2014 10th International Conference on Information Assurance and Security最新文献

筛选
英文 中文
Security assurance of local data stored by HTML5 web application HTML5 web应用存储本地数据的安全保障
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064619
Mayssa Jemel, A. Serhrouchni
{"title":"Security assurance of local data stored by HTML5 web application","authors":"Mayssa Jemel, A. Serhrouchni","doi":"10.1109/ISIAS.2014.7064619","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064619","url":null,"abstract":"Local data storage is one of the features that came with the HTML5 standard. Its purpose is to ensure the storage of web application's data in the device of the user rather than in the server side. With HTM5, the storage is no more achieved by proprietary solution as it is ensured by standardized APIs. However, with this new functionality that improves the user's quality of experience, it is crucial to reassure the end user about his data protection when they are stored locally and when they are externalized. In this work, our contribution deals with the assurance and security of data stored by HTML5 APIs. These measures are integrated into the browser to be performed automatically. In fact, data will be stored safely in a secure local space devoted to each user. As a proof of concept, we implemented our approach on the chromium browser, and we studied its performances.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126981319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ETC: Effective trustworthy communication with two-mode authentication for disaster recovery ETC:有效的可信通信,具有用于灾难恢复的双模式身份验证
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064627
Tanapat Ruengsatra, K. N. Nakorn, K. Rojviboonchai, K. Piromsopa
{"title":"ETC: Effective trustworthy communication with two-mode authentication for disaster recovery","authors":"Tanapat Ruengsatra, K. N. Nakorn, K. Rojviboonchai, K. Piromsopa","doi":"10.1109/ISIAS.2014.7064627","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064627","url":null,"abstract":"In this paper, we propose effective trusted communication (ETC) using two-mode authentication. ETC combines routing protocol and authentication protocol together to provide trusted communication especially in disaster situations. During disasters, a communication system plays an important role in rescuing victims. Due to infrastructure failure, mobile ad-hoc networks (MANET) must be used. Since most authentication methods rely on trusted-third party, they cannot be used in isolated mobile ad-hoc networks. In addition, most authentication protocols do not provide fast data transmission (if reliable). Our design of ETC allows authenticated communication without compromising data transmission speed.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114585257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness 防火墙性能的实验研究:深入探讨防火墙效能的瓶颈
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064623
Cheng-Hong Wang, Donghong Zhang, H. Lu, Jing Zhao, Zhenyu Zhang, Zheng Zheng
{"title":"An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness","authors":"Cheng-Hong Wang, Donghong Zhang, H. Lu, Jing Zhao, Zhenyu Zhang, Zheng Zheng","doi":"10.1109/ISIAS.2014.7064623","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064623","url":null,"abstract":"Performance is an important indicator of firewalls effectiveness, which represents capability of firewalls handling network requests. ModSecurity and iptables, two representative firewalls of packet filtering and application firewall, are studied experimentally in this paper. Firstly, we develop the experiments to test the capacity of these two kinds of firewalls. Secondly, we locate the bottlenecks for system resources such as CPU and memory usage that affect the firewalls performance by analyzing the collecting data from firewalls experiments. Finally, with the same settings, we compare the performance of the two kinds of firewalls by varying the parameters such as request rate, packet length, and maximum concurrent connections.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132374881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Passive video forgery detection techniques: A survey 被动视频伪造检测技术综述
2014 10th International Conference on Information Assurance and Security Pub Date : 1900-01-01 DOI: 10.1109/ISIAS.2014.7064616
Ainuddin Wahid Abdul Wahab, M. Bagiwa, M. Idris, Suleman Khan, Z. Razak, M. Ariffin
{"title":"Passive video forgery detection techniques: A survey","authors":"Ainuddin Wahid Abdul Wahab, M. Bagiwa, M. Idris, Suleman Khan, Z. Razak, M. Ariffin","doi":"10.1109/ISIAS.2014.7064616","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064616","url":null,"abstract":"Technological advancement of various video and image processing tools has made tempering of digital video easy and faster. This review paper focuses on passive techniques that are employed for detecting forgeries in a digital video. Passive forgery detection techniques are methods used for detecting the authenticity of a video without depending on pre-embedded information. The techniques exploit the use of statistical or mathematical properties that are distorted as a result of video tempering for forgery detection. Passive video forgery detection approach has a great prospect in multimedia security, information security and pattern recognition. In this paper, we divide passive techniques for video forensics into three categories; Statistical correlation of video features, frame-based for detecting statistical anomalies, and the inconsistency features of different digital equipment. The discussion also covers the trends, limitations and idea for improvements of passive forgery detection techniques.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信