The Second International Conference on Availability, Reliability and Security (ARES'07)最新文献

筛选
英文 中文
FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance 扩展了自动添加容错的Arora-Kulkarni方法
Bastian Braun
{"title":"FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance","authors":"Bastian Braun","doi":"10.1109/ARES.2007.89","DOIUrl":"https://doi.org/10.1109/ARES.2007.89","url":null,"abstract":"Synthesizing fault-tolerant systems from fault-intolerant systems simplifies design of fault-tolerance. Arora and Kulkarni developed a method and a tool to synthesize fault-tolerance under the assumption that specifications are not history-dependent (fusion-closed). Later, Gartner and Jhumka removed this assumption by presenting a modular extension of the Arora-Kulkarni method. This paper presents an implementation of the Gartner-Jhumka method which is evaluated on several examples. As additional safety net, we have added automatic verification of the results using the model checker Spin. In the context of this work, a fault in the Gartner-Jhumka method has been found. Though this fault is rare and does not cause incorrect results, there might be no result at all","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirements and Evaluation Procedures for eVoting 投票的要求和评估程序
M. Volkamer, Margaret McGaley
{"title":"Requirements and Evaluation Procedures for eVoting","authors":"M. Volkamer, Margaret McGaley","doi":"10.1109/ARES.2007.124","DOIUrl":"https://doi.org/10.1109/ARES.2007.124","url":null,"abstract":"Only the most trivial computer system can be expected to meet its requirements if those requirements are not specified. Despite the widespread use of electronic voting (evoting), no requirements catalogue exists that expresses the requirements for evoting systems with enough precision to be checkable. Nor do existing catalogues take evaluation techniques and certification procedures into account. This paper takes the first step towards the development of a new catalogue with corresponding assessment procedures, concentrating on a strict subset of evoting systems","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace 基于混合命名空间的协同数据网格强语义模型
Dalia El-Mansy, A. Sameh
{"title":"A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace","authors":"Dalia El-Mansy, A. Sameh","doi":"10.1109/ARES.2007.2","DOIUrl":"https://doi.org/10.1109/ARES.2007.2","url":null,"abstract":"The intention is to design a hybrid namespace collaboration model for existing organizations to pay lower cost (initial and running) in order to join it. Data resources will be allowed to have colliding names. The contributing organization will be free to set any rules for its internal users to follow (such as taxonomy). However, it will have to take care of a very simple interface to the intended model in order to introduce new contributed resources or to query external ones. Traditional data grids will join this model (represented by proxy agents) to provide their content while their owners can join as users of relevant servers to explore relevant resources to keep their content up to date. A hierarchical namespace will be maintained in order to uniquely identify data resources. (Full names are the local names prefixed with the ID of owner data grid for uniqueness.) If the full name is queried, the corresponding resource is sought in the wide group of collaborating data grids. If the local name is queried, it is fetched in the local data grid. Similar and related topics in different places in the hierarchy will be linked for robustness. Otherwise, a comprehensive search should be performed all over the whole hierarchy","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying a Tradeoff Model (TOM) to TACT 将权衡模型(TOM)应用于TACT
Raihan Al-Ekram, R. Holt, C. Hobbs
{"title":"Applying a Tradeoff Model (TOM) to TACT","authors":"Raihan Al-Ekram, R. Holt, C. Hobbs","doi":"10.1109/ARES.2007.42","DOIUrl":"https://doi.org/10.1109/ARES.2007.42","url":null,"abstract":"In a software system, it is inevitable that components will occasionally fail to produce acceptable results and become unavailable to serve its clients. Replication is the technique often used to increase the availability of a system. But replication introduces the issue of inconsistency among the replicas. TACT is a middleware toolkit for building services that can make a controlled and systematic tradeoff between the availability and the data consistency in the system. This paper presents a tradeoff model TOM that gives various properties and constraints that apply to a tradeoff situation. Using this model we show that the tradeoff in TACT is essentially 4 dimensional rather than just 2. The capacity and demand of the system adds additional dimensions to the basic availability and consistency tradeoff. We also show how TOM can be used to fulfil the QoS goals of the system with dynamically changing load and failure characteristics","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Aggregating and Deploying Network Access Control Policies 汇聚和部署网络访问控制策略
Joaquín García, F. Cuppens, N. Cuppens-Boulahia
{"title":"Aggregating and Deploying Network Access Control Policies","authors":"Joaquín García, F. Cuppens, N. Cuppens-Boulahia","doi":"10.1109/ARES.2007.34","DOIUrl":"https://doi.org/10.1109/ARES.2007.34","url":null,"abstract":"The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies - potentially easy to be evaded by unauthorized parties. We present in this paper a proposal to create, manage, and deploy consistent policies in those components in an efficient way. To do so, we combine two main approaches. The first approach is the use of an aggregation mechanism that yields consistent configurations or signals inconsistencies. Through this mechanism we can fold existing policies of a given system and create a consistent and global set of access control rules - easy to maintain and manage by using a single syntax. The second approach is the use of a refinement mechanism that guarantees the proper deployment of such a global set of rules into the system, yet free of inconsistencies","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114278256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials 支持神经学研究和临床试验的面向安全的电子基础设施
