Companies spend considerable amounts of resources on minimizing security breaches but often neglect efficient security measures and/or are not aware whether their investments are effective. While security safeguards traditionally are evaluated through a single (aggregated) criterion such as the return on investment, this may not suffice any longer as economic and legal requirements force top management to pay more attention to security issues. Thus, there is a demand for decision support tools that assist decision makers in allocating security safeguards with respect to multiple objectives of the involved stakeholders. This paper proposes a tool called MOS/sup 3/T (multi-objective security safeguard selection tool), that integrates ideas from multiobjective decision making in a workshop environment The stepwise procedure for the assessment and interactive selection of sets of security safeguards improves security awareness of top management while minimizing the resources required for implementing a proper security environment that meets a corporate's needs.
{"title":"Workshop-based multiobjective security safeguard selection","authors":"T. Neubauer, C. Stummer, E. Weippl","doi":"10.1109/ARES.2006.144","DOIUrl":"https://doi.org/10.1109/ARES.2006.144","url":null,"abstract":"Companies spend considerable amounts of resources on minimizing security breaches but often neglect efficient security measures and/or are not aware whether their investments are effective. While security safeguards traditionally are evaluated through a single (aggregated) criterion such as the return on investment, this may not suffice any longer as economic and legal requirements force top management to pay more attention to security issues. Thus, there is a demand for decision support tools that assist decision makers in allocating security safeguards with respect to multiple objectives of the involved stakeholders. This paper proposes a tool called MOS/sup 3/T (multi-objective security safeguard selection tool), that integrates ideas from multiobjective decision making in a workshop environment The stepwise procedure for the assessment and interactive selection of sets of security safeguards improves security awareness of top management while minimizing the resources required for implementing a proper security environment that meets a corporate's needs.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"530 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The interoperability issues among the public administrations of the European Union is in the spot light. An additional pressure on these public administrations comes from the fact that the need for exchanging vital records of mobile European citizens is on the rise. The citizens face difficult situations because of lack of integration and interoperability between the public administrations. In this paper we propose a framework with the help of which the public administrations in different Member States can securely and efficiently exchange citizen's vital records. The electronic identity (eID) concept plays a central role in this proposed framework. Our framework on one hand removes the burden of complex interactions, with several public administrations, from citizen end and on the other hand helps public administrations in becoming more efficient and providing better services without disturbing their internal processes.
{"title":"Proposed framework for achieving interoperable services between European public administrations","authors":"Amir Hayat, T. Rössler, Muhammad Alam","doi":"10.1109/ARES.2006.97","DOIUrl":"https://doi.org/10.1109/ARES.2006.97","url":null,"abstract":"The interoperability issues among the public administrations of the European Union is in the spot light. An additional pressure on these public administrations comes from the fact that the need for exchanging vital records of mobile European citizens is on the rise. The citizens face difficult situations because of lack of integration and interoperability between the public administrations. In this paper we propose a framework with the help of which the public administrations in different Member States can securely and efficiently exchange citizen's vital records. The electronic identity (eID) concept plays a central role in this proposed framework. Our framework on one hand removes the burden of complex interactions, with several public administrations, from citizen end and on the other hand helps public administrations in becoming more efficient and providing better services without disturbing their internal processes.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127395565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yusuke Doi, S. Wakayama, M. Ishiyama, S. Ozaki, Tomohiro Ishihara, Yojiro Uo
In this paper, we discuss the ecosystem of naming systems for smart spaces. Since we think resolution of detected object names should be a common trigger of smart space applications, we focus on naming systems. We aim at a naming system framework to enable the following. First, each application developer of smart spaces can design and implement new applications freely. Minimal limitations should be imposed on developers. Second, users can interact with applications opaquely. We propose combination of the following two approaches to induce naming systems evolution for smart space applications. The first approach is integration of independent naming systems for simple client resolvers. The second approach is a client resolver model to handle independent naming systems concurrently. We also describe some case studies concerning smart space application scenarios.
