{"title":"A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS","authors":"Rafael Páez, C. Satizábal, J. Forné","doi":"10.1109/ARES.2007.13","DOIUrl":"https://doi.org/10.1109/ARES.2007.13","url":null,"abstract":"Intrusion detection systems (IDS) based on autonomous agents are important security tools to protect distributed networks and they can be considered critical systems. For this reason; we have proposed a security scheme to verify the entities' integrity inside the IDS architecture named cooperative itinerant agent (CIA). The proposal includes software watermarking and fingerprinting techniques. Moreover, in this paper we infer a formula to calculate the time consumed by a CIA to perform entities' verification in a determined level of the infrastructure in order to evaluate the agent's scalability. The parameters of this formula are the network's throughput and delay","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129401050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Soler, J. Trujillo, E. Fernández-Medina, M. Piattini
{"title":"Application of QVT for the Development of Secure Data Warehouses: A case study","authors":"E. Soler, J. Trujillo, E. Fernández-Medina, M. Piattini","doi":"10.1109/ARES.2007.39","DOIUrl":"https://doi.org/10.1109/ARES.2007.39","url":null,"abstract":"Security is a crucial aspect for the development of data warehouses (DW) because they contain sensitive information. The application of the model driven architecture (MDA) in the secure modeling of DWs allows obtaining the secure logical scheme from the conceptual model. In this paper, we apply the query/view/transformations (QVT) language to the development of a secure DW by means of a case study. First, we introduce the case study related to a typical sanitary system. Afterwards, with the application of a set of QVT relations, we transform all the captured security and audit requirements from the multidimensional conceptual model of the DW, to the logical level, by means of the construction of a snowflake model. From this scheme it turns out easier to obtain code for a specific platform that implements security and audit aspects","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128930504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol","authors":"Kei Nagai, H. Kikuchi, W. Ogata, M. Nishigaki","doi":"10.1109/ARES.2007.162","DOIUrl":"https://doi.org/10.1109/ARES.2007.162","url":null,"abstract":"We propose a cryptographic protocol for biometrics authentication without revealing personal biometrical data against malicious verifier. Our protocol uses a neural network and zero-knowledge interactive proof. In this paper, we developed a sample implementation system of our proposed protocol and we evaluate the performance and the accuracy of the proposed protocol. Especially, we study several algorithms for feature extraction of minutiae of fingerprint which is appropriate to our protocol. We examine false acceptance rates and rejection rates","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115909892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semantic and Time Related Recommendation-Feedback Trust Model","authors":"Zhang Lin, Xu Feng, Wang Yuan, Lv Jian","doi":"10.1109/ARES.2007.26","DOIUrl":"https://doi.org/10.1109/ARES.2007.26","url":null,"abstract":"Decentralized networks have gained widespread attentions recently. Trust management is a new method fit for the characteristics of the decentralized networks. This paper proposes a recommendation-feedback trust model which is based on the semantic similarities of the roles and is time related. In this model, we propose an algorithm which could collect as much information as possible in a given time, and access control decisions could be made with the information. Recommenders' reputation is updated according to the correctness of the recommendation. Semantic and time are used to process the information","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128469829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology","authors":"J. Paulina, P. Marek","doi":"10.1109/ARES.2007.69","DOIUrl":"https://doi.org/10.1109/ARES.2007.69","url":null,"abstract":"In the article, authors conduct a discussion concerning a methodology that improves the decision making process for the issues of information protection and management within a company. Authors describe the OCTAVE methodology (the operationally critical threat, asset, and vulnerability evaluation), including examples and refer to many legal regulations. Usage of OCTAVE in the process of creating a security policy is being subject to analysis. The article aims at presenting a methodology, which is successfully used in Western-European countries and proving that it can be adapted for implementations in other countries, fitting well into the policies of various institutions. The authors wish to bring closer the guidelines for creating a security policy and deploying security measures within institutions","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132521030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies","authors":"K. Bhoopalam, K. Maly, R. Mukkamala, M. Zubair","doi":"10.1109/ARES.2007.92","DOIUrl":"https://doi.org/10.1109/ARES.2007.92","url":null,"abstract":"One of the government missions identified by the federal enterprise architecture is to use computer and networking technologies to develop infrastructure to support information sharing within government organizations as well as with external stakeholders. Currently, considerable information is being maintained at individual organizations in the form of large repositories/digital libraries with no