2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

筛选
英文 中文
Privacy Preserving Queries on Directed Graph 有向图上的隐私保护查询
Sara Ramezanian, Tommi Meskanen, Valtteri Niemi
{"title":"Privacy Preserving Queries on Directed Graph","authors":"Sara Ramezanian, Tommi Meskanen, Valtteri Niemi","doi":"10.1109/NTMS.2018.8328714","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328714","url":null,"abstract":"In this work, a trust relation determines whether a certain user (at source-host) has permission to access another user (at target-host) by utilising an authentication key with unique fingerprint F. These trust relations can be interpreted as a directed graph, where nodes are user-host pairs and edges are fingerprints. We study the problem of constructing a privacy preserving trust relation data structure. Moreover, we design and prototype a querying mechanism for this data structure and show that it is feasible in practice. We validate our design by utilising real world data.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Dynamic Trust Model for "On Cloud" Federated Identity Management 一种新的“云上”联邦身份管理动态信任模型
Keltoum Bendiab, S. Shiaeles, Samia Boucherkha
{"title":"A New Dynamic Trust Model for \"On Cloud\" Federated Identity Management","authors":"Keltoum Bendiab, S. Shiaeles, Samia Boucherkha","doi":"10.1109/NTMS.2018.8328673","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328673","url":null,"abstract":"With the proliferation of Cloud-based services, Federated Identity Management (FIM) has gained considerable attention in recent years. It is considered as a promising approach to facilitate secure resource sharing between collaborating partners in the Cloud. However, current FIM frameworks such as OpenID, SAML, Liberty Alliance, Shibboleth and WS-Federation do not define a suitable trust model to allow dynamic and agile federation establishment. Hence, they cannot be deployed in dynamic and open environments like Cloud Computing. In this paper, we address this issue by presenting a new dynamic trust model that fulfils Cloud requirements. The proposed model introduces the theory of Fuzzy Cognitive Maps (FCM) into modelling and evaluating unknown entities trustworthiness in FIM systems.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
"Speak, Friend, and Enter" - Secure, Spoken One-Time Password Authentication “说话,朋友,和输入”-安全,口头一次性密码认证
Outi-Marja Latvala, Chengyuan Peng, P. Honkamaa, Kimmo Halunen
{"title":"\"Speak, Friend, and Enter\" - Secure, Spoken One-Time Password Authentication","authors":"Outi-Marja Latvala, Chengyuan Peng, P. Honkamaa, Kimmo Halunen","doi":"10.1109/NTMS.2018.8328719","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328719","url":null,"abstract":"User authentication is a long-standing problem in need of a comprehensive solution. As technology progresses towards more ubiquitous connectivity and digital services, there is a need for new methods that are usable in these new contexts. One direction of progress has been in virtual and augmented reality technologies. Augmented reality provides tools also for better user authentication. We have developed a system, where user authentication can be done with the help of augmented reality, visual cryptography and speech recognition. This type of authentication can be used in untrusted environments and in scenarios, where the hands of the user are not available for inputting a password with some keyboard.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Workplace Capacity Design Using the Minimum Dominating Set in Server Migration Services 服务器迁移服务中使用最小支配集的工作场所容量设计
Y. Fukushima, I. Goda, T. Murase, T. Yokohira
{"title":"Workplace Capacity Design Using the Minimum Dominating Set in Server Migration Services","authors":"Y. Fukushima, I. Goda, T. Murase, T. Yokohira","doi":"10.1109/NTMS.2018.8328725","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328725","url":null,"abstract":"A server migration service (SMS) has been proposed as a means of improving communication QoS of network application (NW-Apps) operated on Infrastructure as a Service (IaaS)-type cloud services. In SMS, computers called workplaces (WPs) are distributed across the network, and a server-side application (server) of a NW-App can migrate among the WPs in order to improve the communication QoS of NW-Apps. In this paper, we tackle a WP capacity design problem where we determine where WPs should be placed within a NW, and what capacity they should have. We propose two methods for the problem. Method 1 seeks to place higher capacity WPs at locations where more servers are likely to stay. Method 2 tries to position WPs such that the required level of communication QoS for NW-Apps can be satisfied with at least one WP at any location in the NW. This is accomplished by formulating the WP capacity design problem as a minimum dominating set (MDS) problem and solving it.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127702529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Dynamic Occupancy Patterns for Improved Presence Detection in Intelligent Buildings 利用动态占用模式改进智能建筑的存在检测
C. Papatsimpa, J. Linnartz
{"title":"Using Dynamic Occupancy Patterns for Improved Presence Detection in Intelligent Buildings","authors":"C. Papatsimpa, J. Linnartz","doi":"10.1109/NTMS.2018.8328723","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328723","url":null,"abstract":"Presence detection is used in occupancy-based control to dynamically adjust energy-related appliances in smart buildings. Yet, practical applications typically suffer from high sensor unreliability. In our previous work, we suggested a Hidden Markov Model (HMM) for fusing information from multiple sources to better estimate the user state (presence/absence). We now extend this model and exploit information on the time-dependency of the probability of occupancy according to the time of the day. People generally have a typical working schedule, that is, occupants in an office arrive and leave every day at almost the same time. In this approach, we use our prior knowledge on office occupancy profiles to develop a time-dependent (in-homogeneous) HMM. Judging from our experiments, the algorithm shows improved performance, also, in a real-world test set-up where user presence and sensors error may not exactly follow our idealized model assumptions.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134048864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quantitative Description of Internal Activity on the Ethereum Public Blockchain 以太坊公有区块链内部活动的定量描述
