首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Workshop-based multiobjective security safeguard selection 基于车间的多目标安全防护选择
T. Neubauer, C. Stummer, E. Weippl
Companies spend considerable amounts of resources on minimizing security breaches but often neglect efficient security measures and/or are not aware whether their investments are effective. While security safeguards traditionally are evaluated through a single (aggregated) criterion such as the return on investment, this may not suffice any longer as economic and legal requirements force top management to pay more attention to security issues. Thus, there is a demand for decision support tools that assist decision makers in allocating security safeguards with respect to multiple objectives of the involved stakeholders. This paper proposes a tool called MOS/sup 3/T (multi-objective security safeguard selection tool), that integrates ideas from multiobjective decision making in a workshop environment The stepwise procedure for the assessment and interactive selection of sets of security safeguards improves security awareness of top management while minimizing the resources required for implementing a proper security environment that meets a corporate's needs.
公司在最小化安全漏洞上花费了相当多的资源,但往往忽视了有效的安全措施和/或不知道他们的投资是否有效。虽然安全保障传统上是通过单一(聚合)标准来评估的,例如投资回报,但这可能不再足够,因为经济和法律需求迫使最高管理层更多地关注安全问题。因此,需要决策支持工具来帮助决策者针对涉众的多个目标分配安全保障。本文提出了一种称为MOS/sup 3/T(多目标安全保障选择工具)的工具,该工具集成了车间环境中多目标决策的思想。安全保障措施集的逐步评估和交互式选择过程提高了最高管理层的安全意识,同时最大限度地减少了实现满足企业需求的适当安全环境所需的资源。
{"title":"Workshop-based multiobjective security safeguard selection","authors":"T. Neubauer, C. Stummer, E. Weippl","doi":"10.1109/ARES.2006.144","DOIUrl":"https://doi.org/10.1109/ARES.2006.144","url":null,"abstract":"Companies spend considerable amounts of resources on minimizing security breaches but often neglect efficient security measures and/or are not aware whether their investments are effective. While security safeguards traditionally are evaluated through a single (aggregated) criterion such as the return on investment, this may not suffice any longer as economic and legal requirements force top management to pay more attention to security issues. Thus, there is a demand for decision support tools that assist decision makers in allocating security safeguards with respect to multiple objectives of the involved stakeholders. This paper proposes a tool called MOS/sup 3/T (multi-objective security safeguard selection tool), that integrates ideas from multiobjective decision making in a workshop environment The stepwise procedure for the assessment and interactive selection of sets of security safeguards improves security awareness of top management while minimizing the resources required for implementing a proper security environment that meets a corporate's needs.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"530 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Proposed framework for achieving interoperable services between European public administrations 为实现欧洲公共管理部门之间的可互操作服务而提出的框架
Amir Hayat, T. Rössler, Muhammad Alam
The interoperability issues among the public administrations of the European Union is in the spot light. An additional pressure on these public administrations comes from the fact that the need for exchanging vital records of mobile European citizens is on the rise. The citizens face difficult situations because of lack of integration and interoperability between the public administrations. In this paper we propose a framework with the help of which the public administrations in different Member States can securely and efficiently exchange citizen's vital records. The electronic identity (eID) concept plays a central role in this proposed framework. Our framework on one hand removes the burden of complex interactions, with several public administrations, from citizen end and on the other hand helps public administrations in becoming more efficient and providing better services without disturbing their internal processes.
