+ All Categories
Home > Documents > 2011 IEEE 10th International Conference on Trust, Security and...

2011 IEEE 10th International Conference on Trust, Security and...

Date post: 09-Oct-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
24
IEEE Catalog Number: ISBN: CFP11TRU-PRT 978-1-4577-2135-9 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011) Changsha, China 16 – 18 November 2011 Pages 1-899 1/2
Transcript
Page 1: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

IEEE Catalog Number: ISBN:

CFP11TRU-PRT 978-1-4577-2135-9

2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011)

Changsha, China 16 – 18 November 2011

Pages 1-899

1/2

Page 2: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

2011 International JointConference of IEEETrustCom-11/IEEEICESS-11/FCST-11

TrustCom 2011Table of Contents

TrustCom 2011 Welcome Message from

the Conference Chairs...........................................................................................................................xxviii

TrustCom 2011 Welcome Message from

the Program Chairs.................................................................................................................................xxix

ICESS 2011 Welcome Message from

the Conference Chairs.............................................................................................................................xxx

ICESS 2011 Welcome Message from

the Program Chairs.................................................................................................................................xxxi

FCST 2011 Welcome Message from

the Conference Chairs ...........................................................................................................................xxxii

FCST 2011 Welcome Message from

the Program Chairs................................................................................................................................xxxiii

TrustCom 2011 Organizing and Program

Committees............................................................................................................................................xxxiv

TrustCom 2011 Reviewers .........................................................................................................................xl

UbiSafe 2011 Organizing and Program

Committees...............................................................................................................................................xliv

ISSR 2011 Organizing and Program

Committees...............................................................................................................................................xlvi

SPIoT 2011 Organizing and Program

Committees..............................................................................................................................................xlvii

ACS 2011 Organizing and Program

Committees .............................................................................................................................................xlviii

v

Page 3: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

TrustID 2011 Organizing and Program

Committees.............................................................................................................................................xlvix

SQC 2011 Organizing and Program

Committees ...................................................................................................................................................l

TSCloud 2011 Organizing and Program

Committees...................................................................................................................................................li

ICESS 2011 Organizing and Program

Committees..................................................................................................................................................lii

ESA 2011 Organizing and Program

Committees...............................................................................................................................................lviii

IWCSEI 2011 Organizing and Program

Committees..................................................................................................................................................lx

FCST 2011 Organizing and Program

Committees.................................................................................................................................................lxi

WNM 2011 Organizing and Program

Committees .............................................................................................................................................lxxiii

MWNS 2011 Organizing and Program

Committees.............................................................................................................................................lxxiv

WPRIC 2011 Organizing and Program

Committees..............................................................................................................................................lxxv

AIPNGN 2011 Organizing and Program

Committees.............................................................................................................................................lxxvi

Keynote Speakers..................................................................................................................................lxxvii

Sponsors...............................................................................................................................................lxxxvii

Keynote Sessions

Keynote Sessions for International Joint Conference of IEEETrustCom-11/IEEE ICESS-11/FCST-11Access Control in Distributed Systems: Merging Theory with Practice ........................................................1

Ivan Stojmenovic

TRUSTIE: Design of a Trustworthy Software Production Environment ........................................................3Huaimin Wang

vi

Page 4: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Jacket Matrix and Its Applications to Signal Processing ...............................................................................5Moon Ho Lee

Keynote Session for the Third International Symposiumon UbiSafe Computing (UbiSafe 2011)Defending against Large-Scale and Coordinated Attacks in the UbiquitousEnvironments ................................................................................................................................................7

Yang Xiang

Keynote Session for the 2011 International Workshopon Trust and Identity in Mobile Internet, Computingand Communications (TrustID 2011)Privacy, Identity and Trust in Context-Aware Mobile Services .....................................................................9

Valtteri Niemi

The 10th International Conference on Trust, Securityand Privacy in Computing and Communications (TrustCom2011)

Session A01: Attack and DefenseA Cooperative Mechanism to Defense against Distributed Denial of ServiceAttacks ........................................................................................................................................................11

Hakem Beitollahi and Geert Deconinck

Estimates of Success Rates of Denial-of-Service Attacks ..........................................................................21Teodor Sommestad, Hannes Holm, and Mathias Ekstedt

Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets ................................................29Lin Liu

Launching Return-Oriented Programming Attacks against RandomizedRelocatable Executables ............................................................................................................................37

Limin Liu, Jin Han, Debin Gao, Jiwu Jing, and Daren Zha

A Privacy-Preserving Defense Mechanism against Request Forgery Attacks ...........................................45Ben S. Y. Fung and Patrick P. C. Lee

A Survey on Latest Botnet Attack and Defense ..........................................................................................53Lei Zhang, Shui Yu, Di Wu, and Paul Watters

Holistic Solution for Confining Insider Attacks in Wireless Sensor NetworksUsing Reputation Systems Coupled with Clustering Techniques ...............................................................61

Z. Banković, J. M. Moya, J. C. Vallejo, D. Fraga, and P. Malagón

vii

Page 5: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Session A02: Trust & Cloud ComputingTrusted Block as a Service: Towards Sensitive Applications on the Cloud ................................................73

Jianan Hao and Wentong Cai

Privacy-Preserved Access Control for Cloud Computing ...........................................................................83Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au, and Jun Yan

DACC: Distributed Access Control in Clouds .............................................................................................91Sushmita Ruj, Amiya Nayak, and Ivan Stojmenovic

Secure Virtual Layer Management in Clouds .............................................................................................99Imad M. Abbadi, Muntaha Alawneh, and Andrew Martin

Trust Ticket Deployment: A Notion of a Data Owner's Trust in CloudComputing ................................................................................................................................................111

Mahbub Ahmed and Yang Xiang

Establishing Trust in Hybrid Cloud Computing Environments ..................................................................118Jemal Abawajy

Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Modelsfor Healthcare Cloud .................................................................................................................................126

Lingfeng Chen and Doan B. Hoang

Session A03: Detection SchemeA Charged PSO Inspired Method for Generating Immune Detectorsfor Network Intrusion Detection ................................................................................................................134

