Muutke küpsiste eelistusi

E-raamat: Proceedings of the International Conference on IT Convergence and Security 2011

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 221,68 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.

Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits:

1.      Introduction of the most recent information technology and its related ideas

2.      Applications and problems related to technology convergence, and its case studies

3.      Introduction of converging existing security techniques through convergence security

Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.
Part I Security Fundamentals
1 A Secure Service Framework for Handling Security Critical Data on the Public Cloud
3(10)
Gi-Hwan Cho
Seung-Ah Lee
2 The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' Motivation
13(8)
Hun Choi
Yoo-Jung Choi
Ki-Mun Kim
3 Towards Understanding Deterrence: Information Security Managers' Perspective
21(20)
Sangseo Park
Anthonie B. Ruighaver
Sean B. Maynard
Atif Ahmad
Part II Industrial and Business Information Security
4 Design of Attribute-Based Access Control in Cloud Computing Environment
41(10)
Byung Rae Cha
Jae Hyun Seo
Jong Won Kim
5 Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting
51(18)
Andre van Cleeff
Trajce Dimkov
Wolter Pieters
Roel Wieringa
6 Controlling Decryption of Personal Health Records in the Cloud
69(12)
Yi-Chang Hsu
Jing-Jang Hwang
7 Access Control Mechanism for XML Document
81(10)
Sun-Moon Jo
Kyung-Yong Chung
8 A Collaborative Intrusion Detection System Framework for Cloud Computing
91(20)
Nguyen Doan Man
Eui-Nam Huh
9 Criteria for Comparing Cyberwarfare Capability
111(12)
Hyung-Jun Seo
Yoon-Cheol Choy
Part III Security Protocols and Applications
10 A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor
123(6)
Hyochang Ahn
Yong-Hwan Lee
Han-Jin Cho
Sang-Burm Rhee
June-Hwan Lee
11 Semantic Search and Retrieval System for Learning Objects
129(16)
M. Arshad Awan
A. Sattar
Cheong Ghil Kim
Chung Pyo Hong
Shin Dug Kim
12 Wear Leveling for PCM Using Hot Data Identification
145(6)
Inhwan Choi
Dongkun Shin
13 Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine
151(12)
Byung Ki Kim
Jae Hyeok Jang
Kyung Woo Hur
Jeong Gun Lee
Young Woong Ko
14 HARD: Host-Level Address Remapping Driver for Solid-State Disk
163(6)
Young-Joon Jang
Dongkun Shin
15 Ubiquitous Based Personalized Hypertension Monitoring System
169(10)
Jonghun Kim
Sihoon Ahn
Jaeyoung Soh
Daesung Lee
Kyung-Yong Chung
16 Customized IPTV Content Recommendation Service Model Based on Personal Preference
179(12)
Si-Jung Kim
Do-Eun Cho
Bong-Han Kim
17 A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread
191(14)
Yeong-Gyu Lim
Cheong Ghil Kim
Shin Dug Kim
18 Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform Environment
205(12)
Nam-Kyung Lee
Hyun-Woo Lee
Won Ryu
19 Aspect Oriented Software Development Using Requirement Engineering
217(6)
Seung-Hyung Lee
Young-Jae Song
20 A Review of Accelerometer-Based Physical Activity Measurement
223(16)
Yao Meng
Hee-Cheol Kim
21 A Group Data Synchronization Protocol in Mobile Environments
239(14)
Ju-Geon Pak
Kee-Hyun Park
22 Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics
253(14)
Kee-Hyun Park
Ju-Geon Pak
Part IV Convergence Security
23 A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications
267(14)
In-Pyo Cho
So-Hyang Ko
Hoon-Mo Yang
Cheong-Ghil Kim
Shin-Dug Kim
24 An Efficient Live Stream Community Management Scheme for the Mobile
281(14)
Chung-Pyo Hong
Muhammad Arshad Awan
Cheong-Ghil Kim
Shin-Dug Kim
25 Development of Real-Time Gesture Recognition System Using Visual Interaction
295(12)
Sung-Kwan Kang
Kyung-Yong Chung
Kee-Wook Rim
Jung-Hyun Lee
26 Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata
307(10)
Abdul Raouf Khan
27 Simulation of 3D Information Visualization
317(8)
Gui-Jung Kim
Jung-Soo Han
28 Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks
325(6)
Kyu Chul Kim
Chan Jung Park
Ronny Yongho Kim
29 Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System
331(6)
Sung-Ho Kim
30 Augmented Reality-Based Role-Playing Contents for Education
337(8)
Sukhyun Lim
Hyung-Keun Jee
Jinyoung Youn
Junsuk Lee
