keyed Sponge Chaotic Neural Network KSCNN hash function is composed of three phases: the initialization phase pads the message M and divides it into q message blocks Mi of fixed size r, the absorbing phase hashes the message blocks by using CNN — Blocki and produces the intermediate hash value HMi and the squeezing phase produces, starting from HMq, the final hash value h with desired length. The combining of sponge construction with the CNN — Blocki improves, on one hand, the security of proposed hash function and makes, on the other hand, the length of hash value more dynamic. Our theoretical analysis and experimental simulations show that the proposed hash function KSCNN has good statistical properties, strong collision resistance, high message sensitivity compared with SHA-3 and immune against pre-image, second pre-image and collision attacks.
本文提出了一种基于混沌映射、神经网络和海绵构造的键控哈希函数新结构。所提出的keyyed Sponge混沌神经网络KSCNN哈希函数的结构由三个阶段组成:初始化阶段填充消息M并将其划分为q个固定大小r的消息块Mi,吸收阶段使用CNN - Blocki对消息块进行哈希并产生中间哈希值HMi,压缩阶段从HMq开始产生期望长度的最终哈希值h。海绵构造与CNN - Blocki相结合,一方面提高了所提哈希函数的安全性,另一方面使哈希值的长度更具动态性。理论分析和实验仿真表明,与SHA-3相比,所提出的哈希函数KSCNN具有良好的统计性能、较强的抗碰撞性和较高的消息灵敏度,并且对预图像、二次预图像和碰撞攻击具有免疫力。
{"title":"New keyed chaotic neural network hash function based on sponge construction","authors":"Nabil Abdoun, S. E. Assad, Khodor Hammoud, R. Assaf, Mohamad Khalil, O. Déforges","doi":"10.23919/ICITST.2017.8356341","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356341","url":null,"abstract":"This paper presents a new structure for keyed hash function based on chaotic maps, neural network and sponge construction. The structure of proposed Keyed Sponge Chaotic Neural Network KSCNN hash function is composed of three phases: the initialization phase pads the message M and divides it into q message blocks Mi of fixed size r, the absorbing phase hashes the message blocks by using CNN — Blocki and produces the intermediate hash value HMi and the squeezing phase produces, starting from HMq, the final hash value h with desired length. The combining of sponge construction with the CNN — Blocki improves, on one hand, the security of proposed hash function and makes, on the other hand, the length of hash value more dynamic. Our theoretical analysis and experimental simulations show that the proposed hash function KSCNN has good statistical properties, strong collision resistance, high message sensitivity compared with SHA-3 and immune against pre-image, second pre-image and collision attacks.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134456627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing security in the cloud: When traceability meets access control 增强云中的安全性:当可追溯性满足访问控制时
Clara Bertolissi, Omar Boucelma, Worachet Uttha
Cloud Computing technology is gaining momentum, however security concerns remain one of the top barrier to cloud projects. We propose a framework that ensures data control and privacy in the cloud by using traceability (aka Provenance) combined with expressive access control policies based on user categorization.
云计算技术正在获得动力,但是安全问题仍然是云项目的最大障碍之一。我们提出了一个框架,通过使用可追溯性(又名出处)和基于用户分类的表达性访问控制策略来确保云中的数据控制和隐私。
{"title":"Enhancing security in the cloud: When traceability meets access control","authors":"Clara Bertolissi, Omar Boucelma, Worachet Uttha","doi":"10.23919/ICITST.2017.8356420","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356420","url":null,"abstract":"Cloud Computing technology is gaining momentum, however security concerns remain one of the top barrier to cloud projects. We propose a framework that ensures data control and privacy in the cloud by using traceability (aka Provenance) combined with expressive access control policies based on user categorization.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129238384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the cost of cyber security in smart business 关于智能商业的网络安全成本
Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Tauber
In a world, as complex and constantly changing as ours cloud computing is a driving force for shaping the IT landscape and changing the way we do business. Current trends show a world of people, things and services all digitally interconnected via the Internet of Things (IoT). This applies in particular to an industrial environment where smart devices and intelligent services pave the way for smart factories and smart businesses. This paper investigates in a use case driven study the potential of making use of smart devices to enable direct, automated and voice-controlled smart businesses. Furthermore, the paper presents an initial investigation on methodologies for measuring costs of cyber security controls for cloud services.
