2008 International Conference on Security Technology最新文献

筛选
英文 中文
Software Piracy Prevention: Splitting on Client 防止软件盗版:客户端分裂
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.10
Yawei Zhang, Lei Jin, Xiaojun Ye, Dongqing Chen
{"title":"Software Piracy Prevention: Splitting on Client","authors":"Yawei Zhang, Lei Jin, Xiaojun Ye, Dongqing Chen","doi":"10.1109/SECTECH.2008.10","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.10","url":null,"abstract":"After identifying the fundamental weakness of existing privacy prevention, this paper proposes a software-splitting technique in which we put the split contents on the client instead of the remote trust server. Unlike traditional static client identification techniques, this new technique would encrypt the extracted contents from the software by a key relating to the hardware characteristics, and then decrypt them dynamically during the main program running. This method not only makes it harder to create an additional available copy based on diversity, but also prevents illegal uses on the copy.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129639399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Trust and Reputation Aware Security for Resource Selection in Grid Computing 基于信任和声誉的网格计算资源选择安全
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.46
V. Vijayakumar, R. WahidhaBanu
{"title":"Trust and Reputation Aware Security for Resource Selection in Grid Computing","authors":"V. Vijayakumar, R. WahidhaBanu","doi":"10.1109/SECTECH.2008.46","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.46","url":null,"abstract":"In providing the infrastructure for the accomplishment of general purpose computational grids the main concern is security. Still, by properly authenticating users and hosts and in the interactions between them, most grid implementations focus their safety concerns. The effective and competent exploitation of grid computing services needs sophisticated and secured resource management systems. The wide range of selection and the high degree of strangeness leads to the problem in secured selection of grid. Without the assurance of a higher degree of confidence relationship, efficient resource allocation and utilization can not be attained. In recent times, with larger applications in e-commerce reputation mechanisms have become one of the most important techniques underpinning the distributed application and system safety. We have proposed a new approach in this paper, which intends to offer trust and reputation aware security for resource selection in grid computing. Based on the calculated trust factor (TF) value of each entity the incoming jobs have securely allocated to the entity.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127239798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
The Activity Analysis of Malicious HTTP-Based Botnets Using Degree of Periodic Repeatability 基于周期可重复性的恶意http僵尸网络活动分析
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.52
Jae-Seo Lee, Hyuncheol Jeong, Jun-Hyung Park, Minsoo Kim, Bongnam Noh
{"title":"The Activity Analysis of Malicious HTTP-Based Botnets Using Degree of Periodic Repeatability","authors":"Jae-Seo Lee, Hyuncheol Jeong, Jun-Hyung Park, Minsoo Kim, Bongnam Noh","doi":"10.1109/SECTECH.2008.52","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.52","url":null,"abstract":"The malicious botnets are evaluated as the serious threat of the Internet society in future. As the botnets are more clever and artful, the detection of botnets is not easy. Recently malicious botnets evolve into HTTP botnets out of typical IRC botnets and it is difficult to response effectively with existing methods which are using DNS traffic. In this paper, we show the relations of HTTP clients to HTTP servers, and propose the method to search malicious HTTP botnets by using degree of periodic repeatability.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Ant Based Multicast Routing Algorithm with Multiple Constraints for Mobile Adhoc Networks 移动自组网中基于蚁群的多约束组播路由算法
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.36
A. Sabari, K. Duraiswamy
{"title":"Ant Based Multicast Routing Algorithm with Multiple Constraints for Mobile Adhoc Networks","authors":"A. Sabari, K. Duraiswamy","doi":"10.1109/SECTECH.2008.36","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.36","url":null,"abstract":"One particular challenging environment for multicast is a mobile ad-hoc network (MANET). Existing studies show that tree-based and mesh based on-demand protocols are not necessarily the best choice, since associated overhead will be more. Several algorithms based on the ant colony optimization (ACO) approach minimizes the cost of the tree under multiple constraints. These algorithms treat the traffic engineering multicast problem as a single-purpose problem with several constraints. The main disadvantage of this approach is the necessity of a predefined upper bound that can exclude good trees from the final solution. This paper presents a design on ant-colony based multicast routing (AMR) algorithm for MANETs, to solve the traffic Engineering multicast problem that optimizes several objectives simultaneously. The algorithm calculates one more additional constraint in the cost metric, which is the product of average-delay and the maximum depth of the multicast tree and try to minimize this combined cost metric. Simulation results show that the proposed algorithm outperforms all previous algorithms by forming the multicast tree with varying sizes.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121203702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Schemes for Digital Signing Key Sharing 数字签名密钥共享方案
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.16
Chao-Wen Chan, Chinchen Chang
{"title":"Schemes for Digital Signing Key Sharing","authors":"Chao-Wen Chan, Chinchen Chang","doi":"10.1109/SECTECH.2008.16","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.16","url":null,"abstract":"In the paper, we propose a new cryptographic notion, signing key sharing. Based on the notion, we present various types of signing key sharing schemes, such as proxy signature schemes, schemes for generating and sharing a signing key among a group, and (t,n) -threshold group proxy signature scheme. We also investigate the security conditions, the signer authentication and signer nonrepudiation of the proposed schemes. We find that the signer authentication can be altered into the signing key granting authentication and the signer nonrepudiation can be altered into the group nonrepudiation.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"4 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113976661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survivable Scheme for Critical Information System 关键信息系统的可生存方案
