While prior works on enclosure approach, guarantees the space utilization of a single geometrical area, mostly rectangle, this paper proposes a flexible enclosure tree layout method for partitioning various polygonal ...
详细信息
Context-aware applications often consist of a middleware and a collection of services, which run autonomously adaptive to the changing environments, where a variety of sensors are installed in physical facilities, wit...
详细信息
Context-aware applications often consist of a middleware and a collection of services, which run autonomously adaptive to the changing environments, where a variety of sensors are installed in physical facilities, with end-users moving around. Testing such context-aware applications is challenging due to the complex interactions among the components, especially for the complicated environment modeling. This paper extends a bigraphical sorting predicate logic as constraints to create a meta-model, builds a data model based on the bigraphical meta-model, and proposes to use the sorted bigraphical reaction system (BRS) to model the context-aware environments. Tracing the interactions between the BRS model and the middleware model generates the test cases to verify the interactions between the context-aware environments and the middleware together with the domain services. To decrease the number of test cases, this paper proposes a bigraphical pattern flow testing strategy. An example airport is demonstrated to show fault detection capabilities and reductions of test cases.
With the popular use of service-oriented technologies, Database as a Service(DaaS) paradigm is becoming a more practical and useful model for those enterprises who can't afford the expensive DBMS products. However...
详细信息
With the popular use of service-oriented technologies, Database as a Service(DaaS) paradigm is becoming a more practical and useful model for those enterprises who can't afford the expensive DBMS products. However, access control management by the database service provider(DSP) in this paradigm is challenged because the DSP may be untrusted for the delegated data contents. So it is important to design an access control mechanism which can couple with the delegated encrypted database to efficiently improve the usability of the system and help to prevent theft of sensitive and critical data. In this paper, we present a novel approach to implement flexible access control enforcement management by designing a DSP re-encryption mechanism. Our approach not only can implement the selective authorization on the encrypted data, but also can relieve the client users from the complex key derivation procedure. The underlying idea of our approach is that the DSP uses different re-encryption keys for users of the system to implement flexible access control enforcement management under the DSP re-encryption mechanism. We demonstrate the efficiency and security of our flexible access control enforcement management, in the end we analyze and resolve the possible attacks and information disclosure.
With the development of technology and the proliferation of mobile computing devices, people's need for pervasive computing is rapidly growing. As a critical part of pervasive computing, Location Based Service (LB...
详细信息
Most of Information Technology and Information Systems courses teach students about possible invasion of privacy as a result of poor information system security, not about privacy as an essential principle in informat...
详细信息
ISBN:
(纸本)9781450325479
Most of Information Technology and Information Systems courses teach students about possible invasion of privacy as a result of poor information system security, not about privacy as an essential principle in information systems. Moreover, students must know not only policy and compliance aspects of privacy, but also technical safeguards, so they can develop or configure systems to avoid privacy violations. Laboratory exercises are crucial in understanding technical aspects of privacy. This paper describes a virtual environment we have developed for "hands-on" laboratory exercises that allow students to recognize what happens "behind the scene" when they interact with information systems. Two example modules are developed and presented. Copyright 2013 ACM.
This paper considers the community interactions in online social media (OSM) as an OSM ecosystem and addresses the problem of modeling a Web forum ecosystem into a social graph. We propose a text mining method to mode...
详细信息
For point-based image registration, transformations using radial basis functions on scattered points cause problems with topology-preservation. We propose here a topology-preserving transformation based on expansions ...
详细信息
Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative...
详细信息
Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative impacts on underlying search strategies or local maximum exist. So we propose a dynamic symbolic execution (DSE) based framework combined with a path filtering algorithm and a new heuristic path search strategy, i.e., predictive path search, to achieve faster coverage-driven testing with lower testing cost. The empirical experiments (three open source projects and two industrial projects) show that our approach is effective and efficient. For the open source projects w.r.t branch coverage, our approach in average reduces 25.5% generated test cases and 36.3% solved constraints than the traditional DSE-based approach without path filtering. And the presented heuristic strategy, on the same testing budget, improves the branch coverage by 26.4% and 35.4% than some novel search strategies adopted in KLEE and CREST.
In this paper we report on an empirical study into the use of software metrics as a way of estimating the difficulty of code comprehension tasks. Our results indicate that software metrics can provide useful informati...
详细信息
CAPTCHA is now a standard security technology for differentiating between computers and humans, and the most widely deployed schemes are text-based. While many text schemes have been broken, hollow CAPTCHAs have emerg...
详细信息
暂无评论