{"title":"Offline Internet banking fraud detection","authors":"V. Aggelis","doi":"10.1109/ARES.2006.89","DOIUrl":"https://doi.org/10.1109/ARES.2006.89","url":null,"abstract":"Nowadays, most important topic about Internet banking is security. Banks' basic concern is ensuring their customers' electronic transactions. Nevertheless, fraudsters are becoming more sophisticated and they act really clever to achieve their target. Having this knowledge, banks try to optimize their detection systems in order to detect fraud and investigate suspect online behavior and transactions. Object of this paper is to demonstrate one successful fraud detection model which is established in Greece. Apart from the offline Internet banking fraud detection system itself, which is described briefly, our scope is to present its contribution in fast and reliable detection of any \"strange\" transaction including fraudulent ones.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133581038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yusuke Doi, S. Wakayama, M. Ishiyama, S. Ozaki, Tomohiro Ishihara, Yojiro Uo
{"title":"Ecosystem of naming systems: discussions on a framework to induce smart space naming systems development","authors":"Yusuke Doi, S. Wakayama, M. Ishiyama, S. Ozaki, Tomohiro Ishihara, Yojiro Uo","doi":"10.1109/ARES.2006.57","DOIUrl":"https://doi.org/10.1109/ARES.2006.57","url":null,"abstract":"In this paper, we discuss the ecosystem of naming systems for smart spaces. Since we think resolution of detected object names should be a common trigger of smart space applications, we focus on naming systems. We aim at a naming system framework to enable the following. First, each application developer of smart spaces can design and implement new applications freely. Minimal limitations should be imposed on developers. Second, users can interact with applications opaquely. We propose combination of the following two approaches to induce naming systems evolution for smart space applications. The first approach is integration of independent naming systems for simple client resolvers. The second approach is a client resolver model to handle independent naming systems concurrently. We also describe some case studies concerning smart space application scenarios.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RATING: rigorous assessment of trust in identity management","authors":"Rajarajan Sampath, Deepak Goel","doi":"10.1109/ARES.2006.103","DOIUrl":"https://doi.org/10.1109/ARES.2006.103","url":null,"abstract":"Trust can be an important aspect for decision-making in the Internet. This paper proposes a new trust establishment model for identity management on the Internet. After discussing the challenges and opportunities of a trust model in identity management, we describe our trust model in detail. The fundamental difference to existing models (or the lack of) in identity management is the establishment of trust and evaluation of trust in this model changes over time. Leaving greater incentives to constantly seek and learn from the past behavior to influence their future. Moreover this model acknowledges the heterogeneity of service providers, and lastly this model proposes some attenuation measures to counter biased ratings in identity management scenarios.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132289955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method for the identification of inaccuracies in pupil segmentation","authors":"Hugo Proença, Luís A. Alexandre","doi":"10.1109/ARES.2006.9","DOIUrl":"https://doi.org/10.1109/ARES.2006.9","url":null,"abstract":"In this paper we analyze the relationship between the accuracy of the segmentation algorithm and the error rates of typical iris recognition systems. We selected 1000 images from the UBIRIS database that the segmentation algorithm can accurately segment and artificially introduced segmentation inaccuracies. We repeated the recognition tests and concluded about the strong relationship between the errors in the pupil segmentation and the overall false reject rate. Based on this fact, we propose a method to identify these inaccuracies.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115955947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Peters, Pim Jorg, Marco Meesters, M. Hoogwout, Edwin Stuart
{"title":"Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address those","authors":"R. Peters, Pim Jorg, Marco Meesters, M. Hoogwout, Edwin Stuart","doi":"10.1109/ARES.2006.78","DOIUrl":"https://doi.org/10.1109/ARES.2006.78","url":null,"abstract":"Cities and regional authorities require consistent data on items like persons, addresses, locations and buildings as the fundament for service delivery, fraud-prevention and -detection, permit enforcement, and the effective execution of day to day operations. The concept of basic registries in the Netherlands is introduced to improve data integrity and the single entry for the citizen. Evidence shows that the change that comes with the implementation of basic registries could be more demanding for government organizations than earlier adaptations to the new ICT, like World Wide Web or email. Change triggered by basic registries seems to follow the same path as EDI did for business. Political forces do not realize the impact of this change on daily operations sufficiently. This results in a narrow focus on implementation issues, in which real basic e-government design issues are often neglected. Zenc implemented an action research (participative research method) oriented survey on the implementation of data integrity operations for basic registries in Belgium and the Netherlands. The research unveils a range of methods that government agencies apply to deal with organizational, legal and technical barriers. Early results show a number of patterns in organizational barriers towards the change that accompanies the implementation of basic registries. The research question is if those patterns related to the resistance to introduce basic registries are an indication of core changes in the organization of the public domain rather than 'simple' adoptions of new technologies. The paper describes the findings and seeks to identify key-areas for improvement and in depth research on road maps for data integrity in the back office of government.