在一个像我们这样复杂和不断变化的世界里,云计算是塑造IT景观和改变我们开展业务方式的驱动力。目前的趋势显示,通过物联网(IoT),人、物和服务都将实现数字化互联。这尤其适用于智能设备和智能服务为智能工厂和智能企业铺平道路的工业环境。本文在用例驱动研究中调查了利用智能设备实现直接、自动化和语音控制智能业务的潜力。此外,本文对云服务网络安全控制成本的测量方法进行了初步调查。
{"title":"On the cost of cyber security in smart business","authors":"Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Tauber","doi":"10.23919/ICITST.2017.8356395","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356395","url":null,"abstract":"In a world, as complex and constantly changing as ours cloud computing is a driving force for shaping the IT landscape and changing the way we do business. Current trends show a world of people, things and services all digitally interconnected via the Internet of Things (IoT). This applies in particular to an industrial environment where smart devices and intelligent services pave the way for smart factories and smart businesses. This paper investigates in a use case driven study the potential of making use of smart devices to enable direct, automated and voice-controlled smart businesses. Furthermore, the paper presents an initial investigation on methodologies for measuring costs of cyber security controls for cloud services.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a security baseline for IaaS-cloud back-ends in Industry 4.0 工业4.0时代iaas云后端的安全基线
Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Tauber, A. Wöhrer
The popularity of cloud based Infrastructure-as-a-Service (IaaS) solutions is becoming increasingly popular. However, since IaaS providers and customers interact in a flexible and scalable environment, security remains a serious concern. To handle such security issues, defining a set of security parameters in the service level agreements (SLA) between both, IaaS provider and customer, is of utmost importance. In this paper, the European Network and Information Security Agency (ENISA) guidelines are evaluated to extract a set of security parameters for IaaS. Furthermore, the level of applicability and implementation of this set is used to assess popular industrial and open-source IaaS cloud platforms, respectively VMware and OpenStack. Both platforms provide private clouds, used as backend infrastructures in Industry 4.0 application scenarios. The results serve as initial work to identify a security baseline and research needs for creating secure cloud environments for Industry 4.0.
基于云的基础设施即服务(IaaS)解决方案正变得越来越流行。然而,由于IaaS提供商和客户在灵活和可伸缩的环境中交互,安全性仍然是一个严重的问题。为了处理此类安全问题,在IaaS提供商和客户之间的服务水平协议(SLA)中定义一组安全参数是至关重要的。在本文中,评估了欧洲网络和信息安全局(ENISA)的指导方针,以提取一组IaaS的安全参数。此外,本集的适用性和实现程度分别用于评估流行的工业和开源IaaS云平台,分别是VMware和OpenStack。这两个平台都提供私有云,用作工业4.0应用场景中的后端基础设施。研究结果可作为初步工作,用于确定为工业4.0创建安全云环境的安全基线和研究需求。
{"title":"Towards a security baseline for IaaS-cloud back-ends in Industry 4.0","authors":"Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Tauber, A. Wöhrer","doi":"10.23919/ICITST.2017.8356438","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356438","url":null,"abstract":"The popularity of cloud based Infrastructure-as-a-Service (IaaS) solutions is becoming increasingly popular. However, since IaaS providers and customers interact in a flexible and scalable environment, security remains a serious concern. To handle such security issues, defining a set of security parameters in the service level agreements (SLA) between both, IaaS provider and customer, is of utmost importance. In this paper, the European Network and Information Security Agency (ENISA) guidelines are evaluated to extract a set of security parameters for IaaS. Furthermore, the level of applicability and implementation of this set is used to assess popular industrial and open-source IaaS cloud platforms, respectively VMware and OpenStack. Both platforms provide private clouds, used as backend infrastructures in Industry 4.0 application scenarios. The results serve as initial work to identify a security baseline and research needs for creating secure cloud environments for Industry 4.0.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards comparing programming paradigms 比较编程范型
Igor Ivkic, Markus Tauber, A. Wöhrer
Rapid technological progress in computer sciences finds solutions and at the same time creates ever more complex requirements. Due to an evolving complexity today's programming languages provide powerful frameworks which offer standard solutions for recurring tasks to assist the programmer and to avoid the re-invention of the wheel with so-called “out-of-the-box-features”. In this paper, we propose a way of comparing different programming paradigms on a theoretical, technical and practical level. Furthermore, the paper presents the results of an initial comparison of two representative programming approaches, both in the closed SAP environment.
