the proceedings contain 37 papers. the topics discussed include: most driven control;privacy access control model for aggregated e-health services;automated middleware QoS configuration techniques using model transfor...
ISBN:
(纸本)9780769533384
the proceedings contain 37 papers. the topics discussed include: most driven control;privacy access control model for aggregated e-health services;automated middleware QoS configuration techniques using model transformations;service level management in global enterprise services: from QoS monitoring and diagnostics to adaptation, a case study;metadata support for transactional Web services;Web services interfaces and open standards integration into the European UNICORE 6 grid middleware;usage tracking components for service-oriented middleware systems;alignment of authentication information for trust federation;an economy driven resource allocation middleware for grid workflow;towards a privacy policy enforcement middleware with location intelligence;and network-centric middleware for service oriented architectures across heterogeneous embedded systems.
the significance of privacy and security in online social networks is to protect sensitive information, prevent unauthorized access, and build trust among users while ensuring a secure online environment. this paper p...
详细信息
ISBN:
(数字)9798331595104
ISBN:
(纸本)9798331595111
the significance of privacy and security in online social networks is to protect sensitive information, prevent unauthorized access, and build trust among users while ensuring a secure online environment. this paper proposes a friendship matching system based on the Parlier encryption algorithm, aiming at addressing existing privacy breaches and data misuse issues on current friendship platforms, significantly improving matching accuracy. First, filter the data items that users care about more in the database so as to make the appropriate friends. then, according to the homomorphic encryption of paillier algorithm, in the case of ciphertext, the weight of each data item is calculated to the selected users. Finally, the Euclidean distance is used to calculate the similarity between users and select the appropriate dating users. Experimental results demonstrate that the proposed system exhibits strong performance and feasibility in preserving user privacy and data security.
the proceedings contain 51 papers. the special focus in this conference is on three broad areas of Computer Science viz., distributedcomputing, Internet Technologies, and Societal Applications. the topics include: Pr...
ISBN:
(纸本)9783319149769
the proceedings contain 51 papers. the special focus in this conference is on three broad areas of Computer Science viz., distributedcomputing, Internet Technologies, and Societal Applications. the topics include: Privacy and security challenges in internet of things;fusing sensors for occupancy sensing in smart buildings;discrete control-based design of adaptive and autonomic computing systems;efficient algorithms and data structures for accurate transcriptomics;gathering asynchronous swarm robots under nonuniform limited visibility;path planning algorithm for mobile anchor in connected sensor networks;on-the-fly symmetry reduction of explicitly represented probabilistic models;time and cost aware checkpointing of choreographed web services;financial risk management in e-commerce using executable business process modeling notation;a hybrid model for dynamic composition and execution of heterogeneous web services;application of soft computing technique for web service selection;weighted load balanced adaptive gateway discovery in integrated internet MANET;improving activity prediction and activity scheduling in smart home networks for enhanced QoS;computationally secure cheating identifiable multi-secret sharing for general access structure;a centrality measure based approach for network anonymization;a Chinese remainder theorem based key management algorithm for hierarchical wireless sensor network;an evolutionary computation based classification model for network intrusion detection;a cryptosystem for blind computing on encrypted character strings;a secure image hashing technique for forgery detection;design and development of secure cloud architecture for sensor services and genetic algorithm framework for Bi-objective task scheduling in cloud computing systems.
the proceedings contain 28 papers. the special focus in this conference is on Internet and distributedcomputing Systems. the topics include: Towards Island Networks: SDN-Enabled Virtual Private Networks with Peer-to-...
ISBN:
(纸本)9783030027377
the proceedings contain 28 papers. the special focus in this conference is on Internet and distributedcomputing Systems. the topics include: Towards Island Networks: SDN-Enabled Virtual Private Networks with Peer-to-Peer Overlay Links for Edge computing;almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys;path Planning for Multi-robot Systems in Intelligent Warehouse;dynamic Framework for Reconfiguring computing Resources in the Inter-cloud and Its Application to Genome Analysis Workflows;game-theoretic Approach to Self-stabilizing Minimal Independent Dominating Sets;towards Social Signal Separation Based on Reconstruction Independent Component Analysis;Performance, Resilience, and Security in Moving Data from the Fog to the Cloud: the DYNAMO Transfer Framework Approach;development of a Support System to Resolve Network Troubles by Mobile Robots;a Benchmark Model for the Creation of Compute Instance Performance Footprints;towards the Succinct Representation of m Out of n;developing Agent-Based Smart Objects for IoT Edge computing: Mobile Crowdsensing Use Case;path Planning of Robotic Fish in Unknown Environment with Improved Reinforcement Learning Algorithm;review of Swarm Intelligence Algorithms for Multi-objective Flowshop Scheduling;exploiting Long Distance Connections to Strengthen Network Robustness;an Online Adaptive Sampling Rate Learning Framework for Sensor-Based Human Activity Recognition;a Secure Video-Based Robust and Aesthetic 2D Barcode;a Migratable Container-Based Replication Management for Inter-cloud;Dilated Deep Residual Network for Post-processing in TPG Based Image Coding;underground Intelligent Logistic System Integrated with Internet of things;extending the Advisor Concept to Deal with Known-Ahead Transportation Tasks;a Framework for Task-Guided Virtual Machine Live Migration.
暂无评论