2013 National Security Days (JNS3)最新文献

筛选
英文 中文
Road to a secure Web service exchange 通往安全Web服务交换的道路
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595454
El Houssain Ben Messaoud, Ouafaa Douri
{"title":"Road to a secure Web service exchange","authors":"El Houssain Ben Messaoud, Ouafaa Douri","doi":"10.1109/JNS3.2013.6595454","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595454","url":null,"abstract":"This paper discusses XML security key technologies related with security of Web. Based on these discussions, Web service will be integrated with mature security architectures such as PKI (Public Key Infrastructure), XADES (XML Advanced Electronic Signature) and VPN (Virtual Private Network). A new architecture (called SWSSA for Simple Web Service Security Architecture) to secure SOAP messages exchange is proposed and its components are described.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mean field game among cloud computing end users 云计算终端用户之间的平均场博弈
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595472
A. Khiyaita, M. Zbakh
{"title":"Mean field game among cloud computing end users","authors":"A. Khiyaita, M. Zbakh","doi":"10.1109/JNS3.2013.6595472","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595472","url":null,"abstract":"The rapid development of Internet has given birth to a new business model: Cloud Computing. This new paradigm has experienced a fantastic rise in recent years and is in constant growth. The cloud computing is large distributed systems that employ distributed resources to deliver a service to end users using several technologies. the cloud computing has become increasingly complex by the fact that it uses several techniques. In this paper we propose a game theoretic framework for cloud computing end users which interact through the response time provided by the system and decide willingly to regulate their load to act in steady state. Because the users of a such system generally large, the game will be studied in the scope of mean field game.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Concatenated convolutional codes: Analysis of control properties under linear systems theory point of view 串联卷积码:线性系统理论下的控制特性分析
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595475
M. I. García-Planas, El Mamoun Soudi, L. Um
{"title":"Concatenated convolutional codes: Analysis of control properties under linear systems theory point of view","authors":"M. I. García-Planas, El Mamoun Soudi, L. Um","doi":"10.1109/JNS3.2013.6595475","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595475","url":null,"abstract":"In this paper we consider two models of concatenated convolutional codes from the perspective of linear systems theory. We present an input-state-output representation of these models and we study the conditions for control properties as controllability, observability as well as output observability.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130018787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometric authentication systems based on hand pattern vein, digital certificates and smart cards 基于手纹静脉、数字证书和智能卡的生物识别认证系统
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595457
A. A. El Kalam, Sana Ibjaoun, A. A. Ouahman
{"title":"Biometric authentication systems based on hand pattern vein, digital certificates and smart cards","authors":"A. A. El Kalam, Sana Ibjaoun, A. A. Ouahman","doi":"10.1109/JNS3.2013.6595457","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595457","url":null,"abstract":"This paper describes and implements an authentication solution using biometrics, digital certificates and smartcards to solve the security problems in the authentication process. The first part is a general introduction to the topic, the second is s brief overview about using biometrics, more exactly hand vein pattern, the third part presents a method of extracting the pattern vein of the back of the hand also how to match two templates. The fourth part presents the two necessary phases in any authentication system: the enrollment and the authentication. A proposed authentication protocol is described too. The fifth part generalize the possible attacks and vulnerabilities in a biometric authentication system and it also shows how our system is able to avoid them. The sixth part talks about the implementation of the application. Finally, in the conclusion, we tried to summarize our work and prove the benefits of using this system.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Social networks services: Survey 社会网络服务:调查
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595468
Meriem Daouah, A. Abou El Kalam, Abdellah Ait Ouahman
{"title":"Social networks services: Survey","authors":"Meriem Daouah, A. Abou El Kalam, Abdellah Ait Ouahman","doi":"10.1109/JNS3.2013.6595468","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595468","url":null,"abstract":"Nowadays, Social networks have taken a huge part of our life. While the number of people logging to such services is growing, concerns about security and protection of privacy have become more and more Important. In this paper, we explore risks facing the use of Social Networks and analyse the methods used by attackers to gain access to the shared data as well as the purpose behind these attacks. We also explore the limitations of current systems. Then we discuss some solutions that were proposed to enhance access control on social networks and protect users' personal data. This allows us to identify the main point that is neglected when conceiving new mechanisms: the human behavior.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key management for secure multicast communication: A survey 安全组播通信的密钥管理综述
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595453
Youssef Baddi, M. D. Ech-Cherif El Kettani
