2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications最新文献

筛选
英文 中文
Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems 冲突问题的隐私保护访问控制策略和算法
Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, J. Yang
{"title":"Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems","authors":"Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, J. Yang","doi":"10.1109/TrustCom.2011.34","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.34","url":null,"abstract":"This paper proposes a framework for privacy preserving access control policies and mechanisms, and describes algorithms for access policy conflicting problems. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is purpose involved access control models (PAC) that provide full support for expressing highly complex privacy-related policies, taking into account features like purposes, conditions and obligations. Policy conflicting problems may arise when new access policies are generated that are possible to be conflicted to existing policies. As a result of the policy conflicts, private information cannot be well protected. The structure of access control policy including conditions and obligations is studied. Based on the access policy, authorization models and policy operations are analysed. Finally comparisons to related works EPAL are presented.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121612010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications 数据密集型应用中基于lirs的副本替换策略
Wei Liu, Feiyan Shi, Wei Du
{"title":"An LIRS-Based Replica Replacement Strategy for Data-Intensive Applications","authors":"Wei Liu, Feiyan Shi, Wei Du","doi":"10.1109/TrustCom.2011.188","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.188","url":null,"abstract":"Data Replication, creating identical copies of data on different sites geographically, is one of the effective optimization techniques for reducing data access costs and improving load balance among sites in data-intensive computing. However, due to the limitation of storage capacity of each site, an efficient replica replacement can make a significant difference in the performance and efficiency of replication technologies. In this paper, for the inability of LRU to cope with access patterns with weak locality, a novel replacement strategy called Low Inter-reference Recency Set (LIRS) was applied into replica replacement during data replication. And then, OptorSim was extended, and LIRS replica replacement algorithm was implemented. Finally, LIRS replacement strategy was comprehensively compared with other algorithms including LRU, MRU LFU and MFU by use of different scheduling algorithms and file access patterns, and the results show that LIRS replacement algorithm can improve the performance of the data access, especially under access pattern with weak locality.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks 传粉:无人值守无线传感器网络的数据认证方案
T. Dimitriou, Ahmad Sabouri
{"title":"Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks","authors":"T. Dimitriou, Ahmad Sabouri","doi":"10.1109/TrustCom.2011.53","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.53","url":null,"abstract":"An Unattended Wireless Sensor Network (UWSN) is a recently introduced type of sensor network in which real-time data delivery of information is replaced by periodic, offline collection of the sensed data. In this work we focus on UWSNs operating in a hostile environment where the goal of an attacker is to prevent targeted data from ever reaching the sink. More precisely, we study the Data Authentication problem in the presence of a Mobile Adversary who is aiming to target a sensor's data and modify it without being detected. Inspired by the pollination process in nature, we propose two schemes that diffuse data footprints in the network using message carrying \"butterflies\". These schemes greatly increase the robustness of the network against data modification attempts by the mobile adversary. Extensive analytical and experimental results confirm the superiority of both Pollination and Pollination Light over previous protocols in terms of both security and communication overhead.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131114761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
CNSSA: A Comprehensive Network Security Situation Awareness System CNSSA:综合网络安全态势感知系统
Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang
{"title":"CNSSA: A Comprehensive Network Security Situation Awareness System","authors":"Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang","doi":"10.1109/TrustCom.2011.62","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.62","url":null,"abstract":"With tremendous attacks in the Internet, there is a high demand for network analysts to know about the situations of network security effectively. Traditional network security tools lack the capability of analyzing and assessing network security situations comprehensively. In this paper, we introduce a novel network situation awareness tool - CNSSA (Comprehensive Network Security Situation Awareness) - to perceive network security situations comprehensively. Based on the fusion of network information, CNSSA makes a quantitative assessment on the situations of network security. It visualizes the situations of network security in its multiple and various views, so that network analysts can know about the situations of network security easily and comprehensively. The case studies demonstrate how CNSSA can be deployed into a real network and how CNSSA can effectively comprehend the situation changes of network security in real time.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131288197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing 攻击向量分析与隐私保护社交网络数据发布
Mohd Izuan Hafez Ninggal, J. Abawajy
{"title":"Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing","authors":"Mohd Izuan Hafez Ninggal, J. Abawajy","doi":"10.1109/TrustCom.2011.113","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.113","url":null,"abstract":"This paper addresses the problem of privacy-preserving data publishing for social network. Research on protecting the privacy of individuals and the confidentiality of data in social network has recently been receiving increasing attention. Privacy is an important issue when one wants to make use of data that involves individuals' sensitive information, especially in a time when data collection is becoming easier and sophisticated data mining techniques are becoming more efficient. In this paper, we discuss various privacy attack vectors on social networks. We present algorithms that sanitize data to make it safe for release while preserving useful information, and discuss ways of analyzing the sanitized data. This study provides a summary of the current state-of-the-art, based on which we expect to see advances in social networks data publishing for years to come.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Study and Practice on Teaching Team Construction of Computer Specialties in Private Undergraduate Universities and Colleges 民办本科院校计算机专业教学队伍建设的研究与实践
Chaoxiang Chen, Shiping Ye, Binbin Zhou, Guoyong Dai
