{"title":"Analysis on Bleichenbacher's Forgery Attack","authors":"T. Izu, M. Takenaka, Takeshi Shimoyama","doi":"10.1109/ARES.2007.38","DOIUrl":"https://doi.org/10.1109/ARES.2007.38","url":null,"abstract":"In 2006, Bleichenbacher presented a new forgery attack against the signature scheme RSASSA-PKCS1-v1_5. The attack allows an adversary to forge a signature on almost arbitrary messages, if an implementation is not proper. Since the example was only limited to the case when the public exponent is 3 and the bit-length of the public composite is 3072, a potential threat is not known. This paper analyzes Bleichenbacher's forgery attack and shows applicable composite sizes for given exponents. We also propose two extended attacks with numerical examples","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116376512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Model and Architecture for Multichannel E-Government Systems","authors":"M. Fugini","doi":"10.1109/ARES.2007.25","DOIUrl":"https://doi.org/10.1109/ARES.2007.25","url":null,"abstract":"This paper presents a service-oriented model and architecture for security in multichannel information systems of public administration, where services can be delivered to citizens and enterprises on various channels, including mobile systems. The model and architecture are based on the definition of service delivery channels given in some ongoing e-government projects. In particular, the security model is framed in the field of services to e-employment, as studied in the SEEMP (Single European Employment Market Place) project, using models and tools that have been implemented in a previous project on adaptive multichannel information systems","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126374693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Universally Composable Three-Party Key Distribution","authors":"TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang","doi":"10.1109/ARES.2007.155","DOIUrl":"https://doi.org/10.1109/ARES.2007.155","url":null,"abstract":"In this paper, we formulate and realize a definition of security for three-party key distribution within the universally composable (UC) framework. That is, an appropriate ideal functionality that captures the basic security requirements of three-party key distribution is formulated. We show that UC definition of security for three-party key distribution protocol is strictly more stringent than a previous definition of security which is termed AKE-security. Finally, we present a real-life protocol that securely realizes the formulated ideal functionality with respect to non-adaptive adversaries","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127076152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reputation Management Survey","authors":"Sini Ruohomaa, L. Kutvonen, Eleni Koutrouli","doi":"10.1109/ARES.2007.123","DOIUrl":"https://doi.org/10.1109/ARES.2007.123","url":null,"abstract":"Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the uncertainty and risk inherent in the environment. Reputation systems provide essential input for computational trust as predictions on future behaviour based on the past actions of a peer In order to analyze the maturity of current reputation systems, we compare eleven reputation systems within a taxonomy of the credibility aspects of a reputation system. The taxonomy covers three topics: 1) the creation and content of a recommendation, 2) the selection and use of recommenders, and 3) the interpretation and reasoning applied to the gathered information. Although we find it possible to form a trusted reputation management network over an open network environment, there are still many regulatory and technical obstacles to address. This survey reveals various good mechanisms and methods used, but the area still requires both a) formation of standard mechanisms and metrics for reputation system collaboration and b) standard metainformation of right granularity for evaluating the credibility of reputation information provided","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128272659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Programming Models for Service-Level High Availability","authors":"C. Engelmann, S. Scott, C. Leangsuksun, Xubin He","doi":"10.1109/ARES.2007.109","DOIUrl":"https://doi.org/10.1109/ARES.2007.109","url":null,"abstract":"This paper provides an overview of existing programming models for service-level high availability and investigates their differences, similarities, advantages, and disadvantages. Its goal is to help to improve reuse of code and to allow adaptation to quality of service requirements by using a uniform programming model description. It further aims at encouraging a discussion about these programming models and their provided quality of service, such as availability, performance, serviceability, usability, and applicability. Within this context, the presented research focuses on providing high availability for services running on head and service nodes of high-performance computing systems","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130846666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems","authors":"Lorenz Froihofer, Johannes Osrael, K. M. Göschka","doi":"10.1109/ARES.2007.64","DOIUrl":"https://doi.org/10.1109/ARES.2007.64","url":null,"abstract":"Integrity constraints are an important means to discover and specify application requirements. Although they are explicitly available and discussed during the system analysis and design phases, the constraint validation functionality is generally still tangled with other implementation code, e.g., the business logic, in today's systems. We contribute with an approach to decouple