Mark Heydenrych and Elizabeth Marie Ehlers

A New Trust Management Framework for Detecting Malicious and SelfishBehaviour for Mobile Ad Hoc Networks ....................................................................................................142

Ji Guo, Alan Marshall, and Bosheng Zhou

LoongChecker: Practical Summary-Based Semi-simulation to DetectVulnerability in Binary Code ......................................................................................................................150

Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, and Fan Jiang

DENNC: A Wireless Malicious Detection Approach Based on Network Coding ......................................160Hong Song, Xiao Xiao, Weiping Wang, and Luming Yang

Geometric Invariant Digital Image Watermarking Scheme Based on FeaturePoints Detector and Histogram Distribution ..............................................................................................166

Chi-Man Pun, Xiao-Chen Yuan, and C. L. Philip Chen

Forecasting the Distribution of Network Traffic for Anomaly Detection ....................................................173Christian Callegari, Stefano Giordano, Michele Pagano, and Teresa Pepe

Malware Variant Detection Using Similarity Search over Sets of Control FlowGraphs ......................................................................................................................................................181

Silvio Cesare and Yang Xiang

viii

Page 6: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

A Method for Detecting Unknown Malicious Executables ........................................................................190Boris Rozenberg, Ehud Gudes, Yuval Elovici, and Yuval Fledel

Session A04: PrivacyPrivacy Crisis Due to Crisis Response on the Web ..................................................................................197

Shao-Yu Wu, Ming-Hung Wang, and Kuan-Ta Chen

A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets ..................................................206Mahdi Asadpour and Mohammad Torabi Dashti

Learning Whom to Trust in a Privacy-Friendly Way .................................................................................214Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, and Max Müuhlhäuser

Semantics-Enhanced Privacy Recommendation for Social Networking Sites .........................................226Qingrui Li, Juan Li, Hui Wang, and Ashok Ginjala

Towards a Holistic Privacy Engineering Approach for Smart Grid Systems ............................................234Hervais Simo Fhom and Kpatcha M. Bayarou

Balancing Security and Performance for Enhancing Data Privacy in DataWarehouses ..............................................................................................................................................242

Ricardo Jorge Santos, Jorge Bernardino, and Marco Vieira

Privacy Preserving Access Control Policy and Algorithms for ConflictingProblems ...................................................................................................................................................250

Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, and Jing Yang

Session A05: Trust ModelA Trust Prediction Model for Service Web ................................................................................................258

Wanita Sherchan, Surya Nepal, and Athman Bouguettaya

IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation .............................................266Lizi Zhang, Hui Fang, Wee Keong Ng, and Jie Zhang

A Research Model for Human-Computer Trust Interaction ......................................................................274Zheng Yan, Raimo Kantola, and Peng Zhang

Worm Propagation Modeling Using 2D Cellular Automata in BluetoothNetworks ...................................................................................................................................................282

Sancheng Peng and Guojun Wang

A Hybrid Trust Model for Authorisation Using Trusted Platforms .............................................................288Aarthi Krishna and Vijay Varadharajan

A Model for a Testbed for Evaluating Reputation Systems ......................................................................296Partheeban Chandrasekaran and Babak Esfandiari

SMEF: An Entropy-Based Security Framework for Cloud-Oriented ServiceMashup .....................................................................................................................................................304

Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, and Wei Wang

ix

Page 7: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Session A06: Trust EvaluationA Reputation Mechanism for Virtual Reality - Five-Sense Oriented FeedbackProvision and Subjectivity Alignment ........................................................................................................312

Hui Fang, Jie Zhang, Murat Şensoy, and Nadia Magnenat Thalmann

SWTrust: Generating Trusted Graph for Trust Evaluation in Online SocialNetworks ...................................................................................................................................................320

Wenjun Jiang and Guojun Wang

Malware Behavior Capturing Based on Taint Propagation and StackBacktracing ...............................................................................................................................................328

Fu Jianming, Liu Xinwen, and Cheng Binling

Case-Based Trust Evaluation from Provenance Information ...................................................................336Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, and Yi Mu

A Framework for Reputation Bootstrapping Based on Reputation Utilityand Game Theories ..................................................................................................................................344

Han Jiao, Jixue Liu, Jiuyong Li, and Chengfei Liu

Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Basedon Domain and IP Address Registration ...................................................................................................352

Yoshiro Fukushima, Yoshiaki Hori, and Kouichi Sakurai

Towards Context-Aware Service-Oriented Semantic Reputation Framework ..........................................362Rehab Alnemr, Maxim Schnjakin, and Christoph Meinel

Session A07: AuthenticationA Private and Scalable Authentication for RFID Systems Using ReasonableStorage .....................................................................................................................................................373

Xiaolin Cao and Máire O’Neill

SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USBFlash Disk .................................................................................................................................................381

Yong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren,and Jun Ma

An EAP Framework for Unified Authentication in Wireless Networks ......................................................389Elankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani,and V. Muthukkumarasamy

Inter-Chip Authentication through I/O Character ......................................................................................398Fangyong Hou, Nong Xiao, Hongjun He, and Fang Liu

A Simple Balanced Password-Authenticated Key Agreement Protocol ...................................................403Fuwen Liu and Hartmut Koenig

x

Page 8: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Pollination: A Data Authentication Scheme for Unattended Wireless SensorNetworks ...................................................................................................................................................409

Tassos Dimitriou and Ahmad Sabouri

Mutual Authentication Protocol for Networked RFID Systems .................................................................417Harinda Fernando and Jemal Abawajy

Session A08: Trust Architecture and FrameworkA DRTM-Based Method for Trusted Network Connection ........................................................................425

Wei Feng, Yu Qin, Ai-min Yu, and Dengguo Feng

Biometric Enabled Portable Trusted Computing Platform ........................................................................436Julian Jang, Hon Hwang, and Surya Nepal

Ensuring Secure Information Flow in Partially Reconfigurable Architecturesby Means of Process Algebra Analysis ....................................................................................................443

André Seffrin and Sorin A. Huss

A New Security Architecture for BitTorrent ...............................................................................................451Firas Bader, Andra Radoveneanu, and Hani Ragab-Hassen

