2010 International Conference on Availability, Reliability and Security最新文献

筛选
英文 中文
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats 基于威胁的电子发票模式参考模型的改进
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.50
M. Netter, E. Fernández, G. Pernul
{"title":"Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats","authors":"M. Netter, E. Fernández, G. Pernul","doi":"10.1109/ARES.2010.50","DOIUrl":"https://doi.org/10.1109/ARES.2010.50","url":null,"abstract":"Almost every company needs to process invoices to either claim money from their customers or to pay for products or services. Although companies are allowed to electronically process their invoices, most of them still rely on the paper-based invoice process. Within this paper we built upon existing work to develop a methodology for defining a reference model for the electronic invoice based on security patterns. This paper identifies threats of the e-invoice process in order to create a context for the security problem, which allows us to refine our methodology.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116594123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss 排队机制对RTP流量的影响:抖动、端到端延迟和丢包的比较分析
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.67
G. Epiphaniou, C. Maple, P. Sant, M. Reeve
{"title":"Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss","authors":"G. Epiphaniou, C. Maple, P. Sant, M. Reeve","doi":"10.1109/ARES.2010.67","DOIUrl":"https://doi.org/10.1109/ARES.2010.67","url":null,"abstract":"The idea of converging voice and data into a best-effort service network, such as the Internet, has rapidly developed the need to effectively define the mechanisms for achieving preferential handling of traffic. This sense of QoS assurance has increased due to the enormous growth of users accessing networks, different types of traffic competing for available bandwidth and multiple services running on the core network, defined by different protocols and vendors. VoIP traffic behaviour has become a crucial element of the intrinsic QoS mainly affected by jitter, latency and packet loss rates. This paper focuses on three different mechanisms, DropTail (FIFO), RED and DiffServ, and their effects on real-time voice traffic. Measurements of jitter, end-to-end delay and packet loss, based on simulation scenarios using the NS-2 network simulator are also presented and analyzed.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117250260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Semantic Security Architecture for Web Services The Access-eGov Solution 面向Web服务的语义安全架构Access-eGov解决方案
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.117
Stefan Durbeck, Christoph Fritsch, G. Pernul, Rolf Schillinger
{"title":"A Semantic Security Architecture for Web Services The Access-eGov Solution","authors":"Stefan Durbeck, Christoph Fritsch, G. Pernul, Rolf Schillinger","doi":"10.1109/ARES.2010.117","DOIUrl":"https://doi.org/10.1109/ARES.2010.117","url":null,"abstract":"The shift from mere service-oriented architectures (SOA) to semantically enriched approaches is especially being forced in multi-domain environments that the public sector in the European Union is an example for. The security aspect is lagging behind its possibilities, and new access control approaches native to the semantic environment need to be applied. Based on architectural research work conducted within the EU-funded research project Access-eGov, we outline our implementation of a semantic security architecture for web services by using industry-standard technologies and combining them with semantic enhancements.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125129114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms 基于分组密码的高效消息认证码算法的区域系统设计框架
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.109
A. A. Adekunle, S. Woodhead
{"title":"Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms","authors":"A. A. Adekunle, S. Woodhead","doi":"10.1109/ARES.2010.109","DOIUrl":"https://doi.org/10.1109/ARES.2010.109","url":null,"abstract":"A zone based systems design framework is described and utilized in the implementation of a message authentication code (MAC) algorithm based on symmetric key block ciphers. The resulting block cipher based MAC algorithm may be used to provide assurance of the authenticity and, hence, the integrity of binary data. Using software simulation to benchmark against the de facto cipher block chaining MAC(CBC-MAC) variant used in the TinySec security protocol for wireless sensor networks and the NIST cipher block chaining MAC standard, CMAC; we show that our zone based systems design framework can lead to block cipher based MAC constructs that point to improvements in message processing efficiency, processing throughput and processing latency.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Image Hiding Scheme Using Content Aware Seam Carving Method 一种基于内容感知缝雕刻的图像隐藏方案
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.54
Zahra Toony, M. Jamzad
{"title":"A Novel Image Hiding Scheme Using Content Aware Seam Carving Method","authors":"Zahra Toony, M. Jamzad","doi":"10.1109/ARES.2010.54","DOIUrl":"https://doi.org/10.1109/ARES.2010.54","url":null,"abstract":"In image hiding we embed a secret image into a cover image. In order to minimize the distortion of secret image, we presented a novel steganographic method based on content-aware seam carving. In this paper, we propose a new image hiding method in which, the secret image is initially classified based on image complexity measure. Then it is resized to an appropriate smaller size, but for having the important objects of the image in resized image we use seam carving method that resizes an image whereas the important content of it remains. By applying the seam carving, we have an image that is smaller than the original one, and then we hide it in a cover image. Obviously hiding a smaller secret image causes less distortion in the stego-image (the image that has secret image or data) and therefore higher quality stego-image is obtained. Consequently, the proposed method provides higher embedding rate and enhanced security. The image quality of stego-image is measured in terms of peak-signal-to-noise ratio. In addition its robustness against noise and compression is evaluated.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"95 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection 基于强化有效载荷的分层高阶n图异常入侵检测
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.31
N. Hubballi, S. Biswas, Sukumar Nandi
