首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Validation of IT-security measurement tools 验证it安全度量工具
Ruedi Baer, Martin Dietrich
Different norms demand the measurment of IT-security. But how the measurement should be carried out, is not part of the norms. To compare the results of the different methods and tools with each other, it is necessary to validate the measuring tools. The scientific validation of measuring tools in the area of IT-security raises many questions that have not been discussed not to mention answered.
不同的规范要求对it安全进行衡量。但是测量应该如何进行,并不是规范的一部分。为了比较不同方法和工具的结果,有必要对测量工具进行验证。it安全领域测量工具的科学验证提出了许多尚未讨论的问题,更不用说回答了。
{"title":"Validation of IT-security measurement tools","authors":"Ruedi Baer, Martin Dietrich","doi":"10.1109/ARES.2006.142","DOIUrl":"https://doi.org/10.1109/ARES.2006.142","url":null,"abstract":"Different norms demand the measurment of IT-security. But how the measurement should be carried out, is not part of the norms. To compare the results of the different methods and tools with each other, it is necessary to validate the measuring tools. The scientific validation of measuring tools in the area of IT-security raises many questions that have not been discussed not to mention answered.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133020321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing DNS services through system self cleansing and hardware enhancements 通过系统自清理和硬件增强来保护DNS服务
Y. Huang, David Arsenault, A. Sood
Domain name systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are exploited by frequent, targeted attacks. The software vulnerabilities of DNS together with the constant innovation and morphing of cyber attack techniques necessitate the consideration of the worst case scenarios: there will be successful but undetected attacks against DNS servers. In this work, we develop a secure DNS architecture that contains the damage of successful, undetected attacks. This formidable end is achieved by constantly cleansing the servers and rotating the role of individual servers. Moreover, the server rotation process itself is protected against corruption by hardware. We will show the advantages of our design in the following areas: (1) protection of the DNS master file and cryptographic keys, (2) incorruptible intrusion tolerance, (3) high availability, and (4) scalability, the support of using of high degrees of hardware/server redundancy to improve both system security and service dependability. Due to the critical importance of DNS, such a dependable and intrusion-resilient design contributes significantly to the overall security of the Internet.
域名系统(DNS)提供易于记忆的主机名和它们的IP地址之间的映射。然而,流行的DNS实现包含被频繁的、有针对性的攻击所利用的漏洞。DNS的软件漏洞以及网络攻击技术的不断创新和演变需要考虑最坏的情况:将会有针对DNS服务器的成功但未被发现的攻击。在这项工作中,我们开发了一个安全的DNS架构,它包含了成功的、未被发现的攻击的损害。通过不断清理服务器和轮换各个服务器的角色,可以实现这个强大的目标。此外,服务器轮转过程本身受到硬件的保护,不会受到损坏。我们将在以下方面展示我们设计的优势:(1)DNS主文件和加密密钥的保护,(2)不可破坏的入侵容忍,(3)高可用性,以及(4)可扩展性,支持使用高度的硬件/服务器冗余来提高系统安全性和服务可靠性。由于DNS的重要性,这种可靠和抗入侵的设计对互联网的整体安全做出了重要贡献。
{"title":"Securing DNS services through system self cleansing and hardware enhancements","authors":"Y. Huang, David Arsenault, A. Sood","doi":"10.1109/ARES.2006.123","DOIUrl":"https://doi.org/10.1109/ARES.2006.123","url":null,"abstract":"Domain name systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are exploited by frequent, targeted attacks. The software vulnerabilities of DNS together with the constant innovation and morphing of cyber attack techniques necessitate the consideration of the worst case scenarios: there will be successful but undetected attacks against DNS servers. In this work, we develop a secure DNS architecture that contains the damage of successful, undetected attacks. This formidable end is achieved by constantly cleansing the servers and rotating the role of individual servers. Moreover, the server rotation process itself is protected against corruption by hardware. We will show the advantages of our design in the following areas: (1) protection of the DNS master file and cryptographic keys, (2) incorruptible intrusion tolerance, (3) high availability, and (4) scalability, the support of using of high degrees of hardware/server redundancy to improve both system security and service dependability. Due to the critical importance of DNS, such a dependable and intrusion-resilient design contributes significantly to the overall security of the Internet.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A proposal of an anonymous authentication method for flat-rate service 统一收费服务的匿名认证方法的建议
Yoshio Kakizaki, Hiroshi Yamamoto, H. Tsuji
When the Web services are used, there is a case that they need not identify who is the user if the user is the regular user. In this paper, we propose the method that the service based on authority can be used by public-key certificate and attribute certificate without identifying. As a result, the user can take the services though the user with a regular authority is not identified by the service server. Moreover, the service server confirms user is a regular user, and can provide the services without identifying the user. Our method makes it possible to protect the user's usage information.
