Report for: Proceedings of the International Conference on IT Convergence and Security 2011 (original) (raw)

↓ Skip to main content

Altmetric

Overview of attention for book

Cover of 'Proceedings of the International Conference on IT Convergence and Security 2011'

Table of Contents

  1. Book Overview
  2. Chapter 1A Secure Service Framework for Handling Security Critical Data on the Public Cloud
  3. Chapter 2The Understanding of Building Trust Model on Smartphone Application: Focusing on Users’ Motivation
  4. Chapter 3Towards Understanding Deterrence: Information Security Managers’ Perspective
  5. Chapter 4Design of Attribute-Based Access Control in Cloud Computing Environment
  6. Chapter 5Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting
  7. Chapter 6Controlling Decryption of Personal Health Records in the Cloud
  8. Chapter 7Access Control Mechanism for XML Document
  9. Chapter 8A Collaborative Intrusion Detection System Framework for Cloud Computing
  10. Chapter 9Criteria for Comparing Cyberwarfare Capability
  11. Chapter 10A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor
  12. Chapter 11Semantic Search and Retrieval System for Learning Objects
  13. Chapter 12Wear Leveling for PCM Using Hot Data Identification
  14. Chapter 13Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine
  15. Chapter 14HARD: Host-Level Address Remapping Driver for Solid-State Disk
  16. Chapter 15Ubiquitous Based Personalized Hypertension Monitoring System
  17. Chapter 16Customized IPTV Content Recommendation Service Model Based on Personal Preference
  18. Chapter 17A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread
  19. Chapter 18Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform Environment
  20. Chapter 19Aspect Oriented Software Development Using Requirement Engineering
  21. Chapter 20A Review of Accelerometer-Based Physical Activity Measurement
  22. Chapter 21A Group Data Synchronization Protocol in Mobile Environments
  23. Chapter 22Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics
  24. Chapter 23A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications
  25. Chapter 24An Efficient Live Stream Community Management Scheme for the Mobile
  26. Chapter 25Development of Real-Time Gesture Recognition System Using Visual Interaction
  27. Chapter 26Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata
  28. Chapter 27Simulation of 3D Information Visualization
  29. Chapter 28Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks
  30. Chapter 29Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System
  31. Chapter 30Augmented Reality-Based Role-Playing Contents for Education
  32. Chapter 31Vertex Propagation for Fast Ray-Casting of Digital Elevation Model
  33. Chapter 32A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization
  34. Chapter 33Image Registration for Sub-Pixel Using Pyramid Edge Images
  35. Chapter 34Real-Time Camera Tracking Using Planar Object Detection
  36. Chapter 35Bidirectional Propagation Method for Analysis of Reflection on Radio Networks
  37. Chapter 36Robust Estimation of Heights of Moving People Using a Single Camera
  38. Chapter 37Goal-Heuristic Analysis Method for an Adaptive Process Mining
  39. Chapter 38Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario
  40. Chapter 39An Effective Learning Method in Art Using Virtual Reality and Ontology
  41. Chapter 40Development of Pain Prescription Decision Systems for Nursing Intervention
  42. Chapter 41Performance Sensibility Influence of Recommended Makeup Styles
  43. Chapter 42Affective Social Network
  44. Chapter 43A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker
  45. Chapter 44Discovering Knowledge Flow in Social Network
  46. Chapter 45Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification
  47. Chapter 46Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification
  48. Chapter 47Improved Performance of Emotion Extraction Through Banned Words
  49. Chapter 48Potential Emotion Word in Movie Dialog
  50. Chapter 49Story Modeling for Green Light Decision Making
  51. Chapter 50Reducing the Gap of Provided Services and Requires Services Based on Service Approach
  52. Chapter 51An Extended XML Compression Technique for XML Element Retrieval
  53. Chapter 52Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System
  54. Chapter 53Types of Fuel Cells and Applications for Electricity and Heat Co-Generation
  55. Chapter 54Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment
  56. Chapter 55Malware Detection Techniques Using Artificial Immune System
  57. Chapter 56A Survey on P2P Botnet Detection
  58. Chapter 57A Study on Instruction Substitution Analysis of Metamorphic Malware
  59. Chapter 58An Analysis of Malware Attached in Spam
  60. Chapter 59Detection Methods for Malware Variant Using API Call Related Graphs
  61. Chapter 60Malware Classification Methods Using API Sequence Characteristics
  62. Chapter 61Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization

Attention for Chapter 7:Access Control Mechanism for XML Document