ebook img

Network Computing and Information Security: Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings PDF

846 Pages·2012·30.282 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Network Computing and Information Security: Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings

Communications in Computer and Information Science 345 EditorialBoard SimoneDinizJunqueiraBarbosa PontificalCatholicUniversityofRiodeJaneiro(PUC-Rio), RiodeJaneiro,Brazil PhoebeChen LaTrobeUniversity,Melbourne,Australia AlfredoCuzzocrea ICAR-CNRandUniversityofCalabria,Italy XiaoyongDu RenminUniversityofChina,Beijing,China JoaquimFilipe PolytechnicInstituteofSetúbal,Portugal OrhunKara TÜBI˙TAKBI˙LGEMandMiddleEastTechnicalUniversity,Turkey Tai-hoonKim KonkukUniversity,Chung-ju,Chungbuk,Korea IgorKotenko St.PetersburgInstituteforInformaticsandAutomation oftheRussianAcademyofSciences,Russia DominikS´le˛zak UniversityofWarsawandInfobright,Poland XiaokangYang ShanghaiJiaoTongUniversity,China Jingsheng Lei Fu Lee Wang Mo Li Yuan Luo (Eds.) Network Computing and Information Security Second International Conference, NCIS 2012 Shanghai, China, December 7-9, 2012 Proceedings 1 3 VolumeEditors JingshengLei ShanghaiUniversityofElectricPower SchoolofComputerandInformationEngineering Shanghai200090,China E-mail:[email protected] FuLeeWang CaritasInstituteofHigherEducation 18ChuiLingRoad,TseungKwanO,HongKong,China E-mail:[email protected] MoLi NanyangTechnologicalUniversity(NTU) SchoolofComputerEngineering ComputerScienceDivision 50NanyangAvenue,Singapore E-mail:[email protected] YuanLuo ShanghaiJiaoTongUniversity DepartmentofComputerScienceandEngineering Shanghai200030,China E-mail:[email protected] ISSN1865-0929 e-ISSN1865-0937 ISBN978-3-642-35210-2 e-ISBN978-3-642-35211-9 DOI10.1007/978-3-642-35211-9 SpringerHeidelbergDordrechtLondonNewYork LibraryofCongressControlNumber:2012952316 CRSubjectClassification(1998):D.4.6,C.2.1,C.2.4,C.4,H.3.4 ©Springer-VerlagBerlinHeidelberg2012 Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnotimply, evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotectivelaws andregulationsandthereforefreeforgeneraluse. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface The 2012 International Conference on Network Computing and Information Security (NCIS 2012)was held in Shanghai, China during December 7–9, 2012. NCIS 2012 received 517 submissions from 10 countries and regions.After rigor- ous reviews, 104 high-quality papers were selected for publication in the NCIS 2012 proceedings. The acceptance rate was 20.11%. The aim of NCIS 2012 was to bring together researchers working in many different areas of network computing and information security to foster the ex- change of new ideas and promote internationalcollaboration.In addition to the largenumberofsubmittedpapers,therewereseveralinternationallywell-known keynote speakers. On behalf of the Organizing Committee, we thank Shanghai University of ElectricPowerforitssponsorshipandlogisticssupport.Wealsothankthemem- bers of the Organizing Committee and the Program Committee for their hard work.Weareverygratefultothekeynotespeakers,sessionchairs,reviewers,and student helpers. Last but not least, we thank all the authors and participants for the great contributions that made this conference possible. December 2012 Jingsheng Lei Fu Lee Wang Mo Li Yuan Luo Organization Organizing Committee General Co-chairs Hao Zhang Shanghai University of Electric Power,China Yunhao Liu Tsinghua University, China Program Committee Co-chairs Mo Li Nanyang TechnologicalUniversity, Singapore Yuan Luo Shanghai Jiao Tong University, China Steering Committee Chair Jingsheng Lei Shanghai University of Electric Power,China Local Arrangement Co-chairs Junjie Yang Shanghai University of Electric Power,China Haizhou Du Shanghai University of Electric Power,China Proceedings Co-chairs Fu Lee Wang Caritas Institute of Higher Education, Hong Kong Ting Jin Fudan University, China Sponsorship Chair Zhiyu Zhou Zhejiang Sci-Tech University, China VIII Organization Program Committee Habtamu Abie Norwegian Computing Center, Norway Xianbin Cao Beihang University, China Ai Chen Chinese Academy of Sciences, China Guihai Chen Nanjing University, China Hanhua Chen Huazhong University of Science and Technology, China Shiping Chen CSIRO ICT Centre Australia, Australia Yanling Chen Norwegian University of Science and Technology, Norway Qi Cheng Oklahoma State University, USA Rui Chu National University of Defence Technology, China Tasos Dagiuklas Technological Educational Institute (TEI) of Mesolonghi, Greece Guojun Dai Hangdian University, China Xiaolei Dong Shanghai Jiao Tong University, China Junzhao Du Xidian University, China Jun Gao Peking University, China Yu Gu SingaporeUniversityofTechnologyandDesign, Singapore Deke Guo National University of Defence Technology, China Yuan He HKUST, Hong Kong Feng Hong Ocean University of China, China Chunming Hu Beihang University, China Yixin Jiang Tsinghua University, China Athanasios Kakarountas TechnologicalEducational Institute of the Ionian Islands, Greece Haibin Kan Fudan University, China Dong Seong Kim Duke University, USA Hui Li Peking University, China Yong Li Beijing Jiaotong University, China Xiaofei Liao Huazhong University of Science and Technology, China Shan Lin Temple University, USA Kebin Liu HKUST, Hong Kong Nan Liu Southeast University, China Shengli Liu Shanghai Jiao Tong University, China Yunhuai Liu Chinese Academy of Sciences, China Zihui Liu Beijing Institute of Technology, China Li Lu University of