An Access Control Framework for the Web of Data .................................................................................456Owen Sacco, Alexandre Passant, and Stefan Decker

Trust ME: A Trust Decision Framework for Mobile Environments ............................................................464Gonzalo Huerta-Canepa, Dongman Lee, and Seon Yeong Han

A Logical Framework of Proof-Carrying Survivability ...............................................................................472Yanjun Zuo and Suhas Lande

CNSSA: A Comprehensive Network Security Situation Awareness System ............................................482Rongrong Xi, Shuyuan Jin, Xiaochun Yun, and Yongzheng Zhang

Session A09: Key and Secret ManagementA Scalability Study of AAA Support in Heterogeneous NetworkingEnvironments with Global Roaming Support ............................................................................................488

Daniel Granlund and Christer Åhlund

Secret Sharing Scheme with Fairness ......................................................................................................494Youliang Tian, Jianfeng Ma, Changgen Peng, and Jianming Zhu

Distributed Private-Key Generation Scheme with Self-Certified Identity ..................................................501Yongming Xie and Guojun Wang

A Double Key-Sharing Based False Data Filtering Scheme in Wireless SensorNetworks ...................................................................................................................................................509

Qian Sun and Min Wu

Biometric Identification Using User Interactions with Virtual Worlds ........................................................517Ahmed Al-Khazzar and Nick Savage

xi

Page 9: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Repeated Differential Properties of the AES-128 and AES-256 Key Schedules ......................................525Jianyong Huang, Willy Susilo, and Jennifer Seberry

Lightweight Hidden Services ....................................................................................................................533Andriy Panchenko, Otto Spaniol, Andre Egners, and Thomas Engel

Security Issues in NoSQL Databases .......................................................................................................541Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, and Jenny Abramov

Session A10: Trust & NetworksA Reliable and Secure Distributed In-network Data Storage Schemein Wireless Sensor Networks ....................................................................................................................548

Muhammad Bashir Abdullahi, Guojun Wang, and Felix Musau

Trust-Based Approaches to Solve Routing Issues in Ad-Hoc WirelessNetworks: A Survey ..................................................................................................................................556

Jesus M. Gonzalez, Mohd Anwar, and James B.D. Joshi

Highly Efficient Distance-Based Anomaly Detection through Univariatewith PCA in Wireless Sensor Networks ....................................................................................................564

Miao Xie, Song Han, and Biming Tian

RealProct: Reliable Protocol Conformance Testing with Real Nodesfor Wireless Sensor Networks ..................................................................................................................572

Junjie Xiong, Edith C.-H. Ngai, Yangfan Zhou, and Michael R. Lyu

A Quantitative Approach to Triaging in Mobile Forensics .........................................................................582Fabio Marturana, Gianluigi Me, Rosamaria Bertè, and Simone Tacconi

Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks ..........................................589Raihana Ferdous, Vallipuram Muthukkumarasamy, and Elankayer Sithirasenan

Cross-Platform Application Sharing Mechanism ......................................................................................597Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes

TVLAN: Trusted and Virtualised Local Area Networks .............................................................................606Udaya Tupakula and Vijay Varadharajan

Session A11: Trust & ApplicationA Decentralized Repair Mechanism for Decentralized Erasure Code BasedStorage Systems ......................................................................................................................................613

Hsiao-Ying Lin, Wen-Guey Tzeng, and Bao-Shuh Lin

Intelligent Assistant for Context-Aware Policies .......................................................................................621Helen Balinsky, Neil C. A. Moore, and Steven J. Simske

Publicly Posted Composite Documents in Variably Ordered Workflows ..................................................631Helen Balinsky, Liqun Chen, and Steven J. Simske

xii

Page 10: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Design Comparison to Identify Malicious Hardware in External IntellectualProperty ....................................................................................................................................................639

Trey Reece, Daniel B. Limbrick, and William H. Robinson

Unwanted Traffic Control via Global Trust Management ..........................................................................647Zheng Yan, Raimo Kantola, and Yue Shen

A Secure Multicoupon Solution for Multi-merchant Scenarios .................................................................655Andreu Pere Isern-Deyà, M. Francisca Hinarejos, Josep-Lluís Ferrer-Gomila,and Magdalena Payeras-Capellà

Efficiently Achieving Full Three-Way Non-repudiation in Consumer-LeveleCommerce and M-Commerce Transactions ...........................................................................................664

Stephen W. Neville and Michael Horie

Exploring and Enhancing the Performance of Parallel IDS on Multi-coreProcessors ................................................................................................................................................673

Haiyang Jiang, Jianhua Yang, and Gaogang Xie

The Third International Symposium on UbiSafe Computing(UbiSafe 2011)

Session B01: Model, Algorithm and ServiceA Model for Automating Persistent Identity Clone in Online Social Network ............................................681

Bhume Bhumiratana

Dependable Context-Sensitive Services in Cyber Physical Systems .......................................................687Kaiyu Wan and Vangalur Alagar

Statistical Fault Localization via Semi-dynamic Program Slicing .............................................................695Rongwei Yu, Lei Zhao, Lina Wang, and Xiaodan Yin

Decreasing SoC Test Power Dissipation and Test Data Volume Basedon Pattern Recombination ........................................................................................................................701

Chunlei Mei, Maoxiang Yi, and Zhifei Shen

Session B02: Security and TrustFlexible Communication: A Secure and Trust-Based Free Wi-Fi PasswordSharing Service ........................................................................................................................................706

Carlos Ballester Lafuente, Xavier Titi, and Jean-Marc Seigneur

An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-BasedMANETs ....................................................................................................................................................714

Fatemeh Barani and Mahdi Abadi

An Enhanced Method for Computation of Similarity between the Contextsin Trust Evaluation Using Weighted Ontology ..........................................................................................721

Mohammad Amin Morid, Amin Omidvar, and Hamid Reza Shahriari

xiii

Page 11: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

A Trusted Integrity Measurement Architecture for Securing Enterprise Network .....................................726Tong Liu and Prathima Agrawal

The Third International Workshop on Security ine-Science and e-Research (ISSR 2011)

Session C01: Security in e-Science and e-ResearchDesign and Implementation of Single Sign on System with Cluster CASfor Public Service Platform of Science and Technology Evaluation .........................................................732

