2009 International Conference on Availability, Reliability and Security最新文献

筛选
英文 中文
Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots 无地图交换的安全多机器人主动定位:非信任机器人之间安全合作的案例
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.158
Sarat C. Addepalli, P. Bansal, K. Srinathan, K. Krishna
{"title":"Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots","authors":"Sarat C. Addepalli, P. Bansal, K. Srinathan, K. Krishna","doi":"10.1109/ARES.2009.158","DOIUrl":"https://doi.org/10.1109/ARES.2009.158","url":null,"abstract":"Secure multiparty protocols have found applications in numerous domains, where multiple nontrusting parties wish to evaluate a function of their private inputs. In this paper, we consider the case of multiple robots wishingto localize themselves, with maps as their private inputs. Though localization of robots has been a well studied problem, only recent studies have shown how to actively localize multiple robots through coordination. In all such studies, localization has typically been achieved through  constructing a publicly known global map. Here, we show how a similar solution can be given in the case of nontrusting robots, which do not wish to disclose their local maps.","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"29 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115308633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A-COLD: Access Control of Web OLAP over Multi-data Warehouse A-COLD:基于多数据仓库的Web OLAP访问控制
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.71
S. Fugkeaw, P. Manpanpanich, S. Juntapremjitt
{"title":"A-COLD: Access Control of Web OLAP over Multi-data Warehouse","authors":"S. Fugkeaw, P. Manpanpanich, S. Juntapremjitt","doi":"10.1109/ARES.2009.71","DOIUrl":"https://doi.org/10.1109/ARES.2009.71","url":null,"abstract":"This paper proposes the design and development framework of collaborative access control for OLAP queries spanning over multi-data warehouse (DW). The approach is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of DW user identification and privilege of fact and dimensional access. To integrate several security policies from DWs, we employ the XACML policy integration to serve interoperation and authorization management. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the implementation details of the prototype A-Cold (Access Control of web-OLAP over multiple DWs) is presented to demonstrate our research idea.","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125097229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Analysis for P2P Routing Protocols P2P路由协议的安全性分析
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.82
Tatsuro Fujii, Yizhi Ren, Y. Hori, K. Sakurai
{"title":"Security Analysis for P2P Routing Protocols","authors":"Tatsuro Fujii, Yizhi Ren, Y. Hori, K. Sakurai","doi":"10.1109/ARES.2009.82","DOIUrl":"https://doi.org/10.1109/ARES.2009.82","url":null,"abstract":"In P2P systems, it is important to guarantee the efficiency and security of message routing between the source and the destination. Unfortunately, malicious attackers can easily insert a lot of nodes they controlled, and disturb the message routing between honest nodes. In order to counter such attacks, secure routing protocols which ensure successful message routing are needed. Furthermore, it is very important to analyze existing routing protocols for the inventions of secure routing protocols. In this paper, we propose a security model for evaluating security level of routing protocol. In this model, we define the concept of Regular Path, and use it as the indicator of security level. Then, we analyze three representative routing protocols based on proposed model to make comparisons from the aspects of security level and implement level.","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115335500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases 关系型数据库数据隐私政策实施有效性评估的测试框架
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.153
G. Canfora, C. A. Visaggio, Vito Paradiso
{"title":"A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases","authors":"G. Canfora, C. A. Visaggio, Vito Paradiso","doi":"10.1109/ARES.2009.153","DOIUrl":"https://doi.org/10.1109/ARES.2009.153","url":null,"abstract":"The growing migration of business transactions toward the web made data privacy a critical issue to cope with. Many technologies have been proposed in order to preserve sensitive data from illegal disclosure, also known as Privacy Enhancing Technology (PET). Unfortunately, under certain conditions, sensitive data could be obtained by leveraging different malicious mechanisms which exploit actions permitted to the user. Thus, it is needed to face the problem also at the system design level, and not only by integrating a specific PET into the final system.We propose a framework for testing the software system’s capability of respecting established data privacy policy. Our test framework aims at detecting the sequence of legal actions which could allow a user to breach the mechanisms for preserving data privacy. The test output helps designers to properly modify those usage scenarios which could compromise data privacy. Experimentation has been carried out in order to make a preliminary assessment of the method","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122718132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Rank Swapping for Partial Orders and Continuous Variables 偏序和连续变量的秩交换
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.111
V. Torra
{"title":"Rank Swapping for Partial Orders and Continuous Variables","authors":"V. Torra","doi":"10.1109/ARES.2009.111","DOIUrl":"https://doi.org/10.1109/ARES.2009.111","url":null,"abstract":"Rank swapping, which was first defined for ordinal attributes, is currently applied also to numerical values. In this paper we propose a general definition for continuous domains and another definition for partially ordered sets.","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129011206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intrusion Process Modeling for Security Quantification 面向安全量化的入侵过程建模
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.142
J. Almasizadeh, M. A. Azgomi
