Description
Proceedings of the International Conference on IT Convergence and Security 2011, 2012
Lecture Notes in Electrical Engineering Series, Vol. 120
Coordinators: Kim Kuinam J., Ahn Seong Jin
Language: EnglishSubjects for Proceedings of the International Conference on IT...:
Publication date: 03-2014
642 p. · 15.5x23.5 cm · Paperback
Publication date: 12-2011
642 p. · 15.5x23.5 cm · Paperback
Description
/li>Contents
/li>Biography
/li>Comment
/li>
As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task.
Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits:
1. Introduction of the most recent information technology and its related ideas
2. Applications and problems related to technology convergence, and its case studies
3. Introduction of converging existing security techniques through convergence security
Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.
Part 1. Security Fundamentals
A Secure Service Framework for handling Security Critical Data on the Public Cloud; Gi-Hwan Cho
The Understanding of Building Trust Model on Smartphone Application: Focusing on Users’ Motivation; Hun Choi
Towards Understanding Deterrence: Information Security Managers’ Perspective; Sangseo Park
Part 2. Industrial & Business Information Security
Idea Sketch to Attribute-Based Access Control in Cloud Computing Environment; ByungRae Cha
Realizing Security Requirements with Physical Properties; André van Cleeff
Controlling Decryption of Personal Health Records in the Cloud; Yi-Chang Hsu
Access Control Mechanism for XML Document; Sun-Moon Jo
A Collaborative Intrusion Detection System Framework for Cloud Computing; Doan Nguyen Man
Criteria for Comparing Nations Cyberwar Capability; Hyung-Jun Seo
Part 3. Security Protocols and Applications
A RSSI-based approach for Localization of Wireless Sensor Network in Indoor; Hyochang Ahn
Semantic Search and Retrieval System for Learning Objects; Arshad Awan
Wear Leveling for PCM Using Hot Data Identification; Inhwan Choi
Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine; Jae Hyeok Jang
HARD: Host-Level Address Remapping Driver for Solid-State Disk; Young-Joon Jang
Ubiquitous based Personalized Hypertension Monitoring System; Jonghun Kim
Customized IPTV Content Recommendation Service Model Based On Personal Preference; Si-Jung Kim
A Study on the Touch Processes of Android Smartphone on Froyo and Gingerbread; Yeong-Gyu Lim
Case Study of QoS-assured Convergence Service Overlay in Open Service Platform Environment; Nam-Kyung Lee
Aspect Oriented Software Development using Requirement Engineering; Seung-Hyung Lee
Accelerometer-based Physical Activity Measurement; Yao Meng
A Group Data Synchronization Protocol in Mobile Environments; Ju-Geon Pak
Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics; Kee-Hyun Park
Part 4. Convergence Security
A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications; In-Pyo Cho
An Efficient Live Stream Community Management Scheme for the Mobile Environment; Chung-Pyo Hong
Unclogging the libjpeg performance bottleneck: a stream-parallel DCT retro-fitted with sequential legacy code; Jingun Hong
Development of Real-time Gesture Recognition System using Visual Interaction; Sung Kwan Kang
Architecture of Image Encryption hardware using Two dimensional Cellular Automata; Abdul Raouf Khan
Simulation of 3D Information Visualization; Gui-Jung Kim
Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks; Kyu Chul Kim
Development of Real-time Location-based Multimedia Style Slop Information Retrieval System; Sung-Ho Kim
Augmented Reality-Based Role-Playing Contents for Education; Sukhyun Lim
Vertex Propagation for Fast Ray-casting of Digital Elevation Model; Eun-Seok Lee
A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization; Kyuho Lee
Image Registration for Sub-Pixel Using Pyramid Edge Images; Jae-Young Lee
Real-time Camera Tracking Using Planar Object Detection; Ahr-Hyun Lee
Performance Analysis of Routing Methods over Mobile IPv6 Networks; Reza Malekian
Robust Estimation of Heights of Moving People using a Single Camera; Sang-Wook Park
Part 5. IT Convergence Applications
Goal-Heuristic analysis Method for an Adaptive Process Mining; Sujin Baek
Security Threat modeling and Requirement Analysis Method based on Goal-Scenario; Sujin Baek
An Effective Learning Method in Art Using Virtual Reality and Ontology; Sang-Jin Cha
Development of Pain Prescription Decision Systems for Nursing Intervention; Kyung Yong Chung
Performance Sensibility Influence of Recommended Makeup Styles; Kyung Yong Chung
Affective Social Network; Hyun-Jun Kim
A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker; Sung-Ho Sim
Discovering Knowledge Flow in Social Network; Hyun-Jun Kim
Model Optimization with Graph Transformation and PSO algorithm for Model Transformation Verification; Jong-Won Ko
Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification; Jong-Won Ko
Improved Performance of Emotion Extraction through Banned words; Seung-Bo Park
Potential Emotion Word in Movie Dialog; Seung-Bo Park
Story Modeling for Green Light Decision Making; Seung-Bo Park
Developing Service-Oriented Computing Model; Hamid S. Mcheick
An Extended XML Compression Technique for XML Element Retrieval; Tanakorn Wichaiwong
Part 6. Mobile Computing and Future Networks
Standby Power Control System based on User’s Location for Energy Saving in Smart Home; Kyoung-Mi Im
Context-Aware Architecture for Improvement of Energy efficiency and Growth Promotion of Plants; Hyungsun Kim
Energy Saving of Plant Cultivation System using LED Control System based on Ultrasonic Sensor; Hyungsun Kim
Improvement of Energy Efficiency in Plant Factories through the Measurement of Plant Bioelectrical Potential; Sookyoun Kwon
Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System; Sunhoe Kim
Types of Fuel Cells and Applications for Electricity and Heat Co-Generation; Sunhoe Kim
Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment; Yoon-Sik Yoo
Part 7. Multimedia and Information Visualization
Malware Detection Techniques using Artificial Immune; Mohamed Ahmed Mohamed Ali
A Survey on P2P Botnet Detection; Kyoung-Soo Han
A Study on Instruction Substitution Analysis of Metamorphic Malware; Kyoung-Soo Han
An Analysis of Malware Attached in Spam; Kyoung-Soo Han
Detection Methods for Malware Variant using API Call Related Graphs; Kyoung-Soo Han
Malware Classification Methods using API Sequence Characteristics; Kyoung-Soo Han
Part 8. Web Technology and Software Engineering
Practical Firewall Policy Inspection using Anomaly Detection and Its Visualization; Jung-Min Kang
Contains academic and professional contributions on IT Convergence and Security
Covers the multidisciplinary field of IT Convergence and Security
Written by an international team of contributors
Includes supplementary material: sn.pub/extras
These books may interest you
IT Convergence and Security 2012 195.16 €
IT Convergence and Security 2012 195.16 €