... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing最新文献
We surveyed the current research on the retrieval and utilization of images. This paper provides an overview of the difficulties and possibilities of technological or technology-related research topics resulting from the huge amount of images currently available and highlights some of the important research topics. We looked at the ongoing research activities and analyzed them from four aspects, information access and organization technology, the computing infrastructure that enables access to large-scale image resources, issues in human-system interaction and human factors related to using images, and the social aspect of image media. On the technical side, we noticed that as the number of digital images increases, so does the importance of the accuracy and scalability in relation to the image retrieval. The accuracy and scalability are in fact needed to cope with the current explosion in digital images. On the social side, not so long ago, image retrieval technologies were only experimental tools or used by experts within a limited domain. However, now the general public has access to a wide range of digital images, which means that image retrieval technologies are being used by various users in a large diversity of social contexts. Thus, as we show in this paper, the accuracy and scalability are not the only important factors in the era of information explosion, but that researchers must also be concerned with the social aspects of these technologies.
{"title":"Image retrieval: Research and use in the information explosion","authors":"Masashi Inoue","doi":"10.2201/NIIPI.2009.6.2","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.2","url":null,"abstract":"We surveyed the current research on the retrieval and utilization of images. This paper provides an overview of the difficulties and possibilities of technological or technology-related research topics resulting from the huge amount of images currently available and highlights some of the important research topics. We looked at the ongoing research activities and analyzed them from four aspects, information access and organization technology, the computing infrastructure that enables access to large-scale image resources, issues in human-system interaction and human factors related to using images, and the social aspect of image media. On the technical side, we noticed that as the number of digital images increases, so does the importance of the accuracy and scalability in relation to the image retrieval. The accuracy and scalability are in fact needed to cope with the current explosion in digital images. On the social side, not so long ago, image retrieval technologies were only experimental tools or used by experts within a limited domain. However, now the general public has access to a wide range of digital images, which means that image retrieval technologies are being used by various users in a large diversity of social contexts. Thus, as we show in this paper, the accuracy and scalability are not the only important factors in the era of information explosion, but that researchers must also be concerned with the social aspects of these technologies.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"11 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75257561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takeshi Tsuchiya, Hiroaki Sawano, Marc Lihan, H. Yoshinaga, K. Koyanagi
We propose and clarify the manner in which a distributed information retrieval (IR) is conducted using a Peer-to-Peer (P2P) technology that has approximately the same accuracy as a current index-integrated search engine with the statistical information calculated from the contents. We need to solve the following three problems to develop distributed IR services that use statistic information. The first one is the manner of the calculation of the statistic information from all the contents and then generating the manner of the indices using the collaboration among distributed peers (nodes). The second problem is the efficiency of the index distribution on the logical space collaborated by the peers which is named the MultipleRing. The last problem is having efficient IR strategies that are highly accurate. We discuss the relationship between the propagation time for generating the statistics information and the system scalability by using simulations and emulations to evaluate the results. Our proposed system is suitable for flexible IR services that use the content environment of small to mid-scale networks such as those in an office.
