IEEE Catalog Number: ISBN:
CFP11TRU-PRT 978-1-4577-2135-9
2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011)
Changsha, China 16 – 18 November 2011
Pages 1-899
1/2
2011 International JointConference of IEEETrustCom-11/IEEEICESS-11/FCST-11
TrustCom 2011Table of Contents
TrustCom 2011 Welcome Message from
the Conference Chairs...........................................................................................................................xxviii
TrustCom 2011 Welcome Message from
the Program Chairs.................................................................................................................................xxix
ICESS 2011 Welcome Message from
the Conference Chairs.............................................................................................................................xxx
ICESS 2011 Welcome Message from
the Program Chairs.................................................................................................................................xxxi
FCST 2011 Welcome Message from
the Conference Chairs ...........................................................................................................................xxxii
FCST 2011 Welcome Message from
the Program Chairs................................................................................................................................xxxiii
TrustCom 2011 Organizing and Program
Committees............................................................................................................................................xxxiv
TrustCom 2011 Reviewers .........................................................................................................................xl
UbiSafe 2011 Organizing and Program
Committees...............................................................................................................................................xliv
ISSR 2011 Organizing and Program
Committees...............................................................................................................................................xlvi
SPIoT 2011 Organizing and Program
Committees..............................................................................................................................................xlvii
ACS 2011 Organizing and Program
Committees .............................................................................................................................................xlviii
v
TrustID 2011 Organizing and Program
Committees.............................................................................................................................................xlvix
SQC 2011 Organizing and Program
Committees ...................................................................................................................................................l
TSCloud 2011 Organizing and Program
Committees...................................................................................................................................................li
ICESS 2011 Organizing and Program
Committees..................................................................................................................................................lii
ESA 2011 Organizing and Program
Committees...............................................................................................................................................lviii
IWCSEI 2011 Organizing and Program
Committees..................................................................................................................................................lx
FCST 2011 Organizing and Program
Committees.................................................................................................................................................lxi
WNM 2011 Organizing and Program
Committees .............................................................................................................................................lxxiii
MWNS 2011 Organizing and Program
Committees.............................................................................................................................................lxxiv
WPRIC 2011 Organizing and Program
Committees..............................................................................................................................................lxxv
AIPNGN 2011 Organizing and Program
Committees.............................................................................................................................................lxxvi
Keynote Speakers..................................................................................................................................lxxvii
Sponsors...............................................................................................................................................lxxxvii
Keynote Sessions
Keynote Sessions for International Joint Conference of IEEETrustCom-11/IEEE ICESS-11/FCST-11Access Control in Distributed Systems: Merging Theory with Practice ........................................................1
Ivan Stojmenovic
TRUSTIE: Design of a Trustworthy Software Production Environment ........................................................3Huaimin Wang
vi
Jacket Matrix and Its Applications to Signal Processing ...............................................................................5Moon Ho Lee
Keynote Session for the Third International Symposiumon UbiSafe Computing (UbiSafe 2011)Defending against Large-Scale and Coordinated Attacks in the UbiquitousEnvironments ................................................................................................................................................7
Yang Xiang
Keynote Session for the 2011 International Workshopon Trust and Identity in Mobile Internet, Computingand Communications (TrustID 2011)Privacy, Identity and Trust in Context-Aware Mobile Services .....................................................................9
Valtteri Niemi
The 10th International Conference on Trust, Securityand Privacy in Computing and Communications (TrustCom2011)
Session A01: Attack and DefenseA Cooperative Mechanism to Defense against Distributed Denial of ServiceAttacks ........................................................................................................................................................11
Hakem Beitollahi and Geert Deconinck
Estimates of Success Rates of Denial-of-Service Attacks ..........................................................................21Teodor Sommestad, Hannes Holm, and Mathias Ekstedt
Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets ................................................29Lin Liu
Launching Return-Oriented Programming Attacks against RandomizedRelocatable Executables ............................................................................................................................37
Limin Liu, Jin Han, Debin Gao, Jiwu Jing, and Daren Zha
A Privacy-Preserving Defense Mechanism against Request Forgery Attacks ...........................................45Ben S. Y. Fung and Patrick P. C. Lee
A Survey on Latest Botnet Attack and Defense ..........................................................................................53Lei Zhang, Shui Yu, Di Wu, and Paul Watters
Holistic Solution for Confining Insider Attacks in Wireless Sensor NetworksUsing Reputation Systems Coupled with Clustering Techniques ...............................................................61
Z. Banković, J. M. Moya, J. C. Vallejo, D. Fraga, and P. Malagón
vii
Session A02: Trust & Cloud ComputingTrusted Block as a Service: Towards Sensitive Applications on the Cloud ................................................73
Jianan Hao and Wentong Cai
