,

Proceedings of the International Conference on IT Convergence and Security 2011

Specificaties
Paperback, 642 blz. | Engels
Springer Netherlands | 2012e druk, 2014
ISBN13: 9789400798632
Rubricering
Springer Netherlands 2012e druk, 2014 9789400798632
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.

Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits:

1.      Introduction of the most recent information technology and its related ideas

2.      Applications and problems related to technology convergence, and its case studies

3.      Introduction of converging existing security techniques through convergence security

Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.

Specificaties

ISBN13:9789400798632
Taal:Engels
Bindwijze:paperback
Aantal pagina's:642
Uitgever:Springer Netherlands
Druk:2012

Inhoudsopgave

<p>Part 1. Security Fundamentals</p><p>A Secure Service Framework for handling Security Critical Data on the Public Cloud; Gi-Hwan Cho</p><p>The Understanding of Building Trust Model on Smartphone Application: Focusing on Users’ Motivation; Hun Choi</p><p>Towards Understanding Deterrence: Information Security Managers’ Perspective;  Sangseo Park</p><p> </p><p>Part 2. Industrial &amp; Business Information Security</p><p>Idea Sketch to Attribute-Based Access Control in Cloud Computing Environment;  ByungRae Cha</p><p>Realizing Security Requirements with Physical Properties; André  van Cleeff</p><p>Controlling Decryption of Personal Health Records in the Cloud; Yi-Chang Hsu</p><p>Access Control Mechanism for XML Document; Sun-Moon Jo</p><p>A Collaborative Intrusion Detection System Framework for Cloud Computing; Doan Nguyen Man</p><p>Criteria for Comparing Nations Cyberwar Capability; Hyung-Jun Seo</p><p> </p><p>Part 3. Security Protocols and Applications</p><p>A RSSI-based approach for Localization of Wireless Sensor Network in Indoor; Hyochang Ahn</p><p>Semantic Search and Retrieval System for Learning Objects; Arshad Awan</p><p>Wear Leveling for PCM Using Hot Data Identification; Inhwan Choi</p><p>Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine; Jae Hyeok Jang</p><p>HARD: Host-Level Address Remapping Driver for Solid-State Disk; Young-Joon Jang</p><p>Ubiquitous based Personalized Hypertension Monitoring System; Jonghun Kim</p><p>Customized IPTV Content Recommendation Service Model Based On Personal Preference; Si-Jung Kim</p><p>A Study on the Touch Processes of Android Smartphone on Froyo and Gingerbread; Yeong-Gyu Lim</p><p>Case Study of QoS-assured Convergence Service Overlay in Open Service Platform Environment; Nam-Kyung Lee</p><p>Aspect Oriented Software Development using Requirement Engineering; Seung-Hyung Lee</p><p>Accelerometer-based Physical Activity Measurement; Yao Meng</p><p>A Group Data Synchronization Protocol in Mobile Environments; Ju-Geon Pak</p><p>Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics; Kee-Hyun Park</p><p> </p><p>Part 4. Convergence Security                                      </p><p>A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications; In-Pyo Cho</p><p>An Efficient Live Stream Community Management Scheme for the Mobile Environment; Chung-Pyo Hong</p><p>Unclogging the libjpeg performance bottleneck: a stream-parallel DCT retro-fitted with sequential legacy code; Jingun Hong</p><p>Development of Real-time Gesture Recognition System using Visual Interaction; Sung Kwan Kang</p><p>Architecture of Image Encryption hardware using Two dimensional Cellular Automata; Abdul Raouf Khan</p><p>Simulation of 3D Information Visualization; Gui-Jung Kim</p><p>Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks; Kyu Chul Kim</p><p>Development of Real-time Location-based Multimedia Style Slop Information Retrieval System; Sung-Ho Kim</p><p>Augmented Reality-Based Role-Playing Contents for Education; Sukhyun Lim</p><p>Vertex Propagation for Fast Ray-casting of Digital Elevation Model; Eun-Seok Lee</p><p>A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization; Kyuho Lee</p><p>Image Registration for Sub-Pixel Using Pyramid Edge Images; Jae-Young Lee</p><p>Real-time Camera Tracking Using Planar Object Detection; Ahr-Hyun Lee</p><p>Performance Analysis of Routing Methods over Mobile IPv6 Networks; Reza Malekian</p><p>Robust Estimation of Heights of Moving People using a Single Camera; Sang-Wook Park</p> <p><p>Part 5. IT Convergence Applications</p><p>Goal-Heuristic analysis Method for an Adaptive Process Mining; Sujin Baek</p><p>Security Threat modeling and Requirement Analysis Method based on Goal-Scenario; Sujin Baek</p><p>An Effective Learning Method in Art Using Virtual Reality and Ontology; Sang-Jin Cha</p><p>Development of Pain Prescription Decision Systems for Nursing Intervention; Kyung Yong Chung</p><p>Performance Sensibility Influence of Recommended Makeup Styles; Kyung Yong Chung</p><p>Affective Social Network; Hyun-Jun Kim</p><p>A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker; Sung-Ho Sim</p><p>Discovering Knowledge Flow in Social Network; Hyun-Jun Kim</p><p>Model Optimization with Graph Transformation and PSO algorithm for Model Transformation Verification; Jong-Won Ko</p><p>Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification; Jong-Won Ko</p><p>Improved Performance of Emotion Extraction through Banned words; Seung-Bo Park</p><p>Potential Emotion Word in Movie Dialog; Seung-Bo Park</p><p>Story Modeling for Green Light Decision Making; Seung-Bo Park</p><p>Developing Service-Oriented Computing Model; Hamid S. Mcheick</p><p>An Extended XML Compression Technique for XML Element Retrieval; Tanakorn Wichaiwong</p><p> </p><p>Part 6. Mobile Computing and Future Networks</p><p>Standby Power Control System based on User’s Location for Energy Saving in Smart Home; Kyoung-Mi Im</p><p>Context-Aware Architecture for Improvement of Energy efficiency and Growth Promotion of Plants; Hyungsun Kim</p><p>Energy Saving of Plant Cultivation System using LED Control System based on Ultrasonic Sensor; Hyungsun Kim</p><p>Improvement of Energy Efficiency in Plant Factories through the Measurement of Plant Bioelectrical Potential; Sookyoun Kwon</p><p>Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System; Sunhoe Kim</p><p>Types of Fuel Cells and Applications for Electricity and Heat Co-Generation; Sunhoe Kim</p><p>Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment; Yoon-Sik Yoo</p><p> </p><p>Part 7. Multimedia and Information Visualization</p><p>Malware Detection Techniques using Artificial Immune; Mohamed Ahmed Mohamed Ali</p><p>A Survey on P2P Botnet Detection; Kyoung-Soo Han</p><p>A Study on Instruction Substitution Analysis of Metamorphic Malware; Kyoung-Soo Han</p><p>An Analysis of Malware Attached in Spam; Kyoung-Soo Han</p><p>Detection Methods for Malware Variant using API Call Related Graphs; Kyoung-Soo Han</p><p>Malware Classification Methods using API Sequence Characteristics; Kyoung-Soo Han</p><p> </p><p>Part 8. Web Technology and Software Engineering</p><p>Practical Firewall Policy Inspection using Anomaly Detection and Its Visualization; Jung-Min Kang</p>

Rubrieken

    Personen

      Trefwoorden

        Proceedings of the International Conference on IT Convergence and Security 2011