Accepted Papers

  • A Graph Data Summarization and Data Visualization Technique
    Stibu Stephen and Dr. R.ManickaChezian , N.G.M College, Pollachi, Tamil Nadu
    A data Analysis and visualization technique poses challenges too many areas of the data mining research. There are several visualization techniques and tools have been proposed for almost all domains. But there is a necessity to summarize and visualize a large citation network data according to the user customization. While performing the visualization, influence data should be identified using the summarization technique. The summarization and visualization of graph structured data is a tedious part in research. The existing state of the art influence maximization algorithms can detect the most influential node in a citation network for all structured data, except graph structured data. Clustering techniques are widely used to fold large graph structured data in existing graphs summarization methods. In this paper, first formally define the problem of data summarization and visualization process with three segments, which are effective summarization, localized summarization and handling high, influenced rich information in citation networks. In general, research filed contains lots of interrelated datas, which has multi associations among the data. To handle the above Graph data visualization and summarization problem, here propose a new prototype named as (GSV) Graph Summarization and GSV algorithm for large scale citation networks. Finally present a theoretical analysis on GSV, which is equivalent to the existing kernel k mean clustering algorithm.
  • Protecting Compromised Systems with A Virtual-Machine Protection and Checking System using Out-Of-Guest Permissions
    Charles D. Prince and Gurminder Singh , Naval Postgraduate School, Monterey, California, USA.
    Herein proposes developing mechanisms to protect virtual machines against unauthorized file system access without installing any software monitors on the machines and without making users of such systems aware of protection mechanisms. The plan is to use a high-assurance virtual machine system that is allowed a read-only access of a low-assurance virtual machine that needs to be protected. The high-assurance host system will protect the low assurance virtual machine file system from unauthorized modification even when the attacker gains root privileges. We propose to provide guest system protection by enabling enforcement of out-of-guest-permissions before the virtual machine host disk access is performed for the virtual machine guest system.
  • Vulnerabilities of the SSL/TLS protocol
    Jelena Ćurguz , Post Office, Banja Luka, BiH
    This paper analyzes vulnerabilities of the SSL/TLS Handshake protocol, which is responsible for authentication of the parties in the communication and negotiation of security parameters that will be used to protect confidentiality and integrity of the data. It will be analyzed the attacks against the implementation of Handshake protocol, as well as the attacks against the other elements necessary to SSL/TLS protocol to discover security flaws that were exploited, modes of attack, the potential consequences, but also studying methods of defense. All versions of the protocol are going to be the subject of the research but emphasis will be placed on the critical attack that the most endanger the safety of data. The goal of the research is to point out the danger of existence of at least vulnerability in the SSL/TLS protocol, which can be exploited and endanger the safety of the data that should be protected.