首页 > 最新文献

... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security最新文献

英文 中文
Some Complexity Results for the k-Splittable Flow Minimizing Congestion Problem k-可分割流最小化拥塞问题的一些复杂性结果
Chengwen Jiao, Q. Feng, Weichun Bu
In this paper, we mainly consider the complexity of the k-splittable flow minimizing congestion problem. We give some complexity results. For the k-splittable flow problem, the existence of a feasible solution is strongly NP-hard. When the number of the source nodes is an input, for the uniformly exactly k-splittable flow problem, obtaining an approximation algorithm with performance ratio better than (√5+1)/2 is NP-hard. When k is an input, for single commodity k-splittable flow problem, obtaining an algorithm with performance ratio better than is NP-hard. In the last of the paper, we study the relationship of minimizing congestion and minimizing number of rounds in the k-splittable flow problem. The smaller the congestion is, the smaller the number of rounds.
本文主要考虑k可分流最小化拥塞问题的复杂性。我们给出了一些复杂性的结果。对于k可分流问题,可行解的存在性是强np困难的。当源节点数为输入时,对于均匀精确k可分流问题,获得性能比优于(√5+1)/2的近似算法是np困难的。当k为输入时,对于单商品k可分流问题,获得性能比优于NP-hard的算法。在论文的最后,我们研究了k可分流问题中最小化拥塞和最小化轮数的关系。拥塞越小,轮数越少。
{"title":"Some Complexity Results for the k-Splittable Flow Minimizing Congestion Problem","authors":"Chengwen Jiao, Q. Feng, Weichun Bu","doi":"10.4236/CN.2018.101001","DOIUrl":"https://doi.org/10.4236/CN.2018.101001","url":null,"abstract":"In this paper, we mainly consider the complexity of the k-splittable flow minimizing congestion problem. We give some complexity results. For the k-splittable flow problem, the existence of a feasible solution is strongly NP-hard. When the number of the source nodes is an input, for the uniformly exactly k-splittable flow problem, obtaining an approximation algorithm with performance ratio better than (√5+1)/2 is NP-hard. When k is an input, for single commodity k-splittable flow problem, obtaining an algorithm with performance ratio better than is NP-hard. In the last of the paper, we study the relationship of minimizing congestion and minimizing number of rounds in the k-splittable flow problem. The smaller the congestion is, the smaller the number of rounds.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"88 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81289909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reduced Ecological Footprints of Modern Facilities Introducing the Implementation of Advanced Wireless Technologies, and Human Resources’ Benefits 引进先进无线技术减少现代设施的生态足迹和人力资源效益
Spyridon K Chronopoulos, Evangelia I. Kosma, D. Tafiadis, Dimitrios Dimopoulos, V. Raptis, E. Karvounis, P. Angelidis, P. Kostarakis
The necessity of lowering the mean power consumption of various facilities, due to the lack of their enormous future energy needs, led to an ongoing advance of various technologies. These technologies have been oriented towards the concept of a Reduced Ecological Footprint. Massive structures (such as building complexes and hospitals) have been redesigned and upgraded; many interior designs have been dramatically altered while new electronic devices are constantly being produced in order to revolutionize a long term perspective towards a “Green Planet” while they exhibit astonishing signal processing. Consequently, an enormous technology already exists which needs to be properly combined to a proposed methodology and to new ideas relevant to systems’ administration through automatic wireless control. This paper intends to reduce the gap between design and realization of the aforementioned research. Consequently, the primary contribution of this research is the proposal of a complete design protocol with minimized defects relevant to Reduced Ecological Footprints of Facilities (REFF) along with its beneficial advantages relevant to providing a healthy and productive work environment. This protocol consists of four main parts which are 1) the main key points-guidelines, 2) its objectives, 3) the know-how methodology for implementation in existing installations and 4) the description of the imminent benefits in workforce/human resources.
