首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Offline Internet banking fraud detection 线下互联网银行欺诈检测
V. Aggelis
Nowadays, most important topic about Internet banking is security. Banks' basic concern is ensuring their customers' electronic transactions. Nevertheless, fraudsters are becoming more sophisticated and they act really clever to achieve their target. Having this knowledge, banks try to optimize their detection systems in order to detect fraud and investigate suspect online behavior and transactions. Object of this paper is to demonstrate one successful fraud detection model which is established in Greece. Apart from the offline Internet banking fraud detection system itself, which is described briefly, our scope is to present its contribution in fast and reliable detection of any "strange" transaction including fraudulent ones.
目前,网上银行最重要的话题就是安全问题。银行最关心的是确保客户的电子交易。然而,欺诈者正变得越来越老练,他们表现得非常聪明,以达到他们的目标。有了这些知识,银行试图优化他们的检测系统,以检测欺诈并调查可疑的在线行为和交易。本文的目的是展示一个在希腊建立的成功的欺诈检测模型。除了简单描述的线下互联网银行欺诈检测系统本身外,我们的范围是展示它在快速可靠地检测任何“奇怪”交易(包括欺诈交易)方面的贡献。
{"title":"Offline Internet banking fraud detection","authors":"V. Aggelis","doi":"10.1109/ARES.2006.89","DOIUrl":"https://doi.org/10.1109/ARES.2006.89","url":null,"abstract":"Nowadays, most important topic about Internet banking is security. Banks' basic concern is ensuring their customers' electronic transactions. Nevertheless, fraudsters are becoming more sophisticated and they act really clever to achieve their target. Having this knowledge, banks try to optimize their detection systems in order to detect fraud and investigate suspect online behavior and transactions. Object of this paper is to demonstrate one successful fraud detection model which is established in Greece. Apart from the offline Internet banking fraud detection system itself, which is described briefly, our scope is to present its contribution in fast and reliable detection of any \"strange\" transaction including fraudulent ones.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133581038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Ecosystem of naming systems: discussions on a framework to induce smart space naming systems development 命名系统的生态系统:探讨一个引导智能空间命名系统发展的框架
Yusuke Doi, S. Wakayama, M. Ishiyama, S. Ozaki, Tomohiro Ishihara, Yojiro Uo
In this paper, we discuss the ecosystem of naming systems for smart spaces. Since we think resolution of detected object names should be a common trigger of smart space applications, we focus on naming systems. We aim at a naming system framework to enable the following. First, each application developer of smart spaces can design and implement new applications freely. Minimal limitations should be imposed on developers. Second, users can interact with applications opaquely. We propose combination of the following two approaches to induce naming systems evolution for smart space applications. The first approach is integration of independent naming systems for simple client resolvers. The second approach is a client resolver model to handle independent naming systems concurrently. We also describe some case studies concerning smart space application scenarios.
本文讨论了智能空间命名系统的生态系统。由于我们认为检测到的对象名称的解析应该是智能空间应用程序的一个常见触发器,因此我们将重点放在命名系统上。我们的目标是一个命名系统框架来实现以下功能。首先,每个智能空间的应用开发者都可以自由地设计和实现新的应用。应该对开发人员施加最小限度的限制。其次,用户可以不透明地与应用程序交互。我们建议将以下两种方法结合起来,以诱导智能空间应用的命名系统演变。第一种方法是为简单的客户机解析器集成独立的命名系统。第二种方法是客户机解析器模型,用于并发处理独立的命名系统。我们还描述了一些关于智能空间应用场景的案例研究。
{"title":"Ecosystem of naming systems: discussions on a framework to induce smart space naming systems development","authors":"Yusuke Doi, S. Wakayama, M. Ishiyama, S. Ozaki, Tomohiro Ishihara, Yojiro Uo","doi":"10.1109/ARES.2006.57","DOIUrl":"https://doi.org/10.1109/ARES.2006.57","url":null,"abstract":"In this paper, we discuss the ecosystem of naming systems for smart spaces. Since we think resolution of detected object names should be a common trigger of smart space applications, we focus on naming systems. We aim at a naming system framework to enable the following. First, each application developer of smart spaces can design and implement new applications freely. Minimal limitations should be imposed on developers. Second, users can interact with applications opaquely. We propose combination of the following two approaches to induce naming systems evolution for smart space applications. The first approach is integration of independent naming systems for simple client resolvers. The second approach is a client resolver model to handle independent naming systems concurrently. We also describe some case studies concerning smart space application scenarios.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
RATING: rigorous assessment of trust in identity management 评级:对身份管理信任的严格评估
Rajarajan Sampath, Deepak Goel
Trust can be an important aspect for decision-making in the Internet. This paper proposes a new trust establishment model for identity management on the Internet. After discussing the challenges and opportunities of a trust model in identity management, we describe our trust model in detail. The fundamental difference to existing models (or the lack of) in identity management is the establishment of trust and evaluation of trust in this model changes over time. Leaving greater incentives to constantly seek and learn from the past behavior to influence their future. Moreover this model acknowledges the heterogeneity of service providers, and lastly this model proposes some attenuation measures to counter biased ratings in identity management scenarios.
