Vai al contenuto principale della pagina

E-Business and Telecommunications [[electronic resource] ] : 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers / / edited by Mohammad S. Obaidat, Pascal Lorenz



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: E-Business and Telecommunications [[electronic resource] ] : 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papers / / edited by Mohammad S. Obaidat, Pascal Lorenz Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Edizione: 1st ed. 2016.
Descrizione fisica: 1 online resource (XXIII, 534 p. 178 illus. in color.)
Disciplina: 621.382
Soggetto topico: Computer communication systems
Computer security
Application software
Information storage and retrieval
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Persona (resp. second.): ObaidatMohammad S
LorenzPascal
Note generali: Includes index.
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Invited Paper -- Integrating Retail and e-Commerce Using Web Analytics and Intelligent Sensors -- Abstract -- 1 Introduction -- 2 The Scene -- 3 Retail and E-Retail and Markets -- 4 User Scenarios and Transforming Technologies -- 5 Management/Administrator Needs and Requirements for Analytics and User profiles -- 6 Intelligence and Sensors -- 7 E-Commerce and Retail Shop Analytics Using Intelligent Sensors -- 8 User Profiles -- 9 Emotional Analysis -- 10 An Integrated Architecture -- 11 Conclusions -- References -- Data Communication Networking -- High Level Policies in SDN -- 1 Introduction -- 2 High Level SDN Architecture -- 2.1 Network and Hosts -- 2.2 SDN Control Plane -- 2.3 Sources of High Level Information -- 2.4 High Level SDN Controller and SDN Applications -- 3 High Level SDN Examples -- 3.1 Application-Aware Networks -- 3.2 Identity-Aware Networks -- 3.3 Other Traffic Identifiers and Combinations -- 4 Use Cases -- 4.1 Remote Intrusion Detection System -- 4.2 Packet Filter -- 4.3 Path Load Balancing -- 4.4 Traffic Monitoring -- 5 Testbeds -- 5.1 Application-Aware Testbed -- 5.2 Identity-Aware Testbed -- 6 Related Work -- 6.1 Application Awareness in SDN -- 6.2 Identity Awareness in SDN -- 7 Discussion -- 7.1 Evaluation -- 7.2 Typical Scenarios -- 8 Conclusion -- References -- What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility -- 1 Introduction -- 2 Transport Layer Security Protocol -- 2.1 Cipher Suites -- 2.2 OpenSSL -- 2.3 SSL/TLS Version Distribution and Vulnerabilities -- 2.4 Available Tools -- 3 Practical Evaluation -- 3.1 Methodology -- 3.2 Compatibility Estimation for ACH's Cipher Strings -- 3.3 OpenSSL Support for Various Cipher Suites -- 3.4 Analyzing Available Cipher Suites Using O-Saft -- 4 Cipher Suite Proposal.
5 Summary and Concluding Remarks -- 5.1 Comparing the Cipher Strings -- 5.2 Conclusion -- References -- e-Business -- ARM: Architecture for Recruitment Matchmaking -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Concept and Architecture -- 3.1 RDB (Relational Database) -- 3.2 Interface -- 3.3 Triple Store -- 3.4 Recommendation Engine -- 4 RS Algorithms -- 4.1 Entity Recommendations -- 4.2 Team Recommendations -- 5 Testing and Validation -- 5.1 Access Speed -- 5.2 Recommendation Speed -- 5.3 Precision -- 5.4 Validation Scenarios -- 5.5 ICE-B Feedback -- 6 Conclusions -- Acknowledgements -- References -- Understanding Local mGovernment Applications: A Business Model Approach to the Case of Brussels -- Abstract -- 1 Introduction -- 2 Business Models and M-Government -- 2.1 Business Model Thinking in mGov -- 2.2 mGov Business Model Parameters and Mapping Methodology -- 3 The Brussels Context -- 4 Official Brussels Apps -- 4.1 Be.Brussels -- 4.2 Brussels Gardens -- 4.3 City of Brussels -- 4.4 FixMyStreet Brussels -- 4.5 STIB Mobile -- 4.6 Visit Brussels -- 5 Mapping -- 6 Discussion -- 7 Conclusions -- Acknowledgements -- Annex -- References -- Understanding the Use of Location Sharing Services on Social Networking Platforms in China -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 The Adoption of Location-Based Services -- 2.2 Contextual Integrity -- 2.3 Privacy Concerns in Location Sharing Services -- 3 Research Questions -- 4 Method -- 5 Research Findings -- 5.1 Motivations to Use Location Sharing Services -- 5.2 Barriers to Use Location Sharing Services -- 5.3 The Information Norms of Sharing Location -- 5.3.1 Where Do People Check-in? -- 5.3.2 When Do People Check-in? -- 5.3.3 What Information Can Be Gained in Friends' Shared Location Information? -- 5.4 Applying Contextual Integrity to Analyze the Privacy Concern.