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117323844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recovery mechanism of cooperative process chain in grid","authors":"Mingchu Li, Hongyan Yao","doi":"10.1109/ARES.2006.104","DOIUrl":"https://doi.org/10.1109/ARES.2006.104","url":null,"abstract":"A series of distributed processes usually need to be created in order to complete a user's task in grid environment, and these processes which have been created at different grid site form a process organization (called process-tree). Due to the dynamic of grid resource and some uncertain factors, some process nodes in this tree may be not accessible by the other related ones. It leads to a process-tree broken problem. As a result, it would block further execution of the processes we have created. Up to now, there is no good solution to solve the problem. In this paper we explore this problem and discuss how to handle it if some inaccessible nodes in process-tree happened, and how to ensure the integrity of organization structure of distributed processes. After making a comparison and analysis with the traditional distributed systems, we provide a new mechanism to increase reliability of grid-based computing environments and restore the inaccessible process-node over process tree in grid environment and endeavoring to keep the integrity of the original process organization structure. This new mechanism would adopts two types of additional information and two extra process actions to help restore the original process but not disturb the existing dynamic characters of grid resources, and grid tasks can be performed efficiently as well.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure 3G user authentication in adhoc serving networks","authors":"A. Durresi, Lyn Evans, V. Paruchuri, L. Barolli","doi":"10.1109/ARES.2006.119","DOIUrl":"https://doi.org/10.1109/ARES.2006.119","url":null,"abstract":"The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G-WLAN user authentication.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk management approach on identity theft in biometric systems context","authors":"Sabine Delaître","doi":"10.1109/ARES.2006.113","DOIUrl":"https://doi.org/10.1109/ARES.2006.113","url":null,"abstract":"This paper introduces issues of risk management applied to biometrics. A biometrics study has been recently carried out by the ICT unit team and biometric technologies have been examined from a SELT perspective (social, economic, legal and technological). Different threats have been highlighted, such as identity theft. This paper presents an introduction on the risk \"identity theft\" in the information society and describes the identity theft as a real threat of the wide implementation of biometrics. Based on the results of the biometrics study and aiming at illustrating risk management on biometrics, the last section deals with the application of a risk process model on the identity theft in biometric systems context.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource management continuity with constraint inheritance relation","authors":"Zude Li, Guoqiang Zhan, Xiaojun Ye","doi":"10.1109/ARES.2006.111","DOIUrl":"https://doi.org/10.1109/ARES.2006.111","url":null,"abstract":"Resource management continuity is indispensable against illegal resource dissemination and usage in open environment, which should be guaranteed by an effective constraint management mechanism. In detail, it includes two requirements, (1) guaranteeing resource dissemination continuability and purpose-consistency on the dissemination topology, and (2) allowing more-to-more dissemination relation with multiple dissemination policies available on the extended topology for more complicated applications. As we observed, the existed work cannot capture them satisfyingly. We propose constraint inheritance relation (CIR) on a dynamic dissemination topology to specify the continuity of constraint management to capture the first requirement while extend the previous one-to-one dissemination to capture the second. The policy compatibility is maintained while multiple policies are available. We take it into secure resource management (SRM) model for managing the complicated dissemination and usage constraints on diverse resources in dynamic dissemination transaction context. The result proves its feasibility and efficiency.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127282198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jordi Castellà-Roca, J. Herrera-Joancomartí, Aleix Dorca-Josa
{"title":"A secure e-exam management system","authors":"Jordi Castellà-Roca, J. Herrera-Joancomartí, Aleix Dorca-Josa","doi":"10.1109/ARES.2006.14","DOIUrl":"https://doi.org/10.1109/ARES.2006.14","url":null,"abstract":"Secure electronic exams are one of the most difficult challenges in e-learning security. The relevance of the examination process for any academic institution implies that different security mechanisms must be applied in order to preserve some security properties during different examination stages. In this paper, we present a secure e-exam management system where all exam related information is in digital format. We propose a cryptographic scheme that has to be executed in order to achieve the desired security levels at every exam stage.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127052666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}