The Community for Technology Leaders
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2013)
Melbourne, VIC Australia
July 16, 2013 to July 18, 2013
TABLE OF CONTENTS

Cover Art (PDF)

pp. C4

Title Page i (PDF)

pp. i

Title Page iii (PDF)

pp. iii

Copyright Page (PDF)

pp. iv

Table of Contents (PDF)

pp. v-xxiii

A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing (Abstract)

Gaofeng Zhang , Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Melbourne, VIC, Australia
Yun Yang , Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Melbourne, VIC, Australia
Jinjun Chen , Sch. of Syst., Univ. of Technol., Sydney, NSW, Australia
pp. 1-8

An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing (Abstract)

Chang Liu , Fac. of Eng. & Inf. Technol., Univ. of Technol., Sydney, NSW, Australia
Xuyun Zhang , Fac. of Eng. & Inf. Technol., Univ. of Technol., Sydney, NSW, Australia
Chengfei Liu , Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Hawthorn, VIC, Australia
Yun Yang , Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Hawthorn, VIC, Australia
Rajiv Ranjan , ICT Centre, Inf. Eng. Lab., CSIRO, Sydney, NSW, Australia
Dimitrios Georgakopoulos , ICT Centre, Inf. Eng. Lab., CSIRO, Sydney, NSW, Australia
Jinjun Chen , Fac. of Eng. & Inf. Technol., Univ. of Technol., Sydney, NSW, Australia
pp. 9-16

A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth Cloud (Abstract)

Juan Li , Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
Yan Bai , Inst. of Technol., Univ. of Washington, Tacoma, Tacoma, WA, USA
Nazia Zaman , Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND, USA
pp. 17-23

Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud (Abstract)

Bernd Zwattendorfer , Inst. for Appl. Inf. Process. & Commun. (IAIK), Graz Univ. of Technol. (TUG), Graz, Austria
Daniel Slamanig , Inst. for Appl. Inf. Process. & Commun. (IAIK), Graz Univ. of Technol. (TUG), Graz, Austria
pp. 24-33

KP-ABE Based Verifiable Cloud Access Control Scheme (Abstract)

Xiaolin Si , Inst. of Software, Beijing, China
Pengpian Wang , Inst. of Software, Beijing, China
Liwu Zhang , Inst. of Software, Beijing, China
pp. 34-41

Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks (Abstract)

Chuanhao Qu , Sch. of Comput. Sci. & Technol., Shandong Univ., Ji'nan, China
Lei Ju , Sch. of Comput. Sci. & Technol., Shandong Univ., Ji'nan, China
Zhiping Jia , Sch. of Comput. Sci. & Technol., Shandong Univ., Ji'nan, China
Huaqiang Xu , Sch. of Comput. Sci. & Technol., Shandong Univ., Ji'nan, China
Longpeng Zheng , Sch. of Comput. Sci. & Technol., Shandong Univ., Ji'nan, China
pp. 42-49

Garbled Routing (GR): Towards Unification of Anonymous Networks (Abstract)

Shaahin Madani , Sch. of Comput. Sci. & Inf. Technol., RMIT Univ., Melbourne, VIC, Australia
Ibrahim Khalil , Sch. of Comput. Sci. & Inf. Technol., RMIT Univ., Melbourne, VIC, Australia
pp. 50-57

Secure Routing Based on Network Coding in Wireless Sensor Networks (Abstract)

Jing Chen , Sch. of Comput., Wuhan Univ., Wuhan, China
Ruiying Du , Sch. of Comput., Wuhan Univ., Wuhan, China
Qian Wang , Sch. of Comput., Wuhan Univ., Wuhan, China
Shixiong Yao , Sch. of Comput., Wuhan Univ., Wuhan, China
pp. 58-64

TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks (Abstract)

Ming Xiang , Sch. of Comput. & Math. Sci., Auckland Univ. of Technol., Auckland, New Zealand
William Liu , Sch. of Comput. & Math. Sci., Auckland Univ. of Technol., Auckland, New Zealand
Quan Bai , Sch. of Comput. & Math. Sci., Auckland Univ. of Technol., Auckland, New Zealand
pp. 65-72

AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks (Abstract)

Rakesh Matam , Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Patna Patna, Patna, India
Somanath Tripathy , Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Patna Patna, Patna, India
pp. 73-80

Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs (Abstract)

Marcin Seredynski , Public Res. Centre Henri Tudor, Luxembourg, Luxembourg
Riad Aggoune , Public Res. Centre Henri Tudor, Luxembourg, Luxembourg
Krzysztof Szczypiorski , Fac. of Electron. & Inf. Technol., Warsaw Univ. of Technol., Warsaw, Poland
Djamel Khadraoui , Public Res. Centre Henri Tudor, Luxembourg, Luxembourg
pp. 81-88

Novel Physically-Embedded Data Encryption for Embedded Device (Abstract)

Fangyong Hou , State Key Lab. of High Performance Comput., Nat. Univ. of Defense Technol., Changsha, China
Nong Xiao , State Key Lab. of High Performance Comput., Nat. Univ. of Defense Technol., Changsha, China
Hongjun He , State Key Lab. of High Performance Comput., Nat. Univ. of Defense Technol., Changsha, China
Fang Liu , State Key Lab. of High Performance Comput., Nat. Univ. of Defense Technol., Changsha, China
Zhiguang Chen , State Key Lab. of High Performance Comput., Nat. Univ. of Defense Technol., Changsha, China
pp. 89-93

Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach (Abstract)

Aymen Boudguiga , Communicating Syst. Lab., CEA, Gif-sur-Yvette, France
Alexis Olivereau , Communicating Syst. Lab., CEA, Gif-sur-Yvette, France
Nouha Oualha , Communicating Syst. Lab., CEA, Gif-sur-Yvette, France
pp. 94-101

A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption (Abstract)

Mohammad Saiful Islam Mamun , Japan Adv. Inst. of Sci. & Technol. (JAIST), Ishikawa, Japan
Atsuko Miyaji , Japan Adv. Inst. of Sci. & Technol. (JAIST), Ishikawa, Japan
pp. 102-109

Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs (Abstract)

Raihana Ferdous , Griffith Univ., Griffith, NSW, Australia
Vallipuram Muthukkumarasamy , Griffith Univ., Griffith, NSW, Australia
Elankayer Sithirasenan , Griffith Univ., Griffith, NSW, Australia
pp. 110-117

Privacy-Preserving Wireless Medical Sensor Network (Abstract)

Xun Yi , Coll. of Engine. & Sci., Victoria Univ., Melbourne, VIC, Australia
Jan Willemson , STACC & Cybernetica, Tartu, Estonia
Farid Nait-Abdesselam , Fac. of Math. & Comp. Sci., Univ. of Paris Descartes, Paris, France
pp. 118-125

A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones (Abstract)

Lingguang Lei , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Yuewu Wang , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Jian Zhou , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Daren Zha , Univ. of Chinese Acad. of Sci., Beijing, China
Zhongwen Zhang , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
pp. 126-133

Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment (Abstract)

Yong Wang , Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Nan Zhang , Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Yan-mei Wu , Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Bin-bin Su , Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Yong-jian Liao , Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
pp. 134-141

Power Based Malicious Code Detection Techniques for Smartphones (Abstract)

Bryan Dixon , Comput. Sci. Dept., Univ. of Colorado at Boulder, Boulder, CO, USA
Shivakant Mishra , Comput. Sci. Dept., Univ. of Colorado at Boulder, Boulder, CO, USA
pp. 142-149

A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications (Abstract)

Yu-Jia Chen , Nat. Chiao Tung Univ., Hsinchu, Taiwan
Chia-Yu Lin , Nat. Chiao Tung Univ., Hsinchu, Taiwan
Li-Chun Wang , Nat. Chiao Tung Univ., Hsinchu, Taiwan
pp. 150-155

ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain (Abstract)

Qihui Zhou , Comput. Sci. & Technol. Dept., Ocean Univ. of China, Qingdao, China
Dan Wang , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Yan Zhang , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Bo Qin , Comput. Sci. & Technol. Dept., Ocean Univ. of China, Qingdao, China
Aimin Yu , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Baohua Zhao , China Electr. Power Res. Inst., Beijing, China
pp. 156-162

Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware (Abstract)

Min Zheng , Comput. Sci. & Eng. Dept., Chinese Univ. of Hong Kong, Hong Kong, China
Mingshen Sun , Comput. Sci. & Eng. Dept., Chinese Univ. of Hong Kong, Hong Kong, China
John C. S. Lui , Comput. Sci. & Eng. Dept., Chinese Univ. of Hong Kong, Hong Kong, China
pp. 163-171

Securing Domain Name System Combined with MIPv6 for Mobile Hosts (Abstract)

Younchan Jung , Comm. & Electron. Eng., Catholic Univ. of Korea, Bucheon, South Korea
Marnel Peradilla , Comm. & Electron. Eng., Catholic Univ. of Korea, Bucheon, South Korea
William Atwood , Comput. Sci. & Software Eng., Concordia Univ., Montreal, QC, Canada
pp. 172-179

Securing Mobile Mashups with SCCM (Abstract)

F. Batard , I3S Lab., Univ. of Nice Sophia Antipolis, Sophia Antipolis, France
K. Boudaoud , I3S Lab., Univ. of Nice Sophia Antipolis, Sophia Antipolis, France
M. Riveill , I3S Lab., Univ. of Nice Sophia Antipolis, Sophia Antipolis, France
pp. 180-187

Unwanted Content Control via Trust Management in Pervasive Social Networking (Abstract)

Zheng Yan , State Key Lab. of ISN, Xidian Univ., Xi'an, China
Raimo Kantola , Dept. of Commun. & Networking, Aalto Univ., Espoo, Finland
Gaowa Shi , Sch. of Telecommun. Eng., Xidian Univ., Xi'an, China
Peng Zhang , Inst. of Mobile Internet, Xian Univ. of Posts & Telecommun., Xi'an, China
pp. 202-209

Trust Inference Computation for Online Social Networks (Abstract)

Sana Hamdi , Dept. of Comput. Sci., Fac. of Sci. of Tunis, Tunis, Tunisia
Amel Bouzeghoub , Inst. Mines-TELECOM, TELECOM SudParis, Evry, France
Alda Lopes Gancarski , Inst. Mines-TELECOM, TELECOM SudParis, Evry, France
Sadok Ben Yahia , Dept. of Comput. Sci., Fac. of Sci. of Tunis, Tunis, Tunisia
pp. 210-217

Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web (Abstract)

Owen Sacco , Digital Enterprise Res. Inst., Nat. Univ. of Ireland, Galway, Ireland
John G. Breslin , Digital Enterprise Res. Inst., Nat. Univ. of Ireland, Galway, Ireland
Stefan Decker , Digital Enterprise Res. Inst., Nat. Univ. of Ireland, Galway, Ireland
pp. 218-225

Preserving Utility in Social Network Graph Anonymization (Abstract)

Mohd Izuan Hafez Ninggal , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
Jemal H. Abawajy , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
pp. 226-232

DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics (Abstract)

Yuan Tao , Anhui Earthquake Bur., Hefei, China
Shui Yu , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
pp. 233-240

Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection (Abstract)

Yuxin Meng , Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China
Lam-For Kwok , Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China
pp. 241-248

Rational Secret Sharing Information -- Theoretically Secure against Adaptive Adversaries (Abstract)

Yang Yu , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Zhanfei Zhou , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
pp. 249-256

What is the Pattern of a Botnet? (Abstract)

Tianzuo Wang , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Huaimin Wang , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Bo Liu , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Peichang Shi , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
pp. 257-264

Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences (Abstract)

Yong Qiao , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Jie He , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Yuexiang Yang , Inf. Center, Nat. Univ. of Defense Technol., Changsha, China
Lin Ji , Inf. Center, Nat. Univ. of Defense Technol., Changsha, China
pp. 265-270

Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks (Abstract)

Nelcileno Virgilio Araujo De Souza , Inst. of Comput., Fed. Univ. of Mato Grosso, Cuiaba, Brazil
Ruy De Oliveira , Dept. of Inf., Fed. Inst. of Mato Grosso, Cuiaba, Brazil
Ed Wilson Tavares Ferreira , Dept. of Inf., Fed. Inst. of Mato Grosso, Cuiaba, Brazil
Valtemir Emerencio do Nascimento , Dept. of Electr. Eng., State Univ. Julio de Mesquita Filho, Ilha Solteira, Brazil
Ailton Akira Shinoda , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
Bharat Bhargava , Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
pp. 271-276

Visual Analytics Model for Intrusion Detection in Flood Attack (Abstract)

Jinson Zhang , Sch. of Software, Univ. of Technol., Sydney, Sydney, NSW, Australia
Mao Lin Huang , Sch. of Software, Univ. of Technol., Sydney, Sydney, NSW, Australia
pp. 277-284