欧盟公共管理部门之间的互操作性问题备受关注。这些公共行政部门面临的另一个压力来自这样一个事实:交换流动欧洲公民重要记录的需求正在上升。由于公共行政部门之间缺乏整合和互操作性,公民面临困境。在本文中,我们提出了一个框架,在此框架的帮助下,不同成员国的公共行政部门可以安全有效地交换公民的生命记录。电子身份(eID)概念在该框架中起着核心作用。我们的框架一方面从公民方面消除了与若干公共行政部门进行复杂互动的负担,另一方面帮助公共行政部门提高效率和提供更好的服务,而不干扰其内部进程。
{"title":"Proposed framework for achieving interoperable services between European public administrations","authors":"Amir Hayat, T. Rössler, Muhammad Alam","doi":"10.1109/ARES.2006.97","DOIUrl":"https://doi.org/10.1109/ARES.2006.97","url":null,"abstract":"The interoperability issues among the public administrations of the European Union is in the spot light. An additional pressure on these public administrations comes from the fact that the need for exchanging vital records of mobile European citizens is on the rise. The citizens face difficult situations because of lack of integration and interoperability between the public administrations. In this paper we propose a framework with the help of which the public administrations in different Member States can securely and efficiently exchange citizen's vital records. The electronic identity (eID) concept plays a central role in this proposed framework. Our framework on one hand removes the burden of complex interactions, with several public administrations, from citizen end and on the other hand helps public administrations in becoming more efficient and providing better services without disturbing their internal processes.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127395565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ecosystem of naming systems: discussions on a framework to induce smart space naming systems development 命名系统的生态系统:探讨一个引导智能空间命名系统发展的框架
Yusuke Doi, S. Wakayama, M. Ishiyama, S. Ozaki, Tomohiro Ishihara, Yojiro Uo
In this paper, we discuss the ecosystem of naming systems for smart spaces. Since we think resolution of detected object names should be a common trigger of smart space applications, we focus on naming systems. We aim at a naming system framework to enable the following. First, each application developer of smart spaces can design and implement new applications freely. Minimal limitations should be imposed on developers. Second, users can interact with applications opaquely. We propose combination of the following two approaches to induce naming systems evolution for smart space applications. The first approach is integration of independent naming systems for simple client resolvers. The second approach is a client resolver model to handle independent naming systems concurrently. We also describe some case studies concerning smart space application scenarios.
本文讨论了智能空间命名系统的生态系统。由于我们认为检测到的对象名称的解析应该是智能空间应用程序的一个常见触发器,因此我们将重点放在命名系统上。我们的目标是一个命名系统框架来实现以下功能。首先,每个智能空间的应用开发者都可以自由地设计和实现新的应用。应该对开发人员施加最小限度的限制。其次,用户可以不透明地与应用程序交互。我们建议将以下两种方法结合起来,以诱导智能空间应用的命名系统演变。第一种方法是为简单的客户机解析器集成独立的命名系统。第二种方法是客户机解析器模型,用于并发处理独立的命名系统。我们还描述了一些关于智能空间应用场景的案例研究。
{"title":"Ecosystem of naming systems: discussions on a framework to induce smart space naming systems development","authors":"Yusuke Doi, S. Wakayama, M. Ishiyama, S. Ozaki, Tomohiro Ishihara, Yojiro Uo","doi":"10.1109/ARES.2006.57","DOIUrl":"https://doi.org/10.1109/ARES.2006.57","url":null,"abstract":"In this paper, we discuss the ecosystem of naming systems for smart spaces. Since we think resolution of detected object names should be a common trigger of smart space applications, we focus on naming systems. We aim at a naming system framework to enable the following. First, each application developer of smart spaces can design and implement new applications freely. Minimal limitations should be imposed on developers. Second, users can interact with applications opaquely. We propose combination of the following two approaches to induce naming systems evolution for smart space applications. The first approach is integration of independent naming systems for simple client resolvers. The second approach is a client resolver model to handle independent naming systems concurrently. We also describe some case studies concerning smart space application scenarios.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
High availability support for the design of stateful networking equipments 对有状态网络设备设计的高可用性支持
P. Ayuso, L. Lefèvre, R. M. Gasca
The availability of some critical equipment like gateways, firewalls and proxies must be guaranteed in operational networks. In early equipments, the routing and filtering decisions were based on the packet information, nowadays this static approach is not longer safe. Existing high availability (HA) solutions do not cover all the aspects to ensure availability of advanced settings that are being deployed these days. Some important issues like the reduction of the downtime and the need for failure detection in such scenarios must be studied. This paper describes the implementation of high available stateful network equipments: these systems apply policies based on the state of the connections, such information is gathered in runtime by means of packet inspection. This work specifically focuses on Linux systems and firewalls because the IT industry trusts more and more OpenSource solutions to deploy critical services because of its quality and the access to the source code. We propose the SNE library (stateful network equipment), which is an add-on to current HA protocols, to solve the existing limitations. In this paper, we describe the proposed architecture and we detail a set problematic scenarios supported by our library, as well as first experiments and the evaluation.
