Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
A flexible authorization mechanism for virtual organizations 为虚拟组织提供灵活的授权机制
D. Baltatzis, C. Georgiadis, G. Pangalos
{"title":"A flexible authorization mechanism for virtual organizations","authors":"D. Baltatzis, C. Georgiadis, G. Pangalos","doi":"10.1109/CCST.2005.1594853","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594853","url":null,"abstract":"Authorization decisions are a critical security concern in today's distributed large information systems. These authorizations are significantly different from those in centralized or smaller systems. Mobile agent technology on the other hand provides a useful tool to explore and facilitate information sharing in distributed systems. However, agents are often restricted by the security problems related to the large scale distributed systems and the multi-user operating system environments within they usually operate. This article provides a suitable framework for authorizing mobile agents where an outsized and dynamic set of principals forming a virtual organization (VO), with mutual mistrust between them, has to rely on pieces of application code which autonomously migrate and execute on consecutive hosts. The role based access control model (RBAC) is used for dynamically assigning security roles to visiting agents on each hosting platform. The proposed methodology is particularly suitable for handling authorizations in VOs.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"24 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software architecture based on multiprocessor platform to apply complex intrusion detection techniques 软件架构基于多处理器平台,应用复杂的入侵检测技术
A. Ferro, F. Liberal, A. Muñoz, I. Delgado, A. Beaumont
{"title":"Software architecture based on multiprocessor platform to apply complex intrusion detection techniques","authors":"A. Ferro, F. Liberal, A. Muñoz, I. Delgado, A. Beaumont","doi":"10.1109/CCST.2005.1594847","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594847","url":null,"abstract":"The importance of security issues in network environments has increased greatly lately. Intrusion detection systems play an important role in network security environments. Nevertheless, nowadays, data network speed is so high that performing intrusion detection tasks becomes challenging. This paper presents a software architecture that intends to exploit the parallelism available on up-to-date and future workstations to apply intrusion detection rules in high speed networks. To achieve this, a shared memory multiprocessor system has been developed. The system includes a powerful rule language that adds big flexibility to the system.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Risk assessment and risk evaluation of CIO's position CIO职位的风险评估和风险评价
Eugenio Orlandi
{"title":"Risk assessment and risk evaluation of CIO's position","authors":"Eugenio Orlandi","doi":"10.1109/CCST.2005.1594858","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594858","url":null,"abstract":"In the turmoil of globalization, nothing is stable except change. As far as enterprises are concerned, cost reduction is a must. The information technology (IT) function is the ideal candidate to experiment rightsizing and outsourcing policies that seem the best way to ensure competitiveness. The CIO (Chief Information Officer) is the natural candidate scapegoat. To avoid this fate, the today \"new CIO leader\" has to overcome the traditional role of technical expert and implement strategies for the survival of the IS unit. In this effort, the conceptual framework of IT security can be of help. The contingency planning and risk management techniques applied to the IS unit require ad hoc models to define the exact nature of threats, vulnerabilities, and countermeasures.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117268520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Strategy for improving the reliability in the facial identification 提高人脸识别可靠性的策略
C. Travieso, J. B. Alonso, Miguel A. Ferrer
{"title":"Strategy for improving the reliability in the facial identification","authors":"C. Travieso, J. B. Alonso, Miguel A. Ferrer","doi":"10.1109/CCST.2005.1594833","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594833","url":null,"abstract":"This paper presents a simple, robust and novel for errors detection in biometric system which is applied to the Olivetti Research Laboratory (ORL) face database (400 images). We have used as parameterisation different transformed dominions (Travieso et al., 2004; Faundez, 2003), and a support vector machine (SVM) (Burges, 1998; Cristianini and Shawe-Taylor, 2000) as classifier. This system has been adjusted with our experiments for obtaining a false identification rate (FIR) of 0%, with a success rate of 90.8% a rejected samples rate of 9.2%.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fitting ear contour using an ovoid model 用卵形模型拟合耳朵轮廓
L. Álvarez, E. González, L. Mazorra
{"title":"Fitting ear contour using an ovoid model","authors":"L. Álvarez, E. González, L. Mazorra","doi":"10.1109/CCST.2005.1594829","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594829","url":null,"abstract":"Ear analysis is an emergent biometric application. The main advantages are the no requirement for subject contact and acquisition without demand. To recognize a subject's ear, we aim to extract a characteristic vector from a human ear image that may subsequently be used to identify or confirm the identity of the owner. Towards this end, a new technique, combining geodesic active contours and a new ovoid model, has been developed, which can be used to compare ears in an independent way of the ear location and size","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
A Virtual Presence/spl reg/, predictive analysis and pre-emptive intervention using wired and wirelessly networked, interactive, video, voice and control technology - a case study 使用有线和无线网络、互动、视频、语音和控制技术的虚拟存在、预测分析和先发制人的干预——一个案例研究
O. D'Souza