A Regional Statistics Detection Scheme against Sybil Attacks in WSNs (Abstract)

Mingxi Li , Sch. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Yan Xiong , Sch. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Xuangou Wu , Sch. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Xiancun Zhou , State Key Labs. of Transducer Technol., Shanghai, China
Yuhui Sun , State Key Labs. of Transducer Technol., Shanghai, China
Shenpei Chen , State Key Labs. of Transducer Technol., Shanghai, China
Xiaoya Zhu , Int. Sch., Beijing Univ. of Posts & Telecommun., Beijing, China
pp. 285-291

A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems (Abstract)

Abdulmohsen Almalawi , Sch. of Comput. Sci. & IT, RMIT Univ., Melbourne, VIC, Australia
Zahir Tari , Sch. of Comput. Sci. & IT, RMIT Univ., Melbourne, VIC, Australia
Adil Fahad , Sch. of Comput. Sci. & IT, RMIT Univ., Melbourne, VIC, Australia
Ibrahim Khalil , Sch. of Comput. Sci. & IT, RMIT Univ., Melbourne, VIC, Australia
pp. 292-301

Security Aspects of Military Sensor-Based Defence Systems (Abstract)

Michael N. Johnstone , Security Res. Inst., Edith Cowan Univ., Perth, WA, Australia
Robert Thompson , Sch. of Comput. & Security Sci., Edith Cowan Univ., Perth, WA, Australia
pp. 302-309

A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol (Abstract)

Anmin Fu , Sch. of Comput. Sci. & Eng., Nanjing Univ. of Sci. & Technol., Nanjing, China
Gongxuan Zhang , Sch. of Comput. Sci. & Eng., Nanjing Univ. of Sci. & Technol., Nanjing, China
Zhenchao Zhu , Inf. Security Res. Center, Southeast Univ., Nanjing, China
pp. 310-314

MDS-Based Trust Estimation of Event Reporting Node in VANET (Abstract)

T. Raghu Vamsi Krishna , Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur, Kharagpur, India
Rajesh P. Barnwal , Inf. Technol. Group, Central Mech. Eng. Res. Inst., Durgapur, India
Soumya K. Ghosh , Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur, Kharagpur, India
pp. 315-320

sEncrypt: An Encryption Algorithm Inspired from Biological Processes (Abstract)

Oliver Bonham-Carter , Sch. of Interdiscipl. Inf., Univ. of Nebraska at Omaha, Omaha, NE, USA
Abhishek Parakh , Sch. of Interdiscipl. Inf., Univ. of Nebraska at Omaha, Omaha, NE, USA
Dhundy Bastola , Sch. of Interdiscipl. Inf., Univ. of Nebraska at Omaha, Omaha, NE, USA
pp. 321-327

A Scalable Architecture for Highly Reliable Certification (Abstract)

Xavier Bonnaire , CS Dept., Univ. T cnica Federico Santa Maria, Valparaiso, Chile
Rudyar Cortes , CS Dept., Univ. T cnica Federico Santa Maria, Valparaiso, Chile
Fabrice Kordon , LIP6, Univ. Pierre & Marie Curie, Paris, France
Olivier Marin , LIP6, Univ. Pierre & Marie Curie, Paris, France
pp. 328-335

A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model (Abstract)

Raja Naeem Akram , Cyber Security Lab., Univ. of Waikato, Waikato, New Zealand
Konstantinos Markantonakis , Inf. Security Group, Smart Card Centre, R. Holloway, Univ. of London, Egham, UK
Keith Mayes , Inf. Security Group, Smart Card Centre, R. Holloway, Univ. of London, Egham, UK
pp. 336-345

A Model for Context-Aware Location Identity Preservation Using Differential Privacy (Abstract)

Roland Assam , RWTH Aachen Univ., Aachen, Germany
Thomas Seidl , RWTH Aachen Univ., Aachen, Germany
pp. 346-353

P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering (Abstract)

Toru Nakamura , KDDI R&D Labs. Inc., Fujimino, Japan
Shinsaku Kiyomoto , KDDI R&D Labs. Inc., Fujimino, Japan
Ryu Watanabe , KDDI R&D Labs. Inc., Fujimino, Japan
Yutaka Miyake , KDDI R&D Labs. Inc., Fujimino, Japan
pp. 354-361

Improving the Utility of Differentially Private Data Releases via k-Anonymity (Abstract)

Jordi Soria-Comas , Dept. of Comput. Eng. & Math., Univ. Rovira i Virgili, Tarragona, Spain
Josep Domingo-Ferrer , Dept. of Comput. Eng. & Math., Univ. Rovira i Virgili, Tarragona, Spain
David Sanchez , Dept. of Comput. Eng. & Math., Univ. Rovira i Virgili, Tarragona, Spain
Sergio Martinez , Dept. of Comput. Eng. & Math., Univ. Rovira i Virgili, Tarragona, Spain
pp. 372-379

Scheme of User Privacy Protection Applied to Online Marketing (Abstract)

Maria das Gracas da Silva Oliveira , CIn - Centro de Inf., UFPE - Fed. Univ. of Pernambuco, Recife, Brazil
Ruy J. G. B. de Queiroz , CIn - Centro de Inf., UFPE - Fed. Univ. of Pernambuco, Recife, Brazil
pp. 380-387

An Effective Deferentially Private Data Releasing Algorithm for Decision Tree (Abstract)

Tianqing Zhu , Wuhan Polytech. Univ., Wuhan, Japan
Ping Xiong , Sch. of Inf. & Security Eng., Zhongnan Univ. of Econ. & Law, China
Yang Xiang , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
Wanlei Zhou , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
pp. 388-395

An Application Security Framework for Near Field Communication (Abstract)

Dirar Abu-Saymeh , Sch. of Inf. Technol. & Eng., German-Jordanian Univ., Jordan
Dhiah El Diehn I. Abou-Tair , Sch. of Inf. Technol. & Eng., German-Jordanian Univ., Jordan
Ahmad Zmily , Sch. of Inf. Technol. & Eng., German-Jordanian Univ., Jordan
pp. 396-403

Scalable Attack Representation Model Using Logic Reduction Techniques (Abstract)

Jin Bum Hong , Comput. Sci. & Software Eng. Dept., Univ. of Canterbury, Christchurch, New Zealand
Dong Seong Kim , Comput. Sci. & Software Eng. Dept., Univ. of Canterbury, Christchurch, New Zealand
Tadao Takaoka , Comput. Sci. & Software Eng. Dept., Univ. of Canterbury, Christchurch, New Zealand
pp. 404-411

Formalizing and Modeling Fairness for Benefit Distribution in Collaborations (Abstract)

Florian Volk , CASED Telecooperation Lab., Tech. Univ. Darmstadt, Darmstadt, Germany
Florian Sokoli , CASED Telecooperation Lab., Tech. Univ. Darmstadt, Darmstadt, Germany
Sascha Hauke , CASED Telecooperation Lab., Tech. Univ. Darmstadt, Darmstadt, Germany
Max Muhlhauser , CASED Telecooperation Lab., Tech. Univ. Darmstadt, Darmstadt, Germany
pp. 412-420

Attribute-Based Mining Process for the Organization-Based Access Control Model (Abstract)

Ahmad Samer Wazan , Inst. Mines-Telecom, Telecom SudParis, Evry, France
Gregory Blanc , Inst. Mines-Telecom, Telecom SudParis, Evry, France
Herve Debar , Inst. Mines-Telecom, Telecom SudParis, Evry, France
Joaquin Garcia-Alfaro , Inst. Mines-Telecom, Telecom SudParis, Evry, France
pp. 421-430

Private Multiparty Set Intersection Protocol in Rational Model (Abstract)

Keita Emura , Nat. Inst. of Inf. & Commun. Technol. (NICT), Tokyo, Japan
Atsuko Miyaji , Japan Adv. Inst. of Sci. & Technol. (JAIST), Ishikawa, Japan
Mohammad Shahriar Rahman , Dept. of Comput. Sci. & Eng., Univ. of Asia Pacific (UAP), Dhaka, Bangladesh
pp. 431-438

A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices (Abstract)

Gwan-Hwan Hwang , Dept. of Comput. Sci. & Inf. Eng., Nat. Taiwan Normal Univ., Taipei, Taiwan
Jenn-Zjone Peng , Dept. of Comput. Sci. & Inf. Eng., Nat. Taiwan Normal Univ., Taipei, Taiwan
Wei-Sian Huang , Dept. of Comput. Sci. & Inf. Eng., Nat. Taiwan Normal Univ., Taipei, Taiwan
pp. 439-446

iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search (Abstract)

Fu-Kuo Tseng , Dept. of Comput. Sci., Nat. Chiao-Tung Univ., Hsinchu, Taiwan
Rong-Jaye Chen , Dept. of Comput. Sci., Nat. Chiao-Tung Univ., Hsinchu, Taiwan
Bao-Shuh Paul Lin , Dept. of Comput. Sci., Nat. Chiao-Tung Univ., Hsinchu, Taiwan
pp. 452-458

A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces (Abstract)

Sheikh Mahbub Habib , Telecooperation Lab., Tech. Univ. Darmstadt, Darmstadt, Germany
Vijay Varadharajan , INSS Res. Group, Macquarie Univ., Sydney, NSW, Australia
Max Muhlhauser , Telecooperation Lab., Tech. Univ. Darmstadt, Darmstadt, Germany
pp. 459-468

Reputation Attacks Detection for Effective Trust Assessment among Cloud Services (Abstract)

Talal H. Noor , Sch. of Comput. Sci., Univ. of Adelaide, Adelaide, SA, Australia
Quan Z. Sheng , Sch. of Comput. Sci., Univ. of Adelaide, Adelaide, SA, Australia
Abdullah Alfazi , Sch. of Comput. Sci., Univ. of Adelaide, Adelaide, SA, Australia
pp. 469-476

Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing (Abstract)

Xuejiao Liu , Inst. of Service Eng., Hangzhou Normal Univ., Hangzhou, China
Yingjie Xia , Inst. of Service Eng., Hangzhou Normal Univ., Hangzhou, China
Shasha Jiang , Inst. of Service Eng., Hangzhou Normal Univ., Hangzhou, China
Fubiao Xia , Sch. of Comput. Sci., Univ. of Birmingham, Birmingham, UK
Yanbo Wang , Inf. & Commun. Branch of Zhejiang Power Corp., Hangzhou, China
pp. 477-484

Access Control Management for Cloud (Abstract)

Mansura Habiba , Dept. of Comput. Sci., American Int. Univ. Bangladesh, Dhaka, Bangladesh
Md Rafiqul Islam , Dept. of Comput. Sci., American Int. Univ. Bangladesh, Dhaka, Bangladesh
A. B. M. Shawkat Ali , i-Lab. Australia, QLD, Australia
pp. 485-492

Cloud Computing: Insider Attacks on Virtual Machines during Migration (Abstract)

Adrian Duncan , Dept. of Comput. Sci., Univ. Of Oxford, Oxford, UK
Sadie Creese , Dept. of Comput. Sci., Univ. Of Oxford, Oxford, UK
Michael Goldsmith , Dept. of Comput. Sci., Univ. Of Oxford, Oxford, UK
Jamie S. Quinton , Flinders Centre for Nanoscale Sci. & Technol., Flinders Univ., Adelaide, SA, Australia
pp. 493-500

Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud (Abstract)

Xuyun Zhang , Fac. of Eng. & IT, Univ. of Technol. Sydney, Sydney, NSW, Australia
Chang Liu , Fac. of Eng. & IT, Univ. of Technol. Sydney, Sydney, NSW, Australia
Surya Nepal , ICT Centre, CSIRO, Sydney, NSW, Australia
Chi Yang , Fac. of Eng. & IT, Univ. of Technol. Sydney, Sydney, NSW, Australia
Wanchun Dou , State Key Lab. for Novel Software Technol., Nanjing Univ., Nanjing, China
Jinjun Chen , Fac. of Eng. & IT, Univ. of Technol. Sydney, Sydney, NSW, Australia
pp. 501-508

A Framework for Authentication and Authorization Credentials in Cloud Computing (Abstract)

Nelson Mimura Gonzalez , Lab. of Comput. Networks & Archit., Univ. of Sao Paulo, São Paulo, Brazil
Marco Antonio Torrez Rojas , Lab. of Comput. Networks & Archit., Univ. of Sao Paulo, São Paulo, Brazil
Marcos Vinicius Maciel da Silva , Lab. of Comput. Networks & Archit., Univ. of Sao Paulo, São Paulo, Brazil
Fernando Redigolo , Lab. of Comput. Networks & Archit., Univ. of Sao Paulo, São Paulo, Brazil
Tereza Cristina Melo de Brito Carvalho , Lab. of Comput. Networks & Archit., Univ. of Sao Paulo, São Paulo, Brazil
Charles Christian Miers , State Univ. of Santa Catarina, Joinville, Brazil
pp. 509-516