Fang Huang, Cai-xia Wang, and Jun Long

A Framework for the Assessment of the Trustworthiness of Digital Recordsover Time ..................................................................................................................................................738

Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, and Mads Nygård

eHCBAC: Flexible Column Based Access Control for Electronic HealthcareSystems ....................................................................................................................................................745

Mei Liu, Ge Fu, and Jiwu Jing

Enhancing Flexibility of TCG's TNC through Layered Property Attestation ..............................................751Aimin Yu and Shijun Zhao

Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning .......................................757Md Tanzim Khorshed, A. B. M. Shawkat Ali, and Saleh A. Wasimi

Flogger: A File-Centric Logger for Monitoring File Access and Transferswithin Cloud Computing Environments .....................................................................................................765

Ryan K. L. Ko, Peter Jagadpramana, and Bu Sung Lee

The 2011 International Workshop on Security and Privacyin Internet of Things (SPIoT 2011)

Session D01: Security, Signature and DectectionRemedying the Hummingbird Cryptographic Algorithm ...........................................................................772

Xinxin Fan, Guang Gong, and Honggang Hu

A RFID-Based Context-Aware Service Model ..........................................................................................779Jinfang Sheng, Wen Zou, Liu Yang, and Bin Wang

Defining and Analyzing Insiders and Their Threats in Organizations .......................................................785Muntaha Alawneh and Imad M. Abbadi

Adaptive Client-Side LUT-Based Digital Watermarking ............................................................................795Chi-Man Pun, Jing-Jing Jiang, and C. L. Philip Chen

Identity-Based Strong Designated Verifier Signature Scheme with FullNon-Delegatability ....................................................................................................................................800

Fei Tang, Changlu Lin, Yong Li, and Shengyuan Zhang

xiv

Page 12: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Session D02: Privacy and AuthenticationProtection Profile of Personal Information Security System: Designinga Secure Personal Information Security System ......................................................................................806

Hyun-Jung Lee, Kwangwoo Lee, and Dongho Won

Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service ..........................................812Chi-won Song, Sungmin Park, Dong-wook Kim, and Sooyong Kang

Home Service Communities and Authentication ......................................................................................818Warodom Werapun, Julien Fasson, and Beatrice Paillassa

Key Privacy in McEliece Public Key Cryptosystem ..................................................................................824Qiang Wang, Xue Qiu, Quan Zhang, and Chaojing Tang

Integrity Protection for Automated Teller Machines ..................................................................................829Ronald Petrlic

The 2011 International Workshop on Anonymityand Communication Systems (ACS 2011)

Session E01: Anonymity and Communication SystemsGroup Formation with Neighbor Similarity Trust in P2P E-Commerce .....................................................835

Felix Musau, Guojun Wang, and Muhammad Bashir Abdullahi

STrust: A Trust Model for Social Networks ...............................................................................................841Surya Nepal, Wanita Sherchan, and Cecile Paris

Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing ....................................847Mohd Izuan Hafez Ninggal and Jemal Abawajy

The 2011 International Workshop on Trust and Identityin Mobile Internet, Computing and Communications (TrustID2011)

Session F01: Trust and IdentityTheoretical Issues in the Study of Trust in Human-Computer Interaction ................................................853

Zheng Yan, Raimo Kantola, and Peng Zhang

Implementation of a Reputation System for Pervasive Social Networking ...............................................857Yu Chen, Zheng Yan, and Valtteri Niemi

Design and Evaluation of an Architecture for Ubiquitous User AuthenticationBased on Identity Management Systems .................................................................................................863

Marc Barisch

xv

Page 13: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Building up Trusted Identity Management in Mobile HeterogeneousEnvironment ..............................................................................................................................................873

Peng Zhang, Hanlin Sun, and Zheng Yan

Internet Users' Security and Privacy While They Interact with Amazon ...................................................878Giampaolo Bella and Lizzie Coles-Kemp

A New Multivariate Hash Function with HAIFA Construction ...................................................................884Youjiao Zou, Wenping Ma, Zhanjun Ran, and Shangping Wang

The Role of Trust in Social Life .................................................................................................................889Dong Yan and Wang Qi

Reputation Based Collaboration among Ethernet Switches .....................................................................893Timo Kiravuo

The 2011 International Workshop on Security and QuantumCommunications (SQC 2011)

Session G01: Security and Quantum CommunicationsGray Map and Quantum Codes over the Ring F_2+uF_2+u^2F_2 ..........................................................897

Xunru Yin and Wenping Ma

Quantum Secure Communication Based on Nonmaximally Entangled QubitPair and Dining Cryptographers Problem .................................................................................................900

Ronghua Shi, Qian Su, Ying Guo, and Moon Ho Lee

Multiparty Quantum Group Signature Scheme with Quantum ParallelComputation .............................................................................................................................................905

Ronghua Shi, Jinjing Shi, Ying Guo, and Moon Ho Lee

Quantum Distributed Ballot Scheme Based on Entanglement Swapping ................................................911Xiaoping Lou and Zhigang Chen

Phishing Email Feature Selection Approach ............................................................................................916Isredza Rahmi A. Hamid and Jemal Abawajy

The 2011 International Workshop on Trust and Securityin Cloud Computing (TSCloud 2011)

Session H01: Trust and Security in Cloud ComputingStudy on IP Prefix Hijacking in Cloud Computing Networks Based on AttackPlanning ....................................................................................................................................................922

Yujing Liu, Wei Peng, and Jinshu Su

User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment .........................................927Adeela Waqar, Asad Raza, and Haider Abbas

xvi

Page 14: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Towards a Trust Management System for Cloud Computing ...................................................................933Sheikh Mahbub Habib, Sebastian Ries, and Max Mühlhäuser

Migration to Cloud as Real Option: Investment Decision under Uncertainty ............................................940Chew-Yean Yam, Adrian Baldwin, Simon Shiu, and Christos Ioannidis

The 2011 International Conference on Embedded Softwareand Systems (ICESS-11)

Session I01: Real-Time Systems and Scheduling IRelease Offset Bounds for Response Time Analysis of P-FRP UsingExhaustive Enumeration ...........................................................................................................................950

