Algorithms and Architectures for Parallel Processing ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings

Saved in:
Bibliographic Details
Main Authors IEEE International Conference on Algorithms and Architectures for Parallel Processing, Wang, Guojun (Computer scientist), Zomaya, Albert Y., Martinez Pérez, Gregorio, Li, Kenli
Format eBook Book
LanguageEnglish
Published Cham Springer Nature 2015
Springer
Springer International Publishing AG
Edition1
Subjects
Online AccessGet full text

Cover

Loading…
Table of Contents:
  • 3 The Detailed Procedure of LIP3 -- 3.1 Preliminary LIP3 that Satisfy the Level-I Privacy -- 3.2 Enhanced LIP3 Satisfying Level-II Privacy -- 3.3 The Advantage of LIP3 over EWPM -- 4 Preliminary Performance Analysis -- 4.1 Security Analysis -- 4.2 Complexity Analysis -- 5 Conclusion -- Acknowledgments -- References -- Context-Aware QoS Assurance for Smart Grid Big Data Processing with Elastic Cloud Resource Reconfiguration -- 1 Introduction -- 2 Background and Scenario -- 3 Virtual Machine Migration -- 4 VM Migration Mechanism -- 5 Conclusion -- References -- Continuous User Identity Verification for Trusted Operators in Control Rooms -- Abstract -- 1 Introduction -- 2 Multi-modal Biometric Continuous Authentication -- 3 Our Approach to Continuous Authentication -- 3.1 The Protocol -- 3.2 Internals: The Trust Level Computation -- 4 The Prototype -- 4.1 Hardware Prototype -- 4.2 Software Design -- 4.3 Enabling Technologies -- 4.4 Availability, Security, Privacy and Performance -- 4.5 Usability -- 5 Explanatory Results -- 6 Conclusions -- References -- Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Anonymous IBBE -- 2.2 Security Model -- 3 Our Construction -- 3.1 New Works -- 3.2 Efficiency -- 4 Security Analysis -- 5 Conclusion -- Acknowledgments -- References -- Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical Machines -- 1 Introduction -- 2 The Cost Analysis of Virtual Machine Migration -- 2.1 The Cost Function -- 2.2 The Optimal Time of Virtual Machine Migration -- 3 The Predicting Model and Algorithm Implementation -- 3.1 The Predicting Model -- 3.2 The Algorithm Implementation -- 4 Evaluation -- 4.1 Experimental Scenario -- 4.2 Results Analysis -- 5 Related Work -- 6 Conclusion -- References
  • 1 Introduction -- 2 Motivations -- 3 Pre-filter Design -- 4 Experiments -- 5 Conclusion -- References -- A Hybrid Optimization Approach for Anonymizing Transactional Data -- 1 Introduction -- 2 Preliminarties -- 2.1 Graph Model -- 2.2 Utility Metrics -- 3 Achieving Anonymity Through Hybrid Anonymization -- 3.1 Generating a Graph of Association Rules -- 3.2 Grouping Based Association Rules -- 4 Algorithm Description -- 5 Experimental Study -- 5.1 Experimental Framework -- 5.2 Experimental Results -- 6 Conclusion -- References -- Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption -- 1 Introduction -- 2 Preliminaries -- 3 Dual-State Encryptions and Re-encryption Function -- 4 Obfuscator of Unidirectional One-hop Re-encryption Function -- 4.1 The Algorithm for One-hop Re-encryption Function -- 4.2 Analysis -- 5 Conclusion -- References -- Predicting Severity of Software Vulnerability Based on Grey System Theory -- Abstract -- 1 Introduction -- 2 Grey System Theory -- 2.1 GM(1,1) Model -- 2.2 Improvement of GM(1,1) -- 3 Experiment and Analysis -- 3.1 Data Source and Evaluation Metric -- 3.2 Result and Analysis -- 4 Conclusion and Future Directions -- References -- Characterization of Android Applications with Root Exploit by Using Static Feature Analysis -- 1 Introduction -- 2 Background -- 2.1 Processes of Root Exploit -- 2.2 Security Threat of Root Exploit -- 3 Experimental Dataset -- 4 Method -- 5 Implementation and Experimental Result -- 5.1 Implementation -- 5.2 Individual Feature Comparison -- 5.3 Feature Combination Generation -- 6 Related Work -- 7 Conclusion -- References -- LIP3: A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in Proximity -- Abstract -- 1 Introduction -- 2 LIP3 System Model -- 2.1 System Architecture of LIP3 -- 2.2 Adversary Models
