The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)最新文献

筛选
英文 中文
Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles 用于增强OSGi包部署的基于身份的密码系统
P. Parrend, S. Galice, S. Frénot, S. Ubéda
{"title":"Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles","authors":"P. Parrend, S. Galice, S. Frénot, S. Ubéda","doi":"10.1109/SECUREWARE.2007.4385333","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385333","url":null,"abstract":"The OSGi platform is designed to make Java software extensible at runtime. This undeniably presents a great interest in several domains like embedded platforms or enterprise application servers. However, securing the deployment of the OSGi components, or bundles, proves to be a major challenge. The current approach consists in digitally signing the bundles and certifying the signature through a public key infrastructure (PKI). We propose to replace this technology with an identity-based cryptosystem, which provides both better performances and simplified key management. We present an infrastructure for initialization and use of identity-based cryptography, and define the digital signature of bundles using such a cryptographic scheme. Based on our implementation, we provide a comparison between classical PKI management and identity-based PKI management. The proposed approach proves to support radical improvement in the key management process, especially in strongly asymmetric system such as OSGi-based home gateway, where a few providers publish services for millions of potential users.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115701049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Formal Verification of Business Workflows and Role Based Access Control Systems 业务工作流和基于角色的访问控制系统的正式验证
A. Dury, S. Boroday, A. Petrenko, V. Lotz
{"title":"Formal Verification of Business Workflows and Role Based Access Control Systems","authors":"A. Dury, S. Boroday, A. Petrenko, V. Lotz","doi":"10.1109/SECUREWARE.2007.4385334","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385334","url":null,"abstract":"An approach for combined modeling of role-based access control systems (RBAC) together with business workflows is presented. The model allows to model check various security properties. Several techniques to confine the state explosion, which may occur during model checking are presented and experimentally evaluated using the model checker Spin. The techniques allow the verification of the business workflow and associated RBAC for a reasonable number of users of a medium sized company.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130296541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections 多路径数据分散对匿名TCP连接影响的评估
Marga Nácher, C. Calafate, Juan-Carlos Cano, P. Manzoni
{"title":"Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections","authors":"Marga Nácher, C. Calafate, Juan-Carlos Cano, P. Manzoni","doi":"10.1109/SECUREWARE.2007.4385305","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385305","url":null,"abstract":"Despite recent research efforts, wireless ad hoc networking technology remains especially prone to security attacks. In this work our contribution focuses on determining the optimal trade-off between traffic dispersion and TCP performance to reduce the chances of successful eavesdropping, while maintaining acceptable levels of throughput. For our experiments we propose a multipath-enhanced version of DSR, and we compare Tahoe, Reno and Sack TCP variants. Results show that multipath traffic dispersion impact on TCP throughput is bounded to a maximum of 25-35%, and that there is only a minimal dependence on the number of routes used, the number of consecutive packets sent on each route, the route selection algorithm or the TCP variant used.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"392 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131054899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment AmTRUE:多应用和多用户环境下的身份验证管理和基于可信角色的授权
S. Fugkeaw, P. Manpanpanich, S. Juntapremjitt
{"title":"AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment","authors":"S. Fugkeaw, P. Manpanpanich, S. Juntapremjitt","doi":"10.1109/SECUREWARE.2007.4385336","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385336","url":null,"abstract":"This paper proposes a hybrid model of an authentication technique and a role based access control (RBAC) based on X.509 public key certificate and attribute certificate. With attribute certificate the user role is bound to an identity of the public key certificate in which the permissions are assigned to the holder. A mapping model of RBAC authorization and authentication is presented. In addition, we also deal with the issue of system service disruption and recovery as well as an activity-based policy. With our proposed model, the full authentication, authorization, and accountability (AAA) are supported. We apply the multi agent system concept to facilitate the authentication and the authorization based on the PKI infrastructure. Finally, the project called AmTRUE (authentication management and trusted role-based authorization in multi-application and multi-user environment) has been developed to implement our research idea.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132045303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Route Investigation for Secure Routing in Mobile Ad-hoc Networks 移动Ad-hoc网络安全路由研究
Han-Shik Kim, Byung-Seok Kang, Sangheon Pack, C. Kang
{"title":"Route Investigation for Secure Routing in Mobile Ad-hoc Networks","authors":"Han-Shik Kim, Byung-Seok Kang, Sangheon Pack, C. Kang","doi":"10.1109/SECUREWARE.2007.4385328","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385328","url":null,"abstract":"Secure routing protocols in mobile ad-hoc networks (MANET) have been extensively studied in recent years. Most routing protocol, however, are based on authentication, cryptographic schemes, security association and key distribution and so on. In this paper, we propose an enhanced MANET routing protocol, which prevents security threats, especially by employing route investigation. When an intermediate node that is on a path between source and destination receives two types of control messages (RREP and RERR), the intermediate node sends them to the source in pure AODV. However, in our method, the node which receives the control messages confirms it using route investigation request (IREQ) and route investigation reply (IREP). Through this investigation procedure, we can gain reliability of path for transmitting data packets in MANET. Simulation results show considerable improvement in the packet delivery ratio and the end-to-end latency at the expense of the moderate increase of control message overhead.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132442327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Long-term storage and management of encrypted biomedical data in real scenarios 真实场景下加密生物医学数据的长期存储与管理