Electronic Science and Technology of China, China Organization IX Xiaoqiang Lu Chinese Academy of Sciences, China Xucheng Luo University of Electronic Science and Technology of China, China Huadong Ma Beijing University of Posts and Telecommunications, China Yanwei Pang Tianjin University, China Longjiang Qu National University of Defense Technology, China Slim Rekhis University of Carthage, Tunisia Weisong Shi Wayne State University, USA Lingyang Song Peking University, China Zhou Su Waseda University, Japan Hailong Sun Beihang University, China Chunming Tang Guangzhou University, China Zhiguo Wan Tsinghua University, China Jilong Wang Tsinghua University, China Lei Wang Dalian University of Technology, China Xin Wang Fudan University, China Yang Wang Peking University, China Chuliang Weng Shanghai Jiao Tong University, China Hejun Wu Sun Yat-Sen University, China Xiaobin Wu Nanjing University, China Shutao Xia Tsinghua University, China Bin Xiao HongKongPolytechnicUniversity,HongKong Gaogang Xie Chinese Academy of Sciences, China Bin Xu Tsinghua University, China Guangtao Xue Shanghai Jiao Tong University, China Pingkun Yan Philips Research, The Netherlands Panlong Yang Nanjing Institute of Communication Engineering, China Zheng Yang HKUST, Hong Kong Lihua Yin Chinese Academy of Sciences, China Mei Yu Tianjin University, China Sherali Zeadally University of the District of Columbia, USA Dian Zhang HKUST, Hong Kong Fangguo Zhang Sun Yat-Sen University, China Jin Zhang HKUST, Hong Kong Yan Zhang Simula Research Laboratory, University of Oslo, Norway Zhifang Zhang Chinese Academy of Sciences, China X Organization Feng Zhao Huazhong University of Science and Technology, China Xibin Zhao Tsinghua University, China Huiyu Zhou Queen’s University Belfast, UK Yanmin Zhu Shanghai Jiao Tong University, China Xinjian Zhuo BeijingUniversityofPostsandTelecom,China Deqing Zou Huazhong University of Science and Technology, China Table of Contents Applications of Cryptography On the Isomorphism Classes of Elliptic Curves with 2-TorsionPoints ... 1 Hongfeng Wu and Rongquan Feng Template-Based and Second-Order Differential Power Analysis Attacks on Masking ..................................................... 8 Huilin Yin and Ruiying Zhao Design and Implementation of Linux File Mandatory Access Control ... 15 Liye Tian, Xing Rong, and Tingting Liu Authentication and Non-repudiation Design and Application of Fine-Grained Access Control Model......... 23 Xuelian Xie, Haibo Yang, and Lanyou Li Intel SYSRET Privilege Escalation Vulnerability Analysis............. 30 Yong Wang, Xiuxia Tian, Jianping Xu, Shuai Chen, and Heng Yang Analysis of Cloud Security and a Reliable Transmission Based on UDP ........................................................ 38 Dixin Su and Zhiping Zhou A Survey of Passive Image Forensics................................ 45 Weimin Wei, Liping Sun, Dongjie Tang, Yan Zhao, and Hongjiao Li A Novel Fast η-Adapt Slide Window Elliptic Curve Cryptography Algorithm....................................................... 56 Hongxia Shi and Yi Ouyang Application of Neural Network and Cluster Analysis in Anomaly Detection ....................................................... 63 Xudong Wu, Bingxiang Liu, and Yingxi Li Clustering System Call Arguments for Remote Attestation ............ 70 Hongjiao Li, Xiuxia Tian, Weimin Wei, and Chaochao Sun Document Selective Protection Based on Third Service Framework ..... 79 Mei Xue, Zhongxiong Yuan, and Jing Li Fine-Grain Trusted Storage and Transitivity Policy for Open Network Environment .................................................... 89 Lin Zhang and Ruchuan Wang XII Table of Contents Cloud Computing A Deep Understanding of Cloud Computing Security ................. 98 Hongjiao Li, Xiuxia Tian, Weimin Wei, and ChaoChao Sun Study of Layers Construct for Data Mining Platform Based on Cloud Computing...................................................... 106 Yongzheng Lin Cloud Task and Virtual Machine Allocation Strategy in Cloud Computing Environment.......................................... 113 Xing Xu, Hao Hu, Na Hu, and Weiqin Ying Method of Construct High Performance StaaS Infrastructure Base on Dynamic Request Data Supporting Cloud Computing.............. 121 Hongyong Lu GIS Application Model Based on Cloud Computing .................. 130 Linli Zhou, Rujing Wang, Chaoyuan Cui, and Chengjun Xie Development Framework for Cloud Services ......................... 137 Binh Minh Nguyen, Viet Tran, and Ladislav Hluchy Research on Distributed File System with Hadoop ................... 148 JunWu Xu and JunLing Liang Requirement Uncertainty Analysis for Service-OrientedSelf-adaptation Software ........................................................ 156 Wei Liu and Zaiwen Feng Optimization of Green Passive Optical Networks with Minimum Cost... 164 Yongmin Qi, Xiaoqin Hu, Jia He, Qiliang Li, and Shilin Xiao Communication and Information Systems Based on Wavelet Packet Transform and Embedded Web Technology of Buried Water Remote Monitoring System Design and Implementation.................................................. 172 Zhengshu Yan Primary Educational Resources Classification Study Based on Gagne Learning Classification Theory..................................... 180 Fan Yang, Jun Han, Jing Liu, Jun Tong, and Shuo Chen A Special Subject Database in CALIS Project: Database of Local Resources in the Northwestern Guangxi............................. 191 Bo Zhou, Wenliang Liu, and Cuiyun Qui

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.