Algorithms and Architectures for Parallel Processing ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings
Saved in:
Main Authors | , , , , |
---|---|
Format | eBook Book |
Language | English |
Published |
Cham
Springer Nature
2015
Springer Springer International Publishing AG |
Edition | 1 |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Table of Contents:
- 3 The Detailed Procedure of LIP3 -- 3.1 Preliminary LIP3 that Satisfy the Level-I Privacy -- 3.2 Enhanced LIP3 Satisfying Level-II Privacy -- 3.3 The Advantage of LIP3 over EWPM -- 4 Preliminary Performance Analysis -- 4.1 Security Analysis -- 4.2 Complexity Analysis -- 5 Conclusion -- Acknowledgments -- References -- Context-Aware QoS Assurance for Smart Grid Big Data Processing with Elastic Cloud Resource Reconfiguration -- 1 Introduction -- 2 Background and Scenario -- 3 Virtual Machine Migration -- 4 VM Migration Mechanism -- 5 Conclusion -- References -- Continuous User Identity Verification for Trusted Operators in Control Rooms -- Abstract -- 1 Introduction -- 2 Multi-modal Biometric Continuous Authentication -- 3 Our Approach to Continuous Authentication -- 3.1 The Protocol -- 3.2 Internals: The Trust Level Computation -- 4 The Prototype -- 4.1 Hardware Prototype -- 4.2 Software Design -- 4.3 Enabling Technologies -- 4.4 Availability, Security, Privacy and Performance -- 4.5 Usability -- 5 Explanatory Results -- 6 Conclusions -- References -- Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Anonymous IBBE -- 2.2 Security Model -- 3 Our Construction -- 3.1 New Works -- 3.2 Efficiency -- 4 Security Analysis -- 5 Conclusion -- Acknowledgments -- References -- Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical Machines -- 1 Introduction -- 2 The Cost Analysis of Virtual Machine Migration -- 2.1 The Cost Function -- 2.2 The Optimal Time of Virtual Machine Migration -- 3 The Predicting Model and Algorithm Implementation -- 3.1 The Predicting Model -- 3.2 The Algorithm Implementation -- 4 Evaluation -- 4.1 Experimental Scenario -- 4.2 Results Analysis -- 5 Related Work -- 6 Conclusion -- References
- 1 Introduction -- 2 Motivations -- 3 Pre-filter Design -- 4 Experiments -- 5 Conclusion -- References -- A Hybrid Optimization Approach for Anonymizing Transactional Data -- 1 Introduction -- 2 Preliminarties -- 2.1 Graph Model -- 2.2 Utility Metrics -- 3 Achieving Anonymity Through Hybrid Anonymization -- 3.1 Generating a Graph of Association Rules -- 3.2 Grouping Based Association Rules -- 4 Algorithm Description -- 5 Experimental Study -- 5.1 Experimental Framework -- 5.2 Experimental Results -- 6 Conclusion -- References -- Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption -- 1 Introduction -- 2 Preliminaries -- 3 Dual-State Encryptions and Re-encryption Function -- 4 Obfuscator of Unidirectional One-hop Re-encryption Function -- 4.1 The Algorithm for One-hop Re-encryption Function -- 4.2 Analysis -- 5 Conclusion -- References -- Predicting Severity of Software Vulnerability Based on Grey System Theory -- Abstract -- 1 Introduction -- 2 Grey System Theory -- 2.1 GM(1,1) Model -- 2.2 Improvement of GM(1,1) -- 3 Experiment and Analysis -- 3.1 Data Source and Evaluation Metric -- 3.2 Result and Analysis -- 4 Conclusion and Future Directions -- References -- Characterization of Android Applications with Root Exploit by Using Static Feature Analysis -- 1 Introduction -- 2 Background -- 2.1 Processes of Root Exploit -- 2.2 Security Threat of Root Exploit -- 3 Experimental Dataset -- 4 Method -- 5 Implementation and Experimental Result -- 5.1 Implementation -- 5.2 Individual Feature Comparison -- 5.3 Feature Combination Generation -- 6 Related Work -- 7 Conclusion -- References -- LIP3: A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in Proximity -- Abstract -- 1 Introduction -- 2 LIP3 System Model -- 2.1 System Architecture of LIP3 -- 2.2 Adversary Models
- Intro -- Welcome Message from the ICA3PP 2015 General Chairs -- Welcome Message from the ICA3PP 2015 Program Chairs -- Welcome Message from the ICA3PP 2015 Workshop Chairs -- Welcome Message from the TrustData 2015 Program Chairs -- Welcome Message from the TSP 2015 Program Chairs -- Welcome Message from the NOPE 2015 Program Chair -- Welcome Message from SCS 2015 Program Chairs -- Welcome Message from the SPPCN 2015 Program Chairs -- Welcome Message from the DependSys 2015 Program Chairs -- Organization -- TrustData 2015 Organizing and Program Committees -- TSP 2015 Organizing and Program Committees -- NOPE 2015 Organizing and Program Committees -- SCS 2015 Organizing and Program Committees -- SPPCN 2015 Organizing and Program Committees -- DependSys 2015 Organizing and Program Committees -- Contents -- The 6th International Workshop on Trust, Security and Privacy for Big Data(TrustData 2015) -- Nth-Order Multifunction Filter Employing Current Differencing Transconductance Amplifiers -- Abstract -- 1 Introduction -- 2 The Proposed Circuit -- 3 Analysis of Non-Ideal Characteristics -- 4 Simulation Results -- 5 Conclusion -- Acknowledgments -- References -- An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network -- Abstract -- 1 Introduction -- 2 Network Model and Problem Definition -- 3 The SQPDSN Algorithm -- 3.1 Centralized Initialization -- 3.2 Query Dissemination and Result Back -- 4 Performance Evaluation -- 5 Conclusion and Future Work -- References -- An Improved Method for Reversible Data Hiding in Encrypted Image -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 The Selection of the Image Block -- 3.2 Procedures of the Proposed Method -- 4 Experimental Results -- 4.1 Evaluation of the Proposed Method -- 4.2 Comparisons of Performances -- 5 Conclusions -- Acknowledgments
- Towards Mechanised Semantics of HPC: The BSP with Subgroup Synchronisation Case
- 3.3 RA3. Awareness and Response to Anomalous Data Activities -- 3.4 RA4. Resiliency and Recovery of Data -- 4 Opportunities for Cloud Security: A Technology Platform with Multiple Applications -- 5 Concluding Remarks -- References -- VSEP: A Distributed Algorithm for Graph Edge Partitioning -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Solution -- 4.1 Motivation -- 4.2 Vertex Swap -- 4.3 Balanced Partitions -- 5 Experiments -- 5.1 Metrics and Datasets -- 5.2 Comparisons with the State-of-the-Art Algorithm -- 6 Conclusion -- References -- Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture -- Abstract -- 1 Introduction -- 2 Background and Related Works -- 3 Stochastic Tasks Scheduling Problem -- 3.1 Application Model -- 3.2 Platform Model -- 3.3 Scheduling Objective -- 4 Stochastic Tasks Scheduling Algrothm -- 4.1 Scheduling Attributes -- 4.2 Tasks Prioritizing Phase -- 4.3 Processor Selection Phase -- 5 Performance Evaluation -- 5.1 Randomly Generated Application Graphs -- 5.2 Performance Metrics -- 5.3 Results Discussion -- 6 Conclusion -- References -- An Output-Oriented Approach of Test Data Generation Based on Genetic Algorithm -- Abstract -- 1 Introduction -- 2 Output-Oriented Functional Testing -- 2.1 Problem Formulation -- 2.2 Evaluation of Test Data -- 2.3 Design of Match Function -- 3 Test Data Generation Based on Genetic Algorithm -- 3.1 Process of Genetic Algorithm -- 3.2 Design of Representation -- 3.3 Design of Fitness Function -- 3.4 Design of Other Operator -- 4 Simulation Experiment -- 4.1 Test Objects -- 4.2 Performance Indicators -- 4.3 Results Analysis -- 5 Conclusion -- References -- The 5th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-15) -- An Efficient Pre-filter to Accelerate Regular Expression Matching
- References -- Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 System Models -- 3.1 Road Networks Model -- 3.2 Query Model -- 3.3 Location Privacy System Structure -- 3.4 Attack Model -- 4 Algorithm Design -- 4.1 Related Definitions -- 4.2 Prediction-Based Grouping Algorithm -- 4.2.1 Markov Prediction Analysis [12] -- 4.2.2 PL Algorithm -- 5 Simulation Experiments and Analysis -- 5.1 Parameters Setting -- 5.2 Algorithm Evaluation Target -- 5.3 Analysis of Experiment Results -- 6 Conclusions -- Acknowledgments -- References -- A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups -- 1 Introduction -- 2 Preliminaries -- 2.1 Composite Order Bilinear Groups -- 2.2 Complexity Assumptions -- 2.3 Dual System Encryption and Dual System Signature -- 3 Overview of Hierarchical Identity-Based Signature Scheme -- 3.1 Definitions -- 3.2 Security Model -- 4 Our HIBS Scheme -- 4.1 The Construction -- 4.2 Security Proofs -- 5 Performance -- 6 Conclusion -- References -- STRATUS: Towards Returning Data Control to Cloud Users -- 1 Rising Cyber Security Incidents: The Case for User Data Control -- 1.1 Lack of Ability Stemming from Lack of Data Control -- 1.2 Everyday Scenarios Demonstrating Users' Lack of Data Control -- 2 Elements of User Data Control and Related Work -- 2.1 Element 1: Transparency and Auditability of Data Activities -- 2.2 Element 2: Protection of Privacy of Data During Processing and Storing -- 2.3 Element 3: Immediate Detection and Revocation of Malicious Actions -- 2.4 Element 4: Resiliency and Rapid Recovery from Untoward Events -- 3 Proposed Methodology -- 3.1 RA1: Transparency and Auditability of Data Activities in Clouds -- 3.2 RA2: Protection of Privacy of Data During Processing and Storing