{"title":"Ecosystem of naming systems: discussions on a framework to induce smart space naming systems development","authors":"Yusuke Doi, S. Wakayama, M. Ishiyama, S. Ozaki, Tomohiro Ishihara, Yojiro Uo","doi":"10.1109/ARES.2006.57","DOIUrl":"https://doi.org/10.1109/ARES.2006.57","url":null,"abstract":"In this paper, we discuss the ecosystem of naming systems for smart spaces. Since we think resolution of detected object names should be a common trigger of smart space applications, we focus on naming systems. We aim at a naming system framework to enable the following. First, each application developer of smart spaces can design and implement new applications freely. Minimal limitations should be imposed on developers. Second, users can interact with applications opaquely. We propose combination of the following two approaches to induce naming systems evolution for smart space applications. The first approach is integration of independent naming systems for simple client resolvers. The second approach is a client resolver model to handle independent naming systems concurrently. We also describe some case studies concerning smart space application scenarios.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The availability of some critical equipment like gateways, firewalls and proxies must be guaranteed in operational networks. In early equipments, the routing and filtering decisions were based on the packet information, nowadays this static approach is not longer safe. Existing high availability (HA) solutions do not cover all the aspects to ensure availability of advanced settings that are being deployed these days. Some important issues like the reduction of the downtime and the need for failure detection in such scenarios must be studied. This paper describes the implementation of high available stateful network equipments: these systems apply policies based on the state of the connections, such information is gathered in runtime by means of packet inspection. This work specifically focuses on Linux systems and firewalls because the IT industry trusts more and more OpenSource solutions to deploy critical services because of its quality and the access to the source code. We propose the SNE library (stateful network equipment), which is an add-on to current HA protocols, to solve the existing limitations. In this paper, we describe the proposed architecture and we detail a set problematic scenarios supported by our library, as well as first experiments and the evaluation.
{"title":"High availability support for the design of stateful networking equipments","authors":"P. Ayuso, L. Lefèvre, R. M. Gasca","doi":"10.1109/ARES.2006.71","DOIUrl":"https://doi.org/10.1109/ARES.2006.71","url":null,"abstract":"The availability of some critical equipment like gateways, firewalls and proxies must be guaranteed in operational networks. In early equipments, the routing and filtering decisions were based on the packet information, nowadays this static approach is not longer safe. Existing high availability (HA) solutions do not cover all the aspects to ensure availability of advanced settings that are being deployed these days. Some important issues like the reduction of the downtime and the need for failure detection in such scenarios must be studied. This paper describes the implementation of high available stateful network equipments: these systems apply policies based on the state of the connections, such information is gathered in runtime by means of packet inspection. This work specifically focuses on Linux systems and firewalls because the IT industry trusts more and more OpenSource solutions to deploy critical services because of its quality and the access to the source code. We propose the SNE library (stateful network equipment), which is an add-on to current HA protocols, to solve the existing limitations. In this paper, we describe the proposed architecture and we detail a set problematic scenarios supported by our library, as well as first experiments and the evaluation.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128116409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
More and more governments tend also to offer their services for mobile users. For many of their e-transactions that involve one or more pervasive computing entities, the role of a central trusted authority (TA) for assuring the binding between the identities and the used asymmetric keys is crucial. Usually governments take care of such a trusted third party. However, when this TA becomes unreachable, governments cannot instantly set up another TA and recovering the original TA takes too much valuable time. The reliance on those TA's without another alternative trust system can therefore jeopardize the transactions. In this paper a mechanism is proposed in which new TA's can be (re)elected autonomously and securely by a group of computing entities from their midst when the original TA becomes unreachable. Those new TA's rule then as an oligarchy over the other computing entities.