Chaitanya Belwal, Albert M.K. Cheng, and Walid Taha

Permutational Genetic Algorithm for the Optimized Assignment of Prioritiesto Tasks and Messages in Distributed Real-Time Systems .....................................................................958

Ekain Azketa, Juan P. Uribe, Marga Marcos, Luís Almeida, and J. Javier Gutiérrez

Feasibility Interval for the Transactional Event Handlers of P-FRP ..........................................................966Chaitanya Belwal and Albert M.K. Cheng

Offline Validation of Real-Time Application Constraints Considering AdaptationRules .........................................................................................................................................................974

Mohamed-Lamine Boukhanoufa, Ansgar Radermacher, and François Terrier

Efficient Elastic Resource Management for Dynamic Embedded Systems .............................................981Ricardo Marau, Karthik Lakshmanan, Paulo Pedreiras, Luís Almeida,and Raj Rajkumar

Real-Time Scheduling for Phase Change Main Memory Systems ...........................................................991Miao Zhou, Santiago Bock, Alexandre P. Ferreira, Bruce Childers,Rami Melhem, and Daniel Mossé

SPARTS: Simulator for Power Aware and Real-Time Systems ...............................................................999Borislav Nikolić, Muhammad Ali Awan, and Stefan M. Petters

Session I02: Embedded ArchitecturesA Hardware/Software Countermeasure and a Testing Framework for CacheBased Side Channel Attacks ..................................................................................................................1005

Ankita Arora, Sri Parameswaran, Roshan Ragel, and Darshana Jayasinghe

hUBI: An Optimized Hybrid Mapping Scheme for NAND Flash-Based SSDs ........................................1015Guangjun Xie, Guangzhi Xu, Gang Wang, Xiaoguang Liu, Rui Cao, and Yan Gao

Learning-Directed Dynamic Voltage and Frequency Scaling for ComputationTime Prediction .......................................................................................................................................1023

Ming-Feng Chang and Wen-Yew Liang

xvii

Page 15: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

DSBS: Distributed and Scalable Barrier Synchronization in Many-CoreNetwork-on-Chips ...................................................................................................................................1030

Xiaowen Chen and Shuming Chen

Minimizing Schedule Length via Cooperative Register Allocation and LoopScheduling for Embedded Systems ........................................................................................................1038

Yazhi Huang, Qingan Li, and Chun Jason Xue

Optimal Data Placement for Memory Architectures with Scratch-Pad Memories ..................................1045Yibo Guo, Qingfeng Zhuge, Jingtong Hu, and Edwin H.-M. Sha

Session I03: Real-Time Systems and Scheduling IIOn Partitioned Scheduling of Fixed-Priority Mixed-Criticality Task Sets ................................................1051

Owen R. Kelly, Hakan Aydin, and Baoxian Zhao

A Sufficient Schedulability Test for Real-Time Software Transactional Memory ....................................1060Chaitanya Belwal and Albert M.K. Cheng

Response Time Analysis of COTS-Based Multicores Consideringthe Contention on the Shared Memory Bus ............................................................................................1068

Dakshina Dasari, Björn Andersson, Vincent Nelis, Stefan M. Petters,Arvind Easwaran, and Jinkyu Lee

Efficient Implementation of Thermal-Aware Scheduler on a Quad-coreProcessor ................................................................................................................................................1076

Xiaojing Yin, Yongxin Zhu, Liang Xia, Jingwei Ye, Tian Huang, Yuzhuo Fu,and Meikang Qiu

Thermal-Aware Scheduling of Critical Applications Using Job Migrationand Power-Gating on Multi-core Chips ...................................................................................................1083

Buyoung Yun, Kang G. Shin, and Shige Wang

Schedulability Analysis of Transactions in Software Transactional MemoryUsing Timed Automata ...........................................................................................................................1091

Chaitanya Belwal and Albert M.K. Cheng

Session I04: Formal Methods and Analysis ToolsVisualization of Computational Processes of Procedural AbstractionOptimization Passes ...............................................................................................................................1099

Stefan Schaeckler and Nityananda Jayadevaprakash

Tool Support for Automated Traceability of Test/Code Artifacts in EmbeddedSoftware Systems ...................................................................................................................................1109

Christian Wiederseiner, Vahid Garousi, and Michael Smith

Automatic Model Building and Verification of Embedded Softwarewith UPPAAL ..........................................................................................................................................1118

Xiaoli Gong, Jie Ma, Qingcheng Li, and Jin Zhang

xviii

Page 16: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

A Precise Memory Model for Operating System Code Verification ........................................................1125Geng Chen, Lei Luo, and Lijie Wang

A Distributed Real-Time Operating System with Location-Transparent SystemCalls for Task Management and Inter-task Synchronization ..................................................................1133

Takahiro Chiba, Yuichi Itami, Myungryun Yoo, and Takanori Yokoyama

Parallel Data Cube Construction Based on an Extendible MultidimensionalArray .......................................................................................................................................................1139

Dong Jin and Tatsuo Tsuji

Session I05: Safe and Reliable SystemsSafety Verification of Non-linear, Planar Proportional Control with DifferentialInclusions ................................................................................................................................................1146

Hallstein Asheim Hansen

Probabilistic Schedulability Guarantees for Dependable Real-Time Systemsunder Error Bursts ..................................................................................................................................1154

Hüseyin Aysan, Radu Dobrin, Sasikumar Punnekkat, and Rolf Johansson

FTGS: Fault-Tolerant Fixed-Priority Scheduling on Multiprocessors .....................................................1164Risat Mahmud Pathan and Jan Jonsson

A UML Model-Based Approach for Replication Assessment of AUTOSARSafety-Critical Applications .....................................................................................................................1176

Sara Tucci-Piergiovanni, Chokri Mraidha, Ernest Wozniak, Agnes Lanusse,and Sebastien Gerard

Verification-Based Multi-backup Firmware Architecture, an Assuranceof Trusted Boot Process for the Embedded Systems .............................................................................1188

Hongfei Yin, Hongjun Dai, and Zhiping Jia

UML-Based Analysis of Power Consumption for Real-Time EmbeddedSystems ..................................................................................................................................................1196