Privacy-Preserved Access Control for Cloud Computing ...........................................................................83Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au, and Jun Yan
DACC: Distributed Access Control in Clouds .............................................................................................91Sushmita Ruj, Amiya Nayak, and Ivan Stojmenovic
Secure Virtual Layer Management in Clouds .............................................................................................99Imad M. Abbadi, Muntaha Alawneh, and Andrew Martin
Trust Ticket Deployment: A Notion of a Data Owner's Trust in CloudComputing ................................................................................................................................................111
Mahbub Ahmed and Yang Xiang
Establishing Trust in Hybrid Cloud Computing Environments ..................................................................118Jemal Abawajy
Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Modelsfor Healthcare Cloud .................................................................................................................................126
Lingfeng Chen and Doan B. Hoang
Session A03: Detection SchemeA Charged PSO Inspired Method for Generating Immune Detectorsfor Network Intrusion Detection ................................................................................................................134
Mark Heydenrych and Elizabeth Marie Ehlers
A New Trust Management Framework for Detecting Malicious and SelfishBehaviour for Mobile Ad Hoc Networks ....................................................................................................142
Ji Guo, Alan Marshall, and Bosheng Zhou
LoongChecker: Practical Summary-Based Semi-simulation to DetectVulnerability in Binary Code ......................................................................................................................150
Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, and Fan Jiang
DENNC: A Wireless Malicious Detection Approach Based on Network Coding ......................................160Hong Song, Xiao Xiao, Weiping Wang, and Luming Yang
Geometric Invariant Digital Image Watermarking Scheme Based on FeaturePoints Detector and Histogram Distribution ..............................................................................................166
Chi-Man Pun, Xiao-Chen Yuan, and C. L. Philip Chen
Forecasting the Distribution of Network Traffic for Anomaly Detection ....................................................173Christian Callegari, Stefano Giordano, Michele Pagano, and Teresa Pepe
Malware Variant Detection Using Similarity Search over Sets of Control FlowGraphs ......................................................................................................................................................181
Silvio Cesare and Yang Xiang
viii
A Method for Detecting Unknown Malicious Executables ........................................................................190Boris Rozenberg, Ehud Gudes, Yuval Elovici, and Yuval Fledel
Session A04: PrivacyPrivacy Crisis Due to Crisis Response on the Web ..................................................................................197
Shao-Yu Wu, Ming-Hung Wang, and Kuan-Ta Chen
A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets ..................................................206Mahdi Asadpour and Mohammad Torabi Dashti
Learning Whom to Trust in a Privacy-Friendly Way .................................................................................214Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, and Max Müuhlhäuser
Semantics-Enhanced Privacy Recommendation for Social Networking Sites .........................................226Qingrui Li, Juan Li, Hui Wang, and Ashok Ginjala
Towards a Holistic Privacy Engineering Approach for Smart Grid Systems ............................................234Hervais Simo Fhom and Kpatcha M. Bayarou
Balancing Security and Performance for Enhancing Data Privacy in DataWarehouses ..............................................................................................................................................242
Ricardo Jorge Santos, Jorge Bernardino, and Marco Vieira
Privacy Preserving Access Control Policy and Algorithms for ConflictingProblems ...................................................................................................................................................250
Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, and Jing Yang
Session A05: Trust ModelA Trust Prediction Model for Service Web ................................................................................................258
Wanita Sherchan, Surya Nepal, and Athman Bouguettaya
IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation .............................................266Lizi Zhang, Hui Fang, Wee Keong Ng, and Jie Zhang
A Research Model for Human-Computer Trust Interaction ......................................................................274Zheng Yan, Raimo Kantola, and Peng Zhang
Worm Propagation Modeling Using 2D Cellular Automata in BluetoothNetworks ...................................................................................................................................................282
Sancheng Peng and Guojun Wang
A Hybrid Trust Model for Authorisation Using Trusted Platforms .............................................................288Aarthi Krishna and Vijay Varadharajan
A Model for a Testbed for Evaluating Reputation Systems ......................................................................296Partheeban Chandrasekaran and Babak Esfandiari
SMEF: An Entropy-Based Security Framework for Cloud-Oriented ServiceMashup .....................................................................................................................................................304
Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, and Wei Wang
ix
Session A06: Trust EvaluationA Reputation Mechanism for Virtual Reality - Five-Sense Oriented FeedbackProvision and Subjectivity Alignment ........................................................................................................312
Hui Fang, Jie Zhang, Murat Şensoy, and Nadia Magnenat Thalmann
SWTrust: Generating Trusted Graph for Trust Evaluation in Online SocialNetworks ...................................................................................................................................................320
Wenjun Jiang and Guojun Wang
Malware Behavior Capturing Based on Taint Propagation and StackBacktracing ...............................................................................................................................................328
Fu Jianming, Liu Xinwen, and Cheng Binling
Case-Based Trust Evaluation from Provenance Information ...................................................................336Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, and Yi Mu
A Framework for Reputation Bootstrapping Based on Reputation Utilityand Game Theories ..................................................................................................................................344
Han Jiao, Jixue Liu, Jiuyong Li, and Chengfei Liu
Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Basedon Domain and IP Address Registration ...................................................................................................352
Yoshiro Fukushima, Yoshiaki Hori, and Kouichi Sakurai
Towards Context-Aware Service-Oriented Semantic Reputation Framework ..........................................362Rehab Alnemr, Maxim Schnjakin, and Christoph Meinel
Session A07: AuthenticationA Private and Scalable Authentication for RFID Systems Using ReasonableStorage .....................................................................................................................................................373
Xiaolin Cao and Máire O’Neill
SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USBFlash Disk .................................................................................................................................................381
Yong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren,and Jun Ma
An EAP Framework for Unified Authentication in Wireless Networks ......................................................389Elankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani,and V. Muthukkumarasamy
Inter-Chip Authentication through I/O Character ......................................................................................398Fangyong Hou, Nong Xiao, Hongjun He, and Fang Liu
A Simple Balanced Password-Authenticated Key Agreement Protocol ...................................................403Fuwen Liu and Hartmut Koenig
x
Pollination: A Data Authentication Scheme for Unattended Wireless SensorNetworks ...................................................................................................................................................409
Tassos Dimitriou and Ahmad Sabouri
Mutual Authentication Protocol for Networked RFID Systems .................................................................417Harinda Fernando and Jemal Abawajy
Session A08: Trust Architecture and FrameworkA DRTM-Based Method for Trusted Network Connection ........................................................................425
Wei Feng, Yu Qin, Ai-min Yu, and Dengguo Feng
Biometric Enabled Portable Trusted Computing Platform ........................................................................436Julian Jang, Hon Hwang, and Surya Nepal
Ensuring Secure Information Flow in Partially Reconfigurable Architecturesby Means of Process Algebra Analysis ....................................................................................................443
André Seffrin and Sorin A. Huss
A New Security Architecture for BitTorrent ...............................................................................................451Firas Bader, Andra Radoveneanu, and Hani Ragab-Hassen
An Access Control Framework for the Web of Data .................................................................................456Owen Sacco, Alexandre Passant, and Stefan Decker
Trust ME: A Trust Decision Framework for Mobile Environments ............................................................464Gonzalo Huerta-Canepa, Dongman Lee, and Seon Yeong Han
A Logical Framework of Proof-Carrying Survivability ...............................................................................472Yanjun Zuo and Suhas Lande
CNSSA: A Comprehensive Network Security Situation Awareness System ............................................482Rongrong Xi, Shuyuan Jin, Xiaochun Yun, and Yongzheng Zhang
Session A09: Key and Secret ManagementA Scalability Study of AAA Support in Heterogeneous NetworkingEnvironments with Global Roaming Support ............................................................................................488
Daniel Granlund and Christer Åhlund
Secret Sharing Scheme with Fairness ......................................................................................................494Youliang Tian, Jianfeng Ma, Changgen Peng, and Jianming Zhu
Distributed Private-Key Generation Scheme with Self-Certified Identity ..................................................501Yongming Xie and Guojun Wang
A Double Key-Sharing Based False Data Filtering Scheme in Wireless SensorNetworks ...................................................................................................................................................509
Qian Sun and Min Wu
Biometric Identification Using User Interactions with Virtual Worlds ........................................................517Ahmed Al-Khazzar and Nick Savage
xi
Repeated Differential Properties of the AES-128 and AES-256 Key Schedules ......................................525Jianyong Huang, Willy Susilo, and Jennifer Seberry
Lightweight Hidden Services ....................................................................................................................533Andriy Panchenko, Otto Spaniol, Andre Egners, and Thomas Engel
Security Issues in NoSQL Databases .......................................................................................................541Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, and Jenny Abramov
Session A10: Trust & NetworksA Reliable and Secure Distributed In-network Data Storage Schemein Wireless Sensor Networks ....................................................................................................................548
Muhammad Bashir Abdullahi, Guojun Wang, and Felix Musau
Trust-Based Approaches to Solve Routing Issues in Ad-Hoc WirelessNetworks: A Survey ..................................................................................................................................556
Jesus M. Gonzalez, Mohd Anwar, and James B.D. Joshi
Highly Efficient Distance-Based Anomaly Detection through Univariatewith PCA in Wireless Sensor Networks ....................................................................................................564
Miao Xie, Song Han, and Biming Tian
RealProct: Reliable Protocol Conformance Testing with Real Nodesfor Wireless Sensor Networks ..................................................................................................................572
Junjie Xiong, Edith C.-H. Ngai, Yangfan Zhou, and Michael R. Lyu
A Quantitative Approach to Triaging in Mobile Forensics .........................................................................582Fabio Marturana, Gianluigi Me, Rosamaria Bertè, and Simone Tacconi
Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks ..........................................589Raihana Ferdous, Vallipuram Muthukkumarasamy, and Elankayer Sithirasenan
Cross-Platform Application Sharing Mechanism ......................................................................................597Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes
TVLAN: Trusted and Virtualised Local Area Networks .............................................................................606Udaya Tupakula and Vijay Varadharajan
Session A11: Trust & ApplicationA Decentralized Repair Mechanism for Decentralized Erasure Code BasedStorage Systems ......................................................................................................................................613
Hsiao-Ying Lin, Wen-Guey Tzeng, and Bao-Shuh Lin
Intelligent Assistant for Context-Aware Policies .......................................................................................621Helen Balinsky, Neil C. A. Moore, and Steven J. Simske
Publicly Posted Composite Documents in Variably Ordered Workflows ..................................................631Helen Balinsky, Liqun Chen, and Steven J. Simske
xii
Design Comparison to Identify Malicious Hardware in External IntellectualProperty ....................................................................................................................................................639
Trey Reece, Daniel B. Limbrick, and William H. Robinson
Unwanted Traffic Control via Global Trust Management ..........................................................................647Zheng Yan, Raimo Kantola, and Yue Shen
A Secure Multicoupon Solution for Multi-merchant Scenarios .................................................................655Andreu Pere Isern-Deyà, M. Francisca Hinarejos, Josep-Lluís Ferrer-Gomila,and Magdalena Payeras-Capellà
Efficiently Achieving Full Three-Way Non-repudiation in Consumer-LeveleCommerce and M-Commerce Transactions ...........................................................................................664
Stephen W. Neville and Michael Horie
Exploring and Enhancing the Performance of Parallel IDS on Multi-coreProcessors ................................................................................................................................................673