efficient means of sharing it with other government organizations and with other external user communities, including the general public. A major obstacle to information sharing is the lack of a framework and an infrastructure that allows government organizations to share information selectively with different user groups. Lack of such a framework creates unwillingness among government organizations to share their digital content. A mechanism needs to be in place where policy makers can specify which documents can be moved from one organization to another organization and/or who can access these transferred documents. Furthermore, a system is needed that enforces these policies in realtime when external events dictate a change of policies. In this paper, we propose a framework for specification, management and enforcement of dynamic access policies across multiple geographically distributed organizations. The framework can be instantiated to integrate with individual digital library systems and provide the necessary infrastructure to provide policy controlled access control management","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132899934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Objectives within a Security Testing Case Study","authors":"K. Karppinen, R. Savola, M. Rapeli, Esa Tikkala","doi":"10.1109/ARES.2007.136","DOIUrl":"https://doi.org/10.1109/ARES.2007.136","url":null,"abstract":"Obviously, there is a need for automated information security analysis, validation, evaluation and testing approaches. Unfortunately, there is no state-of-art approach to carrying out information security evaluation in a systematic way. Information security evaluation of software-intensive and telecommunications systems typically relies heavily on the experience of the security professionals. Requirements are within the focus of the information security evaluation process. Information security requirements can be based on iterative risk, threat and vulnerability analyses, and technical and architectural information. There is a need for more practical ways to carry out this iterative process. In this paper we discuss security evaluation process, security objectives and security requirements from the basis of the experiences of a security testing project","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"54 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130876395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID Security Issues in Military Supply Chains","authors":"Q. Xiao, Cam Boulet, T. Gibbons","doi":"10.1109/ARES.2007.127","DOIUrl":"https://doi.org/10.1109/ARES.2007.127","url":null,"abstract":"Radio frequency identification (RFID) technologies have been used by the military to gain in-transit visibility and improve inventory management. The advantages of using RFID to track assets over using barcode have been broadly recognized. However, recent research has proven that RFID is vulnerable to attacks. This brings a challenge at a time when RFID systems are being employed in various applications, including military supply chain systems. In this paper, underlying vulnerabilities of RFID system are analyzed, different attacks that can be made against RFID system are illustrated, and countermeasures against the attacks are recommended. The objective of this article is to secure military logistics by identifying the common threats to RFID systems","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dirichlet Reputation Systems","authors":"A. Jøsang, J. Haller","doi":"10.1109/ARES.2007.71","DOIUrl":"https://doi.org/10.1109/ARES.2007.71","url":null,"abstract":"Reputation systems can be used in online markets and communities in order to stimulate quality and good behaviour as well as to sanction poor quality and bad behaviour. The basic idea is to have a mechanism for rating services on various aspects, and a way of computing reputation scores based on the ratings from many different parties. By making the reputation scores public, such systems can assist parties in deciding whether or not to use a particular service. Reputation systems represent soft security mechanisms for social control. This article presents a type of reputation system based on the Dirichlet probability distribution which is a multinomial Bayesian probability distribution. Dirichlet reputation systems represent a generalisation of the binomial Beta reputation system. The multinomial aspect of Dirichlet reputation systems means that any set of discrete rating levels can be defined. This provides great flexibility and usability, as well as a sound basis for designing reputation systems","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122293699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olga Brukman, S. Dolev, Yinnon A. Haviv, Reuven Yagel
{"title":"Self-Stabilization as a Foundation for Autonomic Computing","authors":"Olga Brukman, S. Dolev, Yinnon A. Haviv, Reuven Yagel","doi":"10.1109/ARES.2007.141","DOIUrl":"https://doi.org/10.1109/ARES.2007.141","url":null,"abstract":"This position paper advocates the use of the well defined and provable self-stabilization property of a system, to achieve the goals of the self-* paradigms and autonomic computing. Several recent results starting from hardware concerns, continuing with the operating system, and ending in the applications, are integrated: the self-stabilizing microprocessor, with the self-stabilizing operating system, the self-stabilization preserving compiler, and the self-stabilizing autonomic recoverer for applications","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125248838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}