IFIP TC6 Open Digital Library

11. CISIM 2012: Venice, Italy

Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012. Proceedings

Agostino Cortesi, Nabendu Chaki, Khalid Saeed, Slawomir T. Wierzchon

Springer, Lecture Notes in Computer Science 7564, ISBN: 978-3-642-33259-3



Contents

Invited Talks

Formalising Security in Ubiquitous and Cloud Scenarios.

Chiara Bodei, Pierpaolo Degano, Gian Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti

 1-29

Designing Smart Cities: Security Issues.

Young Im Cho

 30-40

Security, Access Control and Intrusion Detection

Certificate-Based Encryption Scheme with General Access Structure.

Tomasz Hyla, Jerzy Pejas

 41-55

Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks.

Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny

 56-67

Usage Control Model Specification in XACML Policy Language - XACML Policy Engine of UCON.

Um-e-Ghazia, Rahat Masood, Muhammad Awais Shibli, Muhammad Bilal

 68-79

TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks.

Novarun Deb, Nabendu Chaki

 80-91

Intruder Data Classification Using GM-SOM.

Petr Gajdos, Pavel Moravec

 92-100

Method for Identification of Suitable Persons in Collaborators' Networks.

Pavla Drázdilová, Alisa Babskova, Jan Martinovic, Katerina Slaninová, Stepan Minks

 101-110

A Graph-Based Formalism for Controlling Access to a Digital Library Ontology.

Subhasis Dasgupta, Aditya Bagchi

 111-122

Role Approach in Access Control Development with the Usage Control Concept.

Aneta Poniszewska-Maranda

 123-134

Pattern Recognition and Image Processing

A New Algorithm for Rotation Detection in Iris Pattern Recognition.

Krzysztof Misztal, Jacek Tabor, Khalid Saeed

 135-145

Outlier Removal in 2D Leap Frog Algorithm.

Ryszard Kozera, Jacek Tchórzewski

 146-157

Dynamic Signature Recognition Based on Modified Windows Technique.

Rafal Doroz, Krzysztof Wrobel

 158-167

Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval.

Andrea Albarelli, Filippo Bergamasco, Andrea Torsello

 168-179

Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors.

Boguslaw Cyganek

 180-190

Biometric Applications

DTW and Voting-Based Lip Print Recognition System.

Piotr Porwik, Tomasz Orczyk

 191-202

Advances in the Keystroke Dynamics: The Practical Impact of Database Quality.

Mariusz Rybnik, Piotr Panasiuk, Khalid Saeed, Marcin Rogowski

 203-214

Advanced Intracardial Biosignal Processing.

Marek Penhaker, Petr Klimes, Jakub Pindor, David Korpas

 215-223

Multi-constraints Face Detect-Track System.

Hazar Mliki, Mohamed Hammami, Hanêne Ben-Abdallah

 224-235

Using a Differential Pressure Sensor as Spirometer.

Martin Augustynek, Ondrej Adamec, David Micanik

 236-241

Algorithms and Data Management

Hybrid Negative Selection Approach for Anomaly Detection.

Andrzej Chmielewski, Slawomir T. Wierzchon

 242-253

Spectral Clustering Based on k-Nearest Neighbor Graph.

Malgorzata Lucinska, Slawomir T. Wierzchon

 254-265

A New Scale for Attribute Dependency in Large Database Systems.

Soumya Sen, Anjan Dutta 0002, Agostino Cortesi, Nabendu Chaki

 266-277

Left-Right Oscillate Algorithm for Community Detection Used in E-Learning System.

Jan Martinovic, Pavla Drázdilová, Katerina Slaninová, Tomás Kocyan, Václav Snásel

 278-289

Plan and Goal Structure Reconstruction: An Automated and Incremental Method Based on Observation of a Single Agent.

Bartlomiej Józef Dzienkowski, Urszula Markowska-Kaczmar

 290-301

On Spectral Partitioning of Co-authorship Networks.

Václav Snásel, Pavel Krömer, Jan Platos, Milos Kudelka, Zdenek Horak

 302-313

An Efficient Binary Playfair Algorithm Using a 4×4 Playfair Key Matrix.

Saswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay

 314-325

Tuning of a Knowledge-Driven Harmonization Model for Tonal Music.

Mariusz Rybnik, Wladyslaw Homenda

 326-337

Efficient Processing the Braille Music Notation.

Tomasz Sitarek, Wladyslaw Homenda

 338-350

Networking

ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing Protocol.

Manali Chakraborty, Nabendu Chaki

 351-360

Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks.

Soumyabrata Saha, Rituparna Chaki

 361-373

System Models and Risk Assessment

A Business Process Modeling Notation Extension for Risk Handling.

Bartosz Marcinkowski, Michal Kuciapski

 374-381

Modeling Consumer Decision Making Process with Triangular Norms.

Agnieszka Jastrzebska, Wladyslaw Homenda

 382-394

Neural Network Modeling of a Flexible Manipulator Robot.

Rahma Boucetta, Mohamed Naceur Abdelkrim

 395-404

P Systems for Traffic Flow Simulation.

Jiri Dvorský, Zbynek Janoska, Lukás Vojácek

 405-415

Using Extended Raster File for Real Time Traffic Information Mining.

Michal Radecký, Jan Martinovic, Dusan Fedorcák, Radek Tomis, Ivo Vondrák

 416-427

A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems.

Imed El Fray

 428-442