2008 International Conference on Security Technology最新文献

筛选
英文 中文
Green Remanufacturing Engineering in Structural Machinery Based on Reverse Engineering 基于逆向工程的结构机械绿色再制造工程
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.21
Guixia Zhou, G. Duan, Huibo Wu, Tao Yao
{"title":"Green Remanufacturing Engineering in Structural Machinery Based on Reverse Engineering","authors":"Guixia Zhou, G. Duan, Huibo Wu, Tao Yao","doi":"10.1109/SECTECH.2008.21","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.21","url":null,"abstract":"Developing sustainable approaches to manufacture is a critical global problem concerned by people with a lack of resource on Planet Earth. An increasing interest in product take-back, product recovery and the redistribution has been concerned increasingly. Such as green remanufacturing, in particular, has a strong history of product recovery operations in the automotive sector. It can be both more profitable and less harmful to the environment compare with conventional manufacturing. However, the application of green remanufacturing in structural machinery didn¿t draw attention. This paper provides the background of green remanufacturing together with the way of product recovery reverse engineering theory. Such as, study target, content, methods, design order, key technology and application of reverse engineering. This method can measure and evaluate wear of machine parts which have complicated curved surface quantitatively, accurately and visualization ally. Reverse engineering methods and technologies play an important role in many software engineering tasks of product model. The significance of this research contributes to theory, to industry and to future research in the field.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116949153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing 基于自主计算的自适应分层入侵容忍模型
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.24
Bingyang Li, Huiqiang Wang, Guangsheng Feng
{"title":"Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing","authors":"Bingyang Li, Huiqiang Wang, Guangsheng Feng","doi":"10.1109/SECTECH.2008.24","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.24","url":null,"abstract":"Intrusion tolerance has been a key technology of system survivability. Aiming at the absence of self-adaptation ability and quantitative analysis on existent intrusion tolerant system, an adaptive hierarchy intrusion tolerant system based on autonomic computing (AHITAC, for short) is proposed. Adopting hierarchy modes, the critical modules of AHITAC include confidence evaluation of accessing, active trapping on suspicious information, hierarchical learning of applications and classed recovery of system function. By autonomic implementing the learning and adaptive function of confidence threshold, service classification and trap repository, AHITAC implements the tolerance on intrusion and suspicious information, improving the ability of self-recovery and self-optimization on object network. The simulation results show that the object network with AHITAC is stable and tolerant.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127506029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using Trust and Risk in Access Control for Grid Environment 基于信任和风险的网格环境访问控制
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.50
Yan Li, Huiping Sun, Zhong Chen, Jinqiang Ren, Haining Luo
{"title":"Using Trust and Risk in Access Control for Grid Environment","authors":"Yan Li, Huiping Sun, Zhong Chen, Jinqiang Ren, Haining Luo","doi":"10.1109/SECTECH.2008.50","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.50","url":null,"abstract":"With the development of grid technology, sensitive files and data protection become difficult tasks multi-domains. Traditional access control mechanisms are not suitable to such distributed environment. Several models and mechanisms utilize trust to assist access control decision. But few explicitly consider trust and risk as two separate factors which affect interactions between peers. In this paper, we present a novel mechanism which considers both trust and risk as two vital parameters to assist access control decision. In addition, a novel model of trust evaluation is proposed to represent the confidence in the peer. And to appease peoplepsilas anxiety about loss, a new model of risk assessment is also presented to indicate impacts on resources. At the end of this paper, simulation results will indicate that our mechanism is able to secure local system more efficiently and reliably.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129497874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An Efficient Security Framework for Detection and Isolation of Attackers in Low Rate Wireless Personal Area Networks 在低速率无线个人区域网络中检测和隔离攻击者的有效安全框架
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.55
S. Priya, J. Pradhan
{"title":"An Efficient Security Framework for Detection and Isolation of Attackers in Low Rate Wireless Personal Area Networks","authors":"S. Priya, J. Pradhan","doi":"10.1109/SECTECH.2008.55","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.55","url":null,"abstract":"LR-WPANs mainly target low data rate and short range applications. Packet delivery in such networks is achieved through routing and packet forwarding. So we should provide security for both operations. In this paper, these two types of threats within the current LR-WPAN security architecture are identified and an efficient security framework (ESF) is presented. It protects both routing and data forwarding attacks. The framework involves detection of malicious nodes by the modified AODV routing and isolation of malicious nodes by using multi-signature based tickets. Through both analysis and simulation results, we demonstrate the effectiveness of our framework in detecting and isolating the misbehaving nodes.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"226 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114029473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Proposal of Security Framework for Wireless Body Area Network 一种无线体域网络安全框架的提出
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.32
C. Jang, Deok-Gyu Lee, J. Han