由于缺乏巨大的未来能源需求,降低各种设施的平均功耗的必要性导致了各种技术的不断进步。这些技术的目标是减少生态足迹。大型建筑(如建筑群和医院)已经重新设计和升级;许多室内设计已经发生了巨大的变化,而新的电子设备不断被生产出来,以彻底改变对“绿色星球”的长期看法,同时它们表现出惊人的信号处理。因此,一项庞大的技术已经存在,需要将其与所提出的方法和有关通过自动无线控制进行系统管理的新思想适当地结合起来。本文旨在缩小上述研究的设计与实现之间的差距。因此,本研究的主要贡献是提出了一个完整的设计方案,其中最小化了与减少设施生态足迹(REFF)相关的缺陷,以及与提供健康和富有成效的工作环境相关的有益优势。该议定书由四个主要部分组成,即1)主要要点-指导方针,2)其目标,3)在现有设施中实施的专有技术方法,以及4)对劳动力/人力资源迫在眉睫的利益的描述。
{"title":"Reduced Ecological Footprints of Modern Facilities Introducing the Implementation of Advanced Wireless Technologies, and Human Resources’ Benefits","authors":"Spyridon K Chronopoulos, Evangelia I. Kosma, D. Tafiadis, Dimitrios Dimopoulos, V. Raptis, E. Karvounis, P. Angelidis, P. Kostarakis","doi":"10.4236/CN.2018.101002","DOIUrl":"https://doi.org/10.4236/CN.2018.101002","url":null,"abstract":"The necessity of lowering the mean power consumption of various facilities, due to the lack of their enormous future energy needs, led to an ongoing advance of various technologies. These technologies have been oriented towards the concept of a Reduced Ecological Footprint. Massive structures (such as building complexes and hospitals) have been redesigned and upgraded; many interior designs have been dramatically altered while new electronic devices are constantly being produced in order to revolutionize a long term perspective towards a “Green Planet” while they exhibit astonishing signal processing. Consequently, an enormous technology already exists which needs to be properly combined to a proposed methodology and to new ideas relevant to systems’ administration through automatic wireless control. This paper intends to reduce the gap between design and realization of the aforementioned research. Consequently, the primary contribution of this research is the proposal of a complete design protocol with minimized defects relevant to Reduced Ecological Footprints of Facilities (REFF) along with its beneficial advantages relevant to providing a healthy and productive work environment. This protocol consists of four main parts which are 1) the main key points-guidelines, 2) its objectives, 3) the know-how methodology for implementation in existing installations and 4) the description of the imminent benefits in workforce/human resources.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"31 1","pages":"11-29"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84995160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards the Development of Best Data Security for Big Data 面向大数据的最佳数据安全发展
Yuan Tian
Big data is becoming a well-known buzzword and in active use in many areas. Because of the velocity, variety, and volume of big data, security and privacy issues are magnified, which results in the traditional protection mechanisms for structured small scale data are inadequate for big data. Sensitivities around big data security and privacy are a hurdle that organizations need to overcome. In this paper, we review the current data security in big data and analysis its feasibilities and obstacles. Besides, we also introduced intelligent analytics to enhance security with the proposed security intelligence model. This research aims to summarize, organize and classify the information available in the literature to identify any gaps in current research and suggest areas for scholars and security researchers for further investigation.