计算机科学的快速技术进步找到了解决方案,同时也产生了更复杂的需求。由于不断发展的复杂性,今天的编程语言提供了强大的框架,为反复出现的任务提供了标准解决方案,以帮助程序员避免使用所谓的“开箱即用功能”重新发明轮子。在本文中,我们提出了一种在理论、技术和实践层面上比较不同编程范式的方法。此外,本文还介绍了两种代表性编程方法的初步比较结果,这两种方法都是在封闭的SAP环境中进行的。
{"title":"Towards comparing programming paradigms","authors":"Igor Ivkic, Markus Tauber, A. Wöhrer","doi":"10.23919/ICITST.2017.8356440","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356440","url":null,"abstract":"Rapid technological progress in computer sciences finds solutions and at the same time creates ever more complex requirements. Due to an evolving complexity today's programming languages provide powerful frameworks which offer standard solutions for recurring tasks to assist the programmer and to avoid the re-invention of the wheel with so-called “out-of-the-box-features”. In this paper, we propose a way of comparing different programming paradigms on a theoretical, technical and practical level. Furthermore, the paper presents the results of an initial comparison of two representative programming approaches, both in the closed SAP environment.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127096918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions 网络学术信息获取:博士生网络自我效能感与情绪
Yen-Mei Lee
The main purpose of this proposed study is to understand the relationship between doctoral students' Internet self-efficacy and their affections when seeking academic information on the Internet. A structured questionnaire will be designed and conducted for 300 doctoral students. Participants' demographic information, information seeking behavior, Internet self-efficacy, and emotions will be measured in this questionnaire by using Information-Seeking Behavior Scale (ISBS), Internet Self-efficacy Scale (ISS), and the Positive and Negative Affect Schedule (PANAS). For the predicted outcomes, doctoral students' academic information seeking behaviors will be analyzed. Moreover, the interventions among doctoral students' Internet self-efficacy, emotions, and their information seeking behaviors will be analyzed and addressed. In the future, this proposed study will be conducted practically. The expected findings will be proposed for doctoral students so that they can based on the provided information to build up their suitable information seeking styles. Furthermore, the expected findings can also be presented for professionals, scholars, or even doctoral students' academic advisors who mainly do research and seek academic information online to have a better understanding of doctoral students' mental and psychical statuses on conducting academic information seeking activity on the Internet. To sum up, the results will not only reflect doctoral students' information seeking behaviors but also provide helpful suggestions for further researches.
本研究的主要目的是了解博士生在互联网上寻求学术信息时的网络自我效能感与情感的关系。将对300名博士生设计并进行结构化问卷调查。本问卷采用信息寻求行为量表(ISBS)、网络自我效能量表(ISS)和积极消极影响量表(PANAS)测量被试的人口统计信息、信息寻求行为、网络自我效能感和情绪。对于预测结果,将分析博士生的学术信息寻求行为。此外,本文还分析了博士生网络自我效能感、情绪和信息寻求行为的干预因素。在未来,本研究将在实际中进行。本研究将提出预期的研究结果,以供博士生根据所提供的资讯,建立适合自己的资讯搜寻风格。此外,还可以将预期的研究结果呈现给主要从事网络研究和学术信息搜寻的专业人士、学者,甚至博士生的学术导师,从而更好地了解博士生在网络上进行学术信息搜寻活动的心理和心理状态。综上所述,研究结果不仅反映了博士生的信息寻求行为,也为进一步的研究提供了有益的建议。
{"title":"Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions","authors":"Yen-Mei Lee","doi":"10.23919/ICITST.2017.8356409","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356409","url":null,"abstract":"The main purpose of this proposed study is to understand the relationship between doctoral students' Internet self-efficacy and their affections when seeking academic information on the Internet. A structured questionnaire will be designed and conducted for 300 doctoral students. Participants' demographic information, information seeking behavior, Internet self-efficacy, and emotions will be measured in this questionnaire by using Information-Seeking Behavior Scale (ISBS), Internet Self-efficacy Scale (ISS), and the Positive and Negative Affect Schedule (PANAS). For the predicted outcomes, doctoral students' academic information seeking behaviors will be analyzed. Moreover, the interventions among doctoral students' Internet self-efficacy, emotions, and their information seeking behaviors will be analyzed and addressed. In the future, this proposed study will be conducted practically. The expected findings will be proposed for doctoral students so that they can based on the provided information to build up their suitable information seeking styles. Furthermore, the expected findings can also be presented for professionals, scholars, or even doctoral students' academic advisors who mainly do research and seek academic information online to have a better understanding of doctoral students' mental and psychical statuses on conducting academic information seeking activity on the Internet. To sum up, the results will not only reflect doctoral students' information seeking behaviors but also provide helpful suggestions for further researches.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124702089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Work in Progress: Nobody knows who you really are online/on the world wide web — Amazon-recognition-service based ‘Virtualnet’ supported authentication: How certain are you it is indeed you in front of a screen? 正在进行的工作:没有人知道你在网上/在万维网上的真实身份——基于亚马逊识别服务的“虚拟网络”支持身份验证:你有多确定屏幕前的你就是你?
Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian
A specific project on its development phase is recounted on this paper which looks to strengthen authenticity, verification and validation of student identity levels that perform learning processes, mediated by ‘Virtualnet’ — an e-learning platform from Universidad Manuela Beltrán. To achieve this, a special face-recognition algorithm inclusion is suggested which in first instance is designed and tested to be later implemented as a prototype in the testing (exams) module from the online courses offered on this LMS.
本文叙述了其开发阶段的一个具体项目,该项目旨在通过“Virtualnet”(universsidad Manuela Beltrán的电子学习平台)来加强执行学习过程的学生身份水平的真实性、验证和验证。为了实现这一目标,提出了一种特殊的人脸识别算法,该算法首先被设计和测试,然后作为原型在LMS上提供的在线课程的测试(考试)模块中实现。
{"title":"Work in Progress: Nobody knows who you really are online/on the world wide web — Amazon-recognition-service based ‘Virtualnet’ supported authentication: How certain are you it is indeed you in front of a screen?","authors":"Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian","doi":"10.23919/ICITST.2017.8356414","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356414","url":null,"abstract":"A specific project on its development phase is recounted on this paper which looks to strengthen authenticity, verification and validation of student identity levels that perform learning processes, mediated by ‘Virtualnet’ — an e-learning platform from Universidad Manuela Beltrán. To achieve this, a special face-recognition algorithm inclusion is suggested which in first instance is designed and tested to be later implemented as a prototype in the testing (exams) module from the online courses offered on this LMS.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis of home user security awareness & education 家庭用户安全意识与教育分析
Fayez Alotaibi, N. Clarke, S. Furnell
The human factor is a major consideration in securing systems. People use an increasingly wide range of digital devices such as smartphones, tablets, laptops and smart TVs, with each device having a different operating system, security configurations and threats. This presents users with an unenviable and potentially insurmountable task of securing them. This paper presents an analysis of efforts being made in providing suitable awareness and education with home users. The analysis shows that whilst significant efforts are made, a focus upon a “one-fits-all” solution that does not take into account individual users — their needs, prior knowledge, learning styles and security priorities — results in unnecessary information overload and a need to spend an excessive amount of time reading web-based content that may have little relevance to them specifically. This review indicates that there is a need for an approach that can provide the users with bespoke awareness information. It is recommended that a holistic information security management system for home users can be proposed and designed which can provide users with bespoke awareness information based on the technologies, applications and services that users use in a manner that is acceptable and timely.
人为因素是确保系统安全的主要考虑因素。人们使用越来越广泛的数字设备,如智能手机、平板电脑、笔记本电脑和智能电视,每个设备都有不同的操作系统、安全配置和威胁。这给用户带来了一项不令人羡慕的、可能无法克服的保护任务。本文分析了在向家庭用户提供适当的意识和教育方面所做的努力。分析表明,虽然做出了重大努力,但专注于“一刀切”的解决方案,而不考虑个人用户的需求、先前的知识、学习风格和安全优先级,导致不必要的信息过载,并需要花费过多的时间阅读与他们没有什么具体相关性的网络内容。这一审查表明,需要一种方法,可以为用户提供定制的意识信息。建议为家庭用户提出和设计一个整体的资讯保安管理系统,根据用户使用的技术、应用程序和服务,以可接受和及时的方式为用户提供定制的意识信息。
{"title":"An analysis of home user security awareness & education","authors":"Fayez Alotaibi, N. Clarke, S. Furnell","doi":"10.23919/ICITST.2017.8356359","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356359","url":null,"abstract":"The human factor is a major consideration in securing systems. People use an increasingly wide range of digital devices such as smartphones, tablets, laptops and smart TVs, with each device having a different operating system, security configurations and threats. This presents users with an unenviable and potentially insurmountable task of securing them. This paper presents an analysis of efforts being made in providing suitable awareness and education with home users. The analysis shows that whilst significant efforts are made, a focus upon a “one-fits-all” solution that does not take into account individual users — their needs, prior knowledge, learning styles and security priorities — results in unnecessary information overload and a need to spend an excessive amount of time reading web-based content that may have little relevance to them specifically. This review indicates that there is a need for an approach that can provide the users with bespoke awareness information. It is recommended that a holistic information security management system for home users can be proposed and designed which can provide users with bespoke awareness information based on the technologies, applications and services that users use in a manner that is acceptable and timely.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intelligent safety management system for crowds using sensors 使用传感器的人群智能安全管理系统
Norah S. Farooqi
Crowd management is an important research area due to its impact on significant numbers of people in society. It has been studied from different perspectives including movement, tracking, monitoring, identification, and behaviour. However, this topic still suffers from limitations that require further developments. Safety concerns are a vital part of crowd management that necessitates more investigation. The proposed paper presents a safety management system for crowds using sensors to improve the safety level and to reduce dangerous situations. The proposed system handles external environmental safety issues and internal body safety effects. The system manages safety factors and evaluates situations as individuals' behaviours and group behaviour in the same location in order to identify hazards and avoid disaster in crowds.
