8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)最新文献

筛选
英文 中文
Considering an elastic scaling model for cloud Security 考虑云安全的弹性伸缩模型
Áine MacDermott, Q. Shi, M. Merabti, K. Kifayat
{"title":"Considering an elastic scaling model for cloud Security","authors":"Áine MacDermott, Q. Shi, M. Merabti, K. Kifayat","doi":"10.1109/ICITST.2013.6750181","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750181","url":null,"abstract":"Cloud computing usage is growing, and soon the vast majority of organisations will rely on some form of cloud computing services. Cloud computing is being adopted in critical sectors such as energy, transport and finance. This makes cloud computing services critical in themselves. When cyber-attacks and cyber disruptions happen, millions of users are affected. Infrastructure vendors will inevitably take advantage of the benefits offered by the cloud computing environment, but while this may offer improved performance and scalability, the associated security threats deter this progression. There needs to be an assurance that confidentiality, integrity and availability of the data and resources is maintained. This paper provides an overview to the cloud security conundrum, details existing intrusion detection methods, and presents our observation and proposed elastic scaling method for cloud security.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116339135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cryptanalysis of a chaos-based encryption algorithm for distributed systems 分布式系统中基于混沌的加密算法的密码分析
D. Caragata, Karim Tabia, M. Luduena
{"title":"Cryptanalysis of a chaos-based encryption algorithm for distributed systems","authors":"D. Caragata, Karim Tabia, M. Luduena","doi":"10.1109/ICITST.2013.6750157","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750157","url":null,"abstract":"This paper analyses the security of a recently proposed chaos based cryptosystem. It shows that the cryptosystem under study has weak diffusion and presents a cryptanalysis that allows the attacker to decrypt any encrypted image. More precisely, it proposes a divide-and-conquer attack that allows an attacker to recover the internal states of the cryptosystem and to use them in order to encrypt or decrypt any image. Experimental results demonstrate the effectiveness of the attack and the lack of diffusion of the cryptosystem. Finally, a solution is proposed that can increment the security of the cryptosystem and render the cryptanalysis ineffective.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128461091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A model of component interaction between Formal, Technical and Informal components within IS/IT security governance IS/IT安全治理中正式、技术和非正式组件之间的组件交互模型
Nadianatra Musa, B. Clift
{"title":"A model of component interaction between Formal, Technical and Informal components within IS/IT security governance","authors":"Nadianatra Musa, B. Clift","doi":"10.1109/ICITST.2013.6750242","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750242","url":null,"abstract":"In most countries, corporate statutes and rules (mandatory or voluntary) about powers and responsibilities in corporations (corporate governance) place responsibility on the Board of Directors acting as a Board. However, these documents do not provide much guidance about recognizing potential problems or about preventative measures. Even so, it is apparent that knowingly tolerating dishonesty or incompetence within the corporation is likely to be regarded as negligence. Most organizations today pay little attention to the inter-relationship between the Formal component, Technical component and Informal component. The Board and senior management of organizations tend to focus more on narrow aspects such as IS/IT management rather than on a comprehensive view. Deficiencies in any of these three components may result in unbalanced IS/IT security implementation. The objective of this study is to integrate the three components simultaneously throughout the IS/IT security implementation. The model of IS/IT security governance is a comprehensive conceptual framework because it emphasizes the two-way relationship between each of the components. In this study, a triangulated approach is adopted, data were collected in three phases, phase 1 is a website analysis, phase 2 is an interview and phase 3 is a mail survey. The interactions of three components, formal, technical and informal are significant in the IS/IT security governance model.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An access control model for easy management of patient privacy in EHR systems 一个访问控制模型,便于在EHR系统中管理患者隐私
M. Sicuranza, A. Esposito
{"title":"An access control model for easy management of patient privacy in EHR systems","authors":"M. Sicuranza, A. Esposito","doi":"10.1109/ICITST.2013.6750243","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750243","url":null,"abstract":"In EHR systems most of the data are confidential concerning the health of a patient, so it is necessary to provide a mechanism for access control. This has to ensure not only the confidentiality and integrity of the data, but also to allow the definition of security policies which reflect the need for privacy of the health care organization that manages the data; of the patient, who the documents refer to; and finally of international and national directives and norms. In literature there are several access control models, each of which responds just partially to the need for patient privacy. In this paper an innovative access control model is defined. It meets the main features that have to be satisfied by an EHR. Our proposal is an advanced access control model that combines several access control models known in the literature. It adds the characteristics of modularity and easiness in the management of access policies, focusing attention on privacy and patient's consent (patient privacy centric). The model provides the ability to define and to realize fine-grained access policies, which can be defined independently by both healthcare organizations and by patients. Our model is Attribute-based, multi-level, modular and with a dynamic and temporal management of the users' lists.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116983257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
RUFC: A flexible framework for reliable UDP with flow control RUFC:一个灵活的框架,可靠的UDP与流量控制
A. Atya, Jilong Kuang
{"title":"RUFC: A flexible framework for reliable UDP with flow control","authors":"A. Atya, Jilong Kuang","doi":"10.1109/ICITST.2013.6750205","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750205","url":null,"abstract":"Various reliable UDP with flow control schemes have been widely adopted to enhance the native UDP protocol. However, all existing schemes exhibit one or more drawbacks that prevent them from achieving the optimal performance in practice. For example, some schemes under-utilize the available bandwidth; some schemes enforce high overhead logic; and some schemes have rigid policies and parameters that do not adapt to ever-changing system runtime and network conditions. In this paper, we propose RUFC, an efficient and flexible framework to support Reliable UDP with Flow Control. Our framework fits between the transport layer employing UDP and the application layer. While providing the common functionalities and interfaces for both layers, RUFC is capable of supporting policy customization and parameter tuning to achieve the optimal application performance. Extensive experimental data shows that RUFC significantly outperforms the native UDP protocol as well as the two state-of-the-art UDP-based protocols (UDT and Tsunami) in terms of throughput and error rate.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationships 考虑描述粒度多样性及其复杂关系的电子邮件讨论过程提取方法