大数据正在成为一个众所周知的流行语,并在许多领域得到积极应用。由于大数据的速度、种类和体量,其安全性和隐私性问题被放大,导致传统的结构化小规模数据保护机制对大数据的保护不足。围绕大数据安全和隐私的敏感性是组织需要克服的障碍。本文综述了大数据环境下的数据安全现状,分析了大数据环境下数据安全的可行性和存在的障碍。此外,我们还引入了智能分析,通过提出的安全智能模型来增强安全性。本研究旨在总结、组织和分类文献中可用的信息,以确定当前研究中的任何空白,并为学者和安全研究人员提出进一步调查的领域。
{"title":"Towards the Development of Best Data Security for Big Data","authors":"Yuan Tian","doi":"10.4236/CN.2017.94020","DOIUrl":"https://doi.org/10.4236/CN.2017.94020","url":null,"abstract":"Big data is becoming a well-known buzzword and in active use in many areas. Because of the velocity, variety, and volume of big data, security and privacy issues are magnified, which results in the traditional protection mechanisms for structured small scale data are inadequate for big data. Sensitivities around big data security and privacy are a hurdle that organizations need to overcome. In this paper, we review the current data security in big data and analysis its feasibilities and obstacles. Besides, we also introduced intelligent analytics to enhance security with the proposed security intelligence model. This research aims to summarize, organize and classify the information available in the literature to identify any gaps in current research and suggest areas for scholars and security researchers for further investigation.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"43 1","pages":"291-301"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78624640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Practical Approaches to Securing an IT Environment 保护IT环境的实用方法
Emmanuel S. Kolawole, W. Ali, C. Penrose, John Fuller
There are a number of IT Security journals available in the literature but none of these research papers have practically specified approaches to secure the IT environment at large. In this paper, more emphases will be laid on the practical ways to secure our IT environments and with some useful real-life scenarios. In today, securing our IT environment has become the key factor in the industry due to an increasing number of attackers invading and stealing the intellectual properties; thereby, rendering most IT industries to go out of businesses. They may find that understanding and translating IT security recommendations to implementable practices can be overwhelming. While this is a worthwhile and important task, there are also more practical ways to ensure you are using IT security best practices in your business. Therefore, the need to properly secure our IT environments in order to mitigate those attacks by using the right tools in all IT domains will be fully discussed in this research. This paper will focus more on protection of LAN-WAN Domain as a use case.
在文献中有许多IT安全期刊,但这些研究论文都没有实际指定保护IT环境的方法。在本文中,更多的重点将放在实际的方法,以确保我们的IT环境和一些有用的现实生活中的场景。在今天,由于越来越多的攻击者入侵和窃取知识产权,确保我们的IT环境已成为行业的关键因素;从而导致大部分IT行业倒闭。他们可能会发现,理解IT安全建议并将其转化为可实现的实践可能是一项艰巨的任务。虽然这是一项有价值且重要的任务,但还有更实用的方法可以确保您在业务中使用IT安全最佳实践。因此,需要适当地保护我们的IT环境,以便通过在所有IT领域中使用正确的工具来减轻这些攻击,这将在本研究中得到充分讨论。本文将更多地关注LAN-WAN域的保护作为一个用例。
{"title":"Practical Approaches to Securing an IT Environment","authors":"Emmanuel S. Kolawole, W. Ali, C. Penrose, John Fuller","doi":"10.4236/CN.2017.94019","DOIUrl":"https://doi.org/10.4236/CN.2017.94019","url":null,"abstract":"There are a number of IT Security journals available in the literature but none of these research papers have practically specified approaches to secure the IT environment at large. In this paper, more emphases will be laid on the practical ways to secure our IT environments and with some useful real-life scenarios. In today, securing our IT environment has become the key factor in the industry due to an increasing number of attackers invading and stealing the intellectual properties; thereby, rendering most IT industries to go out of businesses. They may find that understanding and translating IT security recommendations to implementable practices can be overwhelming. While this is a worthwhile and important task, there are also more practical ways to ensure you are using IT security best practices in your business. Therefore, the need to properly secure our IT environments in order to mitigate those attacks by using the right tools in all IT domains will be fully discussed in this research. This paper will focus more on protection of LAN-WAN Domain as a use case.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"96 1","pages":"275-290"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87702191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risks behind Device Information Permissions in Android OS Android操作系统设备信息权限背后的风险
A. Alshehri, A. Hewins, M. McCulley, Hani Alshahrani, Huirong Fu, Ye Zhu
In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks.
