Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010Proceedings

of: Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai

Springer-Verlag, 2010

ISBN: 9783642144783 , 654 Pages

Format: PDF, Read online

Copy protection: DRM

Windows PC,Mac OSX,Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Read Online for: Windows PC,Mac OSX,Linux

Price: 95,23 EUR



More of the content

Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010Proceedings


 

Preface

5

Organization

6

Workshop Preface

9

Workshop Organization

11

Table of Contents

13

The Third International Conference on Network Security and Applications (CNSA 2010)

19

Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks

19

Introduction

19

Preliminaries

20

Related Work

20

Key Pre-distribution Schemes

21

Revocation of Keys

21

Secure Data Aggregation Schemes

21

SDAKM Scheme

22

Secure Data Aggregation Scheme

23

Efficient Key Management Scheme

23

Performance Evaluation

24

Security Analysis of IHC

24

Security Analysis of Key Management Scheme

25

Conclusion

27

References

27

Data Security in Local Area Network Based on Fast Encryption Algorithm

29

Introduction

29

Review on the Symmetrical-Encryption Algorithms

30

The New Symmetrical Algorithm

32

Key Generation

32

Encryption

34

Decryption

35

Applications

35

The Results

41

Conclusion

43

References

44

Fuzzy Rule-Base Based Intrusion Detection System on Application Layer

45

Introduction

45

Architecture of the Fasids

46

Fuzzy Component for Non-intrusive Traffic

47

Working of Fuzzy Cognitive Mapper in Ids

47

Fuzzy Associative Memory by Fuzzy Rules

48

Algorithm for Fuzzy Intrusion Detection System

49

Results and Analysis

51

Conclusion

53

References

53

Trust Models in Wireless Sensor Networks: A Survey

55

Introduction

55

Security in WSNs

56

Notion of Trust

57

Trust in Sensor Networks

58

References

60

Load Balancing in Distributed Web Caching

65

Introduction

65

Issues

66

Solutions

67

Desirable Properties of Distributed Web Caching

67

Fast access

67

Robustness

67

Transparency

67

Scalability

67

Efficiency

68

Adaptivity

68

Stability

68

Load balancing

68

Simplicity

68

Problems in Distributed Web Caching

68

Extra Overhead

68

Size of Cache

68

Cache Coherence Problem

68

Scalability

68

Proposed Solution for Distributed Web Caching

68

The Proposed Caching System

69

Structure of Network

69

Proposed Architecture

69

Proposed Algorithm

70

Conclusions

72

References

72

TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups

73

Introduction

73

Related Work

74

Notations and Terminology

75

Broadcast Ring Based Group Communication

75

Join Protocol

75

Leave Protocol

76

Group Communication Using the Combination of Ring and Tree

77

Join Protocol

78

Leave Protocol

79

Analysis

81

Number of Keys at Each Member

81

Cost of Join

81

Cost of Leave

81

Conclusion

82

References

82

Image Classification for More Reliable Steganalysis

84

Introduction

84

Notations

85

Classification of Images for More Reliable Steganalysis

85

Experimental Results

89

Identification of Images Which Give Highly Inaccurate Results

89

Identification of Images Which Give Accurate Results

90

Conclusion

91

References

91

Security for High-Speed MANs/WANs

93

Introduction

93

Security Threats

95

Threat Identification

97

Security Concerns and TCP/ IP

98

Physical Security

99

Security Services and Mechanisms

99

Why a New Approach Is Needed

99

References

100

Behavioral Analysis of Transport Layer Based Hybrid Covert Channel

101

Introduction

101

Covert Communication

102

Importance of Covertness and Layers of Attack

103

Covert Channel Variants

104

Transport Layer Based Hybrid Covert Channel

105

NCT - SNCC Implementation

106

SCSL Implementation

108

Conclusion and Future Work

109

References

110

Efficient Encryption of Intra and Inter Frames in MPEG Video

111

Introduction

111

MPEG Coding Methodology

112

Video Security Algorithms

112

Proposed Encryption Method

114

Secret Sharing

114

Shamir’s Secret Sharing Scheme

115

Decryption of Intra and Inter Frames

116

Security Analysis

117

Key Space Analysis