H. Nakayama, R. Onuma, H. Kaminaga, Y. Miyadera, S. Yokoyama, Shoichi Nakamura
{"title":"Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationships","authors":"H. Nakayama, R. Onuma, H. Kaminaga, Y. Miyadera, S. Yokoyama, Shoichi Nakamura","doi":"10.1109/ICITST.2013.6750265","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750265","url":null,"abstract":"Discussion using e-mail is frequently conducted in intelligent works such as research activity. It is important but generally difficult to successfully grasp the processes of the discussions and their results. There exist descriptions of diverse particle sizes in actual discussion using e-mail. This feature brings about the difficulty in grasping the discussion processes in addition to basic features such as increase of number of e-mails. Although there have been some research projects which aim at extraction of discussion processes, these existing methods have not consider the diversity of description granularity. This research has aimed to develop a support system for extracting discussion processes and their visualization. This paper mainly describes methods for extracting the discussion processes considering the diversity of description granularity and complicated connections between them. This paper also describes the overview of target service and the outline of support system.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133481414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards the design of a film-based graphical password scheme 一个基于胶片的图形密码方案的设计
Luigi Catuogno, Clemente Galdi
{"title":"Towards the design of a film-based graphical password scheme","authors":"Luigi Catuogno, Clemente Galdi","doi":"10.1109/ICITST.2013.6750228","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750228","url":null,"abstract":"Password-based authentication schemes and their graphical evolutions have been deeply analyzed in the last couple of decades. Typically such schemes are not resilient to shoulder surfing attacks, that is, if the adversary can observe (and “understand”) a number of authentication sessions, he can identify the secret password. In this paper we propose a new paradigm for user authentication. FilmPW is a graphical authentication system where the system challenges the user by showing her a short film containing a number of pre-defined pass-events and the user has reply by proving she recognized such events. We present FilmPW, discuss some issues related to event classification and present a prototye implementation. Our preliminary experiments show that such an authentication mechanism is highly accepted by users and achieves low error rates.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automata 介绍了一种基于元胞自动机混沌特性的医学图像加密新算法
I. Ranaee, Mahdi Majidi Nia, R. Jahantigh, Amirhossein Gharib
{"title":"Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automata","authors":"I. Ranaee, Mahdi Majidi Nia, R. Jahantigh, Amirhossein Gharib","doi":"10.1109/ICITST.2013.6750269","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750269","url":null,"abstract":"Nowadays, with the expansion of telemedicine networks, providing security of medical documents plays an important role in medical society especially in protection of patient privacy. For this reason, medical centers spend a lot of money to improve their information security. One of the methods of improving medical information security is encryption of medical information that can be implemented with various algorithms. Due to the special characteristics of visual data and other information, methods used in image cryptography are limited and in some cases, they suffer from some security flaws and limitations in application. In this paper, according to the chaotic characteristics of cellular automata, new algorithm has been proposed for encryption medical image. The results indicated that the proposed algorithm provided more security as well as higher speed. Moreover, this method hasn't any errors in decryption stage. These features are rarely seen simultaneously in one encryption algorithm.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133365531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A new encryption scheme based on hybrid Problems 一种新的基于混合问题的加密方案
Hemlal Sahu, B. K. Sharma
{"title":"A new encryption scheme based on hybrid Problems","authors":"Hemlal Sahu, B. K. Sharma","doi":"10.1109/ICITST.2013.6750255","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750255","url":null,"abstract":"In 1976 Diffie and Hellman gave the path breaking concept of public key cryptosystem. After that many public key cryptographic algorithms have been proposed based on single mathematical problem. Enhancing security is the major objective for public key cryptosystem on the basis of hardness of the intractable computational problem. To enhance security a new public key encryption scheme is designed based on two hard problems namely expressing a torsion point into linear combination of basis points and factoring. Since former is more complicate than solving ECDLP. So our proposed scheme is more secure than cryptosystems based on ECDLP and factoring. Therefore, this scheme is expected to gain a higher level of security. Developed scheme is more efficient with respect to encryption and decryption since it requires only minimal operations in both algorithms.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123320502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-speed encryption method based on switched chaotic model with changeable parameters 基于可变参数切换混沌模型的高速加密方法
Oleg Garasym, I. Taralova
{"title":"High-speed encryption method based on switched chaotic model with changeable parameters","authors":"Oleg Garasym, I. Taralova","doi":"10.1109/ICITST.2013.6750158","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750158","url":null,"abstract":"In this paper an improved chaotic switching algorithm based on modified Lozi system is applied. Generally speaking, the main advantage of the switched encrypted model is its robustness to the noise, while the main drawback is the slow processing speed. In this article we propose to gain model productivity by adjusting parameter in Lozi chaotic generator. Chaos generator is sensitive to any structure, therefore the solution shouldn't influence the pseudo randomness which is required for encryption. We provide the results of switched chaotic model based on Lozi chaotic generator with changeable parameter studied for chaoticity and pseudo-randomness with NIST, largest Lyapunov exponent, auto-correlation, cross-correlation and cumulative distribution.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124995134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信