{"title":"Access control enforcement in Named Data Networking","authors":"Balkis Hamdane, A. Serhrouchni, S. Fatmi","doi":"10.1109/ICITST.2013.6750268","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750268","url":null,"abstract":"Named Data Networking (NDN) represents one of the major Information Centric Networking (ICN) candidates for future Internet architectures. It treats data as the central element and it leverages in-network caching. Access control is a fundamental security feature in this project. It limits data access to only authorized entities. However, it can no longer be tied to a content location or to a particular host, since multiple copies of a same data can reside in various network locations. Therefore, a data-oriented access control model must be adopted. In this paper, we propose an encryption-based access control scheme for NDN that allows encrypted content to freely reside anywhere in the network. This proposal represents an enhancement of the solution already implemented in the actual NDN prototype, CCNx. It is based on a new cryptographic model for access rights management and on an adaptation of the naming system. It mitigates identified attacks and it reduces the overhead cost.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"25 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113989374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time adaptive arrival prediction system for public transport","authors":"D. Obrul, B. Žalik","doi":"10.1109/ICITST.2013.6750288","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750288","url":null,"abstract":"This paper introduces a low-cost, real-time prediction system for public transport arrival times. Using a predefined roads and stops network, arrival times are predicted for each public transport line. After the predictions have been made, the time for future arrivals is adapted in order to reflect current road conditions and any possible delays of future arrivals. The entire system is controlled using a dedicated online application. Sensitive location information can be encrypted and stored on a separate server.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tyson T. Brooks, Michelle L. Kaarst-Brown, C. Caicedo, Joon S. Park, L. McKnight
{"title":"A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application","authors":"Tyson T. Brooks, Michelle L. Kaarst-Brown, C. Caicedo, Joon S. Park, L. McKnight","doi":"10.1109/ICITST.2013.6750254","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750254","url":null,"abstract":"Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStreamX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to ‘worst case scenario’ emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social engineering in social networking sites: Affect-based model","authors":"A. Algarni, Yue Xu, Taizan Chan, Yu-Chu Tian","doi":"10.1109/ICITST.2013.6750253","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750253","url":null,"abstract":"While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs) have been identified as some of the most common means of social engineering attacks. Due to factors that reduce users' ability to detect social engineering tricks and increase attackers' ability to launch them, SNSs seem to be perfect breeding grounds for exploiting people's vulnerabilities and the weakest link in security. This work will contribute to the social engineering knowledge base by identifying different entities and sub-entities that affect social-engineering-based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Virtual Private Social Networks: Implementing user content confidentiality","authors":"Charles A. Clarke, E. Pfluegel, D. Tsaptsinos","doi":"10.1109/ICITST.2013.6750212","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750212","url":null,"abstract":"Virtual Private Social Networks (VPSNs) are a concept that aims at improving the security attributes of untrusted, centralised Online Social Networks (OSNs). Originally conceived with the goal of establishing privacy of user profile data, we propose an extension to the scope of a VPSN to provide confidentiality of shared data in the form of user-generated content. In this paper, we present a novel approach for exchanging confidential content within a VPSN based on symmetric encryption and the use of hash functions. We report on a prototype implementation and show that in practical use our technique introduces a nominal performance overhead. We propose that this could be an important building block for a putative enhanced VPSN application.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125378631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kiswendsida K. Kabore, Oumarou Sié, F. Sèdes, A. Péninou
{"title":"Information Access Assistant Service (IAAS)","authors":"Kiswendsida K. Kabore, Oumarou Sié, F. Sèdes, A. Péninou","doi":"10.1109/ICITST.2013.6750263","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750263","url":null,"abstract":"With the great diffusion of multimedia information on the web, plenty of solutions are proposed to solve the web users' cognitive overload. Despite the multitude of solutions, the web users are still looking for more and more simple assistant in web using. In this paper we present an information adaptation system using characteristics of the user. Our work aims improving access to information through recommendations made by system users with access to information. After introducing the concepts and mechanisms used by our system, we compare it with other systems in order to show the originality of our ideas.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131769166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining salient images from a large-scale blogosphere","authors":"Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim","doi":"10.1109/ICITST.2013.6750177","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750177","url":null,"abstract":"User-generated images are now prevalent across social media platforms, such as Facebook, Twitter, and various blogospheres. These images can be categorized and ranked based on their relevant topics. In this paper, we present and compare candidate schemes for mining salient images related to a specific topic or object among a large number of images from a blogosphere. Identifying salient images consists of several steps: calculating the similarity between images, k-means clustering images, and ranking images. In each step, we propose a set of alternatives and as a result, present an optimal combination scheme by conducting an empirical comparison of the performance of each scheme. Furthermore, to address scalability, we also present a distributed version of the schemes and experimental results based on MapReduce on top of a Hadoop environment.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130589073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The hybrid model for web services security access control and information flow control","authors":"Saadia Kedjar, A. Tari","doi":"10.1109/ICITST.2013.6750190","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750190","url":null,"abstract":"The openness and accessibility of the web Services on the Internet makes them vulnerable to various attacks. Therefore, security solutions are necessary to restrict access to web services and objects they manipulate.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130599318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient time synchronization for target tracking in heterogeneous sensor networks","authors":"Daehee Kim, Sangwook Kang, Sunshin An","doi":"10.1109/ICITST.2013.6750198","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750198","url":null,"abstract":"Time synchronization is essential in wireless sensor networks (WSNs) due to the distributed characteristics of WSNs. Especially, target tracking applications, which are one of the most popular applications in WSNs, require highly accurate time synchronization. In this paper, we propose our own time synchronization scheme which meets the requirements of target tracking applications while minimizing the energy consumptions. This is accomplished by taking advantage of heterogeneous sensor networks (HSNs) and the unique properties of target tracking. Our proposed scheme is evaluated in terms of time accuracy and energy efficiency. As you will see later, our scheme can provide better time accuracy and energy efficiency than TPSN and RBS.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123109950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi
{"title":"Design and development of Anti-XSS proxy","authors":"H. Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi","doi":"10.1109/ICITST.2013.6750247","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750247","url":null,"abstract":"Cross-Site Scripting (XSS) vulnerability allows an attacker to inject arbitrary JavaScript code that can be executed in the victim's browser and cause security breaches. The discovery of XSS is still widespread among today's web applications. As a result, there is a need to improve existing solutions or develop novel attack detection techniques. This paper proposes a proxy-level design and development of XSS attack detection approach (Anti-XSS) based on Kullback-Leibler Divergence (KLD) measure. The proposed approach has been applied for a number of open-source PHP web applications containing XSS vulnerabilities. The initial results show that the approach can effectively detect XSS attacks while displaying a low false positive rate depending on the choice of threshold values of KLD.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}