当使用Web服务时,如果用户是普通用户,则它们不需要标识谁是用户。本文提出了一种基于授权的服务可以被公钥证书和属性证书使用而无需标识的方法。这样,即使具有常规权限的用户不被服务服务器识别,该用户也可以接受服务。并且,服务服务器确认用户是普通用户,可以在不识别用户的情况下提供服务。我们的方法使保护用户的使用信息成为可能。
{"title":"A proposal of an anonymous authentication method for flat-rate service","authors":"Yoshio Kakizaki, Hiroshi Yamamoto, H. Tsuji","doi":"10.1109/ARES.2006.12","DOIUrl":"https://doi.org/10.1109/ARES.2006.12","url":null,"abstract":"When the Web services are used, there is a case that they need not identify who is the user if the user is the regular user. In this paper, we propose the method that the service based on authority can be used by public-key certificate and attribute certificate without identifying. As a result, the user can take the services though the user with a regular authority is not identified by the service server. Moreover, the service server confirms user is a regular user, and can provide the services without identifying the user. Our method makes it possible to protect the user's usage information.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114786361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Supporting attribute-based access control with ontologies 支持使用本体进行基于属性的访问控制
Torsten Priebe, Wolfgang Dobmeier, N. Kamprath
In highly open systems like the Internet, attribute-based access control (ABAC) has proven its appropriateness. The specification and maintenance of ABAC policies however has turned out to be complex and error-prone, especially if heterogeneous attribute schemes are involved. Here, the arising semantic Web can contribute to a solution. This paper presents an approach based on an extension of the established XACML standard. It simplifies the policies by providing an ontology-based attribute management facility.
在像Internet这样高度开放的系统中,基于属性的访问控制(ABAC)已经证明了它的适用性。然而,ABAC策略的规范和维护变得复杂且容易出错,特别是在涉及异构属性方案的情况下。在这里,出现的语义Web可以为解决方案做出贡献。本文提出了一种基于已建立的XACML标准扩展的方法。它通过提供基于本体的属性管理工具来简化策略。
{"title":"Supporting attribute-based access control with ontologies","authors":"Torsten Priebe, Wolfgang Dobmeier, N. Kamprath","doi":"10.1109/ARES.2006.127","DOIUrl":"https://doi.org/10.1109/ARES.2006.127","url":null,"abstract":"In highly open systems like the Internet, attribute-based access control (ABAC) has proven its appropriateness. The specification and maintenance of ABAC policies however has turned out to be complex and error-prone, especially if heterogeneous attribute schemes are involved. Here, the arising semantic Web can contribute to a solution. This paper presents an approach based on an extension of the established XACML standard. It simplifies the policies by providing an ontology-based attribute management facility.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117044310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Towards a stochastic model for integrated security and dependability evaluation 安全性与可靠性综合评估的随机模型研究
K. Sallhammar, B. Helvik, S. J. Knapskog
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures of the trustworthiness of a system, regardless if the underlying failure cause is intentional or not. By viewing system states as elements in a stochastic game, we can compute the probabilities of expected attacker behavior, and thereby be able to model attacks as transitions between system states. The proposed game model is based on a reward-and cost concept. A section of the paper is devoted to the demonstration of how the expected attacker behavior is affected by the parameters of the game. Our model opens up for use traditional Markov analysis to make new types of probabilistic predictions for a system, such as its expected time to security failure.
提出了一种基于随机建模技术的安全可靠性综合评估新方法。我们的建议旨在提供系统可信度的操作度量,而不管潜在的故障原因是否是故意的。通过将系统状态视为随机博弈中的元素,我们可以计算预期攻击者行为的概率,从而能够将攻击建模为系统状态之间的转换。所提出的博弈模型是基于奖励和成本的概念。论文的一个部分专门用于演示预期的攻击者行为如何受到游戏参数的影响。我们的模型为使用传统的马尔可夫分析来对系统进行新型的概率预测开辟了道路,例如其安全故障的预期时间。
{"title":"Towards a stochastic model for integrated security and dependability evaluation","authors":"K. Sallhammar, B. Helvik, S. J. Knapskog","doi":"10.1109/ARES.2006.137","DOIUrl":"https://doi.org/10.1109/ARES.2006.137","url":null,"abstract":"We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures of the trustworthiness of a system, regardless if the underlying failure cause is intentional or not. By viewing system states as elements in a stochastic game, we can compute the probabilities of expected attacker behavior, and thereby be able to model attacks as transitions between system states. The proposed game model is based on a reward-and cost concept. A section of the paper is devoted to the demonstration of how the expected attacker behavior is affected by the parameters of the game. Our model opens up for use traditional Markov analysis to make new types of probabilistic predictions for a system, such as its expected time to security failure.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
An ontology for secure e-government applications 安全电子政务应用的本体
Maria Karyda, Theodoros Balopoulos, L. Gymnopoulos, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, S. Dritsas
This paper addresses the issue of accommodating security requirements in application development. It proposes the use of ontologies for capturing and depicting the security experts' knowledge. In this way developers can exploit security expertise in order to make design choices that help them fulfil security requirements more effectively. We have developed a security ontology for two different application scenarios to illustrate its use. To validate the ontology we have used queries.
