Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)最新文献

筛选
英文 中文
A hardware independent encryption model for ATM devices ATM设备的独立于硬件的加密模型
H. Leitold, Udo Payer, R. Posch
{"title":"A hardware independent encryption model for ATM devices","authors":"H. Leitold, Udo Payer, R. Posch","doi":"10.1109/CSAC.1998.738621","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738621","url":null,"abstract":"Faced with the migration towards broadband networking technologies, formerly visionary applications, as diverse as teleworking, telemedicine or electronic commerce, are expected to emerge to broad usage. This makes confidential communication in broadband networks a challenging basic condition. In this paper, we present an ATM encryption model that is focused on independence of both the hardware of the end-user device and the application utilizing ATM as a transport medium. Therefore, the ATM cell stream is intercepted by a high-speed data encryption standard (DES), TripleDES encryption hardware, using well-defined standardized interfaces. Considering the various access rates that ATM is defined for, the encryption unit that is being developed is designed to be independent of the physical media and capable of supporting transmission rates of up to 155 Mbps. Thus, the solution is applicable to broadband integrated services digital network (B-ISDN) end-user devices, ranging from narrowband to multi-Mbps access rates.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"71 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132024836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multifunctional smartcards for electronic commerce-application of the role and task based security model 用于电子商务的多功能智能卡——基于角色和任务的安全模型应用
K. Schier
{"title":"Multifunctional smartcards for electronic commerce-application of the role and task based security model","authors":"K. Schier","doi":"10.1109/CSAC.1998.738606","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738606","url":null,"abstract":"Electronic commerce demands different security requirements for its many different applications. In the near future one smartcard may be used for many electronic commerce applications, such as payment systems, access to banking services and financial transactions over the Internet. A role and task based security model (R&T model) can ensure a secure access to many different services through an application based security framework. It can be used and implemented in a multifunctional smartcard in order to ensure both the user's personal need for application based security and his right to informational self determination-as the fundamental right of privacy is defined in the German legal system. A successful application of the model can help the user navigate a secure way through the jungle of electronic commerce.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127648061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Private desktops and shared store 私有桌面和共享存储
Bryony Pomeroy, S. Wiseman
{"title":"Private desktops and shared store","authors":"Bryony Pomeroy, S. Wiseman","doi":"10.1109/CSAC.1998.738618","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738618","url":null,"abstract":"Modern interconnected computer systems handling classified information can be built using mainstream COTS software platforms. The technique provides each user with a private desktop in which to work, along with services for sharing data. Within a desktop, the user is helped to label their data. When data is shared, labelling prevents accidental compromise, but other measures defend against other forms of compromise. Purple Penelope is a prototype that extends Windows NT security to support this approach. It adds discretionary labelling, easy-to-use role-based access controls and effective accounting and auditing measures to shared files.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134336803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Modelling secure and fair electronic commerce 示范安全及公平的电子贸易
A. Röhm, G. Pernul, Gaby Herrmann
{"title":"Modelling secure and fair electronic commerce","authors":"A. Röhm, G. Pernul, Gaby Herrmann","doi":"10.1109/CSAC.1998.738608","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738608","url":null,"abstract":"Security and fairness in business transactions are basic requirements demanded by any participant in electronic markets. We propose COPS as an infrastructure for building adaptable electronic markets with main focus on security and fairness and MOSS as a methodology for analysing and modelling the security semantics of business transactions. Both are necessary to control the risks involved in dealing (trading) with untrusted parties in an open electronic commerce environment. We address the phases information, negotiation and execution of a business transaction and discuss security requirements which in the past were recognised as being very important for electronic market participants but had only received limited or little attention in the electronic commerce research community.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126183701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Authorization in enterprise-wide distributed system: a practical design and application 企业级分布式系统中的授权:一种实际设计与应用
V. Varadharajan, C. Crall, J. Pato
{"title":"Authorization in enterprise-wide distributed system: a practical design and application","authors":"V. Varadharajan, C. Crall, J. Pato","doi":"10.1109/CSAC.1998.738614","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738614","url":null,"abstract":"As companies migrate from a centralized to a distributed computing environment, the administration and management of security policies, in particular authorization policies, is becoming an increasingly difficult task. The paper considers the design of an authorization system that is suitable for distributed applications. It discusses the architectural design principles, describes the constructs of the authorization policy language and outlines the authorization service and components involved. The paper gives some example policy specifications and illustrates how privileges are specified and evaluated, as well as how privilege resolutions are achieved.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131272534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