人群管理是一个重要的研究领域,因为它影响着社会上大量的人。它已经从不同的角度进行了研究,包括运动、跟踪、监测、识别和行为。然而,这个主题仍然存在一些局限性,需要进一步发展。安全问题是人群管理的重要组成部分,需要进行更多的调查。本文提出了一种使用传感器的人群安全管理系统,以提高安全水平,减少危险情况。提出的系统处理外部环境安全问题和内部人体安全影响。该系统管理安全因素,并评估同一地点的个人行为和群体行为,以识别危险并避免人群中的灾难。
{"title":"Intelligent safety management system for crowds using sensors","authors":"Norah S. Farooqi","doi":"10.23919/ICITST.2017.8356365","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356365","url":null,"abstract":"Crowd management is an important research area due to its impact on significant numbers of people in society. It has been studied from different perspectives including movement, tracking, monitoring, identification, and behaviour. However, this topic still suffers from limitations that require further developments. Safety concerns are a vital part of crowd management that necessitates more investigation. The proposed paper presents a safety management system for crowds using sensors to improve the safety level and to reduce dangerous situations. The proposed system handles external environmental safety issues and internal body safety effects. The system manages safety factors and evaluates situations as individuals' behaviours and group behaviour in the same location in order to identify hazards and avoid disaster in crowds.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards a security and privacy co-creation method 一种安全与隐私的协同创造方法
C. Feltus, E. Proper
Cyber collaboration supports and increases the expansion of value co-creation amongst companies and customers by defining innovative business models and by exploiting new types of infrastructures like those dedicated to social media, collaborative workspaces, or e-supply chains for instance. This proliferation of new types of collaboration generates new types of security and privacy threats to be handled by the companies. The deployment of the appropriate controls to cope with the latter is of great value for the continuity of the day to day business. Therefore, in this paper, we investigate how security and privacy may be regarded as types of value and how they may be considered, in collaborative environments, through the lens of value co-creation. Acknowledging the similarities between security, privacy, and value, we afterwards propose a method to co-create security and privacy and we illustrate how the latter may be deployed in the frame of a financial case-study.
网络协作通过定义创新的商业模式和利用诸如社交媒体、协作工作空间或电子供应链等新型基础设施,支持并增加了公司和客户之间共同创造价值的扩展。这种新型协作的激增产生了需要公司处理的新型安全和隐私威胁。部署适当的控制来处理后者对于日常业务的连续性具有重要价值。因此,在本文中,我们研究了如何将安全和隐私视为价值类型,以及如何在协作环境中通过价值共同创造的视角来考虑它们。认识到安全、隐私和价值之间的相似之处,我们随后提出了一种共同创造安全和隐私的方法,并说明了后者如何在金融案例研究的框架中部署。
{"title":"Towards a security and privacy co-creation method","authors":"C. Feltus, E. Proper","doi":"10.23919/ICITST.2017.8356351","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356351","url":null,"abstract":"Cyber collaboration supports and increases the expansion of value co-creation amongst companies and customers by defining innovative business models and by exploiting new types of infrastructures like those dedicated to social media, collaborative workspaces, or e-supply chains for instance. This proliferation of new types of collaboration generates new types of security and privacy threats to be handled by the companies. The deployment of the appropriate controls to cope with the latter is of great value for the continuity of the day to day business. Therefore, in this paper, we investigate how security and privacy may be regarded as types of value and how they may be considered, in collaborative environments, through the lens of value co-creation. Acknowledging the similarities between security, privacy, and value, we afterwards propose a method to co-create security and privacy and we illustrate how the latter may be deployed in the frame of a financial case-study.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134017072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1