Ebook: Multidisciplinary Research and Practice for Information Systems: IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings
- Tags: Information Systems Applications (incl. Internet), Systems and Data Security, Information Storage and Retrieval, Data Encryption, e-Commerce/e-business, Business Information Systems
- Series: Lecture Notes in Computer Science 7465
- Year: 2012
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012.
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012.
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012.
Content:
Front Matter....Pages -
Ontology-Based Identification of Research Gaps and Immature Research Areas....Pages 1-16
A Context-Aware Mashup Integration Guideline for Enterprise 2.0....Pages 17-30
Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends....Pages 31-43
Validation of XML Documents with SWRL....Pages 44-57
A Taxonomy of Dirty Time-Oriented Data....Pages 58-72
Combining Relational and Semi-structured Databases for an Inquiry Application....Pages 73-84
Hunting for Aardvarks: Can Software Security Be Measured?....Pages 85-92
A Foundation for Requirements Analysis of Privacy Preserving Software....Pages 93-107
On Complexity Reduction of User Interfaces for Safety-Critical Systems....Pages 108-122
Security SLAs – An Idea Whose Time Has Come?....Pages 123-130
UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept....Pages 131-145
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking....Pages 146-160
Trust as an Organismic Trait of E-Commerce Systems....Pages 161-175
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones....Pages 176-189
Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives....Pages 190-202
Near Duplicate Document Detection for Large Information Flows....Pages 203-217
TinyStream Sensors....Pages 218-232
Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data....Pages 233-243
Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling....Pages 244-258
Indexing and Search for Fast Music Identification....Pages 259-271
Ontology-Based Retrieval of Experts – The Issue of Efficiency and Scalability within the eXtraSpec System....Pages 272-286
OrderBased Labeling Scheme for Dynamic XML Query Processing....Pages 287-301
A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages....Pages 302-316
Usage Control in Inter-organisational Collaborative Environments – A Case Study from an Industry Perspective....Pages 317-331
Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle....Pages 332-346
Similarity of Transactions for Customer Segmentation....Pages 347-359
Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues....Pages 360-374
Pay-As-You-Go Data Integration Using Functional Dependencies....Pages 375-389
Analyzing Recommender System’s Performance Fluctuations across Users....Pages 390-402
A Secure Distributed Video Surveillance System Based on Portable Devices....Pages 403-415
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel....Pages 416-429
How to Forge a Digital Alibi on Mac OS X....Pages 430-444
Security-and-Privacy-Related Issues on IT Systems During Disasters....Pages 445-459
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary Arteries....Pages 460-467
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm....Pages 468-478
Automatic Image Annotation Using Semantic Text Analysis....Pages 479-487
Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control....Pages 488-500
Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps....Pages 501-515
Mobile Malware Threats and Defenses for Homeland Security....Pages 516-524
Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies....Pages 525-533
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts....Pages 534-546
A Formal Support for Collaborative Data Sharing....Pages 547-561
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures....Pages 562-577
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation....Pages 578-592
Discussion on the Challenges and Opportunities of Cloud Forensics....Pages 593-608
Towards a Logical Framework for Reasoning about Risk....Pages 609-623
A Collaborative Approach to Botnet Protection....Pages 624-638
Consensus Building and In-operation Assurance for Service Dependability....Pages 639-653
Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping....Pages 654-668
Back Matter....Pages -
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012.
Content:
Front Matter....Pages -
Ontology-Based Identification of Research Gaps and Immature Research Areas....Pages 1-16
A Context-Aware Mashup Integration Guideline for Enterprise 2.0....Pages 17-30
Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends....Pages 31-43
Validation of XML Documents with SWRL....Pages 44-57
A Taxonomy of Dirty Time-Oriented Data....Pages 58-72
Combining Relational and Semi-structured Databases for an Inquiry Application....Pages 73-84
Hunting for Aardvarks: Can Software Security Be Measured?....Pages 85-92
A Foundation for Requirements Analysis of Privacy Preserving Software....Pages 93-107
On Complexity Reduction of User Interfaces for Safety-Critical Systems....Pages 108-122
Security SLAs – An Idea Whose Time Has Come?....Pages 123-130
UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept....Pages 131-145
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking....Pages 146-160
Trust as an Organismic Trait of E-Commerce Systems....Pages 161-175
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones....Pages 176-189
Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives....Pages 190-202
Near Duplicate Document Detection for Large Information Flows....Pages 203-217
TinyStream Sensors....Pages 218-232
Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data....Pages 233-243
Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling....Pages 244-258
Indexing and Search for Fast Music Identification....Pages 259-271
Ontology-Based Retrieval of Experts – The Issue of Efficiency and Scalability within the eXtraSpec System....Pages 272-286
OrderBased Labeling Scheme for Dynamic XML Query Processing....Pages 287-301
A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages....Pages 302-316
Usage Control in Inter-organisational Collaborative Environments – A Case Study from an Industry Perspective....Pages 317-331
Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle....Pages 332-346
Similarity of Transactions for Customer Segmentation....Pages 347-359
Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues....Pages 360-374
Pay-As-You-Go Data Integration Using Functional Dependencies....Pages 375-389
Analyzing Recommender System’s Performance Fluctuations across Users....Pages 390-402
A Secure Distributed Video Surveillance System Based on Portable Devices....Pages 403-415
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel....Pages 416-429
How to Forge a Digital Alibi on Mac OS X....Pages 430-444
Security-and-Privacy-Related Issues on IT Systems During Disasters....Pages 445-459
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary Arteries....Pages 460-467
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm....Pages 468-478
Automatic Image Annotation Using Semantic Text Analysis....Pages 479-487
Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control....Pages 488-500
Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps....Pages 501-515
Mobile Malware Threats and Defenses for Homeland Security....Pages 516-524
Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies....Pages 525-533
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts....Pages 534-546
A Formal Support for Collaborative Data Sharing....Pages 547-561
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures....Pages 562-577
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation....Pages 578-592
Discussion on the Challenges and Opportunities of Cloud Forensics....Pages 593-608
Towards a Logical Framework for Reasoning about Risk....Pages 609-623
A Collaborative Approach to Botnet Protection....Pages 624-638
Consensus Building and In-operation Assurance for Service Dependability....Pages 639-653
Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping....Pages 654-668
Back Matter....Pages -
....