{"title":"Key management for secure multicast communication: A survey","authors":"Youssef Baddi, M. D. Ech-Cherif El Kettani","doi":"10.1109/JNS3.2013.6595453","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595453","url":null,"abstract":"Multicast IP communication is increasingly used as an efficient large-scale communication mechanism for one-to-many and many-to-many communication applications on the Internet. Success of such communication mode has required the development and integration of security mechanisms. The main problem in securing a multicast session is the key management group. Membership in a multicast group is dynamic, allowing hosts to enter and leave the multicast session without the permission or knowledge of other hosts making it susceptible to attack unless they are secured. This paper addresses issues relevant to implementing security for IP multicast networks including issues of group membership and key distribution, and principally, several keying architectures are evaluated and compared to determine their strengths and weaknesses.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132369292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards a secure access to patient data in cloud computing environments 在云计算环境中对患者数据的安全访问
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595466
S. Aminzou, B. Er-Raha, Y. I. Khamlichi, K. Afdel, M. Machkour
{"title":"Towards a secure access to patient data in cloud computing environments","authors":"S. Aminzou, B. Er-Raha, Y. I. Khamlichi, K. Afdel, M. Machkour","doi":"10.1109/JNS3.2013.6595466","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595466","url":null,"abstract":"In the modern health service, data are stored in a Data Center and it can be accessed only by authorized users. However, this Data are prone to be exposed to a number of attacks, especially by the Cloud provider's Personnel with privileged access. To avoid illegal access to comprehensive content of data center including patient's information, we propose in this article a mechanism using the content-based watermarking technique. Information of patient and a digest are encrypted, before being embedded into LSB's bitplane of image associated to the patient. This image is integrated directly into the database. Hadoop system with the integrate functions. HDFS and MapReduce will play the key roles for our solution.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125560855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Special ideal ring A3 and cryptography 特殊理想环A3和密码学
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595474
My Hachem Hassib, A. Chillali, M. A. Elomary
{"title":"Special ideal ring A3 and cryptography","authors":"My Hachem Hassib, A. Chillali, M. A. Elomary","doi":"10.1109/JNS3.2013.6595474","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595474","url":null,"abstract":"In [1] and [2] we defined the elliptic curve over the ring F<sub>3</sub>d[ε],ε<sup>2</sup> = 0. In this work we will give some properties of the elliptic curve over the special ideal ring of characteristic 3, A<sub>3</sub> = F<sub>3</sub>d[ε],ε<sup>3</sup> = 0, and an application in cryptography. Our future work will focus on the study of the general case of these rings, which seem to be beneficial and interesting in cryptography, specially the one based on the identity (IBE) [6]. [7], [8].","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134158414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual walled-garden model for IMS services provisioning 用于IMS服务供应的虚拟围墙花园模型
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595460
M. Maachaoui, A. A. El Kalam, C. Fraboul, A. A. Ouahman
{"title":"Virtual walled-garden model for IMS services provisioning","authors":"M. Maachaoui, A. A. El Kalam, C. Fraboul, A. A. Ouahman","doi":"10.1109/JNS3.2013.6595460","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595460","url":null,"abstract":"The IP multimedia Subsystem (IMS) is seen as a key clement for achieving network convergence defining a new horizontal integrated service offering, based on a common signaling protocol (SIP) for all multimedia services such as Voice over IP, Video call, or instant messaging. However the present deployment of IMS is specified according to a specific model, the so called Walled-garden. In this model the applications are only provided to the users within the same operator so that the users will not have to look for applications outside the IMS garden. It is a very restrictive access mode for the users because they remain dependent on services offered by the provider and can consequently not choose freely applications they went to subscribe for. The goal of this paper is to propose a new Service provisioning model: Virtual Walled-Garden. This new model allows the user accessing all the applications, even the external ones transparently, simulating a walled-garden environment. We also introduce the notion of security level to classify the SPs in a Multi-level model.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134560537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new reputation algorithm for evaluating trustworthiness in e-commerce context 一种新的电子商务环境下可信度评估的信誉算法
2013 National Security Days (JNS3) Pub Date : 2013-04-26 DOI: 10.1109/JNS3.2013.6595455
Hasnae Rahimi, Hanan El Bakkali
{"title":"A new reputation algorithm for evaluating trustworthiness in e-commerce context","authors":"Hasnae Rahimi, Hanan El Bakkali","doi":"10.1109/JNS3.2013.6595455","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595455","url":null,"abstract":"Thanks to their ability to detect fraud, poor quality and ill-intentioned feedbacks and scores in online environments, robust Trust Reputation Systems (TRS) provide actionable information to support relying parties taking the right decision in any electronic transaction. In fact, as security providers in e-services, TRS have to faithfully calculate the most trustworthy score for a targeted product or service. Thus, TRS must rely on a robust architecture and suitable algorithms that are able to select, store, generate and classify scores and feedbacks. In this work, we propose a new architecture for TRS in e-commerce application which includes feedbacks' analysis in its treatment of scores. In fact, this architecture is based on an intelligent layer that proposes to each user (i.e. “feedback provider”) who has already given his recommendation, a collection of prefabricated feedbacks summarizing other users' textual feedbacks. A proposed algorithm is used by this architecture in order to calculate the trust degree of the user, the feedback's trustworthiness and generates the global reputation score of the product.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信