117

Statistical Analysis

117

Experiments and Results

120

Conclusion

122

References

122

VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512

123

Introduction

123

SHA-512 Implementation

123

Preprocessing

124

Hash Computation

124

Proposed Model

126

Performance Analysis

129

Security Analysis

129

Conclusion

130

References

131

Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks

132

Introduction

132

Multicasting Protocols in MANET

133

Experimental Setup and Performance Metrics

135

Simulation Result

135

Conclusion and Future Work

138

References

140

A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks

141

Introduction

141

Security Attacks in MANET

142

Related Works

143

Other Related Work

144

The Proposed Scheme

144

Nature of Association between Neighbouring Nodes in an Ad Hoc Network

144

Association Estimator Technique

145

Routing Mechanism

145

Simulation Set Up

146

Results and Discussions

146

Conclusion

147

References

148

Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks

150

Introduction

150

Admission of Voice Calls Using Delay Analysis Method in Differentiated Services

151

Components of the Qos-Provisioning System

152

Design of a Call Admission Control Agent (CACA)

153

Utilization-Based Deterministic Delay Analysis

154

Utilization-Based Statistical Delay Analysis

155

Proposed Method for Securing ARP Cache Poisoning Attack

155

Secure ARP Request and Response between LAN

156

Experimental Results for Admission of Voice Calls Using Delay Analysis Method

157

Performance of Authenticated Voice User Admission Procedure in VOIP Network

157

Verification of Prevented ARP Cache Poisoning Attack Using MessageIntegrity and Message Authentication

158

Conclusion

159

References

160

Wireless Mesh Networks: Routing Protocols and Challenges

161

Introduction

161

Routing Layer Challenges

162

Routing Metrics

162

Hop Count

163

Blocking Metric

163

Expected Transmission Count (ETX)

163

Expected Transmission Time (ETT)

163

Routing Protocols

163

Optimized Link State Routing (OLSR) Protocol

164

Fish-Eye State Routing Protocol

164

Destination Sequenced Distance Vector (DSDV)

165

The Wireless Routing Protocol (WRP)

165

Clusterhead Gateway Switching Routing Protocol (CGSR)

165

Zone Based Hierarchical Link State Routing Protocol (ZHLS)

166

Ad Hoc On Demand Distance Vector Routing (AODV)

166

Temporally-Ordered Routing Algorithm- TORA

166

Dynamic Source Routing- DSR

167

Application Scenarios

167

Wireless Broadband Home Networking

168

Enterprise Networking

168

Broadband Community Networking

168

Conclusion

168

References

168

Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification

170

Introduction

170

Two Approaches for Protocol Verification

170

Formal Verification of Security Protocols

171

Belief Logics

171

Theorem Proving Based Approaches

172

State Exploration

172

Model Checking Tools

173

Protocol Verification Using Scyther

177

Comparative Analysis of Formal Method Model Checking Tools

179

Conclusion

180

References

180

Secured Paradigm for Mobile Databases

182

Introduction

182

Related Works

183

Encryption

183

Issues

183

Architecture

184

Proposed Architecture

184

Server Side Security

186

Client Side Security

186

Security during Data Transmission

187

Advantages of the Proposed Architecture

187

Conclusion

188

References

188

Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks

190

Introduction

190

Cryptography for WSN

191

Need of Asymmetric Key Cryptosystem

192

Crypt Algorithms for WSN

192

RSA Algorithm

192

ELGAMAL Algorithm

194

Simulation Results

194

ELGAMAL Algorithm-Energy Diagram

195

RSA Algorithm-Energy Diagram

196

Comparison of RSA and ELGAMAL

197

Conclusion

197

References

198

Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET

199

Introduction

199

Related Work

200

Trust Based Multipath DSR

201

Route Discovery at Source Node

201

RREQ Processing at Intermediate Nodes

202

RREP at Destination Node

202

RREP Processing at Intermediate Nodes

202

Path Decision at Source Node

202

Extended - Trust Based Multi-path Dynamic Source Routing(E-TMDSR)

