2013 IEEE Conference on Communications and Network Security (CNS)最新文献

筛选
英文 中文
Secure Zones: An Attribute-Based Encryption advisory system for safe firearms 安全区域:一种基于属性的安全枪支加密咨询系统
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2015-04-27 DOI: 10.1109/CNS.2013.6682746
M. Portnoi, Chien-Chung Shen
{"title":"Secure Zones: An Attribute-Based Encryption advisory system for safe firearms","authors":"M. Portnoi, Chien-Chung Shen","doi":"10.1109/CNS.2013.6682746","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682746","url":null,"abstract":"This work presents an application of the highly expressive Attribute-Based Encryption to implement Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the user and the firearm are received by embedded hardware in the firearms, which then advises the user about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and user attributes, and providing privacy and security through it cryptography. We describe a holistic approach to evolving the firearm to a cyber-physical system to aid in augmenting safety. We introduce a conceptual model for a firearm equipped with sensors and a context-aware software agent. Based on the information from the sensors, the agent can access the context and inform the user of potential unsafe operations. To support Secure Zones and the cyber-physical firearm model, we propose a Key Infrastructure Scheme for key generation, distribution, and management, and a Context-Aware Software Agent Framework for Firearms.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134099473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beacons 使用基于属性的加密和蓝牙信标的位置感知登录和密钥交换
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2015-04-27 DOI: 10.1109/CNS.2013.6682750
M. Portnoi, Chien-Chung Shen
{"title":"Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beacons","authors":"M. Portnoi, Chien-Chung Shen","doi":"10.1109/CNS.2013.6682750","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682750","url":null,"abstract":"This work presents a mobile sign-on scheme, which utilizes Bluetooth Low Energy beacons for location awareness and Attribute-Based Encryption for expressive, broadcast-style key exchange. Bluetooth Low Energy beacons broadcast encrypted messages with encoded access policies. Within range of the beacons, a user with appropriate attributes is able to decrypt the broadcast message and obtain parameters that allow the user to perform a short or simplified login. The effect is a “traveling” sign-on that accompanies the user throughout different locations.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A framework for risk-aware role based access control 基于风险感知角色的访问控制框架
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2013-12-12 DOI: 10.1109/CNS.2013.6682761
K. Bijon, R. Krishnan, R. Sandhu
{"title":"A framework for risk-aware role based access control","authors":"K. Bijon, R. Krishnan, R. Sandhu","doi":"10.1109/CNS.2013.6682761","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682761","url":null,"abstract":"Over the years, role based access control (RBAC) has remained a dominant form of access control both in the industry and academia. More recently, the need for risk awareness in access control has received considerable attention in the research community in light of issues such as insider threats. Although RBAC facilitates risk mitigation via features such as constraints (e.g. static and dynamic separation of duty), a quantified approach of risk awareness/mitigation has emerged as a promising research theme due to its inherent flexibility. In this approach, risk/cost metrics are computed for various entities involved in access control such as users and objects and a risk threshold limits the permissions that can be exercised. The quantified approach accommodates dynamism in access decisions based on contexts/situations such as an employee accessing a sensitive file using a work computer versus accessing using her own device. In this paper, we analyze the difference between the traditional constraint-based risk mitigation and the recent quantified risk-aware approaches in RBAC and propose a framework for introducing risk-awareness in RBAC models that incorporates quantified-risk. We also provide a formal specification of an adaptive risk-aware RBAC model by enhancing the NIST core RBAC model.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125047383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Certificateless public auditing for data integrity in the cloud 云数据完整性的无证书公共审计
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2013-12-12 DOI: 10.1109/CNS.2013.6682701
Boyang Wang, Baochun Li, Hui Li, Fenghua Li
{"title":"Certificateless public auditing for data integrity in the cloud","authors":"Boyang Wang, Baochun Li, Hui Li, Fenghua Li","doi":"10.1109/CNS.2013.6682701","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682701","url":null,"abstract":"Due to the existence of security threats in the cloud, many mechanisms have been proposed to allow a user to audit data integrity with the public key of the data owner before utilizing cloud data. The correctness of choosing the right public key in previous mechanisms depends on the security of Public Key Infrastructure (PKI) and certificates. Although traditional PKI has been widely used in the construction of public key cryptography, it still faces many security risks, especially in the aspect of managing certificates. In this paper, we design a certificateless public auditing mechanism to eliminate the security risks introduced by PKI in previous solutions. Specifically, with our mechanism, a public verifier does not need to manage certificates to choose the right public key for the auditing. Instead, the auditing can be operated with the assistance of the data owner's identity, such as her name or email address, which can ensure the right public key is used. Meanwhile, this public verifier is still able to audit data integrity without retrieving the entire data from the cloud as previous solutions. To the best of our knowledge, it is the first certificateless public auditing mechanism for verifying data integrity in the cloud. Our theoretical analyses prove that our mechanism is correct and secure, and our experimental results show that our mechanism is able to audit the integrity of data in the cloud efficiently.