首页 > 最新文献

2018 International Arab Conference on Information Technology (ACIT)最新文献

英文 中文
Feature Selection for Android Keystroke Dynamics 功能选择为Android击键动力学
Pub Date : 2018-11-01 DOI: 10.1109/ACIT.2018.8672706
Dima El Zein, A. Kalakech
Keystroke Dynamic Authentication is the way of authenticating users by analyzing their typing rhythm and behavior. While key hold time, inter-key interval time and flight time can be captured on all devices; applying Keystroke Dynamic Authentication to mobile devices allows capturing and analyzing additional keystroke features like finger area on screen, and pressure applied on the key. This paper aims to reduce the number of captured features without affecting the efficiency of the user prediction. For this purpose, we used a benchmark dataset and implemented 3 different filter feature selection methods to sort the features by their relevance. Sets of different sizes were created and tested against classification methods.
击键动态认证是一种通过分析用户的输入节奏和行为对用户进行认证的方法。键保持时间、键间间隔时间和飞行时间可以在所有设备上捕获;将击键动态认证应用于移动设备,可以捕获和分析额外的击键功能,如屏幕上的手指区域和键上施加的压力。本文的目标是在不影响用户预测效率的前提下减少捕获的特征数量。为此,我们使用了一个基准数据集,并实现了3种不同的过滤器特征选择方法,根据它们的相关性对特征进行排序。创建了不同大小的集合,并根据分类方法进行了测试。
{"title":"Feature Selection for Android Keystroke Dynamics","authors":"Dima El Zein, A. Kalakech","doi":"10.1109/ACIT.2018.8672706","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672706","url":null,"abstract":"Keystroke Dynamic Authentication is the way of authenticating users by analyzing their typing rhythm and behavior. While key hold time, inter-key interval time and flight time can be captured on all devices; applying Keystroke Dynamic Authentication to mobile devices allows capturing and analyzing additional keystroke features like finger area on screen, and pressure applied on the key. This paper aims to reduce the number of captured features without affecting the efficiency of the user prediction. For this purpose, we used a benchmark dataset and implemented 3 different filter feature selection methods to sort the features by their relevance. Sets of different sizes were created and tested against classification methods.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"36 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113993727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study of Word Embeddings Models and Their Usage in Arabic Language Applications 词嵌入模型及其在阿拉伯语应用中的比较研究
Pub Date : 2018-11-01 DOI: 10.1109/ACIT.2018.8672674
Dima Suleiman, A. Awajan
Word embeddings is the representation of the text using vectors such that the words that have similar syntax and semantic will have similar vector representation. Representing words using vectors is very crucial for most of natural language processing applications. In natural language, when using neural network for processing, the words vectors will be fed as input to the network. In this paper, a comparative study of several word embeddings models is conducted including Glove and the two approaches of word2vec model called CBOW and Skip-gram. Furthermore, this study surveying most of the state-of-art of using word embeddings in Arabic language applications such as sentiment analysis, semantic similarity, short answer grading, information retrieval, paraphrase identification, plagiarism detection and Textual Entailment.
词嵌入是使用向量表示文本,这样具有相似语法和语义的词将具有相似的向量表示。对于大多数自然语言处理应用来说,使用向量表示单词是非常关键的。在自然语言中,当使用神经网络进行处理时,将单词向量作为输入馈送到网络中。本文对Glove和word2vec模型中的CBOW和Skip-gram两种方法进行了比较研究。此外,本研究还综述了目前在阿拉伯语应用中使用词嵌入的研究现状,如情感分析、语义相似度、简答评分、信息检索、释义识别、抄袭检测和文本蕴涵等。
{"title":"Comparative Study of Word Embeddings Models and Their Usage in Arabic Language Applications","authors":"Dima Suleiman, A. Awajan","doi":"10.1109/ACIT.2018.8672674","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672674","url":null,"abstract":"Word embeddings is the representation of the text using vectors such that the words that have similar syntax and semantic will have similar vector representation. Representing words using vectors is very crucial for most of natural language processing applications. In natural language, when using neural network for processing, the words vectors will be fed as input to the network. In this paper, a comparative study of several word embeddings models is conducted including Glove and the two approaches of word2vec model called CBOW and Skip-gram. Furthermore, this study surveying most of the state-of-art of using word embeddings in Arabic language applications such as sentiment analysis, semantic similarity, short answer grading, information retrieval, paraphrase identification, plagiarism detection and Textual Entailment.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124034638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Kripke Structure for the Ontology Alignment 本体对齐的Kripke结构
Pub Date : 2018-11-01 DOI: 10.1109/ACIT.2018.8672692
Manel Kolli
In this paper, we propose a new way for the ontology alignment formalization using the Kripke structure in order to be able to exploiting a reliable tool as the Model checking. This later is a powerful mechanism for system verification. Here, the Kripke structures are used to model the behaviors of the ontology of alignment.