{"title":"A Proposal of Security Framework for Wireless Body Area Network","authors":"C. Jang, Deok-Gyu Lee, J. Han","doi":"10.1109/SECTECH.2008.32","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.32","url":null,"abstract":"Environment of the Next-Generation is organized by various sensors and devices. wireless body area network (WBAN) is the core technology connecting Next-Generation's compositional elements around the human to one network. Recently while many researches including healthcare services and wearable PC are actively in progress, technologies of WBAN gradually are beginning to receive the attention, and including various issues that have the close relation with their technical development. The one of WBAN issues is security. Information in WBAN is the collection of data about vital body parameter from several parts of the body. While it is a clue for healthcare or treatment, it is of personal nature and needs to be secured. In this paper, we propose the security model and the security framework to protect the personal healthcare information in WBAN. This acts as guide providing appropriate security and privacy protection of the wireless communication in WBAN.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"446 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123455255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Proposal of Real-Time Status Management Protocol for Structural Desperation of a Certificate Verification Service 一种面向证书验证服务结构绝望的实时状态管理协议
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.59
YongJun Lee, YongNyuo Shin
{"title":"A Proposal of Real-Time Status Management Protocol for Structural Desperation of a Certificate Verification Service","authors":"YongJun Lee, YongNyuo Shin","doi":"10.1109/SECTECH.2008.59","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.59","url":null,"abstract":"We present the certificate status management protocol (CSMP). In the CSMP, a third service structure, referred to as the CSMS, which is solely responsible for certificate status information services, is adopted so as to solve the bottleneck problem, and disperse the verification service structure, which had been converged, by enabling the maintenance of real-time certificate status for any verifier demanding the certificate verification service. Its performance is compared by a simulation with the performance of the certificate revocation list (CRL) and the on-line certificate status protocol (OCSP), which maintains the real-time status of certificates from CA. The simulation results indicate that the CSMP is the most efficient protocol for use when compared with other alternative protocols analyzed.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125763515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Biometric System Models with Secure Network Protocols in Open Network Environment 开放网络环境下具有安全网络协议的生物识别系统模型
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.44
Woochang Shin, Young-Nyuo Shin
{"title":"The Biometric System Models with Secure Network Protocols in Open Network Environment","authors":"Woochang Shin, Young-Nyuo Shin","doi":"10.1109/SECTECH.2008.44","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.44","url":null,"abstract":"Biometric technology has been adopted in important elements of the national infrastructure, such as electronic passports and immigration control systems. However, the threats of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. We introduce nine telebiometrics authentication models and a biometric network protocol that is secure and compatible with international standards. We also prove the security of the suggested protocol using AVISPA tools.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124409860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge-Centric Information Security 以知识为中心的资讯保安
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.9
Walter S. L. Fung, R. Fung
{"title":"Knowledge-Centric Information Security","authors":"Walter S. L. Fung, R. Fung","doi":"10.1109/SECTECH.2008.9","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.9","url":null,"abstract":"Increasing number of enterprises consider information security (InfoSec) as a key success factor whereas threats can originate from any part of the world over internet. Incidents such as 11th September of 2001, and hacker horror stories, awaken enterprises they should reshape their InfoSec policies. Traditionally InfoSec relies heavily on technology, investing large amount of money on software and hardware. In the last decade process based information security management system (ISMS) such as ISO27001 has emerged. Many organizations since then have adopted such ISMS. KM is another management discipline enterprises employ, with aim to foster a more effective management of knowledge creation for innovations. This paper proposes a research initiative to integrate KM and InfoSec together into a knowledge-centric InfoSec (KCIS) System. Organizations should be able to improve their InfoSec maturity level, by adopting KCIS in phases.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient t-out-of-n Oblivious Transfer Schemes 高效的t-of-n无关传输方案
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.19
Chinchen Chang, Y. Lai
{"title":"Efficient t-out-of-n Oblivious Transfer Schemes","authors":"Chinchen Chang, Y. Lai","doi":"10.1109/SECTECH.2008.19","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.19","url":null,"abstract":"In this paper, we shall bring up two efficient t-out-of-n oblivious transfer schemes. The first comes out handy for communication and computation. However, it has a shortcoming in revealing combined information of secrets. To solve this problem, we have developed it into the second scheme.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122318250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exception Handling of Multi-criteria Workflow Task Assignment 多准则工作流任务分配异常处理
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.29
Yu Ouyang, Xi-ping Yang
{"title":"Exception Handling of Multi-criteria Workflow Task Assignment","authors":"Yu Ouyang, Xi-ping Yang","doi":"10.1109/SECTECH.2008.29","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.29","url":null,"abstract":"With the increases in workflow security requirements, some complex requirements have to be expressed by authorization constraints. When more and more authorization constraints must be treated in workflow task assignment, the exception possibilities of workflow task assignment will rise definitely. In this paper, the concept of security risk coefficient was introduced and an exception handling method of multi-criteria task performer assignment was proposed. Then two instances were designed to demonstrate the method is reasonable.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"11 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信