{"title":"Security assurance of local data stored by HTML5 web application","authors":"Mayssa Jemel, A. Serhrouchni","doi":"10.1109/ISIAS.2014.7064619","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064619","url":null,"abstract":"Local data storage is one of the features that came with the HTML5 standard. Its purpose is to ensure the storage of web application's data in the device of the user rather than in the server side. With HTM5, the storage is no more achieved by proprietary solution as it is ensured by standardized APIs. However, with this new functionality that improves the user's quality of experience, it is crucial to reassure the end user about his data protection when they are stored locally and when they are externalized. In this work, our contribution deals with the assurance and security of data stored by HTML5 APIs. These measures are integrated into the browser to be performed automatically. In fact, data will be stored safely in a secure local space devoted to each user. As a proof of concept, we implemented our approach on the chromium browser, and we studied its performances.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126981319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tanapat Ruengsatra, K. N. Nakorn, K. Rojviboonchai, K. Piromsopa
{"title":"ETC: Effective trustworthy communication with two-mode authentication for disaster recovery","authors":"Tanapat Ruengsatra, K. N. Nakorn, K. Rojviboonchai, K. Piromsopa","doi":"10.1109/ISIAS.2014.7064627","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064627","url":null,"abstract":"In this paper, we propose effective trusted communication (ETC) using two-mode authentication. ETC combines routing protocol and authentication protocol together to provide trusted communication especially in disaster situations. During disasters, a communication system plays an important role in rescuing victims. Due to infrastructure failure, mobile ad-hoc networks (MANET) must be used. Since most authentication methods rely on trusted-third party, they cannot be used in isolated mobile ad-hoc networks. In addition, most authentication protocols do not provide fast data transmission (if reliable). Our design of ETC allows authenticated communication without compromising data transmission speed.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114585257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness","authors":"Cheng-Hong Wang, Donghong Zhang, H. Lu, Jing Zhao, Zhenyu Zhang, Zheng Zheng","doi":"10.1109/ISIAS.2014.7064623","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064623","url":null,"abstract":"Performance is an important indicator of firewalls effectiveness, which represents capability of firewalls handling network requests. ModSecurity and iptables, two representative firewalls of packet filtering and application firewall, are studied experimentally in this paper. Firstly, we develop the experiments to test the capacity of these two kinds of firewalls. Secondly, we locate the bottlenecks for system resources such as CPU and memory usage that affect the firewalls performance by analyzing the collecting data from firewalls experiments. Finally, with the same settings, we compare the performance of the two kinds of firewalls by varying the parameters such as request rate, packet length, and maximum concurrent connections.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132374881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ainuddin Wahid Abdul Wahab, M. Bagiwa, M. Idris, Suleman Khan, Z. Razak, M. Ariffin
{"title":"Passive video forgery detection techniques: A survey","authors":"Ainuddin Wahid Abdul Wahab, M. Bagiwa, M. Idris, Suleman Khan, Z. Razak, M. Ariffin","doi":"10.1109/ISIAS.2014.7064616","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064616","url":null,"abstract":"Technological advancement of various video and image processing tools has made tempering of digital video easy and faster. This review paper focuses on passive techniques that are employed for detecting forgeries in a digital video. Passive forgery detection techniques are methods used for detecting the authenticity of a video without depending on pre-embedded information. The techniques exploit the use of statistical or mathematical properties that are distorted as a result of video tempering for forgery detection. Passive video forgery detection approach has a great prospect in multimedia security, information security and pattern recognition. In this paper, we divide passive techniques for video forensics into three categories; Statistical correlation of video features, frame-based for detecting statistical anomalies, and the inconsistency features of different digital equipment. The discussion also covers the trends, limitations and idea for improvements of passive forgery detection techniques.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}