E-Business and Telecommunication Networks -  Joaquim Filipe,  Mohammad S. Obaidat

E-Business and Telecommunication Networks (eBook)

Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006, Selected Papers
eBook Download: PDF
2008 | 1. Auflage
XVII, 381 Seiten
Springer-Verlag
978-3-540-70760-8 (ISBN)
Systemvoraussetzungen
66,34 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ICETE 2006, held in Setúbal, Portugal, August 7-10, 2006. The 29 revised full papers presented were carefully reviewed and selected from 326 submissions. The papers are organized in four parts according to their conferences: ICE-B, SECRYPT, SIGMAP and WINSYS.

Preface 5
Organization 6
Table of Contents 13
PART I ICE-B 16
Towards Automated Service Trading 17
Introduction 17
Conceptual Framework 18
Trading 20
Discovery 20
Information 21
Selection 22
AgreementMaking 22
Binding 23
Related Work 24
Conclusions and Future Work 27
References 28
SAGA: An Adaptive Infrastructure for Secure Available GRID on Ad-Hoc Networks 29
Introduction 29
Adaptive Infrastructure 31
Adaptive Grid Behaviour 33
Predictive Infrastructure Modification 34
Reactive Infrastructure Modification 34
Secure Infrastructure 36
SAGA Application 38
Conclusions 40
References 40
Variable Quantity Market Clearing Algorithms 42
Introduction 42
Preliminaries 44
Model 44
Goals 44
Analysing Efficiency 45
Quantity Clearing Algorithms 46
Algorithm 1 46
Algorithm 2 47
Algorithm 3 48
Algorithm 4 48
Algorithm 5 48
Algorithm 6 49
Comparison 49
Conclusions 52
References 53
Modeling the Dynamics of Social Networks 54
Introduction 54
System-Theoretic Framework 56
When the Power Law? 59
Modeling the Dynamics of Social Networks 60
Experiment 1 60
Experiment 2 61
Discussion 62
Conclusions 64
References 65
Reputation Management Service for Peer-to-Peer Enterprise Architectures 66
Introduction 66
Reputation Management in Role-Based Peergroups 67
Analytical Model 68
Four-Role Configuration Example 70
Emulation Results 72
Related Work 74
Conclusions 77
References 77
A New Approach for the Trust Calculation in Social Networks 78
Introduction 78
Literature Review 80
Trust Function 81
Evaluation of the Yu Trust Function 82
Modification of the Trust Function 84
Results 86
Conclusions 89
References 90
PART II SECRYPT 92
Spoofed ARP Packets Detection in Switched LAN Networks 93
Introduction 93
Related Work 94
Background 95
ARP Protocol 95
ARP Cache 95
ARP Cache Poisoning Attack 96
Static ARP Cache Update 96
Dynamic ARP Cache Update 96
The MiM Attack 97
Detection of MiM Attack 98
Detection of Hosts with Enabled IP Packet Routing 98
Detection of ARP Cache Poisoning Attack 100
The AntiMiM Application 101
Network Performance Analysis 102
Conclusions 102
References 103
Efficient All-or-Nothing Encryption Using CTR Mode 104
Introduction 104
All-or-Nothing Transforms 105
Definitions 105
Applications 105
Constructions 106
CTRT-CTR Encryption 106
Package Transform 106
CTR Transform 107
CTRT-CTR Mode 107
Latency Considerations 108
Efficient All-or-Nothing Encryption 109
Applications 110
Proofs of Security 111
Existing Security Results 111
Security of AONT-CTR Encryption 112
Security of Efficient AONT-CTR Encryption 115
Conclusions 116
References 117
Proposals for Iterated Hash Functions 119
Introduction 119
Properties of Existing Constructions 120
The Davies-Meyer Construction 120
The Merkle-Damg°ard Construction 120
Possible Countermeasures 122
Alternatives to Davies-Meyer 123
Extensions and Alternatives to Merkle-Damg°ard 123
Proposals for Enhanced Security 126
Application to the SHA-Family Constructions 127
Performance 128
Resistance to Short-Cut Attacks 128
Conclusions 129
References 129
Secure Online English Auctions 131
Introduction 131
Fundamentals of Online English Auctions 133
Security Issues in Online English Auctions 133
Existing English Auction Schemes 134
Components of Our Scheme 135
Group Signatures 136
The Auction Protocol 138
Setup 139
Registration 139
Setup - Before Each Auction 140
Bidding 140
Winner Determination 141
Traceability 142