  • Intro -- Welcome Message from the ICA3PP 2015 General Chairs -- Welcome Message from the ICA3PP 2015 Program Chairs -- Welcome Message from the ICA3PP 2015 Workshop Chairs -- Welcome Message from the TrustData 2015 Program Chairs -- Welcome Message from the TSP 2015 Program Chairs -- Welcome Message from the NOPE 2015 Program Chair -- Welcome Message from SCS 2015 Program Chairs -- Welcome Message from the SPPCN 2015 Program Chairs -- Welcome Message from the DependSys 2015 Program Chairs -- Organization -- TrustData 2015 Organizing and Program Committees -- TSP 2015 Organizing and Program Committees -- NOPE 2015 Organizing and Program Committees -- SCS 2015 Organizing and Program Committees -- SPPCN 2015 Organizing and Program Committees -- DependSys 2015 Organizing and Program Committees -- Contents -- The 6th International Workshop on Trust, Security and Privacy for Big Data(TrustData 2015) -- Nth-Order Multifunction Filter Employing Current Differencing Transconductance Amplifiers -- Abstract -- 1 Introduction -- 2 The Proposed Circuit -- 3 Analysis of Non-Ideal Characteristics -- 4 Simulation Results -- 5 Conclusion -- Acknowledgments -- References -- An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network -- Abstract -- 1 Introduction -- 2 Network Model and Problem Definition -- 3 The SQPDSN Algorithm -- 3.1 Centralized Initialization -- 3.2 Query Dissemination and Result Back -- 4 Performance Evaluation -- 5 Conclusion and Future Work -- References -- An Improved Method for Reversible Data Hiding in Encrypted Image -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 The Selection of the Image Block -- 3.2 Procedures of the Proposed Method -- 4 Experimental Results -- 4.1 Evaluation of the Proposed Method -- 4.2 Comparisons of Performances -- 5 Conclusions -- Acknowledgments
  • Towards Mechanised Semantics of HPC: The BSP with Subgroup Synchronisation Case
  • 3.3 RA3. Awareness and Response to Anomalous Data Activities -- 3.4 RA4. Resiliency and Recovery of Data -- 4 Opportunities for Cloud Security: A Technology Platform with Multiple Applications -- 5 Concluding Remarks -- References -- VSEP: A Distributed Algorithm for Graph Edge Partitioning -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Solution -- 4.1 Motivation -- 4.2 Vertex Swap -- 4.3 Balanced Partitions -- 5 Experiments -- 5.1 Metrics and Datasets -- 5.2 Comparisons with the State-of-the-Art Algorithm -- 6 Conclusion -- References -- Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture -- Abstract -- 1 Introduction -- 2 Background and Related Works -- 3 Stochastic Tasks Scheduling Problem -- 3.1 Application Model -- 3.2 Platform Model -- 3.3 Scheduling Objective -- 4 Stochastic Tasks Scheduling Algrothm -- 4.1 Scheduling Attributes -- 4.2 Tasks Prioritizing Phase -- 4.3 Processor Selection Phase -- 5 Performance Evaluation -- 5.1 Randomly Generated Application Graphs -- 5.2 Performance Metrics -- 5.3 Results Discussion -- 6 Conclusion -- References -- An Output-Oriented Approach of Test Data Generation Based on Genetic Algorithm -- Abstract -- 1 Introduction -- 2 Output-Oriented Functional Testing -- 2.1 Problem Formulation -- 2.2 Evaluation of Test Data -- 2.3 Design of Match Function -- 3 Test Data Generation Based on Genetic Algorithm -- 3.1 Process of Genetic Algorithm -- 3.2 Design of Representation -- 3.3 Design of Fitness Function -- 3.4 Design of Other Operator -- 4 Simulation Experiment -- 4.1 Test Objects -- 4.2 Performance Indicators -- 4.3 Results Analysis -- 5 Conclusion -- References -- The 5th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-15) -- An Efficient Pre-filter to Accelerate Regular Expression Matching
  • References -- Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 System Models -- 3.1 Road Networks Model -- 3.2 Query Model -- 3.3 Location Privacy System Structure -- 3.4 Attack Model -- 4 Algorithm Design -- 4.1 Related Definitions -- 4.2 Prediction-Based Grouping Algorithm -- 4.2.1 Markov Prediction Analysis [12] -- 4.2.2 PL Algorithm -- 5 Simulation Experiments and Analysis -- 5.1 Parameters Setting -- 5.2 Algorithm Evaluation Target -- 5.3 Analysis of Experiment Results -- 6 Conclusions -- Acknowledgments -- References -- A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups -- 1 Introduction -- 2 Preliminaries -- 2.1 Composite Order Bilinear Groups -- 2.2 Complexity Assumptions -- 2.3 Dual System Encryption and Dual System Signature -- 3 Overview of Hierarchical Identity-Based Signature Scheme -- 3.1 Definitions -- 3.2 Security Model -- 4 Our HIBS Scheme -- 4.1 The Construction -- 4.2 Security Proofs -- 5 Performance -- 6 Conclusion -- References -- STRATUS: Towards Returning Data Control to Cloud Users -- 1 Rising Cyber Security Incidents: The Case for User Data Control -- 1.1 Lack of Ability Stemming from Lack of Data Control -- 1.2 Everyday Scenarios Demonstrating Users' Lack of Data Control -- 2 Elements of User Data Control and Related Work -- 2.1 Element 1: Transparency and Auditability of Data Activities -- 2.2 Element 2: Protection of Privacy of Data During Processing and Storing -- 2.3 Element 3: Immediate Detection and Revocation of Malicious Actions -- 2.4 Element 4: Resiliency and Rapid Recovery from Untoward Events -- 3 Proposed Methodology -- 3.1 RA1: Transparency and Auditability of Data Activities in Clouds -- 3.2 RA2: Protection of Privacy of Data During Processing and Storing