M. Chowdhury, J. Gómez, Josef Noll, Á. García-Crespo
{"title":"SemID: Combining Semantics with Identity Management","authors":"M. Chowdhury, J. Gómez, Josef Noll, Á. García-Crespo","doi":"10.1109/SECUREWARE.2007.4385304","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385304","url":null,"abstract":"The need for information security and privacy in today's connected systems is overwhelming. In this paper, we focus on the identity management in corporate environment to access various project resources. Capabilities of semantic web technology facilitate the development of proposed SemID ontology that formally represents the identity management domain. It contains roles, policies and rules to control access to resources and to ensure privacy. A use case scenario of project oriented corporate working environment is introduced and then modeled using Protege ontology editor platform.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Identity Management Model for Digital Ecosystems","authors":"Hristo Koshutanski, Mihaela Ion, Luigi Telesca","doi":"10.1109/SECUREWARE.2007.4385323","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385323","url":null,"abstract":"Digital ecosystems is the new paradigm for dynamic IT business integration. A digital ecosystem consists of institutions that compete, collaborate, and form stable or unstable federations. Such a dynamic environment becomes a bottleneck for identity management solutions. Existing solutions are either too restricting and not flexible enough to support the dynamic nature of ecosystems or they are too complex and difficult to adopt by small and medium-size enterprises (SMEs). This paper presents an identity management model for automated processing of identity information between distributed ecosystem partners. The model emphasizes on its practical, clear and easy to deploy framework. The model is based on the new OASIS SAML standard to provide interoperability and convergence between existing identity technologies. The paper presents the basic and extended identity models for single services and service compositions. The aim of this research is to allow SMEs to use and enhance their current identity technology with a practical and easy to implement identity management solution that scales up to the dynamic and distributed nature of digital ecosystems.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129869741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating a New Reputation Algorithm With Consideration For Fairness","authors":"A. Wierzbicki","doi":"10.1109/SECUREWARE.2007.4385301","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385301","url":null,"abstract":"The fairness of reputation and trust management systems is rarely taken into account in their evaluation due to the prevalence of the paradigm of the Prisoner's Dilemma. Yet, considering fairness explicitly leads to a different design of reputation algorithms. This paper proves this claim by considering fairness in the design of a new reputation algorithm that uses the concept of implicit negative feedback: the interpretation of missing feedback as a semi-negative feedback. The use of fairness in the evaluation of the new algorithm shows the opportunities and threats of using implicit feedback.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems","authors":"Hédi Hamdi, A. Bouhoula, M. Mosbah","doi":"10.1109/SECUREWARE.2007.4385332","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385332","url":null,"abstract":"Policies, which are widely deployed in networking services (e.g., management, QoS, mobility, etc.), are a promising solution for securing wide distributed systems. However, the adoption of a policy-based approach for security requires an appropriate policy specification and enforcement tools. In fact, A long-standing problem in distributed systems security is how to specify and enforce correctly security policies. In this paper, we mainly focus on how to systematically specify correct policies instead of manually configuring them and how to automatically enforce security policies in distributed systems. A software engineering approach is presented to overcome these issues. This approach is based on design and developpement of a software architecture to automating definition and enforcing policies. I. Introduction","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128278131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust sensor self-initialization: Whispering to avoid intruders","authors":"Carlos Ribeiro","doi":"10.1109/SECUREWARE.2007.4385318","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385318","url":null,"abstract":"Wireless sensor networks (WSN) are becoming bigger and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solutions were already proposed for mobile ad-hoc networks but they either: i) do not scale well for WSM; ii) have no energy constraints; iii) have no security considerations; iv) or have no mechanisms to handle fusion of network partitions. We proposed a self-stabilizing address self-assignment protocol which: uses an improved version of a flood control mechanism to minimize the energy spent; and uses a technique named whispering to achieve robustness against malicious nodes.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134526907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Bankovic, S. Bojanic, O. Nieto-Taladriz, A. Badii