the integrity constraints from the business logic as well as the setpoints of constraint validation from the business activities. This allows us to balance dependability with respect to node and link failures by temporarily relaxing constraint consistency. Our prototype implementation indicates that this approach is typically worth its effort in systems where availability is of higher priority than strict consistency and a roll-forward approach to system repair, e.g., through compensating actions, is preferred over generic rollback-based solutions","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exception Handling in an Event-Driven System","authors":"Jan Ploski, W. Hasselbring","doi":"10.1109/ARES.2007.85","DOIUrl":"https://doi.org/10.1109/ARES.2007.85","url":null,"abstract":"Exception handling mechanisms were invented in 1970s to support structured programming methods for hierarchically organised software systems. The need to increase reusability and flexibility led to the development of new programming paradigms that do not emphasise hierarchical design. Event-driven systems n which objects communicate using notifications about changed states - are a prime example. Unfortunately, this style of communication makes exception handling more difficult than in hierarchical systems. We contribute an analysis of the factors which influence exception handling in event-driven systems. The main focus of our discussion lies on the challenge of appropriate exception propagation. We provide results from an empirical case study performed on the source code of the Eclipse IDE that support our analysis","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Koji Chida, H. Kikuchi, Gembu Morohashi, K. Hirota
{"title":"Efficient Multiparty Computation for Comparator Networks","authors":"Koji Chida, H. Kikuchi, Gembu Morohashi, K. Hirota","doi":"10.1109/ARES.2007.77","DOIUrl":"https://doi.org/10.1109/ARES.2007.77","url":null,"abstract":"We propose a multiparty protocol for various computations using comparator networks such as sorting and searching. By repeating the execution of a comparator, the proposed protocol can efficiently detect outlier values, without revealing them. In our scenario, all input values to a comparator network and the intermediate output from each comparator are kept secret assuming the presence of an honest majority. Possible application areas for the proposed protocol include statistical analysis while preserving the privacy of respondents","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115015646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building a Dependable Messaging Infrastructure for Electronic Government","authors":"Elsa Estevez, T. Janowski","doi":"10.1109/ARES.2007.53","DOIUrl":"https://doi.org/10.1109/ARES.2007.53","url":null,"abstract":"The paper presents the development of a dependable messaging infrastructure for electronic government. Based on a few simple concepts like messages, members and channels, the infrastructure was developed to facilitate the exchange of messages by government agencies in a dependable and automated way. The dependability requirement was addressed on various levels: design, development and application. Considering design, the infrastructure comprises a small core offering plain messaging services, a repository of extensions to provide additional services, and a development framework to rigorously specify, implement and verify messaging extensions. Considering development, the infrastructure was build through rigorous use of modeling and analysis in various development stages. Considering applications, government agencies can use the infrastructure to exchange messages through carefully managed logical communication channels and the prudent use of necessary extensions, including extensions to implement required security measures. The paper presents the development and explains why the outcome satisfies the dependability requirement","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123306496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications","authors":"O. Jorns, O. Jung, G. Quirchmayr","doi":"10.1109/ARES.2007.16","DOIUrl":"https://doi.org/10.1109/ARES.2007.16","url":null,"abstract":"Network operators gradually open their interfaces to formerly hidden services. This fosters the development of a new class of mobile applications that take into account user's location and presence information. However, this development also raises problems especially the lack of protection of privacy in location-based services. This paper proposes a service architecture that is aimed at overcoming some of the shortages of currently existing context-aware applications that make use of network providers services as well as existing mobile payment systems. We therefore introduce the combination of tickets together with a novel privacy enhancing mechanism that is based on the notion of pseudonyms. Compared to other privacy enhancing solutions our pseudonym mechanism can also be implemented on mobile devices that have some restrictions regarding resources like memory or processing power. Due to their flexibility tickets can be used for many different kinds of applications. One important aspect in this respect is the highly postulated pay-as-you-go model. We give an example of a transport ticket application and explain the message interaction patterns for the basic functionalities of the systems, regarding aspects like data and privacy protection. This example further shows how 3rd party application providers can build meaningful mobile applications that are accepted by users","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128832946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}