Pub Date : 2017-12-11DOI: 10.23919/ICITST.2017.8356341
Nabil Abdoun, S. E. Assad, Khodor Hammoud, R. Assaf, Mohamad Khalil, O. Déforges
This paper presents a new structure for keyed hash function based on chaotic maps, neural network and sponge construction. The structure of proposed Keyed Sponge Chaotic Neural Network KSCNN hash function is composed of three phases: the initialization phase pads the message M and divides it into q message blocks Mi of fixed size r, the absorbing phase hashes the message blocks by using CNN — Blocki and produces the intermediate hash value HMi and the squeezing phase produces, starting from HMq, the final hash value h with desired length. The combining of sponge construction with the CNN — Blocki improves, on one hand, the security of proposed hash function and makes, on the other hand, the length of hash value more dynamic. Our theoretical analysis and experimental simulations show that the proposed hash function KSCNN has good statistical properties, strong collision resistance, high message sensitivity compared with SHA-3 and immune against pre-image, second pre-image and collision attacks.
{"title":"New keyed chaotic neural network hash function based on sponge construction","authors":"Nabil Abdoun, S. E. Assad, Khodor Hammoud, R. Assaf, Mohamad Khalil, O. Déforges","doi":"10.23919/ICITST.2017.8356341","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356341","url":null,"abstract":"This paper presents a new structure for keyed hash function based on chaotic maps, neural network and sponge construction. The structure of proposed Keyed Sponge Chaotic Neural Network KSCNN hash function is composed of three phases: the initialization phase pads the message M and divides it into q message blocks Mi of fixed size r, the absorbing phase hashes the message blocks by using CNN — Blocki and produces the intermediate hash value HMi and the squeezing phase produces, starting from HMq, the final hash value h with desired length. The combining of sponge construction with the CNN — Blocki improves, on one hand, the security of proposed hash function and makes, on the other hand, the length of hash value more dynamic. Our theoretical analysis and experimental simulations show that the proposed hash function KSCNN has good statistical properties, strong collision resistance, high message sensitivity compared with SHA-3 and immune against pre-image, second pre-image and collision attacks.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134456627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-11DOI: 10.23919/ICITST.2017.8356420
Clara Bertolissi, Omar Boucelma, Worachet Uttha
Cloud Computing technology is gaining momentum, however security concerns remain one of the top barrier to cloud projects. We propose a framework that ensures data control and privacy in the cloud by using traceability (aka Provenance) combined with expressive access control policies based on user categorization.
{"title":"Enhancing security in the cloud: When traceability meets access control","authors":"Clara Bertolissi, Omar Boucelma, Worachet Uttha","doi":"10.23919/ICITST.2017.8356420","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356420","url":null,"abstract":"Cloud Computing technology is gaining momentum, however security concerns remain one of the top barrier to cloud projects. We propose a framework that ensures data control and privacy in the cloud by using traceability (aka Provenance) combined with expressive access control policies based on user categorization.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129238384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-11DOI: 10.23919/ICITST.2017.8356395
Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Tauber
In a world, as complex and constantly changing as ours cloud computing is a driving force for shaping the IT landscape and changing the way we do business. Current trends show a world of people, things and services all digitally interconnected via the Internet of Things (IoT). This applies in particular to an industrial environment where smart devices and intelligent services pave the way for smart factories and smart businesses. This paper investigates in a use case driven study the potential of making use of smart devices to enable direct, automated and voice-controlled smart businesses. Furthermore, the paper presents an initial investigation on methodologies for measuring costs of cyber security controls for cloud services.
