2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

筛选
英文 中文
New keyed chaotic neural network hash function based on sponge construction 基于海绵构造的新型键控混沌神经网络哈希函数
Nabil Abdoun, S. E. Assad, Khodor Hammoud, R. Assaf, Mohamad Khalil, O. Déforges
{"title":"New keyed chaotic neural network hash function based on sponge construction","authors":"Nabil Abdoun, S. E. Assad, Khodor Hammoud, R. Assaf, Mohamad Khalil, O. Déforges","doi":"10.23919/ICITST.2017.8356341","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356341","url":null,"abstract":"This paper presents a new structure for keyed hash function based on chaotic maps, neural network and sponge construction. The structure of proposed Keyed Sponge Chaotic Neural Network KSCNN hash function is composed of three phases: the initialization phase pads the message M and divides it into q message blocks Mi of fixed size r, the absorbing phase hashes the message blocks by using CNN — Blocki and produces the intermediate hash value HMi and the squeezing phase produces, starting from HMq, the final hash value h with desired length. The combining of sponge construction with the CNN — Blocki improves, on one hand, the security of proposed hash function and makes, on the other hand, the length of hash value more dynamic. Our theoretical analysis and experimental simulations show that the proposed hash function KSCNN has good statistical properties, strong collision resistance, high message sensitivity compared with SHA-3 and immune against pre-image, second pre-image and collision attacks.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134456627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing security in the cloud: When traceability meets access control 增强云中的安全性:当可追溯性满足访问控制时
Clara Bertolissi, Omar Boucelma, Worachet Uttha
{"title":"Enhancing security in the cloud: When traceability meets access control","authors":"Clara Bertolissi, Omar Boucelma, Worachet Uttha","doi":"10.23919/ICITST.2017.8356420","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356420","url":null,"abstract":"Cloud Computing technology is gaining momentum, however security concerns remain one of the top barrier to cloud projects. We propose a framework that ensures data control and privacy in the cloud by using traceability (aka Provenance) combined with expressive access control policies based on user categorization.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129238384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the cost of cyber security in smart business 关于智能商业的网络安全成本
Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Tauber
{"title":"On the cost of cyber security in smart business","authors":"Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Tauber","doi":"10.23919/ICITST.2017.8356395","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356395","url":null,"abstract":"In a world, as complex and constantly changing as ours cloud computing is a driving force for shaping the IT landscape and changing the way we do business. Current trends show a world of people, things and services all digitally interconnected via the Internet of Things (IoT). This applies in particular to an industrial environment where smart devices and intelligent services pave the way for smart factories and smart businesses. This paper investigates in a use case driven study the potential of making use of smart devices to enable direct, automated and voice-controlled smart businesses. Furthermore, the paper presents an initial investigation on methodologies for measuring costs of cyber security controls for cloud services.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a security baseline for IaaS-cloud back-ends in Industry 4.0 工业4.0时代iaas云后端的安全基线
Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Tauber, A. Wöhrer
{"title":"Towards a security baseline for IaaS-cloud back-ends in Industry 4.0","authors":"Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Tauber, A. Wöhrer","doi":"10.23919/ICITST.2017.8356438","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356438","url":null,"abstract":"The popularity of cloud based Infrastructure-as-a-Service (IaaS) solutions is becoming increasingly popular. However, since IaaS providers and customers interact in a flexible and scalable environment, security remains a serious concern. To handle such security issues, defining a set of security parameters in the service level agreements (SLA) between both, IaaS provider and customer, is of utmost importance. In this paper, the European Network and Information Security Agency (ENISA) guidelines are evaluated to extract a set of security parameters for IaaS. Furthermore, the level of applicability and implementation of this set is used to assess popular industrial and open-source IaaS cloud platforms, respectively VMware and OpenStack. Both platforms provide private clouds, used as backend infrastructures in Industry 4.0 application scenarios. The results serve as initial work to identify a security baseline and research needs for creating secure cloud environments for Industry 4.0.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards comparing programming paradigms 比较编程范型
Igor Ivkic, Markus Tauber, A. Wöhrer
{"title":"Towards comparing programming paradigms","authors":"Igor Ivkic, Markus Tauber, A. Wöhrer","doi":"10.23919/ICITST.2017.8356440","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356440","url":null,"abstract":"Rapid technological progress in computer sciences finds solutions and at the same time creates ever more complex requirements. Due to an evolving complexity today's programming languages provide powerful frameworks which offer standard solutions for recurring tasks to assist the programmer and to avoid the re-invention of the wheel with so-called “out-of-the-box-features”. In this paper, we propose a way of comparing different programming paradigms on a theoretical, technical and practical level. Furthermore, the paper presents the results of an initial comparison of two representative programming approaches, both in the closed SAP environment.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127096918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions 网络学术信息获取:博士生网络自我效能感与情绪
Yen-Mei Lee
{"title":"Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions","authors":"Yen-Mei Lee","doi":"10.23919/ICITST.2017.8356409","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356409","url":null,"abstract":"The main purpose of this proposed study is to understand the relationship between doctoral students' Internet self-efficacy and their affections when seeking academic information on the Internet. A structured questionnaire will be designed and conducted for 300 doctoral students. Participants' demographic information, information seeking behavior, Internet self-efficacy, and emotions will be measured in this questionnaire by using Information-Seeking Behavior Scale (ISBS), Internet Self-efficacy Scale (ISS), and the Positive and Negative Affect Schedule (PANAS). For the predicted outcomes, doctoral students' academic information seeking behaviors will be analyzed. Moreover, the interventions among doctoral students' Internet self-efficacy, emotions, and their information seeking behaviors will be analyzed and addressed. In the future, this proposed study will be conducted practically. The expected findings will be proposed for doctoral students so that they can based on the provided information to build up their suitable information seeking styles. Furthermore, the expected findings can also be presented for professionals, scholars, or even doctoral students' academic advisors who mainly do research and seek academic information online to have a better understanding of doctoral students' mental and psychical statuses on conducting academic information seeking activity on the Internet. To sum up, the results will not only reflect doctoral students' information seeking behaviors but also provide helpful suggestions for further researches.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124702089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Work in Progress: Nobody knows who you really are online/on the world wide web — Amazon-recognition-service based ‘Virtualnet’ supported authentication: How certain are you it is indeed you in front of a screen? 正在进行的工作:没有人知道你在网上/在万维网上的真实身份——基于亚马逊识别服务的“虚拟网络”支持身份验证:你有多确定屏幕前的你就是你?
Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian
{"title":"Work in Progress: Nobody knows who you really are online/on the world wide web — Amazon-recognition-service based ‘Virtualnet’ supported authentication: How certain are you it is indeed you in front of a screen?","authors":"Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian","doi":"10.23919/ICITST.2017.8356414","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356414","url":null,"abstract":"A specific project on its development phase is recounted on this paper which looks to strengthen authenticity, verification and validation of student identity levels that perform learning processes, mediated by ‘Virtualnet’ — an e-learning platform from Universidad Manuela Beltrán. To achieve this, a special face-recognition algorithm inclusion is suggested which in first instance is designed and tested to be later implemented as a prototype in the testing (exams) module from the online courses offered on this LMS.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis of home user security awareness & education 家庭用户安全意识与教育分析
Fayez Alotaibi, N. Clarke, S. Furnell
{"title":"An analysis of home user security awareness & education","authors":"Fayez Alotaibi, N. Clarke, S. Furnell","doi":"10.23919/ICITST.2017.8356359","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356359","url":null,"abstract":"The human factor is a major consideration in securing systems. People use an increasingly wide range of digital devices such as smartphones, tablets, laptops and smart TVs, with each device having a different operating system, security configurations and threats. This presents users with an unenviable and potentially insurmountable task of securing them. This paper presents an analysis of efforts being made in providing suitable awareness and education with home users. The analysis shows that whilst significant efforts are made, a focus upon a “one-fits-all” solution that does not take into account individual users — their needs, prior knowledge, learning styles and security priorities — results in unnecessary information overload and a need to spend an excessive amount of time reading web-based content that may have little relevance to them specifically. This review indicates that there is a need for an approach that can provide the users with bespoke awareness information. It is recommended that a holistic information security management system for home users can be proposed and designed which can provide users with bespoke awareness information based on the technologies, applications and services that users use in a manner that is acceptable and timely.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intelligent safety management system for crowds using sensors 使用传感器的人群智能安全管理系统
Norah S. Farooqi
{"title":"Intelligent safety management system for crowds using sensors","authors":"Norah S. Farooqi","doi":"10.23919/ICITST.2017.8356365","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356365","url":null,"abstract":"Crowd management is an important research area due to its impact on significant numbers of people in society. It has been studied from different perspectives including movement, tracking, monitoring, identification, and behaviour. However, this topic still suffers from limitations that require further developments. Safety concerns are a vital part of crowd management that necessitates more investigation. The proposed paper presents a safety management system for crowds using sensors to improve the safety level and to reduce dangerous situations. The proposed system handles external environmental safety issues and internal body safety effects. The system manages safety factors and evaluates situations as individuals' behaviours and group behaviour in the same location in order to identify hazards and avoid disaster in crowds.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards a security and privacy co-creation method 一种安全与隐私的协同创造方法
C. Feltus, E. Proper
{"title":"Towards a security and privacy co-creation method","authors":"C. Feltus, E. Proper","doi":"10.23919/ICITST.2017.8356351","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356351","url":null,"abstract":"Cyber collaboration supports and increases the expansion of value co-creation amongst companies and customers by defining innovative business models and by exploiting new types of infrastructures like those dedicated to social media, collaborative workspaces, or e-supply chains for instance. This proliferation of new types of collaboration generates new types of security and privacy threats to be handled by the companies. The deployment of the appropriate controls to cope with the latter is of great value for the continuity of the day to day business. Therefore, in this paper, we investigate how security and privacy may be regarded as types of value and how they may be considered, in collaborative environments, through the lens of value co-creation. Acknowledging the similarities between security, privacy, and value, we afterwards propose a method to co-create security and privacy and we illustrate how the latter may be deployed in the frame of a financial case-study.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134017072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信