On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures (Abstract)

Aarthi Krishna , Inf. & Networked Syst. Security Res., Macquarie Univ., Sydney, NSW, Australia
Vijay Varadharajan , Inf. & Networked Syst. Security Res., Macquarie Univ., Sydney, NSW, Australia
Nathan Tarr , Inf. & Networked Syst. Security Res., Macquarie Univ., Sydney, NSW, Australia
pp. 517-524

On the Application of Supervised Machine Learning to Trustworthiness Assessment (Abstract)

Sascha Hauke , Dept. of Comput. Sci., Tech. Univ. Darmstadt, Darmstadt, Germany
Sebastian Biedermann , Dept. of Comput. Sci., Tech. Univ. Darmstadt, Darmstadt, Germany
Max Muhlhauser , Dept. of Comput. Sci., Tech. Univ. Darmstadt, Darmstadt, Germany
Dominik Heider , Dept. of Bioinf., Univ. of Duisburg-Essen, Essen, Germany
pp. 525-534

Building Confidence in Information-Trustworthiness Metrics for Decision Support (Abstract)

Jason R. C. Nurse , Dept. of Comput. Sci., Univ. of Oxford, Oxford, UK
Ioannis Agrafiotis , Dept. of Comput. Sci., Univ. of Oxford, Oxford, UK
Sadie Creese , Dept. of Comput. Sci., Univ. of Oxford, Oxford, UK
Michael Goldsmith , Dept. of Comput. Sci., Univ. of Oxford, Oxford, UK
Koen Lamberts , Dept. of Psychol., Univ. of Warwick, Coventry, UK
pp. 535-543

Efficient Fair UC-Secure Two-Party Computation on Committed Inputs (Abstract)

Ruan Ou , Coll. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Fu Cai , Coll. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Zhou Jing , Coll. of Comput. Sci. & Technol., Hubei Univ. of Technol., Wuhan, China
Han Lansheng , Coll. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Xiao-Yang Liu , Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
pp. 544-551

Trust Enhanced Security Architecture for Detecting Insider Threats (Abstract)

Udaya Tupakula , Inf. & Networked Syst. Security Res., Macquarie Univ., Sydney, NSW, Australia
Vijay Varadharajan , Inf. & Networked Syst. Security Res., Macquarie Univ., Sydney, NSW, Australia
pp. 552-559

An Online Query Authentication System for Outsourced Databases (Abstract)

Ying Zhou , Sch. of Inf. Technol., Univ. of Sydney, Sydney, NSW, Australia
Chen Wang , ICT Center, CSIRO, Epping, NSW, Australia
pp. 570-577

Word N-Gram Based Classification for Data Leakage Prevention (Abstract)

Sultan Alneyadi , Fac. of Sci., Environ., Eng. & Technol., Griffith Univ., Gold Coast, QLD, Australia
Elankayer Sithirasenan , Fac. of Sci., Environ., Eng. & Technol., Griffith Univ., Gold Coast, QLD, Australia
Vallipuram Muthukkumarasamy , Fac. of Sci., Environ., Eng. & Technol., Griffith Univ., Gold Coast, QLD, Australia
pp. 578-585

Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks (Abstract)

Longxiang Gao , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
Ming Li , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
Wanlei Zhou , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
Wen Shi , Fac. of Bus. & Econ., Monash Univ., Clayton, VIC, Australia
pp. 586-593

S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance (Abstract)

Chun Hui Suen , Dept. of Comput. Sci., Univ. of Waikato, Hamilton, New Zealand
Ryan K. L. Ko , Dept. of Comput. Sci., Univ. of Waikato, Hamilton, New Zealand
Yu Shyang Tan , Dept. of Comput. Sci., Univ. of Waikato, Hamilton, New Zealand
Peter Jagadpramana , Dept. of Comput. Sci., Univ. of Waikato, Hamilton, New Zealand
Bu Sung Lee , Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore, Singapore
pp. 594-602

A Direct Insight into Victims of Cybercrime (Abstract)

Nicholas Patterson , Deakin Univ., Waurn Ponds, VIC, Australia
Michael Hobbs , Deakin Univ., Waurn Ponds, VIC, Australia
Darren Palmer , Deakin Univ., Waurn Ponds, VIC, Australia
pp. 603-610

Card-Present Transactions on the Internet Using the Smart Card Web Server (Abstract)

Lazaros Kyrillidis , Inf. Security Group R. Holloway, Univ. of London Egham, Egham, UK
Keith Mayes , Inf. Security Group R. Holloway, Univ. of London Egham, Egham, UK
Boris Chazalet , Orange Labs. UK, London, UK
Konstantinos Markantonakis , Inf. Security Group R. Holloway, Univ. of London Egham, Egham, UK
pp. 611-619

Secure Single Sign-On Schemes Constructed from Nominative Signatures (Abstract)

Jingquan Wang , Center for Comput. & Inf. Security Res., Univ. of Wollongong, Wollongong, NSW, Australia
Guilin Wang , Center for Comput. & Inf. Security Res., Univ. of Wollongong, Wollongong, NSW, Australia
Willy Susilo , Center for Comput. & Inf. Security Res., Univ. of Wollongong, Wollongong, NSW, Australia
pp. 620-627

Profiling Phishing Email Based on Clustering Approach (Abstract)

Isredza Rahmi A. Hamid , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
Jemal H. Abawajy , Sch. of Inf. Technol., Deakin Univ., Burwood, VIC, Australia
pp. 628-635

Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks (Abstract)

Lei Pan , Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia
Yan Zhou , Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia
pp. 636-643

Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications (Abstract)

Wei Zhou , Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
Yang Xu , Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
Guojun Wang , Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
pp. 644-650

Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication (Abstract)

Ming Zheng , Inst. for Network Sci. & Cyberspace, Tsinghua Univ., Beijing, China
Jianping Wu , Inst. for Network Sci. & Cyberspace, Tsinghua Univ., Beijing, China
Haixin Duan , Inst. for Network Sci. & Cyberspace, Tsinghua Univ., Beijing, China
pp. 651-658

Securing RTP Packets Using Per-Packet Selective Encryption Scheme for Real-Time Multimedia Applications (Abstract)

Younchan Jung , Inf., Comm. & Electron. Eng., Catholic Univ. of Korea, Bucheon, South Korea
Enrique Festijo , Inf., Comm. & Electron. Eng., Catholic Univ. of Korea, Bucheon, South Korea
pp. 659-666

Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy (Abstract)

Alasdair Thomason , Dept. of Comput. Sci., Univ. of Warwick, Coventry, UK
Matthew Leeke , Dept. of Comput. Sci., Univ. of Warwick, Coventry, UK
Matthew Bradbury , Dept. of Comput. Sci., Univ. of Warwick, Coventry, UK
Arshad Jhumka , Dept. of Comput. Sci., Univ. of Warwick, Coventry, UK
pp. 667-674

Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic (Abstract)

Adnan Aziz , Comput. Networking Technol. Group, Univ. of Duisburg-Essen, Essen, Germany
Dirk Hoffstadt , Comput. Networking Technol. Group, Univ. of Duisburg-Essen, Essen, Germany
Sebastian Ganz , Comput. Networking Technol. Group, Univ. of Duisburg-Essen, Essen, Germany
Erwin Rathgeb , Comput. Networking Technol. Group, Univ. of Duisburg-Essen, Essen, Germany
pp. 675-682

Security Analysis of a Paillier-Based Threshold Proxy Signature Scheme (Abstract)

Minghui Zheng , Dept. of Comput. Sci., Hubei Univ. for Nat., Enshi, China
Yongquan Cui , Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Liang Chen , Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
pp. 683-687

A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN (Abstract)

Muhammad R. Ahmed , Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
Xu Huang , Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
Hongyan Cui , Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecommun., Beijing, China
pp. 688-693

Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps (Abstract)

Hui Cui , Sch. of Comput. Sci. & Software Eng., Univ. of Wollongong, Wollongong, NSW, Australia
Yi Mu , Sch. of Comput. Sci. & Software Eng., Univ. of Wollongong, Wollongong, NSW, Australia
Man Ho Au , Sch. of Comput. Sci. & Software Eng., Univ. of Wollongong, Wollongong, NSW, Australia
pp. 704-711

From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password (Abstract)

Weiyu Jiang , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Ji Xiang , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Limin Liu , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Daren Zha , Univ. of Chinese Acad. of Sci., Beijing, China
Lei Wang , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
pp. 712-719

Identity-Based Mediated RSA Revisited (Abstract)

Ibrahim Elashry , Centre for Comput. & Inf. Security Res., Univ. of Wollongong, Wollongong, NSW, Australia
Yi Mu , Centre for Comput. & Inf. Security Res., Univ. of Wollongong, Wollongong, NSW, Australia
Willy Susilo , Centre for Comput. & Inf. Security Res., Univ. of Wollongong, Wollongong, NSW, Australia
pp. 728-735

Portable Personal Identity Provider in Mobile Phones (Abstract)

Md Sadek Ferdous , Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK
Ron Poet , Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK
pp. 736-745

Multi-factor Authentication in Key Management Systems (Abstract)

Rick Lopes de Souza , Inf. & Stat. Dept., Fed. Univ. of Santa Catarina Santa Catarina, Florianopolis, Brazil
Lau Cheuk Lung , Inf. & Stat. Dept., Fed. Univ. of Santa Catarina Santa Catarina, Florianopolis, Brazil
Ricardo Felipe Custodio , Inf. & Stat. Dept., Fed. Univ. of Santa Catarina Santa Catarina, Florianopolis, Brazil
pp. 746-752

A Semantic Policy Framework for Context-Aware Access Control Applications (Abstract)

A. S. M. Kayes , Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Hawthorn, VIC, Australia
Jun Han , Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Hawthorn, VIC, Australia
Alan Colman , Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Hawthorn, VIC, Australia
pp. 753-762

Feature Based Video Watermarking Resistant to Geometric Distortions (Abstract)

Xiao-Chen Yuan , Dept. of Comput. & Inf. Sci., Univ. of Macau, Macao, China
Chi-Man Pun , Dept. of Comput. & Inf. Sci., Univ. of Macau, Macao, China
pp. 763-767

Exploring the Guessability of Image Passwords Using Verbal Descriptions (Abstract)

Soumyadeb Chowdhury , Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK
Ron Poet , Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK
Lewis Mackenzie , Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK
pp. 768-775

Public Verification of Outsourced Computation of Polynomial Functions (Abstract)

Peili Li , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Haixia Xu , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Shu Guo , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
pp. 776-780

Mitigating Malicious Updates: Prevention of Insider Threat to Databases (Abstract)

Harini Ragavan , Comput. Sci. & Comput. Eng. Dept., Univ. of Arkansas, Fayetteville, AR, USA
Brajendra Panda , Comput. Sci. & Comput. Eng. Dept., Univ. of Arkansas, Fayetteville, AR, USA
pp. 781-788

De-anonymization Attack on Geolocated Data (Abstract)

Sebastien Gambs , INRIA, Univ. de Rennes 1, Rennes, France
Marc-Olivier Killijian , LAAS, Toulouse, France
Miguel Nunez del Prado Cortez , LAAS, Toulouse, France
pp. 789-797

Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines (Abstract)

Manzur Murshed , Gippsland Sch. of Inf. Technol., Monash Univ., Churchill, VIC, Australia
Tishna Sabrina , Gippsland Sch. of Inf. Technol., Monash Univ., Churchill, VIC, Australia
Anindya Iqbal , Gippsland Sch. of Inf. Technol., Monash Univ., Churchill, VIC, Australia
Mortuza Ali , Gippsland Sch. of Inf. Technol., Monash Univ., Churchill, VIC, Australia
pp. 798-804

Role Mining Using Boolean Matrix Decomposition with Hierarchy (Abstract)

Wei Ye , Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Ruixuan Li , Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Huaqing Li , Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
pp. 805-812

A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks (Abstract)

Guowei Wu , Sch. of Software, Dalian Univ. of Technol., Dalian, China
Jia Wang , Sch. of Software, Dalian Univ. of Technol., Dalian, China
Lin Yao , Sch. of Software, Dalian Univ. of Technol., Dalian, China
Chi Lin , Sch. of Software, Dalian Univ. of Technol., Dalian, China
pp. 813-820

A Place-Aware Stereotypical Trust Supporting Scheme (Abstract)

Gonzalo Huerta-Canepa , Dept. of Inf. & Commun., KAIST, Daejeon, South Korea
Seungwook Han , Dept. of Comput. Sci., KAIST, Daejeon, South Korea
Dongman Lee , Dept. of Inf. & Commun., KAIST, Daejeon, South Korea
Byoungoh Kim , Dept. of Comput. Sci., KAIST, Daejeon, South Korea
pp. 821-828