{"title":"Intrusion Process Modeling for Security Quantification","authors":"J. Almasizadeh, M. A. Azgomi","doi":"10.1109/ARES.2009.142","DOIUrl":"https://doi.org/10.1109/ARES.2009.142","url":null,"abstract":"The aim is to develop a suitable method for quantifying security. We use stochastic modeling techniques for this purpose. An intrusion process is considered as a series of elementary attack phases and at each phase the interactions between the attacker and the system are analyzed rigorously. It is assumed that a typical attacker needs some time to perform an elementary attack phase. On the other hand, it is assumed that the attacker may be detected by the system and thus the overall intrusion process is interrupted. The attacker skill level and the system's abilities are characterized by the uniform distribution functions assigned to the transitions of the model. The underlying stochastic model is recognized as a semi-Markov chain. For security analysis, some valid assumptions about intrusion process are considered. Also, two quantitative security measures are defined and evaluated based on the model. The proposed method is demonstrated by modeling a complicated attack process and evaluating the desired security measures.","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121486083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers 防止跨站攻击的绑定机制在Web浏览器中的实现:引入Bind-Value头
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.19
Genta Iha, H. Doi
{"title":"An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers","authors":"Genta Iha, H. Doi","doi":"10.1109/ARES.2009.19","DOIUrl":"https://doi.org/10.1109/ARES.2009.19","url":null,"abstract":"Today, cross-site scripting (XSS) vulnerability is one of the major problems of web application security. To prevent XSS attacks, there are several solutions based on blacklist filtering or whitelist filtering. Unfortunately, these solutions cannot solve XSS vulnerabilities completely. In this paper, we propose a binding mechanism, which is comparable to the binding mechanism for SQL. Furthermore, this paper shows the evaluation results of this mechanism by implementing this mechanism into the web browser (Firefox 3.0).","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114868999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Post-Mortem Incident Modeling Method 一种事后事件建模方法
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.108
Shanai Ardi, N. Shahmehri
{"title":"A Post-Mortem Incident Modeling Method","authors":"Shanai Ardi, N. Shahmehri","doi":"10.1109/ARES.2009.108","DOIUrl":"https://doi.org/10.1109/ARES.2009.108","url":null,"abstract":"Incident post-mortem analysis after recovery from incidents is recommended by most incident response experts. An analysis of why and how an incident happened is crucial for determining appropriate countermeasures to prevent the recurrence of the incident. Currently, there is a lack of structured methods for such an analysis, which would identify the causes of a security incident. In this paper, we present a structured method to perform the post-mortem analysis and to model the causes of an incident visually in a graph structure. This method is an extension of our earlier work on modeling software vulnerabilities. The goal of modeling incidents is to develop an understanding of what could have caused the security incident and how its recurrence can be prevented in the future. The method presented in this paper is intended to be used during the post-mortem analysis of incidents by incident response teams.","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128041593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Managing Rights and Value of Digital Media 数字媒体的权利管理与价值
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.16
F. Chiariglione, G. Cosenza, Sergio Matone
{"title":"Managing Rights and Value of Digital Media","authors":"F. Chiariglione, G. Cosenza, Sergio Matone","doi":"10.1109/ARES.2009.16","DOIUrl":"https://doi.org/10.1109/ARES.2009.16","url":null,"abstract":"This paper describes iPay, the Local Exchange Trading Systems developed by Digital Media in Italia, and the extensions developed to the Digital Media Project Interoperable DRM Platform specification allowing the integration of the two specifications in a complete system for creating and distributing digital media, and remunerating its users for the content and the services provided. The solution presented in this paper overcomes the current limitations in digital media value chains because it makes online payments accessible and simple to use, measures the contributions made to the value of digital media by all the players, reduces the costs associated to online micro-payments for digital media and guarantees the privacy of personal data and transaction information. The solution has the potential to maximise the flow of digital media and motivate and encourage the use of digital media in the full respect of the rights of all users in media value chains.","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Policy Framework for Data Management in Services Marketplaces 服务市场数据管理的政策框架
2009 International Conference on Availability, Reliability and Security Pub Date : 2009-03-16 DOI: 10.1109/ARES.2009.79
Jun Li, Bryan Stephenson, S. Singhal
{"title":"A Policy Framework for Data Management in Services Marketplaces","authors":"Jun Li, Bryan Stephenson, S. Singhal","doi":"10.1109/ARES.2009.79","DOIUrl":"https://doi.org/10.1109/ARES.2009.79","url":null,"abstract":"Large numbers of consumers, businesses, and public entities are now using the Internet for a variety of transactions. This has enabled service providers to offer outsourcing capabilities to business customers using software-as-a-service delivery models in services marketplaces. However, challenges remain in widespread acceptance of such delivery models because they require customers to share business critical data with the service providers. This paper presents a policy framework that enables businesses to communicate data management policies with service providers at an arbitrarily granular level. Policy is described as a state machine with each state representing a lifecycle stage, and attached to data when it is shared between services. Data management related policies including data appropriateness, data quality assurance, data retention and data migration can be described in this framework and enforced correspondingly.","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信