{"title":"A distributed information retrieval manner based on the statistic information for ubiquitous services","authors":"Takeshi Tsuchiya, Hiroaki Sawano, Marc Lihan, H. Yoshinaga, K. Koyanagi","doi":"10.2201/NIIPI.2009.6.8","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.8","url":null,"abstract":"We propose and clarify the manner in which a distributed information retrieval (IR) is conducted using a Peer-to-Peer (P2P) technology that has approximately the same accuracy as a current index-integrated search engine with the statistical information calculated from the contents. We need to solve the following three problems to develop distributed IR services that use statistic information. The first one is the manner of the calculation of the statistic information from all the contents and then generating the manner of the indices using the collaboration among distributed peers (nodes). The second problem is the efficiency of the index distribution on the logical space collaborated by the peers which is named the MultipleRing. The last problem is having efficient IR strategies that are highly accurate. We discuss the relationship between the propagation time for generating the statistics information and the system scalability by using simulations and emulations to evaluate the results. Our proposed system is suitable for flexible IR services that use the content environment of small to mid-scale networks such as those in an office.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"12 1","pages":"63-77"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82118838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a method for building a high-quality web page collection with a reduced manual assessment cost that exploits local surrounding pages. Effectiveness of the method is shown through experiments using a researcher’s homepage as an example of the target categories. The method consists of two processes: rough filtering and accurate classification. In both processes, we introduce a logical page group structure concept that is represented by the relation between an entry page and its surrounding pages based on their connection type and relative URL directory level, and use the contents of local surrounding pages according to that concept. For the first process, we propose a very efficient method for comprehensively gathering all potential researchers’ homepages from the web using property-based keyword lists. Four kinds of page group models (PGMs) based on the page group structure were used for merging the keywords from the surrounding pages. Although a lot of noise pages are included if we use keywords in the surrounding pages without considering the page group structure, the experimental results show that our method can reduce the increase of noise pages to an allowable level and can gather a significant number of the positive pages that could not be gathered using a single-page-based method. For the second process, we propose composing a three-grade classifier using two base classifiers: precision-assured and recall-assured. It classifies the input to assured positive, assured negative, and uncertain pages, where the uncertain pages need a manual assessment, so that the collection quality required by an application can be assured. Each of the base classifiers is further composed of a surrounding page classifier (SC) and an entry page classifier (EC). The SC selects likely component pages and the EC classifies the entry pages using information from both the entry page and the likely component pages. An evident performance improvement of the base classifiers by the introduction of the SC is shown through experiments. Then, the reduction of the number of uncertain pages is evaluated and the effectiveness of the proposed method is shown.
本文描述了一种利用本地周边页面构建高质量网页集的方法,减少了人工评估成本。以某研究员的主页为例,对目标分类进行了实验,证明了该方法的有效性。该方法包括粗过滤和精确分类两个过程。在这两个过程中,我们都引入了一个逻辑页面组结构概念,该概念由条目页面与其周围页面之间的关系(基于它们的连接类型和相对URL目录级别)表示,并根据该概念使用本地周围页面的内容。对于第一个过程,我们提出了一种非常有效的方法,利用基于属性的关键字列表从网络上全面收集所有潜在研究人员的主页。采用四种基于页面组结构的页面组模型(page group model, PGMs)对周边页面进行关键词合并。虽然在不考虑页面组结构的情况下使用周围页面中的关键字会产生大量的噪声页面,但实验结果表明,我们的方法可以将噪声页面的增加减少到允许的水平,并且可以收集到使用基于单页面的方法无法收集到的大量积极页面。对于第二个过程,我们建议使用两个基本分类器组成一个三级分类器:精度保证和召回保证。它将输入分类为确定的正面、确定的负面和不确定的页面,其中不确定的页面需要手动评估,以便可以确保应用程序所需的收集质量。每个基分类器进一步由一个周围页面分类器(SC)和一个条目页面分类器(EC)组成。SC选择可能的组件页面,EC使用来自条目页面和可能的组件页面的信息对条目页面进行分类。实验表明,引入SC后,基分类器的性能有了明显的提高。然后,对不确定页数的减少进行了评估,并证明了所提方法的有效性。
{"title":"Buildingweb page collections efficiently exploiting local surrounding pages","authors":"Yuxin Wang, K. Oyama","doi":"10.2201/NIIPI.2009.6.4","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.4","url":null,"abstract":"This paper describes a method for building a high-quality web page collection with a reduced manual assessment cost that exploits local surrounding pages. Effectiveness of the method is shown through experiments using a researcher’s homepage as an example of the target categories. The method consists of two processes: rough filtering and accurate classification. In both processes, we introduce a logical page group structure concept that is represented by the relation between an entry page and its surrounding pages based on their connection type and relative URL directory level, and use the contents of local surrounding pages according to that concept. For the first process, we propose a very efficient method for comprehensively gathering