An Endorsement Trust Model (Abstract)

Charles Thevathayan , Sch. of Comput. Sci. & Inf. Technol., RMIT, Melbourne, VIC, Australia
James Harland , Sch. of Comput. Sci. & Inf. Technol., RMIT, Melbourne, VIC, Australia
Peter Bertok , Sch. of Comput. Sci. & Inf. Technol., RMIT, Melbourne, VIC, Australia
pp. 829-836

Local Monitoring and Maintenance for Operational Wireless Sensor Networks (Abstract)

Md Zakirul Alam Bhuiyan , Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
Guojun Wang , Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
Jiannong Cao , Dept. of Comput., Hong Kong Polytech. Univ., Kowloon, China
Jie Wu , Dept. of Comput. & Inf. Sci., Temple Univ., Philadelphia, PA, USA
pp. 837-844

A Probabilistic Model for Estimating the Power Consumption of Processors and Network Interface Cards (Abstract)

Waltenegus Dargie , Fac. of Comput. Sci., Tech. Univ. of Dresden, Dresden, Germany
Jianjun Wen , Fac. of Comput. Sci., Tech. Univ. of Dresden, Dresden, Germany
pp. 845-852

Automatic Locality Exploitation in the Codelet Model (Abstract)

Chen Chen , Univ. of Delaware, Newark, DE, USA
Yao Wu , Univ. of Delaware, Newark, DE, USA
Joshua Suetterlein , Univ. of Delaware, Newark, DE, USA
Long Zheng , Shanghai Jiao Tong Univ., Shanghai, China
Minyi Guo , Shanghai Jiao Tong Univ., Shanghai, China
Guang R. Gao , Univ. of Delaware, Newark, DE, USA
pp. 853-862

GPU Acceleration of Interior Point Methods in Large Scale SVM Training (Abstract)

Tao Li , Coll. of Inf. Tech. Sci., Nankai Univ., Tianjin, China
Hua Li , Coll. of Inf. Tech. Sci., Nankai Univ., Tianjin, China
Xuechen Liu , Coll. of Inf. Tech. Sci., Nankai Univ., Tianjin, China
Shuai Zhang , Coll. of Inf. Tech. Sci., Nankai Univ., Tianjin, China
Kai Wang , Coll. of Inf. Tech. Sci., Nankai Univ., Tianjin, China
Yulu Yang , Coll. of Inf. Tech. Sci., Nankai Univ., Tianjin, China
pp. 863-870

An Analysis of Driver Domain Offload for Paravirtualized Communication (Abstract)

Chung Lee , Res. Sch. of Comput. Sci., Australian Nat. Univ., Canberra, ACT, Australia
Peter Strazdins , Res. Sch. of Comput. Sci., Australian Nat. Univ., Canberra, ACT, Australia
pp. 871-878

Energy-Performance Modeling and Optimization of Parallel Computing in On-Chip Networks (Abstract)

Shuai Zhang , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Zhiyong Liu , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Dongrui Fan , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Fonglong Song , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Mingzhe Zhang , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
pp. 879-886

SciHive: Array-Based Query Processing with HiveQL (Abstract)

Yifeng Geng , Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
Xiaomeng Huang , Minist. of Educ. Key Lab. for Earth Syst. Modeling, Tsinghua Univ., Beijing, China
Meiqi Zhu , Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
Huabin Ruan , Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
Guangwen Yang , Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
pp. 887-894

Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious Participants (Abstract)

Burkhard Englert , Dept. of Comput. Sci., California State Univ. Long Beach, Long Beach, CA, USA
Reza Gheissari , Dept. of Math., Columbia Univ., New York, NY, USA
pp. 895-902

Static or Dynamic: Trade-Offs for Task Dependency Analysis for Heterogeneous MPSoC (Abstract)

Qi Guo , Suzhou Inst. of Adv. Study, Univ. of Sci. & Technol. of China, Suzhou, China
Chao Wang , Suzhou Inst. of Adv. Study, Univ. of Sci. & Technol. of China, Suzhou, China
Xuehai Zhou , Sch. of Comput. Sci., Univ. of Sci. & Technol. of China, Hefei, China
Xi Li , Sch. of Comput. Sci., Univ. of Sci. & Technol. of China, Hefei, China
pp. 903-910

CFIO: A Fast I/O Library for Climate Models (Abstract)

Wencan Wang , Center for Earth Syst. Sci., Tsinghua Univ., Beijing, China
Xiaomeng Huang , Center for Earth Syst. Sci., Tsinghua Univ., Beijing, China
Haohuan Fu , Center for Earth Syst. Sci., Tsinghua Univ., Beijing, China
Yong Hu , Center for Earth Syst. Sci., Tsinghua Univ., Beijing, China
Shizhen Xu , Center for Earth Syst. Sci., Tsinghua Univ., Beijing, China
Guangwen Yang , Center for Earth Syst. Sci., Tsinghua Univ., Beijing, China
pp. 911-918

Automatic Loop-Based Pipeline Optimization on Reconfigurable Platform (Abstract)

Qi Guo , Suzhou Inst. of Adv. Study, Univ. of Sci. & Technol. of China, Suzhou, China
Chao Wang , Suzhou Inst. of Adv. Study, Univ. of Sci. & Technol. of China, Suzhou, China
Xiaojing Feng , Suzhou Inst. of Adv. Study, Univ. of Sci. & Technol. of China, Suzhou, China
Xuehai Zhou , Sch. of Comput. Sci., Univ. of Sci. & Technol. of China, Hefei, China
pp. 919-926

Register Allocation by Incremental Graph Colouring for Clustered VLIW Processors (Abstract)

Xuemeng Zhang , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Hui Wu , Sch. of Comput. Sci. & Eng., Univ. of New South Wales, Sydney, NSW, Australia
Haiyan Sun , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
pp. 927-934

TxSnoop: Power-Aware Transactional Snoop (Abstract)

Ehsan Atoofian , Electr. Eng. Dept., Lakehead Univ., Thunder Bay, ON, Canada
pp. 935-940

Regional Consistency: Programmability and Performance for Non-cache-coherent Systems (Abstract)

Bharath Ramesh , Dept. of Comput. Sci., Virginia Tech, Blacksburg, VA, USA
Calvin J. Ribbens , Dept. of Comput. Sci., Virginia Tech, Blacksburg, VA, USA
pp. 941-948

A Comparative Study of Job Scheduling Strategies in Large-Scale Parallel Computational Systems (Abstract)

Aftab Ahmed Chandio , Shenzhen Inst. of Adv. Technol., Shenzhen, China
Cheng-Zhong Xu , Shenzhen Inst. of Adv. Technol., Shenzhen, China
Nikos Tziritas , Shenzhen Inst. of Adv. Technol., Shenzhen, China
Kashif Bilal , Dept. of Electr. & Comput. Eng., North Dakota State Univ., Fargo, ND, USA
Samee U. Khan , Dept. of Electr. & Comput. Eng., North Dakota State Univ., Fargo, ND, USA
pp. 949-957

Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Pareto Upper Bounds (Abstract)

Savio S. H. Tse , Comput. Eng. Dept., Istanbul Univ., Istanbul, Turkey
pp. 958-965

Collaborative Parallel Local Search for Simplified Protein Structure Prediction (Abstract)

Mahmood A. Rashid , Inst. for Integrated & Intell. Syst. (IIIS), Griffith Univ., Griffith, NSW, Australia
M. A. Hakim Newton , Inst. for Integrated & Intell. Syst. (IIIS), Griffith Univ., Griffith, NSW, Australia
Md Tamjidul Hoque , Comput. Sci., Univ. of New Orleans, New Orleans, LA, USA
Abdul Sattar , Inst. for Integrated & Intell. Syst. (IIIS), Griffith Univ., Griffith, NSW, Australia
pp. 966-973

On Change Detection of XML Schemas (Abstract)

Abdullah Baqasah , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
Eric Pardede , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
Irena Holubova , Dept. of Software Eng., Charles Univ. Prague, Prague, Czech Republic
Wenny Rahayu , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
pp. 974-982

Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels (Abstract)

Dong Xiang , Sch. of Software, Tsinghua Univ., Beijing, China
Zhigang Yu , Dept. of Comput. Sci. & Tech., Tsinghua Univ., Beijing, China
Jie Wu , Dept. of Comput. & Inf. Sci., Temple Univ., Philadelphia, PA, USA
pp. 983-990

Quantitative Analysis of Inter-block Dependence in Speculative Execution (Abstract)

Junrui Zhou , Sch. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Hong An , Sch. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Yanyan Zou , Sch. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Tao Sun , Sch. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
pp. 991-998

Heterogeneous Multiconstraint Application Partitioner (HMAP) (Abstract)

Servesh Muralidharan , Lero & Sch. of Comput. Sci. & Stat., Trinity Coll. Dublin, Dublin, Ireland
Aravind Vasudevan , Lero & Sch. of Comput. Sci. & Stat., Trinity Coll. Dublin, Dublin, Ireland
Avinash Malik , IBM Res. - Ireland, Dublin, Ireland
David Gregg , Lero & Sch. of Comput. Sci. & Stat., Trinity Coll. Dublin, Dublin, Ireland
pp. 999-1007

A Hypercubic Overlay Using Bloom-Filter Based Addressing for a Non-dedicated Distributed Tag-Based Pub/Sub System (Abstract)

Xiaochuan Yu , Dept. of Comput., Hong Kong Polytech. Univ., Kowloon, China
Toong Shoon Alvin Chan , Dept. of Comput., Hong Kong Polytech. Univ., Kowloon, China
pp. 1008-1015

KVM-Loongson: An Efficient Hypervisor on MIPS (Abstract)

Yunfang Tai , State Key Lab. of Comput. Archit., Beijing, China
Wanwei Cai , State Key Lab. of Comput. Archit., Beijing, China
Qi Liu , State Key Lab. of Comput. Archit., Beijing, China
Ge Zhange , State Key Lab. of Comput. Archit., Beijing, China
pp. 1016-1022

The Buffered Edge Reconfigurable Cell Array and Its Applications (Abstract)

Rui Shan , Sch. of Microelectron., XiDian Univ., Xi'An, China
Tao Li , Res. Center for Telecom ASIC Design, Xi'An Univ. of Posts & Telecom, Xi'An, China
Jungang Han , Res. Center for Telecom ASIC Design, Xi'An Univ. of Posts & Telecom, Xi'An, China
pp. 1023-1030

MapReduce: Limitations, Optimizations and Open Issues (Abstract)

Vasiliki Kalavri , KTH R. Inst. of Technol., Stockholm, Sweden
Vladimir Vlassov , KTH R. Inst. of Technol., Stockholm, Sweden
pp. 1031-1038

Scenario-Based Execution Method for Massively Parallel Accelerators (Abstract)

Shinichi Yamagiwa , Dept. of Comput. Sci., Univ. of Tsukuba, Tsukuba, Japan
Shixun Zhang , Dept. of Comput. Sci., Univ. of Tsukuba, Tsukuba, Japan
pp. 1039-1048

An Iterative Optimization Framework for Adaptive Workflow Management in Computational Clouds (Abstract)

Long Wang , Inst. of High Performance Comput., A*STAR, Singapore, Singapore
Rubing Duan , Inst. of High Performance Comput., A*STAR, Singapore, Singapore
Xiaorong Li , Inst. of High Performance Comput., A*STAR, Singapore, Singapore
Sifei Lu , Inst. of High Performance Comput., A*STAR, Singapore, Singapore
Terence Hung , Inst. of High Performance Comput., A*STAR, Singapore, Singapore
Rodrigo N. Calheiros , Univ. of Melbourne, Melbourne, VIC, Australia
Rajkumar Buyya , Univ. of Melbourne, Melbourne, VIC, Australia
pp. 1049-1056

DataSteward: Using Dedicated Compute Nodes for Scalable Data Management on Public Clouds (Abstract)

Radu Tudoran , INRIA Rennes - Bretagne Atlantique, Bretagne Atlantiques, France
Alexandru Costan , IRISA / INSA Rennes, Rennes, France
Gabriel Antoniu , INRIA Rennes - Bretagne Atlantique, Bretagne Atlantiques, France
pp. 1057-1064

A Data Prefetching Model for Desktop Grids and the Condor Use Case (Abstract)

Walid Saad , LaTICE, Univ. de Tunis, Tunis, Tunisia
Heithem Abbes , LaTICE, Univ. de Tunis, Tunis, Tunisia
Christophe Cerin , LIPN, Univ. Paris 13, Villetaneuse, France
Mohamed Jemni , LaTICE, Univ. de Tunis, Tunis, Tunisia
pp. 1065-1072

