Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Engineering secure software by modelling privacy and security requirements 通过建模隐私和安全需求来设计安全软件
M. N. Kreeger, I. Duncan
{"title":"Engineering secure software by modelling privacy and security requirements","authors":"M. N. Kreeger, I. Duncan","doi":"10.1109/CCST.2005.1594820","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594820","url":null,"abstract":"Requirements are individual statements, usually expressed in a form of natural language, specifying the behaviour and constraints of a proposed system. Due to the intrinsic value of correct requirements, it is therefore essential for the process to be implemented correctly and that the requirements themselves reflect the true needs of the proposed system. The majority of developed systems introduce the concerns of privacy and security, however, traditional requirements engineering techniques have not addressed these issues appropriately. Further, the concepts of privacy, security, and the interrelated concept of trust, have not been accurately defined in terms of requirements engineering. Natural language is shown to be the most prevalent form of knowledge used to represent requirements, however, natural language introduces a number of inherent problems which can lead to ambiguity and specifications open to interpretation. When reasoning with privacy and security concerns the resulting specification should be both clear and concise in the stipulation of requirements. Therefore, before attempting to model privacy and security at the requirements engineering level, it is essential to have an understanding and appreciation of the issues involved. Consideration is given to the various concerns that would effect methodology development and once assessed a possible approach to modelling privacy and security requirements is highlighted.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121269186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security challenges for the next generation of highly available systems 下一代高可用性系统的安全挑战
S. Naqvi, M. Riguidel
{"title":"Security challenges for the next generation of highly available systems","authors":"S. Naqvi, M. Riguidel","doi":"10.1109/CCST.2005.1594840","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594840","url":null,"abstract":"Nowadays, highly available (HA) systems are a must, for almost any business process. More recently, the need for HA systems have increased as electronic commerce and other internet-based applications have become widely used with the growing Web usage. Security is a major concern for these systems. Companies want to make sure that their security systems are working flawlessly and efficiently. Making sure that these systems are available to allow the right people access to the right areas of the company is imperative. Traditionally, HA systems consist of proprietary hardware and software components. However, the price/performance advantages of commercial-off-the-shelf (COTS) based clusters have had a compelling affect on HA vendors and their marketplace. The emergence of computational grids makes it feasible to develop cost-effective, large-scale geographically distributed HA systems. Making sure that critical applications on this new generation of HA systems are secured is a challenging proposition. In this article, we have identified a list of challenges for the next generation of grid-based HA systems. We have explored the visualization of security services with their pluggable implementation to address the security needs of these grid-based HA systems. The main advantages of this solution include independence with respect to the underlying security mechanisms; best trade-off between security guarantees and processing capabilities; configurability of security architecture; better portability across heterogeneous platforms; and a smaller application development cycle for the HA functionality in the system.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Various viewpoints analysis of the actual and large-scale data by using the data mining technique 利用数据挖掘技术对实际的大规模数据进行多角度的分析
K. Tamura, K. Matsuura, H. Imai
{"title":"Various viewpoints analysis of the actual and large-scale data by using the data mining technique","authors":"K. Tamura, K. Matsuura, H. Imai","doi":"10.1109/CCST.2005.1594821","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594821","url":null,"abstract":"Many indiscriminate attacks represented by various computer worms happen on the Internet. These attacks, however, are not targeting at specific group of computers but all computers in the Internet. The administrator always has to grasp all activities on the Net, which is possible to take effective countermeasures against malicious activities by utilizing the logged data of IDS (intrusion detection system). So, we analyze the reliable data collected by the National Police Agency (NPA) of Japan with data mining approaches, and extract a flow of attacks with a measure of both appearance and confidence probability. Additionally, we dig deeper into the data by focusing on the difference of granularity of the Internet domains to which source hosts belong. We expect that the administrator can possess the preliminary knowledge required for defending against a possible attacks based on our results","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127129381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An evaluation of fingerprint image quality across an elderly population vis-a-vis an 18-25 year old population 老年人群与18-25岁人群的指纹图像质量评价
N. Sickler, S. Elliott
{"title":"An evaluation of fingerprint image quality across an elderly population vis-a-vis an 18-25 year old population","authors":"N. Sickler, S. Elliott","doi":"10.1109/CCST.2005.1594817","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594817","url":null,"abstract":"This study evaluated fingerprint quality across two populations, elderly and young, in order to assess age and moisture as potential factors affecting utility image quality. Specifically, the examination of these variables was conducted on a population over the age of 62, and a population between the ages of 18 and 25, using two fingerprint recognition devices (capacitance and optical). Collected individual variables included: age, gender, ethnic background, handedness, moisture content of each index finger, occupation(s), subject's use of hand moisturizer, and prior usage of fingerprint devices. Computed performance measures included failure to enroll, and quality scores. The results indicated there was statistically significant evidence that both age and moisture affected effectiveness image quality of each index finger at /spl alpha/=0.01 on the optical device, and there was statistically significant evidence that age affected effectiveness image quality of each index finger on the capacitance device, but moisture was only significant for the right index finger at /spl alpha/=0.01.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127588094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
The application of bioinformatics to network intrusion detection 生物信息学在网络入侵检测中的应用
K. Takeda