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114257077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
Babble: Identifying malware by its dialects Babble:通过其方言识别恶意软件
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2013-12-12 DOI: 10.1109/CNS.2013.6682751
Aziz Mohaisen, Omar Alrawi, Andrew G. West, A. Mankin
{"title":"Babble: Identifying malware by its dialects","authors":"Aziz Mohaisen, Omar Alrawi, Andrew G. West, A. Mankin","doi":"10.1109/CNS.2013.6682751","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682751","url":null,"abstract":"Using runtime execution artifacts to identify whether code is malware, and to which malware family it belongs, is an established technique in the security domain. Traditionally, literature has relied on explicit features derived from network, file system, or registry interaction [1]. While effective, the collection and analysis of these fine-granularity data points makes the technique quite computationally expensive. Moreover, the signatures/heuristics this analysis produces are often easily circumvented by subsequent malware authors.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114383900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards self-healing smart grid via intelligent local controller switching under jamming 通过智能控制器切换实现干扰下的自愈智能电网
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2013-12-12 DOI: 10.1109/CNS.2013.6682700
Hongbo Liu, Yingying Chen, M. Chuah, J. Yang
{"title":"Towards self-healing smart grid via intelligent local controller switching under jamming","authors":"Hongbo Liu, Yingying Chen, M. Chuah, J. Yang","doi":"10.1109/CNS.2013.6682700","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682700","url":null,"abstract":"A key component of a smart grid is its ability to collect useful information from a power grid for enabling control centers to estimate the current states of the power grid. Such information can be delivered to the control centers via wireless or wired networks. We envision that wireless technology will be widely used for local-area communication subsystems in the smart grid (e.g., in distribution networks). However, various attacks with drastic impacts can be launched in wireless networks such as channel jamming attacks and DoS attacks. In particular, jamming attacks can cause a wide range of damages to power grids, e.g., delayed delivery of time-critical messages can prevent control centers from properly controlling the outputs of generators to match load demands. In this paper, we design a communication subsystem with enhanced self-healing capability under the presence of jamming through intelligent local controller switching. Our proposed framework allows sufficient readings from smart meters to be continuously collected by various local controllers to estimate the states of a power grid under various attack scenarios. In addition, we provide guidelines on optimal placement of local controllers to ensure effective switching of smart meters under jamming. Via theoretical, experimental and simulation studies, we demonstrate that our proposed system is effective in maintaining communications between smart meters and local controllers even when multiple jammers are present in the network.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125965636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
NICE: Network Introspection by Collaborating Endpoints NICE:协作端点的网络自省
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2013-12-12 DOI: 10.1109/CNS.2013.6682753
D. Kienzle, Nathan S. Evans, Matthew C. Elder
{"title":"NICE: Network Introspection by Collaborating Endpoints","authors":"D. Kienzle, Nathan S. Evans, Matthew C. Elder","doi":"10.1109/CNS.2013.6682753","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682753","url":null,"abstract":"NICE, or Network Introspection by Collaborating Endpoints, is a research project that explores novel approaches to network discovery and topology mapping in enterprise networks. The goal of NICE is to develop and demonstrate a capability for mapping networks without relying on traditional network management tools and protocols (such as SNMP), which presume some knowledge of the network topology a priori and require administrative credentials to managed network devices in order to collect their data. NICE targets the security administrator - who does not have either the knowledge or authority to manage the network infrastructure - as opposed to the network administrator. The security administrator does have authority to manage client security software on every managed endpoint. By leveraging this presence on the endpoints, NICE attempts to extract the security-relevant network information that the security administrator needs in order to prevent, ameliorate, and respond to security incidents. The NICE project consists of research and development in multiple areas. NICE uses low-level network switch properties to locate and map all the switches on a subnet and then associate rogue systems with specific physical switches. NICE also captures a wealth of information about rogue systems, authorized systems/devices, and topology simply by listening to broadcast traffic. Lastly, NICE explores techniques for having pairs of endpoints talk across the network to infer the presence of intermediate devices and processing. We have produced a NICE integrated system prototype addressing these research areas and conducted some experimentation to evaluate the effectiveness and scalability of the approach.