all potential researchers’ homepages from the web using property-based keyword lists. Four kinds of page group models (PGMs) based on the page group structure were used for merging the keywords from the surrounding pages. Although a lot of noise pages are included if we use keywords in the surrounding pages without considering the page group structure, the experimental results show that our method can reduce the increase of noise pages to an allowable level and can gather a significant number of the positive pages that could not be gathered using a single-page-based method. For the second process, we propose composing a three-grade classifier using two base classifiers: precision-assured and recall-assured. It classifies the input to assured positive, assured negative, and uncertain pages, where the uncertain pages need a manual assessment, so that the collection quality required by an application can be assured. Each of the base classifiers is further composed of a surrounding page classifier (SC) and an entry page classifier (EC). The SC selects likely component pages and the EC classifies the entry pages using information from both the entry page and the likely component pages. An evident performance improvement of the base classifiers by the introduction of the SC is shown through experiments. Then, the reduction of the number of uncertain pages is evaluated and the effectiveness of the proposed method is shown.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"12 1","pages":"27"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84383071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The amount of information on the World Wide Web (WWW) is increasing at an explosive rate, and the role of computer systems in processing such a huge amount of data has become crucial. In this paper, we focus on the name disambiguation problem when searching for people, because information about people is an important part of the web and improvements to personal information may benefit many web citizens. The name ambiguity problem occurs frequently when searching for people, because a name may be shared by several people. In this research, we use external knowledge while solving this problem, so that we can analyze information in web documents more easily. We collect web directories and use the latent Dirichlet allocation method to extract latent topics from web directories. The extracted topics are used to modify the search result documents so that important contexts that help to discriminate people can be recognized more easily. We carried out experiments with real web documents and verified the advantages of our approach over other disambiguation approaches that use the vector space model and named entity recognition methods.
{"title":"Utilization of external knowledge for personal name disambiguation","authors":"Q. Vu, A. Takasu, J. Adachi","doi":"10.2201/NIIPI.2009.6.3","DOIUrl":"https://doi.org/10.2201/NIIPI.2009.6.3","url":null,"abstract":"The amount of information on the World Wide Web (WWW) is increasing at an explosive rate, and the role of computer systems in processing such a huge amount of data has become crucial. In this paper, we focus on the name disambiguation problem when searching for people, because information about people is an important part of the web and improvements to personal information may benefit many web citizens. The name ambiguity problem occurs frequently when searching for people, because a name may be shared by several people. In this research, we use external knowledge while solving this problem, so that we can analyze information in web documents more easily. We collect web directories and use the latent Dirichlet allocation method to extract latent topics from web directories. The extracted topics are used to modify the search result documents so that important contexts that help to discriminate people can be recognized more easily. We carried out experiments with real web documents and verified the advantages of our approach over other disambiguation approaches that use the vector space model and named entity recognition methods.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"101 1","pages":"15"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86776178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ishizaka, Masashi Iwai, Masato Gokan, H. Ohba, Ryosuke Sakaguchi
This paper discusses the development of the Shinshu University Online System of General Academic Resources (SOAR). As a participant in the 2006–2007 Cyber Science Infrastructure (CSI) development project of the National Institute of Informatics (NII), Shinshu University is seeking to develop SOAR as an integrated academic resource system. In addition to developing an environment for providing access to the latest academic resources within the university, SOAR is intended to promulgate university research results and research activities, both within Japan and around the world, to a broad audience. Specifically, this system achieves mutual coordination by linking e-journals and the Web of Science to the researcher directory and the institutional repository – two system cornerstones. SOAR can be regarded as a potential model for future academic-resource systems. Although the Institutional Repository (SOAR-IR) was developed using existing software, the Researcher Directory (SOARRD) is a new system based on XML technology.