Revocation 142
Security 142
Efficiency 143
Conclusions 144
References 145
Using Microsoft Office InfoPath to Generate XACML Policies 146
Introduction 146
XACML Policy Language 148
Microsoft Office Infopath 149
Using Templates to Generate Policies 149
Translating Policy Elements 151
Policy Generation for a Network Access Control Authorization Scenario 152
NAS-SAML: A Network Access Control Approach Based on SAML and XACML 152
Editing the Target Access Policy 152
Related Work 154
Conclusions and Future Work 156
References 156
Least Privilege in Separation Kernels 158
Introduction 158
A Least Privileged Separation Kernel 159
Concepts 159
The Separation Kernel 159
The Principle of Least Privilege 160
High Assurance Criteria and Least Privilege 160
Practical Considerations 161
Inter-block Flows 161
Least Privilege Flow Control 162
Applications of Least Privilege 165
Kernel-Controlled Interference 165
Regraders 166
Related Work 167
Protection Profiles for Separation Kernels 167
Trusted Computing Exemplar Project 167
Type Enforcement Architectures 167
Conclusions 167
References 168
Inter-node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels 170
Introduction 170
Related Work 173
Data Model and Queries 173
Relationship Access 174
Access Control Policy Specification 175
Query Evaluation 177
Create a Secure Set of Labeled Relationships 179
Conclusions 181
References 181
PART III SIGMAP 183
Using Placeholder Slices and MPEG-21 BSDL for ROI Extraction in H.264/AVC FMO-Encoded Bitstreams 184
Introduction 184
ROI-Coding with FMO 185
MPEG-21BSDL 187
ROI Extraction 188
Placeholder Slices 189
Results 191
Conclusions and Future Work 195
References 196
Design and Implementation of Video on Demand Services over a Peer-to-Peer Multioverlay Network 197
Introduction 197
Media Representations 198
Media-Hash 199
Media-Info 200
MultiOverlay Architecture 201
Peer Discovery Layer 201
Content Lookup Layer 201
Media Streaming Layer 201
Playback Control Layer 202
Implementation 203
Peer Discovery Layer 203
Content Lookup Layer 203
Media Streaming Layer 204
Playback Control Layer 204
Evaluation 205
Startup Delay 205
Efficiency of Bandwidth Utilization 206
Effectiveness of Bandwidth Aggregation 207
Extensions to the MegaDrop System 208
Conclusions 208
References 209
Traffic Trunk Parameters for Voice Transport over MPLS 210
Introduction 210
Models for Voice Transport in MPLS 212
Single Voice Source Model: The ON-SID Model 212
Alternatives for Voice Transport in MPLS 213
Aggregation of Heterogeneous Voice Sources in a Traffic Trunk 215
New Value of the Traffic Parameters for MPLS Transport 216
Mean and Peak Bit-Rate for VoIP 216
Mean and Peak Bit-Rate for VoMPLS 217
Traffic Trunk Parameters 218
Validation and Numerical Results 219
Experiment Setup 219
Numerical Results 219
Conclusions 220
References 221
On-the-Fly Time Scaling for Compressed Audio Streams 222
Introduction 222
Related Work 223
Audio Time-Scaling Algorithm 225
Time Scaling in System Flows 228
Audio Time-Scaling Tool 229
Integrating HyperAudioScaling with a Hypermedia Formatter 231
Final Remarks 232
References 233
Improving Multiscale Recurrent Pattern Image Coding with Deblocking Filtering 235
Introduction 235
Image Coding with MMP 236
The MMP Algorithm 237
The MMP-Intra Algorithm 238
Efficient Dictionary Design for MMP-Intra 238
The Deblocking Filter 239
Adapting Shape and Support for the Deblocking Kernel 241
Eliminating the Artifacts Introduced by Deblocking 242
Experimental Results 244
Conclusions 247
References 247
A Network Scheduler for an Adaptive VoD Server 248
Introduction 248
Related Works 250
Network Traffic Scheduler 250
The RAP Protocol 251
The ERAP Protocol 254
RAP vs. ERAP 257
Conclusions and Future Works 261
References 261
Enhanced Interaction for Streaming Media 263
Introduction 263
Download vs. Streaming 264
Models for Delivery 265
Generic Model for Local Replay 266
Integration of Streamed Replay 268
Conclusions 273
References 274
An E-Librarian Service That Yields Pertinent Resources from a Multimedia Knowledge Base 275