Scalable Multi Swarm-Based Algorithms with Lagrangian Relaxation for Constrained Problems (Abstract)

Antonio Gomez-Iglesias , Math. & Inf. Sci., CSIRO, Clayton, VIC, Australia
Andreas T. Ernst , Math. & Inf. Sci., CSIRO, Clayton, VIC, Australia
Gaurav Singh , Math. & Inf. Sci., CSIRO, Clayton, VIC, Australia
pp. 1073-1080

Real-Time Effective Framework for Unstructured Data Mining (Abstract)

Richard K. Lomotey , Dept. of Comput. Sci., Univ. of Saskatchewan, Saskatoon, SK, Canada
Ralph Deters , Dept. of Comput. Sci., Univ. of Saskatchewan, Saskatoon, SK, Canada
pp. 1081-1088

Performance Implications of Task Scheduling by Predicting Network Throughput on the Internet (Abstract)

Chunghan Lee , Toyohashi Univ. of Technol., Toyohashi, Japan
Hirotake Abe , Univ. of Tsukuba, Tsukuba, Japan
Toshio Hirotsu , Hosei Univ., Koganei, Japan
Kyoji Umemura , Toyohashi Univ. of Technol., Toyohashi, Japan
pp. 1089-1098

H-PFSP: Efficient Hybrid Parallel PFSP Protected Scheduling for MapReduce System (Abstract)

Yin Li , Tsinghua Nat. Lab. for Inf. Sci. & Technol. (TNList), Tsinghua Univ. Beijing, Beijing, China
Chuang Lin , Tsinghua Nat. Lab. for Inf. Sci. & Technol. (TNList), Tsinghua Univ. Beijing, Beijing, China
Fengyuan Ren , Tsinghua Nat. Lab. for Inf. Sci. & Technol. (TNList), Tsinghua Univ. Beijing, Beijing, China
Yifeng Geng , Tsinghua Nat. Lab. for Inf. Sci. & Technol. (TNList), Tsinghua Univ. Beijing, Beijing, China
pp. 1099-1106

Low-Cost Load Balancing for Parallel Particle-in-Cell Simulations with Thick Overlapping Layers (Abstract)

Yohei Miyake , Grad. Sch. of Syst. Inf., Kobe Univ., Kobe, Japan
Hiroshi Nakashima , Acad. Center for Comput. & Media Studies, Kyoto Univ., Kyoto, Japan
pp. 1107-1114

An Optimal Algorithm for Extreme Scale Job Launching (Abstract)

Joshua D. Goehner , Rogue Wave Software, Inc., Natick, MA, USA
Taylor L. Groves , Univ. of New Mexico, Albuquerque, NM, USA
Dorian C. Arnold , Univ. of New Mexico, Albuquerque, NM, USA
Dong H. Ahn , Lawrence Livermore Nat. Lab., Livermore, CA, USA
Gregory L. Lee , Lawrence Livermore Nat. Lab., Livermore, CA, USA
pp. 1115-1122

Power Management Support to Optimal Duty-Cycling in Stateful Multitasking WSN (Abstract)

Carlo Brandolese , DEIB, Politec. di Milano, Milan, Italy
William Fornaciari , DEIB, Politec. di Milano, Milan, Italy
Luigi Rucco , DEIB, Politec. di Milano, Milan, Italy
pp. 1123-1132

An Efficient Task Partitioning and Scheduling Method for Symmetric Multiple GPU Architecture (Abstract)

Cheng Luo , Grad. Sch. of Inf. Sci. & Technol., Univ. of Tokyo, Tokyo, Japan
Reiji Suda , Grad. Sch. of Inf. Sci. & Technol., Univ. of Tokyo, Tokyo, Japan
pp. 1133-1142

Performance Optimization of Aho-Corasick Algorithm on a GPU (Abstract)

Nhat-Phuong Tran , Dept. of Comput. Sci. & Eng., Myongji Univ., Yongin, South Korea
Myungho Lee , Dept. of Comput. Sci. & Eng., Myongji Univ., Yongin, South Korea
Sugwon Hong , Dept. of Comput. Sci. & Eng., Myongji Univ., Yongin, South Korea
Jongwoo Bae , Dept. of Inf. & Commun. Eng., Myongji Univ., Yongin, South Korea
pp. 1143-1152

Combining Process-Based Cache Partitioning and Pollute Region Isolation to Improve Shared Last Level Cache Utilization on Multicore Systems (Abstract)

Tao Huang , Microprocessor R&D Center, Peking Univ., Beijing, China
Jing Wang , Microprocessor R&D Center, Peking Univ., Beijing, China
Xuetao Guan , Microprocessor R&D Center, Peking Univ., Beijing, China
Qi Zhong , Microprocessor R&D Center, Peking Univ., Beijing, China
Keyi Wang , Microprocessor R&D Center, Peking Univ., Beijing, China
pp. 1153-1160

Hybrid Range Consistent Hash Partitioning Strategy -- A New Data Partition Strategy for NoSQL Database (Abstract)

Zhikun Chen , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Shuqiang Yang , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Shuang Tan , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Ge Zhang , Beijing Aeronaut. Eng. Technol. Res. Center, Beijing, China
Huiyu Yang , Beijing Aeronaut. Eng. Technol. Res. Center, Beijing, China
pp. 1161-1169

Tuning SPMD Applications in Order to Increase Performability (Abstract)

Hugo Meyer , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma of Barcelona, Barcelona, Spain
Ronal Muresano , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma of Barcelona, Barcelona, Spain
Dolores Rexachs , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma of Barcelona, Barcelona, Spain
Emilio Luque , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma of Barcelona, Barcelona, Spain
pp. 1170-1178

A Parallel Runtime Framework for Communication Intensive Stream Applications (Abstract)

Servesh Muralidharan , Lero & Sch. of Comput. Sci. & Stat., Trinity Coll. Dublin, Dublin, Ireland
Kevin Casey , Lero & Sch. of Comput., Dublin City Univ., Dublin, Ireland
David Gregg , Lero & Sch. of Comput. Sci. & Stat., Trinity Coll. Dublin, Dublin, Ireland
pp. 1179-1187

A New Design Paradigm for Designing Reactive Pervasive Concurrent Systems with an Ambient Intelligence Example (Abstract)

HeeJong Park , Dept. of Electr. & Comput. Eng., Univ. of Auckland, Auckland, New Zealand
Zoran Salcic , Dept. of Electr. & Comput. Eng., Univ. of Auckland, Auckland, New Zealand
Kevin I-Kai Wang , Dept. of Electr. & Comput. Eng., Univ. of Auckland, Auckland, New Zealand
Udayanto Dwi Atmojo , Dept. of Electr. & Comput. Eng., Univ. of Auckland, Auckland, New Zealand
Wei-Tsun Sun , INRIA, Rhones-Alpes, France
Avinash Malik , Dept. of Electr. & Comput. Eng., Univ. of Auckland, Auckland, New Zealand
pp. 1188-1197

A Path-Adaptive Opto-electronic Hybrid NoC for Chip Multi-processor (Abstract)

Mingzhe Zhang , Coll. of Comput. Sci., Inner Mongolia Univ., Huhhot, China
Da Wang , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Xiaochun Ye , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Liqiang He , Coll. of Comput. Sci., Inner Mongolia Univ., Huhhot, China
Dongrui Fan , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Zhiyong Liu , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
pp. 1198-1205

A Study of Leveraging Memory Level Parallelism for DRAM System on Multi-core/Many-Core Architecture (Abstract)

Licheng Chen , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Yongbing Huang , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Yungang Bao , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Guangming Tan , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Zehan Cui , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
Mingyu Chen , State Key Lab. of Comput. Archit., Inst. of Comput. Technol., Beijing, China
pp. 1206-1215

Multi-core Deployment Optimization Using Simulated Annealing and Ant Colony Optimization (Abstract)

Hamilton Turner , Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech., Bradley, IL, USA
Jules White , Dept. of Electr. Eng. & Comput. Sci., Vanderbilt Univ., Nashville, TN, USA
pp. 1216-1223

A Next Generation Object-Oriented Environment for Real-Time Database Application Development (Abstract)

Zied Ellouze , CES-ENIS, Sfax Univ., Sfax, Tunisia
Nada Louati , MIRACL-ISIMS, Sfax Univ., Sfax, Tunisia
Rafik Bouaziz , MIRACL-ISIMS, Sfax Univ., Sfax, Tunisia
pp. 1224-1232

Genome Assembly on a Multicore System (Abstract)

Abhishek Biswas , Dept. of Comput. Sci., Old Dominion Univ., Norfolk, VA, USA
Desh Ranjan , Dept. of Comput. Sci., Old Dominion Univ., Norfolk, VA, USA
Mohammad Zubair , Dept. of Comput. Sci., Old Dominion Univ., Norfolk, VA, USA
pp. 1233-1240

The Value of Automation: A Study of MPI Application Migration Methods (Abstract)

Karolina Sarnowska-Upton , Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA
Andrew Grimshaw , Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA
pp. 1241-1248

Advanced Validation of the DVMS Approach to Fully Distributed VM Scheduling (Abstract)

Flavien Quesnel , ASCOLA Res. Group, Ecole des Mines de Nantes, Nantes, France
Adrien Lebre , ASCOLA Res. Group, Ecole des Mines de Nantes, Nantes, France
Jonathan Pastor , ASCOLA Res. Group, Ecole des Mines de Nantes, Nantes, France
Mario Sudholt , ASCOLA Res. Group, Ecole des Mines de Nantes, Nantes, France
Daniel Balouek , HEMERA Large-Scale Initiative, INRIA, Grenoble, France
pp. 1249-1256

Partitioned Fixed-Priority Real-Time Scheduling Based on Dependent Task-Split on Multicore Platform (Abstract)

Guowei Wu , Sch. of Software, Dalian Univ. of Technol., Dalian, China
Ying Li , Sch. of Software, Dalian Univ. of Technol., Dalian, China
Jiankang Ren , Sch. of Software, Dalian Univ. of Technol., Dalian, China
Chi Lin , Sch. of Software, Dalian Univ. of Technol., Dalian, China
pp. 1257-1264

Enhanced Method for the Signature Adaptability to the Application Behavior (Abstract)

Alvaro Wong , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma de Barcelona, Barcelona, Spain
Dolores Rexachs , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma de Barcelona, Barcelona, Spain
Emilio Luque , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma de Barcelona, Barcelona, Spain
pp. 1265-1273

Saving Time in a Program Robustness Evaluation (Abstract)

Joao Gramacho , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma de Barcelona, Barcelona, Spain
Dolores Rexachs , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma de Barcelona, Barcelona, Spain
Emilio Luque , Comput. Archit. & Oper. Syst. Dept., Univ. Autonoma de Barcelona, Barcelona, Spain
pp. 1274-1282

SeaRum: A Cloud-Based Service for Association Rule Mining (Abstract)

Daniele Apiletti , Dipt. di Autom. e Inf., Politec. di Torino, Turin, Italy
Elena Baralis , Dipt. di Autom. e Inf., Politec. di Torino, Turin, Italy
Tania Cerquitelli , Dipt. di Autom. e Inf., Politec. di Torino, Turin, Italy
Silvia Chiusano , Dipt. di Autom. e Inf., Politec. di Torino, Turin, Italy
Luigi Grimaudo , Dipt. di Autom. e Inf., Politec. di Torino, Turin, Italy
pp. 1283-1290

TurboSockets: Democratizing Distributed Deduplication (Abstract)

Joao Salada , INESC-ID, Tech. Univ. Lisbon, Lisbon, Portugal
Joao Barreto , INESC-ID, Tech. Univ. Lisbon, Lisbon, Portugal
pp. 1291-1298

Dependency-Based Energy-Efficient Scheduling for Homogeneous Multi-core Clusters (Abstract)

Yanheng Zhao , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Xin Li , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Zhiping Jia , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Lei Ju , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Ziliang Zong , Dept. of Comput. Sci., Texas State Univ., San Marcos, TX, USA
pp. 1299-1306

Context-Aware Routing Algorithm for WSNs Based on Unequal Clustering (Abstract)

Longpeng Zheng , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Zhiping Jia , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Ruihua Zhang , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Hui Xia , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Lei Ju , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Chuanhao Qu , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
pp. 1307-1314

SMC: A Shared Memory Based SpaceWire Controller Solution (Abstract)

Qingfeng Yu , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Yijiao Chen , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Xilong Mao , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Baokang Zhao , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Jinfeng Huang , Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
pp. 1315-1322

LogicCrowd: A Declarative Programming Platform for Mobile Crowdsourcing (Abstract)

Jurairat Phuttharak , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
Seng W. Loke , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
pp. 1323-1330