本文讨论了信州大学通用学术资源在线系统(SOAR)的开发。信州大学作为国立信息科学研究所(NII) 2006-2007年网络科学基础设施(CSI)开发项目的参与者,正在寻求将SOAR开发为综合学术资源系统。除了为获取大学内最新的学术资源提供环境外,SOAR还旨在向广大受众发布日本和世界各地的大学研究成果和研究活动。具体来说,该系统通过将电子期刊和Web of Science与研究者目录和机构知识库这两个系统基石相连接,实现了相互协调。SOAR可以被视为未来学术资源系统的潜在模式。虽然机构存储库(SOAR-IR)是利用现有软件开发的,但研究人员目录(SOARRD)是一个基于XML技术的新系统。
{"title":"Development of the Shinshu University Online System of General Academic Resources (SOAR)","authors":"K. Ishizaka, Masashi Iwai, Masato Gokan, H. Ohba, Ryosuke Sakaguchi","doi":"10.2201/NIIPI.2008.5.11","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.11","url":null,"abstract":"This paper discusses the development of the Shinshu University Online System of General Academic Resources (SOAR). As a participant in the 2006–2007 Cyber Science Infrastructure (CSI) development project of the National Institute of Informatics (NII), Shinshu University is seeking to develop SOAR as an integrated academic resource system. In addition to developing an environment for providing access to the latest academic resources within the university, SOAR is intended to promulgate university research results and research activities, both within Japan and around the world, to a broad audience. Specifically, this system achieves mutual coordination by linking e-journals and the Web of Science to the researcher directory and the institutional repository – two system cornerstones. SOAR can be regarded as a potential model for future academic-resource systems. Although the Institutional Repository (SOAR-IR) was developed using existing software, the Researcher Directory (SOARRD) is a new system based on XML technology.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"24 1","pages":"137-151"},"PeriodicalIF":0.0,"publicationDate":"2008-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73338477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nobukazu Yoshioka, H. Washizaki, Katsuhisa Maruyama
Security has become an important topic for many software systems. Security patterns are reusable solutions to security problems. Although many security patterns and techniques for using them have been proposed, it is still difficult to adapt security patterns to each phase of software development. This paper provides a survey of approaches to security patterns. As a result of classifying these approaches, a direction for the integration and future research topics is illustrated.
{"title":"A survey on security patterns","authors":"Nobukazu Yoshioka, H. Washizaki, Katsuhisa Maruyama","doi":"10.2201/NIIPI.2008.5.5","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.5","url":null,"abstract":"Security has become an important topic for many software systems. Security patterns are reusable solutions to security problems. Although many security patterns and techniques for using them have been proposed, it is still difficult to adapt security patterns to each phase of software development. This paper provides a survey of approaches to security patterns. As a result of classifying these approaches, a direction for the integration and future research topics is illustrated.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"AES-14 1","pages":"35-48"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84545156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software is pervasive. It plays a part in every aspect of our lives, forming a significant part of every automated system or tool that we use, from washing machines to healthcare systems. Like the washing machine, some of these applications are simple, selfcontained devices; however the majority are far more complex. They are generally distributed systems which rely on interacting, distributed subsystems of software components to perform their function. They are expected to interact with users with changing needs and with other systems with unreliable service provision. The challenge is to provide these software systems in such a way that they are robust in the presence of major issues such as change and complexity. Change is inherent, both in the changing needs of users and in the changes which take place in the operational environment of the system. Hence it is essential that our systems can adapt as necessary to continue to achieve their goals. Change is also induced by failures or the unavailability of parts of the system. It is therefore necessary to envisage dynamically changing configurations of software components so as to adapt to the current situation. Dynamic change, which occurs while the system is operational, requires that the system evolves dynamically, and that the adaptation occurs at run-time. Complexity requires that we use rigorous techniques to design, build and analyse our software and thereby avoid unnecessary design flaws. This implies the need for analytical techniques which cope with changing goals and the changing compositions of adaptive software. Since the complexity and response times required by the changes may not permit human intervention, we must plan for automated management of change. The systems themselves must be capable of determining
