The Second International Conference on Availability, Reliability and Security (ARES'07)最新文献

筛选
英文 中文
A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS 合作流动代理(CIA)的性能模型:IDS的安全方案
Rafael Páez, C. Satizábal, J. Forné
{"title":"A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS","authors":"Rafael Páez, C. Satizábal, J. Forné","doi":"10.1109/ARES.2007.13","DOIUrl":"https://doi.org/10.1109/ARES.2007.13","url":null,"abstract":"Intrusion detection systems (IDS) based on autonomous agents are important security tools to protect distributed networks and they can be considered critical systems. For this reason; we have proposed a security scheme to verify the entities' integrity inside the IDS architecture named cooperative itinerant agent (CIA). The proposal includes software watermarking and fingerprinting techniques. Moreover, in this paper we infer a formula to calculate the time consumed by a CIA to perform entities' verification in a determined level of the infrastructure in order to evaluate the agent's scalability. The parameters of this formula are the network's throughput and delay","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129401050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of QVT for the Development of Secure Data Warehouses: A case study QVT在安全数据仓库开发中的应用:一个案例研究
E. Soler, J. Trujillo, E. Fernández-Medina, M. Piattini
{"title":"Application of QVT for the Development of Secure Data Warehouses: A case study","authors":"E. Soler, J. Trujillo, E. Fernández-Medina, M. Piattini","doi":"10.1109/ARES.2007.39","DOIUrl":"https://doi.org/10.1109/ARES.2007.39","url":null,"abstract":"Security is a crucial aspect for the development of data warehouses (DW) because they contain sensitive information. The application of the model driven architecture (MDA) in the secure modeling of DWs allows obtaining the secure logical scheme from the conceptual model. In this paper, we apply the query/view/transformations (QVT) language to the development of a secure DW by means of a case study. First, we introduce the case study related to a typical sanitary system. Afterwards, with the application of a set of QVT relations, we transform all the captured security and audit requirements from the multidimensional conceptual model of the DW, to the logical level, by means of the construction of a snowflake model. From this scheme it turns out easier to obtain code for a specific platform that implements security and audit aspects","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128930504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol 基于遗忘神经网络评估协议的非对称指纹认证系统的ZeroBio评估与开发
Kei Nagai, H. Kikuchi, W. Ogata, M. Nishigaki
{"title":"ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol","authors":"Kei Nagai, H. Kikuchi, W. Ogata, M. Nishigaki","doi":"10.1109/ARES.2007.162","DOIUrl":"https://doi.org/10.1109/ARES.2007.162","url":null,"abstract":"We propose a cryptographic protocol for biometrics authentication without revealing personal biometrical data against malicious verifier. Our protocol uses a neural network and zero-knowledge interactive proof. In this paper, we developed a sample implementation system of our proposed protocol and we evaluate the performance and the accuracy of the proposed protocol. Especially, we study several algorithms for feature extraction of minutiae of fingerprint which is appropriate to our protocol. We examine false acceptance rates and rejection rates","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115909892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Semantic and Time Related Recommendation-Feedback Trust Model 语义与时间相关的推荐反馈信任模型
Zhang Lin, Xu Feng, Wang Yuan, Lv Jian
{"title":"A Semantic and Time Related Recommendation-Feedback Trust Model","authors":"Zhang Lin, Xu Feng, Wang Yuan, Lv Jian","doi":"10.1109/ARES.2007.26","DOIUrl":"https://doi.org/10.1109/ARES.2007.26","url":null,"abstract":"Decentralized networks have gained widespread attentions recently. Trust management is a new method fit for the characteristics of the decentralized networks. This paper proposes a recommendation-feedback trust model which is based on the semantic similarities of the roles and is time related. In this model, we propose an algorithm which could collect as much information as possible in a given time, and access control decisions could be made with the information. Recommenders' reputation is updated according to the correctness of the recommendation. Semantic and time are used to process the information","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128469829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology 根据BS 7799使用OCTAVE方法设计安全策略
J. Paulina, P. Marek
{"title":"Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology","authors":"J. Paulina, P. Marek","doi":"10.1109/ARES.2007.69","DOIUrl":"https://doi.org/10.1109/ARES.2007.69","url":null,"abstract":"In the article, authors conduct a discussion concerning a methodology that improves the decision making process for the issues of information protection and management within a company. Authors describe the OCTAVE methodology (the operationally critical threat, asset, and vulnerability evaluation), including examples and refer to many legal regulations. Usage of OCTAVE in the process of creating a security policy is being subject to analysis. The article aims at presenting a methodology, which is successfully used in Western-European countries and proving that it can be adapted for implementations in other countries, fitting well into the policies of various institutions. The authors wish to bring closer the guidelines for creating a security policy and deploying security measures within institutions","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132521030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies 动态访问政策下跨多个政府机构的信息共享框架
K. Bhoopalam, K. Maly, R. Mukkamala, M. Zubair