{"title":"A Virtual Presence/spl reg/, predictive analysis and pre-emptive intervention using wired and wirelessly networked, interactive, video, voice and control technology - a case study","authors":"O. D'Souza","doi":"10.1109/CCST.2005.1594838","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594838","url":null,"abstract":"Security system configurations, especially command and control, are vital to the management of \"safe and secure\" environments, often delivering \"reactive\" capability to support investigative initiatives, post incident and not designed to perform pre-emptive tasks. In this case study, Virtual Presence/spl reg/ predictive analysis tools and preemptive intervention are tools used effectively to reduce the occurrences of security/safety incidents. The concept is to use pre-emptive strategies that enable the delivery of effective deterrents and logistic support, right to the \"first responders\", so that they are better informed and hence have a better chance of deploying counter measures to reduce the predicted risk. The use of video (visible and invisible spectra), active and passive multi-sensor arrays, software digital analysis robots (SoftBOTs), connected via a network links are part of an effective solution that facilitates \"collaboration\" between operatives and experts to make effective use of their time and improve efficient use of their services.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intranet Security using Attribute Certificates under the Privilege Management Infrastructure 特权管理基础架构下使用属性证书实现内网安全
Pi-Ju Tsai, Dwen-Ren Tsai, Wen-Pin Tai
{"title":"Intranet Security using Attribute Certificates under the Privilege Management Infrastructure","authors":"Pi-Ju Tsai, Dwen-Ren Tsai, Wen-Pin Tai","doi":"10.1109/CCST.2005.1594859","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594859","url":null,"abstract":"In the computerized organizations, the public key infrastructure (PKI) certifications enforce authentication services providing stronger security. The PKI provides a framework to verify the identity of each entity in a given domain. The PKI framework includes mechanisms of requesting, issuing, signing, and validating public-key certificates. The privilege management infrastructure (PMI) framework determines whether the entity is authorized to access specific resources. It includes the issuance and validation of attribute certificates. Public-key certificates are certificates for trusting public-key, while attribute certificates are certificates for trusting privilege attribute. In the practical cases, when the system identifies a user's identity, it allocates the right permissions to the resources to the user according to the roles he/she played. This permission control mechanism is called the role-based access control (RBAC). This paper addresses an efficient privilege management mechanism, based on PMI and RBAC, to achieve the information security objectives of non-repudiation, integrity, and security. A security model is built to solve problems of privilege management and duty delegation.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High resolution CWLFM radar for vessel detection and idenfication for maritime border security 高分辨率CWLFM雷达用于海上边界安全的船舶探测和识别
C. Duarte, B. Naranjo, A.A. Lopez, A.B. del Campo
{"title":"High resolution CWLFM radar for vessel detection and idenfication for maritime border security","authors":"C. Duarte, B. Naranjo, A.A. Lopez, A.B. del Campo","doi":"10.1109/CCST.2005.1594856","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594856","url":null,"abstract":"Continuous wave lineal frequency modulated (CWLFM) radar presents some interesting advantages for control and coast surveillance as well as low probability of interception (LPI), high resolution and does not present \"blind spots\". In this paper, a comparation between optic surveillance systems and CWLFM radar is made. Moreover, radar behaviour with unfavourable meteorological conditions is discussed. Also are presented results obtained with a radar prototype and processed with ISAR techniques. These images are suitable for ship identification. Finally, the paper expose results of an automatic system of ship identification applied to these images","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134577775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Requirements and biometric technology matching: two approaches from European projects 需求和生物识别技术匹配:来自欧洲项目的两种方法
A. Pasic, E. Norgaard
{"title":"Requirements and biometric technology matching: two approaches from European projects","authors":"A. Pasic, E. Norgaard","doi":"10.1109/CCST.2005.1594850","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594850","url":null,"abstract":"At the moment, many multimodal biometric schemes and initiatives are carried out. Either still experimental or towards full implementation. On the other hand, relatively little attention is given to the operational environment analysis including user and system requirements, impact caused by specific choice of biometric technologies, related security and privacy aspects of the processes, divergence between biometrics suppliers, etc. In this paper, we focus on some of these issues, investigated in two different European projects: secure phone and secure justice","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133359591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Based analysis of interaction between human subject and artificial system - impacts of driver attention failures on transport reliability and safety 基于人主体与人工系统交互作用的驾驶员注意故障对交通运输可靠性和安全性的影响分析
R. Volner
{"title":"Based analysis of interaction between human subject and artificial system - impacts of driver attention failures on transport reliability and safety","authors":"R. Volner","doi":"10.1109/CCST.2005.1594834","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594834","url":null,"abstract":"Human society needs still more intensive exploitation of all kinds of transportation facilities. This need lasts already several decades and is much more imperative in future. Mobility is one of most strict requirements for survival, besides the energy and food resources, health care and security. The requirements on transportation systems concern not only the quantitative and qualitative aspects of transportation activities, but still more also the aspects of their reliability and safety. This concerns not only the transported subjects or goods, but also the environment. In spite of the fact significant progress was made in recent years as concerns the transportation systems automation, the fully automatic transportation system in use is still for-seen in the considerably far future. Analyzing the reliability and safety of transportation, one finds that the activity of human being is the weakest point. The technical reliability of almost all the transportation tools has improved quite a lot in recent years, however the human subject interacting with them has not changed too much, as concerns his/her reliability and safety of the respective necessary interaction. Therefore, there is a hard necessity to improve it and the possibilities how to increase it stays still more in the focus of our interest. In this contribution, the overview of related problems is made, the challenges for further research and development in this area are discussed and the outline of the vision of with respect to human interaction reliability optimized transportation systems is presented.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信