{"title":"Security in software engineering requirement","authors":"Wafa Slaibi Al-Shorafat","doi":"10.1109/ICITST.2013.6750287","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750287","url":null,"abstract":"A system can't have high assurance if it has poor security requirement, so for high assurance system will logically include security requirement as well as reliability, robustness security requirement is one of quality factors that systems try to satisfy which considered as another quality factor in a quality model. The close similarity between these two quality factors implies that a classification safety-related requirement is a good place to begin when developing an taxonomy of security-related requirements. The resulting taxonomy consists of pure security requirements specifying minimum acceptable amounts of security, security-significant requirements which are non-security requirements with important security ramifications, security system requirements specifying requirements for security architectural components, and security constraints.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indirect NFC-login","authors":"Bernd Borchert, Max Günther","doi":"10.1109/ICITST.2013.6750192","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750192","url":null,"abstract":"Smartcard based authentication on web services stays a niche application because of the lack of smartcard readers on the vast majority of internet devices. In this paper we discuss a method that uses an NFC-enabled Smartphone in order to login via NFC-enabled smartcard on basically any internet device. We explain the details of this method and analyze its security, deployability, and usability aspects.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sitaram, H. L. Phalachandra, Anush Vishwanath, P. Ramesh, M. Prashanth, Akshay G. Joshi, Anoop R. Desai, R. HarikrishnaPrabhuC., Prafulla, R. Shwetha, A. Yashaswini
{"title":"Keystone federated security","authors":"D. Sitaram, H. L. Phalachandra, Anush Vishwanath, P. Ramesh, M. Prashanth, Akshay G. Joshi, Anoop R. Desai, R. HarikrishnaPrabhuC., Prafulla, R. Shwetha, A. Yashaswini","doi":"10.1109/ICITST.2013.6750285","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750285","url":null,"abstract":"Hybrid clouds are increasingly becoming important in cloud computing. We see a rapid raise in the demand for a secure infrastructure that would enable sharing of computing resources between multiple hybrid cloud deployments to facilitate accommodation of situations where the demand outstrips supply, load balancing, and other such infrastructure constraints. From the end user perspective, this would also mean that the end users can host applications with their choice of federated cloud provider, as opposed to choosing from a host of global cloud providers on the market. The following paper describes a federated infrastructure for hybrid clouds, in particular, Openstack.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122635424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloudlet-based for big data collection in body area networks","authors":"Muhannad Quwaider, Y. Jararweh","doi":"10.1109/ICITST.2013.6750178","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750178","url":null,"abstract":"This paper presents a large scale BANs system in the presence of cloudlet-based data collection. The objective is to minimize end-to-end packet cost by dynamically choosing data collection to the cloud using cloudlet based system. The goal is to have the monitored data of BANs to be available to the end user or to the service provider in reliable manner. While reducing packet-to-cloud energy, the proposed work also attempts to minimize the end-to-end packet delay by choosing dynamically a neighbor cloudlet, so that the overall delay is minimized. Then, it will lead to have the monitored data in the cloud in real time manner. Note that, in the absence of network congestions in low data-rate BANs, the storage delays due to data collection manner are usually much larger compared to the congestion delay.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-to-End cryptographic voting: Potentials and limitations","authors":"Mohammed Awad, E. Leiss","doi":"10.1109/ICITST.2013.6750173","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750173","url":null,"abstract":"Due to the concerns associated with Direct Recording Electronics (DREs) and the limitations of the proposed verification method, such as Voter Verified Audit Trails (VVATs), an alternative scheme known as End-to-End (E2E) cryptographic voting was proposed. E2E cryptographic systems aim to resolve the conflict between secrecy and accuracy, two fundamental requirements of the electoral process. Additionally, the use of cryptography introduces several other advantages over conventional voting methods. On the other hand, cryptographic voting systems have various limitations that stand in the way of their adoption. In this paper we will discuss and analyze common E2E cryptographic voting systems, then we will suggest improvements on the cryptographic schemes, which address their limitations.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115407872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain","authors":"S. H. Choi, Bo Yang, H. Cheung, Y. Yang","doi":"10.1109/ICITST.2013.6750203","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750203","url":null,"abstract":"With recent advancement in Radio Frequency Identification (RFID), RFID-based track-and-trace anti-counterfeiting has attracted considerable research interests. A track-and-trace anti-counterfeiting system requires an integral and reliable electronic pedigree (e-pedigree) to ensure high product visibility along the supply chain. With the continuous movements of large volumes of products along the supply chain, huge amounts of RFID data would be inevitably generated, posing great challenges to system development and operation. As such, the front-end RFID data should be well-formatted for efficient capturing, filtering, and synchronization in a logical and reliable way, so that the accumulated e-pedigree would be complete and trustworthy for subsequent product authentication. In this paper, we present an innovative track-and-trace anti-counterfeiting system for apparel products, and discuss a number of key data management issues, such as e-pedigree formatting, data synchronization, and traceability / visibility control. A data format of e-pedigree for full traceability of garments is proposed to support products authentication in item-level, products anti-lost in pallet-level and products status prediction in batch-level. Based on this format, a three-step mechanism of data synchronization is established to ensure e-pedigree integrity. To avoid possible leakage/falsification of e-pedigree data, an RBAC-based access control is proposed as an auxiliary module of the anti-counterfeiting system.