{"title":"A flexible authorization mechanism for virtual organizations","authors":"D. Baltatzis, C. Georgiadis, G. Pangalos","doi":"10.1109/CCST.2005.1594853","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594853","url":null,"abstract":"Authorization decisions are a critical security concern in today's distributed large information systems. These authorizations are significantly different from those in centralized or smaller systems. Mobile agent technology on the other hand provides a useful tool to explore and facilitate information sharing in distributed systems. However, agents are often restricted by the security problems related to the large scale distributed systems and the multi-user operating system environments within they usually operate. This article provides a suitable framework for authorizing mobile agents where an outsized and dynamic set of principals forming a virtual organization (VO), with mutual mistrust between them, has to rely on pieces of application code which autonomously migrate and execute on consecutive hosts. The role based access control model (RBAC) is used for dynamically assigning security roles to visiting agents on each hosting platform. The proposed methodology is particularly suitable for handling authorizations in VOs.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"24 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ferro, F. Liberal, A. Muñoz, I. Delgado, A. Beaumont
{"title":"Software architecture based on multiprocessor platform to apply complex intrusion detection techniques","authors":"A. Ferro, F. Liberal, A. Muñoz, I. Delgado, A. Beaumont","doi":"10.1109/CCST.2005.1594847","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594847","url":null,"abstract":"The importance of security issues in network environments has increased greatly lately. Intrusion detection systems play an important role in network security environments. Nevertheless, nowadays, data network speed is so high that performing intrusion detection tasks becomes challenging. This paper presents a software architecture that intends to exploit the parallelism available on up-to-date and future workstations to apply intrusion detection rules in high speed networks. To achieve this, a shared memory multiprocessor system has been developed. The system includes a powerful rule language that adds big flexibility to the system.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk assessment and risk evaluation of CIO's position","authors":"Eugenio Orlandi","doi":"10.1109/CCST.2005.1594858","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594858","url":null,"abstract":"In the turmoil of globalization, nothing is stable except change. As far as enterprises are concerned, cost reduction is a must. The information technology (IT) function is the ideal candidate to experiment rightsizing and outsourcing policies that seem the best way to ensure competitiveness. The CIO (Chief Information Officer) is the natural candidate scapegoat. To avoid this fate, the today \"new CIO leader\" has to overcome the traditional role of technical expert and implement strategies for the survival of the IS unit. In this effort, the conceptual framework of IT security can be of help. The contingency planning and risk management techniques applied to the IS unit require ad hoc models to define the exact nature of threats, vulnerabilities, and countermeasures.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117268520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategy for improving the reliability in the facial identification","authors":"C. Travieso, J. B. Alonso, Miguel A. Ferrer","doi":"10.1109/CCST.2005.1594833","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594833","url":null,"abstract":"This paper presents a simple, robust and novel for errors detection in biometric system which is applied to the Olivetti Research Laboratory (ORL) face database (400 images). We have used as parameterisation different transformed dominions (Travieso et al., 2004; Faundez, 2003), and a support vector machine (SVM) (Burges, 1998; Cristianini and Shawe-Taylor, 2000) as classifier. This system has been adjusted with our experiments for obtaining a false identification rate (FIR) of 0%, with a success rate of 90.8% a rejected samples rate of 9.2%.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fitting ear contour using an ovoid model","authors":"L. Álvarez, E. González, L. Mazorra","doi":"10.1109/CCST.2005.1594829","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594829","url":null,"abstract":"Ear analysis is an emergent biometric application. The main advantages are the no requirement for subject contact and acquisition without demand. To recognize a subject's ear, we aim to extract a characteristic vector from a human ear image that may subsequently be used to identify or confirm the identity of the owner. Towards this end, a new technique, combining geodesic active contours and a new ovoid model, has been developed, which can be used to compare ears in an independent way of the ear location and size","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Virtual Presence/spl reg/, predictive analysis and pre-emptive intervention using wired and wirelessly networked, interactive, video, voice and control technology - a case study","authors":"O. D'Souza","doi":"10.1109/CCST.2005.1594838","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594838","url":null,"abstract":"Security system configurations, especially command and control, are vital to the management of \"safe and secure\" environments, often delivering \"reactive\" capability to support investigative initiatives, post incident and not designed to perform pre-emptive tasks. In this case study, Virtual Presence/spl reg/ predictive analysis tools and preemptive intervention are tools used effectively to reduce the occurrences of security/safety incidents. The concept is to use pre-emptive strategies that enable the delivery of effective deterrents and logistic support, right to the \"first responders\", so that they are better informed and hence have a better chance of deploying counter measures to reduce the predicted risk. The use of video (visible and invisible spectra), active and passive multi-sensor arrays, software digital analysis robots (SoftBOTs), connected via a network links are part of an effective solution that facilitates \"collaboration\" between operatives and experts to make effective use of their time and improve efficient use of their services.