Publications (3)0 Total impact
Conference Paper: Mining association rules for RFID data with concept hierarchy[Show abstract] [Hide abstract]
ABSTRACT: Recently, radio frequency identification (RFID) technology is being deployed for several applications, including supply-chain optimization, business process automation, asset tracking, and problem traceability applications. The problem with RFID data is that its degree increases according to time and location, thus, resulting in an enormous volume of data duplication. Therefore, it is difficult to extract useful hidden knowledge in RFID data using traditional association rule mining techniques, or analyze data using statistical techniques or queries. This paper suggest association rule generation method based on the meta rule which could find a meaningful rule by using inclusion relation and concept hierarchy between data, in order to extract a hidden pattern from RFID data. Therefore, we could not only eliminate the duplicated rule efficiently by using meta-rule but also reduce the complexity by processing the limited association rule examination. Also, this method is useful to improve the storage efficiency and to find a hidden association relationship between objects.Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on; 03/2009
- [Show abstract] [Hide abstract]
ABSTRACT: Summary Web Services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. In this environment, security is one of the most critical issues. An attacker may expose user privacy and service information without authentication. Furthermore, in the pervasive computing environment, the users of web services must temporarily delegate some or all of their rights to an agent to perform actions on their behalf. This results in the exposure of user's privacy information by agents. We present a delegation model to support secure web services in pervasive computing environments. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers. SAML is extended, in order to declare delegation assertions transferred to web service providers, by delegation among agents.