8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)最新文献

筛选
英文 中文
Access control enforcement in Named Data Networking 命名数据网络中的访问控制实施
Balkis Hamdane, A. Serhrouchni, S. Fatmi
{"title":"Access control enforcement in Named Data Networking","authors":"Balkis Hamdane, A. Serhrouchni, S. Fatmi","doi":"10.1109/ICITST.2013.6750268","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750268","url":null,"abstract":"Named Data Networking (NDN) represents one of the major Information Centric Networking (ICN) candidates for future Internet architectures. It treats data as the central element and it leverages in-network caching. Access control is a fundamental security feature in this project. It limits data access to only authorized entities. However, it can no longer be tied to a content location or to a particular host, since multiple copies of a same data can reside in various network locations. Therefore, a data-oriented access control model must be adopted. In this paper, we propose an encryption-based access control scheme for NDN that allows encrypted content to freely reside anywhere in the network. This proposal represents an enhancement of the solution already implemented in the actual NDN prototype, CCNx. It is based on a new cryptographic model for access rights management and on an adaptation of the naming system. It mitigates identified attacks and it reduces the overhead cost.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"25 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113989374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Real-time adaptive arrival prediction system for public transport 公共交通实时自适应到达预测系统
D. Obrul, B. Žalik
{"title":"Real-time adaptive arrival prediction system for public transport","authors":"D. Obrul, B. Žalik","doi":"10.1109/ICITST.2013.6750288","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750288","url":null,"abstract":"This paper introduces a low-cost, real-time prediction system for public transport arrival times. Using a predefined roads and stops network, arrival times are predicted for each public transport line. After the predictions have been made, the time for future arrivals is adapted in order to reflect current road conditions and any possible delays of future arrivals. The entire system is controlled using a dedicated online application. Sensitive location information can be encrypted and stored on a separate server.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application 通信失败:GridStreamX Edgeware应用程序中的安全漏洞
Tyson T. Brooks, Michelle L. Kaarst-Brown, C. Caicedo, Joon S. Park, L. McKnight
{"title":"A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application","authors":"Tyson T. Brooks, Michelle L. Kaarst-Brown, C. Caicedo, Joon S. Park, L. McKnight","doi":"10.1109/ICITST.2013.6750254","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750254","url":null,"abstract":"Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStreamX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to ‘worst case scenario’ emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Social engineering in social networking sites: Affect-based model 社交网站中的社会工程:基于影响的模型
A. Algarni, Yue Xu, Taizan Chan, Yu-Chu Tian
{"title":"Social engineering in social networking sites: Affect-based model","authors":"A. Algarni, Yue Xu, Taizan Chan, Yu-Chu Tian","doi":"10.1109/ICITST.2013.6750253","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750253","url":null,"abstract":"While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs) have been identified as some of the most common means of social engineering attacks. Due to factors that reduce users' ability to detect social engineering tricks and increase attackers' ability to launch them, SNSs seem to be perfect breeding grounds for exploiting people's vulnerabilities and the weakest link in security. This work will contribute to the social engineering knowledge base by identifying different entities and sub-entities that affect social-engineering-based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Enhanced Virtual Private Social Networks: Implementing user content confidentiality 增强的虚拟专用社交网络:实现用户内容的保密性
Charles A. Clarke, E. Pfluegel, D. Tsaptsinos
{"title":"Enhanced Virtual Private Social Networks: Implementing user content confidentiality","authors":"Charles A. Clarke, E. Pfluegel, D. Tsaptsinos","doi":"10.1109/ICITST.2013.6750212","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750212","url":null,"abstract":"Virtual Private Social Networks (VPSNs) are a concept that aims at improving the security attributes of untrusted, centralised Online Social Networks (OSNs). Originally conceived with the goal of establishing privacy of user profile data, we propose an extension to the scope of a VPSN to provide confidentiality of shared data in the form of user-generated content. In this paper, we present a novel approach for exchanging confidential content within a VPSN based on symmetric encryption and the use of hash functions. We report on a prototype implementation and show that in practical use our technique introduces a nominal performance overhead. We propose that this could be an important building block for a putative enhanced VPSN application.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125378631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Access Assistant Service (IAAS) 资讯查阅辅助服务
Kiswendsida K. Kabore, Oumarou Sié, F. Sèdes, A. Péninou
