Online Social Networks (OSNs) have become one of the most popular implement for interacting with people all over the world and sharing data withthem. these data sometimes may be a co-owned data which involves multipl...
详细信息
ISBN:
(纸本)9789897583599
Online Social Networks (OSNs) have become one of the most popular implement for interacting with people all over the world and sharing data withthem. these data sometimes may be a co-owned data which involves multiple users, sharing co-owned data can cause privacy violation if co-owners are not happy withthe owner's sharing privacy settings. To tackle privacy issues on co-owned data, collaborative privacy management has become a popular research area in recent years. In this work, we provide a fuzzy logic decision based collaborative privacy management framework for OSNs. We use data sensitivity value and confidence value in targeted group as input variables of fuzzy system. We also use trust values between users since our framework needs to calculate trust loss and gains for reputation value.
Due to the complexity and variability of lighting conditions, weather conditions, and the location relationship between vehicles and cameras, the license plate detection in complex scenes has an important application ...
详细信息
ISBN:
(数字)9781728186214
ISBN:
(纸本)9781728186221
Due to the complexity and variability of lighting conditions, weather conditions, and the location relationship between vehicles and cameras, the license plate detection in complex scenes has an important application value. In this paper, based on the full analysis of the edge features of license plate area in complex scenes, a new fusion image preprocessing method using edge features is proposed, and the rectangular box similar to license plate area is taken as the candidate box. the experimental results show that the accuracy of the location of license plate area under different conditions reaches 98.31%. Based on the result of coarse location, we propose a Bayesian classifier to realize accurate location of vehicle license plate. this classifier makes full use of the high efficiency of Bayesian method to process low dimensional data and the credibility of probability calculation distribution. the model in different conditions on achieved 91.59% precision. the results of comparison with other classifiers show that the method in this paper is very robust to license plate detection in complex scenarios.
the Internet of things (IoT) devices access and process large amounts of data. Some of them are sensitive and can become a target for security attacks. As a consequence, it is crucial being able to trace data and to i...
详细信息
ISBN:
(纸本)9789897583599
the Internet of things (IoT) devices access and process large amounts of data. Some of them are sensitive and can become a target for security attacks. As a consequence, it is crucial being able to trace data and to identify their paths. We start from the specification language IOT-LYSA, and propose a Control Flow Analysis for statically predicting possible trajectories of data communicated in an IoT system and, consequently, for checking whether sensitive data can pass through possibly dangerous nodes. Paths are also interesting from an architectural point of view for deciding which are the points where data are collected, processed, communicated and stored and which are the suitable security mechanisms for guaranteeing a reliable transport from the raw data collected by the sensors to the aggregation nodes and to servers that decide actuations.
this paper presents a methodology for the evaluation of network services security and the security of protection products. this type of evaluation is an important activity, considering the ever-increasing number of se...
详细信息
ISBN:
(纸本)9789897583599
this paper presents a methodology for the evaluation of network services security and the security of protection products. this type of evaluation is an important activity, considering the ever-increasing number of security incidents in networks. those evaluations can present different challenges with a variety of properties to verify and an even larger number of tools available to compose and orchestrate together. the chosen approach in the paper is to simulate scenarios to perform traffic generation containing both benign and malicious actions against services and security products, that can be used separately or conjointly in attack simulations. We use our recently proposed method to generate evaluation data. this methodology highlights the preparation efforts from the evaluator to choose an appropriate data generating function and make topology choices. the paper presents the case and discusses the experimental results of an evaluation of a network-based IDS, with only benign traffic, only malicious traffic, and mixed traffic.
According to the overall goal of rule the society by law, combined with specific requirements such as the records of the entire process of law enforcement in the three systems, the information such as law enforcement ...
详细信息
ISBN:
(数字)9781728143231
ISBN:
(纸本)9781728143231;9781728143224
According to the overall goal of rule the society by law, combined with specific requirements such as the records of the entire process of law enforcement in the three systems, the information such as law enforcement evidence plays a key supporting role. When design a law enforcement case handling information system, it is necessary to fully consider the collection, generation, storage, and transmission of law enforcement information how to ensure that the information is safe and reliable and not tampered. "Let law enforcement data runs on the blockchain" which use blockchain, big data and other related technologies to store and transmit information such as law enforcement evidence securely, and comprehensively improve the effectiveness and security of law enforcement data.
the General data Protection Regulation (GDPR) caused several new legal requirements software systems in Europe have to comply to. Support for these requirements given by proprietary software systems is limited. Here, ...