5.4.1 Potential Audiences -- 5.4.2 Violation of Appropriateness -- 5.4.3 Violation of Distribution -- 6 Conclusion and Future Work -- References -- Large Scale Evaluation of an Adaptive E-Advertising User Model -- Abstract -- 1 Introduction -- 2 Related Research -- 3 Authoring Adaptive E-Advertising -- 4 Scenario -- 4.1 Scenario 1 -- 4.2 Scenario 2 -- 5 Case Study -- 5.1 Hypotheses -- 5.2 Case Study Setup -- 5.3 Results -- 5.4 User Tracking -- 5.5 Participant Feedback -- 6 Discussion -- 7 Conclusions and Future Work -- References -- Optical Communication Systems -- How Do the Multiple Tunable Receivers Per Node Affect the Efficiency of a WDM LAN? A Performance Analytical Study -- Abstract -- 1 Introduction -- 2 Network Model and Assumptions -- 3 Analysis -- 4 Performance Evaluation -- 5 Propagation Delay Latency Modelling -- 6 Conclusion -- Appendix -- References -- Security and Cryptography -- A Scalable Honeynet Architecture for Industrial Control Systems -- 1 Introduction -- 2 Assumptions and Research Questions -- 3 Related Work -- 4 Approach -- 5 Architecture -- 5.1 Data Capture -- 5.2 Data Collection -- 5.3 Honeynet Management -- 5.4 Implementation -- 6 Experimental Evaluation -- 6.1 Results -- 6.2 Modbus --- Honeynet-Level Analysis -- 6.3 IEC-104 --- Honeynet-level Analysis -- 7 Conclusion -- References -- Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications -- 1 Introduction -- 2 Related Work -- 3 The Proposed Features -- 4 Evaluation: Study Design -- 5 Evaluation: Analysis of Data -- 5.1 Descriptive Statistics -- 5.2 Hypothesis Testing -- 5.3 Classification Analysis -- 6 Conclusions and Future Works -- References -- Automated Verification of e-Cash Protocols -- 1 Introduction -- 2 Modeling e-Cash Protocols in the Applied -Calculus -- 3 Formalizing Security Properties -- 3.1 Forgery-Related Properties.
