首页 > 最新文献

International Journal of Cooperative Information Systems最新文献

英文 中文
Binary Log Analysis on MySQL to Help Investigation Process Against Database Privillege Attacks MySQL二进制日志分析,帮助调查数据库特权攻击过程
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2020-05-18 DOI: 10.29040/IJCIS.V1I1.7
Siti Rokhmah, Ihsan Cahyo Utomo
Database is an important part in managing information, because a database is a collection of data that is processed to produce information. because of the importance of the database, many crimes are directed to attack the database, both attacks against access rights or attacks against the data itself. My SQL is a Database Management System (DBMS) that provides several facilities, one of which is the logging facility. Binary Log is a type of database log in the form of binary digits that contains some information including the record of the time of the transaction, the user who made the transaction and the order in the transaction. With the Binary Log, it can be seen when the transaction occurred, who made the transaction and what transaction occurred in the database. The recording of transactions in the Binary Log can be used as one way to carry out an investigation process in the event of an attack on the database. In this study the focus is on analyzing transaction records in binary logs, namely when, who, dam and what information can be taken from the Binary Log. The output of this research is a table of binary log investigation results and its relation to database attacks. Keywords— Binary Log, MySql, Database, Database Attack
数据库是管理信息的重要组成部分,因为数据库是经过处理以产生信息的数据集合。由于数据库的重要性,许多犯罪都是针对数据库的,无论是针对访问权限的攻击还是针对数据本身的攻击。My SQL是一个数据库管理系统(DBMS),它提供了多种功能,其中之一就是日志功能。二进制日志是一种以二进制数字形式记录的数据库日志,它包含一些信息,包括交易的时间记录、交易的用户记录和交易的顺序记录。使用二进制日志,可以看到事务发生的时间、谁执行了事务以及数据库中发生了什么事务。在二进制日志中记录事务可以用作在数据库受到攻击时执行调查过程的一种方法。本研究的重点是分析二进制日志中的交易记录,即可以从二进制日志中获取交易记录的时间、对象、对象和信息。本研究的输出是一个二进制日志调查结果及其与数据库攻击的关系表。关键词:二进制日志,MySql,数据库,数据库攻击
{"title":"Binary Log Analysis on MySQL to Help Investigation Process Against Database Privillege Attacks","authors":"Siti Rokhmah, Ihsan Cahyo Utomo","doi":"10.29040/IJCIS.V1I1.7","DOIUrl":"https://doi.org/10.29040/IJCIS.V1I1.7","url":null,"abstract":"Database is an important part in managing information, because a database is a collection of data that is processed to produce information. because of the importance of the database, many crimes are directed to attack the database, both attacks against access rights or attacks against the data itself. My SQL is a Database Management System (DBMS) that provides several facilities, one of which is the logging facility. Binary Log is a type of database log in the form of binary digits that contains some information including the record of the time of the transaction, the user who made the transaction and the order in the transaction. With the Binary Log, it can be seen when the transaction occurred, who made the transaction and what transaction occurred in the database. The recording of transactions in the Binary Log can be used as one way to carry out an investigation process in the event of an attack on the database. In this study the focus is on analyzing transaction records in binary logs, namely when, who, dam and what information can be taken from the Binary Log. The output of this research is a table of binary log investigation results and its relation to database attacks. Keywords— Binary Log, MySql, Database, Database Attack","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43564791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Threshold Cryptography Scheme for Cloud ERP Data 一种有效的云ERP数据阈值加密方案
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2020-03-31 DOI: 10.5121/ijcis.2020.10101
Arnold Mashud Abukari, E. K. Bankas, Mohammed Iddrisu Muniru
Cloud ERP is a new concept that has caught the attention of researchers and industry players. One of the major challenges towards migrating ERP data to cloud is security and confidentiality. A number of secret sharing schemes (SSS) have been proposed Mignote, Asmuth-Bloom, Shamir and Blakley but not without challenges. In this research we proposed an efficient threshold cryptography scheme to secure cloud ERP data. We modified the Asmuth-Bloom SSS and applied it to cloud ERP data.
