{"title":"A practical approach to measuring assurance","authors":"G. Jelen, J. Williams","doi":"10.1109/CSAC.1998.738653","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738653","url":null,"abstract":"Assurance has been defined as \"the degree of confidence that security needs are satisfied\". The problem with this definition is that, unless one has a way to specify security needs in some measurable way, assurance cannot be expressed in a measurable way either. The definition leaves the practitioner with the challenge of determining what security needs are, whether or not they have been satisfied, and how to determine confidence. We define assurance as a measure of confidence in the accuracy of a risk or security measurement. A critical feature of the view of assurance presented is that it is orthogonal to the measurement of risk and security. High assurance ratings have traditionally been associated with high security and low risk. Our definition permits high assurance to be associated with low security and high risk as well. It also provides a way of deciding whether or not the assurance one has is sufficient.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, E. Spafford, D. Zamboni
{"title":"An architecture for intrusion detection using autonomous agents","authors":"Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, E. Spafford, D. Zamboni","doi":"10.1109/CSAC.1998.738563","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738563","url":null,"abstract":"The intrusion detection system architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. The most common shortcoming in the existing architectures is that they are built around a single monolithic entity that does most of the data collection and processing. In this paper, we review our architecture for a distributed intrusion detection system based on multiple independent entities working collectively. We call these entities autonomous agents. This approach solves some of the problems previously mentioned. We present the motivation and description of the approach, partial results obtained from an early prototype, a discussion of design and implementation issues, and directions for future work.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121587419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wachet auf! Computer security and the millennium","authors":"F. C. Smith, D. Bailey","doi":"10.1109/CSAC.1998.738596","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738596","url":null,"abstract":"Sleepers awake! The Y2K Problem may or may not be a technological disaster. But either way, the aftermath of the technological problems will be legal problems. Litigation over who should have done what will include damage claims for failures of software and liability for failure to prepare. The legal problems will be a disaster, costing potentially trillions of dollars. Once the frenzy of litigation over Y2K has finished, the lawyers involved will look for other technological issues with similar characteristics and problems, and they will find computer security. The article brings these issues into focus and suggests how some businesses may respond, including methods to judgement proof the company. If such a strategy succeeds, computer security professionals could find themselves liable and stuck in a dwindling minority of asset rich targets in an increasingly dangerous cyber-space.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131080024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure signaling and access control for ATM networks","authors":"R. Shankaran, V. Varadharajan","doi":"10.1109/CSAC.1998.738622","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738622","url":null,"abstract":"Asynchronous transfer mode (ATM) is seen to be a technology that allows flexibility, efficiency and manageable bandwidth on demand to be achieved in high-speed networks. ATM is able to support a variety of applications, including voice, video, image and data, with different quality-of-service (QoS) requirements. This paper addresses the design of security services in ATM networks. It considers the placement of a security layer between the ATM adaptation layer (AAL) and the ATM layer that provides confidentiality, integrity and data origin authentication in the user plane. The paper then considers secure signaling and describes a public key-based authentication and key management protocol that can be integrated as part of secure call setup. This protocol is part of an overall public key infrastructure framework for ATM networks. Finally, the paper discusses the issues involved in the provision of an access control service at the connection setup phase and the user data transfer phase.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127126303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scheme for analyzing electronic payment systems","authors":"L. C. Ferreira, R. Dahab","doi":"10.1109/CSAC.1998.738600","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738600","url":null,"abstract":"The paper presents a scheme for the design, analysis and comparison of electronic payment systems. Three systems are described in detail through this scheme. PayWord is a micro payment system designed by R. Rivest and A. Shamir (1995). It is efficient for repeated payments to the same vendor, and is designed to reduce the use of public key algorithms through the use of hash functions and fast symmetric ciphers. Digicash's E-cash is one of the most popular electronic payment systems in use today. It is an Internet based system with full user anonymity by the use of blind signatures (D. Chaum, 1982). The central authority must apply a signature on a blinded user generated token. The Internet Keyed Protocol was designed by IBM's research labs. It is an adequate system for transactions using credit cards or account numbers on open networks, such as the Internet. iKP (P. Janson and M. Waidner, 1996) is in reality, a system that may be used to securely transmit account numbers on the Internet.