


default search action
3rd CIC 2017: San Jose, CA, USA
- 3rd IEEE International Conference on Collaboration and Internet Computing, CIC 2017, San Jose, CA, USA, October 15-17, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2565-1

Session 1: Collaboration
- Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn

:
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements. 1-10 - David Kauffmann, Golan Carmi:

A Comparative Study of E-Collaboration on Temporary vs. Ongoing Teams. 11-19 - Amol Patwardhan:

Sentiment Identification for Collaborative, Geographically Dispersed, Cross-Functional Software Development Teams. 20-26 - Naktal Moaid Edan, Ali Al-Sherbaz, Scott J. Turner

:
WebNSM: A Novel Scalable WebRTC Signalling Mechanism for Many-to-Many Video Conferencing. 27-33
Session 2: Document Management
- Johannes Klein, Jean Botev

, Steffen Rothkugel:
Concurrent Command and Consistency Management for Distributed Compound Document Authoring. 34-40 - Takehiro Kitao, Masato Shirai, Takao Miura:

Model Selection Based on Kalman Temporal Differences Learning. 41-47 - Ahmed Ktob

, Zhoujun Li, Djelloul Bouchiha
:
Extracting Linked Data from HTML Tables. 48-53 - Min-Jen Tsai, Imam Yuadi, Yu-Han Tao, Jin-Sheng Yin:

Source Identification for Printed Documents. 54-58
Session 3: Security and Privacy
- Manar Alohaly, Hassan Takabi:

When Do Changes Induce Software Vulnerabilities? 59-66 - Fadi Mohsen, Halil Bisgin, Zachary Scott, Kyle Strait:

Detecting Android Malwares by Mining Statically Registered Broadcast Receivers. 67-76 - Sriramulu Bojjagani

, V. N. Sastry:
VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps. 77-86 - Jinlai Xu

, Balaji Palanisamy, Yuzhe Richard Tang, S. D. Madhu Kumar
:
PADS: Privacy-Preserving Auction Design for Allocating Dynamically Priced Cloud Resources. 87-96 - Anand Tripathi, Henry Hoang:

Design of a Location-Based Publish/Subscribe Service Using a Graph-Based Computing Model. 97-106
Session 4: Access Control
- Prajit Kumar Das, Anupam Joshi

, Tim Finin
:
Personalizing Context-Aware Access Control on Mobile Platforms. 107-116 - Ang Li, Qinghua Li, Vincent C. Hu:

Access Control for Distributed Processing Systems: Use Cases and General Considerations. 117-125 - Jiwan Ninglekhu, Ram Krishnan

:
AARBAC: Attribute-Based Administration of Role-Based Access Control. 126-135 - Saptarshi Das

, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration. 136-145 - Alaeddine Saadaoui, Stephen L. Scott:

Web Services Policy Generation Based on SLA Requirements. 146-154
Session 5: Internet-of-Things
- Danda B. Rawat

, Md. Salik Parwez, Abdullah Alshammari
:
Edge Computing Enabled Resilient Wireless Network Virtualization for Internet of Things. 155-162 - Tasnia Heya Ashrafi, Md. Arshad Hossain, Sayed Erfan Arefin

, Kowshik Dipta Jay Das, Amitabha Chakrabarty
:
Service Based FOG Computing Model for IoT. 163-172 - Anup Kumar Maurya, V. N. Sastry:

Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter. 173-180 - Lili Pan, Samira Pouyanfar, Hao Chen, Jiaohua Qin, Shu-Ching Chen:

DeepFood: Automatic Multi-Class Classification of Food Ingredients Using Deep Learning. 181-189
Session 6: Trust
- Karl R. Weiss, Taghi M. Khoshgoftaar:

Detection of Phishing Webpages Using Heterogeneous Transfer Learning. 190-197 - Hisham Salah, Mohamed Eltoweissy:

Towards Collaborative Trust Management. 198-208 - Quang-Vinh Dang

, Claudia-Lavinia Ignat:
dTrust: A Simple Deep Learning Approach for Social Recommendation. 209-218 - Maryam Karimi

, Mohammad Sadegh Najafi, Reza Akbari
, Manijeh Keshtgari:
Presenting a New Method, Using Topology Virtualization for Stabilizing Flow Tables in SDWN. 219-226
Session 7: Cloud Services and Security
- Antonino Galletta, Oliver Ardo

, Antonio Celesti, Peter Kissa
, Massimo Villari:
A Recommendation-Based Approach for Cloud Service Brokerage: A Case Study in Public Administration. 227-234 - Mona S. Kashkoush, Mohamed Azab, Mohamed Eltoweissy, Gamal Attiya