Matthias Hagner, Adina Aniculaesei, and Ursula Goltz

Session I06: Embedded Applications and WSNsEfficient Java Native Interface for Android Based Mobile Devices .........................................................1202

Yann-Hang Lee, Preetham Chandrian, and Bo Li

Resource Management for Robotic Applications ....................................................................................1210Yi-Zong Ou, E. T.-H. Chu, Wen-Wei Lu, Jane W. S. Liu, Ta-Chih Hung,and Jwu-Sheng Hu

Auction-Based Adaptive Sensor Activation Algorithm for Target Trackingin WSNs ..................................................................................................................................................1217

Shaohua Liang, Md. Zakirul Alam Bhuiyan, and Guojun Wang

xix

Page 17: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

A Distributed and Shortest-Path-Based Algorithm for Maximum Cover SetsProblem in Wireless Sensor Networks ...................................................................................................1224

Feng Zeng, Lan Yao, Zhigang Chen, and Huamei Qi

Visual Navigation System with Real-Time Image Processing for Patrol ServiceRobot ......................................................................................................................................................1229

Kenichi Asami, Hayato Hagiwara, and Mochimitsu Komori

An Efficient Stereoscopic Game Conversion System for Embedded Platform .......................................1235Hao Liu, Wei Guo, Chao Lu, and Jizeng Wei

The 2011 International Symposium on Advanced Topicson Embedded Systems and Applications (ESA-11)

Session J01: Advanced Topics on Embedded Systemsand ApplicationsAutonomous Parameter and Schedule Configuration for TDMA-BasedCommunication Protocols Such as FlexRay ...........................................................................................1241

Patrick Heinrich, Dirk Eilers, Rudi Knorr, Markus Königer, and Bernd Niehoff

Comparative Analysis of Power Consumption in the Implementationof Arithmetic Algorithms ..........................................................................................................................1247

Alexandre Wagner C. Faria, Leandro P. de Aguiar, Daniel D. Lara,and Antonio A. F. Loureiro

Extending EAST-ADL2 to Support Aspectual Requirement Specificationand Analysis for Automotive Software ....................................................................................................1255

Xiaojian Liu and Zhixue Wang

An Advanced and Effective Literature Search Algorithm Based on AnalyticHierarchy Process ..................................................................................................................................1264

Qiong Wang, Cong Liu, and Zhiying Wang

Detection DoS Attack on FPGA Using Fuzzy Association Rules ...........................................................1271Taner Tuncer and Yetkin Tatar

Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad HocNetworks .................................................................................................................................................1277

Hui Xia, Zhiping Jia, Lei Ju, and Youqin Zhu

A Software Fault-Tolerant Method Based on Exception Handling in RT/ESystem ....................................................................................................................................................1283

Zhou Lu, Kailong Zhang, and Xingshe Zhou

xx

Page 18: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

The 2011 International Workshop on Computer SystemEducation and Innovation (IWCSEI 2011)

Session K01: Computer System Education and InnovationUsing Project-Based Learning and Collaborative Learning in SoftwareEngineering Talent Cultivation ................................................................................................................1288

Hongzhi Song, Guodong Si, Lei Yang, Huakun Liang, and Lixia Zhang

Study of Experiment Structure in the Computer Networks Course Using PBLMethodology ...........................................................................................................................................1294

Li Cheng and Cong Wang

The Effective Second Classroom on Embedded System Education ......................................................1298Yinbo Xie, ChengCheng Guo, and Jianfeng Yang

The Practice Teaching Reform of Modern Communication TechnologiesCourse for Non-communication Majors ..................................................................................................1303

Zhenzhou Tang, Chang Li, Chunrong Zhang, and Xiaoqiu Shi

Reform and Practice of Training Engineering Professionals in 2C+E ComputerScience ...................................................................................................................................................1308

Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, and Qingfeng Li

Study and Practice on Teaching Team Construction of Computer Specialtiesin Private Undergraduate Universities and Colleges ..............................................................................1313

Chaoxiang Chen, Shiping Ye, Binbin Zhou, and Guoyong Dai

Course Improvements to 'the Principle of Computer Organization' Basedon the Goal of Disciplinary Education: Taking the Examples of the ComputingScience Faculty of Zhejiang University City College ..............................................................................1319

Qifan Yang, Jianping Cai, Jianzhong Wu, and Meimei Huo

Teaching Method Practicing on Embedded Software Engineering Curriculum ......................................1323Yikui Zhang, Yunfen Tian, Liwei Zhu, and Haoxiang Zuo

The 6th International Conference on Frontier of ComputerScience and Technology (FCST-11)

Session L01: Parallel and Distributed ComputingOptimal Tracking Agent: A New Framework for Multi-agent ReinforcementLearning ..................................................................................................................................................1328

Weihua Cao, Gang Chen, Xin Chen, and Min Wu

A Global Scheduling Algorithm Based on Dynamic Critical Path ...........................................................1335Xing Gu, Qun Yang, De-chang Pi, and He-yang Ke

xxi

Page 19: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Power Optimization for GPU Programs Based on Software Prefetching ...............................................1339Yisong Lin, Tao Tang, and Guibin Wang

I/O Scheduling by Using Multi-network Interfaces of Virtualization System ...........................................1347Xia Xie, Haiqing Zhu, Wenzhi Cao, Hai Jin, and Pingpeng Yuan

The Research of Levenberg-Marquardt Algorithm in Curve Fittings on MultipleGPUs ......................................................................................................................................................1355

Lingjie Zhang, Ying Zhao, and Kaixi Hou

Object-Level Data Model for Keyword Search over Relational Databases ............................................1361Jun Zhang and Renjun Shao

Efficient GPGPU-Based Parallel Packet Classification ..........................................................................1367Che-Lun Hung, Hsiao-Hsi Wang, Shih-Wei Guo, Yaw-Ling Lin, and Kuan-Ching Li

Session L02: Pervasive, Grid, P2P and Cloud ComputingContext-Aware Vertical Handoff Decision Scheme in Heterogeneous WirelessNetworks .................................................................................................................................................1375