Andra Anoaica, H. Levard
{"title":"Quantitative Description of Internal Activity on the Ethereum Public Blockchain","authors":"Andra Anoaica, H. Levard","doi":"10.1109/NTMS.2018.8328741","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328741","url":null,"abstract":"One of the most popular platform based on blockchain technology is Ethereum. Internal activity on this public blockchain is analyzed both from a quantitative and qualitative point of view. In a first part, it is shown that the creation of the Ethereum Alliance consortium has been a game changer in the use of the technology. In a second part, the network robustness against attacks is investigated from a graph point of view, as well as the distribution of internal activity among users. Addresses of great influence were identified, and allowed to formulate conjectures on the current usage of this technology.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127248256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models 基于用户和区块链行为模型的智能合约形式化验证
Tesnim Abdellatif, Kei-Léo Brousmiche
{"title":"Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models","authors":"Tesnim Abdellatif, Kei-Léo Brousmiche","doi":"10.1109/NTMS.2018.8328737","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328737","url":null,"abstract":"Blockchain technology has attracted increasing attention in recent years. One reason of this new trend is the introduction of on-chain smart contracts enabling the implementation of decentralized applications in trust-less environments. Along with its adoption, attacks exploiting smart contract vulnerabilities are inevitably growing. To counter these attacks and avoid breaches, several approaches have been explored such as documenting vulnerabilities or model checking using formal verification. However, these approaches fail to capture the Blockchain and users behavior properties. In this paper, we propose a novel formal modeling approach to verify a smart contract behavior in its execution environment. We apply this formalism on a concrete smart contract example and analyze its breaches with a statical model checking approach.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129029129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
Digitizing, Securing and Sharing Vehicles Life-cycle over a Consortium Blockchain: Lessons Learned 在联盟区块链上数字化、保护和共享车辆生命周期:经验教训
Kei-Léo Brousmiche, Thomas Heno, C. Poulain, Antoine Dalmieres, Elyes Ben Hamida
{"title":"Digitizing, Securing and Sharing Vehicles Life-cycle over a Consortium Blockchain: Lessons Learned","authors":"Kei-Léo Brousmiche, Thomas Heno, C. Poulain, Antoine Dalmieres, Elyes Ben Hamida","doi":"10.1109/NTMS.2018.8328733","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328733","url":null,"abstract":"Nowadays, vehicles odometer fraud is becoming a growing problem internationally, and is costing European consumers between 5.6 to 9.6 billion euros per year. This is partly due to the lack of unified vehicles life-cycle management, and to the fact that vehicles data are currently spread across multiple stakeholders that do not trust each other or collaborate together. In this paper, we propose a Blockchain- backed Vehicles Data and Processes Ledger framework to streamline the management of vehicles life-cycle and data history, and hence to provide more transparency and collaborations between the involved stakeholders. The architecture and lessons learned from the first implementation phase are discussed, followed by future research challenges.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Spectrum Sharing in Cognitive Radio Systems 认知无线电系统中的频谱共享
Raouia Masmoudi
{"title":"Spectrum Sharing in Cognitive Radio Systems","authors":"Raouia Masmoudi","doi":"10.1109/NTMS.2018.8328720","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328720","url":null,"abstract":"In this paper, we focus on a wireless flat fading channel in a Cognitive radio network composed of licensed users (primary) and unlicensed users (secondary). We propose a framework for analyzing the access strategy based on the received interference at the secondary receiver and analyzing the achievable capacity of the secondary under the average power and average interference constraints. The proposed approach to the spectrum sharing, based on the received interference at the secondary receiver, significantly reduces the system complexity. We categorize the spectrum sharing into two cases based on the maximum interference threshold. We obtain a critical system parameter to eliminate the interference threshold constraint.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
NFB: A Protocol for Notarizing Files over the Blockchain NFB:在区块链上公证文件的协议
Haikel Magrahi, Nouha Omrane, Olivier Senot, Rakia Jaziri
{"title":"NFB: A Protocol for Notarizing Files over the Blockchain","authors":"Haikel Magrahi, Nouha Omrane, Olivier Senot, Rakia Jaziri","doi":"10.1109/ntms.2018.8328740","DOIUrl":"https://doi.org/10.1109/ntms.2018.8328740","url":null,"abstract":"Blockchains, such as Bitcoin and Ethereum and their respective P2P networks have seen significant adoption in many sectors in the past few years. All these technologies that use the Blockchain pattern show that it is possible to rebuild any transactional system with better performance without relying on any trusted parties to manage transactions between peers. This insight has lead many companies to invest millions to understand the technology and to find a way to migrate from centralized to decentralized solutions. These solutions need to store large amounts of data in a secure and confidential way. Many distributed storage systems now exist using Blockchain technology (Cloud, FileSystems, etc.). But none of the tools proposed are able to manage the document life cycle nor archive documents based on regulatory compliance. In this paper, we describe our protocol named NFB (Notarizing Files over the Blockchain). This protocol ensures the communication between two systems: a permissive Blockchain and a secured centralized archiving Document Management System. The method described is used to allow users to archive, control, analyze and validate their transactions in a system that offers confidentiality, security and distribution features.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信