2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery

10-12 Oct. 2013

Filter Results

Displaying Results 1 - 25 of 96
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2001 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2013, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (191 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Steering Committee Chair

    Publication Year: 2013, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2013, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (126 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2013, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2013, Page(s):xviii - xxv
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2013, Page(s):xxvi - xxx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB)

    These keynote speeches discuss the following: Big Data - The Next Phase; Big Data Requires a New Platform for a New Era of Analytics: The Way to Win with Data, Apps and Analytics; Data Integrity, Privacy and Trust Issues in Hadoop; Big Data Mining on Weibo from a Macro, Micro and Content Perspective; Next Generation Intelligent Phone: Hope or Hype?; Learning Social Kernel Communities and Behaviors... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Homomorphic ElGamal Variant Based on BGN's Method

    Publication Year: 2013, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    Homomorphic encryption has numerous applications, which can directly calculate on encrypted data. In this paper, a simple variant of ElGamal is presented which supports arbitrary additions and one multiplication, similarly to the cryptosystem of Boneh, Goh, and Nissim (BGN). The construction adopts a bilinear pairing map to meet the multiplicative homomorphism. A confirmatory example is given to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Querying Encrypted Data for Database as a Service

    Publication Year: 2013, Page(s):14 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Using database encryption to protect data in some situations where access control is not solely enough is inevitable. Database encryption provides an additional layer of protection to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data keeps protected even in the incident that databas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymous Multi-receiver Certificate-Based Encryption

    Publication Year: 2013, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    In a multi-receiver encryption environment, a sender can randomly choose a set of authorized receivers while distributing messages to them efficiently and securely. Recently, more and more researchers concern the privacy of receivers. They mentioned that an authorized receiver does not want other entities, except the service provider, to be able to derive her/his identity in many applications such... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems

    Publication Year: 2013, Page(s):27 - 30
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    An approach to improve the security of cyber physical systems (CPS) through Intelligent Checkers (IC) is presented. ICs are designed to be behaviorally and structurally independent of the cyber-portion of a CPS and hence not subject to cyber attacks. An IC monitors the status of a physical process and raises an alarm when process measurements violate predefined constraints. A strict one-way commun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Wireless Multicast for Delay-Sensitive Prioritized Data Using Network Coding

    Publication Year: 2013, Page(s):38 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    Secure data multicast in wireless networks is challenging due to cyber-attacked vulnerabilities and high data loss of the wireless channels. Additionally, the receivers may have different characteristics (e.g., different memories, processing capabilities, etc.), thus, to be efficient, it is desirable to transmit a commensurate data to each receiver, depending on its need. The current approaches th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Mechanism for the Interactive Satellite Remote Education System Based on DTN

    Publication Year: 2013, Page(s):46 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Compared with the original system that has unidirectional broadcasting characteristics, the interactive satellite remote education system which based on DTN greatly improved. However, in the special application environment of the satellite remote education system, the traditional Internet security mechanism can't meet the DTN security needs. In order to ensure the reliability and safety of the inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Trusted Mobile RFID Network Framework

    Publication Year: 2013, Page(s):53 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (739 KB) | HTML iconHTML

    Although the mobile RFID system has various applications in Internet of Things(IoT), it has a limited communication range and raises some serious privacy and security problems. To improve the issuers above, we propose a new mobile RFID network framework based on security and privacy protection. In the framework, we design a Reader Network using ad hoc mechanism, that readers with short communicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable Implementation of Malware Detection Based on Network Connection Behaviors

    Publication Year: 2013, Page(s):59 - 66
    Cited by:  Papers (3)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    When hundreds of thousands of applications need to be analyzed within a short period of time, existing static and dynamic malware detection methods may become less desirable because they could quickly exhaust system and human resources. Additionally, many behavioral malware detection methods may not be practical because they require the collection of applications' system-level and network-level ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Security Ontology with MDA for Software Development

    Publication Year: 2013, Page(s):67 - 74
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    It is found that current ontologies for security often emphasize the security concerns and concepts without their involvement in each of stages of a software development process. This means that the security concerns and concepts will not be actually considered throughout the development process. This leads a lack of approaches to involving security concerns and concepts throughout the development... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly Detection via One Class SVM for Protection of SCADA Systems

    Publication Year: 2013, Page(s):82 - 88
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Funded by European Framework-7 (FP7), the CockpicCI project aims at developing intelligent risk detection, analysis and protection techniques for Critical Infrastructures (CI). In this paper, we describes our recent research on automated anomaly detection from central Supervisory Control and Data Acquisition (SCADA) systems and their related commands/measurements in the SCADA-field equipment commu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems

    Publication Year: 2013, Page(s):89 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (587 KB) | HTML iconHTML

    In this paper we present methods of protecting RFID tags users' privacy. Based on well-known technique by Juels et al. called Blocker tag we introduce a set of methods for increasing security using a device called Hedgehog blocker. Hedgehog blocker copes with the problem of the additional information gained by the adversary through measuring signal power (i.e. learning the number of transmitting t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network Analysis

    Publication Year: 2013, Page(s):97 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    Social network analysis (SNA) is increasingly attracting attentions from both academia and industrial areas. While revealing interesting properties and inferences from social network data is important, the protection of sensitive information of individuals is at the meanwhile a serious concern. In this paper, we study privacy preservation in interactive SNA settings, where the access to data is re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of Data Mining to an Asynchronous Argumentation Based Learning Assistance Platform

    Publication Year: 2013, Page(s):105 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Structured argumentation support environments have been built and used in scientific discourse in the literature. These environments emphasized either on exchanging information or on constructing arguments for presentation. In this work, an intelligent online asynchronous argumentation platform that detects whether the learners address the expected discussion issues is proposed. After each learner... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-Aware Automatic Virtual Machine Scaling in Fine Granularity for Cloud Applications

    Publication Year: 2013, Page(s):109 - 116
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    It is a tendency for enterprises to deploy their applications on Infrastructure as a Service (IaaS) platforms. Many latest IaaS service providers offer Virtual Machine (VM) instances with various capacities and prices by the minute. In this paper, based on the observation that the workload of nowaday applications fluctuates frequently, we propose a cost-aware automatic VM scaling method of fine gr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.