在运行网络中,必须保证一些关键设备(如网关、防火墙和代理)的可用性。在早期的设备中,路由和过滤决策是基于分组信息的,现在这种静态的方法已经不再安全。现有的高可用性(HA)解决方案没有涵盖确保当前部署的高级设置可用性的所有方面。必须研究一些重要的问题,如减少停机时间和在这种情况下需要进行故障检测。本文介绍了一种高可用状态网络设备的实现方法:该系统根据连接的状态实施策略,并通过数据包检测在运行时收集这些信息。这项工作特别关注Linux系统和防火墙,因为IT行业信任越来越多的开源解决方案来部署关键服务,因为它的质量和对源代码的访问。我们提出SNE库(有状态网络设备),它是当前HA协议的附加组件,以解决现有的限制。在本文中,我们描述了提出的体系结构,并详细介绍了我们的库支持的一组有问题的场景,以及第一次实验和评估。
{"title":"High availability support for the design of stateful networking equipments","authors":"P. Ayuso, L. Lefèvre, R. M. Gasca","doi":"10.1109/ARES.2006.71","DOIUrl":"https://doi.org/10.1109/ARES.2006.71","url":null,"abstract":"The availability of some critical equipment like gateways, firewalls and proxies must be guaranteed in operational networks. In early equipments, the routing and filtering decisions were based on the packet information, nowadays this static approach is not longer safe. Existing high availability (HA) solutions do not cover all the aspects to ensure availability of advanced settings that are being deployed these days. Some important issues like the reduction of the downtime and the need for failure detection in such scenarios must be studied. This paper describes the implementation of high available stateful network equipments: these systems apply policies based on the state of the connections, such information is gathered in runtime by means of packet inspection. This work specifically focuses on Linux systems and firewalls because the IT industry trusts more and more OpenSource solutions to deploy critical services because of its quality and the access to the source code. We propose the SNE library (stateful network equipment), which is an add-on to current HA protocols, to solve the existing limitations. In this paper, we describe the proposed architecture and we detail a set problematic scenarios supported by our library, as well as first experiments and the evaluation.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128116409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Building governments in e-government: settlement of trusted e-oligarchy 电子政务中的政府建设:可信电子寡头的解决
S. Daskapan
More and more governments tend also to offer their services for mobile users. For many of their e-transactions that involve one or more pervasive computing entities, the role of a central trusted authority (TA) for assuring the binding between the identities and the used asymmetric keys is crucial. Usually governments take care of such a trusted third party. However, when this TA becomes unreachable, governments cannot instantly set up another TA and recovering the original TA takes too much valuable time. The reliance on those TA's without another alternative trust system can therefore jeopardize the transactions. In this paper a mechanism is proposed in which new TA's can be (re)elected autonomously and securely by a group of computing entities from their midst when the original TA becomes unreachable. Those new TA's rule then as an oligarchy over the other computing entities.
