C. AmirK., H. Forsgren, Kaj Grahn, T. Karvi, G. Pulkkis
{"title":"Security and Trust of Public Key Cryptography for HIP and HIP Multicast","authors":"C. AmirK., H. Forsgren, Kaj Grahn, T. Karvi, G. Pulkkis","doi":"10.4018/jdtis.2011070102","DOIUrl":"https://doi.org/10.4018/jdtis.2011070102","url":null,"abstract":"Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified. Security and Trust of Public Key Cryptography for HIP and HIP Multicast","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126020640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data","authors":"Utpal Bose","doi":"10.4018/jdtis.2011070104","DOIUrl":"https://doi.org/10.4018/jdtis.2011070104","url":null,"abstract":"Rapid transformation in marketing information technologies has enabled corporations to build ample consumer databases and analyze those using sophisticated data-mining techniques to obtain extensive knowledge about those consumers’ personal life styles and private matters. Considering that the United States Federal Trade Commission (FTC) has relied on fair information principles to guide privacy regulation and left it relatively unregulated, the burden of practicing consumer privacy lies mostly on the marketers who have to follow ethical behavior and maintain consumer privacy. In this paper the authors analyze the ethical nature of corporate decision making on matters of selling consumer data using the normative theories of business ethics and suggests approaches that balance the corporate goals of raising financial gains with the obligations they have to their stakeholders – mainly their customers. The authors also discuss the challenges faced in carrying out the analysis. Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130979638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Information Security Controls in Organizations by Grey Relational Analysis","authors":"A. R. Otero, A. Ejnioui, C. Otero, G. Tejay","doi":"10.4018/JDTIS.2011070103","DOIUrl":"https://doi.org/10.4018/JDTIS.2011070103","url":null,"abstract":"In an era where dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by is becoming critical. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation and prioritization of information security controls in organizations. Research efforts have resulted in various methodologies developed to deal with the ISC assessment problem. A closer look at these traditional methodologies highlights various weaknesses that can prevent effective assessments of information security controls in organizations. This research proposes a novel approach using Grey Relational Analysis to quantify the importance of each information security control taking into account organizations’ goals and objectives. Through a case study, the approach is proven successful in providing a way for measuring the quality of information security controls based on multiple application-specific criteria.","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127741127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective","authors":"Charlie C. Chen","doi":"10.4018/jdtis.2011070101","DOIUrl":"https://doi.org/10.4018/jdtis.2011070101","url":null,"abstract":"Case-based pedagogy has evolved as an important tool for enhancing students’ analytical thinking and problem solving skills, as well as fostering the ability to make decisions under conditions of uncertainty. Due to the rapid development of technologies that allow collaboration and interaction despite geographic and temporal distances, educators are investigating the viability of emerging technologies such as cloud computing as platforms for case-based pedagogical techniques. This paper utilizes information systems (IS) success theory as the foundation of a study to examine case-based pedagogy in a cloud-computing environment. A three-week field experiment followed by a post-test survey is conducted in order to validate hypothesized relationships among cloud computing information quality, cloud computing system quality, cloud computing use, performance expectation in case-based pedagogy, and cloud computing critical mass. Results suggest that information quality has significant influence on not only use of cloud computing for case-based pedagogy, but also increases performance expectation and leads to critical mass. The findings of this study suggest that cloud computing is a viable platform for case-based pedagogy. Cloud Computing in CaseBased Pedagogy: An Information Systems Success Perspective","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Trusted Computing Based on MTM","authors":"Jan-Erik Ekberg","doi":"10.4018/jdtis.2010100102","DOIUrl":"https://doi.org/10.4018/jdtis.2010100102","url":null,"abstract":"Trusted computing (TC) denotes a set of security-related hardware and software mechanisms that make a computing device work in a consistent manner, even in the presence of external attacks. For personal computers, TC typically is interpreted to be a software architecture designed around the trusted platform module (TPM), a hardware chip residing on the motherboard and implemented according to the specifications of the Trusted Computing Group (Trusted Computing Group, 2008A). In embedded devices, the state-of-the art in terms of hardware security and operating systems is significantly different from what is present on personal computers. So to stimulate the take-up of TCG technology on handsets as well, the recently approved mobile trusted module (MTM) specification (Trusted Computing Group, 2008B) defines new interfaces and adaptation options that match the requirements of the handset business ecosystem, as well as the hardware in use in the embedded domain. This chapter provides an overview of a few hardware security architectures (in handsets) to introduce the reader to the problem domain. The main focus of the text is in introducing the MTM specification – by first presenting its main functional concepts, and then by adapting it to one of the hardware architectures first described, essentially presenting a plausible practical deployment. The author also presents a brief security analysis of the MTM component, and a few novel ideas regarding how the (mobile) trusted module can be extended, and be made more versatile.","PeriodicalId":298071,"journal":{"name":"Int. J. Dependable Trust. Inf. Syst.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121415173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}