Found. Trends Priv. Secur.最新文献

筛选
英文 中文
Cybersecurity for Modern Smart Grid Against Emerging Threats 现代智能电网的网络安全应对新兴威胁
Found. Trends Priv. Secur. Pub Date : 2024-04-06 DOI: 10.1561/3300000035
Daisuke Mashima, Yaohao Chen, Muhammad M. Roomi, Subhash Lakshminarayana, Deming Chen
{"title":"Cybersecurity for Modern Smart Grid Against Emerging Threats","authors":"Daisuke Mashima, Yaohao Chen, Muhammad M. Roomi, Subhash Lakshminarayana, Deming Chen","doi":"10.1561/3300000035","DOIUrl":"https://doi.org/10.1561/3300000035","url":null,"abstract":"Smart Grid is a power grid system that uses digital communication technologies. By deploying intelligent devices throughout the power grid infrastructure,from power generation to consumption, and enabling communication among them, it revolutionizes the modern power grid industry with increased efficiency, reliability, and availability. However, reliance on information and communication technologies has also made the smart grids exposed to new vulnerabilities and complications that may negatively impact the availability and stability of electricity services, which are vital for people's daily lives. The purpose of this monograph is to provide an up-to-date and comprehensive survey and tutorial on the cybersecurity aspect of smart grids. The book focuses on the sources of the cybersecurity issues, the taxonomy of threats, and the survey of various approaches to overcome or mitigate such threats. It covers the state-of-the-art research results in recent years, along with remaining open challenges. We hope that this monograph can be used both as learning materials for beginners who are embarking on research in this area and as a useful reference for established researchers in this field.","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"19 4","pages":"189-285"},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140734940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pragmatic Introduction to Secure Multi-Party Computation 安全多方计算的实用介绍
Found. Trends Priv. Secur. Pub Date : 2019-03-31 DOI: 10.1561/3300000019
David E. Evans, V. Kolesnikov, Mike Rosulek
{"title":"A Pragmatic Introduction to Secure Multi-Party Computation","authors":"David E. Evans, V. Kolesnikov, Mike Rosulek","doi":"10.1561/3300000019","DOIUrl":"https://doi.org/10.1561/3300000019","url":null,"abstract":"Since its introduction by Andrew Yao in the 1980s, multi-party computation has developed from a theoretical curiosity to an important tool for building large-scale privacy-preserving applications. Secure multi-party computation (MPC) enables a group to jointly perform a computation without disclosing any participant’s private inputs. The participants agree on a function to compute, and then can use an MPC protocol to jointly compute the output of that function on their secret inputs without revealing them. This monograph provides an introduction to multi-party computation for practitioners interested in building privacy-preserving applications and researchers who want to work in the area. The authors introduce the foundations of MPC and describe the current state of the art. The goal is to enable readers to understand what is possible today, and what may be possible in the future. It provides a starting point for building applications using MPC and for developing MPC protocols, implementations, tools, and applications. Those seeking a concise, accessible introduction to the topic which quickly enables them to build practical systems or conduct further research will find this essential reading.","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122114913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 240
Principles and Implementation Techniques of Software-Based Fault Isolation 基于软件的故障隔离原理与实现技术
Found. Trends Priv. Secur. Pub Date : 2017-12-31 DOI: 10.1561/3300000013
Gang Tan
{"title":"Principles and Implementation Techniques of Software-Based Fault Isolation","authors":"Gang Tan","doi":"10.1561/3300000013","DOIUrl":"https://doi.org/10.1561/3300000013","url":null,"abstract":"","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130556864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Contextual Integrity through the Lens of Computer Science 从计算机科学的角度看上下文完整性
Found. Trends Priv. Secur. Pub Date : 2017-12-22 DOI: 10.1561/3300000016
Sebastian Benthall, Seda F. Gürses, H. Nissenbaum
{"title":"Contextual Integrity through the Lens of Computer Science","authors":"Sebastian Benthall, Seda F. Gürses, H. Nissenbaum","doi":"10.1561/3300000016","DOIUrl":"https://doi.org/10.1561/3300000016","url":null,"abstract":"The theory of Privacy as Contextual Integrity (CI) defines privacy as appropriate information flow according to norms specific to social contexts or spheres. CI has had uptake in different subfields of computer science research. Computer scientists using CI have innovated as they have implemented the theory and blended it with other traditions, such as context-aware computing. This survey examines computer science literature using Contextual Integrity and discovers: (1) the way CI is used depends on the technical architecture of the system being designed, (2) ‘context’ is interpreted variously in this literature, only sometimes consistently with CI, (3) computer scientists do not engage in the normative aspects of CI, instead drawing from their own disciplines to motivate their work, and (4) this work reveals many areas where CI can sharpen or expand to be more actionable to computer scientists. We identify many theoretical gaps in CI exposed by this research and invite computer scientists to continue exploring the horizons of CI. S. Benthall, S. Gürses and H. Nissenbaum. Contextual Integrity through the Lens of Computer Science. Foundations and Trends © in Privacy and Security, vol. 2, no. 1, pp. 1–69, 2017. DOI: 10.1561/3300000016.","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114884926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Methods for Location Privacy: A comparative overview 位置隐私保护的方法:比较概述