{"title":"Towards robust self-managed systems","authors":"J. Kramer, J. Magee","doi":"10.2201/NIIPI.2008.5.1","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.1","url":null,"abstract":"Software is pervasive. It plays a part in every aspect of our lives, forming a significant part of every automated system or tool that we use, from washing machines to healthcare systems. Like the washing machine, some of these applications are simple, selfcontained devices; however the majority are far more complex. They are generally distributed systems which rely on interacting, distributed subsystems of software components to perform their function. They are expected to interact with users with changing needs and with other systems with unreliable service provision. The challenge is to provide these software systems in such a way that they are robust in the presence of major issues such as change and complexity. Change is inherent, both in the changing needs of users and in the changes which take place in the operational environment of the system. Hence it is essential that our systems can adapt as necessary to continue to achieve their goals. Change is also induced by failures or the unavailability of parts of the system. It is therefore necessary to envisage dynamically changing configurations of software components so as to adapt to the current situation. Dynamic change, which occurs while the system is operational, requires that the system evolves dynamically, and that the adaptation occurs at run-time. Complexity requires that we use rigorous techniques to design, build and analyse our software and thereby avoid unnecessary design flaws. This implies the need for analytical techniques which cope with changing goals and the changing compositions of adaptive software. Since the complexity and response times required by the changes may not permit human intervention, we must plan for automated management of change. The systems themselves must be capable of determining","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"65 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91172063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rehák, M. Pechoucek, Karel Bartos, Martin Grill, Pavel Čeleda, Vojtech Krmicek
The presented research aims to detect malicious traffic in high speed networks by means of correlated anomaly detection methods. In order to acquire the real-time traffic statistics in NetFlow format, we deploy transparent inline probes based on FPGA elements. They provide traffic statistics to the agent-based detection layer, where each agent uses a specific anomaly detection method to detect anomalies and describe the flows in its extended trust model. The agents share the anomaly assessments of individual network flows that are used as an input for the agents trust models. The trustfulness values of individual flows from all agents are combined to estimate their maliciousness. The estimate of trust is subsequently used to filter out the most significant events that are reported to network operators for further analysis. We argue that the use of trust model for integration of several anomaly detection methods and efficient representation of history data shall reduce the high rate of false positives (legitimate traffic classified as malicious) which limits the effectiveness of current intrusion detection systems.
{"title":"CAMNEP: An intrusion detection system for high-speed networks","authors":"M. Rehák, M. Pechoucek, Karel Bartos, Martin Grill, Pavel Čeleda, Vojtech Krmicek","doi":"10.2201/NIIPI.2008.5.7","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.7","url":null,"abstract":"The presented research aims to detect malicious traffic in high\u0000speed networks by means of correlated anomaly detection\u0000methods. In order to acquire the real-time traffic statistics\u0000in NetFlow format, we deploy transparent inline probes based on\u0000FPGA elements. They provide traffic statistics to the\u0000agent-based detection layer, where each agent uses a specific\u0000anomaly detection method to detect anomalies and describe the\u0000flows in its extended trust model. The agents share the anomaly\u0000assessments of individual network flows that are used as an\u0000input for the agents trust models. The trustfulness values of\u0000individual flows from all agents are combined to estimate their\u0000maliciousness. The estimate of trust is subsequently used to\u0000filter out the most significant events that are reported to\u0000network operators for further analysis. We argue that the use\u0000of trust model for integration of several anomaly detection\u0000methods and efficient representation of history data shall\u0000reduce the high rate of false positives (legitimate traffic\u0000classified as malicious) which limits the effectiveness of\u0000current intrusion detection systems.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"10 1","pages":"65"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73271235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Th ee ngineering of security is an essential discipline in software engineering. It requires one to embrace a holistic approach, as any weakness along the engineering process of the system may lead to future security breaches. It is in general difficult to achieve and becomes particularly acute in wireless sensor networks, owing to the stringent limitations in communication an dc omputational power. We survey the current state of the art on this topic and set forth issues that require further study. The analysis of current work covers general security issues of wireless sensor network research and discusse st he present achievements for engineering security with regards to earlier surveys in this domain. We also cover security capabilities of major implementation platforms, namely TinyOS and Sun SPOT TM ,a ndpresent available and required mechanisms that will become essential for software engineers.