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.56
Zhu Jianming, Wang Chao
{"title":"A Survivable Scheme for Critical Information System","authors":"Zhu Jianming, Wang Chao","doi":"10.1109/SECTECH.2008.56","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.56","url":null,"abstract":"In survivable information systems, any intrusion or failure into a part of the system will not endanger essential functions of the systems. This paper proposes survivable scheme for critical information systems based on intrusion-tolerant policy and multi-version subsystems. Using the techniques of both redundancy and diversity, the survivability of critical information systems is achieved in the presence of intrusions or failures. Compared with other survivable schemes, our approach has implemented the security and robustness for the key functions of a critical information system by using the integration security strategy and multiple security strategies.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114567852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Stream Processing Based on ALE-Compliant RFID Middleware 基于ale兼容RFID中间件的数据流处理
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.58
Y. Byun, Moon-seok Yang, Sang-Young Byun
{"title":"Data Stream Processing Based on ALE-Compliant RFID Middleware","authors":"Y. Byun, Moon-seok Yang, Sang-Young Byun","doi":"10.1109/SECTECH.2008.58","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.58","url":null,"abstract":"USN and RFID, as new technologies for the realization of ubiquitous computing, are technically closely related with each other. In this paper, we propose an efficient processing method of various kinds of sensor data used in USN environment to provide efficiency from the view point of not only the convergence of USN and RFID technologies but also on cost and extensibility. Specifically, we propose a method of converting various sensor data into EPC data format which can be handled in ALE-compliant RFID middleware. By using the proposed method, existing ALE-compliant middleware based on international standard specification can easily handle not only RFID tag data but also general sensor data simultaneously without any changes in the middleware. And in addition, various types of ubiquitous application services can be implemented at a low cost and in a shorter time.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Meta-level Access Control Model for Adapting Diverse Access Control Policies on OS Environment 操作系统环境下适应多种访问控制策略的元级访问控制模型
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.43
Jun-Hyung Park, Jung-Sun Kim, Jae-Hyun Seo, Minsoo Kim
{"title":"A Meta-level Access Control Model for Adapting Diverse Access Control Policies on OS Environment","authors":"Jun-Hyung Park, Jung-Sun Kim, Jae-Hyun Seo, Minsoo Kim","doi":"10.1109/SECTECH.2008.43","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.43","url":null,"abstract":"Flexible access control model has been studied and implemented on operating system for a long time. SELinux of NSA have fine-grained policy. But, the strict policy make user feel inconvenience. Though SELinux can present MAC or RBAC as well as DAC, it doesnpsilat show all of the notions. We propose the flexible access control model that it can present diverse access control policies and the policies can transform each other. As our model is based on E-R model, it is easy to understand and to use by simple syntax. We implement and test this model on Linux. And we show that the performance degree isnpsilat decreased highly.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122917492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating Resource-Draining DoS Attacks on Broadcast Source Authentication on Wireless Sensors Networks 减轻无线传感器网络广播源认证的DoS攻击
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.20
C. Bekara, M. Laurent-Maknavicius, K. Bekara
{"title":"Mitigating Resource-Draining DoS Attacks on Broadcast Source Authentication on Wireless Sensors Networks","authors":"C. Bekara, M. Laurent-Maknavicius, K. Bekara","doi":"10.1109/SECTECH.2008.20","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.20","url":null,"abstract":"During the few last years, several broadcast source authentication protocols (BSAPs) were proposed for wireless sensors network (WSN), to secure broadcast communications. Amongst the proposed protocols, we find time-asymmetry based BSAPs, that achieve delayed authentication of broadcasted data, and are known for their low computation and transmission overheads. However, time-asymmetry based BSAPs suffer from a kind of DoS attacks, called resource-draining DoS attack, in which an attacker floods the network with fake messages, that all sensors of the network buffer and forward, then later verify, thus causing buffer overflow and batteries depletion. In this paper we investigate resource-draining DoS attack in time-asymmetry based BSAPs, and propose a new time asymmetry based BSAP protocol, to overcome this kind of DoS attacks, by achieving a hop-by-hop authentication of broadcasted messages, thus limiting the damage of an attacker to its one-hop neighbors only, instead of the entire network.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122286911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of the BioAPI Test Assertion to Apply a Telebiometric System Model to the National Infrastructure Establishment 实施生物api测试断言,将远程生物识别系统模型应用于国家基础设施建设
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.30
YongNyuo Shin, Dong-Young Yoo, YongJun Lee, Woochang Shin
{"title":"Implementation of the BioAPI Test Assertion to Apply a Telebiometric System Model to the National Infrastructure Establishment","authors":"YongNyuo Shin, Dong-Young Yoo, YongJun Lee, Woochang Shin","doi":"10.1109/SECTECH.2008.30","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.30","url":null,"abstract":"Many issues need to be resolved before applying biometrics technology to the national network. Most importantly, it should be implemented with a standard interface so that interoperability can be guaranteed. Based on this requirement, infrastructure with a well-established model should be developed. The model is proposed by arranging models suitable for use in the national infrastructure establishment. A test assertion is implemented based on international standard BioAPI (biometric application interface), so that the national infrastructure can be built using this model.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"30 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116316873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信