Cyberspace Safety and Security
4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings
Chapter and Conference Paper
Networks composed of devices, which having short-range wireless communications capabilities and carried by people, is a major application scenarios in opportunistic network, whose nodes movement has the charac...
Chapter and Conference Paper
To guarantee the network computing system security, the effective method is illegal or malicious software detection. Most of the former researches implement it on OS kernel or hypervisor level. However, if the...
Chapter and Conference Paper
Critical Infrastructures like power and communication networks are highly interdependent on each other for their full functionality. Many significant research have been pursued to model the interdependency and...
Chapter and Conference Paper
Location Management (LM) is an important function of mobile cellular networks that enables network to locate the users. Mechanisms applicable in legacy systems are not able to cope with the vast increase of de...
Chapter and Conference Paper
A diversity of indoor localization techniques have become accurate and ready to use. A client first measures its location characteristics, and then calculates its location with the information provided by the ...
Chapter and Conference Paper
A linear influence network is a broadly applicable conceptual framework in risk management. It has important applications in computer and network security. Prior work on linear influence networks targeting tho...
Chapter and Conference Paper
In this paper, we first demonstrate that the newly introduced Android RunTime (ART) in latest Android versions (Android 5.0 or above) exposes a new attack surface, namely, the “return-to-art” (ret2art) attack....
Chapter and Conference Paper
JavaScript exploits impose a severe threat to computer security. Once a zero-day exploit is captured, it is critical to quickly pinpoint the JavaScript statements that uniquely characterize the exploit and the...
Chapter and Conference Paper
Server-centric data center architecture has been proposed to provide high throughput, scalable construction and error tolerance with commodity servers and switches for cloud data centers. To fully utilize thos...
Chapter and Conference Paper
Analysis on microblog sentiment is very important for microblog monitoring and guidance of public opinion. According to the problem that precision of Chinese microblog sentiment analysis was low, this paper pr...
Chapter and Conference Paper
For SVMs, large training samples will lead to high computing complexity of convex quadratic programming, even difficulty in running. Sample selection as a preprocessor of classification can greatly reduce the ...
Chapter and Conference Paper
Trust-based onion routing employs users’ own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attack based on a priori trust relationship. In t...
Chapter and Conference Paper
Direct Anonymous Attestation (DAA) is a cryptographic scheme which enables the remote authentication of a trusted platform whilst preserving privacy under the user’s control. In term of construction of DAA, du...
Book and Conference Proceedings
4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings
Chapter and Conference Paper
In today’s society, online shop** has adapted to the fast-paced lifestyle, making ccustomers enjoy the convenience of choosing and buying their favorite products at home. This system is based on MVC architec...
Chapter and Conference Paper
Enterprise Service Bus is widely-used, flexible, SOA-based infrastructure. Lifecycle management is a necessity for component reusing, maintenance, monitoring, as well as service governance. But existing approa...
Chapter and Conference Paper
In order to making owner’ life convenience and property management standardized, the B/S structure MVC model and SSI frame etc. are employed. System of residence property management based on WEB is empoldered ...
Chapter and Conference Paper
Metadata is the data about data. With the development of information technologies, it is realized that metadata is of great importance in discovery, identification, localization and access of resources. For th...
Chapter and Conference Paper
In the recent past, the most influential theories with respect to agent technology are the Belief-Desire-Intention (BDI) model. This paper not only expands past achievements but also makes novel proposals. It ...
Chapter and Conference Paper
The paper proposes a Distributed Identity-Based Encryption (DIBE) scheme. The DIBE scheme extends the traditional IBE to a distributed system which consists of some homogenous or heterogeneous subsystems. Each...