Proceedings of the International Conference on IT Convergence and Security 2011 (eBook)

eBook Download: PDF
2011 | 2012
XIV, 642 Seiten
Springer Netherlands (Verlag)
978-94-007-2911-7 (ISBN)

Lese- und Medienproben

Proceedings of the International Conference on IT Convergence and Security 2011 -
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.

Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits:

1.      Introduction of the most recent information technology and its related ideas

2.      Applications and problems related to technology convergence, and its case studies

3.      Introduction of converging existing security techniques through convergence security

Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.



Kuinam, J, Kim is a professor and chairman of the Department of Convergence Security at Kyoung-gi University(KGU) in Kyoung-gi, Korea. He is also President of the Center for Industry Security supported by Ministry of Knowledge and Economy, Korea. His current fields of specialization are internet-based computing models, computer and networks forensics, infrastructure security, software security, multimedia security, and scientific and technical information. He has received several technical and publishing awards, and rewards including Minister of Knowledge Economy Commendation (Industry Technology Security) and Minister of Public Administration and Security Commendation (Digital Forensic).

As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits:1. Introduction of the most recent information technology and its related ideas2. Applications and problems related to technology convergence, and its case studies3. Introduction of converging existing security techniques through convergence securityOverall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.

Kuinam, J, Kim is a professor and chairman of the Department of Convergence Security at Kyoung-gi University(KGU) in Kyoung-gi, Korea. He is also President of the Center for Industry Security supported by Ministry of Knowledge and Economy, Korea. His current fields of specialization are internet-based computing models, computer and networks forensics, infrastructure security, software security, multimedia security, and scientific and technical information. He has received several technical and publishing awards, and rewards including Minister of Knowledge Economy Commendation (Industry Technology Security) and Minister of Public Administration and Security Commendation (Digital Forensic).