Conflict and Interference Resolution for Physical Annotation Systems (Abstract)

Ahmad A. Alzahrani , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
Seng W. Loke , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
Hongen Lu , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
pp. 1331-1338

Normal Vector Based Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks (Abstract)

Wei Wang , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Ruihua Zhang , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Zhongwei Chen , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Lei Ju , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
pp. 1339-1344

Proximity-Based Service beyond 4G Network: Peer-Aware Discovery and Communication Using E-UTRAN and WLAN (Abstract)

Yi-Hsueh Tsai , Inst. for Inf. Ind., Taipei, Taiwan
Yi-Ting Lin , Inst. for Inf. Ind., Taipei, Taiwan
KanChei Loa , Inst. for Inf. Ind., Taipei, Taiwan
Tsung-Yu Tsai , Inst. for Inf. Ind., Taipei, Taiwan
Chun-Che Chien , Inst. for Inf. Ind., Taipei, Taiwan
Dun-Cheih Huang , Dept. Commun. Eng., Nat. Central Univ., Chungli, Taiwan
Shiann-Tsong Sheu , Dept. Commun. Eng., Nat. Central Univ., Chungli, Taiwan
Pei-Shan Kao , Dept. Commun. Eng., Nat. Central Univ., Chungli, Taiwan
pp. 1345-1350

Characterization of OSPF Convergence with Correlated Failures (Abstract)

Dan Zhao , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Chunqing Wu , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Xiaofeng Hu , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Xiaofeng Wang , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Baokang Zhao , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
pp. 1351-1356

Fast Intra Mode Decision Algorithm Based on Spatial-Domain Energy for H.264/AVC (Abstract)

Yinbo Liu , Dept. of Electron. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Xingang Liu , Dept. of Electron. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Zhixin Shen , Dept. of Electron. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Laurence Tianruo Yang , Dept. of Comput. Sci., St. Francis Xavier Univ., Antigonish, NS, Canada
pp. 1357-1361

A Location Management Algorithm for LEO Satellite Networks (Abstract)

Yanpeng Ma , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Wei Peng , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Xiaofeng Wang , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Baokang Zhao , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Jinshu Su , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Chunqing Wu , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
pp. 1362-1366

A Distributed Routing Algorithm for LEO Satellite Networks (Abstract)

Yanpeng Ma , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Wei Peng , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Wanrong Yu , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Jinshu Su , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Chunqing Wu , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Guohong Zhao , Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
pp. 1367-1371

Communication and Collaboration Service Components for Ubiquitous Communication Applications (Abstract)

Ki-Sook Chung , Future Internet Res. Dept., ETRI, Dae-jeon, South Korea
Young-Mee Shin , Future Internet Res. Dept., ETRI, Dae-jeon, South Korea
pp. 1372-1377

Quantitative Risk Analysis for Mobile Cloud Computing: A Preliminary Approach and a Health Application Case Study (Abstract)

Javeria Samad , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
Seng W. Loke , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
Karl Reed , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
pp. 1378-1385

Thermal-Aware On-Chip Memory Architecture Exploration (Abstract)

Yang Li , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Lei Ju , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Zhiping Jia , Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Yi Wang , Dept. of Comput., Hong Kong Polytech. Univ., Hong Kong, China
Zili Shao , Dept. of Comput., Hong Kong Polytech. Univ., Hong Kong, China
pp. 1386-1393

Quality Assessment for Stereoscopic Image Based on DCT Frequency Information (Abstract)

Chao Sun , Sch. of Electron. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Xingang Liu , Sch. of Electron. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Kai Kang , Sch. of Electron. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Laurence T. Yang , Dept. of Comput. Sci., St. Francis Xavier Univ., Antigonish, NS, Canada
pp. 1394-1398

Hope: A Fault-Tolerant Distributed Pub/Sub Architecture for Large-Scale Dynamic Network Environment (Abstract)

Xiaochuan Yu , Dept. of Comput., Hong Kong Polytech. Univ., Kowloon, China
Toong Shoon Alvin Chan , Dept. of Comput., Hong Kong Polytech. Univ., Kowloon, China
pp. 1399-1406

Validation of a Rowing Oar Angle Measurement System Based on an Inertial Measurement Unit (Abstract)

Franz Gravenhorst , Wearable Comput. Lab., ETH Zurich, Zurich, Switzerland
Timothy Turner , Wearable Comput. Lab., ETH Zurich, Zurich, Switzerland
Conny Draper , Sch. of Exercise & Sport Sci., Univ. of Sydney, Sydney, NSW, Australia
Richard M. Smith , Sch. of Exercise & Sport Sci., Univ. of Sydney, Sydney, NSW, Australia
Gerhard Troester , Movement Sci. Dept., Australian Inst. of Sport, Canberra, ACT, Australia
pp. 1412-1419

Platform Zero: A Context-Based Computing Platform for Collaboration (Abstract)

Adam Muhlbauer , Univ. of New South Wales, Sydney, NSW, Australia
Timothy Zelinsky , Univ. of New South Wales, Sydney, NSW, Australia
Salil Kanhere , Univ. of New South Wales, Sydney, NSW, Australia
pp. 1420-1427

A Methodology to Transform an OS-Based Application to a Bare Machine Application (Abstract)

Uzo Okafor , Dept. of Comput. & Inf. Sci., Towson Univ., Towson, MD, USA
Ramesh K. Karne , Dept. of Comput. & Inf. Sci., Towson Univ., Towson, MD, USA
Alexander L. Wijesinha , Dept. of Comput. & Inf. Sci., Towson Univ., Towson, MD, USA
Patrick Appiah-Kubi , Dept. of Comput. & Inf. Sci., Towson Univ., Towson, MD, USA
pp. 1428-1433

Impact of Mobility Models on Social Structure Formation in Opportunistic Networks (Abstract)

Halikul Lenando , Fac. Comput. Sci. & Inf. Technol., Univ. Malaysia Sarawak, Kota Samarahan, Malaysia
Mohamad Nazim Jambli , Fac. Comput. Sci. & Inf. Technol., Univ. Malaysia Sarawak, Kota Samarahan, Malaysia
Kartinah Zen , Fac. Comput. Sci. & Inf. Technol., Univ. Malaysia Sarawak, Kota Samarahan, Malaysia
Johari Abdullah , Fac. Comput. Sci. & Inf. Technol., Univ. Malaysia Sarawak, Kota Samarahan, Malaysia
pp. 1434-1441

Comparison SIP and IAX to Voice Packet Signaling over VOIP (Abstract)

Octavio J. Salcedo Parra , Fac. de Ing., Univ. Distrital Francisco Jose de Caldas, Bogota, Colombia
Neil Orlando Diaz Martinez , Fac. de Ing., Univ. Distrital Francisco Jose de Caldas, Bogota, Colombia
Gustavo Lopez Rubio , Fac. de Ing., Univ. Pontificia de Salamanca Campus de Madrid, Madrid, Spain
pp. 1442-1449

Reinventing Mobile Community Computing and Communication (Abstract)

Yann Busnel , Univ. of Nantes, Nantes, France
Nuno Cruz , Univ. of Lisbon, Lisbon, Portugal
Denis Gillet , EPFL Lausanne, Lausanne, Switzerland
Adrian Holzer , EPFL Lausanne, Lausanne, Switzerland
Hugo Miranda , Univ. of Lisbon, Lisbon, Portugal
pp. 1450-1457

Measuring Walking and Running Cadence Using Magnetometers (Abstract)

Umran Azziz Abdulla , Sch. of Eng. & IT, UNSW@ADFA, Canberra, ACT, Australia
Ken Taylor , ICT Center, CSIRO, Canberra, ACT, Australia
Michael Barlow , Sch. of Eng. & IT, UNSW@ADFA, Canberra, ACT, Australia
pp. 1458-1462

VoIP Spam Prevention (Abstract)

Saeed Farooq Khan , Sch. of Inf. Technol. & Electr. Eng., Univ. of Queensland, Brisbane, QLD, Australia
Marius Portmann , Sch. of Inf. Technol. & Electr. Eng., Univ. of Queensland, Brisbane, QLD, Australia
Neil W. Bergmann , Sch. of Inf. Technol. & Electr. Eng., Univ. of Queensland, Brisbane, QLD, Australia
pp. 1463-1470

An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center (Abstract)

Shuo Zhang , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Baosheng Wang , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Baokang Zhao , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Jing Tao , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
pp. 1471-1477

An OpenFlow-Based Dynamic Path Adjustment Algorithm for Multicast Spanning Trees (Abstract)

Jingguo Ge , Comput. Network Inf. Center, Beijing, China
Hanji Shen , Comput. Network Inf. Center, Beijing, China
E. Yuepeng , Comput. Network Inf. Center, Beijing, China
Yulei Wu , Comput. Network Inf. Center, Beijing, China
Junling You , Comput. Network Inf. Center, Beijing, China
pp. 1478-1483

High Radix Montgomery Modular Multiplier on Modern FPGA (Abstract)

Pingjian Wang , Univ. of Chinese Acad. of Sci., Beijing, China
Zongbin Liu , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Lei Wang , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
Neng Gao , State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China
pp. 1484-1489

A Model-Based Approach for RFID Application Testing (Abstract)

Andreas Huebner , Inst. of Appl. Res., Univ. of Appl. Sci. Ingolstadt, Ingolstadt, Germany
Christian Facchi , Inst. of Appl. Res., Univ. of Appl. Sci. Ingolstadt, Ingolstadt, Germany
Markus Meyer , Inst. of Appl. Res., Univ. of Appl. Sci. Ingolstadt, Ingolstadt, Germany
Helge Janicke , Software Technol. Res. Lab., De Montfort Univ., Leicester, UK
pp. 1490-1497

A Trust Evaluation Method for Supplier Selection (Abstract)

Xiaofeng Qiu , Beijing Key Lab. of Network Syst. Archit. & Convergence, Beijing, China
Lei Cao , Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecommun., Beijing, China
Pengfei Li , Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecommun., Beijing, China
Liang Zhao , NSFocus, Beijing, China
pp. 1498-1503

A Trusted Remote Attestation Model Based on Trusted Computing (Abstract)

Yue Yu , Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China
Huaimin Wang , Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China
Bo Liu , Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China
Gang Yin , Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China
pp. 1504-1509

Achieving Collaborative Wi-Fi Sharing without Changing Current Technologies (Abstract)

Carlos Ballester Lafuente , Inst. of Services Sci., Univ. of Geneva, Geneva, Switzerland
Jean-Marc Seigneur , Inst. of Services Sci., Univ. of Geneva, Geneva, Switzerland
pp. 1510-1515

Multivalued Trust Routing Based on Topology Level for Wireless Sensor Networks (Abstract)

Zhongwei Chen , Sch. of Comput. Sci. & Technol., Shandong Univ., Ji'nan, China
Ruihua Zhang , Sch. of Comput. Sci. & Technol., Shandong Univ., Ji'nan, China
Lei Ju , Sch. of Comput. Sci. & Technol., Shandong Univ., Ji'nan, China
Wei Wang , Sch. of Comput. Sci. & Technol., Shandong Univ., Ji'nan, China
pp. 1516-1521

A Research Model for Trustworthy Pervasive Social Networking (Abstract)

Zheng Yan , State Key Lab. of ISN, Xidian Univ., Xi'an, China
Peng Zhang , Inst. of Mobile Internet, Xian Univ. of Posts & Telecommun., Xi'an, China
Valtteri Niemi , Dept. of Math. & Stat., Univ. of Turku, Turku, Finland
Raimo Kantola , Dept. of Commun. & Networking, Aalto Univ., Espoo, Finland
pp. 1522-1527

The Affect of Familiarity on the Usability of Recognition-Based Graphical Passwords: Cross Cultural Study between Saudi Arabia and the United Kingdom (Abstract)

Hani Moaiteq Aljahdali , Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK
Ron Poet , Sch. of Comput. Sci., Univ. of Glasgow, Glasgow, UK
pp. 1528-1534

Disability Parking Permit -- Lightweight But Trustworthy Identity Documents (Abstract)

Miroslaw Kutylowski , Fac. of Fundamental Problems of Technol., Wroclaw Univ. of Technol., Wrocław, Poland
Piotr Lipiak , Fac. of Fundamental Problems of Technol., Wroclaw Univ. of Technol., Wrocław, Poland
pp. 1535-1540

Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach (Abstract)

Gianluca Dini , Dipt. di Ing. dell'Inf., Univ. di Pisa, Pisa, Italy
Fabio Martinelli , Ist. di Inf. e Telematica, Consiglio Naz. delle Ric., Pisa, Italy
Ilaria Matteucci , Ist. di Inf. e Telematica, Consiglio Naz. delle Ric., Pisa, Italy
Marinella Petrocchi , Ist. di Inf. e Telematica, Consiglio Naz. delle Ric., Pisa, Italy
Andrea Saracino , Dipt. di Ing. dell'Inf., Univ. di Pisa, Pisa, Italy
Daniele Sgandurra , Ist. di Inf. e Telematica, Consiglio Naz. delle Ric., Pisa, Italy
pp. 1541-1546