Haiyang Jiang, Jianhua Yang, and Gaogang Xie
The Third International Symposium on UbiSafe Computing(UbiSafe 2011)
Session B01: Model, Algorithm and ServiceA Model for Automating Persistent Identity Clone in Online Social Network ............................................681
Bhume Bhumiratana
Dependable Context-Sensitive Services in Cyber Physical Systems .......................................................687Kaiyu Wan and Vangalur Alagar
Statistical Fault Localization via Semi-dynamic Program Slicing .............................................................695Rongwei Yu, Lei Zhao, Lina Wang, and Xiaodan Yin
Decreasing SoC Test Power Dissipation and Test Data Volume Basedon Pattern Recombination ........................................................................................................................701
Chunlei Mei, Maoxiang Yi, and Zhifei Shen
Session B02: Security and TrustFlexible Communication: A Secure and Trust-Based Free Wi-Fi PasswordSharing Service ........................................................................................................................................706
Carlos Ballester Lafuente, Xavier Titi, and Jean-Marc Seigneur
An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-BasedMANETs ....................................................................................................................................................714
Fatemeh Barani and Mahdi Abadi
An Enhanced Method for Computation of Similarity between the Contextsin Trust Evaluation Using Weighted Ontology ..........................................................................................721
Mohammad Amin Morid, Amin Omidvar, and Hamid Reza Shahriari
xiii
A Trusted Integrity Measurement Architecture for Securing Enterprise Network .....................................726Tong Liu and Prathima Agrawal
The Third International Workshop on Security ine-Science and e-Research (ISSR 2011)
Session C01: Security in e-Science and e-ResearchDesign and Implementation of Single Sign on System with Cluster CASfor Public Service Platform of Science and Technology Evaluation .........................................................732
Fang Huang, Cai-xia Wang, and Jun Long
A Framework for the Assessment of the Trustworthiness of Digital Recordsover Time ..................................................................................................................................................738
Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, and Mads Nygård
eHCBAC: Flexible Column Based Access Control for Electronic HealthcareSystems ....................................................................................................................................................745
Mei Liu, Ge Fu, and Jiwu Jing
Enhancing Flexibility of TCG's TNC through Layered Property Attestation ..............................................751Aimin Yu and Shijun Zhao
Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning .......................................757Md Tanzim Khorshed, A. B. M. Shawkat Ali, and Saleh A. Wasimi
Flogger: A File-Centric Logger for Monitoring File Access and Transferswithin Cloud Computing Environments .....................................................................................................765
Ryan K. L. Ko, Peter Jagadpramana, and Bu Sung Lee
The 2011 International Workshop on Security and Privacyin Internet of Things (SPIoT 2011)
Session D01: Security, Signature and DectectionRemedying the Hummingbird Cryptographic Algorithm ...........................................................................772
Xinxin Fan, Guang Gong, and Honggang Hu
A RFID-Based Context-Aware Service Model ..........................................................................................779Jinfang Sheng, Wen Zou, Liu Yang, and Bin Wang
Defining and Analyzing Insiders and Their Threats in Organizations .......................................................785Muntaha Alawneh and Imad M. Abbadi
Adaptive Client-Side LUT-Based Digital Watermarking ............................................................................795Chi-Man Pun, Jing-Jing Jiang, and C. L. Philip Chen
Identity-Based Strong Designated Verifier Signature Scheme with FullNon-Delegatability ....................................................................................................................................800
Fei Tang, Changlu Lin, Yong Li, and Shengyuan Zhang
xiv
Session D02: Privacy and AuthenticationProtection Profile of Personal Information Security System: Designinga Secure Personal Information Security System ......................................................................................806
Hyun-Jung Lee, Kwangwoo Lee, and Dongho Won
Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service ..........................................812Chi-won Song, Sungmin Park, Dong-wook Kim, and Sooyong Kang
Home Service Communities and Authentication ......................................................................................818Warodom Werapun, Julien Fasson, and Beatrice Paillassa
Key Privacy in McEliece Public Key Cryptosystem ..................................................................................824Qiang Wang, Xue Qiu, Quan Zhang, and Chaojing Tang
Integrity Protection for Automated Teller Machines ..................................................................................829Ronald Petrlic
The 2011 International Workshop on Anonymityand Communication Systems (ACS 2011)
Session E01: Anonymity and Communication SystemsGroup Formation with Neighbor Similarity Trust in P2P E-Commerce .....................................................835
Felix Musau, Guojun Wang, and Muhammad Bashir Abdullahi
STrust: A Trust Model for Social Networks ...............................................................................................841Surya Nepal, Wanita Sherchan, and Cecile Paris
Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing ....................................847Mohd Izuan Hafez Ninggal and Jemal Abawajy
The 2011 International Workshop on Trust and Identityin Mobile Internet, Computing and Communications (TrustID2011)
Session F01: Trust and IdentityTheoretical Issues in the Study of Trust in Human-Computer Interaction ................................................853
Zheng Yan, Raimo Kantola, and Peng Zhang
Implementation of a Reputation System for Pervasive Social Networking ...............................................857Yu Chen, Zheng Yan, and Valtteri Niemi
Design and Evaluation of an Architecture for Ubiquitous User AuthenticationBased on Identity Management Systems .................................................................................................863
Marc Barisch
xv
Building up Trusted Identity Management in Mobile HeterogeneousEnvironment ..............................................................................................................................................873
Peng Zhang, Hanlin Sun, and Zheng Yan
Internet Users' Security and Privacy While They Interact with Amazon ...................................................878Giampaolo Bella and Lizzie Coles-Kemp
A New Multivariate Hash Function with HAIFA Construction ...................................................................884Youjiao Zou, Wenping Ma, Zhanjun Ran, and Shangping Wang
The Role of Trust in Social Life .................................................................................................................889Dong Yan and Wang Qi
Reputation Based Collaboration among Ethernet Switches .....................................................................893Timo Kiravuo
The 2011 International Workshop on Security and QuantumCommunications (SQC 2011)