{"title":"Study and Practice on Teaching Team Construction of Computer Specialties in Private Undergraduate Universities and Colleges","authors":"Chaoxiang Chen, Shiping Ye, Binbin Zhou, Guoyong Dai","doi":"10.1109/TrustCom.2011.179","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.179","url":null,"abstract":"This paper analyzes the characteristics of computer-related specialties education in private undergraduate universities and colleges (PUUCs), such as weak foundation of students, high student/faculty ratio and strong employment intentions of students. We propose the necessities of teaching team construction for computer specialties and target orientation of the team. We also describe the construction thoughts and measures from different aspects, e.g. setting levels, team members, leaders' selection, organization management. A team performance centered evaluation and incentive mechanism is proposed. The construction model is proved to be effectiveness through a case of a successful teaching team construction on computer software curriculum cluster in Zhejiang Shuren University.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115403525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Parallel Data Cube Construction Based on an Extendible Multidimensional Array 基于可扩展多维数组的并行数据立方体构造
Dong Jin, T. Tsuji
{"title":"Parallel Data Cube Construction Based on an Extendible Multidimensional Array","authors":"Dong Jin, T. Tsuji","doi":"10.1109/TrustCom.2011.155","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.155","url":null,"abstract":"The pre-computation of data cubes is critical for improving the response time of OLAP(On-Line Analytical Processing) systems. In order to meet the need for improved performance created by growing data sizes, parallel solutions for data cube construction are becoming increasingly important. This paper presents two parallel methods for data cube construction based on an extendible multidimensional array, which is dynamically extendible along any dimension without relocating any existing data. We have implemented and evaluated our core-based parallel data cube construction methods on shared-memory multiprocessors. Given the performance limit, the methods achieve close to linear speedup with load balance. Our experiments also indicate that our parallel methods can be more scalable on higher dimensional data cube construction.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115617107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Crisis Due to Crisis Response on the Web 网络危机应对带来的隐私危机
Shao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen
{"title":"Privacy Crisis Due to Crisis Response on the Web","authors":"Shao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen","doi":"10.1109/TrustCom.2011.28","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.28","url":null,"abstract":"In recent disasters, the web has served as a medium of communication among disaster response teams, survivors, local citizens, curious onlookers, and zealous people who are willing to assist victims affected by disasters. To encourage and speed up information dissemination, the availability and convenience of use are normally the top concerns in designing disaster response web services, where a design of free-formed inputs without access control is commonly adopted. However, such design may result in personal information disclosure and privacy leakage. In this paper, using a case study of a real-life disaster response service, the MKER (Morakot Event Reporting) forum, we show that the disclosure of personal information and the resulting privacy disclosure is indeed a serious problem that is currently happening. In our case, we have successfully mapped 1,438 unique cell phone numbers and 1,383 unique addresses to individuals using an automated method, not to mention the much greater invasion of privacy that could be effected by manual analysis of the messages posted on the forum. To resolve this issue, we propose several means to mitigate and prevent the mentioned privacy leakage on disaster response services from being happened.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses 平衡安全与性能,增强数据仓库的数据隐私
R. Santos, Jorge Bernardino, M. Vieira
{"title":"Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses","authors":"R. Santos, Jorge Bernardino, M. Vieira","doi":"10.1109/TrustCom.2011.33","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.33","url":null,"abstract":"Data Warehouses (DWs) store the golden nuggets of the business, which makes them an appealing target. To ensure data privacy, encryption solutions have been used and proven efficient in their security purpose. However, they introduce massive storage space and performance overheads, making them unfeasible for DWs. We propose a data masking technique for protecting sensitive business data in DWs that balances security strength with database performance, using a formula based on the mathematical modular operator. Our solution manages apparent randomness and distribution of the masked values, while introducing small storage space and query execution time overheads. It also enables a false data injection method for misleading attackers and increasing the overall security strength. It can be easily implemented in any DataBase Management System (DBMS) and transparently used, without changes to application source code. Experimental evaluations using a real-world DW and TPC-H decision support benchmark implemented in leading commercial DBMS Oracle 11g and Microsoft SQL Server 2008 demonstrate its overall effectiveness. Results show substantial savings of its implementation costs when compared with state of the art data privacy solutions provided by those DBMS and that it outperforms those solutions in both data querying and insertion of new data.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114340803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Towards a Holistic Privacy Engineering Approach for Smart Grid Systems 面向智能电网系统的整体隐私工程方法
H. S. Fhom, K. Bayarou
{"title":"Towards a Holistic Privacy Engineering Approach for Smart Grid Systems","authors":"H. S. Fhom, K. Bayarou","doi":"10.1109/TrustCom.2011.32","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.32","url":null,"abstract":"Protecting energy consumers's data and privacy is a key factor for the further adoption and diffusion of smart grid technologies and applications. However, current smart grid initiatives and implementations around the globe tend to either focus on the need for technical security to the detriment of privacy or consider privacy as a feature to add after system design. This paper aims to contribute towards filling the gap between this fact and the accepted wisdom that privacy concerns should be addressed as early as possible (preferably when modeling system's requirements). We present a methodological framework for tackling privacy concerns throughout all phases of the smart grid system development process. We describe methods and guiding principles to help smart grid engineers to elicit and analyze privacy threats and requirements from the outset of the system development, and derive the best suitable countermeasures, i.e. privacy enhancing technologies (PETs), accordingly. The paper also provides a summary of modern PETs, and discusses their context of use and contributions with respect to the underlying privacy engineering challenges and the smart grid setting being considered.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114632447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信