{"title":"Building governments in e-government: settlement of trusted e-oligarchy","authors":"S. Daskapan","doi":"10.1109/ARES.2006.40","DOIUrl":"https://doi.org/10.1109/ARES.2006.40","url":null,"abstract":"More and more governments tend also to offer their services for mobile users. For many of their e-transactions that involve one or more pervasive computing entities, the role of a central trusted authority (TA) for assuring the binding between the identities and the used asymmetric keys is crucial. Usually governments take care of such a trusted third party. However, when this TA becomes unreachable, governments cannot instantly set up another TA and recovering the original TA takes too much valuable time. The reliance on those TA's without another alternative trust system can therefore jeopardize the transactions. In this paper a mechanism is proposed in which new TA's can be (re)elected autonomously and securely by a group of computing entities from their midst when the original TA becomes unreachable. Those new TA's rule then as an oligarchy over the other computing entities.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Peters, Pim Jorg, Marco Meesters, M. Hoogwout, Edwin Stuart
Cities and regional authorities require consistent data on items like persons, addresses, locations and buildings as the fundament for service delivery, fraud-prevention and -detection, permit enforcement, and the effective execution of day to day operations. The concept of basic registries in the Netherlands is introduced to improve data integrity and the single entry for the citizen. Evidence shows that the change that comes with the implementation of basic registries could be more demanding for government organizations than earlier adaptations to the new ICT, like World Wide Web or email. Change triggered by basic registries seems to follow the same path as EDI did for business. Political forces do not realize the impact of this change on daily operations sufficiently. This results in a narrow focus on implementation issues, in which real basic e-government design issues are often neglected. Zenc implemented an action research (participative research method) oriented survey on the implementation of data integrity operations for basic registries in Belgium and the Netherlands. The research unveils a range of methods that government agencies apply to deal with organizational, legal and technical barriers. Early results show a number of patterns in organizational barriers towards the change that accompanies the implementation of basic registries. The research question is if those patterns related to the resistance to introduce basic registries are an indication of core changes in the organization of the public domain rather than 'simple' adoptions of new technologies. The paper describes the findings and seeks to identify key-areas for improvement and in depth research on road maps for data integrity in the back office of government.
{"title":"Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address those","authors":"R. Peters, Pim Jorg, Marco Meesters, M. Hoogwout, Edwin Stuart","doi":"10.1109/ARES.2006.78","DOIUrl":"https://doi.org/10.1109/ARES.2006.78","url":null,"abstract":"Cities and regional authorities require consistent data on items like persons, addresses, locations and buildings as the fundament for service delivery, fraud-prevention and -detection, permit enforcement, and the effective execution of day to day operations. The concept of basic registries in the Netherlands is introduced to improve data integrity and the single entry for the citizen. Evidence shows that the change that comes with the implementation of basic registries could be more demanding for government organizations than earlier adaptations to the new ICT, like World Wide Web or email. Change triggered by basic registries seems to follow the same path as EDI did for business. Political forces do not realize the impact of this change on daily operations sufficiently. This results in a narrow focus on implementation issues, in which real basic e-government design issues are often neglected. Zenc implemented an action research (participative research method) oriented survey on the implementation of data integrity operations for basic registries in Belgium and the Netherlands. The research unveils a range of methods that government agencies apply to deal with organizational, legal and technical barriers. Early results show a number of patterns in organizational barriers towards the change that accompanies the implementation of basic registries. The research question is if those patterns related to the resistance to introduce basic registries are an indication of core changes in the organization of the public domain rather than 'simple' adoptions of new technologies. The paper describes the findings and seeks to identify key-areas for improvement and in depth research on road maps for data integrity in the back office of government.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117323844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elections are increasingly dependent on computers and telecommunication systems. Such "e-voting" schemes create socio-technical systems (combinations of technology and human organisations) that are complex and critical, as the future of nations depends on their proper operation. Thus heated debate surrounds their adoption and the possible methods for making them demonstrably dependable. We discuss the dependability requirements for such systems, and the design issues in ensuring their satisfaction, with reference to a recent proposal that uses cryptography for fault tolerance, in order to avoid some of the perceived dangers of electronic voting. Our treatment highlights the need for considering the whole socio-technical system, and for integrating security and fault tolerance viewpoints.