3.2 Privacy Properties -- 4 Case Studies -- 4.1 Chaum Online Protocol -- 4.2 DigiCash Protocol -- 4.3 Chaum Offline Protocol -- 4.4 Protocol by Peterson and Poupard -- 5 Conclusion -- References -- Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Code Obfuscation Using Kolmogorov Complexity -- 4.1 Applying Kolmogorov Complexity to Code Obfuscation -- 4.2 Adversary Model -- 4.3 On the Impossibility of Obfuscation -- 4.4 Security and Unintelligibility -- 4.5 Normalized Kolmogorov Complexity -- 5 Individual Security of Code Obfuscation -- 6 Conclusion and Future Work -- References -- The Entity Labeling Pattern for Modeling Operating Systems Access Control -- 1 Introduction -- 2 Related Work -- 3 SELinux Access Control -- 3.1 Security Architecture -- 3.2 Policy Semantics -- 4 Modeling Patterns -- 4.1 Core-Based Modeling -- 4.2 Entity Labeling -- 5 SELinux Security Model -- 5.1 EL Components -- 5.2 Core-Based Model -- 5.3 Specifying SELX Commands -- 6 Model Instantiation -- 6.1 State Space -- 6.2 Model Extensions -- 6.3 Model Dynamics -- 6.4 Results -- 7 Conclusions -- References -- Execution Path Classification for Vulnerability Analysis and Detection -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Source Code Profiling for Exploit Detection -- 3.2 Risk -- 4 Design and Implementation -- 4.1 Entroine's Architecture and Workflow -- 4.2 Taxonomy of Dangerous Instructions -- 4.3 Classification and Ranking System -- 5 Experiments and Results -- 5.1 Entroine's Example Run -- 5.2 Experimental Results on the Juliet Test Case -- 6 Conclusions -- References -- A Privacy-Sensitive Collaborative Approach to Business Process Development -- 1 Introduction -- 2 Environment -- 3 Privacy Model -- 3.1 BP Execution Sequence -- 3.2 Differential Privacy.
3.3 Privacy Requirement -- 4 Proposed Approach -- 4.1 Differentially Private BP Execution Sequences -- 4.2 Process Mining and BP Workflow Generation -- 5 Analysis -- 6 Experimental Evaluation -- 6.1 Dataset Description -- 6.2 Results -- 7 Implementation -- 8 Related Work -- 9 Conclusions and Future Work -- References -- Using OWL Reasoning for Evaluating XACML Policies -- 1 Introduction -- 2 An OWL-Based XACML Policy Framework -- 3 Axiomatic Policies -- 3.1 Policy Archetypes -- 3.2 Combining Policies -- 3.3 Axiomatic Policies Generation Algorithm -- 3.4 Policy Decision -- 4 Performances -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Partial Key Exposure Attacks on RSA with Exponent Blinding -- 1 Introduction -- 2 Related Works -- 3 RSA Applications -- 3.1 RSA -- 3.2 CRT-RSA -- 3.3 Exponent Blinding -- 3.4 Common Parameters Setting -- 4 General Strategy -- 4.1 Lattices -- 4.2 General Strategy -- 5 Attacks on RSA -- 5.1 Partial Information on LSBs of d* -- 5.2 Partial Information on MSBs of d* -- 6 Attacks on CRT-RSA -- 6.1 Partial Information on LSBs of dp* -- 6.2 Partial Information on MSBs of dp* -- 7 Experimental Results -- 7.1 Results with Known LSBs of d* -- 7.2 Results with Known MSBs of d* -- 7.3 Results with Known LSBs of dp* -- 7.4 Results with Known MSBs of dp* -- 8 Conclusions -- References -- A Generalized Authentication Scheme for Mobile Phones Using Gait Signals -- 1 Introduction -- 2 Related Works -- 3 The Instability of Sensor Orientation -- 3.1 Problem Statement -- 3.2 Proposed Solution -- 4 Gait Recognition Model Construction -- 4.1 Data Preprocessing -- 4.2 Gait Pattern Extraction -- 4.3 Gait Model Construction -- 5 Experiments -- 5.1 Dataset Description -- 5.2 Experimental Configuration -- 5.3 Verification Results -- 5.4 Identification Results -- 5.5 The Impacts of Disorientation Error -- 6 Conclusions.
References.
Sommario/riassunto: This book constitutes the refereed proceedings of the 12th International Joint Conference on E-Business and Telecommunications, ICETE 2015, held in Colmar, France, in July 2015. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 23 full papers presented together with an invited paper in this volume were carefully reviewed and selected from 218 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.
Titolo autorizzato: E-Business and Telecommunications  Visualizza cluster
ISBN: 3-319-30222-1
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910254983303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Communications in Computer and Information Science, . 1865-0929 ; ; 585