Found. Trends Priv. Secur. Pub Date : 2017-12-11 DOI: 10.1561/3300000017
K. Chatzikokolakis, Ehab ElSalamouny, C. Palamidessi, A. Pazii
{"title":"Methods for Location Privacy: A comparative overview","authors":"K. Chatzikokolakis, Ehab ElSalamouny, C. Palamidessi, A. Pazii","doi":"10.1561/3300000017","DOIUrl":"https://doi.org/10.1561/3300000017","url":null,"abstract":"The growing popularity of location-based services, allowing to collect huge amounts of information regarding users' location, has started raising serious privacy concerns. In this report we analyze the various kind of privacy breaches that may arise in connection with the use of location-based services, and we survey and compare the metrics and the mechanisms that have been proposed in the literature.","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117072939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif 用π演算和ProVerif建模和验证安全协议
Found. Trends Priv. Secur. Pub Date : 2016-10-31 DOI: 10.1561/3300000004
B. Blanchet
{"title":"Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif","authors":"B. Blanchet","doi":"10.1561/3300000004","DOIUrl":"https://doi.org/10.1561/3300000004","url":null,"abstract":"ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic primitives, defined by rewrite rules or by equations. It can prove various security properties: secrecy, authentication, and process equivalences, for an unbounded message space and an unbounded number of sessions. It takes as input a description of the protocol to verify in a dialect of the applied pi calculus, an extension of the pi calculus with cryptography. It automatically translates this protocol description into Horn clauses and determines whether the desired security properties hold by resolution on these clauses. This survey presents an overview of the research on ProVerif.","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 248
Decentralized Finance: Protocols, Risks, and Governance 去中心化金融:协议、风险和治理
Found. Trends Priv. Secur. Pub Date : 1900-01-01 DOI: 10.1561/3300000036
A. Capponi, Garud Iyengar, Jay Sethuraman
{"title":"Decentralized Finance: Protocols, Risks, and Governance","authors":"A. Capponi, Garud Iyengar, Jay Sethuraman","doi":"10.1561/3300000036","DOIUrl":"https://doi.org/10.1561/3300000036","url":null,"abstract":"Financial markets are undergoing an unprecedented transformation. Technological advances have brought major improvements to the operations of financial services. While these advances promote improved accessibility and convenience, traditional finance shortcomings like lack of transparency and moral hazard frictions continue to plague centralized platforms, imposing societal costs. In this paper, we argue how these shortcomings and frictions are being mitigated by the decentralized finance (DeFi) ecosystem. We delve into the workings of smart contracts, the backbone of DeFi transactions, with an emphasis on those underpinning token exchange and lending services. We highlight the pros and cons of the novel form of decentralized governance introduced via the ownership of governance tokens. Despite its potential, the current DeFi infrastructure introduces operational risks to users, which we segment into five primary categories: consensus mechanisms, protocol, oracle, frontrunning, and systemic risks. We conclude by emphasizing the need for future research to focus on the scalability of existing blockchains, the improved design and interoperability of DeFi protocols, and the rigorous auditing of smart contracts.","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Security & Privacy Acceptance Framework (SPAF) 安全与隐私接受框架(SPAF)
Found. Trends Priv. Secur. Pub Date : 1900-01-01 DOI: 10.1561/3300000026
Sauvik Das, Cori Faklaris, Jason I. Hong, Laura A. Dabbish
{"title":"The Security & Privacy Acceptance Framework (SPAF)","authors":"Sauvik Das, Cori Faklaris, Jason I. Hong, Laura A. Dabbish","doi":"10.1561/3300000026","DOIUrl":"https://doi.org/10.1561/3300000026","url":null,"abstract":"","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117282288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Proofs, Arguments, and Zero-Knowledge 证明、论证和零知识
Found. Trends Priv. Secur. Pub Date : 1900-01-01 DOI: 10.1561/3300000030
J. Thaler
{"title":"Proofs, Arguments, and Zero-Knowledge","authors":"J. Thaler","doi":"10.1561/3300000030","DOIUrl":"https://doi.org/10.1561/3300000030","url":null,"abstract":"","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Expressing Information Flow Properties 表达信息流属性
Found. Trends Priv. Secur. Pub Date : 1900-01-01 DOI: 10.1561/3300000008
Elisavet Kozyri, Stephen Chong, A. Myers
{"title":"Expressing Information Flow Properties","authors":"Elisavet Kozyri, Stephen Chong, A. Myers","doi":"10.1561/3300000008","DOIUrl":"https://doi.org/10.1561/3300000008","url":null,"abstract":"","PeriodicalId":427727,"journal":{"name":"Found. Trends Priv. Secur.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信