203

Discovery of Multiple Paths

203

Path Selection

203

Traffic Allocation

204

Route Maintenance

204

Security Analysis of E-TMDSR

204

Protection against Malicious Colluding Nodes

204

Black Hole and Gray Hole Attacks

205

Cache Poisoning

205

Performance Analysis of E-TMDSR

205

Metrics

205

Discussion of Results

205

Conclusions and Future Work

207

References

207

A Flow Based Slow and Fast Scan Detection System

209

Introduction

209

Related Work

210

ProposedSystem

211

Architecture

211

Detection Methods

213

Experiments

215

Test Set-Up

215

Result

215

Result Analysis

216

Fast Scan Detection

216

Slow Scan Detection

216

Conclusion

217

References

218

A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices

219

Introduction

220

Problems in the Traditional Method

220

Related Work

221

Authentication

222

Authentication Factors

222

Indirect Authentication

222

Proposed Authentication Scheme

223

Initial Phase

223

Registration Phase

223

Login Phase

223

Authentication Phase

224

Security Analysis of Our Scheme

225

Denial of Service Attack

225

Forgery Attack

225

Password Guessing Attack

225

Parallel Session Attack

225

Mutual Authentication

225

Security Analysis

225

Implementation Results and Discussions

226

Experimental Setup

227

Time Complexity

227

Energy Requirements

228

Conclusion

230

References

230

Concurrent Usage Control Implementation Verification Using the SPIN Model Checker

232

Introduction

232

Related Work

233

Overview of Software Model Checking

234

The SPIN Model Checker

234

Concurrent Usage Control Authorization Implementation Verification

234

Verification Using the SPIN

235

Case Study

236

Safe Usage Control Authorization Model Design

236

Usage Control Implementation Verification

237

Conclusion

240

References

240

Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory

242

Introduction

242

AES (Advanced Encryption Standard)

243

Pipelining of AES Encryption

243

Search Based Memory

244

Pipelining of Key Schedule Algorithm

245

Pipelined Architecture for Key Expansion Module

245

Comparison of Hardware Utilization

245

Conclusion

248

References

248

A SAT Based Verification Framework for Wireless LAN Security Policy Managemen Supported by STRBAC Model

250

Introduction

250

Related Work

251

WLAN Security Policy Management System

252

Proposed Spatio-temporal RBAC Model for WLAN Policy Management

253

Modeling Basic RBAC Entities in the Proposed System

254

Modeling of Global Policy

255

SAT Based Security Property Verification

256

Boolean Modeling STRBAC Entities and Policy Configurations

256

SAT Solver and SAT Query Formulation

257

Conclusion

258

References

258

Detection and Classification of DDoS Attacks Using Fuzzy Inference System

260

Introduction

260

Review of Literature

261

System Architecture

262

Anomaly Detection Dataset

263

Alert Generation

263

Alert Preprocessing

263

Alert Classification Using Fuzzy Inference System

265

Implementation Details

266

Results and Discussion

267

Key Findings of the Research

269

Conclusion

269

References

270

Detection and Recognition of File Masquerading for E-mail and Data Security

271

Introduction

271

Problem Definition

272

Design Goals

272

File Type Detection Methods

272

Literature Survey

274

Byte Frequency Distribution Techniques

274

Metric Based Techniques

275

Proposed Technique

275

File Header/Trailer Analysis

276

Multiple Discriminant Analysis/Compound File Type Detection

277

Tested Environment

277

Conclusion

278

Future Work

279

References

279

Privacy Preserving Mining of Distributed Data Using Steganography

281

Introduction

281

Related Works

283

Proposed Approach: Steganography

284

Conclusions

286

References

286

First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P

288

Proxy Re-signature Scheme That Translates OneType of Signature Scheme to Another Type of Signature Scheme

288

Introduction

288

Definition of Proxy Re-signature Scheme

289

Proxy Re-signature Scheme to Translate One Type of Signature Scheme to Another Type

290

Schnorr Signature Scheme to RSA Signature Scheme

290

ElGamal Signature to RSA Signature Scheme

292

Proxy Signer Revocation

294

Properties of the New Proxy Re-signature Schemes

295

Security of Our Schemes

295

Conversion of One Type of Signature to Another Type:Applications

296

Conclusion

296

References

297

Efficient Region-Based Key Agreement for Peer -to - PeerInformation Sharing in Mobile Ad Hoc Networks