Continuous Mobile Authentication Using Virtual Key Typing Biometrics (Abstract)

Tao Feng , Comput. Sci. Dept., Univ. of Houston, Houston, TX, USA
Xi Zhao , Comput. Sci. Dept., Univ. of Houston, Houston, TX, USA
Bogdan Carbunar , Sch. of Comput. & Inf. Sci., Florida Int. Univ., Miami, FL, USA
Weidong Shi , Comput. Sci. Dept., Univ. of Houston, Houston, TX, USA
pp. 1547-1552

Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates (Abstract)

Ana Ferreira , Interdiscipl. Centre for Security, Univ. of Luxembourg, Luxembourg, Luxembourg
Rosario Giustolisi , Interdiscipl. Centre for Security, Univ. of Luxembourg, Luxembourg, Luxembourg
Jean-Louis Huynen , Interdiscipl. Centre for Security, Univ. of Luxembourg, Luxembourg, Luxembourg
Vincent Koenig , Interdiscipl. Centre for Security, Univ. of Luxembourg, Luxembourg, Luxembourg
Gabriele Lenzini , Interdiscipl. Centre for Security, Univ. of Luxembourg, Luxembourg, Luxembourg
pp. 1553-1558

Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing (Abstract)

Y. Govinda Ramaiah , Dept. of Comput. Sci. & Eng, JNTUH Coll. of Eng., Hyderabad, India
G. Vijaya Kumari , Dept. of Comput. Sci. & Eng, JNTUH Coll. of Eng., Hyderabad, India
pp. 1559-1566

On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service (Abstract)

Wenkang Wu , Sch. of Inf. & Eng., Hunan Univ., Changsha, China
Zhuo Tang , Sch. of Inf. & Eng., Hunan Univ., Changsha, China
Renfa Li , Sch. of Inf. & Eng., Hunan Univ., Changsha, China
pp. 1567-1572

On Subjective Trust for Privacy Policy Enforcement in Cloud Computing (Abstract)

Karthick Ramachandran , Dept. of Comput. Sci., Univ. of Western Ontario, London, ON, Canada
Hanan Lutfiyya , Dept. of Comput. Sci., Univ. of Western Ontario, London, ON, Canada
Mark Perry , Dept. of Comput. Sci., Univ. of Western Ontario, London, ON, Canada
pp. 1573-1580

A Reliability-Based Trust Management Mechanism for Cloud Services (Abstract)

Wenjuan Fan , Sch. of Manage., Hefei Univ. of Technol., Hefei, China
Harry Perros , Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA
pp. 1581-1586

Towards Building an Automated Security Compliance Tool for the Cloud (Abstract)

Kazi Wali Ullah , Ericsson Res., Finland
Abu Shohel Ahmed , Ericsson Res., Finland
Jukka Ylitalo , Ericsson Res., Finland
pp. 1587-1593

Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps (Abstract)

Zubair Ahmed Baig , Dept. of Comput. Eng., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
Saif Ahmad , Dept. of Comput. Eng., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
Sadiq Mohammed Sait , Dept. of Comput. Eng., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
pp. 1594-1599

A Defense Security Approach for Infrastructures against Hacking (Abstract)

Saad Alsunbul , Comput. Res. Inst., King Abdulaziz City for Sci. & Technol., Riyadh, Saudi Arabia
Phu Le , Fac. of Inf. Technol., Monash Univ. Melbourne, Melbourne, VIC, Australia
Jefferson Tan , Fac. of Inf. Technol., Monash Univ. Melbourne, Melbourne, VIC, Australia
pp. 1600-1606

A Lightweight Design of Malware Behavior Representation (Abstract)

Yong Qiao , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Jie He , Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Yuexiang Yang , Inf. Center, Nat. Univ. of Defense Technol., Changsha, China
Lin Ji , Inf. Center, Nat. Univ. of Defense Technol., Changsha, China
Chuan Tang , Inf. Center, Nat. Univ. of Defense Technol., Changsha, China
pp. 1607-1612

Use of Role Based Access Control for Security-Purpose Hypervisors (Abstract)

Manabu Hirano , Dept. of Inf. & Comput. Eng., Toyota Nat. Coll. of Technol., Toyota, Japan
David W. Chadwick , Sch. of Comput., Univ. of Kent, Canterbury, UK
Suguru Yamaguchi , Grad. Sch. of Inf. Sci., Nara Inst. of Sci. & Technol., Ikoma, Japan
pp. 1613-1619

A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers (Abstract)

Seyed Ali Mirheidari , Comput. Eng. Dept., Sharif Univ. of Technol., Kish Island, Iran
Sajjad Arshad , Comput. Eng. Dept., Sharif Univ. of Technol., Tehran, Iran
Saeidreza Khoshkdahan , Sabzfaam Inf. Technol. Corp., Tehran, Iran
Rasool Jalili , Comput. Eng. Dept., Sharif Univ. of Technol., Tehran, Iran
pp. 1620-1625

Crime Toolkits: The Productisation of Cybercrime (Abstract)

Ammar Alazab , Parallel & Distrib. Comput. Lab., Deakin Univ., Geelong, VIC, Australia
Jemal Abawajy , Parallel & Distrib. Comput. Lab., Deakin Univ., Geelong, VIC, Australia
Michael Hobbs , Parallel & Distrib. Comput. Lab., Deakin Univ., Geelong, VIC, Australia
Robert Layton , Sch. of Inf. Technol., Ballarat Univ., Ballarat, VIC, Australia
Ansam Khraisat , Sch. of Inf. Technol., Ballarat Univ., Ballarat, VIC, Australia
pp. 1626-1632

Shear-Based Spatial Transformation to Protect Proximity Attack in Outsourced Database (Abstract)

Al Amin Hossain , Dept. of Comput. Eng., Kyung Hee Univ., Yongin, South Korea
Seung-Jin Lee , Dept. of Comput. Eng., Kyung Hee Univ., Yongin, South Korea
Eui-Nam Huh , Dept. of Comput. Eng., Kyung Hee Univ., Yongin, South Korea
pp. 1633-1638

Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data (Abstract)

Arnaud Oglaza , IRIT, Univ. of Toulouse, Toulouse, France
Romain Laborde , IRIT, Univ. of Toulouse, Toulouse, France
Pascale Zarate , IRIT, Univ. of Toulouse, Toulouse, France
pp. 1639-1644

Case Study: On the Security of Key Storage on PCs (Abstract)

Roberto Gallo , Univ. of Campinas, Sao Paulo, Brazil
Henrique Kawakami , Univ. of Campinas, Sao Paulo, Brazil
Ricardo Dahab , Univ. of Campinas, Sao Paulo, Brazil
pp. 1645-1651

A Power Model Combined of Architectural Level and Gate Level for Multicore Processors (Abstract)

Manman Peng , Key Lab. for Embedded & Network Comput. of Hunan Province, Hunan Univ., Changsha, China
Yan Hu , Key Lab. for Embedded & Network Comput. of Hunan Province, Hunan Univ., Changsha, China
pp. 1652-1655

Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment (Abstract)

Jingyu Feng , Nat. Comput. Network Intrusion Protection Center, Univ. of Chinese Acad. of Sci., Beijing, China
Yuqing Zhang , Nat. Comput. Network Intrusion Protection Center, Univ. of Chinese Acad. of Sci., Beijing, China
Guangyue Lu , Dept. of Commun. Eng., Xi'an Univ. of Post & Telecommun., Xi'an, China
Liang Zhang , Dept. of Commun. Eng., Xi'an Univ. of Post & Telecommun., Xi'an, China
pp. 1656-1661

Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs (Abstract)

Kashif Saleem , Center of Excellence in Inf. Assurance (CoEIA), King Saud Univ. (KSU), Riyadh, Saudi Arabia
Mohammed Sayim Khalil , Center of Excellence in Inf. Assurance (CoEIA), King Saud Univ. (KSU), Riyadh, Saudi Arabia
Norsheila Fisal , Telematic Res. Group (TRG), Univ. Teknol. Malaysia, Skudai, Malaysia
Adel Ali Ahmed , Telematic Res. Group (TRG), Univ. Teknol. Malaysia, Skudai, Malaysia
Mehmet Ali Orgun , Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia
pp. 1662-1668

Exposing Clone RFID Tags at the Reader (Abstract)

Luke Mirowski , Sch. of Comput. & Inf. Syst., Univ. of Tasmania, Hobart, TAS, Australia
pp. 1669-1674

ProTACD: A Generic Privacy Process for Vehicle Development (Abstract)

Naim Asaj , Dept. Infotainment & Telematics, Daimler AG, Böblingen, Germany
Florian Schaub , Inst. of Media Inf., Ulm Univ., Ulm, Germany
Michael Muter , Dept. Infotainment & Telematics, Daimler AG, Böblingen, Germany
Albert Held , Dept. Infotainment & Telematics, Daimler AG, Böblingen, Germany
Michael Weber , Inst. of Media Inf., Ulm Univ., Ulm, Germany
pp. 1675-1682

Mutual Chip Authentication (Abstract)

Lucjan Hanzlik , Fac. of Fundamental Problems of Technol., Wroclaw Univ. of Technol., Wrocław, Poland
Kamil Kluczniak , Fac. of Fundamental Problems of Technol., Wroclaw Univ. of Technol., Wrocław, Poland
Lukasz Krzywiecki , Fac. of Fundamental Problems of Technol., Wroclaw Univ. of Technol., Wrocław, Poland
Miroslaw Kutylowski , Fac. of Fundamental Problems of Technol., Wroclaw Univ. of Technol., Wrocław, Poland
pp. 1683-1689

Celerity Hardware Implementation of the AES with Data Parallel and Pipelining Architecture inside the Round Function (Abstract)

Shouwen Yang , Inf. Security & Intell. Comput. Lab., Beijing Univ. of Chem. Technol., Beijing, China
Hui Li , Inf. Security & Intell. Comput. Lab., Beijing Univ. of Chem. Technol., Beijing, China
Xiaotao Zhang , Inf. Security & Intell. Comput. Lab., Beijing Univ. of Chem. Technol., Beijing, China
Gang Zhao , Inf. Security & Intell. Comput. Lab., Beijing Univ. of Chem. Technol., Beijing, China
pp. 1690-1695

Toward Coercion-Resistant End-to-End Verifiable Electronic Voting Systems (Abstract)

Wagner M. Santos , Informatic Center, UFPE - Fed. Univ. of Pernambuco Recife - PE, Recife, Brazil
Ruy J. G. B. de Queiroz , Informatic Center, UFPE - Fed. Univ. of Pernambuco Recife - PE, Recife, Brazil
Carlos E. R. Saraiva , Informatic Center, UFPE - Fed. Univ. of Pernambuco Recife - PE, Recife, Brazil
Gleudson P. V. Junior , Informatic Center, UFPE - Fed. Univ. of Pernambuco Recife - PE, Recife, Brazil
pp. 1696-1703

Server-Aided Verification Proxy Re-signature (Abstract)

Zhiwei Wang , Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China
Wei Lv , Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China
pp. 1704-1707

Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard" (Abstract)

Muhammad Khurram Khan , Center of Excellence in Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia
Debiao He , Sch. of Math. & Stat., Wuhan Univ., Wuhan, China
pp. 1708-1710

Trust and Adaptation in STRATUS (Abstract)

Paul Robertson , Dynamic Object Language Labs., Lexington, MA, USA
Robert Laddaga , Dynamic Object Language Labs., Lexington, MA, USA
Mark Burstein , SIFT, Inc., Lexington, MA, USA
pp. 1711-1716

Using Secure Multiparty Computation for Collaborative Information Exchange (Abstract)

Dennis Titze , Fraunhofer Res. Instn. for Appl. & Integrated Security AISEC, Garching near Munich, Germany
Hans Hofinger , Fraunhofer Res. Instn. for Appl. & Integrated Security AISEC, Garching near Munich, Germany
Peter Schoo , Fraunhofer Res. Instn. for Appl. & Integrated Security AISEC, Garching near Munich, Germany
pp. 1717-1722

Pseudonymous Smart Metering without a Trusted Third Party (Abstract)

Soren Finster , Inst. of Telematics, Karlsruhe Inst. of Technol. (KIT), Karlsruhe, Germany
Ingmar Baumgart , Inst. of Telematics, Karlsruhe Inst. of Technol. (KIT), Karlsruhe, Germany
pp. 1723-1728

TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism (Abstract)