Jun Peng, Huiyuan Xian, Xiaoyong Zhang, and Zheqin Li

An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications ...................................1381Wei Liu, Feiyan Shi, and Wei Du

Abnormal Process Instances Identification Method in Healthcare Environment ....................................1387Bingning Han, Lihong Jiang, and Hongming Cai

A Simulation Study of Unstructured P2P Overlay for Multimedia Streaming .........................................1393Deng Li, Zhigang Chen, Jiaqi Liu, Hui Liu, and Zhong Ren

Towards User Intent Based Searching ...................................................................................................1400Haibo Yu, Tsunenori Mine, and Makoto Amamiya

An Efficient Load Balancing Multi-core Frequent Patterns Mining Algorithm .........................................1408Kun-Ming Yu and Shu-Hao Wu

Fault Tolerance Policy on Dynamic Load Balancing in P2P Grids .........................................................1413Tian-Liang Huang, Tian-An Hsieh, Kuan-Chou Lai, Kuan-Ching Li,Ching-Hsien Hsu, and Hsi-Ya Chang

Session L03: Network and Internet ComputingPower Control Game Algorithm Based on Combination Pricing Function ..............................................1421

Sheng Liu, Hongdan Liu, and Zhenguo Gao

A Block Gathering Based on Mobile Web Page Segmentation Algorithm ..............................................1425Libing Wu, Yalin Ke, Yanxiang He, and Nan Liu

A Two-Layered Replica Management Method .......................................................................................1431Chuncong Xu, Xiaomeng Huang, Guangwen Yang, and Yang Zhou

xxii

Page 20: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

An Email Server Optimized for Storage Issues ......................................................................................1437Yi Li, Mingzhe Zhang, and Jiaqi Gu

Improving the Adaptiveness of FAST TCP Based on the Stabilitywith Time-Delay ......................................................................................................................................1444

Kefei Wang, Heying Zhang, Lihong Peng, and Baohua Fan

Achieving High Throughput in High-Radix Switch ..................................................................................1452Ming Fang, Songqiao Chen, and Kefei Wang

Session L04: Computer Vision and Image ProcessingAnisotropic Band-Pass Trilateral Filter for Creating Artistic Painting from RealImage ......................................................................................................................................................1457

Xiaohua Zhang, Yuto Yoshida, and Ning Xie

Modeling Trees with Rugged Surfaces ...................................................................................................1464Atsushi Mizoguchi and Kazunori Miyata

A Power Law Transformation Predicting Lightness Conditions Based on SkinColor Space Detection ............................................................................................................................1472

Emmanuel Kondela and Huang Dong Jun

An Efficient Method of Tracking across Multiple Cameras .....................................................................1477Muhammad Hassan, Ahsen Mehmood, and Muhammad Faisal Khan

Nose Surgery Simulation Based on Volumetric Laplacian Deformation .................................................1482Jinshun Li and Yanyu Hu

Fusing Audio-Words with Visual Features for Pornographic Video Detection ........................................1488Yizhi Liu, Xiangdong Wang, Yongdong Zhang, and Sheng Tang

Text Line Based Correction of Distorted Document Images ..................................................................1494Sanding Luo, Xiaomin Fang, Cong Zhao, and Yisha Luo

Session L05: Pattern Recognition and Artificial IntelligenceOverlapping One-Class SVMs for Utterance Verification in SpeechRecognition .............................................................................................................................................1500

Cuiqin Hou, Yibin Hou, Zhangqin Huang, and Qian Liu

Chinese Traffic Police Gesture Recognition in Complex Scene .............................................................1505Fan Guo, Zixing Cai, and Jin Tang

Preference-Based Top-K Influential Nodes Mining in Social Networks ..................................................1512Yunlong Zhang, Jingyu Zhou, and Jia Cheng

A Weighted Cluster Ensemble Algorithm Based on Graph ....................................................................1519Xiao-ping Fan, Yue-shan Xie, Zhi-fang Liao, Xiao-qing Li, and Li-min Liu

The Hot Keyphrase Extraction Based on TF*PDF ..................................................................................1524Yan Gao, Jin Liu, and PeiXun Ma

xxiii

Page 21: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

A Decision Making Ontology Building Process for Analytical RequirementsElicitation ................................................................................................................................................1529

Fahmi Bargui, Hanene Ben-Abdallah, and Jamel Feki

Clustering Algorithm for High Dimensional Data Stream over Sliding Windows ....................................1537Weiguo Liu and Jia OuYang

Session L06: System Software and Software EngineeringCapability as Requirement Metaphor .....................................................................................................1543

Jiang Cao, Xinjun Mao, Huining Yan, Yushi Huang, Huaimin Wang, and Xicheng Lu

Variable Precision Rough Set-Based Fault Diagnosis for Web Services ...............................................1550Chengying Mao

A Web Services Composition Model and Its Verification Algorithm Basedon Interface Automata ............................................................................................................................1556

Jianhua Li, Songqiao Chen, Lin Jian, and Hongyu Zhang

Towards a Behavior-Based Restructure Approach for Service Composition .........................................1564Zaiwen Feng, Keqing He, Rong Peng, and Buqing Cao

Design Pattern for Self-Organization Multi-agent Systems Based on Policy .........................................1572Yi Guo, Xinjun Mao, and Cuiyun Hu

Plug-In Based Integrated Development Platform for Industrial ControlSystem-P-IDP4ICS .................................................................................................................................1578

Bin Wang, Dan Yin, Taiwen Wu, and Jinfang Sheng

Session L07: Security, Reliability and TrustworthyComputingA Certificate Driven Access Control Strategy for Service Composition and ItsAnalysis ..................................................................................................................................................1584

Guisheng Fan, Huiqun Yu, Liqiong Chen, and Dongmei Liu

CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threatin the Cloud Computing Era ....................................................................................................................1592

Nan Zhang, Jiwu Jing, and Peng Liu

Towards Detecting Thread Deadlock in Java Programs with JVM Introspection ...................................1600Yan Wen, Jinjing Zhao, Minhuan Huang, and Hua Chen

VerFAT: A Transparent and Efficient Multi-versioning Mechanism for FAT FileSystem ....................................................................................................................................................1608