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":" 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132124791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A lightweight argument system with efficient verifier 具有高效验证器的轻量级参数系统
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2013-12-12 DOI: 10.1109/CNS.2013.6682704
Gang Xu, G. Amariucai, Y. Guan
{"title":"A lightweight argument system with efficient verifier","authors":"Gang Xu, G. Amariucai, Y. Guan","doi":"10.1109/CNS.2013.6682704","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682704","url":null,"abstract":"In the Cloud Computing paradigm, users outsource computational tasks from relatively weaker devices to more powerful but untrusted servers. While outsourcing computation provides appealing benefits, natural concerns arise regarding the the correctness of the result. One of the most recent solutions to this problem comes in the form argument systems, which combine commitment protocols and linear probabilistically checkable proofs (PCPs). Although significant efforts have been made to enhance the practicality of argument systems for outsourced computation, the high cost still stymies the successful adoption of argument systems for real-world cloud-based applications. However, we observe that the most burdensome part in a linear PCP protocol - the generation of the queries for circuit tests - is highly redundant. Consequently, in this paper, we propose a novel commitment protocol which provides inherent circuit tests. Based on this commitment protocol, we develop a new light-weight argument system in which an efficient verifier can generate PCP queries for the circuit tests without having to read the circuit and perform weighted summations on the circuit's gate constraints every time a new query is generated.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130908129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study 利用WPS漏洞无线传播WiFi ap感染:流行病学和实验研究
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2013-12-12 DOI: 10.1109/CNS.2013.6682757
Amirali Sanatinia, Sashank Narain, G. Noubir
{"title":"Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study","authors":"Amirali Sanatinia, Sashank Narain, G. Noubir","doi":"10.1109/CNS.2013.6682757","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682757","url":null,"abstract":"WiFi Access Points (APs) are ideal targets of attack. They have access to home internal networks which allows an adversary to easily carry out man-in-the-middle attacks and spread infections wirelessly. They can also be used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum (both WiFi and cellular). While Wired Equivalent Privacy (WEP) vulnerabilities are common knowledge, the flaws of the WiFi Protected Setup (WPS) protocol are less known. In this paper, we use an epidemiological approach, combined with experimental war-driving measurements to investigate the speed of infections spreading in four neighborhoods of Boston, MA, USA, with distinct population and demographics. Our analysis and experimental data indicate that such attacks are feasible. While the graph of WEP APs and WPS APs may not be fully connected, the combined graph of WEP-WPS APs is fully connected, making large scale spreading of infections feasible. Due to the unique characteristics of WPS, the absence of automated firmware upgrades and mechanisms to safely configure and administer APs; these attacks pose a significant threat that require serious attention and countermeasures to provide safe management of APs and their policies.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123798651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Providing context-based security for inter-organizational electronic business processes 为组织间的电子业务流程提供基于上下文的安全性
2013 IEEE Conference on Communications and Network Security (CNS) Pub Date : 2013-12-12 DOI: 10.1109/CNS.2013.6682744
M. Talamo, F. Arcieri, C. Schunck, A. C. D'Iddio
{"title":"Providing context-based security for inter-organizational electronic business processes","authors":"M. Talamo, F. Arcieri, C. Schunck, A. C. D'Iddio","doi":"10.1109/CNS.2013.6682744","DOIUrl":"https://doi.org/10.1109/CNS.2013.6682744","url":null,"abstract":"We present a framework for context-based analysis of transaction data to validate and secure inter-organizational business processes. The analysis is based on process mining techniques and uses observations taken at all relevant communication layers (e.g. network, transport, application) which are combined with semantic analysis. The context based analysis presented here allows the simple implementation of complex security and compliance policies.","PeriodicalId":347620,"journal":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信