About
|
Contact Us
|
Register
|
Login
Proceedings
Series
Journals
Search
EAI
ISSN:
2032-9393
Submit Article
Submission Instructions
Ethics and Malpractice Statement
Back to Journal Page
2021
Issue 30
Issue 29
Issue 28
Issue 27
2020
Issue 24
Issue 26
Issue 25
Issue 23
2019
Issue 22
Issue 21
Issue 20
Issue 19
2018
Issue 18
Issue 17
Issue 16
Issue 15
2017
Issue 14
Issue 13
Issue 12
Issue 11
2016
Issue 10
Issue 9
Issue 8
Issue 7
2015
Issue 6
Issue 5
Issue 4
Issue 3
2011
Issue 2
Issue 1
EAI Endorsed Transactions on Security and Safety
Issue 5, 2015
Editor(s)-in-Chief:
Peng Liu
Articles
Information
Trust as the Foundation of Resource Exchange in GENI
Appears in:
sesa
15
(
5
)
:
e1
Authors:
Marshall Brinn, NIcholas Bastin, Andrew Bavier, Mark Berman, Jeffrey Chase, Robert Ricci
Abstract:
Researchers and educators in computer science and other domains are increasingly turning to distributed test beds that offer access to a variety of resources, including networking, computation, storag
...
e, sensing, and actuation. The provisioning of resources from their owners to interested experiment…Researchers and educators in computer science and other domains are increasingly turning to distributed test beds that offer access to a variety of resources, including networking, computation, storage, sensing, and actuation. The provisioning of resources from their owners to interested experimenters requires establishing sufficient mutual trust between these parties. Building such trust directly between researchers and resource owners will not scale as the number of experimenters and resource owners grows. The NSF GENI (Global Environment for Network Innovation) project has focused on establishing scalable mechanisms for maintaining such trust based on common approaches for authentication, authorization and accountability. Such trust reflects the actual trust relationships and agreements among humans or real-world organizations. We describe here GENI’s approaches for federated trust based on mutually trusted authorities, and implemented via cryptographically signed credentials and shared policies. more »
more >>
Mobile Watermarking against Geometrical Distortions
Appears in:
sesa
15
(
5
)
:
e2
Authors:
Jing Zhang, Meili Zhi, Yuting Su, Qingzhong Liu
Abstract:
Mobile watermarking robust to geometrical distortions is still a great challenge. In mobile watermarking, efficient computation is necessary because mobile devices have very limited resources due to p
...
ower consumption. In this paper, we propose a low-complexity geometrically resilient watermarking a…Mobile watermarking robust to geometrical distortions is still a great challenge. In mobile watermarking, efficient computation is necessary because mobile devices have very limited resources due to power consumption. In this paper, we propose a low-complexity geometrically resilient watermarking approach based on the optimal tradeoff circular harmonic function (OTCHF) correlation filter and the minimum average correlation energy Mellin radial harmonic (MACE-MRH) correlation filter. By the rotation, translation and scale tolerance properties of the two kinds of filter, the proposed watermark detector can be robust to geometrical attacks. The embedded watermark is weighted by a perceptual mask which matches very well with the properties of the human visual system. Before correlation, a whitening process is utilized to improve watermark detection reliability. Experimental results demonstrate that the proposed watermarking approach is computationally efficient and robust to geometrical distortions. more »
more >>
An Improved MOEA/D for QoS Oriented Multimedia Multicasting with Network Coding
Appears in:
sesa
15
(
5
)
:
e3
Authors:
Zhaoyuan Wang, Huanlai Xing, Tianrui Li, Yan Yang, Rong Qu
Abstract:
Recent years witness a significant growth in multimedia applications. Among them, a stream of applications is real-time and requires one-to-many fast data transmission with stringent quality-of-servic
...
e (QoS) requirements, where multicast is an important supporting technology. In particular, with m…Recent years witness a significant growth in multimedia applications. Among them, a stream of applications is real-time and requires one-to-many fast data transmission with stringent quality-of-service (QoS) requirements, where multicast is an important supporting technology. In particular, with more and more mobile end users requesting real-time broadband multimedia applications, it is of vital importance to provide them with satisfied quality of experience. As network coding can offer higher bandwidth to users and accommodate more flows for networks than traditional routing, this paper studies the multicast routing problem with network coding and formulates it as a multi-objective optimization problem. As delay and packet loss ratio (PLR) are two important performance indicators for QoS, we consider them as the two objectives for minimization. To address the problem above, we present a multi-objective evolutionary algorithm based on decomposition (MOEA/D), where an all population updating rule is devised to address the problem of lacking feasible solutions in the search space. Experimental results demonstrate the effectiveness of the proposed algorithm and it outperforms a number of state-of-the-art algorithms. more »
more >>
Network Security Risk Assessment Based on Item Response Theory
Appears in:
sesa
15
(
5
)
:
e5
Authors:
Fangwei Li, Qing Huang, Jiang Zhu, Zhuxun Peng
Abstract:
Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in
...
