default search action
3rd CIC 2017: San Jose, CA, USA
- 3rd IEEE International Conference on Collaboration and Internet Computing, CIC 2017, San Jose, CA, USA, October 15-17, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2565-1
Session 1: Collaboration
- Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements. 1-10 - David Kauffmann, Golan Carmi:
A Comparative Study of E-Collaboration on Temporary vs. Ongoing Teams. 11-19 - Amol Patwardhan:
Sentiment Identification for Collaborative, Geographically Dispersed, Cross-Functional Software Development Teams. 20-26 - Naktal Moaid Edan, Ali Al-Sherbaz, Scott J. Turner:
WebNSM: A Novel Scalable WebRTC Signalling Mechanism for Many-to-Many Video Conferencing. 27-33
Session 2: Document Management
- Johannes Klein, Jean Botev, Steffen Rothkugel:
Concurrent Command and Consistency Management for Distributed Compound Document Authoring. 34-40 - Takehiro Kitao, Masato Shirai, Takao Miura:
Model Selection Based on Kalman Temporal Differences Learning. 41-47 - Ahmed Ktob, Zhoujun Li, Djelloul Bouchiha:
Extracting Linked Data from HTML Tables. 48-53 - Min-Jen Tsai, Imam Yuadi, Yu-Han Tao, Jin-Sheng Yin:
Source Identification for Printed Documents. 54-58
Session 3: Security and Privacy
- Manar Alohaly, Hassan Takabi:
When Do Changes Induce Software Vulnerabilities? 59-66 - Fadi Mohsen, Halil Bisgin, Zachary Scott, Kyle Strait:
Detecting Android Malwares by Mining Statically Registered Broadcast Receivers. 67-76 - Sriramulu Bojjagani, V. N. Sastry:
VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps. 77-86 - Jinlai Xu, Balaji Palanisamy, Yuzhe Richard Tang, S. D. Madhu Kumar:
PADS: Privacy-Preserving Auction Design for Allocating Dynamically Priced Cloud Resources. 87-96 - Anand Tripathi, Henry Hoang:
Design of a Location-Based Publish/Subscribe Service Using a Graph-Based Computing Model. 97-106
Session 4: Access Control
- Prajit Kumar Das, Anupam Joshi, Tim Finin:
Personalizing Context-Aware Access Control on Mobile Platforms. 107-116 - Ang Li, Qinghua Li, Vincent C. Hu:
Access Control for Distributed Processing Systems: Use Cases and General Considerations. 117-125 - Jiwan Ninglekhu, Ram Krishnan:
AARBAC: Attribute-Based Administration of Role-Based Access Control. 126-135 - Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration. 136-145 - Alaeddine Saadaoui, Stephen L. Scott:
Web Services Policy Generation Based on SLA Requirements. 146-154
Session 5: Internet-of-Things
- Danda B. Rawat, Md. Salik Parwez, Abdullah Alshammari:
Edge Computing Enabled Resilient Wireless Network Virtualization for Internet of Things. 155-162 - Tasnia Heya Ashrafi, Md. Arshad Hossain, Sayed Erfan Arefin, Kowshik Dipta Jay Das, Amitabha Chakrabarty:
Service Based FOG Computing Model for IoT. 163-172 - Anup Kumar Maurya, V. N. Sastry:
Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter. 173-180 - Lili Pan, Samira Pouyanfar, Hao Chen, Jiaohua Qin, Shu-Ching Chen:
DeepFood: Automatic Multi-Class Classification of Food Ingredients Using Deep Learning. 181-189
Session 6: Trust
- Karl R. Weiss, Taghi M. Khoshgoftaar:
Detection of Phishing Webpages Using Heterogeneous Transfer Learning. 190-197 - Hisham Salah, Mohamed Eltoweissy:
Towards Collaborative Trust Management. 198-208 - Quang-Vinh Dang, Claudia-Lavinia Ignat:
dTrust: A Simple Deep Learning Approach for Social Recommendation. 209-218 - Maryam Karimi, Mohammad Sadegh Najafi, Reza Akbari, Manijeh Keshtgari:
Presenting a New Method, Using Topology Virtualization for Stabilizing Flow Tables in SDWN. 219-226
Session 7: Cloud Services and Security
- Antonino Galletta, Oliver Ardo, Antonio Celesti, Peter Kissa, Massimo Villari:
A Recommendation-Based Approach for Cloud Service Brokerage: A Case Study in Public Administration. 227-234 - Mona S. Kashkoush, Mohamed Azab, Mohamed Eltoweissy, Gamal Attiya:
