Abstract

With the fast development of Internet technologies, the information and communication systems are continuously facing new security, trust and privacy challenges. Indeed, the potentially invasive nature of the information has implications on privacy of the users and their online activity such as transactions. Likewise, the implicit reliance on technology to make decisions on one’s behalf makes essential to study new mechanisms for expressing and reasoning about trust. This special issue brings together research articles covering diverse aspects of security, privacy and trust in computer and networked-based information systems, including privacy concerns, tools to help secure information, methods for development and assessment of trustworthy systems, analysis of vulnerabilities and attacks, trends and new developments, secure operating systems and applications, security issues in wireless networks and pervasive systems, design and test strategies for secure and survivable systems, and cryptology, among others. The papers of the special issue are selected based on strict review results, where papers went through three rounds of review and revision. As a result, nine papers were selected and are arranged in the special issue as follows. Xiong et al. in the first paper ‘‘The finite volume element method for a parameter identification problem’’ use finite volume element method to solve a parameter identification problem of parabolic equations with over-specified data. The authors provide the numerical scheme of the unknown function and control parameters and obtain the error estimates of approximate solution. The proposed method is experimentally evaluated and compared with the exact solution to confirm the good accuracy of the presented scheme. The second paper by Chen et al. ‘‘An Opinion Mining Framework For Cantonese Reviews’’, analyze opinion mining for Cantonese language. The authors motivate the need to construct a particular lexical database for Cantonese and explore some Cantonese special written-tradition rules and incorporate them into the feature-based opinion summarization system framework. The experimental results show that the proposed framework significantly outperforms the traditional Mandarin sentiment analysis method using ICTCLAS. In the third paper ‘‘A Secure Remote Data Integrity Checking Cloud Storage System from Threshold Encryption’’, Yao et al. study the confidentiality and integrity issues in cloud storage system. The authors address the privacy issue of decentralized cloud storage system using threshold cryptography. The threshold encryption scheme is therefore integrated with a secure decentralized erasure code to form a secure cloud storage system. Zhang et al. in the fourth paper ‘‘How to build a faster private information retrieval protocol’’, propose a secure multi-bit homomorphic encryption scheme based on Learning With Errors over Rings (RLWE) assumption. The authors use canonical embedding to transform ring & Fatos Xhafa fatos@cs.upc.edu

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call