Yiqing Hu , Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Yan Xiong , Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Xudong Gong , Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Qiwei Lu , Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Mingxi Li , Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
Wenchao Huang , Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
pp. 1729-1734

Formal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks (Abstract)

Khosrow Ramezani , Sch. of Inf. & Commun. Technol., Griffith Univ., Gold Coast, QLD, Australia
Elankayer Sithirasenan , Sch. of Inf. & Commun. Technol., Griffith Univ., Gold Coast, QLD, Australia
Vallipuram Muthukkumarasamy , Sch. of Inf. & Commun. Technol., Griffith Univ., Gold Coast, QLD, Australia
pp. 1735-1740

TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator (Abstract)

Chong Yan , Shandong Provincial Key Lab. of Software Eng., Shandong Univ., Jinan, China
Zhiping Jia , Shandong Provincial Key Lab. of Software Eng., Shandong Univ., Jinan, China
Lei Ju , Shandong Provincial Key Lab. of Software Eng., Shandong Univ., Jinan, China
Hui Xia , Shandong Provincial Key Lab. of Software Eng., Shandong Univ., Jinan, China
Huaqiang Xu , Shandong Provincial Key Lab. of Software Eng., Shandong Univ., Jinan, China
pp. 1741-1746

HIWL: An Unsupervised Learning Algorithm for Indoor Wireless Localization (Abstract)

Li Li , Sch. of Inf. & Eng., Central South Univ., Changsha, China
Wang Yang , Sch. of Inf. & Eng., Central South Univ., Changsha, China
Guojun Wang , Sch. of Inf. & Eng., Central South Univ., Changsha, China
pp. 1747-1753

A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks (Abstract)

Zeshan Aslam Khan , Dept. of Electron. Eng., Int. Islamic Univ., Islamabad, Pakistan
Edison Pignaton de Freitas , Sch. of Comput. & Electr. Eng., Halmstad Univ., Halmstad, Sweden
Tony Larsson , Sch. of Comput. & Electr. Eng., Halmstad Univ., Halmstad, Sweden
Haider Abbas , Center of Excellence in Inf. Assurance (CoEIA), King Saud Univ., Riyadh, Saudi Arabia
pp. 1754-1761

Power Control and Channel Assignment Mechanisms for Cluster-Based Multichannel Vehicular Ad-Hoc Networks (Abstract)

Chi-Hsien Wang , Dept. Comput. Sci. & Inf. Eng., Aletheia Univ., Taipei, Taiwan
Gwo-Jong Yu , Dept. Comput. Sci. & Inf. Eng., Aletheia Univ., Taipei, Taiwan
pp. 1762-1767

A Novel Device-Device Beam Discovery Scheme with Cross-Layer Design for Millimeter-Wave WPAN (Abstract)

Pingping Xu , Nat. Mobile Commun. Res. Lab., Southeast Univ., Nanjing, China
Hongyun Chu , Nat. Mobile Commun. Res. Lab., Southeast Univ., Nanjing, China
Suheng Zhang , Sch. of Electr. Eng. & Telecommun., UNSW, Sydney, NSW, Australia
pp. 1768-1773

A Distributed Localization Algorithm Based on Random Diffusion in WSN (Abstract)

Qiong Wu , Nat. Mobile Commun. Res. Lab., Southeast Univ., Nanjing, China
Pingping Xu , Nat. Mobile Commun. Res. Lab., Southeast Univ., Nanjing, China
Suheng Zhang , Sch. of Electr. Eng. & Telecommun., UNSW, Sydney, NSW, Australia
Hongyun Chu , Nat. Mobile Commun. Res. Lab., Southeast Univ., Nanjing, China
pp. 1774-1777

A Matrix Transformation Algorithm for Virtual Machine Placement in Cloud (Abstract)

Meng Sun , Shandong Provincial Key Lab. of Comput. Network, Shandong Comput. Sci. Center, Jinan, China
Weidong Gu , Shandong Provincial Key Lab. of Comput. Network, Shandong Comput. Sci. Center, Jinan, China
Xinchang Zhang , Shandong Provincial Key Lab. of Comput. Network, Shandong Comput. Sci. Center, Jinan, China
Huiling Shi , Shandong Provincial Key Lab. of Comput. Network, Shandong Comput. Sci. Center, Jinan, China
Wei Zhang , Shandong Provincial Key Lab. of Comput. Network, Shandong Comput. Sci. Center, Jinan, China
pp. 1778-1783

Big Data Real-Time Processing Based on Storm (Abstract)

Wenjie Yang , Dept. of Electron. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Xingang Liu , Dept. of Electron. Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Laurence Tianruo Yang , Dept. of Comput. Sci., St. Francis Xavier Univ., Antigonish, NS, Canada
pp. 1784-1787

Detecting Associations in Large Dataset on MapReduce (Abstract)

Dong Dai , Comput. Sci. Coll., Univ. of Sci. & Technol. of China, Hefei, China
Xi Li , Comput. Sci. Coll., Univ. of Sci. & Technol. of China, Hefei, China
Chao Wang , Comput. Sci. Coll., Univ. of Sci. & Technol. of China, Hefei, China
Junneng Zhang , Comput. Sci. Coll., Univ. of Sci. & Technol. of China, Hefei, China
Xuehai Zhou , Comput. Sci. Coll., Univ. of Sci. & Technol. of China, Hefei, China
pp. 1788-1794

Protecting Cumulative Node Constraint during XML Update (Abstract)

Norfaradilla Wahid , Fac. of Comput. Sci. & Inf. Technol., Univ. Tun Hussein Onn Malaysia, Batu Pahat, Malaysia
Eric Pardede , Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia
pp. 1795-1802

An Algorithmic Approach to Securing the Three-Stage Quantum Cryptography Protocol (Abstract)

Mayssaa El Rifai , Telecommun. Eng. Program, Univ. of Oklahoma Tulsa, Tulsa, OK, USA
Pramode K. Verma , Telecommun. Eng. Program, Univ. of Oklahoma Tulsa, Tulsa, OK, USA
pp. 1803-1807

Social Spam Discovery Using Bayesian Network Classifiers Based on Feature Extractions (Abstract)

Dae-Ha Park , Div. of Inf. Technol., Cyber Univ. of Korea, Seoul, South Korea
Eun-Ae Cho , Visual Display Div., Samsung Electron. Co., Ltd., Suwon, South Korea
Byung-Won On , Adv. Inst. of Convergence Technol., Seoul Nat. Univ., Suwon, South Korea
pp. 1808-1811

The Role of Trust in Absorptive Capacity Operationalization (Abstract)

Athar Mahmood Ahmed Qureshi , Sch. of Inf. Technol. & Math. Sci., Univ. of South Australia, Adelaide, SA, Australia
Nina Evans , Sch. of Inf. Technol. & Math. Sci., Univ. of South Australia, Adelaide, SA, Australia
pp. 1812-1816

An Adaptive Rating System for Service Computing (Abstract)

Xinfeng Ye , Dept. of Comput. Sci., Auckland Univ., Auckland, New Zealand
Jupeng Zheng , Dept. of Comput. Sci., Auckland Univ., Auckland, New Zealand
pp. 1817-1824

An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMP (Abstract)

Xiaoxian Liu , State Key Lab. of Math. Eng., Adv. Comput., Zhengzhou, China
Rongcai Zhao , State Key Lab. of Math. Eng., Adv. Comput., Zhengzhou, China
Lin Han , State Key Lab. of Math. Eng., Adv. Comput., Zhengzhou, China
Peng Liu , State Key Lab. of Math. Eng., Adv. Comput., Zhengzhou, China
pp. 1825-1831

Mobile Parallel Computing Algorithms for Single-Buffered, Speed-Scalable Processors (Abstract)

Rashid Khogali , Dept. of Electr. & Comput. Eng., Ryerson Univ., Toronto, ON, Canada
Olivia Das , Dept. of Electr. & Comput. Eng., Ryerson Univ., Toronto, ON, Canada
Kaamran Raahemifar , Dept. of Electr. & Comput. Eng., Ryerson Univ., Toronto, ON, Canada
pp. 1832-1839

Probabilistic Analysis of Parallel Program with Partially Eliminated Barriers (Abstract)

Naoki Yonezawa , Dept. of Inf. Sci., Kanagawa Univ., Hiratsuka, Japan
Kenichi Katou , Dept. of Inf. Sci., Kanagawa Univ., Hiratsuka, Japan
Issei Kino , Dept. of Inf. Sci., Kanagawa Univ., Hiratsuka, Japan
Koichi Wada , Dept. of Comput. Sci., Univ. of Tsukuba, Tsukuba, Japan
pp. 1840-1847

Simulator Implementation and Performance Study of a Polymorphous Array Computer (Abstract)

Hucai Huang , Sch. of Comput. Sci., Xi'an Univ. of Posts & Telecommun., Xi'an, China
Tao Li , ASIC Design Center, Xi'an Univ. of Posts & Telecommun., Xi'an, China
Jungang Han , ASIC Design Center, Xi'an Univ. of Posts & Telecommun., Xi'an, China
pp. 1848-1855

Multicore Parallel Implementation of Agent Emotional Processes (Abstract)

Carlos Dominguez , Dept. of Comput. Eng., Univ. Politec. de Valencia, Valencia, Spain
Houcine Hassan , Dept. of Comput. Eng., Univ. Politec. de Valencia, Valencia, Spain
Vicent Mayans , Dept. of Comput. Eng., Univ. Politec. de Valencia, Valencia, Spain
Alfons Crespo , Dept. of Comput. Eng., Univ. Politec. de Valencia, Valencia, Spain
pp. 1856-1861

COSCHED: A Scheduling Agent Maximizing Cloud Broker's Revenues under the CompatibleOne Architecture (Abstract)

Felipe Diaz-Sanchez , Networks & Comput. Sci. Dept., Inst. TELECOM - TELECOM Paristech, Paris, France
Maurice Gagnaire , Networks & Comput. Sci. Dept., Inst. TELECOM - TELECOM Paristech, Paris, France
James Marshall , Prologue, Les Ulis, France
Jean-Pierre Laisne , Bull, Les Clayes-sous-Bois, France
pp. 1862-1867

Performance Analysis of Load-Aware Anycasting Based on OpenFlow (Abstract)

Jingguo Ge , Comput. Network Inf. Center, Beijing, China
Chuan Du , Comput. Network Inf. Center, Beijing, China
Yulei Wu , Comput. Network Inf. Center, Beijing, China
E. Yuepeng , Comput. Network Inf. Center, Beijing, China
Junling You , Comput. Network Inf. Center, Beijing, China
pp. 1868-1872

Parallel Realization of Cognitive Cells on Film Mammography (Abstract)

Sherin Sugathan , Sch. of Comput. Sci., IIITM-K, Thiruvananthapuram, India
pp. 1873-1878

Fast and Accurate On-line Prediction of Performance and Power Consumption in Multicore-based Systems (Abstract)

Young-Ho Lee , Dept. of Comput. Sci. & Eng., Seoul Nat. Univ., Seoul, South Korea
Jihong Kim , Dept. of Comput. Sci. & Eng., Seoul Nat. Univ., Seoul, South Korea
pp. 1879-1886

Performance Evaluation of the Time Analysable On-Demand Coherent Cache (Abstract)

Arthur Pyka , Tech. Univ. of Dortmund, Dortmund, Germany
Mathias Rohde , Tech. Univ. of Dortmund, Dortmund, Germany
Sascha Uhrig , Tech. Univ. of Dortmund, Dortmund, Germany
pp. 1887-1892

Communication Pipelining for Code Generation from Simulink Models (Abstract)

Rongjie Yan , State Key Lab. of Comput. Sci., ISCAS, Beijing, China
Kai Huang , Inst. of VLSI Design, Zhejiang Univ., Hangzhou, China
Min Yu , Inst. of VLSI Design, Zhejiang Univ., Hangzhou, China
Xiaomeng Zhang , Inst. of VLSI Design, Zhejiang Univ., Hangzhou, China
pp. 1893-1900

An Optimizing Strategy Research of LDPC Decoding Based on GPGPU (Abstract)

Luechao Yuan , Dept. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Zuocheng Xing , Dept. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Yang Zhang , Dept. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Xiaobao Chen , Dept. of Comput., Nat. Univ. of Defense Technol., Changsha, China
pp. 1901-1906

Environmental Spatio-temporal Ontology for the Linked Open Data Cloud (Abstract)

Ahsan Morshed , Intell. Sensing & Syst. Lab., CSIRO, Hobart, TAS, Australia
Jagannath Aryal , Sch. of Geogr. & Environ. Studies, UTAS, Hobart, TAS, Australia
Ritaban Dutta , Intell. Sensing & Syst. Lab., CSIRO, Hobart, TAS, Australia
pp. 1907-1912

Author Index (PDF)

pp. 1913-1920
97 ms
(Ver )