The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)最新文献

筛选
英文 中文
SemID: Combining Semantics with Identity Management SemID:结合语义和身份管理
M. Chowdhury, J. Gómez, Josef Noll, Á. García-Crespo
{"title":"SemID: Combining Semantics with Identity Management","authors":"M. Chowdhury, J. Gómez, Josef Noll, Á. García-Crespo","doi":"10.1109/SECUREWARE.2007.4385304","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385304","url":null,"abstract":"The need for information security and privacy in today's connected systems is overwhelming. In this paper, we focus on the identity management in corporate environment to access various project resources. Capabilities of semantic web technology facilitate the development of proposed SemID ontology that formally represents the identity management domain. It contains roles, policies and rules to control access to resources and to ensure privacy. A use case scenario of project oriented corporate working environment is introduced and then modeled using Protege ontology editor platform.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Identity Management Model for Digital Ecosystems 数字生态系统的分布式身份管理模型
Hristo Koshutanski, Mihaela Ion, Luigi Telesca
{"title":"Distributed Identity Management Model for Digital Ecosystems","authors":"Hristo Koshutanski, Mihaela Ion, Luigi Telesca","doi":"10.1109/SECUREWARE.2007.4385323","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385323","url":null,"abstract":"Digital ecosystems is the new paradigm for dynamic IT business integration. A digital ecosystem consists of institutions that compete, collaborate, and form stable or unstable federations. Such a dynamic environment becomes a bottleneck for identity management solutions. Existing solutions are either too restricting and not flexible enough to support the dynamic nature of ecosystems or they are too complex and difficult to adopt by small and medium-size enterprises (SMEs). This paper presents an identity management model for automated processing of identity information between distributed ecosystem partners. The model emphasizes on its practical, clear and easy to deploy framework. The model is based on the new OASIS SAML standard to provide interoperability and convergence between existing identity technologies. The paper presents the basic and extended identity models for single services and service compositions. The aim of this research is to allow SMEs to use and enhance their current identity technology with a practical and easy to implement identity management solution that scales up to the dynamic and distributed nature of digital ecosystems.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129869741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Evaluating a New Reputation Algorithm With Consideration For Fairness 考虑公平性的新信誉算法评价
A. Wierzbicki
{"title":"Evaluating a New Reputation Algorithm With Consideration For Fairness","authors":"A. Wierzbicki","doi":"10.1109/SECUREWARE.2007.4385301","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385301","url":null,"abstract":"The fairness of reputation and trust management systems is rarely taken into account in their evaluation due to the prevalence of the paradigm of the Prisoner's Dilemma. Yet, considering fairness explicitly leads to a different design of reputation algorithms. This paper proves this claim by considering fairness in the design of a new reputation algorithm that uses the concept of implicit negative feedback: the interpretation of missing feedback as a semi-negative feedback. The use of fairness in the evaluation of the new algorithm shows the opportunities and threats of using implicit feedback.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems 分布式系统中自动安全策略实施的软件体系结构
Hédi Hamdi, A. Bouhoula, M. Mosbah
{"title":"A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems","authors":"Hédi Hamdi, A. Bouhoula, M. Mosbah","doi":"10.1109/SECUREWARE.2007.4385332","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385332","url":null,"abstract":"Policies, which are widely deployed in networking services (e.g., management, QoS, mobility, etc.), are a promising solution for securing wide distributed systems. However, the adoption of a policy-based approach for security requires an appropriate policy specification and enforcement tools. In fact, A long-standing problem in distributed systems security is how to specify and enforce correctly security policies. In this paper, we mainly focus on how to systematically specify correct policies instead of manually configuring them and how to automatically enforce security policies in distributed systems. A software engineering approach is presented to overcome these issues. This approach is based on design and developpement of a software architecture to automating definition and enforcing policies. I. Introduction","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128278131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust sensor self-initialization: Whispering to avoid intruders 鲁棒传感器自初始化:低语以避免入侵者
Carlos Ribeiro
{"title":"Robust sensor self-initialization: Whispering to avoid intruders","authors":"Carlos Ribeiro","doi":"10.1109/SECUREWARE.2007.4385318","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385318","url":null,"abstract":"Wireless sensor networks (WSN) are becoming bigger and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solutions were already proposed for mobile ad-hoc networks but they either: i) do not scale well for WSM; ii) have no energy constraints; iii) have no security considerations; iv) or have no mechanisms to handle fusion of network partitions. We proposed a self-stabilizing address self-assignment protocol which: uses an improved version of a flood control mechanism to minimize the energy spent; and uses a technique named whispering to achieve robustness against malicious nodes.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134526907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms 利用遗传算法提高用户对根攻击的检出率
Z. Bankovic, S. Bojanic, O. Nieto-Taladriz, A. Badii
