the threat landscape continues to evolve, with increasingly complex attacks directed at the corporate network to achieve malicious goals. enterprise networks build their first line of defense with firewalls and virtua...
详细信息
ISBN:
(纸本)9780769546001
the threat landscape continues to evolve, with increasingly complex attacks directed at the corporate network to achieve malicious goals. enterprise networks build their first line of defense with firewalls and virtual private network (VPN) gateways. However, this kind of defense can be easily circumvented. It is possible that an attacker may have compromised a client process and gain privilege of the client computer. Even though we have corporate-wide access control, the access control approach is currently insufficient to stop these malicious processes. To better defend enterprise network, this paper proposed a novel system that empowers the corporate networks to verify client integrity properties based on our trusted measurement architecture. When the critical system configuration is changed, the trusted platform module (TPM) attestation mechanism is called to inform security agent about the trusted measurement values. Once the verification process fails, the client will be excluded from the network and notification to a super security agent will be sent. the system performance is also illustrated in this paper.
In order to meet the current demand for IT professionals, this paper presents the reform idea of 2C+E (Core professional knowledge, Core professional ability, Engineering environment) training system withthe goal of ...
详细信息
ISBN:
(纸本)9780769546001
In order to meet the current demand for IT professionals, this paper presents the reform idea of 2C+E (Core professional knowledge, Core professional ability, Engineering environment) training system withthe goal of training ideal professionals. the idea needs students to master core professional knowledge, to train core professional ability in the university, and to enhance their capability of engineering practice in the environment of university-enterprise cooperation. We have successfully applied reform measures of training engineering professionals in real situations and demonstrated a training scheme of university-enterprise cooperation. the result of the reform has played a significant role in training engineering professionals of computer major in our university.
the proceedings contain 27 papers. the topics discussed include: an ontology-based semantics for the motivation extension to ArchiMate;enterprise architecture for addressing business transformation challenges: the cas...
ISBN:
(纸本)9780769544250
the proceedings contain 27 papers. the topics discussed include: an ontology-based semantics for the motivation extension to ArchiMate;enterprise architecture for addressing business transformation challenges: the case of embedded mobile provisioning process in the telecommunications industry;modeling the supply and demand of architectural information on enterprise level;an engine-independent framework for business rules development;project alignment: a configurable model and tool for managing critical shared processes in collaborative projects;using the IT capability maturity framework to improve IT capability and value creation: an Intel IT case study;OpenID and the enterprise: a model-based analysis of single sign-on authentication;declarative business artifact centric modeling of decision and knowledge intensive business processes;and comparing information models in XML-based e-business standards - a quantitative analysis.
the proceedings contain 50 papers. the topics discussed include: modeling contextual concerns in enterprise architecture;does enterprise architecture form the ground for group decisions in egovernment program? qualita...
ISBN:
(纸本)9780769544267
the proceedings contain 50 papers. the topics discussed include: modeling contextual concerns in enterprise architecture;does enterprise architecture form the ground for group decisions in egovernment program? qualitative study of the Finnish national project for IT in social services;metadata categories for supporting concurrent engineering;flexible deviation handling during software process enactment;introducing security access control policies into legacy business processes;orthographic service modeling;towards a unified conceptual framework for service-oriented computing;looking for a software wizard for architectural definitions of information systems;process model of DSM solution development and evolution for small and medium-sized software companies;on the restriction to numeric indicators in performance measurement systems;and a conceptual model based on the fuzzy set theory to measure and evaluate the performance of service processes.
Information technology applications and systems are essential to businesses and enterprises as they implement business components of the enterprise. In some cases, IT is the business, such as with financial services. ...
详细信息
Keyword Search Over Relational Databases(KSORD) has been widely studied in recent years. However, existing KSORD methods are usually based on schema graph or data graph and they are actually tuple-level methods. that ...
详细信息
ISBN:
(纸本)9780769546001
Keyword Search Over Relational Databases(KSORD) has been widely studied in recent years. However, existing KSORD methods are usually based on schema graph or data graph and they are actually tuple-level methods. that is, the retrieved objects are direct tuple-level relational data, and the retrieval results are tuple-connected trees which are difficult to be understood by end-users. there are still much work to do to further improve the effectiveness and efficiency of existing KSORD methods. the essential cause is that an entity is usually divided into some parts stored in different tables due to normalized relational database design. In fact, the relational data model is storage-oriented rather than end-user-oriented. therefore, a novel method called object-level Keyword Search Over Relational Databases(OKSORD) is proposed in this paper. In OKSORD method, relational data are modeled as an objectlevel data graph, in which each node may consist of several tuples to present the complete information of an entity. there are two key issues in OKSORD method, one is object-level data modeling for relational databases, the other is object-level searching and ranking based on object-level data graph. this paper mainly addresses the first issues. the main contributions are as follows. Firstly, the concept of OKSORD is introduced for the first time. Secondly, an algorithm for classifying relation schemas is proposed to partition relations into four categories: primary relations, secondary relations, linked relations and coding relations. Finally, an object-level data model for relational data is defined and the algorithm for generating corresponding object-level data graph is proposed.
As open data formats are becoming popular amongst Web developers, this gives rise to an increase in the creation and consumption of structured data. Data creators are easily linking diverse datasets which is creating ...
详细信息
ISBN:
(纸本)9780769546001
As open data formats are becoming popular amongst Web developers, this gives rise to an increase in the creation and consumption of structured data. Data creators are easily linking diverse datasets which is creating a graph of interlinked data called the Web of Data. this increase in linked structured data demands mechanisms to ensure that access is controlled and granted to only those who are eligible to consume the data. However, although there is a lot of work done related to access control on the Web, this cannot be applied directly to structured data due to the different nature of how the data is formatted. Moreover, not much has been done to create fine-grained access control mechanisms for the Web of Data. In this paper we therefore present our access control framework that consists of a light-weight vocabulary for defining fine-grained privacy preferences for structured data and a privacy preference manager which allows users to (1) create privacy preferences based on our vocabulary and (2) restrict access to their data to third-party users.
this paper presents a saliency inspired visual attention technique for maritime scenes. the main focus is on finding regions in images which there is a high likelihood of a maritime object being present. Experimentati...
详细信息
In this paper, we introduce objects detection optical sensors (CCD sensor: Charge Coupled Device). For autonomous robot, the location of around-object is very important because robot should avoid it for driving. In th...
详细信息
暂无评论