在智能手机时代,由于智能手机技术的显著进步,人们使用智能手机完成大部分日常工作。在比较Windows、iOS、Android和黑莓等不同平台时,Android占据了最高的总市场份额。由于这种巨大的增长,网络犯罪分子被鼓励用恶意应用程序渗透到各种移动市场。这些应用程序大多需要设备信息权限,目的是在未经用户同意的情况下收集敏感数据。本文研究了系统信息权限的各个要素,并举例说明了网络罪犯是如何损害用户隐私的。本文介绍了一些使用READ_PHONE_STATE权限的攻击场景及其背后的风险。此外,本文还提到了当附加权限与READ_PHONE_STATE权限相结合时可能发生的攻击。它还讨论了一个建议的解决方案,以击败这些类型的攻击。
{"title":"Risks behind Device Information Permissions in Android OS","authors":"A. Alshehri, A. Hewins, M. McCulley, Hani Alshahrani, Huirong Fu, Ye Zhu","doi":"10.4236/CN.2017.94016","DOIUrl":"https://doi.org/10.4236/CN.2017.94016","url":null,"abstract":"In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using \u0000READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"76 1","pages":"219-234"},"PeriodicalIF":0.0,"publicationDate":"2017-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87556140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Simulation of a Topology Aggregation Algorithm in Multi-Domain Optical Networks 多域光网络拓扑聚合算法的设计与仿真
Lei Wang, Li Lin, Li Du
The aggregate conversion from the complex physical network topology to the simple virtual topology reduces not only load overhead, but also the parameter distortion of links and nodes during the aggregation process, thereby increasing the accuracy of routing. To this end, focusing on topology aggregation of multi-domain optical networks, a new topology aggregation algorithm (ML-S) was proposed. ML-S upgrades linear segment fitting algorithms to multiline fitting algorithms on stair generation. It finds mutation points of stair to increase the number of fitting line segments and makes use of less redundancy, thus obtaining a significant improvement in the description of topology information. In addition, ML-S integrates stair fitting algorithm and effectively alleviates the contradiction between the complexity and accuracy of topology information. It dynamically chooses an algorithm that is more accurate and less redundant according to the specific topology information of each domain. The simulation results show that, under different topological conditions, ML-S maintains a low level of underestimation distortion, overestimation distortion, and redundancy, achieving an improved balance between aggregation degree and accuracy.
从复杂的物理网络拓扑到简单的虚拟拓扑的聚合转换,不仅减少了负载开销,而且减少了聚合过程中链路和节点的参数失真,从而提高了路由的准确性。为此,针对多域光网络的拓扑聚合问题,提出了一种新的拓扑聚合算法ML-S。在楼梯生成方面,ML-S将线性段拟合算法升级为多线拟合算法。该方法通过寻找阶梯的突变点来增加拟合线段的数量,并利用较少的冗余,从而在拓扑信息的描述上有了明显的改进。此外,ML-S集成了阶梯拟合算法,有效缓解了拓扑信息复杂性与准确性之间的矛盾。它根据每个域的具体拓扑信息动态选择更精确、冗余度更低的算法。仿真结果表明,在不同的拓扑条件下,ML-S保持了较低的过估计失真、过估计失真和冗余度,实现了聚合度和精度之间更好的平衡。
{"title":"Design and Simulation of a Topology Aggregation Algorithm in Multi-Domain Optical Networks","authors":"Lei Wang, Li Lin, Li Du","doi":"10.4236/CN.2017.94017","DOIUrl":"https://doi.org/10.4236/CN.2017.94017","url":null,"abstract":"The aggregate conversion from the complex physical network topology to the simple virtual topology reduces not only load overhead, but also the parameter distortion of links and nodes during the aggregation process, thereby increasing the accuracy of routing. To this end, focusing on topology aggregation of multi-domain optical networks, a new topology aggregation algorithm (ML-S) was proposed. ML-S upgrades linear segment fitting algorithms to multiline fitting algorithms on stair generation. It finds mutation points of stair to increase the number of fitting line segments and makes use of less redundancy, thus obtaining a significant improvement in the description of topology information. In addition, ML-S integrates stair fitting algorithm and effectively alleviates the contradiction between the complexity and accuracy of topology information. It dynamically chooses an algorithm that is more accurate and less redundant according to the specific topology information of each domain. The simulation results show that, under different topological conditions, ML-S maintains a low level of underestimation distortion, overestimation distortion, and redundancy, achieving an improved balance between aggregation degree and accuracy.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"90 1","pages":"235-248"},"PeriodicalIF":0.0,"publicationDate":"2017-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83936947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preserving Healthcare System for Clinical Decision-Support and Emergency Call Systems 用于临床决策支持和紧急呼叫系统的隐私保护医疗系统
A. Alabdulkarim, Mznah Al-Rodhaan, Yuan Tian