298

Introduction

298

Proposed Scheme

299

System Model

299

Network Dynamics

301

Communication Protocol

303

Applying Elliptic Curve Based Diffie-Hellman Key Exchange

304

Tree-Based Group Elliptic Curve Diffie-Hellman Protocol

306

Experimental Results and Discussion

308

Searching for Information [4,5,6]

308

Normal Search

309

Content Search

309

Performance Analysis

310

Storage Overhead

311

Communication Overhead

312

Computation Overhead

312

Conclusion and Future Work

313

References

313

A Power Adjustment Approach for Multi-channelMulti-AP Deployment Using Cognitive Radio Concept

314

Introduction

314

Related Work

315

The Proposed Approach

315

Algorithm for Power Adjustment

318

Conclusion

318

References

319

Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise

320

Introduction

320

Related Work and Our Approach

321

Related Work

321

Our Unique Contributions

323

System Model

323

Protecting P2P Networks

325

Conscience Filters

325

Content Poisoning

326

Audit Trails

327

Circumventing Trust-Based Systems

327

Result Analysis

327

Creating Real-World Conscience

329

Conclusions and Future Work

330

References

330

Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks

332

Introduction

332

Heuristic Cognitive Approach for IEEE 802.11 WLAN

333

IEEE 802.11 Architecture

333

Cognitive Radio

334

Proposed Heuristic Model

335

802.11 Based Cognitive Radio Network

337

Operation Principles of the System

337

Overview of IEEE 802.11 DCF

338

Proposed 802.11 Based Cognitive Design Spectrum Sensing

339

Conclusion

340

References

340

Privacy Layer for Business Intelligence

341

Introduction

341

Preserving Privacy

342

Our Approach

343

The Privacy Layer

344

Components of Privacy Layer

344

Conclusion

346

References

347

Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm

349

Introduction

349

Overview of Existing Backoff Algorithms

351

Proposed Probability Based Backoff Algorithm

352

Comparative Analysis of BEB Algorithm, MBEB Algorithm and Proposed PBB Algorithm

353

Conclusion

356

References

356

Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing

358

Introduction

358

Related Work

359

Our Scheme

360

Setup Phase

360

SLA Details

360

Exposure Window

360

End of SLA Period

361

Destructor

361

Verifier

363

Proof of Destruction/Proof of Erasability

364

Analysis of Our Scheme

364

Conclusion

365

References

366

A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies

367

Introduction

367

Related to This Work

368

Identity Management – A Survey

368

Selection of Vendors for the Survey

368

Selection of Evaluation Criteria

369

State-of-the-Art IdM Taxonomies

369

Review of Different IdMs

369

IBM Tivoli Identity Manager

369

Novell Identity Manager

370

Sun Java System Identity Manager

371

Oracle Identity Management

371

CA Identity Manager

372

Comparison Results

373

Future Work

375

Conclusion

375

References

375

BubbleTrust: A Reliable Trust Management for Large P2P Networks

377

Introduction

377

BasicConcept

378

Calculation

379

Basic Algorithm

382

Data Management

384

Provider and Evaluator Function

385

Optimized Algorithms

387

Algorithm with Cutting Off

387

Limiting Depth

388

Using Values from Previous Runs

388

Evaluation and Data Analysis

389

Conclusion and Future Work

390

References

391

Dynamic Policy Adaptation for Collaborative Groups

392

Introduction

392

System Model

394

Peer Behavior and Roles

394

Change of Roles

395

Detailed Working of the Framework

395

Group Discovery and Advertisement

396

Admission Request

396

Authentication

397

Key Management

397

PDTBAC- Policy Driven Trust Based Access Control for P$_2$P Applications

397

Trust Model in Presence of Malicious Peers

400

Context Sensitive Layered Reputation Model

401

Design of Trust Model

402

Modeling Dynamic Policies Using Prolog

403

Modeling Rules for Join

403

Modeling Rules for Level Update

403

Modeling Dynamic Rules

404

Overall Working of Framework with Prolog

404

Application Framework

404

Peer Behavior

405

Implementation Details

405

Simulations and Graphs

406

Related Work

410

Conclusion

411

References

411

A Deviation Based Outlier Intrusion Detection System

413

Introduction

413

Intruder

413

Intrusion

414

Intrusion Detection

414

IDS Classification

414

Contemporary Research

415

Proposed Approach

