Computer Science & Engineering: Recent submissions
Now showing items 281-300 of 2402
-
Wearable AI Reveals the Impact of Intermittent Fasting on Stress Levels in School Children During Ramadan
( IOS Press BV , 2023 , Conference)Intermittent fasting has been practiced for centuries across many cultures globally. Recently many studies have reported intermittent fasting for its lifestyle benefits, the major shift in eating habits and patterns is ... -
Detection and Collection of Waste Using a Partially Submerged Aquatic Robot
( Springer Science and Business Media Deutschland GmbH , 2023 , Conference)With the amount of waste being dispersed into oceans on the rise, mitigating this issue has become a global concern. In the past few decades, governments, scientists, organizations, and individuals have been attempting to ... -
A Review of Usability Evaluation Techniques for Augmented Reality Systems in Education
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)Augmented Reality (AR) converts a gigantic amount of data and analytics into images and/or animations that are overlaid into the real scene. The emerging technology of AR has been investigated for more than forty years, ... -
Adaptive de Algorithm for Novel Energy Control Framework Based on Edge Computing in IIoT Applications
( IEEE Computer Society , 2021 , Article)With the development of the industrial Internet of Things and the advancements in wireless sensor networking technologies, the smart grid based on edge computing now is regarded as being essential for real-time monitoring ... -
Selecting Web services with security compliances: A managerial perspective
( dblp computer science bibliography , 2007 , Conference)This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ... -
Security-oriented service composition and evolution
( IEEE , 2006 , Conference)This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ... -
A modal logic for information system security
( Australian Computer Society, Inc. , 2011 , Article)As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ... -
Trust in cloud services: Providing more controls to clients
( IEEE , 2013 , Article)Trust is more important than money and will ultimately determine cloud computing's success. -
Compliance checking for usage-constrained credentials in trust negotiation systems
( Springer Berlin Heidelberg , 2012 , Conference)We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ... -
Social access control language (SocACL)
( Association for Computing Machinery , 2013 , Conference)Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ... -
SecCom: A prototype for integrating security-aware components
( Springer Verlag , 2009 , Conference)This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ... -
Cloud computing without seeing
( Association for Computing Machinery , 2011 , Conference)In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ... -
Automatic verification of health regulatory compliance in cloud computing
( IEEE , 2013 , Conference)This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ... -
Profile-based security assurances for service software
( Springer Verlag , 2011 , Conference)In service software, it is highly desirable to have a service composition mechanism that supports automatic reasoning about the security assurances of services. Service consumers such as human, machine, even application ... -
Secure cloud services: Matrix multiplication revisited
( IEEE , 2013 , Conference)This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ... -
Tracking and constraining authorization provenance
( Springer Berlin Heidelberg , 2012 , Conference)Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ... -
Identifying contextual properties of software architecture in cloud computing
( IEEE , 2011 , Conference)This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ... -
Constraint-enhanced role engineering via answer set programming
( Association for Computing Machinery , 2012 , Conference)Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ... -
Understanding the Impact of Emotions on the Quality of Software Artifacts
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)This paper proposes a framework for investigating the impact of emotions on the quality of software artifacts and portrays some observations captured during the development of several software engineering projects. The ... -
Garbled computation in cloud
( Elsevier , 2016 , Article)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...