{"title":"On the cost of cyber security in smart business","authors":"Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Tauber","doi":"10.23919/ICITST.2017.8356395","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356395","url":null,"abstract":"In a world, as complex and constantly changing as ours cloud computing is a driving force for shaping the IT landscape and changing the way we do business. Current trends show a world of people, things and services all digitally interconnected via the Internet of Things (IoT). This applies in particular to an industrial environment where smart devices and intelligent services pave the way for smart factories and smart businesses. This paper investigates in a use case driven study the potential of making use of smart devices to enable direct, automated and voice-controlled smart businesses. Furthermore, the paper presents an initial investigation on methodologies for measuring costs of cyber security controls for cloud services.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-11DOI: 10.23919/ICITST.2017.8356438
Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Tauber, A. Wöhrer
The popularity of cloud based Infrastructure-as-a-Service (IaaS) solutions is becoming increasingly popular. However, since IaaS providers and customers interact in a flexible and scalable environment, security remains a serious concern. To handle such security issues, defining a set of security parameters in the service level agreements (SLA) between both, IaaS provider and customer, is of utmost importance. In this paper, the European Network and Information Security Agency (ENISA) guidelines are evaluated to extract a set of security parameters for IaaS. Furthermore, the level of applicability and implementation of this set is used to assess popular industrial and open-source IaaS cloud platforms, respectively VMware and OpenStack. Both platforms provide private clouds, used as backend infrastructures in Industry 4.0 application scenarios. The results serve as initial work to identify a security baseline and research needs for creating secure cloud environments for Industry 4.0.
{"title":"Towards a security baseline for IaaS-cloud back-ends in Industry 4.0","authors":"Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Tauber, A. Wöhrer","doi":"10.23919/ICITST.2017.8356438","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356438","url":null,"abstract":"The popularity of cloud based Infrastructure-as-a-Service (IaaS) solutions is becoming increasingly popular. However, since IaaS providers and customers interact in a flexible and scalable environment, security remains a serious concern. To handle such security issues, defining a set of security parameters in the service level agreements (SLA) between both, IaaS provider and customer, is of utmost importance. In this paper, the European Network and Information Security Agency (ENISA) guidelines are evaluated to extract a set of security parameters for IaaS. Furthermore, the level of applicability and implementation of this set is used to assess popular industrial and open-source IaaS cloud platforms, respectively VMware and OpenStack. Both platforms provide private clouds, used as backend infrastructures in Industry 4.0 application scenarios. The results serve as initial work to identify a security baseline and research needs for creating secure cloud environments for Industry 4.0.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-11DOI: 10.23919/ICITST.2017.8356440
Igor Ivkic, Markus Tauber, A. Wöhrer
Rapid technological progress in computer sciences finds solutions and at the same time creates ever more complex requirements. Due to an evolving complexity today's programming languages provide powerful frameworks which offer standard solutions for recurring tasks to assist the programmer and to avoid the re-invention of the wheel with so-called “out-of-the-box-features”. In this paper, we propose a way of comparing different programming paradigms on a theoretical, technical and practical level. Furthermore, the paper presents the results of an initial comparison of two representative programming approaches, both in the closed SAP environment.
{"title":"Towards comparing programming paradigms","authors":"Igor Ivkic, Markus Tauber, A. Wöhrer","doi":"10.23919/ICITST.2017.8356440","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356440","url":null,"abstract":"Rapid technological progress in computer sciences finds solutions and at the same time creates ever more complex requirements. Due to an evolving complexity today's programming languages provide powerful frameworks which offer standard solutions for recurring tasks to assist the programmer and to avoid the re-invention of the wheel with so-called “out-of-the-box-features”. In this paper, we propose a way of comparing different programming paradigms on a theoretical, technical and practical level. Furthermore, the paper presents the results of an initial comparison of two representative programming approaches, both in the closed SAP environment.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127096918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356409
Yen-Mei Lee
The main purpose of this proposed study is to understand the relationship between doctoral students' Internet self-efficacy and their affections when seeking academic information on the Internet. A structured questionnaire will be designed and conducted for 300 doctoral students. Participants' demographic information, information seeking behavior, Internet self-efficacy, and emotions will be measured in this questionnaire by using Information-Seeking Behavior Scale (ISBS), Internet Self-efficacy Scale (ISS), and the Positive and Negative Affect Schedule (PANAS). For the predicted outcomes, doctoral students' academic information seeking behaviors will be analyzed. Moreover, the interventions among doctoral students' Internet self-efficacy, emotions, and their information seeking behaviors will be analyzed and addressed. In the future, this proposed study will be conducted practically. The expected findings will be proposed for doctoral students so that they can based on the provided information to build up their suitable information seeking styles. Furthermore, the expected findings can also be presented for professionals, scholars, or even doctoral students' academic advisors who mainly do research and seek academic information online to have a better understanding of doctoral students' mental and psychical statuses on conducting academic information seeking activity on the Internet. To sum up, the results will not only reflect doctoral students' information seeking behaviors but also provide helpful suggestions for further researches.
