Devices installed in end-user's homes but controlled by network operators can be the basis for advanced distributed commercial applications. Virtual machines on these devices can be used to efficiently deploy and ...
详细信息
ISBN:
(纸本)9783642154782
Devices installed in end-user's homes but controlled by network operators can be the basis for advanced distributed commercial applications. Virtual machines on these devices can be used to efficiently deploy and manage such applications provided by various competing entities. This paper discusses some security and privacy requirements of such distributed commercial applications and proposes two different approaches to root security and privacy in hardware-based attestation of nodes and virtual machines.
Datasets that follow imbalanced class distribution impose a critical challenge to the machine learning research community. Standard machine learning approaches assume that datasets have a balanced class distribution a...
详细信息
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not ...
详细信息
ISBN:
(纸本)9789811001352;9789811001338
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on untrusted server. The access control mechanism can restrict users from unauthorized access, but in cloud environment access control policies are more flexible. However, an attacker can gather sensitive information for a malicious purpose by abusing the privileges as another user and so database security is compromised. The other problems associated with the DBaaS are to manage role hierarchy and secure session management for query transaction in the database. In this paper, a role-based access control for the multitenant database with role hierarchy is proposed. The query is granted with least access privileges, and a session key is used for session management. The proposed work protects data from privilege escalation and SQL injection. It uses the partial homomorphic encryption (Paillier Encryption) for the encrypting the sensitive data. If a query is to perform any operation on sensitive data, then extra permissions are required for accessing sensitive data. Data confidentiality and integrity are achieved using the role-based access control with partial homomorphic encryption.
For better development and good space planning, it is required to understand the recent changes that have occurred in the surrounding environment. The Change Detection method is usually deployed for this. The underlyi...
详细信息
ISBN:
(纸本)9789811007552;9789811007545
For better development and good space planning, it is required to understand the recent changes that have occurred in the surrounding environment. The Change Detection method is usually deployed for this. The underlying research study did the same for Nanded city. The criterion used was to understand land use and land cover change variables as a token of change detection. The results helped us to understand urban spreading out that took place in the time zones 1973-1992 and 1992-2014. Our approach was using Remote Sensing technology. Landsat images as MSS, TM, and LC were collected and their analysis was carried out. This paper can work as a role model for GIS-based LU/LC change detection of any city in India.
With changing scenario, technology as well as communication has also changed. To improve telecommunication various techniques and trends are used and same can be seen in antenna designing. Distinctive antenna planning...
详细信息
Healthcare services save the life of human beings by making timely effective decisions. The use of data mining tools is crucial for decision making, forecasting, and disease prediction. In this study, data mining algo...
详细信息
Underwater surveillance is a new emerging technology as a promising field of research in recent years. The potential applications include marine investigation, ocean exploration etc. This paper discusses the developme...
详细信息
an $n \times n$ parallel all-optical reservoir computing system model based on a semiconductor laser is proposed, which can process n-channel signals at the same time, thus expanding the signal processing capacity of ...
详细信息
The advances in communication frameworks, such as Skype and Google Talk facilitate the increasing needs of communication-intensive and collaborative applications. These communication frameworks also make it possible f...
详细信息
ISBN:
(纸本)9780889867765
The advances in communication frameworks, such as Skype and Google Talk facilitate the increasing needs of communication-intensive and collaborative applications. These communication frameworks also make it possible for end-users to be more involved in the development of such applications if the appropriate level of abstraction can be provided. In this paper, we propose the design of a user-centric communication middleware (UCM) that supports raising the level of abstraction appropriate for end-users to create and realize models using the communication virtual machine (CVM) technology. The CVM technology consists of the communication modeling language (CML) and CVM, and supports the rapid conception, construction and realization of new communication services using a model-driven approach. The UCM is a layer in CVM that provides operating simplicity to the end-user by masking the underlying technology. We present the design goals of UCM, high-level architecture, a description of the runtime environment and a case study showing how the communication needs of a medical scenario is realized in the UCM.
The aim of the project is to compare the performance of four different machine learning algorithms for breast cancer prediction such as decision tree, logistic regression, XG boost, and CAT boost. We used a dataset of...
详细信息
暂无评论