The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)最新文献

筛选
英文 中文
Classification of Privacy Enhancing Technologies on Life-cycle of Information 基于信息生命周期的隐私增强技术分类
Yeonjung Kang, Hyangjin Lee, Kilsoo Chun, J. Song
{"title":"Classification of Privacy Enhancing Technologies on Life-cycle of Information","authors":"Yeonjung Kang, Hyangjin Lee, Kilsoo Chun, J. Song","doi":"10.1109/SECUREWARE.2007.4385312","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385312","url":null,"abstract":"Recently, studies on privacy enhancing technologies have been actively carried out, as the importance of enterprise information, as well as privacy information, is becoming increasingly emphasized. Several organizations and enterprises have been conducting researches sporadically on privacy information technology. However, concept of privacy enhancing technology is not defined yet and there is no particular technology but P3P so far. Therefore, this paper provide classification mythology of privacy enhancing technology based on privacy information life-cycle. Privacy enhancing technology are classified into 3 technologies, which are operation technology, common based technology and policy/management technology. This technological classification can be break down more specifically by privacy information life cycle.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Trustworthily Forwarding Sensor Networks Information to the Internet 可信地将传感器网络信息转发到互联网
O. Powell, J. Seigneur, L. Moraru
{"title":"Trustworthily Forwarding Sensor Networks Information to the Internet","authors":"O. Powell, J. Seigneur, L. Moraru","doi":"10.1109/SECUREWARE.2007.4385306","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385306","url":null,"abstract":"The Internet is soon going to be extended with the information collected from sensor networks deployed in wild remote regions of the world. For example, sensors may be dispersed in the jungle and forward information about the sensed states of the natural ecosystem, such as, humidity, fire detection... However, it is still quite easy for attackers to disconnect the sensors network from the Internet. For example, the sensors usually forward their messages to a base station, the Internet gateway, in a hop-by-hop fashion because they are resource-constrained in terms of energy, the spending of energy dramatically increases with the range of transmission and the attackers may capture intermediate sensors and drop messages rather than forwarding them. In this paper we study how computational trust can be used to mitigate the issue of sinkhole attacks and evaluate our approach on top of the MIX protocol.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121222285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Temporal Verification in Secure Group Communication System Design 安全组通信系统设计中的时间验证
Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes, T. Villemur
{"title":"Temporal Verification in Secure Group Communication System Design","authors":"Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes, T. Villemur","doi":"10.1109/SECUREWARE.2007.4385330","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385330","url":null,"abstract":"The paper discusses an experience in using a realtime UML/SysML profile and a formal verification toolkit to check a secure group communication system against temporal requirements. A generic framework is proposed and specialized for hierarchical groups.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125032720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Four security certification levels for IT Managers and Staff in the Public Sector 公共部门IT经理和员工的四个安全认证级别
S. Sosunovas, O. Vasilecas
{"title":"Four security certification levels for IT Managers and Staff in the Public Sector","authors":"S. Sosunovas, O. Vasilecas","doi":"10.1109/SECUREWARE.2007.4385302","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385302","url":null,"abstract":"The iSCAN (Improving Skills, Competencies, and Professional Qualifications in the area of Network Information Security for IT Managers and Staff in the Public Sector) project's main objective is to address the current and anticipated skills shortage in the ICT industry in Europe and promote the transferability and recognition of competences and qualifications in the IT security field in Europe by developing new standards and measures. To this end, iSCAN will develop a certification standard with a view to enhance skills and competencies in latest IT security issues of IT managers in public organizations.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions 一种基于小中心圆区域的快速弹性指纹匹配算法
Haiyong Chen, Hongwei Sun, K. Lam
{"title":"A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions","authors":"Haiyong Chen, Hongwei Sun, K. Lam","doi":"10.1109/SECUREWARE.2007.4385335","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385335","url":null,"abstract":"Reliably and fast matching fingerprints is still a challenging problem in a fingerprint verification system. This paper proposes a minutiae matching algorithm that uses minutiae-centered circular regions to help ensure the speed of matching and the robustness to non-linear distortion. In our method, a circular region is constructed around each minutia, which can be regarded as a secondary feature. Using the constructed regions, the proposed algorithm can find matched minutiae more rapidly via regional matching. Since each minutia's region is formed from only a small area of the fingerprint, our algorithm is more tolerant to non-linear distortion when compared to global matching approaches. On the other hand, the area of the constructed region is much larger than that of local neighborhood in local matching approaches, which means that circular region, including a larger subnet of minutiae, is more reliable and distinct feature. Experiment results show our algorithm 's good performance on processing speed and accuracy.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System 行为入侵检测系统偏差警报的评估
Jacques Saraydaryan, V. Legrand, S. Ubéda