本文提出了一种利用Kripke结构进行本体对齐形式化的新方法,以便能够利用一种可靠的工具作为模型检查。这是一种用于系统验证的强大机制。在这里,Kripke结构被用来建模对齐本体的行为。
{"title":"A Kripke Structure for the Ontology Alignment","authors":"Manel Kolli","doi":"10.1109/ACIT.2018.8672692","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672692","url":null,"abstract":"In this paper, we propose a new way for the ontology alignment formalization using the Kripke structure in order to be able to exploiting a reliable tool as the Model checking. This later is a powerful mechanism for system verification. Here, the Kripke structures are used to model the behaviors of the ontology of alignment.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Convolutional Neural Network and BLSTM for Offline Arabic Handwriting Recognition 基于卷积神经网络和BLSTM的离线阿拉伯手写识别
Pub Date : 2018-11-01 DOI: 10.1109/ACIT.2018.8672667
R. Maalej, M. Kherallah
There have been an exciting advance in machine learning during the last decade. In fact, increasing computer processing power has supported the analytical capabilities of recognition systems. In this study, we focus on Offline Arabic handwritten recognition and for this task, we propose a new system based on the integration of two deep neural networks. First a Convolutional Neural Network (CNN) to automatically extract features from raw images, then the Bidirectional Long Short-Term Memory (BLSTM) followed by a Connectionist Temporal Classification layer (CTC) for sequence labelling. We validate this model on an extended IFN/ENIT database, created with data augmentation techniques. This hybrid architecture results in appealing performance. It outperforms both hand-crafted features-based approaches and models based on automatic features extraction. According to the experiments results, the recognition rate reaches 92.21%.
在过去的十年里,机器学习取得了令人兴奋的进展。事实上,不断增强的计算机处理能力支持了识别系统的分析能力。在这项研究中,我们专注于离线阿拉伯语手写识别,为此我们提出了一个基于两个深度神经网络集成的新系统。首先使用卷积神经网络(CNN)从原始图像中自动提取特征,然后是双向长短期记忆(BLSTM),然后是连接时间分类层(CTC)进行序列标记。我们在一个扩展的IFN/ENIT数据库上验证了这个模型,该数据库是用数据增强技术创建的。这种混合体系结构产生了吸引人的性能。它优于基于手工特征的方法和基于自动特征提取的模型。实验结果表明,该方法的识别率达到92.21%。
{"title":"Convolutional Neural Network and BLSTM for Offline Arabic Handwriting Recognition","authors":"R. Maalej, M. Kherallah","doi":"10.1109/ACIT.2018.8672667","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672667","url":null,"abstract":"There have been an exciting advance in machine learning during the last decade. In fact, increasing computer processing power has supported the analytical capabilities of recognition systems. In this study, we focus on Offline Arabic handwritten recognition and for this task, we propose a new system based on the integration of two deep neural networks. First a Convolutional Neural Network (CNN) to automatically extract features from raw images, then the Bidirectional Long Short-Term Memory (BLSTM) followed by a Connectionist Temporal Classification layer (CTC) for sequence labelling. We validate this model on an extended IFN/ENIT database, created with data augmentation techniques. This hybrid architecture results in appealing performance. It outperforms both hand-crafted features-based approaches and models based on automatic features extraction. According to the experiments results, the recognition rate reaches 92.21%.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Performance Measurement Systems-Related Ontologies 与性能测量系统相关的本体
Pub Date : 2018-11-01 DOI: 10.1109/ACIT.2018.8672672
S. Chelbi, Nora Taleb
The semantic representation of organizations' performance measurement systems is critical in limiting problems arising from the increasing complexity of enterprises. Ontologies offer unambiguous semantics, which allows better information management and facilitates automated reasoning. In this work, a documentary analysis was done to summarize the most commonly cited performance measurement systems in the literature. The article also shows the contribution of using ontological models to support these systems and presents some examples of related work.