415

Approach

415

Model

415

Conclusion and Future Works

419

References

419

Privacy Preserving Ciphertext Policy Attribute Based Encryption

420

Introudction

420

Our Contribution

421

Related Work

421

Preliminaries

422

Bilinear Maps

422

Access Structure

422

Ciphertext Policy Attribute Based Encryption

423

Security Model for CP-ABE

423

Construction

424

Security Analysis

425

Conclusion

426

References

427

Reliable Timeout Based Commit Protocol

428

Introduction

428

Proposed Solution: Reliable Timeout Based Commit Protocol

429

Transaction Execution at MH

430

Transaction Execution at Coordinator i.e. at BS

432

Recovery Model

433

Performance Analysis of Reliable Timeout Based Commit Protocol

434

Results

436

Conclusion and Future Work

436

References

436

Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)

438

Introduction

438

IoT Objectives

439

Naming and Addressing

439

Device Discovery and Network Discovery

439

Content and Service Access

439

Communication

440

Security and Privacy

440

Security Requirements

440

Key Properties of IoT

440

Challenges

441

High Level Security Requirements

441

Security and Threat Taxonomy for IoT

442

Related Work

443

Identity Certificate Frameworks

444

Single Sign-On

444

Identity Federation

444

User-Centric Identity Management

444

Device Security

445

Proposed Security Model for IoT

445

Conclusion

445

References

446

Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges

448

Introduction

448

Architectural Framework and Design Constraints

449

Identity Management

450

Related Work

451

OpenId

451

Liberty Alliance

452

Card-Space

452

Shibboleth

452

Higgins

452

Identity Modeling and Requirement Matrix

453

Proposed IdM Framework

455

Conclusion

456

References

456

Reputation Enhancement in a Trust Management System

458

Introduction

458

Related Work

459

Extended TUX-TMS Model

460

Architecture of TUX-TMS

460

Parameters

460

Partitioning of the Users

464

Results and Discussion

465

Performance against Malicious Users

466

Performance in a Distributed Environment

467

Conclusion

467

References

468

A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks

470

Introduction

470

Usage Scenario and Functional Requirements

471

The A-Code Primitive

472

The Experimental Platform

474

Experimental Results

476

Related Work

479

Conclusions and Future Work

479

References

480

Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks

481

Introduction

481

Related Work

482

Description of the Reliability-based Source Routing Protocol

483

Motivation

483

Attack Model

483

Reliability Metric Table and Beacon Broadcasts

484

Reliability Metric of a Path

485

Sequence of Steps for the RSR Protocol

485

Logic behind the Use of the Probe Packet and the Public Key Certificate

487

RSR Route Maintenance

487

Increment vs. Decrement Costs

487

Conclusions and Future Work

489

References

489

Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks

491

Introduction

491

Attacks on Vehicular Networks

492

Sybil Attack and Classification

492

Simulation of Sybil Attack in VANET

493

Simulation Parameters and Performance Metrics

494

Simulation Results

495

Related Work of Sybil Attack Detection

498

Proposed Sybil Attack Detection Technique for VANETs

498

Conclusions

499

References

500

Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis

501

Introduction

501

Related Work

502

Proposed Methodology

502

Conclusion and Limitations

506

References

507

Knowledge Base Compound Approach towards Spam Detection

508

Introduction

508

Spammer Approaches and Their Attack

510

Related Work

511

Proposed Methodology

511

Implementation and Analysis

513

Conclusion and Limitation

516

References

516

Trust Management Framework for UbiquitousApplications

518

Introduction

518

Security Approach for Typical Ubiquitous Applications

519

Related Work

520

Proposed Architecture for Trust Management Framework

521

Trust Value Calculation Using Inference Engine

523

Conclusion and Future Work

525

References

525

A Hybrid Address Allocation Algorithm for IPv6

527

Introduction

527

Existing IPv6 Address Allocation Algorithms

528

Bisection Allocation Algorithm

528

Rate-Sparse Allocation Algorithm

529

Existing Proposals on IPv6 Address Allocation Algorithms

530

Growth-based Address Partitioning Algorithm (GAP)