越来越多的政府也倾向于为移动用户提供服务。对于许多涉及一个或多个普及计算实体的电子交易,确保身份与所使用的非对称密钥之间的绑定的中心可信权威(TA)的作用至关重要。通常政府会照顾这样一个值得信赖的第三方。然而,当这个TA无法到达时,政府不能立即建立另一个TA,恢复原来的TA需要花费太多宝贵的时间。因此,在没有其他替代信任系统的情况下,对这些TA的依赖可能会危及交易。本文提出了一种机制,在原TA不可达的情况下,由一组计算实体从原TA中间自主(重新)安全地选出新的TA。这些新的技术助理就像寡头一样统治着其他的计算实体。
{"title":"Building governments in e-government: settlement of trusted e-oligarchy","authors":"S. Daskapan","doi":"10.1109/ARES.2006.40","DOIUrl":"https://doi.org/10.1109/ARES.2006.40","url":null,"abstract":"More and more governments tend also to offer their services for mobile users. For many of their e-transactions that involve one or more pervasive computing entities, the role of a central trusted authority (TA) for assuring the binding between the identities and the used asymmetric keys is crucial. Usually governments take care of such a trusted third party. However, when this TA becomes unreachable, governments cannot instantly set up another TA and recovering the original TA takes too much valuable time. The reliance on those TA's without another alternative trust system can therefore jeopardize the transactions. In this paper a mechanism is proposed in which new TA's can be (re)elected autonomously and securely by a group of computing entities from their midst when the original TA becomes unreachable. Those new TA's rule then as an oligarchy over the other computing entities.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address those 维护城市后台登记处的数据完整性;关于组织障碍和解决这些障碍的方法的调查
R. Peters, Pim Jorg, Marco Meesters, M. Hoogwout, Edwin Stuart
Cities and regional authorities require consistent data on items like persons, addresses, locations and buildings as the fundament for service delivery, fraud-prevention and -detection, permit enforcement, and the effective execution of day to day operations. The concept of basic registries in the Netherlands is introduced to improve data integrity and the single entry for the citizen. Evidence shows that the change that comes with the implementation of basic registries could be more demanding for government organizations than earlier adaptations to the new ICT, like World Wide Web or email. Change triggered by basic registries seems to follow the same path as EDI did for business. Political forces do not realize the impact of this change on daily operations sufficiently. This results in a narrow focus on implementation issues, in which real basic e-government design issues are often neglected. Zenc implemented an action research (participative research method) oriented survey on the implementation of data integrity operations for basic registries in Belgium and the Netherlands. The research unveils a range of methods that government agencies apply to deal with organizational, legal and technical barriers. Early results show a number of patterns in organizational barriers towards the change that accompanies the implementation of basic registries. The research question is if those patterns related to the resistance to introduce basic registries are an indication of core changes in the organization of the public domain rather than 'simple' adoptions of new technologies. The paper describes the findings and seeks to identify key-areas for improvement and in depth research on road maps for data integrity in the back office of government.
城市和地区当局需要关于人员、地址、地点和建筑物等项目的一致数据,作为提供服务、预防和检测欺诈、执行许可证以及有效执行日常业务的基础。在荷兰引入了基本注册的概念,以提高数据完整性和公民的单一条目。有证据表明,与万维网或电子邮件等早期适应新的信息通信技术相比,实施基本注册所带来的变化对政府组织的要求可能更高。由基本注册中心触发的更改似乎遵循EDI为业务所做的相同路径。政治力量没有充分认识到这种变化对日常业务的影响。这导致了对实施问题的狭隘关注,而真正的基本电子政务设计问题往往被忽视。Zenc实施了一项行动研究(参与式研究方法)导向的调查,针对比利时和荷兰的基本注册管理机构实施数据完整性操作。这项研究揭示了政府机构用于处理组织、法律和技术障碍的一系列方法。早期的结果显示了一些组织障碍的模式,这些障碍伴随着基本注册中心的实现。研究的问题是,那些与抵制引入基本注册相关的模式是否表明公共领域组织的核心变化,而不是新技术的“简单”采用。本文描述了调查结果,并试图确定需要改进的关键领域,并对政府后台数据完整性路线图进行深入研究。
{"title":"Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address those","authors":"R. Peters, Pim Jorg, Marco Meesters, M. Hoogwout, Edwin Stuart","doi":"10.1109/ARES.2006.78","DOIUrl":"https://doi.org/10.1109/ARES.2006.78","url":null,"abstract":"Cities and regional authorities require consistent data on items like persons, addresses, locations and buildings as the fundament for service delivery, fraud-prevention and -detection, permit enforcement, and the effective execution of day to day operations. The concept of basic registries in the Netherlands is introduced to improve data integrity and the single entry for the citizen. Evidence shows that the change that comes with the implementation of basic registries could be more demanding for government organizations than earlier adaptations to the new ICT, like World Wide Web or email. Change triggered by basic registries seems to follow the same path as EDI did for business. Political forces do not realize the impact of this change on daily operations sufficiently. This results in a narrow focus on implementation issues, in which real basic e-government design issues are often neglected. Zenc implemented an action research (participative research method) oriented survey on the implementation of data integrity operations for basic registries in Belgium and the Netherlands. The research unveils a range of methods that government agencies apply to deal with organizational, legal and technical barriers. Early results show a number of patterns in organizational barriers towards the change that accompanies the implementation of basic registries. The research question is if those patterns related to the resistance to introduce basic registries are an indication of core changes in the organization of the public domain rather than 'simple' adoptions of new technologies. The paper describes the findings and seeks to identify key-areas for improvement and in depth research on road maps for data integrity in the back office of government.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117323844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-voting: dependability requirements and design for dependability 电子投票:可靠性要求和可靠性设计
J. Bryans, B. Littlewood, P. Ryan, L. Strigini
Elections are increasingly dependent on computers and telecommunication systems. Such "e-voting" schemes create socio-technical systems (combinations of technology and human organisations) that are complex and critical, as the future of nations depends on their proper operation. Thus heated debate surrounds their adoption and the possible methods for making them demonstrably dependable. We discuss the dependability requirements for such systems, and the design issues in ensuring their satisfaction, with reference to a recent proposal that uses cryptography for fault tolerance, in order to avoid some of the perceived dangers of electronic voting. Our treatment highlights the need for considering the whole socio-technical system, and for integrating security and fault tolerance viewpoints.