31 Vertex Propagation for Fast Ray-Casting of Digital Elevation Model
345(12)
Eun-Seok Lee
Jin-Hee Lee
Inwoo Jo
Byeong-Seok Shin
32 A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization
357(10)
Kyuho Lee
Seongjin Ahn
33 Image Registration for Sub-Pixel Using Pyramid Edge Images
367(6)
Jae-Young Lee
Kee-Baek Kim
Seok-Han Lee
Tae-Eun Kim
Jong-Soo Choi
34 Real-Time Camera Tracking Using Planar Object Detection
373(6)
Ahr-Hyun Lee
Seok-Han Lee
Jae-Young Lee
Tae-Eun Kim
Jong-Soo Choi
35 Bidirectional Propagation Method for Analysis of Reflection on Radio Networks
379(10)
Reza Malekian
Abdul Hanan Abdullah
36 Robust Estimation of Heights of Moving People Using a Single Camera
389(20)
Sang-Wook Park
Tae-Eun Kim
Jong-Soo Choi
Part V IT Convergence Applications
37 Goal-Heuristic Analysis Method for an Adaptive Process Mining
409(10)
Su-Jin Baek
Jong-Won Ko
Gui-Jung Kim
Jung-Soo Han
Young-Jae Song
38 Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario
419(6)
Su-Jin Baek
Jung-Soo Han
Young-Jae Song
39 An Effective Learning Method in Art Using Virtual Reality and Ontology
425(10)
Sang-Jin Cha
Gahee Kim
Chol-Hee Jang
Geun-Sik Jo
40 Development of Pain Prescription Decision Systems for Nursing Intervention
435(10)
Yoo Hyun
Ho-Il Jung
Kyung-Yong Chung
41 Performance Sensibility Influence of Recommended Makeup Styles
445(10)
Kyung-Yong Chung
Kee-Wook Rim
Jung-Hyun Lee
42 Affective Social Network
455(8)
Hyun-Jun Kim
43 A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker
463(6)
Sung-Ho Sim
Young-Jae Song
44 Discovering Knowledge Flow in Social Network
469(10)
Hyun-Jun Kim
45 Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification
479(10)
Jong-Won Ko
Su-Jin Beak
Young-Jae Song
46 Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification
489(6)
Jong-Won Ko
Jung-Soo Han
Young-Jae Song
47 Improved Performance of Emotion Extraction Through Banned Words
495(12)
Eunsoon You
Seung-Bo Park
48 Potential Emotion Word in Movie Dialog
507(10)
Seung-Bo Park
Eunsoon You
Jason J. Jung
49 Story Modeling for Green Light Decision Making
517(6)
Seung-Bo Park
Eunsoon You
50 Reducing the Gap of Provided Services and Requires Services Based on Service Approach
523(16)
Hamid Mcheick
Mohamad Dbouk
Fady Dagher
51 An Extended XML Compression Technique for XML Element Retrieval
539(18)
Tanakorn Wichaiwong
Chuleerat Jaruskulchai
Part VI Mobile Computing and Future Networks
52 Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System
557(4)
Sunhoe Kim
53 Types of Fuel Cells and Applications for Electricity and Heat Co-Generation
561(6)
Sunhoe Kim
54 Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment
567(8)
Yoon-Sik Yoo
Wan-Ki Park
H. Woo Lee
Part VII Multimedia and Information Visualization
55 Malware Detection Techniques Using Artificial Immune System
575(14)
Mohamed Ahmed Mohamed Ali
Mohd Aizaini Maarof
56 A Survey on P2P Botnet Detection
589(6)
Kyoung-Soo Han
Eul Gyu Im
57 A Study on Instruction Substitution Analysis of Metamorphic Malware
595(6)
Kyoung-Soo Han
Kyoung-Yong Chung
Eul Gyu Im
58 An Analysis of Malware Attached in Spam
601(6)
Eul Gyu Im
Kyoung-Soo Han
59 Detection Methods for Malware Variant Using API Call Related Graphs
607(6)
Kyoung-Soo Han
In-Kyoung Kim
Eul Gyu Im
60 Malware Classification Methods Using API Sequence Characteristics
613(16)
Kyoung-Soo Han
In-Kyoung Kim
Eul Gyu Im
Part VIII Web Technology and Software Engineering
61 Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization
629
Ui-Hyong Kim
Jung-Min Kang
Jae-Sung Lee
Hyong-Shik Kim
Kuinam, J, Kim is a professor and chairman of the Department of Convergence Security at Kyoung-gi University(KGU) in Kyoung-gi, Korea. He is also President of the Center for Industry Security supported by Ministry of Knowledge and Economy, Korea. His current fields of specialization are internet-based computing models, computer and networks forensics, infrastructure security, software security, multimedia security, and scientific and technical information. He has received several technical and publishing awards, and rewards including Minister of Knowledge Economy Commendation (Industry Technology Security) and Minister of Public Administration and Security Commendation (Digital Forensic).