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic submission protocol based on temporal accountability","authors":"M. Kudo","doi":"10.1109/CSAC.1998.738656","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738656","url":null,"abstract":"This paper describes various possible attacks on temporal properties such as temporal records of payment times and declarations of the closing times for electronic submissions, and explains defense measures that use a trusted third party to provide temporal accountability. The paper proposes a secure electronic submission protocol as a typical time-sensitive application and a temporal accountability logic, which is an extension of Kailar's (1996) work. It analyzes the proposed protocol by applying temporal accountability logic, and describes some modifications of the protocol, which reduce the total number of flows while keeping the protocol as logically secure as the original one in terms of temporal accountability.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rule-based filtering for Java applets","authors":"Pietro Iglio, F. Fraticelli, Luigi Giuri","doi":"10.1109/CSAC.1998.738592","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738592","url":null,"abstract":"Java has been designed with a sophisticated security model that prevents applets downloaded from an untrusted network to attack the local system. However, malicious applets could exploit bugs in the virtual machine in order to gain access to system resources to perform unauthorized operations. The paper discusses the problem of intercepting such applets through a set of filtering rules that can be applied before a fixed version of the virtual machine is released. Moreover, we present an implementation of a filtering tool that can be used either as a firewall extension or as a virtual machine extension.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"41 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maintaining security in firm real-time database systems","authors":"Quazi N. Ahmed, Susan V. Vrbsky","doi":"10.1109/CSAC.1998.738584","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738584","url":null,"abstract":"Many real-time database systems, such as military institutions and government agencies, are contained in environments that exhibit restricted access of information, where mandatory access control for security is required. Hence, in addition to timing constraints, real-time database systems have security constraints. Conventional multi-level secure database models are inadequate for time-critical applications and conventional real-time database models do not support security constraints. The objective of this work is to incorporate security constraints in real-time database systems in such a way that not only is security achieved, but achieving security does not degrade real-time performance significantly in terms of deadlines missed. We propose a new optimistic concurrency control algorithm for secure firm real-time databases. Results show that the algorithm performs fairly well in terms of security and timeliness compared to a non-secure algorithm. We argue and show that achieving more security does not necessarily mean more sacrifice in real-time performance.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132276685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting anomalous and unknown intrusions against programs","authors":"Anup K. Ghosh, James Wanken, F. Charron","doi":"10.1109/CSAC.1998.738646","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738646","url":null,"abstract":"The ubiquity of the Internet connection to desktops has been both a boon to business as well as a cause for concern for the security of digital assets that may be unknowingly exposed. Firewalls have been the most commonly deployed solution to secure corporate assets against intrusions, but firewalls are vulnerable to errors in configuration, ambiguous security policies, data-driven attacks through allowed services, and insider attacks. The failure of firewalls to adequately protect digital assets from computer-based attacks has been a boon to commercial intrusion detection tools. Two general approaches to detecting computer security intrusions in real time are misuse detection and anomaly detection. Misuse detection attempts to detect known attacks against computer systems. Anomaly detection uses knowledge of users' normal behavior to detect attempted attacks. The primary advantage of anomaly detection over misuse detection methods is the ability to detect novel and unknown intrusions. This paper presents a study in employing neural networks to detect the existence of anomalous and unknown intrusions against a software system using the anomaly detection approach.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122088389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concentric supervision of security applications: a new security management paradigm","authors":"P. Hyland, R. Sandhu","doi":"10.1109/CSAC.1998.738575","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738575","url":null,"abstract":"This paper questions the status quo regarding security management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with their systems to see the \"big picture\" to interpret individual events. Our view of SM called concentric supervision of security applications (CSSA) is a continuous cycle of information flow. CSSA processing of status information and control of security features does not replace existing notions. It serves to enhance the existing ad hoc and segmented \"engineered\" solutions so that SM systems support \"the way people work\". We divide management functions into three phases: administration, operations, and assessment. Different skills, authority, and data are needed to perform tasks in each phase, but some information must flow for efficient and effective functionality. We give suggestions on some linkages by describing typical SM scenarios and how they might function. Parallels are drawn with related issues in network management systems and relationships to current management approaches are discussed.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}