LEADER 01045nam a2200217 i 4500 001 991003167019707536 008 080110s2006 it m ||| | eng d 035 $ab13642285-39ule_inst 040 $aDip.to Fisica$beng 100 1 $aLorusso, Antonella$0621920 245 10$aCharacterization of expanding laser plasma produced by laser ablation. Tesi di dottorato /$cdottoranda Antonella Lorusso; relatore Vincenzo Nassisi ; coordinatore Boris Konopelchenko 260 $aLecce :$bUniversità degli Studi, Lecce. Dottorato di ricerca in Fisica XVIII Ciclo,$ca.a. 2003-2006 300 $a106 p. :$bill. ;$c30 cm 700 1 $aNassisi, Vincenzo 700 1 $aKonopelchenko, Boris 907 $a.b13642285$b02-04-14$c10-01-08 912 $a991003167019707536 945 $aLE006 TD54$g1$i2006000160155$lle006$og$pE15.00$q-$rn$so $t0$u0$v0$w0$x0$y.i14644538$z10-01-08 996 $aCharacterization of expanding laser plasma produced by laser ablation. Tesi di dottorato$91212216 997 $aUNISALENTO 998 $ale006$b10-01-08$cm$da $e-$feng$git $h0$i0 LEADER 13134nam 22007935 450 001 9910254983303321 005 20251226195434.0 010 $a3-319-30222-1 024 7 $a10.1007/978-3-319-30222-5 035 $a(CKB)3710000000627509 035 $a(SSID)ssj0001656804 035 $a(PQKBManifestationID)16437744 035 $a(PQKBTitleCode)TC0001656804 035 $a(PQKBWorkID)14985578 035 $a(PQKB)10841597 035 $a(DE-He213)978-3-319-30222-5 035 $a(MiAaPQ)EBC6304253 035 $a(MiAaPQ)EBC5595273 035 $a(Au-PeEL)EBL5595273 035 $a(OCoLC)944030289 035 $a(PPN)192772848 035 $a(EXLCZ)993710000000627509 100 $a20160301d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aE-Business and Telecommunications $e12th International Joint Conference, ICETE 2015, Colmar, France, July 20?22, 2015, Revised Selected Papers /$fedited by Mohammad S. Obaidat, Pascal Lorenz 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XXIII, 534 p. 178 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v585 300 $aIncludes index. 311 08$a3-319-30221-3 327 $aIntro -- Preface -- Organization -- Contents -- Invited Paper -- Integrating Retail and e-Commerce Using Web Analytics and Intelligent Sensors -- Abstract -- 1 Introduction -- 2 The Scene -- 3 Retail and E-Retail and Markets -- 4 User Scenarios and Transforming Technologies -- 5 Management/Administrator Needs and Requirements for Analytics and User profiles -- 6 Intelligence and Sensors -- 7 E-Commerce and Retail Shop Analytics Using Intelligent Sensors -- 8 User Profiles -- 9 Emotional Analysis -- 10 An Integrated Architecture -- 11 Conclusions -- References -- Data Communication Networking -- High Level Policies in SDN -- 1 Introduction -- 2 High Level SDN Architecture -- 2.1 Network and Hosts -- 2.2 SDN Control Plane -- 2.3 Sources of High Level Information -- 2.4 High Level SDN Controller and SDN Applications -- 3 High Level SDN Examples -- 3.1 Application-Aware Networks -- 3.2 Identity-Aware Networks -- 3.3 Other Traffic Identifiers and Combinations -- 4 Use Cases -- 4.1 Remote Intrusion Detection System -- 4.2 Packet Filter -- 4.3 Path Load Balancing -- 4.4 Traffic Monitoring -- 5 Testbeds -- 5.1 Application-Aware Testbed -- 5.2 Identity-Aware Testbed -- 6 Related Work -- 6.1 Application Awareness in SDN -- 6.2 Identity Awareness in SDN -- 7 Discussion -- 7.1 Evaluation -- 7.2 Typical Scenarios -- 8 Conclusion -- References -- What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility -- 1 Introduction -- 2 Transport Layer Security Protocol -- 2.1 Cipher Suites -- 2.2 OpenSSL -- 2.3 SSL/TLS Version Distribution and Vulnerabilities -- 2.4 Available Tools -- 3 Practical Evaluation -- 3.1 Methodology -- 3.2 Compatibility Estimation for ACH's Cipher Strings -- 3.3 OpenSSL Support for Various Cipher Suites -- 3.4 Analyzing Available Cipher Suites Using O-Saft -- 4 Cipher Suite Proposal. 