组织绩效测量系统的语义表示对于限制因企业日益复杂而产生的问题至关重要。本体提供明确的语义,这允许更好的信息管理并促进自动推理。在这项工作中,进行了文献分析,以总结文献中最常被引用的绩效评估系统。本文还展示了使用本体模型来支持这些系统的贡献,并提供了一些相关工作的示例。
{"title":"Performance Measurement Systems-Related Ontologies","authors":"S. Chelbi, Nora Taleb","doi":"10.1109/ACIT.2018.8672672","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672672","url":null,"abstract":"The semantic representation of organizations' performance measurement systems is critical in limiting problems arising from the increasing complexity of enterprises. Ontologies offer unambiguous semantics, which allows better information management and facilitates automated reasoning. In this work, a documentary analysis was done to summarize the most commonly cited performance measurement systems in the literature. The article also shows the contribution of using ontological models to support these systems and presents some examples of related work.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics 使用代码度量度量机密性、完整性和可用性的影响得分
Pub Date : 2018-11-01 DOI: 10.1109/ACIT.2018.8672678
Anas Al-Far, A. Qusef, Sufyan Almajali
Confidentiality, Integrity, and Availability are principal keys to build any secure software. Considering the security principles during the different software development phases would reduce software vulnerabilities. This paper measures the impact of the different software quality metrics on Confidentiality, Integrity, or Availability for any given object-oriented PHP application, which has a list of reported vulnerabilities. The National Vulnerability Database was used to provide the impact score on confidentiality, integrity, and availability for the reported vulnerabilities on the selected applications. This paper includes a study for these scores and its correlation with 25 code metrics for the given vulnerable source code. The achieved results were able to correlate 23.7% of the variability in ‘Integrity’ to four metrics: Vocabulary Used in Code, Card and Agresti, Intelligent Content, and Efferent Coupling metrics. The Length (Halstead metric) could alone predict about 24.2 % of the observed variability in ‘ Availability’. The results indicate no significant correlation of ‘Confidentiality’ with the tested code metrics.
机密性、完整性和可用性是构建任何安全软件的关键。在不同的软件开发阶段考虑安全原则可以减少软件漏洞。本文测量了不同软件质量度量对任何给定的面向对象的PHP应用程序的机密性、完整性或可用性的影响,该应用程序具有报告的漏洞列表。使用国家漏洞数据库为选定应用程序上报告的漏洞提供机密性、完整性和可用性方面的影响评分。本文包括对这些分数及其与给定易受攻击源代码的25个代码度量的相关性的研究。所取得的结果能够将23.7%的“完整性”可变性与四个指标相关联:代码中使用的词汇、卡片和数据库、智能内容和传出耦合指标。长度(Halstead度量)可以单独预测“可用性”中约24.2%的观察到的可变性。结果表明“机密性”与测试代码度量没有显著的相关性。
{"title":"Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics","authors":"Anas Al-Far, A. Qusef, Sufyan Almajali","doi":"10.1109/ACIT.2018.8672678","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672678","url":null,"abstract":"Confidentiality, Integrity, and Availability are principal keys to build any secure software. Considering the security principles during the different software development phases would reduce software vulnerabilities. This paper measures the impact of the different software quality metrics on Confidentiality, Integrity, or Availability for any given object-oriented PHP application, which has a list of reported vulnerabilities. The National Vulnerability Database was used to provide the impact score on confidentiality, integrity, and availability for the reported vulnerabilities on the selected applications. This paper includes a study for these scores and its correlation with 25 code metrics for the given vulnerable source code. The achieved results were able to correlate 23.7% of the variability in ‘Integrity’ to four metrics: Vocabulary Used in Code, Card and Agresti, Intelligent Content, and Efferent Coupling metrics. The Length (Halstead metric) could alone predict about 24.2 % of the observed variability in ‘ Availability’. The results indicate no significant correlation of ‘Confidentiality’ with the tested code metrics.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"501 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134387179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CAN Sniffing for Vehicle Condition, Driver Behavior Analysis and Data Logging 嗅探车辆状况,驾驶员行为分析和数据记录
Pub Date : 2018-11-01 DOI: 10.1109/ACIT.2018.8672721
A. Shaout, Dhanush Mysuru, Karthik Raghupathy
There are many Electronic Control Units (ECU) and sensors in a vehicle. The sensor information is sent via the Control Area Network (CAN) of a vehicle. Crucial data base by the CAN. This data may not be important to the driver, but if the CAN messages are analysed, then vehicle parameters and vehicle conditions can be determined. This data can determine ahead of time any possible future failure and the driver can be alerted about it. This paper presents standalone embedded system that could do the aforementioned task were valuable lives may be saved. The proposed hardware system acquires CAN data from a vehicle (CAN sniffing). The data is then processed and appropriate message is then displayed to the driver. The proposed system also stores the CAN messages on to an industrial grade SD card (CAN logging) for future analysis. The proposed system also perform driver behaviour and driving terrain analysis.