The Solar Trust Model: authentication without limitation 太阳能信托模型:无限制认证
M. Clifford, C. Lavine, M. Bishop
{"title":"The Solar Trust Model: authentication without limitation","authors":"M. Clifford, C. Lavine, M. Bishop","doi":"10.1109/CSAC.1998.738650","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738650","url":null,"abstract":"The PEM and PGP/X.509 authentication models and the Biba Integrity Model have limitations inherent in their design that diminish their practicality in real world applications. The ICE-TEL trust model addresses some of these difficulties, and introduces a few new limitations. The Common Security Services Manager's Trust Policy Interface Specification provides the guidelines with which new trust policies may be encoded, but does not implement an actual policy. This paper describes a new model that permits both the identity of the sender of a message, and the trustworthiness of the sender of the message to be determined. The model works regardless of whether or not the message was signed by a certificate authority with which the recipient has a relationship. The model can be implemented without changing the format of certificates that are currently in use, and could be used as a module in a broader security framework, such as the Common Security Services Manager.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Two improved algorithms and hardware implementations for key distribution using extended programmable cellular automata 基于扩展可编程元胞自动机的密钥分配的两种改进算法和硬件实现
Chang Nian Zhang, Ming-Yang Deng, R. Mason
{"title":"Two improved algorithms and hardware implementations for key distribution using extended programmable cellular automata","authors":"Chang Nian Zhang, Ming-Yang Deng, R. Mason","doi":"10.1109/CSAC.1998.738644","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738644","url":null,"abstract":"Presents two efficient algorithms and a simple hardware structure for the implementation of Diffie-Hellman (1976) key exchange (DHKE) in GF(2/sup n/). The two algorithms investigated are an improved table look-up algorithm and a binary algorithm. The hardware structure is an extended programmable cellular automaton (PCA), which is much more flexible and can be used for key distribution and conventional cryptography. Based on our improved methods and the PCA structure, we implement two hardware systems for Diffie-Hellman key distribution. With very high-speed and simple logic circuit features, these hardware systems are ideally suited for VLSI implementation.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133366077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security services in an open service environment 开放服务环境中的安全服务
R. Sailer
{"title":"Security services in an open service environment","authors":"R. Sailer","doi":"10.1109/CSAC.1998.738624","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738624","url":null,"abstract":"Emerging telecommunication services use, store or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommunication services which saves the huge investments in the existing ISDN network infrastructure. This is done by adding trusted runtime environments that contain security functions to the existing service infrastructure. This approach aims at separating sensitive service functions from highly complex functions of public telecommunication networks. We propose an enhancement of existing network service interfaces by standardized security service interfaces to enable the provision of open security services. Separated security control functions of independent service providers, however, might not be trusted by network operators. Therefore, this contribution particularly considers gateway functions implementing access control and ancillary conditions concerning network integrity.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How to increase security in mobile networks by anomaly detection 如何通过异常检测提高移动网络的安全性
Roland Büschkes, D. Kesdogan, P. Reichl
{"title":"How to increase security in mobile networks by anomaly detection","authors":"Roland Büschkes, D. Kesdogan, P. Reichl","doi":"10.1109/CSAC.1998.738558","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738558","url":null,"abstract":"The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- and outsiders becomes more and more difficult. This paper deals with a relatively new technique that appears to be suitable for solving these issues, i.e. anomaly detection based on profiling mobile users. Mobility pattern generation and behavior prediction are discussed in depth, before a new model of anomaly detection that is based on the Bayes decision rule is introduced. Applying this model to mobile user profiles proves the feasibility of our approach. Finally, a special emphasis is put on discussing privacy aspects of anomaly detection.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114960830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Anonymous secure e-voting over a network 通过网络进行匿名安全电子投票
Y. Mu, V. Varadharajan
{"title":"Anonymous secure e-voting over a network","authors":"Y. Mu, V. Varadharajan","doi":"10.1109/CSAC.1998.738649","DOIUrl":"https://doi.org/10.1109/CSAC.1998.738649","url":null,"abstract":"We propose two new anonymous secure electronic voting schemes that protect the privacy of the voters and prevent double voting. These schemes do not require any special voting channel and the communications can occur entirely over existing networks such as the Internet. The proposed schemes are based on the ElGamal digital signature algorithm and can be applied to elections in a variety of situations ranging from an election in a small organization to a country.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信