327 $a5 Summary and Concluding Remarks -- 5.1 Comparing the Cipher Strings -- 5.2 Conclusion -- References -- e-Business -- ARM: Architecture for Recruitment Matchmaking -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Concept and Architecture -- 3.1 RDB (Relational Database) -- 3.2 Interface -- 3.3 Triple Store -- 3.4 Recommendation Engine -- 4 RS Algorithms -- 4.1 Entity Recommendations -- 4.2 Team Recommendations -- 5 Testing and Validation -- 5.1 Access Speed -- 5.2 Recommendation Speed -- 5.3 Precision -- 5.4 Validation Scenarios -- 5.5 ICE-B Feedback -- 6 Conclusions -- Acknowledgements -- References -- Understanding Local mGovernment Applications: A Business Model Approach to the Case of Brussels -- Abstract -- 1 Introduction -- 2 Business Models and M-Government -- 2.1 Business Model Thinking in mGov -- 2.2 mGov Business Model Parameters and Mapping Methodology -- 3 The Brussels Context -- 4 Official Brussels Apps -- 4.1 Be.Brussels -- 4.2 Brussels Gardens -- 4.3 City of Brussels -- 4.4 FixMyStreet Brussels -- 4.5 STIB Mobile -- 4.6 Visit Brussels -- 5 Mapping -- 6 Discussion -- 7 Conclusions -- Acknowledgements -- Annex -- References -- Understanding the Use of Location Sharing Services on Social Networking Platforms in China -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 The Adoption of Location-Based Services -- 2.2 Contextual Integrity -- 2.3 Privacy Concerns in Location Sharing Services -- 3 Research Questions -- 4 Method -- 5 Research Findings -- 5.1 Motivations to Use Location Sharing Services -- 5.2 Barriers to Use Location Sharing Services -- 5.3 The Information Norms of Sharing Location -- 5.3.1 Where Do People Check-in? -- 5.3.2 When Do People Check-in? -- 5.3.3 What Information Can Be Gained in Friends' Shared Location Information? -- 5.4 Applying Contextual Integrity to Analyze the Privacy Concern. 327 $a5.4.1 Potential Audiences -- 5.4.2 Violation of Appropriateness -- 5.4.3 Violation of Distribution -- 6 Conclusion and Future Work -- References -- Large Scale Evaluation of an Adaptive E-Advertising User Model -- Abstract -- 1 Introduction -- 2 Related Research -- 3 Authoring Adaptive E-Advertising -- 4 Scenario -- 4.1 Scenario 1 -- 4.2 Scenario 2 -- 5 Case Study -- 5.1 Hypotheses -- 5.2 Case Study Setup -- 5.3 Results -- 5.4 User Tracking -- 5.5 Participant Feedback -- 6 Discussion -- 7 Conclusions and Future Work -- References -- Optical Communication Systems -- How Do the Multiple Tunable Receivers Per Node Affect the Efficiency of a WDM LAN? A Performance Analytical Study -- Abstract -- 1 Introduction -- 2 Network Model and Assumptions -- 3 Analysis -- 4 Performance Evaluation -- 5 Propagation Delay Latency Modelling -- 6 Conclusion -- Appendix -- References -- Security and Cryptography -- A Scalable Honeynet Architecture for Industrial Control Systems -- 1 Introduction -- 2 Assumptions and Research Questions -- 3 Related Work -- 4 Approach -- 5 Architecture -- 5.1 Data Capture -- 5.2 Data Collection -- 5.3 Honeynet Management -- 5.4 Implementation -- 6 Experimental Evaluation -- 6.1 Results -- 6.2 Modbus --- Honeynet-Level Analysis -- 6.3 IEC-104 --- Honeynet-level Analysis -- 7 Conclusion -- References -- Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications -- 1 Introduction -- 2 Related Work -- 3 The Proposed Features -- 4 Evaluation: Study Design -- 5 Evaluation: Analysis of Data -- 5.1 Descriptive Statistics -- 5.2 Hypothesis Testing -- 5.3 Classification Analysis -- 6 Conclusions and Future Works -- References -- Automated Verification of e-Cash Protocols -- 1 Introduction -- 2 Modeling e-Cash Protocols in the Applied -Calculus -- 3 Formalizing Security Properties -- 3.1 Forgery-Related Properties. 327 $a3.2 Privacy Properties -- 4 Case Studies -- 4.1 Chaum Online Protocol -- 4.2 DigiCash Protocol -- 4.3 Chaum Offline Protocol -- 4.4 Protocol by Peterson and Poupard -- 5 Conclusion -- References -- Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Code Obfuscation Using Kolmogorov Complexity -- 4.1 Applying Kolmogorov Complexity to Code Obfuscation -- 4.2 Adversary Model -- 4.3 On the Impossibility of Obfuscation -- 4.4 Security and Unintelligibility -- 4.5 Normalized Kolmogorov Complexity -- 5 Individual Security of Code Obfuscation -- 6 Conclusion and Future Work -- References -- The Entity Labeling Pattern for Modeling Operating Systems Access Control -- 1 Introduction -- 2 Related Work -- 