车辆中有许多电子控制单元(ECU)和传感器。传感器信息通过车辆的控制区域网络(CAN)发送。由CAN提供的关键数据库。这些数据对驾驶员来说可能并不重要,但如果对CAN信息进行分析,则可以确定车辆参数和车辆状况。这些数据可以提前确定任何可能的未来故障,并提醒司机。本文提出了一种独立的嵌入式系统,可以完成上述任务,从而挽救宝贵的生命。提出的硬件系统从车辆(CAN嗅探)获取CAN数据。然后对数据进行处理,并将适当的消息显示给驱动程序。该系统还将CAN消息存储到工业级SD卡(CAN日志)上,以供将来分析。该系统还执行驾驶员行为和驾驶地形分析。
{"title":"CAN Sniffing for Vehicle Condition, Driver Behavior Analysis and Data Logging","authors":"A. Shaout, Dhanush Mysuru, Karthik Raghupathy","doi":"10.1109/ACIT.2018.8672721","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672721","url":null,"abstract":"There are many Electronic Control Units (ECU) and sensors in a vehicle. The sensor information is sent via the Control Area Network (CAN) of a vehicle. Crucial data base by the CAN. This data may not be important to the driver, but if the CAN messages are analysed, then vehicle parameters and vehicle conditions can be determined. This data can determine ahead of time any possible future failure and the driver can be alerted about it. This paper presents standalone embedded system that could do the aforementioned task were valuable lives may be saved. The proposed hardware system acquires CAN data from a vehicle (CAN sniffing). The data is then processed and appropriate message is then displayed to the driver. The proposed system also stores the CAN messages on to an industrial grade SD card (CAN logging) for future analysis. The proposed system also perform driver behaviour and driving terrain analysis.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129469912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ACIT 2018
Pub Date : 2018-11-01 DOI: 10.1109/acit.2018.8672580
ACIT 2018
ACIT 2018
{"title":"ACIT 2018","authors":"","doi":"10.1109/acit.2018.8672580","DOIUrl":"https://doi.org/10.1109/acit.2018.8672580","url":null,"abstract":"ACIT 2018","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"9 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical, Numerical and Experimental Study of an Original Design for a Coplanar Circulator/Isolator Based on Thick and Thin Ferrite Film 基于厚/薄铁氧体膜的共面环行/隔离器原始设计的分析、数值和实验研究
Pub Date : 2018-11-01 DOI: 10.1109/ACIT.2018.8672675
O. Zahwe, Wala’a H. Nasser, Hassan Harb
This paper takes place in the field of passive microwave components. Coming from the requirements of mobile communication devices, miniaturization of microwave components is needed. Aimed at this objective, from several years we work on the development of a miniature planar circulator/isolator. The main aim in this paper is to show the circulator with different ferrite thickness and then to present a method to reduce the insertion loss of the circulator in function of the thickness of the ferrite film. The circulator is designed with new topology coplanar/microstrip. The analytical structure based on stripline circulator and analysed by using a three dimensional finite-element method. The circulator is then fabricated, and its properties in the microwave range are characterised using a network analyzer and a probing system. An additional part for the isolator with non-symmetrical was designed in order to reduce the insertion loss in the conductor and to obtain a large bandwidth comparing to the existing devices.
