|
![]() |
|||
|
||||
OverviewAs we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits: 1. Introduction of the most recent information technology and its related ideas 2. Applications and problems related to technology convergence, and its case studies 3. Introduction of converging existing security techniques through convergence security Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security. Full Product DetailsAuthor: Kuinam J. Kim , Seong Jin AhnPublisher: Springer Imprint: Springer Edition: 2012 ed. Volume: 120 Dimensions: Width: 15.50cm , Height: 3.40cm , Length: 23.50cm Weight: 1.142kg ISBN: 9789400729100ISBN 10: 9400729103 Pages: 642 Publication Date: 07 December 2011 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsPart 1. Security Fundamentals A Secure Service Framework for handling Security Critical Data on the Public Cloud; Gi-Hwan Cho The Understanding of Building Trust Model on Smartphone Application: Focusing on Users’ Motivation; Hun Choi Towards Understanding Deterrence: Information Security Managers’ Perspective; Sangseo Park Part 2. Industrial & Business Information Security Idea Sketch to Attribute-Based Access Control in Cloud Computing Environment; ByungRae Cha Realizing Security Requirements with Physical Properties; André van Cleeff Controlling Decryption of Personal Health Records in the Cloud; Yi-Chang Hsu Access Control Mechanism for XML Document; Sun-Moon Jo A Collaborative Intrusion Detection System Framework for Cloud Computing; Doan Nguyen Man Criteria for Comparing Nations Cyberwar Capability; Hyung-Jun Seo Part 3. Security Protocols and Applications A RSSI-based approach for Localization of Wireless Sensor Network in Indoor; Hyochang Ahn Semantic Search and Retrieval System for Learning Objects; Arshad Awan Wear Leveling for PCM Using Hot Data Identification; Inhwan Choi Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine; Jae Hyeok Jang HARD: Host-Level Address Remapping Driver for Solid-State Disk; Young-Joon Jang Ubiquitous based Personalized Hypertension Monitoring System; Jonghun Kim Customized IPTV Content Recommendation Service Model Based On Personal Preference; Si-Jung Kim A Study on the Touch Processes of Android Smartphone on Froyo and Gingerbread; Yeong-Gyu Lim Case Study of QoS-assured Convergence Service Overlay in Open Service Platform Environment; Nam-Kyung Lee Aspect Oriented Software Development using Requirement Engineering; Seung-Hyung Lee Accelerometer-based Physical Activity Measurement; Yao Meng A Group Data Synchronization Protocol in Mobile Environments; Ju-Geon Pak Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics; Kee-Hyun Park Part 4. Convergence Security A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications; In-Pyo Cho An Efficient Live Stream Community Management Scheme for the Mobile Environment; Chung-Pyo Hong Unclogging the libjpeg performance bottleneck: a stream-parallel DCT retro-fitted with sequential legacy code; Jingun Hong Development of Real-time Gesture Recognition System using Visual Interaction; Sung Kwan Kang Architecture of Image Encryption hardware using Two dimensional Cellular Automata; Abdul Raouf Khan Simulation of 3D Information Visualization; Gui-Jung Kim Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks; Kyu Chul Kim Development of Real-time Location-based Multimedia Style Slop Information Retrieval System; Sung-Ho Kim Augmented Reality-Based Role-Playing Contents for Education; Sukhyun Lim Vertex Propagation for Fast Ray-casting of Digital Elevation Model; Eun-Seok Lee A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization; Kyuho Lee Image Registration for Sub-Pixel Using Pyramid Edge Images; Jae-Young Lee Real-time Camera Tracking Using Planar Object Detection; Ahr-Hyun Lee Performance Analysis of Routing Methods over Mobile IPv6 Networks; Reza Malekian Robust Estimation of Heights of Moving People using a Single Camera; Sang-Wook Park Part 5. IT Convergence Applications Goal-Heuristic analysis Method for an Adaptive Process Mining; Sujin Baek Security Threat modeling and Requirement Analysis Method based on Goal-Scenario; Sujin Baek An Effective Learning Method in Art Using Virtual Reality and Ontology; Sang-Jin Cha Development of Pain Prescription Decision Systems for Nursing Intervention; Kyung Yong Chung Performance Sensibility Influence of Recommended Makeup Styles; Kyung Yong Chung Affective Social Network; Hyun-Jun Kim A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker; Sung-Ho Sim Discovering Knowledge Flow in Social Network; Hyun-Jun Kim Model Optimization with Graph Transformation and PSO algorithm for Model Transformation Verification; Jong-Won Ko Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification; Jong-Won Ko Improved Performance of Emotion Extraction through Banned words; Seung-Bo Park Potential Emotion Word in Movie Dialog; Seung-Bo Park Story Modeling for Green Light Decision Making; Seung-Bo Park Developing Service-Oriented Computing Model; Hamid S. Mcheick An Extended XML Compression Technique for XML Element Retrieval; Tanakorn Wichaiwong Part 6. Mobile Computing and Future Networks Standby Power Control System based on User’s Location for Energy Saving in Smart Home; Kyoung-Mi Im Context-Aware Architecture for Improvement of Energy efficiency and Growth Promotion of Plants; Hyungsun Kim Energy Saving of Plant Cultivation System using LED Control System based on Ultrasonic Sensor; Hyungsun Kim Improvement of Energy Efficiency in Plant Factories through the Measurement of Plant Bioelectrical Potential; Sookyoun Kwon Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System; Sunhoe Kim Types of Fuel Cells and Applications for Electricity and Heat Co-Generation; Sunhoe Kim Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment; Yoon-Sik Yoo Part 7. Multimedia and Information Visualization Malware Detection Techniques using Artificial Immune; Mohamed Ahmed Mohamed Ali A Survey on P2P Botnet Detection; Kyoung-Soo Han A Study on Instruction Substitution Analysis of Metamorphic Malware; Kyoung-Soo Han An Analysis of Malware Attached in Spam; Kyoung-Soo Han Detection Methods for Malware Variant using API Call Related Graphs; Kyoung-Soo Han Malware Classification Methods using API Sequence Characteristics; Kyoung-Soo Han Part 8. Web Technology and Software Engineering Practical Firewall Policy Inspection using Anomaly Detection and Its Visualization; Jung-Min KangReviewsAuthor InformationKuinam, J, Kim is a professor and chairman of the Department of Convergence Security at Kyoung-gi University(KGU) in Kyoung-gi, Korea. He is also President of the Center for Industry Security supported by Ministry of Knowledge and Economy, Korea. His current fields of specialization are internet-based computing models, computer and networks forensics, infrastructure security, software security, multimedia security, and scientific and technical information. He has received several technical and publishing awards, and rewards including Minister of Knowledge Economy Commendation (Industry Technology Security) and Minister of Public Administration and Security Commendation (Digital Forensic). Tab Content 6Author Website:Countries AvailableAll regions |