Atnaujinkite slapukų nuostatas

El. knyga: Secure and Trust Computing, Data Management, and Applications: 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part I

Edited by , Edited by , Edited by , Edited by , Edited by
Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address various theories and practical applications of secure and trust computing and data management in future environments.
STA2011 - Security Track
Embedding High Capacity Covert Channels in Short Message Service (SMS)
1(10)
M. Zubair Rafique
Muhammad Khurram Khan
Khaled Alghatbar
Muddassar Farooq
A Framework for Detecting Malformed SMS Attack
11(10)
M. Zubair Rafique
Muhammad Khurram Khan
Khaled Alghathbar
Muddassar Farooq
A Metadata Model for Data Centric Security
21(8)
Benjmin Aziz
Shirley Crompton
Michael Wilson
SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements
29(8)
Benjamin Aziz
Alvaro Arenas
Michael Wilson
Self-keying Identification Mechanism for Small Devices
37(8)
Krzysztof Barczynski
Przemyslaw Blaskiewicz
Marek Klonowski
Miroslaw Kutylowski
A Software Architecture for Introducing Trust in Java-Based Clouds
45(9)
Siegfried Podesser
Ronald Toegl
A Network Data Abstraction Method for Data Set Verification
54(9)
Jaeik Cho
Kyuwon Choi
Taeshik Shon
Jongsub Moon
Efficient De-Fragmented Writeback for Journaling File System
63(8)
Seung-Ho Lim
Hyun Jin Choi
Jong Hyuk Park
IMS Session Management Based on Usage Control
71(8)
Giorgos Karopoulos
Fabio Martinelli
Using Counter Cache Coherence to Improve Memory Encryptions Performance in Multiprocessor Systems
79(9)
Zhang Yuanyuan
Gu Junzhong
Dynamic Combinatorial Key Pre-distribution Scheme for Heterogeneous Sensor Networks
88(8)
Bidi Ying
Dimitrios Makrakis
Hussein T. Mouftah
Wenjun Lu
Exclusion Based VANETs (EBV)
96(9)
Ahmad A. Al-Daraiseh
Mohammed A. Moharrum
Embedding Edit Distance to Allow Private Keyword Search in Cloud Computing
105(9)
Julien Bringer
Herve Chabanne
Efficient Secret Sharing Schemes
114(8)
Chunli Lv
Xiaoqi Jia
Jingqiang Lin
Jiwu Jing
Lijun Tian
Mingli Sun
Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion
122(8)
Lu Leng
Jiashu Zhang
Gao Chen
Muhammad Khurram Khan
Ping Bai
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications
130(9)
Cheonshik Kim
Dongkyoo Shin
Dongil Shin
Xinpeng Zhang
An Ontology Based Information Security Requirements Engineering Framework
139(8)
Azeddine Chikh
Muhammad Abulaish
Syed Irfan Nabi
Khaled Alghathbar
Simulating Malicious Users in a Software Reputation System
147(10)
Anton Borg
Martin Boldt
Bengt Carlsson
Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks
157(7)
Jongsung Kim
Jong Hyuk Park
Young-Gon Kim
The Method of Database Server Detection and Investigation in the Enterprise Environment
164(8)
Namheun Son
Keun-gi Lee
Sang Jun Jeon
Hyunji Chung
Sangjin Lee
Changhoon Lee
Sensitive Privacy Data Acquisition in the iPhone for Digital Forensic Analysis
172(15)
Jinhyung Jung
Chorong Jeong
Keunduk Byun
Sangjin Lee
STA2011 - Data Management Track
An Efficient Processing Scheme for Continuous Queries Involving RFID and Sensor Data Streams
187(6)
Jeongwoo Park
Kwangjae Lee
Wooseok Ryu
Joonho Kwon
Bonghee Hong
Smart Warehouse Modeling Using Re-recording Methodology with Sensor Tag
193(8)
Gwangsoo Lee
Wooseok Ryu
Bonghee Hong
Joonho Kwon
SIMOnt: A Security Information Management Ontology Framework
201(8)
Muhammad Abulaish
Syed Irfan Nabi
Khaled Alghathbar
Azeddine Chikh
Using Bloom Filters for Mining Top-k Frequent Itemsets in Data Streams
209(8)
Younghee Kim
Kyungsoo Cho
Jaeyeol Yoon
Ieejoon Kim
Ungmo Kim
An RSN Tool: A Test Dataset Generator for Evaluating RFID Middleware
217(8)
Wooseok Ryu
Joonho Kwon
Bonghee Hong
Design and Implementation of a Virtual Reader for Emulation of RFID Physical Reader
225(6)
Jiwan Lee
Jekwan Park
Wooseok Ryu
Bonghee Hong
Joonho Kwon
Adaptive Optimal Global Resource Scheduling for a Cloud-Based Virtualized Resource Pool
231(10)
Lingli Deng
Qing Yu
Jin Peng
Maximal Cliques Generating Algorithm for Spatial Co-location Pattern Mining
241(10)
Seung Kwan Kim
Younghee Kim
Ungmo Kim
Author Index 251