2010 2nd International Conference on E-business and Information System Security

22-23 May 2010

Filter Results

Displaying Results 1 - 25 of 179
  • [Title page]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Program Comittee

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):i - viii
    Request permission for commercial reuse | |PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2010, Page(s):i - iii
    Request permission for commercial reuse | |PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Design of a Software Watermarking Algorithm Based on Register Allocation

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (248 KB) | HTML iconHTML

    A novel software watermarking algorithm SCC (Selected Color Change) based on register allocation is proposed in this paper. The intermediate code when the program is compiled can be used to construct the interfere graph G (V, E). Each vertex in this interfere graph is corresponding with the binary sequence of watermarking message in turns. Then the watermarking is embedded by changing the colors o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coupled Chaotic Tent Map Lattices System with Uniform Distribution

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (394 KB) | HTML iconHTML

    A coupled chaotic map lattices system with uniform distribution (CML-UD) consisting of tent maps is presented based on the security from the viewpoint of cryptography. The system inherited the coupled diffusion and parallel iteration mechanism of coupled map lattices (CML). Through the dual non-linear effect of the rolled-out and folded-over of local lattices tent map and modular algorithms, CML-U... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gait Recognition Using Fuzzy Principal Component Analysis

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (271 KB) | HTML iconHTML

    Gait recognition is a relatively new biometric identification technology for human identification, surveillance and other applications. A novel gait recognition algorithm based on fuzzy principal component analysis (FPCA) for gait energy image(GEI) is proposed. Firstly, the original gait sequence is preprocessed and gait energy image is obtained. Secondly, the eigenvalues and eigenvectors are extr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intrusion Detection Approach Based on System Call Sequences and Rules Extraction

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (254 KB) | HTML iconHTML

    Intrusion detection systems protect normal users and system resources from information security threats. Anomaly detection is an approach of intrusion detection that constructs models of normal behavior of users or systems and detects the behaviors that deviate from the model. Monitoring the sequences of system calls generated during the execution of privileged programs has been known to be an eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group-Oriented Anti-Collusion Fingerprint Based on BIBD Code

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (248 KB) | HTML iconHTML

    Digital fingerprinting is a technique for identifying unauthorized copy and tracing back to its user. The distributor marks each individual copy with a unique fingerprint. At present, the fingerprinting scheme generally has many difficulties and disadvantages for large-size users. To solve these problems, this paper presents a new fingerprint code which is composed of an outer RS (Reed-Solomon) co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation and Selection of Distributors Based on Artificial Neural Network

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (461 KB) | HTML iconHTML

    Evaluation and selection of distributors is one of the most important choices that a manufacturer will make new market development. Sales performance and marketing strategy implementation will be directly affected by the result of decision. This paper introduces a computer-aided decision support tool for qualifying potential distributors. Based on fast moving consumer goods, this tool, developed a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Capacity Information Hiding Algorithm in Color Image

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (612 KB) | HTML iconHTML

    One of the important objectives of information hiding research is that secret information is embed as much as possible without the perception of the carrier is affected. A hiding information algorithm of adaptive multiple plane-bit based on space domain in color image is proposed, which has low computing complexity and high capacity of information hiding. The main idea of this algorithm is to judg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Logistics Distribution Simulation Based on System Dynamics

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (247 KB) | HTML iconHTML

    The logistics distribution's costs account for the proportion of the total cost of logistics is the highest, and its rationalization will bring tremendous business benefits. This paper uses system dynamics theory, Firstly, conduct the system boundaries analysis and causality analysis, build out of the system dynamics model and the equations , which will be closer to reality; then combines the case... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Preserving Segment-Ellipse Intersect-Determination Protocol

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (295 KB)

    Privacy-Preserving Computational Geometry is a kind of special secure multi-party computation problem. As a special privacy-preserving computational geometry problem, Privacy- Path Determination may be applied in many fields such as military field and commerce field. In this paper, a privacy-preserving line-ellipse position relation determination protocol is developed and based on this protocol, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Product Feature Usability through Web Mining

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (287 KB) | HTML iconHTML

    As technology advances, it becomes more feasible to develop products with many features, each of which individually might be perceived as useful. But after products are used for a certain period, consumers may not think so and have many complaints about some product features with a low level of usability. In order to make product feature design achieve much consumer satisfaction, correlating the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Honeyclients to Detect Malicious Websites

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (237 KB) | HTML iconHTML

    Using malicious sites to launch attacks against client user applications is a growing threat in recent years. This led to emergence of new technologies to counter and detect this type of client-side attacks. One of these technologies is honeyclient. Honeyclients crawl the Internet to find and identify web servers that exploit client-side vulnerabilities. In this paper, we address honeyclients by s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Flexible Extension of WSDL to Describe Non-Functional Attributes

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (225 KB) | HTML iconHTML

    Internet of Things (IOT) connects visible physical things to information network and extends the network data source from edge servers to visible physical objects, and Web service (WS) can play a role of real thing's representation in information system. In order to describe a complete object, its service must contain both functional and non-functional information, because they are important attri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Improved Support Vector Machines in Intrusion Detection

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (243 KB) | HTML iconHTML

    Intrusion detection system is of most importance to network security. Support Vector Machine (SVM) is algorithm about how to solve machine learning problems under circumstance of small sample. The paper respectively applies SVM based on least square and least-square SVM improved by greedy algorithm to intrusion detection, and does simulation experiment on intrusions detection data. Experiment resu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (247 KB) | HTML iconHTML

    The propagation model of P2P worms can reflect the worm behaviors and identify weakness in the worm propagation which gives guidelines to worm detection and defense. To improve the security of P2P network, a mathematical model is proposed which combines dynamic quarantine and P2P churn. The SIQRW model departs from previous P2P worm models in that considering the dynamic quarantine methods and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Efficient Analysis of Informative Advertising Strategy in E-Commerce Platforms

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1057 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind Estimation of Pseudo Random Sequence of DS-CDMA Signals with ICA Method

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (466 KB) | HTML iconHTML

    The estimation of pseudo random sequence is of great importance of the security in DS-CDMA system, which remains a hot research topic in reconnaissance and supervision of wireless communication. In DS-CDMA system, the information sequences of different users are independent and the pseudo random sequences are none correlation, thus Independent Component Analysis (ICA) technology can be adopted to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determinants of Customer Purchase Intention in Electronic Service

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (236 KB) | HTML iconHTML

    Compared to traditional service, the characteristics of the customer behavior in electronic service are personalized demand, convenient consumed circumstance and perceptual consumer behavior. Therefore, customer behavior is an important factor to facilitate online electronic service. The purpose of this study is to explore the key success factors affecting customer purchase intention of electronic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.