Part 1. Security FundamentalsA Secure Service Framework for handling Security Critical Data on the Public Cloud; Gi-Hwan ChoThe Understanding of Building Trust Model on Smartphone Application: Focusing on Users’ Motivation; Hun ChoiTowards Understanding Deterrence: Information Security Managers’ Perspective;  Sangseo Park Part 2. Industrial & Business Information SecurityIdea Sketch to Attribute-Based Access Control in Cloud Computing Environment;  ByungRae ChaRealizing Security Requirements with Physical Properties; André  van CleeffControlling Decryption of Personal Health Records in the Cloud; Yi-Chang HsuAccess Control Mechanism for XML Document; Sun-Moon JoA Collaborative Intrusion Detection System Framework for Cloud Computing; Doan Nguyen ManCriteria for Comparing Nations Cyberwar Capability; Hyung-Jun Seo Part 3. Security Protocols and ApplicationsA RSSI-based approach for Localization of Wireless Sensor Network in Indoor; Hyochang AhnSemantic Search and Retrieval System for Learning Objects; Arshad AwanWear Leveling for PCM Using Hot Data Identification; Inhwan ChoiMonitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine; Jae Hyeok JangHARD: Host-Level Address Remapping Driver for Solid-State Disk; Young-Joon JangUbiquitous based Personalized Hypertension Monitoring System; Jonghun KimCustomized IPTV Content Recommendation Service Model Based On Personal Preference; Si-Jung KimA Study on the Touch Processes of Android Smartphone on Froyo and Gingerbread; Yeong-Gyu LimCase Study of QoS-assured Convergence Service Overlay in Open Service Platform Environment; Nam-Kyung LeeAspect Oriented Software Development using Requirement Engineering; Seung-Hyung LeeAccelerometer-based Physical Activity Measurement; Yao MengA Group Data Synchronization Protocol in Mobile Environments; Ju-Geon PakEfficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics; Kee-Hyun Park Part 4. Convergence Security                                      A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications; In-Pyo ChoAn Efficient Live Stream Community Management Scheme for the Mobile Environment; Chung-Pyo HongUnclogging the libjpeg performance bottleneck: a stream-parallel DCT retro-fitted with sequential legacy code; Jingun HongDevelopment of Real-time Gesture Recognition System using Visual Interaction; Sung Kwan KangArchitecture of Image Encryption hardware using Two dimensional Cellular Automata; Abdul Raouf KhanSimulation of 3D Information Visualization; Gui-Jung KimGroup Based Vehicular Machine to Machine Communication Scheme in Cellular Networks; Kyu Chul KimDevelopment of Real-time Location-based Multimedia Style Slop Information Retrieval System; Sung-Ho KimAugmented Reality-Based Role-Playing Contents for Education; Sukhyun LimVertex Propagation for Fast Ray-casting of Digital Elevation Model; Eun-Seok LeeA Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization; Kyuho LeeImage Registration for Sub-Pixel Using Pyramid Edge Images; Jae-Young LeeReal-time Camera Tracking Using Planar Object Detection; Ahr-Hyun LeePerformance Analysis of Routing Methods over Mobile IPv6 Networks; Reza MalekianRobust Estimation of Heights of Moving People using a Single Camera; Sang-Wook Park Part 5. IT Convergence ApplicationsGoal-Heuristic analysis Method for an Adaptive Process Mining; Sujin BaekSecurity Threat modeling and Requirement Analysis Method based on Goal-Scenario; Sujin BaekAn Effective Learning Method in Art Using Virtual Reality and Ontology; Sang-Jin ChaDevelopment of Pain Prescription Decision Systems for Nursing Intervention; Kyung Yong ChungPerformance Sensibility Influence of Recommended Makeup Styles; Kyung Yong ChungAffective Social Network; Hyun-Jun KimA Study on the Metadata Extraction and Repository Based on Web Service Meta Broker; Sung-Ho SimDiscovering Knowledge Flow in Social Network; Hyun-Jun KimModel Optimization with Graph Transformation and PSO algorithm for Model Transformation Verification; Jong-Won KoPattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification; Jong-Won KoImproved Performance of Emotion Extraction through Banned words; Seung-Bo ParkPotential Emotion Word in Movie Dialog; Seung-Bo ParkStory Modeling for Green Light Decision Making; Seung-Bo ParkDeveloping Service-Oriented Computing Model; Hamid S. McheickAn Extended XML Compression Technique for XML Element Retrieval; Tanakorn Wichaiwong Part 6. Mobile Computing and Future NetworksStandby Power Control System based on User’s Location for Energy Saving in Smart Home; Kyoung-Mi ImContext-Aware Architecture for Improvement of Energy efficiency and Growth Promotion of Plants; Hyungsun KimEnergy Saving of Plant Cultivation System using LED Control System based on Ultrasonic Sensor; Hyungsun KimImprovement of Energy Efficiency in Plant Factories through the Measurement of Plant Bioelectrical Potential; Sookyoun KwonFuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System; Sunhoe KimTypes of Fuel Cells and Applications for Electricity and Heat Co-Generation; Sunhoe KimIntegrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment; Yoon-Sik Yoo Part 7. Multimedia and Information VisualizationMalware Detection Techniques using Artificial Immune; Mohamed Ahmed Mohamed AliA Survey on P2P Botnet Detection; Kyoung-Soo HanA Study on Instruction Substitution Analysis of Metamorphic Malware; Kyoung-Soo HanAn Analysis of Malware Attached in Spam; Kyoung-Soo HanDetection Methods for Malware Variant using API Call Related Graphs; Kyoung-Soo HanMalware Classification Methods using API Sequence Characteristics; Kyoung-Soo Han Part 8. Web Technology and Software EngineeringPractical Firewall Policy Inspection using Anomaly Detection and Its Visualization; Jung-Min Kang

Erscheint lt. Verlag 7.12.2011
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XIV, 642 p.
Verlagsort Dordrecht
Sprache englisch
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Software Entwicklung
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Convergence data mining • Convergence Security • Data Mining • Green convergence services • Information technology convergence • Information Visualization • IT convergence • mobile computing • Multimedia • security • Software engineering
ISBN-10 94-007-2911-1 / 9400729111
ISBN-13 978-94-007-2911-7 / 9789400729117
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 17,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Achieve data excellence by unlocking the full potential of MongoDB

von Marko Aleksendric; Arek Borucki; Leandro Domingues …

eBook Download (2024)
Packt Publishing (Verlag)
53,99