信任是互联网决策的一个重要方面。提出了一种新的基于Internet的身份管理信任建立模型。在讨论了信任模型在身份管理中的挑战和机遇之后,我们详细描述了我们的信任模型。与身份管理中现有模型(或缺乏)的根本区别在于,该模型中信任的建立和信任的评估会随着时间的推移而变化。留下更大的动机,不断寻求和学习过去的行为,以影响他们的未来。此外,该模型承认服务提供商的异质性,最后,该模型提出了一些衰减措施,以对抗身份管理场景中有偏见的评级。
{"title":"RATING: rigorous assessment of trust in identity management","authors":"Rajarajan Sampath, Deepak Goel","doi":"10.1109/ARES.2006.103","DOIUrl":"https://doi.org/10.1109/ARES.2006.103","url":null,"abstract":"Trust can be an important aspect for decision-making in the Internet. This paper proposes a new trust establishment model for identity management on the Internet. After discussing the challenges and opportunities of a trust model in identity management, we describe our trust model in detail. The fundamental difference to existing models (or the lack of) in identity management is the establishment of trust and evaluation of trust in this model changes over time. Leaving greater incentives to constantly seek and learn from the past behavior to influence their future. Moreover this model acknowledges the heterogeneity of service providers, and lastly this model proposes some attenuation measures to counter biased ratings in identity management scenarios.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132289955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A secure e-exam management system 安全的电子考试管理系统
Jordi Castellà-Roca, J. Herrera-Joancomartí, Aleix Dorca-Josa
Secure electronic exams are one of the most difficult challenges in e-learning security. The relevance of the examination process for any academic institution implies that different security mechanisms must be applied in order to preserve some security properties during different examination stages. In this paper, we present a secure e-exam management system where all exam related information is in digital format. We propose a cryptographic scheme that has to be executed in order to achieve the desired security levels at every exam stage.
安全的电子考试是电子学习安全中最困难的挑战之一。任何学术机构的考试过程的相关性意味着必须应用不同的安全机制,以便在不同的考试阶段保持某些安全属性。在本文中,我们提出了一个安全的电子考试管理系统,所有的考试相关信息都是数字化的。我们提出了一个必须执行的加密方案,以便在每个考试阶段达到所需的安全级别。
{"title":"A secure e-exam management system","authors":"Jordi Castellà-Roca, J. Herrera-Joancomartí, Aleix Dorca-Josa","doi":"10.1109/ARES.2006.14","DOIUrl":"https://doi.org/10.1109/ARES.2006.14","url":null,"abstract":"Secure electronic exams are one of the most difficult challenges in e-learning security. The relevance of the examination process for any academic institution implies that different security mechanisms must be applied in order to preserve some security properties during different examination stages. In this paper, we present a secure e-exam management system where all exam related information is in digital format. We propose a cryptographic scheme that has to be executed in order to achieve the desired security levels at every exam stage.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127052666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
A method for the identification of inaccuracies in pupil segmentation 瞳孔分割不准确的识别方法
Hugo Proença, Luís A. Alexandre
In this paper we analyze the relationship between the accuracy of the segmentation algorithm and the error rates of typical iris recognition systems. We selected 1000 images from the UBIRIS database that the segmentation algorithm can accurately segment and artificially introduced segmentation inaccuracies. We repeated the recognition tests and concluded about the strong relationship between the errors in the pupil segmentation and the overall false reject rate. Based on this fact, we propose a method to identify these inaccuracies.