:
Towards Online Smart Disguise: Real-Time Diversification Evading Co-Residency Based Cloud Attacks. 235-242 - Anshuman Chhabra, Shivam Arora:

An Elliptic Curve Cryptography Based Encryption Scheme for Securing the Cloud against Eavesdropping Attacks. 243-246 - Zachariah Pabi Gariba

, John Andrew van der Poll:
Security Failure Trends of Cloud Computing. 247-256
Session 8: Blockchain and Mining
- Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:

From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency. 257-266 - Mehrdad Salimitari

, Mainak Chatterjee, Murat Yuksel, Eduardo L. Pasiliao:
Profit Maximization for Bitcoin Pool Mining: A Prospect Theoretic Approach. 267-274 - Da-Yin Liao, Xuehong Wang:

Design of a Blockchain-Based Lottery System for Smart Cities Applications. 275-282 - Brian Heredia, Joseph D. Prusa, Taghi M. Khoshgoftaar:

Exploring the Effectiveness of Twitter at Polling the United States 2016 Presidential Election. 283-290
Session 9: Social Media and Machine Learning
- Sunil Singh Samant

, Mohan Baruwal Chhetri
, Quoc Bao Vo, Ryszard Kowalczyk
, Surya Nepal
:
Towards Quality-Assured Data Delivery in Cloud-Based IoT Platforms for Smart Cities. 291-298 - Muheng Yan, Xidao Wen, Yu-Ru Lin, Lingjia Deng:

Quantifying Content Polarization on Twitter. 299-308 - Rafael Angarita, Nikolaos Georgantas, Valérie Issarny:

USNB: Enabling Universal Online Social Interactions. 309-318 - Qixuan Hou, Aibek Musaev, Yang Yang, Calton Pu:

A Comparative Study of Increasing Automation in the Integration of Multilingual Social Media Information. 319-327
Session 10: Access Control Applications
- Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:

An Access Control Framework for Cloud-Enabled Wearable Internet of Things. 328-338 - Tanay Talukdar, Gunjan Batra, Jaideep Vaidya, Vijayalakshmi Atluri

, Shamik Sural
:
Efficient Bottom-Up Mining of Attribute Based Access Control Policies. 339-348 - Nuray Baltaci Akhuseyinoglu

, James Joshi:
A Risk-Aware Access Control Framework for Cyber-Physical Systems. 349-358 - Leila Karimi, James Joshi:

Multi-Owner Multi-Stakeholder Access Control Model for a Healthcare Environment. 359-368
Session 11: Social Computing
- Fengjiao Wang, Yongzhi Qu

, Lei Zheng, Chun-Ta Lu, Philip S. Yu:
Deep and Broad Learning on Content-Aware POI Recommendation. 369-378 - João Eduardo Ferreira

, Pedro Losco Takecian, Leonardo Tadashi Kamaura, Bruno Padilha, Calton Pu:
Dependency Management with WED-flow Techniques and Tools: A Case Study. 379-388 - Icaro Alzuru, Andréa M. Matsunaga, Maurício O. Tsugawa, José A. B. Fortes:

Task Design and Crowd Sentiment in Biocollections Information Extraction. 389-398 - Hsien-Ming Chou, Dongsong Zhang, Lina Zhou, Yin Kang:

CaCM: Context-Aware Call Management for Mobile Phones. 399-405
Session 12: Information Sharing and Management
- Asmaa Sallam, Elisa Bertino:

Detection of Temporal Insider Threats to Relational Databases. 406-415 - Laura C. Anderson, Cheryl A. Kieliszewski:

A Socio-Technical Perspective in Support of Information Sharing for Diverse Teams in Today's Workplace. 416-420 - Harsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:

An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment. 421-428 - Fan Yang, Haryadi S. Gunawi, Andrew A. Chien:

Exploring the Challenges and Opportunities of Cloud Stacks in Dynamic Resource Environments. 429-436
2nd International Workshop on Internet-Scale Clouds and Big Data (ISCBD)
- Priya Chandran

, Lakshya Garg, Aditya Kumar:
Multikernel Simulation: A New Approach to Study Rollback Sensitive Memory Architecture. 437-442 - Fadi Mohsen, Mohamed Shehab

:
Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications. 443-448 - Ojus Thomas Lee, G. J. Akash, S. D. Madhu Kumar

, Priya Chandran
:
A Method for Storage Node Allocation in Erasure Code Based Storage Systems. 449-454

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