network security. First of all, the novel algorithms of calculating the threat of attack and the s…Owing to the traditional risk assessment method has one-sidedness and is difficult to reflect the real network situation, a risk assessment method based on Item Response Theory (IRT) is put forward in network security. First of all, the novel algorithms of calculating the threat of attack and the successful probability of attack are proposed by the combination of IRT model and Service Security Level. Secondly, the service weight of importance is calculated by the three-demarcation analytic hierarchy process. Finally, the risk situation graph of service, host and network logic layer could be generated by the improved method. The simulation results show that this method can be more comprehensive consideration of factors which are affecting network security, and a more realistic network risk situation graph in real-time will be obtained. more »
more >>
A improved Network Security Situation Awareness Model
Appears in:
sesa
15
(
5
)
:
e4
Authors:
Li Fangwei, Zhang Xinyue, Zhu Jiang, Wang Yan
Abstract:
In order to reflect the situation of network security assessment performance fully and accurately, a new network security situation awareness model based on information fusion was proposed. Network se
...
curity situation is the result of fusion three aspects evaluation. In terms of attack, to improve t…In order to reflect the situation of network security assessment performance fully and accurately, a new network security situation awareness model based on information fusion was proposed. Network security situation is the result of fusion three aspects evaluation. In terms of attack, to improve the accuracy of evaluation, a situation assessment method of DDoS attack based on the information of data packet was proposed. In terms of vulnerability, a improved Common Vulnerability Scoring System (CVSS) was raised and maked the assessment more comprehensive. In terms of node weights, the method of calculating the combined weights and optimizing the result by Sequence Quadratic Program (SQP) algorithm which reduced the uncertainty of fusion was raised. To verify the validity and necessity of the method, a testing platform was built and used to test through evaluating 2000 DAPRA data sets. Experiments show that the method can improve the accuracy of evaluation results. more »
more >>
Scope
Growing threats and increasingly also failures due to complexity may compromise the security and resilience of network and service infrastructures. Applications and services require security of data h
...
andling and we need new security architectures and scalable and interoperable security policies for…Growing threats and increasingly also failures due to complexity may compromise the security and resilience of network and service infrastructures. Applications and services require security of data handling and we need new security architectures and scalable and interoperable security policies for this. There is a need to guarantee end-to-end security in data communications and storage, including identity management and authentication. Moreover, we need technology to enable network security monitoring and tracing and to assess the trustworthiness of infrastructures and services. It must ensure the protection of personal data and privacy and to properly assign liability and risks, together with the appropriate governance models needed to do so. Furthermore this is applied to the settings of Public Safety in general. more »
more >>
Indexing
DOAJ DBLP CrossRef EBSCO Discovery Service [OCLC Discovery Services](h… DOAJ DBLP CrossRef EBSCO Discovery Service OCLC Discovery Services Microsoft Academic EuroPub Publons MIAR UlrichsWEB Ingenta C
...
onnect Computing Database (ProQuest) Publicly Available Content Database (ProQuest) ProQuest Central™ SciTech Premium Collection (ProQuest) ProQuest Central Student™ Google Scholar more »
more >>
Editorial Board
Yao Liu (University of South Florida, USA) Kai Zeng (George Mason University, USA) Linhai Song (Penn State University, USA) Zhiguo Wan (Shangdong University, China) Issa Khalil (Qatar Computing Resear
...
ch Institute, Qatar) George Kesidis (Penn State University, USA) Amro Awad (Uni… Yao Liu (University of South Florida, USA) Kai Zeng (George Mason University, USA) Linhai Song (Penn State University, USA) Zhiguo Wan (Shangdong University, China) Issa Khalil (Qatar Computing Research Institute, Qatar) George Kesidis (Penn State University, USA) Amro Awad (University of Central Florida, USA) Eric Chan-Tin (Loyola University Chicago, USA) Karim Elish (Florida Polytechnic University, USA) Joongheon Kim (Korea University, Korea) Eugene Vasserman (Kansas State University, USA) An Wang (Case Western Reserve University, USA) Jiawei Yuan (Embry-Riddle Aeronautical University, USA) Mohammad Ashiqur Rahman (Florida International University, USA) Sachin Shetty (Old Dominion University, USA) Jeffrey Spaulding (Niagara University, USA) Zhongshu Gu (IBM, USA) Shujun Li (University of Kent, UK) Heng Zhang (Western Sydney University, Australia) Kaiqi Xiong (University of South Florida, USA) Mohamed Amine Ferrag (Guelma University, Algeria) Bo Luo (University of Kansas, USA) Zhen Huang (DePaul University, USA) Ziming Zhao, University at Buffalo, USA more »
more >>
Journal Blurb
Visit the new journal website to submit and consult our contents: https://publications.eai.eu/index.php/sesa/indexVisit the new journal website to submit and consult our contents: https://publications
...
.eai.eu/index.php/sesa/index more »
more >>
Publisher
EAI
ISSN
2032-9393
Volume
2
Published
2015-10-28