选举越来越依赖于计算机和电信系统。这种“电子投票”计划创造了复杂而关键的社会技术系统(技术与人类组织的结合),因为国家的未来取决于它们的正确运作。因此,围绕它们的采用和使它们明显可靠的可能方法展开了激烈的辩论。我们讨论了这种系统的可靠性要求,以及确保其满足的设计问题,并参考了最近使用加密技术进行容错的建议,以避免电子投票的一些可感知的危险。我们的处理强调需要考虑整个社会技术系统,以及集成安全性和容错的观点。
{"title":"E-voting: dependability requirements and design for dependability","authors":"J. Bryans, B. Littlewood, P. Ryan, L. Strigini","doi":"10.1109/ARES.2006.56","DOIUrl":"https://doi.org/10.1109/ARES.2006.56","url":null,"abstract":"Elections are increasingly dependent on computers and telecommunication systems. Such \"e-voting\" schemes create socio-technical systems (combinations of technology and human organisations) that are complex and critical, as the future of nations depends on their proper operation. Thus heated debate surrounds their adoption and the possible methods for making them demonstrably dependable. We discuss the dependability requirements for such systems, and the design issues in ensuring their satisfaction, with reference to a recent proposal that uses cryptography for fault tolerance, in order to avoid some of the perceived dangers of electronic voting. Our treatment highlights the need for considering the whole socio-technical system, and for integrating security and fault tolerance viewpoints.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122496396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Dependability in data mining: a perspective from the cost of making decisions 数据挖掘中的可靠性:从决策成本的角度
H. Chung
This study describes the cost involved in maintaining dependability that involves availability, reliability, and security. The comparison of the cost as well as the need to get additional data set to improve the predictive accuracy is fundamentally an economic and policy decision. It is also highly dependent on the nature of the task. For the tasks that deal with massive data sets and/or the tasks often require real time decision making are the ones that would benefit from the cost perspective.
本研究描述了维护可靠性(包括可用性、可靠性和安全性)所涉及的成本。成本的比较以及获得额外数据集以提高预测准确性的需要从根本上是一个经济和政策决策。它还高度依赖于任务的性质。对于处理大量数据集的任务和/或经常需要实时决策的任务,从成本的角度来看,这些任务将受益。
{"title":"Dependability in data mining: a perspective from the cost of making decisions","authors":"H. Chung","doi":"10.1109/ARES.2006.49","DOIUrl":"https://doi.org/10.1109/ARES.2006.49","url":null,"abstract":"This study describes the cost involved in maintaining dependability that involves availability, reliability, and security. The comparison of the cost as well as the need to get additional data set to improve the predictive accuracy is fundamentally an economic and policy decision. It is also highly dependent on the nature of the task. For the tasks that deal with massive data sets and/or the tasks often require real time decision making are the ones that would benefit from the cost perspective.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122455509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure 3G user authentication in adhoc serving networks 安全3G用户认证在特设服务网络
A. Durresi, Lyn Evans, V. Paruchuri, L. Barolli
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G-WLAN user authentication.