本文分析了典型虹膜识别系统中分割算法的准确率与错误率之间的关系。我们从UBIRIS数据库中选择了1000张分割算法可以准确分割的图像,并人为引入了分割不准确性。我们重复了识别测试,得出了瞳孔分割错误与整体误拒率之间的密切关系。基于这一事实,我们提出了一种识别这些不准确的方法。
{"title":"A method for the identification of inaccuracies in pupil segmentation","authors":"Hugo Proença, Luís A. Alexandre","doi":"10.1109/ARES.2006.9","DOIUrl":"https://doi.org/10.1109/ARES.2006.9","url":null,"abstract":"In this paper we analyze the relationship between the accuracy of the segmentation algorithm and the error rates of typical iris recognition systems. We selected 1000 images from the UBIRIS database that the segmentation algorithm can accurately segment and artificially introduced segmentation inaccuracies. We repeated the recognition tests and concluded about the strong relationship between the errors in the pupil segmentation and the overall false reject rate. Based on this fact, we propose a method to identify these inaccuracies.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115955947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Security requirement with a UML 2.0 profile UML 2.0概要文件的安全性需求
Alfonso Rodríguez, E. Fernández-Medina, M. Piattini
Business processes are important for companies because they allow us to obtain an advanced marketplace position, and then, these enterprises can optimize and assure the quality of their products and services. Moreover, business processes are important for software developers, because they can capture from them the necessary requirements for software design and creation. At the same time, organizations have been opened and this implies more vulnerability. In spite of all these facts, security is an aspect that has been scarcely dealt with in the business process modeling. In this paper, we summarize our UML 2.0 profile for secure business process modeling through activity diagrams, and we apply this approach to a typical health-care business process.
业务流程对公司来说很重要,因为它们使我们能够获得先进的市场地位,然后,这些企业可以优化并确保其产品和服务的质量。此外,业务流程对软件开发人员很重要,因为他们可以从中获取软件设计和创建的必要需求。同时,组织已经开放,这意味着更多的脆弱性。尽管存在所有这些事实,安全性仍然是业务流程建模中很少涉及的一个方面。在本文中,我们通过活动图总结了安全业务流程建模的UML 2.0概要,并将此方法应用于典型的医疗保健业务流程。
{"title":"Security requirement with a UML 2.0 profile","authors":"Alfonso Rodríguez, E. Fernández-Medina, M. Piattini","doi":"10.1109/ARES.2006.125","DOIUrl":"https://doi.org/10.1109/ARES.2006.125","url":null,"abstract":"Business processes are important for companies because they allow us to obtain an advanced marketplace position, and then, these enterprises can optimize and assure the quality of their products and services. Moreover, business processes are important for software developers, because they can capture from them the necessary requirements for software design and creation. At the same time, organizations have been opened and this implies more vulnerability. In spite of all these facts, security is an aspect that has been scarcely dealt with in the business process modeling. In this paper, we summarize our UML 2.0 profile for secure business process modeling through activity diagrams, and we apply this approach to a typical health-care business process.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116552862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Recovery mechanism of cooperative process chain in grid 网格协同过程链的恢复机制
Mingchu Li, Hongyan Yao
A series of distributed processes usually need to be created in order to complete a user's task in grid environment, and these processes which have been created at different grid site form a process organization (called process-tree). Due to the dynamic of grid resource and some uncertain factors, some process nodes in this tree may be not accessible by the other related ones. It leads to a process-tree broken problem. As a result, it would block further execution of the processes we have created. Up to now, there is no good solution to solve the problem. In this paper we explore this problem and discuss how to handle it if some inaccessible nodes in process-tree happened, and how to ensure the integrity of organization structure of distributed processes. After making a comparison and analysis with the traditional distributed systems, we provide a new mechanism to increase reliability of grid-based computing environments and restore the inaccessible process-node over process tree in grid environment and endeavoring to keep the integrity of the original process organization structure. This new mechanism would adopts two types of additional information and two extra process actions to help restore the original process but not disturb the existing dynamic characters of grid resources, and grid tasks can be performed efficiently as well.