{"title":"Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies","authors":"K. Bhoopalam, K. Maly, R. Mukkamala, M. Zubair","doi":"10.1109/ARES.2007.92","DOIUrl":"https://doi.org/10.1109/ARES.2007.92","url":null,"abstract":"One of the government missions identified by the federal enterprise architecture is to use computer and networking technologies to develop infrastructure to support information sharing within government organizations as well as with external stakeholders. Currently, considerable information is being maintained at individual organizations in the form of large repositories/digital libraries with no efficient means of sharing it with other government organizations and with other external user communities, including the general public. A major obstacle to information sharing is the lack of a framework and an infrastructure that allows government organizations to share information selectively with different user groups. Lack of such a framework creates unwillingness among government organizations to share their digital content. A mechanism needs to be in place where policy makers can specify which documents can be moved from one organization to another organization and/or who can access these transferred documents. Furthermore, a system is needed that enforces these policies in realtime when external events dictate a change of policies. In this paper, we propose a framework for specification, management and enforcement of dynamic access policies across multiple geographically distributed organizations. The framework can be instantiated to integrate with individual digital library systems and provide the necessary infrastructure to provide policy controlled access control management","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132899934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security Objectives within a Security Testing Case Study 安全测试用例研究中的安全目标
K. Karppinen, R. Savola, M. Rapeli, Esa Tikkala
{"title":"Security Objectives within a Security Testing Case Study","authors":"K. Karppinen, R. Savola, M. Rapeli, Esa Tikkala","doi":"10.1109/ARES.2007.136","DOIUrl":"https://doi.org/10.1109/ARES.2007.136","url":null,"abstract":"Obviously, there is a need for automated information security analysis, validation, evaluation and testing approaches. Unfortunately, there is no state-of-art approach to carrying out information security evaluation in a systematic way. Information security evaluation of software-intensive and telecommunications systems typically relies heavily on the experience of the security professionals. Requirements are within the focus of the information security evaluation process. Information security requirements can be based on iterative risk, threat and vulnerability analyses, and technical and architectural information. There is a need for more practical ways to carry out this iterative process. In this paper we discuss security evaluation process, security objectives and security requirements from the basis of the experiences of a security testing project","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"54 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130876395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
RFID Security Issues in Military Supply Chains 军事供应链中的RFID安全问题
Q. Xiao, Cam Boulet, T. Gibbons
{"title":"RFID Security Issues in Military Supply Chains","authors":"Q. Xiao, Cam Boulet, T. Gibbons","doi":"10.1109/ARES.2007.127","DOIUrl":"https://doi.org/10.1109/ARES.2007.127","url":null,"abstract":"Radio frequency identification (RFID) technologies have been used by the military to gain in-transit visibility and improve inventory management. The advantages of using RFID to track assets over using barcode have been broadly recognized. However, recent research has proven that RFID is vulnerable to attacks. This brings a challenge at a time when RFID systems are being employed in various applications, including military supply chain systems. In this paper, underlying vulnerabilities of RFID system are analyzed, different attacks that can be made against RFID system are illustrated, and countermeasures against the attacks are recommended. The objective of this article is to secure military logistics by identifying the common threats to RFID systems","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Dirichlet Reputation Systems 狄利克雷信誉系统
A. Jøsang, J. Haller
{"title":"Dirichlet Reputation Systems","authors":"A. Jøsang, J. Haller","doi":"10.1109/ARES.2007.71","DOIUrl":"https://doi.org/10.1109/ARES.2007.71","url":null,"abstract":"Reputation systems can be used in online markets and communities in order to stimulate quality and good behaviour as well as to sanction poor quality and bad behaviour. The basic idea is to have a mechanism for rating services on various aspects, and a way of computing reputation scores based on the ratings from many different parties. By making the reputation scores public, such systems can assist parties in deciding whether or not to use a particular service. Reputation systems represent soft security mechanisms for social control. This article presents a type of reputation system based on the Dirichlet probability distribution which is a multinomial Bayesian probability distribution. Dirichlet reputation systems represent a generalisation of the binomial Beta reputation system. The multinomial aspect of Dirichlet reputation systems means that any set of discrete rating levels can be defined. This provides great flexibility and usability, as well as a sound basis for designing reputation systems","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122293699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 216
Self-Stabilization as a Foundation for Autonomic Computing 自稳定作为自主计算的基础
Olga Brukman, S. Dolev, Yinnon A. Haviv, Reuven Yagel
{"title":"Self-Stabilization as a Foundation for Autonomic Computing","authors":"Olga Brukman, S. Dolev, Yinnon A. Haviv, Reuven Yagel","doi":"10.1109/ARES.2007.141","DOIUrl":"https://doi.org/10.1109/ARES.2007.141","url":null,"abstract":"This position paper advocates the use of the well defined and provable self-stabilization property of a system, to achieve the goals of the self-* paradigms and autonomic computing. Several recent results starting from hardware concerns, continuing with the operating system, and ending in the applications, are integrated: the self-stabilizing microprocessor, with the self-stabilizing operating system, the self-stabilization preserving compiler, and the self-stabilizing autonomic recoverer for applications","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125248838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信