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intranet Security using Attribute Certificates under the Privilege Management Infrastructure","authors":"Pi-Ju Tsai, Dwen-Ren Tsai, Wen-Pin Tai","doi":"10.1109/CCST.2005.1594859","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594859","url":null,"abstract":"In the computerized organizations, the public key infrastructure (PKI) certifications enforce authentication services providing stronger security. The PKI provides a framework to verify the identity of each entity in a given domain. The PKI framework includes mechanisms of requesting, issuing, signing, and validating public-key certificates. The privilege management infrastructure (PMI) framework determines whether the entity is authorized to access specific resources. It includes the issuance and validation of attribute certificates. Public-key certificates are certificates for trusting public-key, while attribute certificates are certificates for trusting privilege attribute. In the practical cases, when the system identifies a user's identity, it allocates the right permissions to the resources to the user according to the roles he/she played. This permission control mechanism is called the role-based access control (RBAC). This paper addresses an efficient privilege management mechanism, based on PMI and RBAC, to achieve the information security objectives of non-repudiation, integrity, and security. A security model is built to solve problems of privilege management and duty delegation.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High resolution CWLFM radar for vessel detection and idenfication for maritime border security","authors":"C. Duarte, B. Naranjo, A.A. Lopez, A.B. del Campo","doi":"10.1109/CCST.2005.1594856","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594856","url":null,"abstract":"Continuous wave lineal frequency modulated (CWLFM) radar presents some interesting advantages for control and coast surveillance as well as low probability of interception (LPI), high resolution and does not present \"blind spots\". In this paper, a comparation between optic surveillance systems and CWLFM radar is made. Moreover, radar behaviour with unfavourable meteorological conditions is discussed. Also are presented results obtained with a radar prototype and processed with ISAR techniques. These images are suitable for ship identification. Finally, the paper expose results of an automatic system of ship identification applied to these images","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134577775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements and biometric technology matching: two approaches from European projects","authors":"A. Pasic, E. Norgaard","doi":"10.1109/CCST.2005.1594850","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594850","url":null,"abstract":"At the moment, many multimodal biometric schemes and initiatives are carried out. Either still experimental or towards full implementation. On the other hand, relatively little attention is given to the operational environment analysis including user and system requirements, impact caused by specific choice of biometric technologies, related security and privacy aspects of the processes, divergence between biometrics suppliers, etc. In this paper, we focus on some of these issues, investigated in two different European projects: secure phone and secure justice","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133359591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Based analysis of interaction between human subject and artificial system - impacts of driver attention failures on transport reliability and safety","authors":"R. Volner","doi":"10.1109/CCST.2005.1594834","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594834","url":null,"abstract":"Human society needs still more intensive exploitation of all kinds of transportation facilities. This need lasts already several decades and is much more imperative in future. Mobility is one of most strict requirements for survival, besides the energy and food resources, health care and security. The requirements on transportation systems concern not only the quantitative and qualitative aspects of transportation activities, but still more also the aspects of their reliability and safety. This concerns not only the transported subjects or goods, but also the environment. In spite of the fact significant progress was made in recent years as concerns the transportation systems automation, the fully automatic transportation system in use is still for-seen in the considerably far future. Analyzing the reliability and safety of transportation, one finds that the activity of human being is the weakest point. The technical reliability of almost all the transportation tools has improved quite a lot in recent years, however the human subject interacting with them has not changed too much, as concerns his/her reliability and safety of the respective necessary interaction. Therefore, there is a hard necessity to improve it and the possibilities how to increase it stays still more in the focus of our interest. In this contribution, the overview of related problems is made, the challenges for further research and development in this area are discussed and the outline of the vision of with respect to human interaction reliability optimized transportation systems is presented.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}