Jiangjiang Wu, Zhiying Wang, Songzhu Mei, Yong Cheng, and Jiangchun Ren

A Property-Based Attestation Scheme with the Variable Privacy ...........................................................1616Yu Qin, Dexian Chang, Shijun Zhao, and Qianying Zhang

xxiv

Page 22: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

Session L08: Wireless Sensor Networks and MobileComputingMulti-relay Cooperative Mechanism with Q-Learning in Cognitive RadioMultimedia Sensor Networks ..................................................................................................................1624

Jun Peng, Junbo Li, Shuo Li, and Jing Li

An Iterative Multi-path Routing Protocol in Wireless Ad Hoc Networks ..................................................1630Zhongke Zhang and Yun Wang

A Game Theoretic Coalitional Bidding Scheme for Efficient Routingin Vehicular Ad Hoc Networks ................................................................................................................1638

Muhammad Bilal and Pauline ML Chan

A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless SensorNetworks .................................................................................................................................................1646

Zhiwu Huang, Yuan Cheng, and Weirong Liu

A Method for Searching the Centroid of a 3D Cluster Based on RSSI ...................................................1652Chen Weike, Shou Heng, and Li Wenfeng

Routing with Virtual Region Coordinates in Wireless Sensor Networks .................................................1657Zheng Ma, Weijia Jia, and Guojun Wang

Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks ........................................1662Jin Zheng, Xinlin Xu, and Guojun Wang

Session L09: Theoretical Computer Science, Algorithmand Bio-informaticsPhase-Wise Clustering of Time Series Gene Expression Data ..............................................................1668

Poonam Goyal, Navneet Goyal, Rohan Sunil Karwa, and Matthew John

A Formal Approach for Modeling Interactive Visual Interfaces ...............................................................1675Emanuele Covino and Giovanni Pani

A Quasi Physical Method for the Equal Sphere Packing Problem .........................................................1684WenQi Huang and Liang Yu

A Refined and Heuristic Algorithm for LD tagSNPs Selection ................................................................1691Hailin Chen, Zuping Zhang, and Jing Xia

Improved Partial Parallel Decision Feedback Multiuser Detectionfor Multiuser-MIMO System ....................................................................................................................1695

Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Minghui Wang, and Wenyue Zhang

xxv

Page 23: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

The Second International Workshop on Wireless Networksand Multimedia (WNM-11)

Session M01: Wireless Networks and MultimediaA Data Simulator for ZigBee-Base Wireless Sensor Network System ...................................................1699

Kun-Yung Lu

Energy Aware Routing Protocols for Wireless Sensor Networks Using DiscreteTransmission Energies ...........................................................................................................................1704

Karlócai Balázs, Bojárszky András, and Levendovszky János

Performance Design and Analysis of Handoff in Hierarchical WirelessNetworks .................................................................................................................................................1708

Z. Zabanoot and G. Min

A Biased Modified Binary Query Tree Protocol for RFID Tag CollisionResolution ...............................................................................................................................................1715

Xinqing Yan, Yan Xu, and Bin Li

Time-Based Detection and Location of Wormhole Attacks in Wireless Ad HocNetworks .................................................................................................................................................1721

Fei Shi, Dongxu Jin, Weijie Liu, and JooSeok Song

Energy-Efficiency Media Independent Handover Mechanism ................................................................1727Dongxu Jin, Fei Shi, and JooSeok Song

The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network ...................................1733Yinghui Meng, Jian Chen, Yingyou Wen, and Hong Zhao

The Second International Workshop on Mobile and WirelessNetwork Security (MWNS-11)

Session N01: Mobile and Wireless Network SecurityPerformance Analysis of Key Management Schemes in Wireless SensorNetwork Using Analytic Hierarchy Process ............................................................................................1739

Na Ruan, Yizhi Ren, Yoshiaki Hori, and Kouichi Sakurai

Chaotic Hash Function Based on Tandem-DM Construction .................................................................1745Li Gao, Xiaomin Wang, and Wenfang Zhang

Implementation and Performance Evaluation of an Adaptive Routing Algorithmin MANETs ..............................................................................................................................................1750

Annapurna P. Patil, K. Rajani Kanth, Apoorva Yadhava, Rakshith H. P.,and Joseph Tom

Session Key Generation for a Group Call and Device for Security Control ............................................1756Younchan Jung and Enrique Festijo

xxvi

Page 24: 2011 IEEE 10th International Conference on Trust, Security and …toc.proceedings.com/13846webtoc.pdf · 2012. 6. 4. · Launching Return-Oriented Programming Attacks against Randomized

The Second International Workshop on Pattern Recognition& Intelligence Computing (WPRIC -11)

Session O01: Pattern Recognition & Intelligence ComputingIdentification of Masses in Digital Mammogram Using an Optimal Setof Features ..............................................................................................................................................1763

Wenfeng Han, Jianwei Dong, Yuting Guo, Ming Zhang, and Jianzhong Wang

Automated Inspection Using X-Ray Imaging ..........................................................................................1769Wen ei Chen, Zuohua Miao, and Delie Ming

Semantic Web Service Automatic Composition Based on Service ParameterRelationship Graph .................................................................................................................................1773

Jianhua Li, Songqiao Chen, Yongjun Li, and Qian Zhang

The 2011 International Workshop on All-IP Next GenerationNetworks (AIPNGN 2011)

Session P01: All-IP Next Generation NetworksExploit TIVs to Find Faster Paths ...........................................................................................................1779

Yanhua Zhang, Chunhong Zhang, and Gang Wang

Context Awareness for Self-Adaptiveness in Smart Terminals ..............................................................1783Zhen Chen, Chunhong Zhang, and Yang Ji

Simulation Tools Enabling Research in Convergence of Fixed and MobileNetworks .................................................................................................................................................1789

Andreas Bontozoglou, Kun Yang, and Ken Guild

Performance Modelling and Analysis of Dynamic Class-Based Call AdmissionControl Algorithm Using Fuzzy Logic for Heterogeneous Wireless Networks ........................................1795

Sha Sha and Rosemary Halliwell

Author Index

xxvii

f


Recommended