A. Stell, R. Sinnott, O. Ajayi, Jipu Jiang
{"title":"Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials","authors":"A. Stell, R. Sinnott, O. Ajayi, Jipu Jiang","doi":"10.1109/ARES.2007.137","DOIUrl":"https://doi.org/10.1109/ARES.2007.137","url":null,"abstract":"The neurological and wider clinical domains stand to gain greatly from the vision of the grid in providing seamless yet secure access to distributed, heterogeneous computational resources and data sets. Whilst a wealth of clinical data exists within local, regional and national healthcare boundaries, access to and usage of these data sets demands that fine grained security is supported and subsequently enforced. This paper explores the security challenges of the e-health domain, focusing in particular on authorization. The context of these explorations is the MRC funded VOTES (Virtual Organisations for Trials and Epidemiological Studies) and the JISC funded GLASS (Glasgow early adoption of Shibboleth project) which are developing Grid infrastructures for clinical trials with case studies in the brain trauma domain","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"490 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116819716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Approach for Adaptive Intrusion Prevention Based on The Danger 一种基于危险的自适应入侵防御方法
Alexander Krizhanovsky, A. Marasanov
{"title":"An Approach for Adaptive Intrusion Prevention Based on The Danger","authors":"Alexander Krizhanovsky, A. Marasanov","doi":"10.1109/ARES.2007.36","DOIUrl":"https://doi.org/10.1109/ARES.2007.36","url":null,"abstract":"Current approaches to intrusion detection are generally based on the observation of only one source of information such as network traffic, system calls, resource usage etc. However, we would get a more precise conclusion about the incident of intrusion if we used the entire available information. We are going to present an approach to an intrusion prevention system (IPS) which is inspired by the danger theory of immunology and tries to solve this problem by analyzing more sources of information. In this paper we will show how to link the entities which participate in the interactions described by this theory with components of the operating system for synthesizing of IPS. Well also introduce a technique inspired by the clonal selection mechanism of the human immune system which links the anomaly behavior of system processes with received network traffic and can generate new signatures of network intrusions on the fly","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"355 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114093917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning 在动态资源配置中使用SAML和XACML进行复杂授权场景
Y. Demchenko, L. Gommans, C. D. Laat
{"title":"Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning","authors":"Y. Demchenko, L. Gommans, C. D. Laat","doi":"10.1109/ARES.2007.157","DOIUrl":"https://doi.org/10.1109/ARES.2007.157","url":null,"abstract":"This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in grid-based collaborative applications and on-demand network services provisioning. The paper identifies basic resource provisioning models and specifies major requirements to authorisation (AuthZ) service infrastructure to support these models and focus on two main issues - AuthZ session support and policy expression for complex resource models. For the practical implementation, we investigate the use of two popular standards SAML and XACML for complex authorisation scenarios in dynamic resource provisioning across multiple administrative and security domains. The paper describes a proposed XML based AuthZ ticket format that is capable of supporting extended AuthZ session context. Additionally, the paper discusses what specific functionality should be added to existing grid-oriented authorization frameworks to handle dynamic domain-related security context including AuthZ session support. The paper is based on experiences gained from major grid based and grid oriented projects such as EGEE, NextGrid, Phosphorus and GigaPort research on network","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Efficient eAuction Protocol 一个有效的电子拍卖协议
B. Curtis, J. Pieprzyk, Jan Seruga
{"title":"An Efficient eAuction Protocol","authors":"B. Curtis, J. Pieprzyk, Jan Seruga","doi":"10.1109/ARES.2007.37","DOIUrl":"https://doi.org/10.1109/ARES.2007.37","url":null,"abstract":"A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126563532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research and Design of Mobile Impeachment System with Semi-cryptonym 半密码移动弹劾系统的研究与设计
Chaobo Yang, Ming Qi
{"title":"Research and Design of Mobile Impeachment System with Semi-cryptonym","authors":"Chaobo Yang, Ming Qi","doi":"10.1109/ARES.2007.125","DOIUrl":"https://doi.org/10.1109/ARES.2007.125","url":null,"abstract":"The mobile impeachment system with semi-cryptonym which is designed in this paper for the first time slakes impeachment's disadvantages of both cryptonym and autonym, whose evidences are mainly audio frequency, photo and video with letters as assistant. The system solves the problems of impeachment through network effectively with simple operations, faster transmission speed and better security. It also talks about some problems during the process of execution at the end of this paper","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"87 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128025482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信