{"title":"Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms","authors":"Z. Bankovic, S. Bojanic, O. Nieto-Taladriz, A. Badii","doi":"10.1109/SECUREWARE.2007.4385309","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385309","url":null,"abstract":"An extensive set of machine learning and pattern classification techniques trained and tested on KDD dataset failed in detecting most of the user-to-root attacks. This paper aims to provide an approach for mitigating negative aspects of the mentioned dataset, which led to low detection rates. Genetic algorithm is employed to implement rules for detecting various types of attacks. Rules are formed of the features of the dataset identified as the most important ones for each attack type. In this way we introduce high level of generality and thus achieve high detection rates, but also gain high reduction of the system training time. Thenceforth we re-check the decision of the user-to- root rules with the rules that detect other types of attacks. In this way we decrease the false-positive rate. The model was verified on KDD 99, demonstrating higher detection rates than those reported by the state- of-the-art while maintaining low false-positive rate.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126138346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Scheme for Protecting the Information Leakage Via Portable Devices","authors":"Masaru Takesue","doi":"10.1109/SECUREWARE.2007.4385310","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385310","url":null,"abstract":"Information leakage from corporate computer systems is a big social problem in terms of the protection of corporate assets and customers' privacy. Digital assets are usually brought out of companies with the portable devices such as USB memory sticks, PDAs, and laptop PCs. This paper proposes a scheme that protects the information leakage via portable devices so that the access to sensitive files on a storage device attached to a computing device is allowed only when the latter is located inside the company and is connected to the company's network. To detect this, we use the IP addresses of the company and the computing device, but also a challenge-response authentication protocol to prevent such attacks that simulate the company's system to camouflage the computing device's location.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132501244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Preparation for User Profiling from Traffic Log","authors":"Marek Kumpost","doi":"10.1109/SECUREWARE.2007.4385316","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385316","url":null,"abstract":"This paper presents our current work on traffic log processing. Our goal is to find an approach to modeling user behaviour based on their behavioural patterns. Since the amount of input data we have is really large, effective preprocessing is crucial for the profiling to provide significant results. This paper presents our approach to restricting the input data with respect to its relevance. We use histogram clustering to identify sets of users with similar frequencies of communication; entropy and TF-IDF (term frequency - inverse document frequency) help to select destinations that are relevant for a given set of users. The main profiling is done with preprocessed data and our experiments show that this approach to restricting the input has a positive impact on the significance of results.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses","authors":"Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero","doi":"10.1109/SECUREWARE.2007.4385327","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385327","url":null,"abstract":"One of the main problems when configuring ad-hoc networks is that with these networks don't have a central server with all the information of the network. If a new user wants to form part of a network must configure his device firstly. On the one hand, in this article we make an analysis of the different proposals for the configuration of ad-hoc networks presented on the bibliography consulted. On the other hand, we propose a distributed protocol to network data configuration based on the use of diffusion tools (multicast/broadcast) and where the user's intervention isn 't necessary. The protocol proposed focus on IPv4 link-local addresses configuration to let the creation of MANETs (Mobile Ad hoc Networks). What's more, this protocol will be able to be also used to make both IPv6 link-local addresses configuration and other needed ad hoc networks parameters configuration.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129137808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantically supported Authentication and Privacy in Social Networks","authors":"Josef Noll, M. Chowdhury, G. Kalman, J. Gómez","doi":"10.1109/SECUREWARE.2007.4385315","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385315","url":null,"abstract":"Service access in a ubiquitous computing and pervasive Internet environment has reached a new dimension. It is not longer a question of enabling services for customers, but to design a convenient and trusted service usage. While semantic services open for a description of user preferences, profiles and social groups, privacy handling is not addressed so far. Social communities based on friend of a friend (foaf) principles, Linkedln, or Facebook are open for all registered users, thus data about yourself are spread all-around. This paper presents an architecture to enable social networks to enable privacy, based on the identity of the user. Focus is on the semantic description of user's role in social networks and on securing the access through appropriate authentication mechanisms. Depending on the security requirements of the user, Internet trust mechanisms or mobile-based key exchange mechanisms can be applied. The user-centric approach will enable the user to select an identity provider for the trusted management. A prototype using semantically defined social relationships demonstrates the capabilities of the suggested approach.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"33 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124542914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}