The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)最新文献

筛选
英文 中文
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor 基于不可信传感器的可靠AmI应用动态环境评估
P. Malagón, J. C. Vallejo, Jose M. Moya
{"title":"Dynamic environment evaluation for reliable AmI applications based on untrusted sensor","authors":"P. Malagón, J. C. Vallejo, Jose M. Moya","doi":"10.1109/SECUREWARE.2007.4385322","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385322","url":null,"abstract":"This paper evaluates the cost of encrypted communications for wireless sensor networks with tight resource constraints. We demonstrate that software encryption (3DES, AES, and Blowfish are evaluated) is not generally affordable, and therefore the whole system architecture should take into account that sensor data is not to be trusted. We propose a dynamic environment evaluation strategy for decision making in Ami applications, based on dynamic trusting levels of the sensor objects and documented decision chains.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"177 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131747231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Migrating a HoneyDepot to Hardware 将HoneyDepot迁移到硬件
V. Pejovic, Ivana Kovacevic, S. Bojanic, Corado Leita, Jelena Popovic, O. Nieto-Taladriz
{"title":"Migrating a HoneyDepot to Hardware","authors":"V. Pejovic, Ivana Kovacevic, S. Bojanic, Corado Leita, Jelena Popovic, O. Nieto-Taladriz","doi":"10.1109/SECUREWARE.2007.4385326","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385326","url":null,"abstract":"A honeypot apparatus, as a perspective security technology has proven itself worth deploying by various malicious records made. The next step in deploying the technology can be an independent hardware device with the incorporated honeypot behaviour. Such a solution would bring an ease in deployment together with a high throughput it would be able to support to the area of network auditing and monitoring. Initial investigation and implementation steps have been conducted. A flexible base for a honeypot platform intended to be implemented on a modern field programmable gate array device, as a potential destination technology, has been developed. Correspondent results with a relevant set of details are being presented together with future perspectives and further investigation and deployment potential. No similar attempts have been documented.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128164545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security made easy: Achieving user-friendly communication protection in ad-hoc situations 安全变得简单:在临时情况下实现用户友好的通信保护
J. Heider, J. Schütte
{"title":"Security made easy: Achieving user-friendly communication protection in ad-hoc situations","authors":"J. Heider, J. Schütte","doi":"10.1109/SECUREWARE.2007.4385324","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385324","url":null,"abstract":"Mobile applications dealing with ad-hoc situations do have their own challenges such as a reasonable short time for interaction and limitations of available technology. A secure yet user-friendly solution for protecting wireless communication therefore is a service enabler for mobile business. This paper discusses the drawbacks of existing security concepts and proposes a framework on application level to help developers improving user acceptance. Additionally, we present the evaluation results of the prototype which leverages the user's common spatial context by integrating him into the device authentication process.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129095340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Comprehensive View of Secure Software Engineering 对安全软件工程的综合看法
Mehrez Essafi, L. L. Jilani, H. Ghézala
{"title":"Towards a Comprehensive View of Secure Software Engineering","authors":"Mehrez Essafi, L. L. Jilani, H. Ghézala","doi":"10.1109/SECUREWARE.2007.4385331","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385331","url":null,"abstract":"Secure software engineering is a big challenge. This is mainly due to the increasing complexity, openness and extensibility of modern applications, which make a complete analysis of security requirements very hard. The overall problem space is consequently no longer easily comprehensible for developers. This paper is an attempt to explore some of these issues underlying secure software engineering. We propose a secure software engineering framework, which suggests considering secure software engineering along four different, but complementary, views. Each view is capturing a particular relevant aspect of secure software engineering. Our motivations for developing this framework are to: (a) help understand and clarify the secure software engineering domain, (b) guide in classifying and comparing both secure software and securing approaches and (c) help researchers to identify new research axes.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation 基于欧氏距离计算的准无损数据嵌入技术
N.A. Saleh, H. Boghdady, S. Shaheen, A. Darwish
{"title":"A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation","authors":"N.A. Saleh, H. Boghdady, S. Shaheen, A. Darwish","doi":"10.1109/SECUREWARE.2007.4385311","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385311","url":null,"abstract":"Recently data embedding over images have drawn tremendous interest, using either lossy or lossless techniques. Although lossy techniques can allow large hiding capacity, host image cannot be recovered with high fidelity. The aim of this work is to increase the embedding capacity for color palletized images while maintaining good visual quality of the stego image. The new technique is named \"quasi-lossless \" because the image histogram has been slightly changed but still satisfies high PSNR threshold that kept the stego image visually unchanged. The quasi-lossless technique is based on histogram analysis where least repeated colors are identified and manipulated to increase the embedding capacity. The proposed technique reported an embedding capacity that reached up to 60% and an improvement of more than 25% compared with other lossless method.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127916641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services 了解和指定资讯保安需要,以支援提供高质素的保安服务
Xiaomeng Su, D. Bolzoni, P. V. Eck
{"title":"Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services","authors":"Xiaomeng Su, D. Bolzoni, P. V. Eck","doi":"10.1109/SECUREWARE.2007.4385319","DOIUrl":"https://doi.org/10.1109/SECUREWARE.2007.4385319","url":null,"abstract":"In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to explicitly link security requirements with the organization's business vision, i.e. to provide business rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements. Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance. We validate our approach by way of a focus group session.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123520199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信