详细信息
ISBN:
(纸本)9789897583599
the General data Protection Regulation (GDPR) caused several new legal requirements software systems in Europe have to comply to. Support for these requirements given by proprietary software systems is limited. Here, an integrative approach of combining software development with GDPR-specific demands is necessary. In this paper, we outline such an approach on the level of software source code. We illustrate how to annotate data in complex software systems and how to use such annotations for task like data visualization, data exchange standardization, and GDPR-specific consent and purpose management systems. thereby, we outline a research agenda for subsequent efforts in aligning software development and GDPR requirements.
Online transportation networks are currently a popular choice of transportation. the customer is an online transportation network that uses a mobile application and uses a digital wallet of the online transportation n...
详细信息
ISBN:
(纸本)9781728170718
Online transportation networks are currently a popular choice of transportation. the customer is an online transportation network that uses a mobile application and uses a digital wallet of the online transportation network to deposit money into the customer's account as a balance for payment when ordering transportation. the online transportation network is a part of shared economy practice by using mobile applications. this is the quantitative research, and there is a questionnaire to the 336 students, and get the 251 students for valid data. the research question for this article is this: Are students kept safe and comforted by online transportation networks? Will students pay withthe digital wallet (to be cashless) for better security and convenience? this research concludes that students can adequately use the sharing economy's technology as well as on an online transportation network equipped with digital wallets, and they get higher value from online transportation network.
the proceedings contain 99 papers. the topics discussed include: verification of security measures for smart substations based on visualized simulation;establishment and application of sand prediction model based on M...
the proceedings contain 99 papers. the topics discussed include: verification of security measures for smart substations based on visualized simulation;establishment and application of sand prediction model based on Monte Carlo method in offshore oil-gas field;vacancy trapping mechanism of multiple hydrogen/helium atoms in Fcc-Fe: a first-principles study;stochastic dispatching of wind power considering errors of power prediction;fault location of power communication network based on dichotomy search algorithm;research on prediction model of cable line cost based on least square support vector machine;study on the treatment materials of urban rail transit water-containing caves;international rare earth supply and demand forecast based on panel data analysis;construction and application practice of early warning model for investment progress of electricity grid construction;sensory descriptive analysis of green tea: correlation with chemical components;and measuring China's energy and power development based on mathematical models.
Blockchain was known by Satoshi Nakamoto in 2008 because of Bitcoin. After more than a decade of development, blockchain has been widely used in medical, digital finance, and electronic evidence, etc. Consensus algori...
详细信息
ISBN:
(纸本)9781728143231;9781728143224
Blockchain was known by Satoshi Nakamoto in 2008 because of Bitcoin. After more than a decade of development, blockchain has been widely used in medical, digital finance, and electronic evidence, etc. Consensus algorithm is the core part of blockchain and has become the bottleneck of blockchain performance. At present, there are dozens of different consensus algorithms for different application context, such as Proof of Work (PoW), Proof of Stake (PoS), Delegate Proof of Stake (DPoS), Proof of Reputation (PoR), etc. But in Public blockchains, their performance, security and stability are difficult to support a large project. this paper introduces an improved consensus algorithm named Delegated Proof of Stake with node's behavior and Borda Count (DPoSB) which based on the node behavior monitoring in DPoS and Borda count voting. the node's behavior of generating blocks is used as a reference index for node elections, and it will increase the difficulty for nodes that have bad behavior. then, combined withthe Borda Count to elect nodes that is more in line withthe other nodes' wishes. So, the elected nodes are more secure and fairer, thereby ensuring the stability of the system and the interests of blockchain nodes. Finally, the feasibility and correctness of the consensus algorithm is proved by simulation experiments of the blockchain system.
Online social networks (OSNs) are currently a popular platform for social interactions among people. Usually, OSN users upload various contents including personal information on their profiles. the ability to infer us...
详细信息
ISBN:
(纸本)9789897583599
Online social networks (OSNs) are currently a popular platform for social interactions among people. Usually, OSN users upload various contents including personal information on their profiles. the ability to infer users' hidden information or information that has not been even uploaded (i.e. private/sensitive information) by an unauthorised agent is commonly known as attribute inference problem. In this paper, we propose 3LP+, a privacy-preserving technique, to protect users' sensitive information leakage. We apply 3LP+ on a synthetically generated OSN data set and demonstrate the superiority of 3LP+ over an existing privacy-preserving technique.
暂无评论