Session G01: Security and Quantum CommunicationsGray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2 ..........................................................897
Xunru Yin and Wenping Ma
Quantum Secure Communication Based on Nonmaximally Entangled QubitPair and Dining Cryptographers Problem .................................................................................................900
Ronghua Shi, Qian Su, Ying Guo, and Moon Ho Lee
Multiparty Quantum Group Signature Scheme with Quantum ParallelComputation .............................................................................................................................................905
Ronghua Shi, Jinjing Shi, Ying Guo, and Moon Ho Lee
Quantum Distributed Ballot Scheme Based on Entanglement Swapping ................................................911Xiaoping Lou and Zhigang Chen
Phishing Email Feature Selection Approach ............................................................................................916Isredza Rahmi A. Hamid and Jemal Abawajy
The 2011 International Workshop on Trust and Securityin Cloud Computing (TSCloud 2011)
Session H01: Trust and Security in Cloud ComputingStudy on IP Prefix Hijacking in Cloud Computing Networks Based on AttackPlanning ....................................................................................................................................................922
Yujing Liu, Wei Peng, and Jinshu Su
User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment .........................................927Adeela Waqar, Asad Raza, and Haider Abbas
xvi
Towards a Trust Management System for Cloud Computing ...................................................................933Sheikh Mahbub Habib, Sebastian Ries, and Max Mühlhäuser
Migration to Cloud as Real Option: Investment Decision under Uncertainty ............................................940Chew-Yean Yam, Adrian Baldwin, Simon Shiu, and Christos Ioannidis
The 2011 International Conference on Embedded Softwareand Systems (ICESS-11)
Session I01: Real-Time Systems and Scheduling IRelease Offset Bounds for Response Time Analysis of P-FRP UsingExhaustive Enumeration ...........................................................................................................................950
Chaitanya Belwal, Albert M.K. Cheng, and Walid Taha
Permutational Genetic Algorithm for the Optimized Assignment of Prioritiesto Tasks and Messages in Distributed Real-Time Systems .....................................................................958
Ekain Azketa, Juan P. Uribe, Marga Marcos, Luís Almeida, and J. Javier Gutiérrez
Feasibility Interval for the Transactional Event Handlers of P-FRP ..........................................................966Chaitanya Belwal and Albert M.K. Cheng
Offline Validation of Real-Time Application Constraints Considering AdaptationRules .........................................................................................................................................................974
Mohamed-Lamine Boukhanoufa, Ansgar Radermacher, and François Terrier
Efficient Elastic Resource Management for Dynamic Embedded Systems .............................................981Ricardo Marau, Karthik Lakshmanan, Paulo Pedreiras, Luís Almeida,and Raj Rajkumar
Real-Time Scheduling for Phase Change Main Memory Systems ...........................................................991Miao Zhou, Santiago Bock, Alexandre P. Ferreira, Bruce Childers,Rami Melhem, and Daniel Mossé
SPARTS: Simulator for Power Aware and Real-Time Systems ...............................................................999Borislav Nikolić, Muhammad Ali Awan, and Stefan M. Petters
Session I02: Embedded ArchitecturesA Hardware/Software Countermeasure and a Testing Framework for CacheBased Side Channel Attacks ..................................................................................................................1005
Ankita Arora, Sri Parameswaran, Roshan Ragel, and Darshana Jayasinghe
hUBI: An Optimized Hybrid Mapping Scheme for NAND Flash-Based SSDs ........................................1015Guangjun Xie, Guangzhi Xu, Gang Wang, Xiaoguang Liu, Rui Cao, and Yan Gao
Learning-Directed Dynamic Voltage and Frequency Scaling for ComputationTime Prediction .......................................................................................................................................1023
Ming-Feng Chang and Wen-Yew Liang
xvii
DSBS: Distributed and Scalable Barrier Synchronization in Many-CoreNetwork-on-Chips ...................................................................................................................................1030
Xiaowen Chen and Shuming Chen
Minimizing Schedule Length via Cooperative Register Allocation and LoopScheduling for Embedded Systems ........................................................................................................1038
Yazhi Huang, Qingan Li, and Chun Jason Xue
Optimal Data Placement for Memory Architectures with Scratch-Pad Memories ..................................1045Yibo Guo, Qingfeng Zhuge, Jingtong Hu, and Edwin H.-M. Sha
Session I03: Real-Time Systems and Scheduling IIOn Partitioned Scheduling of Fixed-Priority Mixed-Criticality Task Sets ................................................1051
Owen R. Kelly, Hakan Aydin, and Baoxian Zhao
A Sufficient Schedulability Test for Real-Time Software Transactional Memory ....................................1060Chaitanya Belwal and Albert M.K. Cheng
Response Time Analysis of COTS-Based Multicores Consideringthe Contention on the Shared Memory Bus ............................................................................................1068
Dakshina Dasari, Björn Andersson, Vincent Nelis, Stefan M. Petters,Arvind Easwaran, and Jinkyu Lee
Efficient Implementation of Thermal-Aware Scheduler on a Quad-coreProcessor ................................................................................................................................................1076
Xiaojing Yin, Yongxin Zhu, Liang Xia, Jingwei Ye, Tian Huang, Yuzhuo Fu,and Meikang Qiu
Thermal-Aware Scheduling of Critical Applications Using Job Migrationand Power-Gating on Multi-core Chips ...................................................................................................1083
Buyoung Yun, Kang G. Shin, and Shige Wang
Schedulability Analysis of Transactions in Software Transactional MemoryUsing Timed Automata ...........................................................................................................................1091
Chaitanya Belwal and Albert M.K. Cheng
Session I04: Formal Methods and Analysis ToolsVisualization of Computational Processes of Procedural AbstractionOptimization Passes ...............................................................................................................................1099
Stefan Schaeckler and Nityananda Jayadevaprakash
Tool Support for Automated Traceability of Test/Code Artifacts in EmbeddedSoftware Systems ...................................................................................................................................1109
Christian Wiederseiner, Vahid Garousi, and Michael Smith
Automatic Model Building and Verification of Embedded Softwarewith UPPAAL ..........................................................................................................................................1118
Xiaoli Gong, Jie Ma, Qingcheng Li, and Jin Zhang
xviii
A Precise Memory Model for Operating System Code Verification ........................................................1125Geng Chen, Lei Luo, and Lijie Wang
A Distributed Real-Time Operating System with Location-Transparent SystemCalls for Task Management and Inter-task Synchronization ..................................................................1133
Takahiro Chiba, Yuichi Itami, Myungryun Yoo, and Takanori Yokoyama