在网格环境中,为了完成用户的任务,通常需要创建一系列分布式的进程,这些进程在不同的网格站点上创建,形成一个进程组织(称为进程树)。由于网格资源的动态性和一些不确定因素,该树中的一些过程节点可能无法被其他相关节点访问。这会导致流程树中断的问题。因此,它将阻止我们创建的流程的进一步执行。到目前为止,还没有很好的办法来解决这个问题。本文对这一问题进行了探讨,讨论了在过程树中出现不可访问节点时如何处理,以及如何保证分布式过程组织结构的完整性。在与传统的分布式系统进行比较分析后,提出了一种新的机制来提高网格计算环境的可靠性,恢复网格环境中不可访问的进程节点over进程树,并尽量保持原有进程组织结构的完整性。该机制采用了两种附加信息和两种附加进程动作,在不干扰网格资源已有动态特性的前提下恢复了原有的进程,并且网格任务可以高效地执行。
{"title":"Recovery mechanism of cooperative process chain in grid","authors":"Mingchu Li, Hongyan Yao","doi":"10.1109/ARES.2006.104","DOIUrl":"https://doi.org/10.1109/ARES.2006.104","url":null,"abstract":"A series of distributed processes usually need to be created in order to complete a user's task in grid environment, and these processes which have been created at different grid site form a process organization (called process-tree). Due to the dynamic of grid resource and some uncertain factors, some process nodes in this tree may be not accessible by the other related ones. It leads to a process-tree broken problem. As a result, it would block further execution of the processes we have created. Up to now, there is no good solution to solve the problem. In this paper we explore this problem and discuss how to handle it if some inaccessible nodes in process-tree happened, and how to ensure the integrity of organization structure of distributed processes. After making a comparison and analysis with the traditional distributed systems, we provide a new mechanism to increase reliability of grid-based computing environments and restore the inaccessible process-node over process tree in grid environment and endeavoring to keep the integrity of the original process organization structure. This new mechanism would adopts two types of additional information and two extra process actions to help restore the original process but not disturb the existing dynamic characters of grid resources, and grid tasks can be performed efficiently as well.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A declarative control language for dependable XML message queues 一种用于可靠XML消息队列的声明性控制语言
Alexander Böhm, C. Kanne, G. Moerkotte
We present a novel approach for the implementation of efficient and dependable Web service engines (WSEs). A WSE instance represents a single node in a distributed network of participants that communicate using XML messages. We introduce a fully declarative language custom-tailored to XML message processing that allows to specify business processes in a concise manner. To support the efficient and reliable evaluation of our language, we show how to augment a native, transactional XML data store with efficient and reliable XML message queues.
我们提出了一种实现高效可靠的Web服务引擎(wse)的新方法。WSE实例表示使用XML消息进行通信的参与者的分布式网络中的单个节点。我们引入了一种为XML消息处理定制的完全声明性语言,它允许以简洁的方式指定业务流程。为了支持对语言进行高效可靠的评估,我们将展示如何使用高效可靠的XML消息队列来增强本机事务性XML数据存储。
{"title":"A declarative control language for dependable XML message queues","authors":"Alexander Böhm, C. Kanne, G. Moerkotte","doi":"10.1109/ARES.2006.4","DOIUrl":"https://doi.org/10.1109/ARES.2006.4","url":null,"abstract":"We present a novel approach for the implementation of efficient and dependable Web service engines (WSEs). A WSE instance represents a single node in a distributed network of participants that communicate using XML messages. We introduce a fully declarative language custom-tailored to XML message processing that allows to specify business processes in a concise manner. To support the efficient and reliable evaluation of our language, we show how to augment a native, transactional XML data store with efficient and reliable XML message queues.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131041545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Risk management approach on identity theft in biometric systems context 生物识别系统背景下身份盗窃的风险管理方法
Sabine Delaître
This paper introduces issues of risk management applied to biometrics. A biometrics study has been recently carried out by the ICT unit team and biometric technologies have been examined from a SELT perspective (social, economic, legal and technological). Different threats have been highlighted, such as identity theft. This paper presents an introduction on the risk "identity theft" in the information society and describes the identity theft as a real threat of the wide implementation of biometrics. Based on the results of the biometrics study and aiming at illustrating risk management on biometrics, the last section deals with the application of a risk process model on the identity theft in biometric systems context.
