By Topic

Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on

Date 13-14 Sept. 2010

Filter Results

Displaying Results 1 - 25 of 29
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1239 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (9 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (282 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (107 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - vi
    Save to Project icon | Request Permissions | PDF file iconPDF (136 KB)  
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2010 , Page(s): vii - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB)  
    Freely Available from IEEE
  • k-NN Numeric Prediction Using Bagging and Instance-relevant Combination

    Publication Year: 2010 , Page(s): 3 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (323 KB) |  | HTML iconHTML  

    The fixed number of reference neighbors leads to mutable prediction errors and low overall accuracy for various unknown instances, according to existing k-NN methods. To address this problem, a bagging-based k-NN numeric prediction algorithm with attribute selection is proposed. Within each training procedure, a set of base k-NN predictors are built iteratively in terms of different bootstrap samp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-Enhanced Interactive Anonymization in Domain-Driven Data Mining Outsourcing

    Publication Year: 2010 , Page(s): 9 - 14
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (574 KB) |  | HTML iconHTML  

    This paper focuses on a domain-driven data mining outsourcing scenario whereby a data owner publishes data to an application service provider who returns mining results. To ensure data privacy against an un-trusted party, anonymization, a widely used technique capable of preserving true attribute values and supporting various data mining algorithms is required. Several issues emerge when anonymiza... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comprehensive Quality Evaluation System for Coordinate Transformation

    Publication Year: 2010 , Page(s): 15 - 20
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (317 KB) |  | HTML iconHTML  

    Studies on quality evaluation of coordinate transformation have not yet to comprehensively investigate the simulation ability and reliability of a transformation. This paper presents a comprehensive quality evaluation system (QES) for coordinate transformation that includes the testing of reliability and simulation ability. The proposed QES was used to test and evaluate transformations using typic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pseudonym-based RFID Discovery Service to Mitigate Unauthorized Tracking in Supply Chain Management

    Publication Year: 2010 , Page(s): 21 - 26
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (600 KB) |  | HTML iconHTML  

    Unauthorized tracking of RFID tagged assets at the system level, where an adversary tracks movement of RFID tagged assets by eavesdropping network messages or compromising date center servers, has not been well recognized in prior research. Compared to the traditional unauthorized tracking by clandestine scanning at the physical level, unauthorized tracking at the system level could be even more h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Dynamic Identity-based Broadcast Encryption Scheme

    Publication Year: 2010 , Page(s): 27 - 32
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (475 KB) |  | HTML iconHTML  

    Based on Delerablee's identity-based broadcast encryption scheme (IBBE), we propose a new efficient dynamic identity-based broadcast encryption scheme (DIBBE), and prove its security in the Random Oracle model. The proposed scheme need not to setup a max potential receivers set in advance, and it has constant size of the public key, private key and header of cipertext. We also compare the performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Provable Security Biometric Password Multi-server Authentication Scheme with Smart Card

    Publication Year: 2010 , Page(s): 33 - 38
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (201 KB) |  | HTML iconHTML  

    In this paper, a new biometric password multi-server authentication scheme with smart card is proposed. To the best knowledge of us, this is the first biometric password authentication scheme which can be used in the multi-server environment and the distributed network. This scheme combines the advantages of password and biometrics, which can strengthen the protocol's securities and has properties... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Applicability, Efficiency and Security of Non-Membership Proof

    Publication Year: 2010 , Page(s): 39 - 44
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    Two new non-membership proof protocols are proposed in this paper, which prove that a committed message is not in a finite set. They are concrete proof protocols rather than abstract principles. The first is a completely general non-membership proof suitable for any application. The second is a much more efficient non-membership proof protocol for special applications. It is simpler, more efficien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Face Based Fuzzy Vault Scheme for Secure Online Authentication

    Publication Year: 2010 , Page(s): 45 - 49
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (508 KB) |  | HTML iconHTML  

    Biometric template protection is becoming a hot research recently. Fuzzy vault is a key binding biometric cryptosystem scheme. It binds a key with the biometric template and obtains the helper data. The main problem of fuzzy vault is that it can not provide the diversity and revocability. In this paper we propose a face based fuzzy vault scheme for online authentication. At the user side, the user... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An E-payment System Based on Quantum Blind and Group Signature

    Publication Year: 2010 , Page(s): 50 - 55
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (564 KB) |  | HTML iconHTML  

    In this paper, a new E-payment system based on quantum blind and group signature is proposed. Existing E-payment systems based on classical cryptography cannot guarantee the security with the emergency of quantum computers. Compared to the existing E-payment system, our quantum E-payment scheme could protect not only the user's anonymity but also the inner structure of customer group. In addition,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Security Enhanced Remote Password Authentication Scheme Using Smart Card