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126753967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual machine remote detection method using network timestamp in cloud computing","authors":"M. Noorafiza, H. Maeda, T. Kinoshita, R. Uda","doi":"10.1109/ICITST.2013.6750225","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750225","url":null,"abstract":"As any new technology advancement, cloud computing also creates disruptive possibilities and security risk potentials. Virtualization which are the engine that drives cloud computing turns the data center into self-managing, highly scalable, highly available and pools of easily consumable resources. The increase in virtualization and usage of virtual machines (VM) in cloud computing environment has attracted a lot of attention from the computer security research community on the potential treats that could occurs from vast use of virtual machines in cloud computing. In this paper, methods for detecting VM using remote IP and ICMP packet timestamp detection methods and the timestamp behavior are studied, tested and investigated to determine either the problem still exist in high performance cloud computing infrastructure. The results from this study shows that there were distinguishable differences in the timestamp replies behaviors received from VM and non-VM machines even in a high performance private cloud computing environment. These results prove a significant potential that timestamp detection method could be exploited by malware as a VM detection method even in high performance cloud computing infrastructure. From the finding of this study, we proposed theory for the stand-alone environment to reply timestamp in such differences similar to the VM.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DCT sign-based robust image hashing","authors":"Supakorn Prungsinchai, F. Khelifi, A. Bouridane","doi":"10.1109/ICITST.2013.6750230","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750230","url":null,"abstract":"This paper proposes a robust image hashing technique based on the sign of coefficients in the Discrete Cosine Transforms (DCT) domain. The idea consists of exploiting the energy compaction property of the DCT and its ability to carry information of edges and texture in DCT sign values. It has been shown that the DCT sign-based hashing technique offers an excellent robustness against signal processing operations and geometric attacks and outperforms the conventional DCT-based image hashing technique.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"177 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134326297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Onuma, H. Nakayama, H. Kaminaga, Yasuhiko Morimoto, Y. Miyadera, Shoichi Nakamura
{"title":"Methods for strategic accumulation of context information in research activities","authors":"R. Onuma, H. Nakayama, H. Kaminaga, Yasuhiko Morimoto, Y. Miyadera, Shoichi Nakamura","doi":"10.1109/ICITST.2013.6750289","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750289","url":null,"abstract":"Research activities normally consist of numerous works such as paper composition, discussions and surveys of literature. It is important for smooth accomplishment of research to strategically accumulate the context information (i.e. processes of the work, methods and results) and to skillfully utilize them. However, it is difficult to accumulate relevant context information since most automatic methods target only the specific work and/or researchers tend to selectively use different applications suitable for each purpose. This research aims to develop methods of organizing context information across the different styles of information and applications. This paper outlines methods to strategically accumulate context information and to organize it. Moreover, it describes an experiment using test-case data and discusses the effectiveness of the methods in light of the results.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"118 37","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131914047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. K. Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel
{"title":"DGM approach to network attacker and defender strategies","authors":"B. K. Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel","doi":"10.1109/ICITST.2013.6750213","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750213","url":null,"abstract":"The computer game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions within the network. Like attack-graph-based model checking, the goal of an anticipation game is to prove that a safety property holds. However, using this kind of game is tedious and error prone on large networks because it assumes that the analyst has prior and complete knowledge of critical network services. This work presents a non-zero, Deterministic Game-Theoretic Modeling (DGM) method for analyzing the security of computer networks. The interaction between an attacker and a defender is viewed as two-player non-zero deterministic game whose model is constructed using a saddle point solution (non-linear program) to compute the value of the game. The probability of possible attack on a network given available attacker strategy or best-response strategies for the attacker and the defender was demonstrated. The simulation of the model was achieved using Java, which is a high level language with object oriented programming capabilities and features. The backend is implemented using MySQL, which is a widely used relational database management system (RDBMS). Selected results of the games played were presented with analysis showingsome likelyattacker activities and the counter measures from the defender.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}