Healthcare centers always aim to deliver the best quality healthcare services to patients and earn their satisfaction. Technology has played a major role in achieving these goals, such as clinical decision-support systems and mobile health social networks. These systems have improved the quality of care services by speeding-up the diagnosis process with accuracy, and allowing caregivers to monitor patients remotely through the use of WBS, respectively. However, these systems’ accuracy and efficiency are dependent on patients’ health information, which must be inevitably shared over the network, thus exposing them to cyber-attacks. Therefore, privacy-preserving services are ought to be employed to protect patients’ privacy. In this work, we proposed a privacy-preserving healthcare system, which is composed of two subsystems. The first is a privacy-preserving clinical decision-support system. The second subsystem is a privacy-preserving Mobile Health Social Network (MHSN). The former was based on decision tree classifier that is used to diagnose patients with new symptoms without disclosing patients’ records. Whereas the latter would allow physicians to monitor patients’ current condition remotely through WBS; thus sending help immediately in case of a distress situation detected. The social network, which connects patients of similar symptoms together, would also provide the service of seeking help of near-by passing people while the patient is waiting for an ambulance to arrive. Our model is expected to improve healthcare services while protecting patients’ privacy.
医疗保健中心始终致力于为患者提供最优质的医疗保健服务,并赢得他们的满意。技术在实现这些目标方面发挥了重要作用,例如临床决策支持系统和移动卫生社会网络。这些系统提高了护理服务的质量,加快了准确的诊断过程,并允许护理人员分别通过使用WBS远程监测患者。然而,这些系统的准确性和效率依赖于患者的健康信息,这些信息必须不可避免地在网络上共享,从而使他们面临网络攻击。因此,应该采用隐私保护服务来保护患者的隐私。在这项工作中,我们提出了一个隐私保护医疗系统,该系统由两个子系统组成。第一个是保护隐私的临床决策支持系统。第二个子系统是保护隐私的移动健康社交网络(MHSN)。前者基于决策树分类器,在不公开患者记录的情况下诊断新症状。而后者将允许医生通过WBS远程监测患者的当前状况;因此,在发现遇险情况时,立即发送帮助。该社交网络将症状相似的患者联系在一起,还可以在患者等待救护车到来时向附近路过的人寻求帮助。我们的模式有望改善医疗服务,同时保护患者的隐私。
{"title":"Privacy-Preserving Healthcare System for Clinical Decision-Support and Emergency Call Systems","authors":"A. Alabdulkarim, Mznah Al-Rodhaan, Yuan Tian","doi":"10.4236/CN.2017.94018","DOIUrl":"https://doi.org/10.4236/CN.2017.94018","url":null,"abstract":"Healthcare centers always aim to deliver the best quality healthcare services to patients and earn their satisfaction. Technology has played a major role in achieving these goals, such as clinical decision-support systems and mobile health social networks. These systems have improved the quality of care services by speeding-up the diagnosis process with accuracy, and allowing caregivers to monitor patients remotely through the use of WBS, respectively. However, these systems’ accuracy and efficiency are dependent on patients’ health information, which must be inevitably shared over the network, thus exposing them to cyber-attacks. Therefore, privacy-preserving services are ought to be employed to protect patients’ privacy. In this work, we proposed a privacy-preserving healthcare system, which is composed of two subsystems. The first is a privacy-preserving clinical decision-support system. The second subsystem is a privacy-preserving Mobile Health Social Network (MHSN). The former was based on decision tree classifier that is used to diagnose patients with new symptoms without disclosing patients’ records. Whereas the latter would allow physicians to monitor patients’ current condition remotely through WBS; thus sending help immediately in case of a distress situation detected. The social network, which connects patients of similar symptoms together, would also provide the service of seeking help of near-by passing people while the patient is waiting for an ambulance to arrive. Our model is expected to improve healthcare services while protecting patients’ privacy.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"30 1","pages":"249-274"},"PeriodicalIF":0.0,"publicationDate":"2017-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85846033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Synchronizability and Optimized Analysis of the Hierarchical Network 层次网络的同步性及优化分析
Hang Lin, Zhen Jia, Yongshang Long
A large number of research results show that the synchronizability of complex networks is closely related to the topological structure. Some typical complex network models, such as random networks, small-world networks, BA scale-free network, etc, have totally different synchronizability. In this paper, a kind of hierarchical network synchronizability of self-similar module structures was studied, with more focus on the effect of the initial size of the module and network layer to the synchronizability and further research on the problem of network synchronous optimization. The Law of Segmentation Method was employed to reduce the maximum node betweenness and the Law of Parallel Reconnection employed to improve the ability of synchronizability of complex network by reducing the average path length of networks. Meanwhile, the effectiveness of proposed methods was verified through a lot of numerically simulative experiments.