    Publication Year: 2010 , Page(s): 56 - 60
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (524 KB) |  | HTML iconHTML  

    Remote user authentication is a critical component of accessing remote services in distributed applications. In this paper we investigate the security vulnerabilities of a previously proposed remote user authentication scheme. After that we propose a security enhanced remote user password authentication scheme, which effectively prevents the adversary's attacks. The proposed authentication scheme ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCT Transform Based Relational Database Robust Watermarking Algorithm

    Publication Year: 2010 , Page(s): 61 - 65
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (709 KB) |  | HTML iconHTML  

    This paper presents a relational database robust watermarking algorithm based on DCT transform, which takes the advantage of the frequency domain approach of multimedia digital watermarking into the area of relational database watermarking. By DCT transform on grouped and sorted tuples and modifying some of the transformed frequency coefficients to embed image watermark, only affecting one attribu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some Improvements on Model Checking CoreASM Models of Security Protocols

    Publication Year: 2010 , Page(s): 66 - 71
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    This paper presents a tool called ASM-SPV (Abstract State Machines-Security Protocols Verifier) for verifying security protocols by model checking. In ASM-SPV, a security protocol is modeled by CoreASM language which is an executable ASM (Abstract State Machines) language. Then a modified CoreASM engine takes the CoreASM model of the protocol to build state space on-demand. Furthermore, security p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taking the Tags with You: Digital Photograph Provenance

    Publication Year: 2010 , Page(s): 72 - 77
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (948 KB) |  | HTML iconHTML  

    Prior to digital photography, the back of the glossy photo paper served as the canvas to write the important photo details. The photos were then transferred to a series of photo albums. The general public creates too many pictures to sustain the physical photo album. One byproduct of taking digital photos is the automatic number scheme embedded in the digital device. The semantic context of any ph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Flexible Spatially Aware Access Control Model

    Publication Year: 2010 , Page(s): 78 - 83
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (567 KB) |  | HTML iconHTML  

    Currently the Location Based Services (LBS) tend to be more large-scale, distribute and open, which brings up new challenges to the design of spatially aware access control models. Nowadays location based access control models encounter difficulties in both the flexibility of expression, and the scalability and efficiency of the policy management. To address these challenges, in this paper we prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability

    Publication Year: 2010 , Page(s): 84 - 89
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (577 KB) |  | HTML iconHTML  

    Many cloud storage providers declare that they store multiple replicas of clients' data in order to prevent data loss. However, currently there is no guarantee that they actually spend storage for multiple replicas. Recently a multiple-replica provable data possession (MR-PDP) protocol is proposed, which provides clients with the ability to check whether multiple replicas are really stored at the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improve Music Teaching Quality throughout Using Information Technology

    Publication Year: 2010 , Page(s): 90 - 94
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (223 KB) |  | HTML iconHTML  

    This study focuses on the question whether IT-assisted can improve music teaching quality. To answer this question, we design two questionnaires, for music teachers and students, respectively, and a music achievement test for students who accepted students' questionnaires. We use qualitative and quantitative methods to analyze the answers to the questionnaires and results of the music achievement ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of MIMO Relaying Channels' Cooperative Diversity for Mobile Networks

    Publication Year: 2010 , Page(s): 95 - 99
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (695 KB) |  | HTML iconHTML  

    Relay networks achieve high performance by utilizing cooperation between nodes which can classified as multi-hop networks and cooperative MIMO relaying networks. Cooperative diversity is a transmission technique to overcome fading, multipath and inter-channel interference. As an important part of "spatial diversity" systems, cooperative diversity involving multi hop data relays is a solution to im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Transactional Data Management over the Cloud

    Publication Year: 2010 , Page(s): 100 - 106
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    We propose a consistency model for a data store in the Cloud and develop a framework towards the goal of deploying Database as a Service over the Cloud. This includes consistency across the data partitions and consistency of any replicas that exist across different nodes in the system. We target applications which need stronger consistency guarantees than the applications currently supported by th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model for Evaluating Technological Innovation Ability in E-commerce Based on Information Entropy and Unascertained Measure

    Publication Year: 2010 , Page(s): 107 - 110
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (306 KB) |  | HTML iconHTML  

    In E-commerce, technological innovation capability assessment is an important management tool. As the complexity of the process of technological innovation capability which leads how to measure technological innovation has no uniform standard. Considering the complexity of technological innovation capability and some shortcomings of the current evaluation methods this paper designs an evaluation i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.