{"title":"Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System","authors":"Jacques Saraydaryan, V. Legrand, S. Ubéda","doi":"10.1109/SECUREWARE.2007.4385320","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385320","url":null,"abstract":"The growth of behavioral intrusion detection solutions raises a new issue. The update of normal references is necessary and determines the flexibility and accuracy of the detection. This paper describes a decision block function used to update a behavioral intrusion detection method. Based on a risk analysis and support vector machines, our approach completes the behavioral anomaly detection using Bayesian modeling based on a global vision of the system approach.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats 基于行为的 DNS 安全的动机:与 DNS 相关的互联网威胁分类学
N. Chatzis
{"title":"Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats","authors":"N. Chatzis","doi":"10.1109/SECUREWARE.2007.4385307","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385307","url":null,"abstract":"The Domain Name System is the largest distributed system in operation today and a critical infrastructure component that can be regarded as one nervous system of the current Internet. Because of its critical role DNS is involved in manifold Internet attacks both against the system itself or other Internet hosts. This paper presents an exhaustive analysis of Internet threats involving the DNS classifying them in three categories: name server vulnerabilities, authenticity and integrity attacks, and consumption attacks. Attacks consuming Internet infrastructure resources are inadequately addressed today and from a network operator perspective they remain the major operational security issue. We show that many consumption attacks cause anomalies in DNS traffic, which implies that behaviour-based security on the name servers is a promising research area against this class of Internet attacks.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128367503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware 专用硬件为基于TCP/IP的信息交换安全增值
V. Pejovic, S. Bojanic, C. Carreras
{"title":"Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware","authors":"V. Pejovic, S. Bojanic, C. Carreras","doi":"10.1109/SECUREWARE.2007.4385325","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385325","url":null,"abstract":"Complexity of the attack space existent within the scope TCP/IP based communications makes the security problem extremely wide. Most of the transmitted data has to be processed on a daily basis by firewalls, IDSes and/or other security enforcing technologies. It is possible, however, to divide the complex security threat space and provide fast and efficient solutions to deal with some subspaces. This would reallocate the processing into specialised devices and would take some processing burden off the stated conventional technologies. A specialised hardware architecture capable of sustaining high throughput rates of up to 40 Gbps when implemented in an FPGA platform will serve as one such example. In its current development phase the hardware solution presented processes and verifies the TCP/IP specific reassembly mechanism. The misuse of the reassembly mechanism has historically led to different types of security breaches while new instances can arise unexpectedly. The presented work can be seen as a systemic solution for the monitoring of the misuse of the reassembly mechanism for preventive perspective.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131233399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Chaos-Based Cryptography: End of the Road? 基于混沌的密码学:路到头了吗?
Daniel Curiac, D. Iercan, O. Dranga, F. Dragan, O. Banias
{"title":"Chaos-Based Cryptography: End of the Road?","authors":"Daniel Curiac, D. Iercan, O. Dranga, F. Dragan, O. Banias","doi":"10.1109/SECUREWARE.2007.4385313","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385313","url":null,"abstract":"Chaos-based cryptography emerged in the early 1990s as an innovative application of nonlinear dynamics in the chaotic regime. Even if in theory chaotic dynamics was thought to evolve into a new revolution in cryptography, in real-life an efficient and reliable chaos-based cryptosystem didn't emerge. The main but not the only reason is the dynamic degradation of digital chaotic systems, a subject that became very popular in the last few years. This paper presents a new theoretical background related to this issue that proves the inefficiency of chaos-based encryption algorithms. Even more, in one of the two relevant case studies presented, another myth is demolished: the analog encryption base on synchronized chaos.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116277127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Formal Approach to prevent Attacks on Mobile Agent Systems 防止对移动代理系统的攻击的正式方法
M. Loulou, M. Tounsi, A. Kacem, M. Jmaiel
{"title":"A Formal Approach to prevent Attacks on Mobile Agent Systems","authors":"M. Loulou, M. Tounsi, A. Kacem, M. Jmaiel","doi":"10.1109/SECUREWARE.2007.4385308","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385308","url":null,"abstract":"One of the most important issues in mobile agent systems is the security aspect. For the purpose of ensuring security, we provide in this paper a formal model for secure mobile agent system. This model supports the specification of numerous security policy types which control the behaviour of system entities and protect them, as far as possible, from attacks that may occur. In order to verify whether a security policy could overcome a given kind of attack, we present a formal approach to this end. Thus, we propose a precise and formal representation of possible attacks that may occur in a mobile agent systems. According to this representation, we define a set of proved theorems which describe under what conditions a policy succeeds to prevent those attacks. The proposed specifications have been formalized using Z notation and checked using the Z-EVES tool.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115590329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信