{"title":"Information Access Assistant Service (IAAS)","authors":"Kiswendsida K. Kabore, Oumarou Sié, F. Sèdes, A. Péninou","doi":"10.1109/ICITST.2013.6750263","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750263","url":null,"abstract":"With the great diffusion of multimedia information on the web, plenty of solutions are proposed to solve the web users' cognitive overload. Despite the multitude of solutions, the web users are still looking for more and more simple assistant in web using. In this paper we present an information adaptation system using characteristics of the user. Our work aims improving access to information through recommendations made by system users with access to information. After introducing the concepts and mechanisms used by our system, we compare it with other systems in order to show the originality of our ideas.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131769166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mining salient images from a large-scale blogosphere 从大规模博客圈中挖掘突出图像
Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim
{"title":"Mining salient images from a large-scale blogosphere","authors":"Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim","doi":"10.1109/ICITST.2013.6750177","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750177","url":null,"abstract":"User-generated images are now prevalent across social media platforms, such as Facebook, Twitter, and various blogospheres. These images can be categorized and ranked based on their relevant topics. In this paper, we present and compare candidate schemes for mining salient images related to a specific topic or object among a large number of images from a blogosphere. Identifying salient images consists of several steps: calculating the similarity between images, k-means clustering images, and ranking images. In each step, we propose a set of alternatives and as a result, present an optimal combination scheme by conducting an empirical comparison of the performance of each scheme. Furthermore, to address scalability, we also present a distributed version of the schemes and experimental results based on MapReduce on top of a Hadoop environment.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130589073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The hybrid model for web services security access control and information flow control web服务安全访问控制和信息流控制的混合模型
Saadia Kedjar, A. Tari
{"title":"The hybrid model for web services security access control and information flow control","authors":"Saadia Kedjar, A. Tari","doi":"10.1109/ICITST.2013.6750190","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750190","url":null,"abstract":"The openness and accessibility of the web Services on the Internet makes them vulnerable to various attacks. Therefore, security solutions are necessary to restrict access to web services and objects they manipulate.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130599318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient time synchronization for target tracking in heterogeneous sensor networks 异构传感器网络中目标跟踪的高能效时间同步
Daehee Kim, Sangwook Kang, Sunshin An
{"title":"Energy efficient time synchronization for target tracking in heterogeneous sensor networks","authors":"Daehee Kim, Sangwook Kang, Sunshin An","doi":"10.1109/ICITST.2013.6750198","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750198","url":null,"abstract":"Time synchronization is essential in wireless sensor networks (WSNs) due to the distributed characteristics of WSNs. Especially, target tracking applications, which are one of the most popular applications in WSNs, require highly accurate time synchronization. In this paper, we propose our own time synchronization scheme which meets the requirements of target tracking applications while minimizing the energy consumptions. This is accomplished by taking advantage of heterogeneous sensor networks (HSNs) and the unique properties of target tracking. Our proposed scheme is evaluated in terms of time accuracy and energy efficiency. As you will see later, our scheme can provide better time accuracy and energy efficiency than TPSN and RBS.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123109950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and development of Anti-XSS proxy 反xss代理的设计与开发
H. Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi
{"title":"Design and development of Anti-XSS proxy","authors":"H. Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi","doi":"10.1109/ICITST.2013.6750247","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750247","url":null,"abstract":"Cross-Site Scripting (XSS) vulnerability allows an attacker to inject arbitrary JavaScript code that can be executed in the victim's browser and cause security breaches. The discovery of XSS is still widespread among today's web applications. As a result, there is a need to improve existing solutions or develop novel attack detection techniques. This paper proposes a proxy-level design and development of XSS attack detection approach (Anti-XSS) based on Kullback-Leibler Divergence (KLD) measure. The proposed approach has been applied for a number of open-source PHP web applications containing XSS vulnerabilities. The initial results show that the approach can effectively detect XSS attacks while displaying a low false positive rate depending on the choice of threshold values of KLD.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信