Introduction 275
Linguistic Pre-processing 276
Ontology Mapping 276
Ontology Preliminaries 277
Semantic Interpretation 278
Query Generation 281
Implementation and Experiments 282
Related Work 284
Conclusions 285
References 285
PART IV WINSYS 287
A Transceiver Concept Based on a Software Defined Radio Approach 288
Introduction 288
LLR Based Receiver Concept 290
Approach to the Reconfigurability 293
The FALCON Setup 295
Measurement Results 296
Conclusions 297
References 298
Evaluation of an Orthogonal SFBC Channel Estimation Scheme for MIMO OFDM Wireless Systems 299
Introduction 299
System Architecture 301
Transmission Scheme 301
Reception Scheme 301
Channel Models 302
Channel Estimation 303
Evaluation Results 305
Conclusions 309
References 309
A New Signal Detection Method for TR-UWB: By Time Delayed Sampling and Correlation (TDSC) 310
Introduction 310
TDSC - A New Approach for TR-UWB Signal Detection 312
Experimental Validation 315
Experimentation Setup 315
Experimentation Results 316
Conclusion and Perspectives 319
References 320
Image Transmission with Adaptive Power and Rate Allocation over Flat Fading Channels Using Joint Source Channel Coding 321
Introduction 321
System Overview 322
Source Description 323
Channel Adaptation 324
Matching Source to Channel 325
Finding the Representation Points 325
Optimization of Power Distribution 326
Reference System 327
Results 327
Conclusions 329
References 330
Directional Spectrum Modelling in Inhomogeneous Forests at 20 and 62.4 GHz 331
Introduction 331
The Scattering Propagation Models 332
The Radiative Energy Transfer (RET) 332
The dRET Formulation 333
Experimental Procedure 334
Description of the Measurement Site 334
Directional Spectrum Measurements 335
Parameter Extraction and Scaling 336
Measurement Results 338
Conclusions 342
References 342
Use of AGPS Call Data Records for Non-GPS Terminal Positioning in Cellular Networks 343
Introduction 343
Related Work 345
Pattern Matching Localization 346
Basic Pattern Matching System 346
Proposed Pattern Matching System 347
Pattern Distance Metric 349
Experimental Results 351
Conclusions 354
References 354
A Telephony Application for Manets: Voice over a MANET-Extended JXTA Virtual Overlay Network 356
Introduction 356
MANET-JXTA 357
JXTA 357
MANET-JXTA 358
MANET-VoVON Application 359
Signalling 360
SIP Interoperation 361
Interaction with SIP Proxy 362
Application 362
VoVON Prototype 363
Performance Measurements 363
Conclusions and Further Work 366
References 366
A Context-Aware Architecture for Mobile Knowledge Management 368
Introduction 368
Mobile Knowledge Management Environment and Properties 369
KnowledgeManagement 369
Mobility Aspects 370
Requirements 370
Mobile Knowledge Management Architecture 371
Introduction 371
Outline of the Contextualizer 372
User Dependency 373
Technological Environment 373
Situational Elements 374
Task-Specific Elements 374
Prototype Implementation 374
Overall Implementation 375
Roadside Assistance Use Case 375
Contextual Adaptation 376
Related Work 377
Conclusions 378
References 378
Author Index 380

Erscheint lt. Verlag 1.1.2008
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Office Programme Outlook
Informatik Theorie / Studium Algorithmen
Mathematik / Informatik Informatik Web / Internet
Wirtschaft Allgemeines / Lexika
Schlagworte 4G systems • agent-based information systems • algorithms • audio and video streaming • authentication and watermarking • CRM • E-Business • E-Commerce • E-Marketing • H.264 • hash function • Identity Management • IMA • image and video compression • LA • mobile multimedia applications • Mobile Services • multimedia indexing and retrieval • network security and protocols • Online • operating systems security • PEER • Switch • Traffic Modelling • Transceiver • VPN technology • wireless Internet
ISBN-10 3-540-70760-3 / 3540707603
ISBN-13 978-3-540-70760-8 / 9783540707608
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 7,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90