大量研究结果表明,复杂网络的同步性与拓扑结构密切相关。一些典型的复杂网络模型,如随机网络、小世界网络、BA无标度网络等,具有完全不同的同步性。本文研究了一种自相似模块结构的分层网络同步性,重点研究了模块和网络层的初始大小对同步性的影响,并进一步研究了网络同步优化问题。采用分段法减小最大节点间距,采用并行重连法减小网络平均路径长度,提高复杂网络的同步能力。同时,通过大量的数值模拟实验验证了所提方法的有效性。
{"title":"The Synchronizability and Optimized Analysis of the Hierarchical Network","authors":"Hang Lin, Zhen Jia, Yongshang Long","doi":"10.4236/CN.2017.93015","DOIUrl":"https://doi.org/10.4236/CN.2017.93015","url":null,"abstract":"A large number of research results show that the synchronizability of complex networks is closely related to the topological structure. Some typical complex network models, such as random networks, small-world networks, BA scale-free network, etc, have totally different synchronizability. In this paper, a kind of hierarchical network synchronizability of self-similar module structures was studied, with more focus on the effect of the initial size of the module and network layer to the synchronizability and further research on the problem of network synchronous optimization. The Law of Segmentation Method was employed to reduce the maximum node betweenness and the Law of Parallel Reconnection employed to improve the ability of synchronizability of complex network by reducing the average path length of networks. Meanwhile, the effectiveness of proposed methods was verified through a lot of numerically simulative experiments.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"15 1","pages":"207-218"},"PeriodicalIF":0.0,"publicationDate":"2017-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88536241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Multi-Factor Authentication in Modern Computing 增强现代计算中的多因素认证
E. Nwabueze, Iwuoha Obioha, O. Onuoha
Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and phishing. There is need to curb these problems with the use of an enhanced multi-factor authentication approach. The objective of this work is to create a multi-factor authentication software for a 4G wireless network. Multi-factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. The research methodologies used for this work include Structured System Analysis and Design Methodology, SSADM and Prototyping. The result of this work will be a Multi-factor authentications software. This software was designed with programming languages like ASP. NET, C# and Microsoft SQL Server for the database.