{"title":"Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions","authors":"Yen-Mei Lee","doi":"10.23919/ICITST.2017.8356409","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356409","url":null,"abstract":"The main purpose of this proposed study is to understand the relationship between doctoral students' Internet self-efficacy and their affections when seeking academic information on the Internet. A structured questionnaire will be designed and conducted for 300 doctoral students. Participants' demographic information, information seeking behavior, Internet self-efficacy, and emotions will be measured in this questionnaire by using Information-Seeking Behavior Scale (ISBS), Internet Self-efficacy Scale (ISS), and the Positive and Negative Affect Schedule (PANAS). For the predicted outcomes, doctoral students' academic information seeking behaviors will be analyzed. Moreover, the interventions among doctoral students' Internet self-efficacy, emotions, and their information seeking behaviors will be analyzed and addressed. In the future, this proposed study will be conducted practically. The expected findings will be proposed for doctoral students so that they can based on the provided information to build up their suitable information seeking styles. Furthermore, the expected findings can also be presented for professionals, scholars, or even doctoral students' academic advisors who mainly do research and seek academic information online to have a better understanding of doctoral students' mental and psychical statuses on conducting academic information seeking activity on the Internet. To sum up, the results will not only reflect doctoral students' information seeking behaviors but also provide helpful suggestions for further researches.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124702089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356414
Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian
A specific project on its development phase is recounted on this paper which looks to strengthen authenticity, verification and validation of student identity levels that perform learning processes, mediated by ‘Virtualnet’ — an e-learning platform from Universidad Manuela Beltrán. To achieve this, a special face-recognition algorithm inclusion is suggested which in first instance is designed and tested to be later implemented as a prototype in the testing (exams) module from the online courses offered on this LMS.
{"title":"Work in Progress: Nobody knows who you really are online/on the world wide web — Amazon-recognition-service based ‘Virtualnet’ supported authentication: How certain are you it is indeed you in front of a screen?","authors":"Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian","doi":"10.23919/ICITST.2017.8356414","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356414","url":null,"abstract":"A specific project on its development phase is recounted on this paper which looks to strengthen authenticity, verification and validation of student identity levels that perform learning processes, mediated by ‘Virtualnet’ — an e-learning platform from Universidad Manuela Beltrán. To achieve this, a special face-recognition algorithm inclusion is suggested which in first instance is designed and tested to be later implemented as a prototype in the testing (exams) module from the online courses offered on this LMS.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356359
Fayez Alotaibi, N. Clarke, S. Furnell
The human factor is a major consideration in securing systems. People use an increasingly wide range of digital devices such as smartphones, tablets, laptops and smart TVs, with each device having a different operating system, security configurations and threats. This presents users with an unenviable and potentially insurmountable task of securing them. This paper presents an analysis of efforts being made in providing suitable awareness and education with home users. The analysis shows that whilst significant efforts are made, a focus upon a “one-fits-all” solution that does not take into account individual users — their needs, prior knowledge, learning styles and security priorities — results in unnecessary information overload and a need to spend an excessive amount of time reading web-based content that may have little relevance to them specifically. This review indicates that there is a need for an approach that can provide the users with bespoke awareness information. It is recommended that a holistic information security management system for home users can be proposed and designed which can provide users with bespoke awareness information based on the technologies, applications and services that users use in a manner that is acceptable and timely.