{"title":"E-voting: dependability requirements and design for dependability","authors":"J. Bryans, B. Littlewood, P. Ryan, L. Strigini","doi":"10.1109/ARES.2006.56","DOIUrl":"https://doi.org/10.1109/ARES.2006.56","url":null,"abstract":"Elections are increasingly dependent on computers and telecommunication systems. Such \"e-voting\" schemes create socio-technical systems (combinations of technology and human organisations) that are complex and critical, as the future of nations depends on their proper operation. Thus heated debate surrounds their adoption and the possible methods for making them demonstrably dependable. We discuss the dependability requirements for such systems, and the design issues in ensuring their satisfaction, with reference to a recent proposal that uses cryptography for fault tolerance, in order to avoid some of the perceived dangers of electronic voting. Our treatment highlights the need for considering the whole socio-technical system, and for integrating security and fault tolerance viewpoints.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122496396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study describes the cost involved in maintaining dependability that involves availability, reliability, and security. The comparison of the cost as well as the need to get additional data set to improve the predictive accuracy is fundamentally an economic and policy decision. It is also highly dependent on the nature of the task. For the tasks that deal with massive data sets and/or the tasks often require real time decision making are the ones that would benefit from the cost perspective.
{"title":"Dependability in data mining: a perspective from the cost of making decisions","authors":"H. Chung","doi":"10.1109/ARES.2006.49","DOIUrl":"https://doi.org/10.1109/ARES.2006.49","url":null,"abstract":"This study describes the cost involved in maintaining dependability that involves availability, reliability, and security. The comparison of the cost as well as the need to get additional data set to improve the predictive accuracy is fundamentally an economic and policy decision. It is also highly dependent on the nature of the task. For the tasks that deal with massive data sets and/or the tasks often require real time decision making are the ones that would benefit from the cost perspective.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122455509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G-WLAN user authentication.
{"title":"Secure 3G user authentication in adhoc serving networks","authors":"A. Durresi, Lyn Evans, V. Paruchuri, L. Barolli","doi":"10.1109/ARES.2006.119","DOIUrl":"https://doi.org/10.1109/ARES.2006.119","url":null,"abstract":"The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G-WLAN user authentication.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Resource management continuity is indispensable against illegal resource dissemination and usage in open environment, which should be guaranteed by an effective constraint management mechanism. In detail, it includes two requirements, (1) guaranteeing resource dissemination continuability and purpose-consistency on the dissemination topology, and (2) allowing more-to-more dissemination relation with multiple dissemination policies available on the extended topology for more complicated applications. As we observed, the existed work cannot capture them satisfyingly. We propose constraint inheritance relation (CIR) on a dynamic dissemination topology to specify the continuity of constraint management to capture the first requirement while extend the previous one-to-one dissemination to capture the second. The policy compatibility is maintained while multiple policies are available. We take it into secure resource management (SRM) model for managing the complicated dissemination and usage constraints on diverse resources in dynamic dissemination transaction context. The result proves its feasibility and efficiency.
{"title":"Resource management continuity with constraint inheritance relation","authors":"Zude Li, Guoqiang Zhan, Xiaojun Ye","doi":"10.1109/ARES.2006.111","DOIUrl":"https://doi.org/10.1109/ARES.2006.111","url":null,"abstract":"Resource management continuity is indispensable against illegal resource dissemination and usage in open environment, which should be guaranteed by an effective constraint management mechanism. In detail, it includes two requirements, (1) guaranteeing resource dissemination continuability and purpose-consistency on the dissemination topology, and (2) allowing more-to-more dissemination relation with multiple dissemination policies available on the extended topology for more complicated applications. As we observed, the existed work cannot capture them satisfyingly. We propose constraint inheritance relation (CIR) on a dynamic dissemination topology to specify the continuity of constraint management to capture the first requirement while extend the previous one-to-one dissemination to capture the second. The policy compatibility is maintained while multiple policies are available. We take it into secure resource management (SRM) model for managing the complicated dissemination and usage constraints on diverse resources in dynamic dissemination transaction context. The result proves its feasibility and efficiency.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127282198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}