Parallel Data Cube Construction Based on an Extendible MultidimensionalArray .......................................................................................................................................................1139
Dong Jin and Tatsuo Tsuji
Session I05: Safe and Reliable SystemsSafety Verification of Non-linear, Planar Proportional Control with DifferentialInclusions ................................................................................................................................................1146
Hallstein Asheim Hansen
Probabilistic Schedulability Guarantees for Dependable Real-Time Systemsunder Error Bursts ..................................................................................................................................1154
Hüseyin Aysan, Radu Dobrin, Sasikumar Punnekkat, and Rolf Johansson
FTGS: Fault-Tolerant Fixed-Priority Scheduling on Multiprocessors .....................................................1164Risat Mahmud Pathan and Jan Jonsson
A UML Model-Based Approach for Replication Assessment of AUTOSARSafety-Critical Applications .....................................................................................................................1176
Sara Tucci-Piergiovanni, Chokri Mraidha, Ernest Wozniak, Agnes Lanusse,and Sebastien Gerard
Verification-Based Multi-backup Firmware Architecture, an Assuranceof Trusted Boot Process for the Embedded Systems .............................................................................1188
Hongfei Yin, Hongjun Dai, and Zhiping Jia
UML-Based Analysis of Power Consumption for Real-Time EmbeddedSystems ..................................................................................................................................................1196
Matthias Hagner, Adina Aniculaesei, and Ursula Goltz
Session I06: Embedded Applications and WSNsEfficient Java Native Interface for Android Based Mobile Devices .........................................................1202
Yann-Hang Lee, Preetham Chandrian, and Bo Li
Resource Management for Robotic Applications ....................................................................................1210Yi-Zong Ou, E. T.-H. Chu, Wen-Wei Lu, Jane W. S. Liu, Ta-Chih Hung,and Jwu-Sheng Hu
Auction-Based Adaptive Sensor Activation Algorithm for Target Trackingin WSNs ..................................................................................................................................................1217
Shaohua Liang, Md. Zakirul Alam Bhuiyan, and Guojun Wang
xix
A Distributed and Shortest-Path-Based Algorithm for Maximum Cover SetsProblem in Wireless Sensor Networks ...................................................................................................1224
Feng Zeng, Lan Yao, Zhigang Chen, and Huamei Qi
Visual Navigation System with Real-Time Image Processing for Patrol ServiceRobot ......................................................................................................................................................1229
Kenichi Asami, Hayato Hagiwara, and Mochimitsu Komori
An Efficient Stereoscopic Game Conversion System for Embedded Platform .......................................1235Hao Liu, Wei Guo, Chao Lu, and Jizeng Wei
The 2011 International Symposium on Advanced Topicson Embedded Systems and Applications (ESA-11)
Session J01: Advanced Topics on Embedded Systemsand ApplicationsAutonomous Parameter and Schedule Configuration for TDMA-BasedCommunication Protocols Such as FlexRay ...........................................................................................1241
Patrick Heinrich, Dirk Eilers, Rudi Knorr, Markus Königer, and Bernd Niehoff
Comparative Analysis of Power Consumption in the Implementationof Arithmetic Algorithms ..........................................................................................................................1247
Alexandre Wagner C. Faria, Leandro P. de Aguiar, Daniel D. Lara,and Antonio A. F. Loureiro
Extending EAST-ADL2 to Support Aspectual Requirement Specificationand Analysis for Automotive Software ....................................................................................................1255
Xiaojian Liu and Zhixue Wang
An Advanced and Effective Literature Search Algorithm Based on AnalyticHierarchy Process ..................................................................................................................................1264
Qiong Wang, Cong Liu, and Zhiying Wang
Detection DoS Attack on FPGA Using Fuzzy Association Rules ...........................................................1271Taner Tuncer and Yetkin Tatar
Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad HocNetworks .................................................................................................................................................1277
Hui Xia, Zhiping Jia, Lei Ju, and Youqin Zhu
A Software Fault-Tolerant Method Based on Exception Handling in RT/ESystem ....................................................................................................................................................1283
Zhou Lu, Kailong Zhang, and Xingshe Zhou
xx
The 2011 International Workshop on Computer SystemEducation and Innovation (IWCSEI 2011)
Session K01: Computer System Education and InnovationUsing Project-Based Learning and Collaborative Learning in SoftwareEngineering Talent Cultivation ................................................................................................................1288
Hongzhi Song, Guodong Si, Lei Yang, Huakun Liang, and Lixia Zhang
Study of Experiment Structure in the Computer Networks Course Using PBLMethodology ...........................................................................................................................................1294
Li Cheng and Cong Wang
The Effective Second Classroom on Embedded System Education ......................................................1298Yinbo Xie, ChengCheng Guo, and Jianfeng Yang
The Practice Teaching Reform of Modern Communication TechnologiesCourse for Non-communication Majors ..................................................................................................1303
Zhenzhou Tang, Chang Li, Chunrong Zhang, and Xiaoqiu Shi
Reform and Practice of Training Engineering Professionals in 2C+E ComputerScience ...................................................................................................................................................1308
Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, and Qingfeng Li
Study and Practice on Teaching Team Construction of Computer Specialtiesin Private Undergraduate Universities and Colleges ..............................................................................1313
Chaoxiang Chen, Shiping Ye, Binbin Zhou, and Guoyong Dai
Course Improvements to 'the Principle of Computer Organization' Basedon the Goal of Disciplinary Education: Taking the Examples of the ComputingScience Faculty of Zhejiang University City College ..............................................................................1319
Qifan Yang, Jianping Cai, Jianzhong Wu, and Meimei Huo
Teaching Method Practicing on Embedded Software Engineering Curriculum ......................................1323Yikui Zhang, Yunfen Tian, Liwei Zhu, and Haoxiang Zuo
The 6th International Conference on Frontier of ComputerScience and Technology (FCST-11)
Session L01: Parallel and Distributed ComputingOptimal Tracking Agent: A New Framework for Multi-agent ReinforcementLearning ..................................................................................................................................................1328
Weihua Cao, Gang Chen, Xin Chen, and Min Wu
A Global Scheduling Algorithm Based on Dynamic Critical Path ...........................................................1335Xing Gu, Qun Yang, De-chang Pi, and He-yang Ke
xxi