{"title":"The application of bioinformatics to network intrusion detection","authors":"K. Takeda","doi":"10.1109/CCST.2005.1594860","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594860","url":null,"abstract":"In this paper, a novel approach that applies bioinformatics algorithms to network intrusion detection is proposed. Network intrusion detection is the problem to detect security violations on or through a network. Misuse detection approach of network intrusion detection which is widely deployed on today's network environment requires precise signature data and occasionally fails to detect variants of known attacks or new types of attack.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117353220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Subjective image quality evaluation in security imaging systems 安防成像系统的主观图像质量评价
M. Klima, P. Páta, K. Fliegel, P. Hanzlik
{"title":"Subjective image quality evaluation in security imaging systems","authors":"M. Klima, P. Páta, K. Fliegel, P. Hanzlik","doi":"10.1109/CCST.2005.1594824","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594824","url":null,"abstract":"The subjective image quality of image or video information is a crucial item in security imaging systems. During last five years our lab has tested and verified various approaches to the image compression for security purposes and the evaluation of subjective image quality. In the paper, we have discussed selected important facts related to the subjective image quality evaluation and we have presented some anomalous experimental behavior of image compression techniques. An object-defined approach is investigated and advantageous characteristics of chosen methods are deployed to achieve the optimal performance of the surveillance video coder. Among others, we propose to use the artificial neural network (ANN) to predict resulting image quality rating scores. The proposed quality assessment model has been trained and tested using a set of grayscale images distorted by selected image compression algorithms.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131228750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Towards microscope-video-based fire-detection 走向基于显微镜视频的火灾探测
T. Schultze, I. Willms
{"title":"Towards microscope-video-based fire-detection","authors":"T. Schultze, I. Willms","doi":"10.1109/CCST.2005.1594868","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594868","url":null,"abstract":"Nowadays, video-based fire-detection is a nearly common application, as the number of installed surveillance video-systems is growing and the related processing units getting more powerful. The fire-detection-feature is usually only an add-on feature of 'intelligent' surveillance video-systems. The detection-criteria are therefore based on macroscopic characteristics observable in the surveillance video, like particular smoke dynamics, flame flickering or loss of image contrast due to obscuration by the smoke. In a new approach not the macroscopic, but the microscopic characteristics of aerosols are analysed with view to a more reliable discrimination between fire and non-fire aerosols. By monitoring an illuminated sheet of air some centimeters under the ceiling of a room, it is possible to get information about a limited range of the particle size distribution, density and flow characteristics of the suspended aerosol. A prototype of the scanning system has been developed and a series of test-fires (according to the EN54) and non-fire tests has been carried out in the Duisburg-Fire-Detection-Laboratory. The comparison between the test-fires and the non-fire scenarios shows that the discrimination between fire and non-fire aerosols is cogitable. The analyses of the aerosol characteristics are based on adapted pattern recognition techniques applied in the image processing. Some differences between different aerosol types are even visible to the naked eye. This paper presents the developed prototype specifying important features. Afterwards the most interesting results are shown and commented. Finally, the possibilities and limitations of an automatic fire-detection system based on the microscope-video analysis are discussed.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scenario based threat detection and attack analysis 基于场景的威胁检测和攻击分析
P. Hsiu, Chin-Fu Kuo, Tei-Wei Kuo, E.Y.T. Juan
{"title":"Scenario based threat detection and attack analysis","authors":"P. Hsiu, Chin-Fu Kuo, Tei-Wei Kuo, E.Y.T. Juan","doi":"10.1109/CCST.2005.1594819","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594819","url":null,"abstract":"This paper targets two essential issues in intrusion detection system designs: the optimization of rule selection and the attack discovery in attack analysis. A scenario-based approach is proposed to correlate malicious packets and to intelligently select intrusion detection rules to fire. We propose algorithms for rule selection and attack scenario identification. Potential threats and their relationship for a gateway and Web-server applications are explored as an example in the study. The proposed algorithms are implemented over Snort, a signature-based intrusion detection system, for which we have some encouraging performance evaluation results.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhancing interoperability of security operation center to heterogeneous intrusion detection systems 增强安全运营中心对异构入侵检测系统的互操作性
A. C. Lin, Hsing-Kuo Wong, Tzong-Chen Wu
{"title":"Enhancing interoperability of security operation center to heterogeneous intrusion detection systems","authors":"A. C. Lin, Hsing-Kuo Wong, Tzong-Chen Wu","doi":"10.1109/CCST.2005.1594841","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594841","url":null,"abstract":"This study aimed at enhancing the interoperability of a SOC (security operation center) to heterogeneous IDSes (intrusion detection systems) by designing a few EDMEF (intrusion detection message exchange format) templates. The adopted approach based on the specification of IDMEF and the need of incident detection. The resulted templates have two types that are for use of most usual alerts and aggregation of similar alerts respectively. The objectives of these templates are to simplify the usage of IDMEF and to improve the disadvantages originating from un-customized IDMEF. The results support the objectives of this study.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121293415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Growth of high quality bulk cadmium telluride crystals for use in X-ray and gamma-ray sensors 用于x射线和伽马射线传感器的高质量块状碲化镉晶体的生长
B. Cantwell, A. Basu, A. Brinkman, M. Robinson
{"title":"Growth of high quality bulk cadmium telluride crystals for use in X-ray and gamma-ray sensors","authors":"B. Cantwell, A. Basu, A. Brinkman, M. Robinson","doi":"10.1109/CCST.2005.1594885","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594885","url":null,"abstract":"Despite its intrinsic advantages as a sensor material for the detection of gamma and X radiation, CdTe has proved a difficult material to produce consistently and in sufficient quantities. We report further developments of a vapour phase technique, which has provided significant advantages over current melt growth technologies. Crystals of up to 50 mm in diameter have been produced with increased growth rates up to 12 mm/day.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114061515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信