{"title":"Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection","authors":"N. Hubballi, S. Biswas, Sukumar Nandi","doi":"10.1109/ARES.2010.31","DOIUrl":"https://doi.org/10.1109/ARES.2010.31","url":null,"abstract":"Application based intrusion detection involves analysis of network packet payload data. Recently statistical methods for analyzing the payload are being used. Since behavior of every application is not same a different model is necessary for each application. Studies have revealed that higher order n-grams are good for capturing the network profile. In this paper we introduce a concept of layered version of n-gram for payload based anomaly network intrusion detection. Each layer works as an independent anomaly detection system. A packet is declared as normal after passing through all the layers. A packet is declared as anomalous if at any layer it is declared as anomalous and we stop further processing the packet. We create a set of bins and equally distribute the distinct n-grams to each bin. Each such n-gram is a 2 tulle where the first element is byte values of the n-gram and second is the frequency of gram in the entire training data. We assign an anomaly score to each bin based on the frequency of the individual gram in the bin and is termed as coverage of the bin.We evaluate the proposed scheme on normal traffic of DARLA 99 dataset mixed with a set of attacks. Experimental results shows the efficacy of the method with a false alarm rate as low as 0.001%.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133950864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Model-Driven Security Patterns Application Based on Dependences among Patterns 基于模式间依赖关系的模型驱动安全模式应用
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.103
Yuki Shiroma, H. Washizaki, Y. Fukazawa, A. Kubo, Nobukazu Yoshioka
{"title":"Model-Driven Security Patterns Application Based on Dependences among Patterns","authors":"Yuki Shiroma, H. Washizaki, Y. Fukazawa, A. Kubo, Nobukazu Yoshioka","doi":"10.1109/ARES.2010.103","DOIUrl":"https://doi.org/10.1109/ARES.2010.103","url":null,"abstract":"The spread of open-software services through the Internet increases the importance of security. A security pattern is one of the techniques in which developers utilize security experts’ knowledge. Security patterns contain typical solutions about security problems. However there is a possibility that developers may apply security patterns in inappropriate ways due to a lack of consideration on dependencies among patterns. Application techniques of security patterns that consider such dependencies have not been proposed yet. In this paper, we propose an automated application technique of security patterns in model driven software development by defining applications procedures of security patterns to models as model transformation rules with consideration for pattern dependencies. Our technique prevents inappropriate applications such as the application of security patterns to wrong model elements and that in wrong orders. Therefore our technique supports developers apply security patterns to their own models automatically in appropriate ways.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134043058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming 基于领域感知遗传规划的网络入侵检测改进
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.53
Jorge Blasco Alís, A. Orfila, A. Ribagorda
{"title":"Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming","authors":"Jorge Blasco Alís, A. Orfila, A. Ribagorda","doi":"10.1109/ARES.2010.53","DOIUrl":"https://doi.org/10.1109/ARES.2010.53","url":null,"abstract":"One of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper we explore the use of Genetic Programming (GP) for such a purpose. Although GP has already been studied for this task, the inner features of network intrusion detection have been systematically ignored. To avoid the blind use of GP shown in previous research, we guide the search by means of a fitness function based on recent advances on IDS evaluation. For the experimental work we use a well-known dataset (i.e. KDD-99) that has become a standard to compare research although its drawbacks. Results clearly show that an intelligent use of GP achieves systems that are comparable (and even better in realistic conditions) to top state-of-the-art proposals in terms of effectiveness, improving them in efficiency and simplicity.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks 无线传感器网络的容错定向扩散
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.35
Fatima-Zohra Benhamida, Y. Challal
{"title":"FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks","authors":"Fatima-Zohra Benhamida, Y. Challal","doi":"10.1109/ARES.2010.35","DOIUrl":"https://doi.org/10.1109/ARES.2010.35","url":null,"abstract":"In this paper, we propose a fault tolerant protocol based on Directed Diffusion. This latter has the advantage to provide a strong tolerance against node failures thanks to its multipath construction, periodic exploration, and positive/negative reinforcement techniques. Our solution FaT2D (Fault Tolerant Directed Diffusion) defines a new technique which implements a fast failure detection with a prompt path recovery regarding to nodes crash and topology changes. A simulation based comparison between original Directed Diffusion and FaT2D shows that our protocol reduces data loss rate and decreases mean time recovery delay.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127557094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels 损耗信道中波分复用光相干信号的量子检测
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-02-01 DOI: 10.1109/ARES.2010.56
A. Waseda, M. Sasaki, M. Takeoka, M. Fujiwara, M. Toyoshima, Hidema Tanaka
{"title":"Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels","authors":"A. Waseda, M. Sasaki, M. Takeoka, M. Fujiwara, M. Toyoshima, Hidema Tanaka","doi":"10.1109/ARES.2010.56","DOIUrl":"https://doi.org/10.1109/ARES.2010.56","url":null,"abstract":"We numerically evaluate the wavelength division multiplexing (WDM) data transmission of coherent phase-shift keying (PSK) and quadrature amplitude modulation (QAM) signals in optical fiber communication and deep-space communication channels with conventional homodyne-based(dyne-type) detections and various quantum detection strategies. We show the quantitative gap between these detection strategies and especially in the quantum-limited region where the quantum noise seriously limits the transmission rate. For an extremely weak signal input power, there is a crucial gap between the capacity limit and the transmission rates of the WDM system with dyne-type detections. We show that this gap is filled by applying a collective square root detection (SRD) only for each channel, not necessary for quantum collective decoding among WDM channels.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114604437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信