本文的研究方向是无源微波器件。从移动通信设备的要求出发,对微波器件的小型化提出了要求。针对这一目标,几年来我们一直致力于微型平面环行/隔离器的开发。本文的主要目的是展示不同铁氧体厚度的环行器,并在此基础上提出一种降低环行器插入损耗随铁氧体膜厚度变化的方法。环行器采用新型共面/微带拓扑结构设计。基于带状线环行器的解析结构,采用三维有限元方法进行了分析。然后制作了环行器,并使用网络分析仪和探测系统对其在微波范围内的特性进行了表征。为了减少导体内的插入损耗和获得比现有器件更大的带宽,设计了非对称隔离器的附加部分。
{"title":"Analytical, Numerical and Experimental Study of an Original Design for a Coplanar Circulator/Isolator Based on Thick and Thin Ferrite Film","authors":"O. Zahwe, Wala’a H. Nasser, Hassan Harb","doi":"10.1109/ACIT.2018.8672675","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672675","url":null,"abstract":"This paper takes place in the field of passive microwave components. Coming from the requirements of mobile communication devices, miniaturization of microwave components is needed. Aimed at this objective, from several years we work on the development of a miniature planar circulator/isolator. The main aim in this paper is to show the circulator with different ferrite thickness and then to present a method to reduce the insertion loss of the circulator in function of the thickness of the ferrite film. The circulator is designed with new topology coplanar/microstrip. The analytical structure based on stripline circulator and analysed by using a three dimensional finite-element method. The circulator is then fabricated, and its properties in the microwave range are characterised using a network analyzer and a probing system. An additional part for the isolator with non-symmetrical was designed in order to reduce the insertion loss in the conductor and to obtain a large bandwidth comparing to the existing devices.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CCTM - Cloud Computing Trust Model CCTM—云计算信任模型
Pub Date : 2018-11-01 DOI: 10.1109/ACIT.2018.8672583
Nevrus Kaja, A. Shaout
Trust is an important factor to consider when selecting a cloud computing provider. While some security models have failed to provide extended trustworthy in this space, this paper aims to propose a new approach to entering and trusting cloud computing. The proposed approach consists of developing a cloud computing trust model (CCTM) through a cloud computing security solution called H-AES. CCTM is designed with security features in mind and contains elements that are needed to build trust in a cloud computing environment. The CCMT model was derived heuristically based on literature review and surveying IT professionals. H-AES is a hardware implementation of the advanced encryption standard (AES) for data in transmission and is able to encrypt, decrypt and transmit information in a real time communication mode.
信任是选择云计算提供商时要考虑的一个重要因素。虽然一些安全模型未能在该领域提供扩展可信,但本文旨在提出一种进入和信任云计算的新方法。提出的方法包括通过云计算安全解决方案H-AES开发云计算信任模型(CCTM)。CCTM在设计时考虑了安全特性,并包含在云计算环境中构建信任所需的元素。CCMT模型是在文献回顾和调查IT专业人员的基础上启发式推导出来的。H-AES是数据传输高级加密标准AES (advanced encryption standard)的硬件实现,能够以实时通信的方式对信息进行加密、解密和传输。
{"title":"CCTM - Cloud Computing Trust Model","authors":"Nevrus Kaja, A. Shaout","doi":"10.1109/ACIT.2018.8672583","DOIUrl":"https://doi.org/10.1109/ACIT.2018.8672583","url":null,"abstract":"Trust is an important factor to consider when selecting a cloud computing provider. While some security models have failed to provide extended trustworthy in this space, this paper aims to propose a new approach to entering and trusting cloud computing. The proposed approach consists of developing a cloud computing trust model (CCTM) through a cloud computing security solution called H-AES. CCTM is designed with security features in mind and contains elements that are needed to build trust in a cloud computing environment. The CCMT model was derived heuristically based on literature review and surveying IT professionals. H-AES is a hardware implementation of the advanced encryption standard (AES) for data in transmission and is able to encrypt, decrypt and transmit information in a real time communication mode.","PeriodicalId":443170,"journal":{"name":"2018 International Arab Conference on Information Technology (ACIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 International Arab Conference on Information Technology (ACIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1