Power Optimization for GPU Programs Based on Software Prefetching ...............................................1339Yisong Lin, Tao Tang, and Guibin Wang
I/O Scheduling by Using Multi-network Interfaces of Virtualization System ...........................................1347Xia Xie, Haiqing Zhu, Wenzhi Cao, Hai Jin, and Pingpeng Yuan
The Research of Levenberg-Marquardt Algorithm in Curve Fittings on MultipleGPUs ......................................................................................................................................................1355
Lingjie Zhang, Ying Zhao, and Kaixi Hou
Object-Level Data Model for Keyword Search over Relational Databases ............................................1361Jun Zhang and Renjun Shao
Efficient GPGPU-Based Parallel Packet Classification ..........................................................................1367Che-Lun Hung, Hsiao-Hsi Wang, Shih-Wei Guo, Yaw-Ling Lin, and Kuan-Ching Li
Session L02: Pervasive, Grid, P2P and Cloud ComputingContext-Aware Vertical Handoff Decision Scheme in Heterogeneous WirelessNetworks .................................................................................................................................................1375
Jun Peng, Huiyuan Xian, Xiaoyong Zhang, and Zheqin Li
An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications ...................................1381Wei Liu, Feiyan Shi, and Wei Du
Abnormal Process Instances Identification Method in Healthcare Environment ....................................1387Bingning Han, Lihong Jiang, and Hongming Cai
A Simulation Study of Unstructured P2P Overlay for Multimedia Streaming .........................................1393Deng Li, Zhigang Chen, Jiaqi Liu, Hui Liu, and Zhong Ren
Towards User Intent Based Searching ...................................................................................................1400Haibo Yu, Tsunenori Mine, and Makoto Amamiya
An Efficient Load Balancing Multi-core Frequent Patterns Mining Algorithm .........................................1408Kun-Ming Yu and Shu-Hao Wu
Fault Tolerance Policy on Dynamic Load Balancing in P2P Grids .........................................................1413Tian-Liang Huang, Tian-An Hsieh, Kuan-Chou Lai, Kuan-Ching Li,Ching-Hsien Hsu, and Hsi-Ya Chang
Session L03: Network and Internet ComputingPower Control Game Algorithm Based on Combination Pricing Function ..............................................1421
Sheng Liu, Hongdan Liu, and Zhenguo Gao
A Block Gathering Based on Mobile Web Page Segmentation Algorithm ..............................................1425Libing Wu, Yalin Ke, Yanxiang He, and Nan Liu
A Two-Layered Replica Management Method .......................................................................................1431Chuncong Xu, Xiaomeng Huang, Guangwen Yang, and Yang Zhou
xxii
An Email Server Optimized for Storage Issues ......................................................................................1437Yi Li, Mingzhe Zhang, and Jiaqi Gu
Improving the Adaptiveness of FAST TCP Based on the Stabilitywith Time-Delay ......................................................................................................................................1444
Kefei Wang, Heying Zhang, Lihong Peng, and Baohua Fan
Achieving High Throughput in High-Radix Switch ..................................................................................1452Ming Fang, Songqiao Chen, and Kefei Wang
Session L04: Computer Vision and Image ProcessingAnisotropic Band-Pass Trilateral Filter for Creating Artistic Painting from RealImage ......................................................................................................................................................1457
Xiaohua Zhang, Yuto Yoshida, and Ning Xie
Modeling Trees with Rugged Surfaces ...................................................................................................1464Atsushi Mizoguchi and Kazunori Miyata
A Power Law Transformation Predicting Lightness Conditions Based on SkinColor Space Detection ............................................................................................................................1472
Emmanuel Kondela and Huang Dong Jun
An Efficient Method of Tracking across Multiple Cameras .....................................................................1477Muhammad Hassan, Ahsen Mehmood, and Muhammad Faisal Khan
Nose Surgery Simulation Based on Volumetric Laplacian Deformation .................................................1482Jinshun Li and Yanyu Hu
Fusing Audio-Words with Visual Features for Pornographic Video Detection ........................................1488Yizhi Liu, Xiangdong Wang, Yongdong Zhang, and Sheng Tang
Text Line Based Correction of Distorted Document Images ..................................................................1494Sanding Luo, Xiaomin Fang, Cong Zhao, and Yisha Luo
Session L05: Pattern Recognition and Artificial IntelligenceOverlapping One-Class SVMs for Utterance Verification in SpeechRecognition .............................................................................................................................................1500
Cuiqin Hou, Yibin Hou, Zhangqin Huang, and Qian Liu
Chinese Traffic Police Gesture Recognition in Complex Scene .............................................................1505Fan Guo, Zixing Cai, and Jin Tang
Preference-Based Top-K Influential Nodes Mining in Social Networks ..................................................1512Yunlong Zhang, Jingyu Zhou, and Jia Cheng
A Weighted Cluster Ensemble Algorithm Based on Graph ....................................................................1519Xiao-ping Fan, Yue-shan Xie, Zhi-fang Liao, Xiao-qing Li, and Li-min Liu
The Hot Keyphrase Extraction Based on TF*PDF ..................................................................................1524Yan Gao, Jin Liu, and PeiXun Ma
xxiii
A Decision Making Ontology Building Process for Analytical RequirementsElicitation ................................................................................................................................................1529
Fahmi Bargui, Hanene Ben-Abdallah, and Jamel Feki
Clustering Algorithm for High Dimensional Data Stream over Sliding Windows ....................................1537Weiguo Liu and Jia OuYang
Session L06: System Software and Software EngineeringCapability as Requirement Metaphor .....................................................................................................1543
Jiang Cao, Xinjun Mao, Huining Yan, Yushi Huang, Huaimin Wang, and Xicheng Lu
Variable Precision Rough Set-Based Fault Diagnosis for Web Services ...............................................1550Chengying Mao
A Web Services Composition Model and Its Verification Algorithm Basedon Interface Automata ............................................................................................................................1556
Jianhua Li, Songqiao Chen, Lin Jian, and Hongyu Zhang
Towards a Behavior-Based Restructure Approach for Service Composition .........................................1564Zaiwen Feng, Keqing He, Rong Peng, and Buqing Cao
Design Pattern for Self-Organization Multi-agent Systems Based on Policy .........................................1572Yi Guo, Xinjun Mao, and Cuiyun Hu
Plug-In Based Integrated Development Platform for Industrial ControlSystem-P-IDP4ICS .................................................................................................................................1578
Bin Wang, Dan Yin, Taiwen Wu, and Jinfang Sheng
Session L07: Security, Reliability and TrustworthyComputingA Certificate Driven Access Control Strategy for Service Composition and ItsAnalysis ..................................................................................................................................................1584
Guisheng Fan, Huiqun Yu, Liqiong Chen, and Dongmei Liu
CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threatin the Cloud Computing Era ....................................................................................................................1592
Nan Zhang, Jiwu Jing, and Peng Liu
Towards Detecting Thread Deadlock in Java Programs with JVM Introspection ...................................1600Yan Wen, Jinjing Zhao, Minhuan Huang, and Hua Chen
VerFAT: A Transparent and Efficient Multi-versioning Mechanism for FAT FileSystem ....................................................................................................................................................1608
Jiangjiang Wu, Zhiying Wang, Songzhu Mei, Yong Cheng, and Jiangchun Ren
A Property-Based Attestation Scheme with the Variable Privacy ...........................................................1616Yu Qin, Dexian Chang, Shijun Zhao, and Qianying Zhang
xxiv
Session L08: Wireless Sensor Networks and MobileComputingMulti-relay Cooperative Mechanism with Q-Learning in Cognitive RadioMultimedia Sensor Networks ..................................................................................................................1624
Jun Peng, Junbo Li, Shuo Li, and Jing Li
An Iterative Multi-path Routing Protocol in Wireless Ad Hoc Networks ..................................................1630Zhongke Zhang and Yun Wang
A Game Theoretic Coalitional Bidding Scheme for Efficient Routingin Vehicular Ad Hoc Networks ................................................................................................................1638
Muhammad Bilal and Pauline ML Chan
A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless SensorNetworks .................................................................................................................................................1646
Zhiwu Huang, Yuan Cheng, and Weirong Liu
A Method for Searching the Centroid of a 3D Cluster Based on RSSI ...................................................1652Chen Weike, Shou Heng, and Li Wenfeng
Routing with Virtual Region Coordinates in Wireless Sensor Networks .................................................1657Zheng Ma, Weijia Jia, and Guojun Wang
Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks ........................................1662Jin Zheng, Xinlin Xu, and Guojun Wang
Session L09: Theoretical Computer Science, Algorithmand Bio-informaticsPhase-Wise Clustering of Time Series Gene Expression Data ..............................................................1668
Poonam Goyal, Navneet Goyal, Rohan Sunil Karwa, and Matthew John
A Formal Approach for Modeling Interactive Visual Interfaces ...............................................................1675Emanuele Covino and Giovanni Pani
A Quasi Physical Method for the Equal Sphere Packing Problem .........................................................1684WenQi Huang and Liang Yu
A Refined and Heuristic Algorithm for LD tagSNPs Selection ................................................................1691Hailin Chen, Zuping Zhang, and Jing Xia
Improved Partial Parallel Decision Feedback Multiuser Detectionfor Multiuser-MIMO System ....................................................................................................................1695
Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Minghui Wang, and Wenyue Zhang
xxv
The Second International Workshop on Wireless Networksand Multimedia (WNM-11)
Session M01: Wireless Networks and MultimediaA Data Simulator for ZigBee-Base Wireless Sensor Network System ...................................................1699
Kun-Yung Lu
Energy Aware Routing Protocols for Wireless Sensor Networks Using DiscreteTransmission Energies ...........................................................................................................................1704
Karlócai Balázs, Bojárszky András, and Levendovszky János
Performance Design and Analysis of Handoff in Hierarchical WirelessNetworks .................................................................................................................................................1708
Z. Zabanoot and G. Min
A Biased Modified Binary Query Tree Protocol for RFID Tag CollisionResolution ...............................................................................................................................................1715
Xinqing Yan, Yan Xu, and Bin Li
Time-Based Detection and Location of Wormhole Attacks in Wireless Ad HocNetworks .................................................................................................................................................1721
Fei Shi, Dongxu Jin, Weijie Liu, and JooSeok Song
Energy-Efficiency Media Independent Handover Mechanism ................................................................1727Dongxu Jin, Fei Shi, and JooSeok Song
The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network ...................................1733Yinghui Meng, Jian Chen, Yingyou Wen, and Hong Zhao
The Second International Workshop on Mobile and WirelessNetwork Security (MWNS-11)
Session N01: Mobile and Wireless Network SecurityPerformance Analysis of Key Management Schemes in Wireless SensorNetwork Using Analytic Hierarchy Process ............................................................................................1739
Na Ruan, Yizhi Ren, Yoshiaki Hori, and Kouichi Sakurai
Chaotic Hash Function Based on Tandem-DM Construction .................................................................1745Li Gao, Xiaomin Wang, and Wenfang Zhang
Implementation and Performance Evaluation of an Adaptive Routing Algorithmin MANETs ..............................................................................................................................................1750
Annapurna P. Patil, K. Rajani Kanth, Apoorva Yadhava, Rakshith H. P.,and Joseph Tom
Session Key Generation for a Group Call and Device for Security Control ............................................1756Younchan Jung and Enrique Festijo
xxvi
The Second International Workshop on Pattern Recognition& Intelligence Computing (WPRIC -11)
Session O01: Pattern Recognition & Intelligence ComputingIdentification of Masses in Digital Mammogram Using an Optimal Setof Features ..............................................................................................................................................1763
Wenfeng Han, Jianwei Dong, Yuting Guo, Ming Zhang, and Jianzhong Wang
Automated Inspection Using X-Ray Imaging ..........................................................................................1769Wen ei Chen, Zuohua Miao, and Delie Ming
Semantic Web Service Automatic Composition Based on Service ParameterRelationship Graph .................................................................................................................................1773
Jianhua Li, Songqiao Chen, Yongjun Li, and Qian Zhang
The 2011 International Workshop on All-IP Next GenerationNetworks (AIPNGN 2011)
Session P01: All-IP Next Generation NetworksExploit TIVs to Find Faster Paths ...........................................................................................................1779
Yanhua Zhang, Chunhong Zhang, and Gang Wang
Context Awareness for Self-Adaptiveness in Smart Terminals ..............................................................1783Zhen Chen, Chunhong Zhang, and Yang Ji
Simulation Tools Enabling Research in Convergence of Fixed and MobileNetworks .................................................................................................................................................1789
Andreas Bontozoglou, Kun Yang, and Ken Guild
Performance Modelling and Analysis of Dynamic Class-Based Call AdmissionControl Algorithm Using Fuzzy Logic for Heterogeneous Wireless Networks ........................................1795
Sha Sha and Rosemary Halliwell
Author Index
xxvii
f