{"title":"Dynamic environment evaluation for reliable AmI applications based on untrusted sensor","authors":"P. Malagón, J. C. Vallejo, Jose M. Moya","doi":"10.1109/SECUREWARE.2007.4385322","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385322","url":null,"abstract":"This paper evaluates the cost of encrypted communications for wireless sensor networks with tight resource constraints. We demonstrate that software encryption (3DES, AES, and Blowfish are evaluated) is not generally affordable, and therefore the whole system architecture should take into account that sensor data is not to be trusted. We propose a dynamic environment evaluation strategy for decision making in Ami applications, based on dynamic trusting levels of the sensor objects and documented decision chains.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"177 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131747231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Pejovic, Ivana Kovacevic, S. Bojanic, Corado Leita, Jelena Popovic, O. Nieto-Taladriz
{"title":"Migrating a HoneyDepot to Hardware","authors":"V. Pejovic, Ivana Kovacevic, S. Bojanic, Corado Leita, Jelena Popovic, O. Nieto-Taladriz","doi":"10.1109/SECUREWARE.2007.4385326","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385326","url":null,"abstract":"A honeypot apparatus, as a perspective security technology has proven itself worth deploying by various malicious records made. The next step in deploying the technology can be an independent hardware device with the incorporated honeypot behaviour. Such a solution would bring an ease in deployment together with a high throughput it would be able to support to the area of network auditing and monitoring. Initial investigation and implementation steps have been conducted. A flexible base for a honeypot platform intended to be implemented on a modern field programmable gate array device, as a potential destination technology, has been developed. Correspondent results with a relevant set of details are being presented together with future perspectives and further investigation and deployment potential. No similar attempts have been documented.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128164545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security made easy: Achieving user-friendly communication protection in ad-hoc situations","authors":"J. Heider, J. Schütte","doi":"10.1109/SECUREWARE.2007.4385324","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385324","url":null,"abstract":"Mobile applications dealing with ad-hoc situations do have their own challenges such as a reasonable short time for interaction and limitations of available technology. A secure yet user-friendly solution for protecting wireless communication therefore is a service enabler for mobile business. This paper discusses the drawbacks of existing security concepts and proposes a framework on application level to help developers improving user acceptance. Additionally, we present the evaluation results of the prototype which leverages the user's common spatial context by integrating him into the device authentication process.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129095340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Comprehensive View of Secure Software Engineering","authors":"Mehrez Essafi, L. L. Jilani, H. Ghézala","doi":"10.1109/SECUREWARE.2007.4385331","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385331","url":null,"abstract":"Secure software engineering is a big challenge. This is mainly due to the increasing complexity, openness and extensibility of modern applications, which make a complete analysis of security requirements very hard. The overall problem space is consequently no longer easily comprehensible for developers. This paper is an attempt to explore some of these issues underlying secure software engineering. We propose a secure software engineering framework, which suggests considering secure software engineering along four different, but complementary, views. Each view is capturing a particular relevant aspect of secure software engineering. Our motivations for developing this framework are to: (a) help understand and clarify the secure software engineering domain, (b) guide in classifying and comparing both secure software and securing approaches and (c) help researchers to identify new research axes.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation","authors":"N.A. Saleh, H. Boghdady, S. Shaheen, A. Darwish","doi":"10.1109/SECUREWARE.2007.4385311","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385311","url":null,"abstract":"Recently data embedding over images have drawn tremendous interest, using either lossy or lossless techniques. Although lossy techniques can allow large hiding capacity, host image cannot be recovered with high fidelity. The aim of this work is to increase the embedding capacity for color palletized images while maintaining good visual quality of the stego image. The new technique is named \"quasi-lossless \" because the image histogram has been slightly changed but still satisfies high PSNR threshold that kept the stego image visually unchanged. The quasi-lossless technique is based on histogram analysis where least repeated colors are identified and manipulated to increase the embedding capacity. The proposed technique reported an embedding capacity that reached up to 60% and an improvement of more than 25% compared with other lossless method.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127916641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services","authors":"Xiaomeng Su, D. Bolzoni, P. V. Eck","doi":"10.1109/SECUREWARE.2007.4385319","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385319","url":null,"abstract":"In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to explicitly link security requirements with the organization's business vision, i.e. to provide business rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements. Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance. We validate our approach by way of a focus group session.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123520199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}