2011 7th International Conference on Information Assurance and Security (IAS)最新文献

筛选
英文 中文
Strategic approach for high performance object tracking in a network of surveillance cameras 监控摄像机网络中高性能目标跟踪的策略方法
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122846
H. H. Weerasena, P. B. S. Bandara, J. R. B. Kulasekara, B. M. B. Dassanayake, U. Niroshika, P. Wijenayake
{"title":"Strategic approach for high performance object tracking in a network of surveillance cameras","authors":"H. H. Weerasena, P. B. S. Bandara, J. R. B. Kulasekara, B. M. B. Dassanayake, U. Niroshika, P. Wijenayake","doi":"10.1109/ISIAS.2011.6122846","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122846","url":null,"abstract":"Tracking human objects in a network of surveillance cameras has become an essential requirement in current surveillance systems. Increasing efficiency (response time)of these real-time systems is a challenging task. When searching for a better solution, it was discovered that if software solutions are used it is more effective than using powerful hardware to increase the performance. Many systems use motion detection, feature extraction and appearance matching for re-identification of human objects across cameras. A problem that greatly decreases the efficiency of the system is; features of the object that is being tracked have to be matched with all the objects in all other cameras in the network. This research introduces different strategies that resolve the above mentioned problem of unnecessary feature matching, and enhance the system performance.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An extended rights expression model supporting dynamic digital rights management 支持动态数字权限管理的扩展权限表达模型
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122817
Dongyang Xu, Zhi Tang, Yinyan Yu
{"title":"An extended rights expression model supporting dynamic digital rights management","authors":"Dongyang Xu, Zhi Tang, Yinyan Yu","doi":"10.1109/ISIAS.2011.6122817","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122817","url":null,"abstract":"License often plays the role of an agreement between the user and the copyright owner. Rights expression language should provide a description of interactive mechanism and license negotiation to avoid the ambiguous transformation between REL and authorization protocols. By extending the ODRL to establish a digital rights expression model of appending, updating and aggregating license, the interactive license management mechanism can be described. In this paper, the supposed scheme can support fine-grained authorization, progressive or updating authorization and combination authorization to achieve dynamic rights management of digital content.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129351142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhance hardware security using FIFO in pipelines 在管道中使用FIFO增强硬件安全性
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122844
K. Lin, C. Weng, Tsai Kun Hou
{"title":"Enhance hardware security using FIFO in pipelines","authors":"K. Lin, C. Weng, Tsai Kun Hou","doi":"10.1109/ISIAS.2011.6122844","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122844","url":null,"abstract":"Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127467824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
What is Green Security? 什么是绿色安全?
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122781
L. Caviglione, A. Merlo, M. Migliardi
{"title":"What is Green Security?","authors":"L. Caviglione, A. Merlo, M. Migliardi","doi":"10.1109/ISIAS.2011.6122781","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122781","url":null,"abstract":"Green Security is a new research field defining and investigating security solutions under an energy-aware perspective. Green Security aims at: 1) evaluating the actual security mechanisms in order to assess their energy consumption; 2) building new security mechanisms by considering energy costs from the design phase. In this paper, we first provide a definition of Green Security and formalism to model it, then we provide a use case showing how it is possible to model the energy consumption of two Intrusion Detection System (IDS) strategies, finally we leverage this model to assess the energy leakage due to the late discovery of bad packets.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks 无线传感器网络中Kerberos安全协议的时间和能量成本分析
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122838
Farshad Amin, A. Jahangir
{"title":"Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks","authors":"Farshad Amin, A. Jahangir","doi":"10.1109/ISIAS.2011.6122838","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122838","url":null,"abstract":"Wireless Sensor Networks are composed of small, low cost, resource-constrained computing nodes equipped with low power wireless transceivers. In this paper, we study and model the time and energy cost of Kerberos protocol by using timed automata in WSN. We model check the protocol using UPPAAL. We show that considering time in the analysis of security protocols yield more confident results.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128370608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信