{"title":"Security software engineering in wireless sensor networks","authors":"E. Platon, Y. Sei","doi":"10.2201/NIIPI.2008.5.6","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.6","url":null,"abstract":"Th ee ngineering of security is an essential discipline in software engineering. It requires one to embrace a holistic approach, as any weakness along the engineering process of the system may lead to future security breaches. It is in general difficult to achieve and becomes particularly acute in wireless sensor networks, owing to the stringent limitations in communication an dc omputational power. We survey the current state of the art on this topic and set forth issues that require further study. The analysis of current work covers general security issues of wireless sensor network research and discusse st he present achievements for engineering security with regards to earlier surveys in this domain. We also cover security capabilities of major implementation platforms, namely TinyOS and Sun SPOT TM ,a ndpresent available and required mechanisms that will become essential for software engineers.","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"42 1","pages":"49"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74261570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The scale of misuse of mission-critical assets manipulated by computer-based systems has increased, because of their worldwide accessibility through the Internet and the automation of systems. Security is concerned with the prevention of such misuse. The systematic development of software that considers security risks and threats explicitly is increasingly recognized as critical to improving overall systems security. This special issue provides a forum for discussing research directions in software engineering for developing secure systems more effectively. It comprises seven papers that underwent one or more cycles of anonymous peer review and revision. The first paper on “PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application”, by Haruhiko Kaiya, Kouta Sasaki, and Kenji Kaijiri, presents an automated tool to support users and providers of information systems, to help them understand the threats and the requirements of these systems. The paper focuses on Java mobile code applications. The second paper on “Curriculum Design and Methodologies for Security Requirements Analysis”, by Kenji Taguchi and Yasuyuki Tahara, describes the authors’ Security Requirements Analysis educational course, part of the Top SE project, to teach the students how to find and fix security defects in software, as early as possible in the systems development life cycle. The third paper on “A Survey on Security Patterns”, by Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama, surveys existing approaches to establishing security patterns, which are reusable solutions to security problems, and illustrates a direction for the integration of patterns into the development life cycle. The fourth paper on “Software Security Engineer-
{"title":"Special issue: The future of software engineering for security and privacy","authors":"S. Honiden, B. Nuseibeh","doi":"10.2201/NIIPI.2008.5.2","DOIUrl":"https://doi.org/10.2201/NIIPI.2008.5.2","url":null,"abstract":"The scale of misuse of mission-critical assets manipulated by computer-based systems has increased, because of their worldwide accessibility through the Internet and the automation of systems. Security is concerned with the prevention of such misuse. The systematic development of software that considers security risks and threats explicitly is increasingly recognized as critical to improving overall systems security. This special issue provides a forum for discussing research directions in software engineering for developing secure systems more effectively. It comprises seven papers that underwent one or more cycles of anonymous peer review and revision. The first paper on “PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application”, by Haruhiko Kaiya, Kouta Sasaki, and Kenji Kaijiri, presents an automated tool to support users and providers of information systems, to help them understand the threats and the requirements of these systems. The paper focuses on Java mobile code applications. The second paper on “Curriculum Design and Methodologies for Security Requirements Analysis”, by Kenji Taguchi and Yasuyuki Tahara, describes the authors’ Security Requirements Analysis educational course, part of the Top SE project, to teach the students how to find and fix security defects in software, as early as possible in the systems development life cycle. The third paper on “A Survey on Security Patterns”, by Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama, surveys existing approaches to establishing security patterns, which are reusable solutions to security problems, and illustrates a direction for the integration of patterns into the development life cycle. The fourth paper on “Software Security Engineer-","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"1 1","pages":"5-6"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77963211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing