2008 International Conference on Security Technology最新文献

筛选
英文 中文
A Java Program Tamper-Proofing Method 一种Java程序防篡改方法
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.28
Xuesong Zhang, Fengling He, Wanli Zuo
{"title":"A Java Program Tamper-Proofing Method","authors":"Xuesong Zhang, Fengling He, Wanli Zuo","doi":"10.1109/SECTECH.2008.28","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.28","url":null,"abstract":"Illegal distribution and use of software is a big ad hoc problem in software industry today, especially on the growing market of Java software product. Tamper-proofing techniques will disable some or all of the program¿s functionality once they detect any unwanted modifications during run time. This paper presents the attempt to Java software tamper-proofing technology by dynamic monitoring. The Java method¿s control flow graph is described by regular expressions, which can be regarded as a language. Certain stack signature in these control flows is also computed. During program execution, the protected method¿s control flow and stack signature information is verified at runtime by a monitor thread which checking whether the execution trace is accepted by the language, and the signature belongs to the right method. Experimental result shows that this tamper-proofing method is especially suitable for non-computation dense Java applications.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NeoMAN: A Negotiation Management System for IKE Protocol Based on X.509 Certificate in Cross Domain Application 跨域应用中基于X.509证书的IKE协议协商管理系统
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.13
Zhen Zhao, Taehyoun Kim, J.H. Kim, I. Kim, Y. Eom
{"title":"NeoMAN: A Negotiation Management System for IKE Protocol Based on X.509 Certificate in Cross Domain Application","authors":"Zhen Zhao, Taehyoun Kim, J.H. Kim, I. Kim, Y. Eom","doi":"10.1109/SECTECH.2008.13","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.13","url":null,"abstract":"IPSec VPN is widely used to protect remote data access. IKE protocol is the mandatory key management protocol of IPSec protocol, it provides a manual configuration method for IPSec VPN. But manual configuration is complex, unreliable, unmanageable, and especially less of support for cross-domain management. This paper proposes an IKE negotiation management system based on X.509, called NeoMAN. The NeoMAN system is designed to analysis the security requirements in intra-/cross- domain, provides cross-domain security requirement negotiation, security policy generation, and automatic IKE client configuration. The proposed method reduces the complexity of the IKE configuration process, improves the adaptability of the IKE protocol in cross-domain application, and also provides the management approach for IPSec VPN application.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116704949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Definition of Evaluation Assurance Levels and Estimation of Evaluation Efforts for Operational System Based ISO/IEC 19791 基于ISO/IEC 19791的运营系统评估保证级别的定义和评估工作的估计
2008 International Conference on Security Technology Pub Date : 2008-12-13 DOI: 10.1109/SECTECH.2008.41
Kab-Seung Kou, Jae-goo Jeong, Gang-soo Lee
{"title":"Definition of Evaluation Assurance Levels and Estimation of Evaluation Efforts for Operational System Based ISO/IEC 19791","authors":"Kab-Seung Kou, Jae-goo Jeong, Gang-soo Lee","doi":"10.1109/SECTECH.2008.41","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.41","url":null,"abstract":"ISO/IEC 19791 that is evaluation scheme of information security operational system, is not defined evaluation-assurance-level (i.e., EAL) like ISO/IEC 15408 (i.e., Common Criteria, CC) that is evaluation scheme of information security product. In this paper, ISO/IEC 19791 that is evaluation and certification on operational system defined EAL, from ELA 1 up to EAL 7. And ISO/IEC 19791 calculated relative rate of evaluation effort of each EAL.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Off-line Cursive Handwritten Tamil Character Recognition 离线草书手写泰米尔字符识别
2008 International Conference on Security Technology Pub Date : 2008-06-01 DOI: 10.1109/SECTECH.2008.33
R. Kannan, R. Prabhakar, R. Suresh
{"title":"Off-line Cursive Handwritten Tamil Character Recognition","authors":"R. Kannan, R. Prabhakar, R. Suresh","doi":"10.1109/SECTECH.2008.33","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.33","url":null,"abstract":"Concerning to optical character recognition, handwriting has sustained to persist as a means of communication and recording information in day to day life even with the introduction of new technologies. Hidden Markov Models (HMM) have long been a popular choice for Western cursive handwriting recognition following their success in speech recognition. However, when it comes to Indic script recognition, the published work employing HMMs is limited, and generally focused on isolated character recognition. A system for offline recognition of cursive handwritten Tamil characters is presented. In this effort, offline cursive handwritten recognition system for Tamil based on HMM and uses a combination of Time domain and frequency domain feature is proposed. The tolerance of the system is evident as it can overwhelm the complexities arise out of font variations and proves to be flexible and robust. Higher degree of accuracy in results has been obtained with the implementation of this approach on a comprehensive database. These initial results are promising and warrant further research in this direction. The results are also encouraging to explore possibilities for adopting the approach to other Indic scripts as well.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128401962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信