{"title":"An analysis of home user security awareness & education","authors":"Fayez Alotaibi, N. Clarke, S. Furnell","doi":"10.23919/ICITST.2017.8356359","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356359","url":null,"abstract":"The human factor is a major consideration in securing systems. People use an increasingly wide range of digital devices such as smartphones, tablets, laptops and smart TVs, with each device having a different operating system, security configurations and threats. This presents users with an unenviable and potentially insurmountable task of securing them. This paper presents an analysis of efforts being made in providing suitable awareness and education with home users. The analysis shows that whilst significant efforts are made, a focus upon a “one-fits-all” solution that does not take into account individual users — their needs, prior knowledge, learning styles and security priorities — results in unnecessary information overload and a need to spend an excessive amount of time reading web-based content that may have little relevance to them specifically. This review indicates that there is a need for an approach that can provide the users with bespoke awareness information. It is recommended that a holistic information security management system for home users can be proposed and designed which can provide users with bespoke awareness information based on the technologies, applications and services that users use in a manner that is acceptable and timely.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356365
Norah S. Farooqi
Crowd management is an important research area due to its impact on significant numbers of people in society. It has been studied from different perspectives including movement, tracking, monitoring, identification, and behaviour. However, this topic still suffers from limitations that require further developments. Safety concerns are a vital part of crowd management that necessitates more investigation. The proposed paper presents a safety management system for crowds using sensors to improve the safety level and to reduce dangerous situations. The proposed system handles external environmental safety issues and internal body safety effects. The system manages safety factors and evaluates situations as individuals' behaviours and group behaviour in the same location in order to identify hazards and avoid disaster in crowds.
{"title":"Intelligent safety management system for crowds using sensors","authors":"Norah S. Farooqi","doi":"10.23919/ICITST.2017.8356365","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356365","url":null,"abstract":"Crowd management is an important research area due to its impact on significant numbers of people in society. It has been studied from different perspectives including movement, tracking, monitoring, identification, and behaviour. However, this topic still suffers from limitations that require further developments. Safety concerns are a vital part of crowd management that necessitates more investigation. The proposed paper presents a safety management system for crowds using sensors to improve the safety level and to reduce dangerous situations. The proposed system handles external environmental safety issues and internal body safety effects. The system manages safety factors and evaluates situations as individuals' behaviours and group behaviour in the same location in order to identify hazards and avoid disaster in crowds.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356351
C. Feltus, E. Proper
Cyber collaboration supports and increases the expansion of value co-creation amongst companies and customers by defining innovative business models and by exploiting new types of infrastructures like those dedicated to social media, collaborative workspaces, or e-supply chains for instance. This proliferation of new types of collaboration generates new types of security and privacy threats to be handled by the companies. The deployment of the appropriate controls to cope with the latter is of great value for the continuity of the day to day business. Therefore, in this paper, we investigate how security and privacy may be regarded as types of value and how they may be considered, in collaborative environments, through the lens of value co-creation. Acknowledging the similarities between security, privacy, and value, we afterwards propose a method to co-create security and privacy and we illustrate how the latter may be deployed in the frame of a financial case-study.
{"title":"Towards a security and privacy co-creation method","authors":"C. Feltus, E. Proper","doi":"10.23919/ICITST.2017.8356351","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356351","url":null,"abstract":"Cyber collaboration supports and increases the expansion of value co-creation amongst companies and customers by defining innovative business models and by exploiting new types of infrastructures like those dedicated to social media, collaborative workspaces, or e-supply chains for instance. This proliferation of new types of collaboration generates new types of security and privacy threats to be handled by the companies. The deployment of the appropriate controls to cope with the latter is of great value for the continuity of the day to day business. Therefore, in this paper, we investigate how security and privacy may be regarded as types of value and how they may be considered, in collaborative environments, through the lens of value co-creation. Acknowledging the similarities between security, privacy, and value, we afterwards propose a method to co-create security and privacy and we illustrate how the latter may be deployed in the frame of a financial case-study.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134017072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}