蜂窝和IP技术的融合将3G和WLAN网络的集成推向了前沿。从802.11 wlan获得对3G服务的安全访问是这种新的集成无线技术面临的主要挑战。通过使用定义其访问的WLAN的空间数据加密用户的身份验证挑战,可以将3G安全算法的成功执行限制在指定区域。由于只能在当前小区内确定用户位置的能力有限,并且由于隐私原因对访问用户位置的限制,3G运营商必须依赖从访问的wlan发送的空间数据来实现空间身份验证控制。由于与WLAN所有者之间可能没有事先的关系或信任,因此给3G运营商带来了潜在的风险。提出了一种量化3G-WLAN集成网络各方之间信任的算法,以进一步保证用户认证的安全性。探索自组织服务网络和移动用户之间建立的信任关系,为3G-WLAN用户认证定义更强的算法。
{"title":"Secure 3G user authentication in adhoc serving networks","authors":"A. Durresi, Lyn Evans, V. Paruchuri, L. Barolli","doi":"10.1109/ARES.2006.119","DOIUrl":"https://doi.org/10.1109/ARES.2006.119","url":null,"abstract":"The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G-WLAN user authentication.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Resource management continuity with constraint inheritance relation 资源管理的连续性与约束继承关系
Zude Li, Guoqiang Zhan, Xiaojun Ye
Resource management continuity is indispensable against illegal resource dissemination and usage in open environment, which should be guaranteed by an effective constraint management mechanism. In detail, it includes two requirements, (1) guaranteeing resource dissemination continuability and purpose-consistency on the dissemination topology, and (2) allowing more-to-more dissemination relation with multiple dissemination policies available on the extended topology for more complicated applications. As we observed, the existed work cannot capture them satisfyingly. We propose constraint inheritance relation (CIR) on a dynamic dissemination topology to specify the continuity of constraint management to capture the first requirement while extend the previous one-to-one dissemination to capture the second. The policy compatibility is maintained while multiple policies are available. We take it into secure resource management (SRM) model for managing the complicated dissemination and usage constraints on diverse resources in dynamic dissemination transaction context. The result proves its feasibility and efficiency.
防止资源在开放环境下的非法传播和利用,资源管理的连续性必不可少,需要有效的约束管理机制来保障。具体包括两个需求:(1)在传播拓扑上保证资源传播的可持续性和目的一致性;(2)在更复杂的应用中,允许在扩展拓扑上使用多个传播策略的多对多传播关系。正如我们所观察到的,现有的工作不能令人满意地捕捉到它们。我们在动态传播拓扑上提出约束继承关系(CIR)来指定约束管理的连续性以捕获第一个需求,同时扩展先前的一对一传播以捕获第二个需求。当有多个策略可用时,保持策略兼容性。我们将其纳入安全资源管理(SRM)模型,用于管理动态传播事务环境中各种资源的复杂传播和使用约束。结果证明了该方法的可行性和有效性。
{"title":"Resource management continuity with constraint inheritance relation","authors":"Zude Li, Guoqiang Zhan, Xiaojun Ye","doi":"10.1109/ARES.2006.111","DOIUrl":"https://doi.org/10.1109/ARES.2006.111","url":null,"abstract":"Resource management continuity is indispensable against illegal resource dissemination and usage in open environment, which should be guaranteed by an effective constraint management mechanism. In detail, it includes two requirements, (1) guaranteeing resource dissemination continuability and purpose-consistency on the dissemination topology, and (2) allowing more-to-more dissemination relation with multiple dissemination policies available on the extended topology for more complicated applications. As we observed, the existed work cannot capture them satisfyingly. We propose constraint inheritance relation (CIR) on a dynamic dissemination topology to specify the continuity of constraint management to capture the first requirement while extend the previous one-to-one dissemination to capture the second. The policy compatibility is maintained while multiple policies are available. We take it into secure resource management (SRM) model for managing the complicated dissemination and usage constraints on diverse resources in dynamic dissemination transaction context. The result proves its feasibility and efficiency.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127282198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1