本文介绍了应用于生物识别技术的风险管理问题。信息和通信技术股小组最近进行了一项生物特征研究,并从SELT(社会、经济、法律和技术)的角度审查了生物特征技术。不同的威胁被强调,比如身份盗窃。本文介绍了信息社会中“身份盗窃”的风险,并将身份盗窃描述为生物识别技术广泛实施的现实威胁。基于生物识别技术的研究结果,最后一部分讨论了风险过程模型在生物识别系统背景下身份盗窃中的应用,旨在说明生物识别技术的风险管理。
{"title":"Risk management approach on identity theft in biometric systems context","authors":"Sabine Delaître","doi":"10.1109/ARES.2006.113","DOIUrl":"https://doi.org/10.1109/ARES.2006.113","url":null,"abstract":"This paper introduces issues of risk management applied to biometrics. A biometrics study has been recently carried out by the ICT unit team and biometric technologies have been examined from a SELT perspective (social, economic, legal and technological). Different threats have been highlighted, such as identity theft. This paper presents an introduction on the risk \"identity theft\" in the information society and describes the identity theft as a real threat of the wide implementation of biometrics. Based on the results of the biometrics study and aiming at illustrating risk management on biometrics, the last section deals with the application of a risk process model on the identity theft in biometric systems context.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Building governments in e-government: settlement of trusted e-oligarchy 电子政务中的政府建设:可信电子寡头的解决
S. Daskapan
More and more governments tend also to offer their services for mobile users. For many of their e-transactions that involve one or more pervasive computing entities, the role of a central trusted authority (TA) for assuring the binding between the identities and the used asymmetric keys is crucial. Usually governments take care of such a trusted third party. However, when this TA becomes unreachable, governments cannot instantly set up another TA and recovering the original TA takes too much valuable time. The reliance on those TA's without another alternative trust system can therefore jeopardize the transactions. In this paper a mechanism is proposed in which new TA's can be (re)elected autonomously and securely by a group of computing entities from their midst when the original TA becomes unreachable. Those new TA's rule then as an oligarchy over the other computing entities.
越来越多的政府也倾向于为移动用户提供服务。对于许多涉及一个或多个普及计算实体的电子交易,确保身份与所使用的非对称密钥之间的绑定的中心可信权威(TA)的作用至关重要。通常政府会照顾这样一个值得信赖的第三方。然而,当这个TA无法到达时,政府不能立即建立另一个TA,恢复原来的TA需要花费太多宝贵的时间。因此,在没有其他替代信任系统的情况下,对这些TA的依赖可能会危及交易。本文提出了一种机制,在原TA不可达的情况下,由一组计算实体从原TA中间自主(重新)安全地选出新的TA。这些新的技术助理就像寡头一样统治着其他的计算实体。
{"title":"Building governments in e-government: settlement of trusted e-oligarchy","authors":"S. Daskapan","doi":"10.1109/ARES.2006.40","DOIUrl":"https://doi.org/10.1109/ARES.2006.40","url":null,"abstract":"More and more governments tend also to offer their services for mobile users. For many of their e-transactions that involve one or more pervasive computing entities, the role of a central trusted authority (TA) for assuring the binding between the identities and the used asymmetric keys is crucial. Usually governments take care of such a trusted third party. However, when this TA becomes unreachable, governments cannot instantly set up another TA and recovering the original TA takes too much valuable time. The reliance on those TA's without another alternative trust system can therefore jeopardize the transactions. In this paper a mechanism is proposed in which new TA's can be (re)elected autonomously and securely by a group of computing entities from their midst when the original TA becomes unreachable. Those new TA's rule then as an oligarchy over the other computing entities.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1