{"title":"Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms","authors":"Z. Bankovic, S. Bojanic, O. Nieto-Taladriz, A. Badii","doi":"10.1109/SECUREWARE.2007.4385309","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385309","url":null,"abstract":"An extensive set of machine learning and pattern classification techniques trained and tested on KDD dataset failed in detecting most of the user-to-root attacks. This paper aims to provide an approach for mitigating negative aspects of the mentioned dataset, which led to low detection rates. Genetic algorithm is employed to implement rules for detecting various types of attacks. Rules are formed of the features of the dataset identified as the most important ones for each attack type. In this way we introduce high level of generality and thus achieve high detection rates, but also gain high reduction of the system training time. Thenceforth we re-check the decision of the user-to- root rules with the rules that detect other types of attacks. In this way we decrease the false-positive rate. The model was verified on KDD 99, demonstrating higher detection rates than those reported by the state- of-the-art while maintaining low false-positive rate.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126138346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Scheme for Protecting the Information Leakage Via Portable Devices 一种保护移动设备信息泄漏的方案
Masaru Takesue
{"title":"A Scheme for Protecting the Information Leakage Via Portable Devices","authors":"Masaru Takesue","doi":"10.1109/SECUREWARE.2007.4385310","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385310","url":null,"abstract":"Information leakage from corporate computer systems is a big social problem in terms of the protection of corporate assets and customers' privacy. Digital assets are usually brought out of companies with the portable devices such as USB memory sticks, PDAs, and laptop PCs. This paper proposes a scheme that protects the information leakage via portable devices so that the access to sensitive files on a storage device attached to a computing device is allowed only when the latter is located inside the company and is connected to the company's network. To detect this, we use the IP addresses of the company and the computing device, but also a challenge-response authentication protocol to prevent such attacks that simulate the company's system to camouflage the computing device's location.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132501244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data Preparation for User Profiling from Traffic Log 根据流量日志进行用户分析的数据准备
Marek Kumpost
{"title":"Data Preparation for User Profiling from Traffic Log","authors":"Marek Kumpost","doi":"10.1109/SECUREWARE.2007.4385316","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385316","url":null,"abstract":"This paper presents our current work on traffic log processing. Our goal is to find an approach to modeling user behaviour based on their behavioural patterns. Since the amount of input data we have is really large, effective preprocessing is crucial for the profiling to provide significant results. This paper presents our approach to restricting the input data with respect to its relevance. We use histogram clustering to identify sets of users with similar frequencies of communication; entropy and TF-IDF (term frequency - inverse document frequency) help to select destinations that are relevant for a given set of users. The main profiling is done with preprocessed data and our experiments show that this approach to restricting the input has a positive impact on the significance of results.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses Ad-Hoc网络的自动配置:建立唯一的IP Link-Local地址
Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero
{"title":"Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses","authors":"Raquel Lacuesta Gilaberte, Lourdes Peñalver Herrero","doi":"10.1109/SECUREWARE.2007.4385327","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385327","url":null,"abstract":"One of the main problems when configuring ad-hoc networks is that with these networks don't have a central server with all the information of the network. If a new user wants to form part of a network must configure his device firstly. On the one hand, in this article we make an analysis of the different proposals for the configuration of ad-hoc networks presented on the bibliography consulted. On the other hand, we propose a distributed protocol to network data configuration based on the use of diffusion tools (multicast/broadcast) and where the user's intervention isn 't necessary. The protocol proposed focus on IPv4 link-local addresses configuration to let the creation of MANETs (Mobile Ad hoc Networks). What's more, this protocol will be able to be also used to make both IPv6 link-local addresses configuration and other needed ad hoc networks parameters configuration.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129137808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Semantically supported Authentication and Privacy in Social Networks 社交网络中语义支持的身份验证和隐私
Josef Noll, M. Chowdhury, G. Kalman, J. Gómez
{"title":"Semantically supported Authentication and Privacy in Social Networks","authors":"Josef Noll, M. Chowdhury, G. Kalman, J. Gómez","doi":"10.1109/SECUREWARE.2007.4385315","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385315","url":null,"abstract":"Service access in a ubiquitous computing and pervasive Internet environment has reached a new dimension. It is not longer a question of enabling services for customers, but to design a convenient and trusted service usage. While semantic services open for a description of user preferences, profiles and social groups, privacy handling is not addressed so far. Social communities based on friend of a friend (foaf) principles, Linkedln, or Facebook are open for all registered users, thus data about yourself are spread all-around. This paper presents an architecture to enable social networks to enable privacy, based on the identity of the user. Focus is on the semantic description of user's role in social networks and on securing the access through appropriate authentication mechanisms. Depending on the security requirements of the user, Internet trust mechanisms or mobile-based key exchange mechanisms can be applied. The user-centric approach will enable the user to select an identity provider for the trusted management. A prototype using semantically defined social relationships demonstrates the capabilities of the suggested approach.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"33 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124542914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信