Towards Online Smart Disguise: Real-Time Diversification Evading Co-Residency Based Cloud Attacks. 235-242 - Anshuman Chhabra, Shivam Arora:
An Elliptic Curve Cryptography Based Encryption Scheme for Securing the Cloud against Eavesdropping Attacks. 243-246 - Zachariah Pabi Gariba, John Andrew van der Poll:
Security Failure Trends of Cloud Computing. 247-256
Session 8: Blockchain and Mining
- Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency. 257-266 - Mehrdad Salimitari, Mainak Chatterjee, Murat Yuksel, Eduardo L. Pasiliao:
Profit Maximization for Bitcoin Pool Mining: A Prospect Theoretic Approach. 267-274 - Da-Yin Liao, Xuehong Wang:
Design of a Blockchain-Based Lottery System for Smart Cities Applications. 275-282 - Brian Heredia, Joseph D. Prusa, Taghi M. Khoshgoftaar:
Exploring the Effectiveness of Twitter at Polling the United States 2016 Presidential Election. 283-290
Session 9: Social Media and Machine Learning
- Sunil Singh Samant, Mohan Baruwal Chhetri, Quoc Bao Vo, Ryszard Kowalczyk, Surya Nepal:
Towards Quality-Assured Data Delivery in Cloud-Based IoT Platforms for Smart Cities. 291-298 - Muheng Yan, Xidao Wen, Yu-Ru Lin, Lingjia Deng:
Quantifying Content Polarization on Twitter. 299-308 - Rafael Angarita, Nikolaos Georgantas, Valérie Issarny:
USNB: Enabling Universal Online Social Interactions. 309-318 - Qixuan Hou, Aibek Musaev, Yang Yang, Calton Pu:
A Comparative Study of Increasing Automation in the Integration of Multilingual Social Media Information. 319-327
Session 10: Access Control Applications
- Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:
An Access Control Framework for Cloud-Enabled Wearable Internet of Things. 328-338 - Tanay Talukdar, Gunjan Batra, Jaideep Vaidya, Vijayalakshmi Atluri, Shamik Sural:
Efficient Bottom-Up Mining of Attribute Based Access Control Policies. 339-348 - Nuray Baltaci Akhuseyinoglu, James Joshi:
A Risk-Aware Access Control Framework for Cyber-Physical Systems. 349-358 - Leila Karimi, James Joshi:
Multi-Owner Multi-Stakeholder Access Control Model for a Healthcare Environment. 359-368
Session 11: Social Computing
- Fengjiao Wang, Yongzhi Qu, Lei Zheng, Chun-Ta Lu, Philip S. Yu:
Deep and Broad Learning on Content-Aware POI Recommendation. 369-378 - João Eduardo Ferreira, Pedro Losco Takecian, Leonardo Tadashi Kamaura, Bruno Padilha, Calton Pu:
Dependency Management with WED-flow Techniques and Tools: A Case Study. 379-388 - Icaro Alzuru, Andréa M. Matsunaga, Maurício O. Tsugawa, José A. B. Fortes:
Task Design and Crowd Sentiment in Biocollections Information Extraction. 389-398 - Hsien-Ming Chou, Dongsong Zhang, Lina Zhou, Yin Kang:
CaCM: Context-Aware Call Management for Mobile Phones. 399-405
Session 12: Information Sharing and Management
- Asmaa Sallam, Elisa Bertino:
Detection of Temporal Insider Threats to Relational Databases. 406-415 - Laura C. Anderson, Cheryl A. Kieliszewski:
A Socio-Technical Perspective in Support of Information Sharing for Diverse Teams in Today's Workplace. 416-420 - Harsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment. 421-428 - Fan Yang, Haryadi S. Gunawi, Andrew A. Chien:
Exploring the Challenges and Opportunities of Cloud Stacks in Dynamic Resource Environments. 429-436
2nd International Workshop on Internet-Scale Clouds and Big Data (ISCBD)
- Priya Chandran, Lakshya Garg, Aditya Kumar:
Multikernel Simulation: A New Approach to Study Rollback Sensitive Memory Architecture. 437-442 - Fadi Mohsen, Mohamed Shehab:
Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications. 443-448 - Ojus Thomas Lee, G. J. Akash, S. D. Madhu Kumar, Priya Chandran:
A Method for Storage Node Allocation in Erasure Code Based Storage Systems. 449-454
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.