3 SELinux Access Control -- 3.1 Security Architecture -- 3.2 Policy Semantics -- 4 Modeling Patterns -- 4.1 Core-Based Modeling -- 4.2 Entity Labeling -- 5 SELinux Security Model -- 5.1 EL Components -- 5.2 Core-Based Model -- 5.3 Specifying SELX Commands -- 6 Model Instantiation -- 6.1 State Space -- 6.2 Model Extensions -- 6.3 Model Dynamics -- 6.4 Results -- 7 Conclusions -- References -- Execution Path Classification for Vulnerability Analysis and Detection -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Source Code Profiling for Exploit Detection -- 3.2 Risk -- 4 Design and Implementation -- 4.1 Entroine's Architecture and Workflow -- 4.2 Taxonomy of Dangerous Instructions -- 4.3 Classification and Ranking System -- 5 Experiments and Results -- 5.1 Entroine's Example Run -- 5.2 Experimental Results on the Juliet Test Case -- 6 Conclusions -- References -- A Privacy-Sensitive Collaborative Approach to Business Process Development -- 1 Introduction -- 2 Environment -- 3 Privacy Model -- 3.1 BP Execution Sequence -- 3.2 Differential Privacy. 327 $a3.3 Privacy Requirement -- 4 Proposed Approach -- 4.1 Differentially Private BP Execution Sequences -- 4.2 Process Mining and BP Workflow Generation -- 5 Analysis -- 6 Experimental Evaluation -- 6.1 Dataset Description -- 6.2 Results -- 7 Implementation -- 8 Related Work -- 9 Conclusions and Future Work -- References -- Using OWL Reasoning for Evaluating XACML Policies -- 1 Introduction -- 2 An OWL-Based XACML Policy Framework -- 3 Axiomatic Policies -- 3.1 Policy Archetypes -- 3.2 Combining Policies -- 3.3 Axiomatic Policies Generation Algorithm -- 3.4 Policy Decision -- 4 Performances -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Partial Key Exposure Attacks on RSA with Exponent Blinding -- 1 Introduction -- 2 Related Works -- 3 RSA Applications -- 3.1 RSA -- 3.2 CRT-RSA -- 3.3 Exponent Blinding -- 3.4 Common Parameters Setting -- 4 General Strategy -- 4.1 Lattices -- 4.2 General Strategy -- 5 Attacks on RSA -- 5.1 Partial Information on LSBs of d* -- 5.2 Partial Information on MSBs of d* -- 6 Attacks on CRT-RSA -- 6.1 Partial Information on LSBs of dp* -- 6.2 Partial Information on MSBs of dp* -- 7 Experimental Results -- 7.1 Results with Known LSBs of d* -- 7.2 Results with Known MSBs of d* -- 7.3 Results with Known LSBs of dp* -- 7.4 Results with Known MSBs of dp* -- 8 Conclusions -- References -- A Generalized Authentication Scheme for Mobile Phones Using Gait Signals -- 1 Introduction -- 2 Related Works -- 3 The Instability of Sensor Orientation -- 3.1 Problem Statement -- 3.2 Proposed Solution -- 4 Gait Recognition Model Construction -- 4.1 Data Preprocessing -- 4.2 Gait Pattern Extraction -- 4.3 Gait Model Construction -- 5 Experiments -- 5.1 Dataset Description -- 5.2 Experimental Configuration -- 5.3 Verification Results -- 5.4 Identification Results -- 5.5 The Impacts of Disorientation Error -- 6 Conclusions. 327 $aReferences. 330 $aThis book constitutes the refereed proceedings of the 12th International Joint Conference on E-Business and Telecommunications, ICETE 2015, held in Colmar, France, in July 2015. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 23 full papers presented together with an invited paper in this volume were carefully reviewed and selected from 218 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v585 606 $aComputer networks 606 $aData protection 606 $aApplication software 606 $aInformation storage and retrieval systems 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aInformation Storage and Retrieval 615 0$aComputer networks. 615 0$aData protection. 615 0$aApplication software. 615 0$aInformation storage and retrieval systems. 615 14$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aInformation Storage and Retrieval. 676 $a621.382 702 $aObaidat$b Mohammad S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLorenz$b Pascal$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254983303321 996 $aE-Business and Telecommunications$91961627 997 $aUNINA