大多数网络服务提供商,如尼日利亚MTN,目前对其4G无线网络使用双因素认证。这暴露了网络用户识别盗窃和用户数据的安全威胁,如窥探,嗅探,欺骗和网络钓鱼。需要使用增强的多因素身份验证方法来遏制这些问题。这项工作的目标是为4G无线网络创建一个多因素认证软件。多因素认证涉及用户知识因素、用户占有因素和用户内在因素;这就是在授予系统访问权限之前要呈现的用户。这项工作使用的研究方法包括结构化系统分析和设计方法、SSADM和原型设计。这项工作的结果将是一个多因素认证软件。本软件采用ASP等编程语言进行设计。. NET、c#和Microsoft SQL Server作为数据库。
{"title":"Enhancing Multi-Factor Authentication in Modern Computing","authors":"E. Nwabueze, Iwuoha Obioha, O. Onuoha","doi":"10.4236/CN.2017.63012","DOIUrl":"https://doi.org/10.4236/CN.2017.63012","url":null,"abstract":"Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and phishing. There is need to curb these problems with the use of an enhanced multi-factor authentication approach. The objective of this work is to create a multi-factor authentication software for a 4G wireless network. Multi-factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. The research methodologies used for this work include Structured System Analysis and Design Methodology, SSADM and Prototyping. The result of this work will be a Multi-factor authentications software. This software was designed with programming languages like ASP. NET, C# and Microsoft SQL Server for the database.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"6 1 1","pages":"172-178"},"PeriodicalIF":0.0,"publicationDate":"2017-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76275022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
DroidData: Tracking and Monitoring Data Transmission in the Android Operating System DroidData:跟踪和监控Android操作系统中的数据传输
Hani Alshahrani, Abdulrahman Alzahrani, Alexandra Hanton, A. Alshehri, Huirong Fu, Ye Zhu
Most of the millions of Android users worldwide use applications from the official Android market (Google Play store) and unregulated alternative markets to get more functionality from their devices. Many of these applications transmit sensitive data stored on the device, either maliciously or accidentally, to outside networks. In this paper, we will study the ways that Android applications transmit data to outside servers and propose a user-friendly application, DroidData, to inform and protect the user from these security risks. We will use tools such as TaintDroid, AppIntent, and Securacy to propose an application that reveals what types of data are being transmitted from apps, the location to which the data is being transmitted, whether the data is being transmitted through a secure channel (such as HTTPS) and whether the user is aware that the information is being transmitted. The application will generate a report that allows the user to block the application that leaks sensitive information. In doing so, we will examine the importance, relevance, and prevalence of these Android Data security issues.
全球数以百万计的Android用户大多使用来自官方Android市场(Google Play商店)和不受监管的替代市场的应用程序,以从他们的设备中获得更多功能。这些应用程序中的许多都将存储在设备上的敏感数据恶意或无意地传输到外部网络。在本文中,我们将研究Android应用程序向外部服务器传输数据的方式,并提出一个用户友好的应用程序DroidData,以告知和保护用户免受这些安全风险。我们将使用诸如TaintDroid, AppIntent和security等工具来提出一个应用程序,该应用程序可以显示从应用程序传输的数据类型,数据传输到的位置,数据是否通过安全通道(如HTTPS)传输以及用户是否意识到正在传输信息。应用程序将生成一个报告,允许用户阻止泄露敏感信息的应用程序。在此过程中,我们将研究这些Android数据安全问题的重要性、相关性和普遍性。
{"title":"DroidData: Tracking and Monitoring Data Transmission in the Android Operating System","authors":"Hani Alshahrani, Abdulrahman Alzahrani, Alexandra Hanton, A. Alshehri, Huirong Fu, Ye Zhu","doi":"10.4236/CN.2017.93014","DOIUrl":"https://doi.org/10.4236/CN.2017.93014","url":null,"abstract":"Most of the millions of Android users worldwide use applications from the official Android market (Google Play store) and unregulated alternative markets to get more functionality from their devices. Many of these applications transmit sensitive data stored on the device, either maliciously or accidentally, to outside networks. In this paper, we will study the ways that Android applications transmit data to outside servers and propose a user-friendly application, DroidData, to inform and protect the user from these security risks. We will use tools such as TaintDroid, AppIntent, and Securacy to propose an application that reveals what types of data are being transmitted from apps, the location to which the data is being transmitted, whether the data is being transmitted through a secure channel (such as HTTPS) and whether the user is aware that the information is being transmitted. The application will generate a report that allows the user to block the application that leaks sensitive information. In doing so, we will examine the importance, relevance, and prevalence of these Android Data security issues.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"70 1","pages":"192-206"},"PeriodicalIF":0.0,"publicationDate":"2017-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72933437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1