云ERP是一个新概念,已经引起了研究人员和行业参与者的注意。将ERP数据迁移到云端的主要挑战之一是安全性和保密性。Mignote、Asmuth-Bloom、Shamir和Blakley提出了许多秘密共享方案(SSS),但并非没有挑战。在本研究中,我们提出了一种有效的阈值加密方案来保护云ERP数据。我们修改了Asmuth-Bloom SSS,并将其应用于云ERP数据。
{"title":"An Efficient Threshold Cryptography Scheme for Cloud ERP Data","authors":"Arnold Mashud Abukari, E. K. Bankas, Mohammed Iddrisu Muniru","doi":"10.5121/ijcis.2020.10101","DOIUrl":"https://doi.org/10.5121/ijcis.2020.10101","url":null,"abstract":"Cloud ERP is a new concept that has caught the attention of researchers and industry players. One of the major challenges towards migrating ERP data to cloud is security and confidentiality. A number of secret sharing schemes (SSS) have been proposed Mignote, Asmuth-Bloom, Shamir and Blakley but not without challenges. In this research we proposed an efficient threshold cryptography scheme to secure cloud ERP data. We modified the Asmuth-Bloom SSS and applied it to cloud ERP data.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46662205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lived displacement among the Evenki of Yiengra 伊恩格拉的埃文基人的生活流离失所
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2020-03-13 DOI: 10.5204/ijcis.v13i1.1322
T. Mustonen, A. Lehtinen
This article studies the Evenki experiences and memories bound to past and present changes in their modes of living in Sakha-Yakutia. An endemic understanding of the community reflections on de-placing, or lived displacement, is advanced, both theoretically and empirically. The empirical part starts with a description of the Evenki traditions sustained in everyday life today. This is followed by a threefold reading of the Evenki reflections of displacement, focusing on 1) routines of brigades and obchinas, 2) transitions of traditions and place names and 3) disturbances due to industrial land-rule. The analysis is based on Evenki interviews in Yiengra between 2005-2020 and related empirical material gathered for the Evenki Atlas completed by the first of the authors of this article. A major result of the study is an in-depth Evenki view on the phases of displacement. In addition, the article demonstrates the value of endemic ethnography which favours research commitments that are both sensitive to epistemic differentiation and help in identifying the actual costs of forced and unruly de-placing.
本文研究了与萨哈-雅库特生活方式的过去和现在变化有关的埃文基人的经历和记忆。在理论和经验上,对社区对流离失所或生活流离失所的反思有了地方性的理解。实证部分首先描述了今天日常生活中持续存在的埃文基传统。接下来是对埃文基人对流离失所的反思的三方面解读,重点是1)部队和obobis的惯例,2)传统和地名的转变,以及3)工业土地统治造成的骚乱。该分析基于2005年至2020年间在伊恩格拉的埃文基人访谈,以及本文第一作者为埃文基地图集收集的相关经验材料。这项研究的一个主要成果是对位移的阶段有了深入的埃文基观点。此外,本文还论证了地方性民族志的价值,它有利于对认知差异敏感的研究承诺,并有助于确定强迫和不受控制的迁移的实际成本。
{"title":"Lived displacement among the Evenki of Yiengra","authors":"T. Mustonen, A. Lehtinen","doi":"10.5204/ijcis.v13i1.1322","DOIUrl":"https://doi.org/10.5204/ijcis.v13i1.1322","url":null,"abstract":"This article studies the Evenki experiences and memories bound to past and present changes in their modes of living in Sakha-Yakutia. An endemic understanding of the community reflections on de-placing, or lived displacement, is advanced, both theoretically and empirically. The empirical part starts with a description of the Evenki traditions sustained in everyday life today. This is followed by a threefold reading of the Evenki reflections of displacement, focusing on 1) routines of brigades and obchinas, 2) transitions of traditions and place names and 3) disturbances due to industrial land-rule. The analysis is based on Evenki interviews in Yiengra between 2005-2020 and related empirical material gathered for the Evenki Atlas completed by the first of the authors of this article. A major result of the study is an in-depth Evenki view on the phases of displacement. In addition, the article demonstrates the value of endemic ethnography which favours research commitments that are both sensitive to epistemic differentiation and help in identifying the actual costs of forced and unruly de-placing.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47719903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interculturalism as a means toward cultural inclusiveness and cross-cultural dialogue: 跨文化主义作为实现文化包容性和跨文化对话的一种手段:
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2020-03-06 DOI: 10.5204/ijcis.v12i2.1345
S. Gröschl
Using a case study approach, this article explores the role of the Jose Domingo de Obaldia maternity hospital in Western Panama, and its policies and practices for responding to the cultural differences between Panamanian hospital staff and pregnant Ngöble Buglé patients, and their different understanding of health and illness that has been shaped by principles of traditional medicine. Using a range of in-depth interviews with hospitality staff and management and intercultural interpreters, this study explores how cultural aspects and differences can be of a compound and complex nature, requiring strong intercultural understanding, awareness and cross-cultural dialogue. The case of the Ngöble Buglé illustrates how interculturalism can foster such cultural inclusiveness and cross-cultural dialogue, and how interculturalism can have implications for other Indigenous communities in Latin America, and for non-Indigenous communities facing increasingly cultural diverse environments and contexts.
本文采用案例研究的方法,探讨了巴拿马西部Jose Domingo de Obaldia妇产医院的作用,以及该医院应对巴拿马医院工作人员和怀孕的Ngöble Buglé患者之间文化差异的政策和做法,以及他们对传统医学原理塑造的健康和疾病的不同理解。本研究通过对酒店员工、管理层和跨文化口译员的一系列深入采访,探讨了文化方面和差异如何具有复合和复杂的性质,需要强大的跨文化理解、意识和跨文化对话。Ngöble Buglé的案例说明了跨文化主义如何促进这种文化包容性和跨文化对话,以及跨文化主义是如何对拉丁美洲的其他土著社区以及面临日益多样化的文化环境和背景的非土著社区产生影响的。
{"title":"Interculturalism as a means toward cultural inclusiveness and cross-cultural dialogue:","authors":"S. Gröschl","doi":"10.5204/ijcis.v12i2.1345","DOIUrl":"https://doi.org/10.5204/ijcis.v12i2.1345","url":null,"abstract":"Using a case study approach, this article explores the role of the Jose Domingo de Obaldia maternity hospital in Western Panama, and its policies and practices for responding to the cultural differences between Panamanian hospital staff and pregnant Ngöble Buglé patients, and their different understanding of health and illness that has been shaped by principles of traditional medicine. Using a range of in-depth interviews with hospitality staff and management and intercultural interpreters, this study explores how cultural aspects and differences can be of a compound and complex nature, requiring strong intercultural understanding, awareness and cross-cultural dialogue. The case of the Ngöble Buglé illustrates how interculturalism can foster such cultural inclusiveness and cross-cultural dialogue, and how interculturalism can have implications for other Indigenous communities in Latin America, and for non-Indigenous communities facing increasingly cultural diverse environments and contexts.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41636696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indigenous Reconciliation: Why, What, and How 土著和解:为什么,做什么,如何做
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2020-02-28 DOI: 10.5204/ijcis.v12i2.1276
Ranjan Datta
Although a great number of academic researchers have introduced reconciliation in their work, they have not explained what it means from Indigenous perspectives. How do we need to understand and practise it in oureveryday practice? Why should we all, both Indigenous and non-Indigenous, practise land-based and antiracist learning—as a system of reciprocal social relations and ethical practices—as a framework for reconciliation? This article initiates these transdisciplinary questions that challenge not only our static science and social science mindsets, but also the responsibilities for reconciliation, including building respectful relationships with Indigenous people, respecting Indigenous treaties, taking actions to decolonise our ways of knowing and acting, learning the role of colonised education processes, and protecting Indigenous land and environment rights.
尽管许多学术研究人员在他们的工作中引入了和解,但他们没有从土著人的角度解释和解的含义。我们需要如何在日常练习中理解和练习它?为什么我们所有人,无论是土著人还是非土著人,都要进行基于土地的反种族主义学习——作为一种互惠的社会关系和道德实践体系——作为和解的框架?这篇文章提出了这些跨学科的问题,这些问题不仅挑战了我们静态的科学和社会科学心态,也挑战了和解的责任,包括与土著人民建立尊重的关系,尊重土著条约,采取行动使我们的认识和行为方式非殖民化,学习殖民教育过程的作用,以及保护土著土地和环境权利。
{"title":"Indigenous Reconciliation: Why, What, and How","authors":"Ranjan Datta","doi":"10.5204/ijcis.v12i2.1276","DOIUrl":"https://doi.org/10.5204/ijcis.v12i2.1276","url":null,"abstract":"Although a great number of academic researchers have introduced reconciliation in their work, they have not explained what it means from Indigenous perspectives. How do we need to understand and practise it in oureveryday practice? Why should we all, both Indigenous and non-Indigenous, practise land-based and antiracist learning—as a system of reciprocal social relations and ethical practices—as a framework for reconciliation? This article initiates these transdisciplinary questions that challenge not only our static science and social science mindsets, but also the responsibilities for reconciliation, including building respectful relationships with Indigenous people, respecting Indigenous treaties, taking actions to decolonise our ways of knowing and acting, learning the role of colonised education processes, and protecting Indigenous land and environment rights.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44407815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RMAC - A Lightweight Authentication Protocol for Highly Constrained IoT Devices RMAC——高度受限物联网设备的轻量级认证协议
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2018-09-30 DOI: 10.5121/ijcis.2018.8301
Ahmad Khoureich Ka
Nowadays, highly constrained IoT devices have earned an important place in our everyday lives. These devices mainly comprise RFID (Radio-Frequency Identification) or WSN (Wireless Sensor Networks) components. Their adoption is growing in areas where data security or privacy or both must be guaranteed. Therefore, it is necessary to develop appropriate security solutions for these systems. Many papers have proposed solutions for encryption or authentication. But it turns out that sometimes the proposal has security flaw or is ill-suited for the constrained IoT devices (which has very limited processing and storage capacities).In this paper, we introduce a new authentication protocol inspired by Mirror-Mac (MM) which is a generic construction of authentication protocol proposed by Mol et al. Our proposal named RMAC is well suited for highly constrained IoT devices since its implementation uses simple and lightweight algorithms. We also prove that RMAC is at least as secure as the MM protocol and thus secure against man-in-the-middle attacks.
{"title":"RMAC - A Lightweight Authentication Protocol for Highly Constrained IoT Devices","authors":"Ahmad Khoureich Ka","doi":"10.5121/ijcis.2018.8301","DOIUrl":"https://doi.org/10.5121/ijcis.2018.8301","url":null,"abstract":"Nowadays, highly constrained IoT devices have earned an important place in our everyday lives. These \u0000devices mainly comprise RFID (Radio-Frequency Identification) or WSN (Wireless Sensor Networks) components. Their adoption is growing in areas where data security or privacy or both must be guaranteed. Therefore, it is necessary to develop appropriate security solutions for these systems. Many \u0000papers have proposed solutions for encryption or authentication. But it turns out that sometimes the proposal has security flaw or is ill-suited for the constrained IoT devices (which has very limited processing and storage capacities).In this paper, we introduce a new authentication protocol inspired by Mirror-Mac (MM) which is a generic construction of authentication protocol proposed by Mol et al. Our proposal named RMAC is well suited for highly constrained IoT devices since its implementation uses simple and lightweight algorithms. We also prove that RMAC is at least as secure as the MM protocol and thus secure against man-in-the-middle attacks.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Erratum: "Supporting End-User Articulations in Evolving Business Processes: A Case Study to Explore Intuitive Notations and Interaction Designs" 勘误表:“在不断发展的业务流程中支持最终用户表达:探索直观符号和交互设计的案例研究”
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2018-09-01 DOI: 10.1142/s0218843018920016
Jan Hess, Christian Reuter, V. Pipek, V. Wulf
{"title":"Erratum: \"Supporting End-User Articulations in Evolving Business Processes: A Case Study to Explore Intuitive Notations and Interaction Designs\"","authors":"Jan Hess, Christian Reuter, V. Pipek, V. Wulf","doi":"10.1142/s0218843018920016","DOIUrl":"https://doi.org/10.1142/s0218843018920016","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/s0218843018920016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42343277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DIFFERENTIALLY PRIVATE OUTLIER DETECTION IN A COLLABORATIVE ENVIRONMENT. 协作环境下的差异私有离群值检测。
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2018-09-01 Epub Date: 2018-07-03 DOI: 10.1142/S0218843018500053
Hafiz Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, Nabil Adam

Outlier detection is one of the most important data analytics tasks and is used in numerous applications and domains. The goal of outlier detection is to find abnormal entities that are significantly different from the remaining data. Often the underlying data is distributed across different organizations. If outlier detection is done locally, the results obtained are not as accurate as when outlier detection is done collaboratively over the combined data. However, the data cannot be easily integrated into a single database due to privacy and legal concerns. In this paper, we address precisely this problem. We first define privacy in the context of collaborative outlier detection. We then develop a novel method to find outliers from both horizontally partitioned and vertically partitioned categorical data in a privacy-preserving manner. Our method is based on a scalable outlier detection technique that uses attribute value frequencies. We provide an end-to-end privacy guarantee by using the differential privacy model and secure multiparty computation techniques. Experiments on real data show that our proposed technique is both effective and efficient.

异常值检测是最重要的数据分析任务之一,在许多应用和领域中都有应用。异常点检测的目标是发现与剩余数据有显著差异的异常实体。底层数据通常分布在不同的组织中。如果局部进行离群值检测,则获得的结果不如在组合数据上协同进行离群值检测时准确。然而,由于隐私和法律问题,这些数据不能轻易集成到单个数据库中。在本文中,我们精确地解决了这个问题。我们首先在协同离群值检测的背景下定义隐私。然后,我们开发了一种新颖的方法,以保护隐私的方式从水平分区和垂直分区的分类数据中找到异常值。我们的方法是基于一种可扩展的使用属性值频率的离群值检测技术。我们利用差分隐私模型和安全多方计算技术提供端到端的隐私保证。实际数据实验表明,该方法是有效的。
{"title":"DIFFERENTIALLY PRIVATE OUTLIER DETECTION IN A COLLABORATIVE ENVIRONMENT.","authors":"Hafiz Asif,&nbsp;Tanay Talukdar,&nbsp;Jaideep Vaidya,&nbsp;Basit Shafiq,&nbsp;Nabil Adam","doi":"10.1142/S0218843018500053","DOIUrl":"https://doi.org/10.1142/S0218843018500053","url":null,"abstract":"<p><p>Outlier detection is one of the most important data analytics tasks and is used in numerous applications and domains. The goal of outlier detection is to find abnormal entities that are significantly different from the remaining data. Often the underlying data is distributed across different organizations. If outlier detection is done locally, the results obtained are not as accurate as when outlier detection is done collaboratively over the combined data. However, the data cannot be easily integrated into a single database due to privacy and legal concerns. In this paper, we address precisely this problem. We first define privacy in the context of collaborative outlier detection. We then develop a novel method to find outliers from both horizontally partitioned and vertically partitioned categorical data in a privacy-preserving manner. Our method is based on a scalable outlier detection technique that uses attribute value frequencies. We provide an end-to-end privacy guarantee by using the differential privacy model and secure multiparty computation techniques. Experiments on real data show that our proposed technique is both effective and efficient.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/S0218843018500053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"36902205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Author Index Volume 27 (2018) 作者索引第27卷(2018)
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2018-08-23 DOI: 10.1142/s0218843018990010
{"title":"Author Index Volume 27 (2018)","authors":"","doi":"10.1142/s0218843018990010","DOIUrl":"https://doi.org/10.1142/s0218843018990010","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49295525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quantum Cryptography Protocol for Access Control in Big Data 面向大数据访问控制的量子密码协议
IF 1.5 4区 计算机科学 Q3 Computer Science Pub Date : 2018-06-30 DOI: 10.5121/ijcis.2018.8201
Abiodun O. Odedoyin, Helen O. Odukoya, Ayodeji O. Oluwatope
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
{"title":"A Quantum Cryptography Protocol for Access Control in Big Data","authors":"Abiodun O. Odedoyin, Helen O. Odukoya, Ayodeji O. Oluwatope","doi":"10.5121/ijcis.2018.8201","DOIUrl":"https://doi.org/10.5121/ijcis.2018.8201","url":null,"abstract":"Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cooperative Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1