530

Common Address Pool (CAP)

531

Proposed Hybrid IPv6 Address Allocation Algorithm

532

Evaluation

533

Conclusion

534

References

534

Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols

536

Introduction

536

Related Literature Reviews

538

Proposed Model of Efficient and Dynamic Probabilistic Broadcasting Algorithm (EDPB)

539

Simulation Experimental Setup and Performance Metrics

540

Result Analysis

541

Conclusions

544

References

544

A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network

546

Introduction

546

Related Work

547

AODV and Modeling of the State Machine

548

Finite State Machine Model

548

The Proposed Algorithm

550

The Features of the Algorithm

550

The Detection Algorithm

551

Simulation Results

553

Conclusion and Future Work

554

References

555

A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks

556

Introduction

556

Related Work

557

Trust Manager

558

The Monitoring Module

558

The Reputation Handling Module

558

Simulation

562

Conclusion

564

References

564

Towards Designing Application Specific Trust Treated Model

566

Introduction

566

Motivation

567

Literature Review

568

Trust Models

568

Aspect-Oriented Methodologies

569

Trust Treated Model

570

Overview

570

Trust Modeling Process

570

Reputation Service - A Running Example

572

Conclusions and Future Work

573

References

574

First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010

576

Security for Contactless Smart Cards Using Cryptography

576

Introduction

576

Methodology and Architecture

578

Implementation and Result

580

Evaluation and Limitations

581

Future Enhancements

583

Conclusion

584

References

584

A Novel Approach for Compressed Video Steganography

585

Introduction

585

Architecture

586

Embedding and Extraction Mechanism

587

Embedding Position Selection

587

Compressed Video Steganographic Algorithm

588

Adaptive Rules to Reduce Distortion

589

Pseudo-random Dithering

589

The Embedding Algorithm

590

The Extraction Algorithm

591

Experimental Result

591

Capacity and PSNR

591

Conclusion

593

References

593

Privacy Preserving Data Mining by Cyptography

594

Introduction

594

Privacy Preserving

595

Cryptography: Oblivious Transfer

595

Two Party Case

596

Two Multi Party Case

597

Conclusion

599

References

600

A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure

601

Introduction

601

Proposed Framework

602

Proposed Algorithm

603

Analysis of Proposed Framework

604

Mining of Association Rules for Dense Dataset

605

Hyper-Linked Data Structure on Sparse Datasets

607

Performance Study and Experimental Results

609

Conclusion and Future Wok

610

References

610

Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm

611

Introduction

611

Related Work

612

Proposed Approach

613

Approach Decomposition

613

Algorithm

614

Results and Discussion

617

Conclusion

619

References

619

Design and Implementation of Pessimistic Commit Protocols in Mobile Environments

621

Introduction

621

Mobile Database System

622

Pessimistic Commit Protocols

623

Architecture of Mobile Transaction Management System

623

Mapping Functionality to Architecture

624

Design and Implementation of Pessimistic Commit Protocols

625

Mobility Management in Pessimistic Protocols

628

Data Structures

629

Conclusion

630

References

630

On Analyzing the Degree of Coldnessin Iowa, a North Central Region,United States: An XML Exploitation in Spatial Databases

631

Introduction

631

Approach

633

NC94 Dataset

633

Canonical Storage for XML (CanStoreX)

634

Common GUI

636

ParaSQL Query

637

Color Coding Scheme

638

Formulation

639

Algorithm to Calculate the Degree of Coldness

639

Model to Calculate the Darkness

640

Results

641

Related Work

641

Conclusion and Future Work

641

References

642

Implementation of MPEG-7 Document Management System Based on Native Database

643

Introduction

643

Related Works

644

MPEG-7 Data Clustering

645

Design of MDMS

646

General Structure of MDMS

647

Schema Management Subsystem

647

Document Management Subsystem

648

Implementation of MDMS

648

Implementation Environment

648

MDMS Packages

649

Storage Structure

649

Comparison of MPEG-7 Document Clustering Method

649

Conclusions and Future Work

651

References

652

Author Index

653