I. Blanquer, V. Hernández, J. D. S. Quilis, E. Torres
{"title":"Long-term storage and management of encrypted biomedical data in real scenarios","authors":"I. Blanquer, V. Hernández, J. D. S. Quilis, E. Torres","doi":"10.1109/SECUREWARE.2007.4385314","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385314","url":null,"abstract":"This paper emphasizes the development and application of technologies to effective guarantying the confidentiality and integrity of patient data in Grid-enabled biomedical applications. By strongly focusing on the interaction between security technologies and the human environment, this paper relates the experience of developing a model for the storage and management of encrypted medical data in the Grid. The ideas and concepts behind the proposed solution are briefly explained, as well as the components implementing the model in an OGSA compliant architecture. TRENCADIS, a project for managing DICOM structured reporting objects for use in a Valencian cyberinfrastructure for medical imaging in oncology (CVIMO), is currently adopting the architecture as a core component.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126345585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Proposal to Improve IKEv2 negotiation 改进IKEv2协商的建议
Lari Iso-Anttila, J. Ylinen, P. Loula
{"title":"A Proposal to Improve IKEv2 negotiation","authors":"Lari Iso-Anttila, J. Ylinen, P. Loula","doi":"10.1109/SECUREWARE.2007.4385329","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385329","url":null,"abstract":"IKEv2 is a new key exchange protocol in the IPsec network and IKEv2 includes a method to detect when it is under denial-of-service (DoS) attack. In case IKEv2 is not under DoS attack it can use initial exchange, but when IKEv2 is under DoS attack cookie negotiation may be used. Cookie negotiation adds an extra round trip to the initial exchange, and protection that is easy to pass by. The resistance to DoS attacks is actually weaker in IKEv2 than in JFK or full-SIGMA in different networks. This paper presents improved cookie negotiation to remedy this weakness. The proposed cookie negotiation delays the responder's calculation work to the last second and computational load is kept as low as possible.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122812628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SECUAREA: Security in physical and logical areas SECUAREA:物理和逻辑区域的安全
Lourdes López-Santidrián, Luis Redondo, José-Fernán Martínez, Manuel Ramiro, Vicente Hernández, Francisco A. B. Bonilla, Fermín Bretón
{"title":"SECUAREA: Security in physical and logical areas","authors":"Lourdes López-Santidrián, Luis Redondo, José-Fernán Martínez, Manuel Ramiro, Vicente Hernández, Francisco A. B. Bonilla, Fermín Bretón","doi":"10.1109/SECUREWARE.2007.4385317","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385317","url":null,"abstract":"Security is one of the major world wide concerns because of the terrorist attacks suffered in the last years. In fact, The European Commission has dedicated a Security specific programme within the 7th Framework Programme. New technologies bring about new capabilities and their use in conjunction with other technologies will provide us with brand new approaches to solve our actual security needs. Wireless sensor networks (WSN) are part of a new technology which is currently being researched and the first commercial solutions have started to appear. The capabilities of WSN can be easily foreseen as well as the wide range of possibilities of integrating sensor devices and actuators. On the other hand, RFID technology is becoming more and more extended in different applications. This paper shows the integration of WSN and RFID technologies to provide an integrated physical and logical security solution. The best of both technologies are put together into a unique solution directly applicable in those organizations which require high level of security.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122633487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of User-centric Identity Management Technologies 以用户为中心的身份管理技术综述
Tewfiq El Maliki, J. Seigneur
{"title":"A Survey of User-centric Identity Management Technologies","authors":"Tewfiq El Maliki, J. Seigneur","doi":"10.1109/SECUREWARE.2007.4385303","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385303","url":null,"abstract":"Computing anytime anywhere is more and more the rule. In this ambient intelligent world, the choice of identity mechanisms will have a large impact on its social, cultural, business and political aspects. Privacy is a human need and the whole of society would suffer from its demise. Moreover, people have a hectic life and cannot spend their time administering their digital identities. In this paper, we survey how the requirements for identity management have evolved, and their associated technologies, with emphasis on the federated approaches and user-centricity.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments 一种低成本的嵌入式IDS,用于监视和防止有线局域网环境中的中间人攻击
J. Belenguer, C. M. Calafate
{"title":"A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments","authors":"J. Belenguer, C. M. Calafate","doi":"10.1109/SECUREWARE.2007.4385321","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385321","url":null,"abstract":"A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and efficiently. Since our system is limited to a micro-controller and a network interface, it can be produced at a very low cost, which is attractive for large scale production and deployment.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121078737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信