本文讨论了在应用程序开发中适应安全需求的问题。它建议使用本体来捕获和描述安全专家的知识。通过这种方式,开发人员可以利用安全专业知识来做出设计选择,帮助他们更有效地满足安全需求。我们已经为两个不同的应用程序场景开发了一个安全本体来说明它的用法。为了验证本体,我们使用了查询。
{"title":"An ontology for secure e-government applications","authors":"Maria Karyda, Theodoros Balopoulos, L. Gymnopoulos, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, S. Dritsas","doi":"10.1109/ARES.2006.28","DOIUrl":"https://doi.org/10.1109/ARES.2006.28","url":null,"abstract":"This paper addresses the issue of accommodating security requirements in application development. It proposes the use of ontologies for capturing and depicting the security experts' knowledge. In this way developers can exploit security expertise in order to make design choices that help them fulfil security requirements more effectively. We have developed a security ontology for two different application scenarios to illustrate its use. To validate the ontology we have used queries.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123610169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
An extended verifiable secret redistribution protocol for archival systems 档案系统的可验证秘密再分发协议
V. Gupta, K. Gopinath
Existing protocols for archival systems make use of verifiability of shares in conjunction with a proactive secret sharing scheme to achieve high availability and long term confidentiality, besides data integrity. In this paper, we extend an existing protocol (Wong et al. [2002]) to take care of more realistic situations. For example, it is assumed in the protocol of Wong et al. that the recipients of the secret shares are all trustworthy; we relax this by requiring that only a majority is trustworthy.
现有的档案系统协议利用股份的可核实性,并结合一个主动的秘密共享计划,以实现高可用性和长期机密性,以及数据完整性。在本文中,我们扩展了现有的协议(Wong et al.[2002]),以照顾更现实的情况。例如,Wong等人的协议假设秘密股份的接收者都是值得信赖的;我们放宽了这一点,要求只有多数人是值得信赖的。
{"title":"An extended verifiable secret redistribution protocol for archival systems","authors":"V. Gupta, K. Gopinath","doi":"10.1109/ARES.2006.26","DOIUrl":"https://doi.org/10.1109/ARES.2006.26","url":null,"abstract":"Existing protocols for archival systems make use of verifiability of shares in conjunction with a proactive secret sharing scheme to achieve high availability and long term confidentiality, besides data integrity. In this paper, we extend an existing protocol (Wong et al. [2002]) to take care of more realistic situations. For example, it is assumed in the protocol of Wong et al. that the recipients of the secret shares are all trustworthy; we relax this by requiring that only a majority is trustworthy.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122110557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
The usability and practicality of biometric authentication in the workplace 生物识别认证在工作场所的可用性和实用性
C. Maple, P. Norrington
This paper discusses usability and practicality issues for authentication systems based on biometrics. The effectiveness of a system incorporating an authentication method depends not only on theoretical and technological issues, but also on user interaction with and practical implementation of the system by an organisation. It is becoming increasingly common that IT and physical security are converging, especially in the workplace. This has significant ramifications for the workforce and operational matters. In this paper we pay particular attention to the potential issues that arise when companies introduce biometrics for IT or physical security and provide recommendations that help ensure a usable and practical implementation of the technology.
本文讨论了基于生物特征的身份认证系统的可用性和实用性问题。纳入认证方法的系统的有效性不仅取决于理论和技术问题,还取决于用户与系统的交互和组织对系统的实际实施。It和物理安全的融合正变得越来越普遍,尤其是在工作场所。这对劳动力和运营事务产生了重大影响。在本文中,我们特别关注公司为IT或物理安全引入生物识别技术时出现的潜在问题,并提供有助于确保该技术可用和实际实施的建议。
{"title":"The usability and practicality of biometric authentication in the workplace","authors":"C. Maple, P. Norrington","doi":"10.1109/ARES.2006.133","DOIUrl":"https://doi.org/10.1109/ARES.2006.133","url":null,"abstract":"This paper discusses usability and practicality issues for authentication systems based on biometrics. The effectiveness of a system incorporating an authentication method depends not only on theoretical and technological issues, but also on user interaction with and practical implementation of the system by an organisation. It is becoming increasingly common that IT and physical security are converging, especially in the workplace. This has significant ramifications for the workforce and operational matters. In this paper we pay particular attention to the potential issues that arise when companies introduce biometrics for IT or physical security and provide recommendations that help ensure a usable and practical implementation of the technology.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124661095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Satisfiability and trustworthiness of peers in peer-to-peer overlay networks 点对点覆盖网络中节点的可满足性和可信赖性
Y. Nakajima, Kenichi Watanabe, Naohiro Hayashibara, M. Takizawa, T. Enokido, S. Deen
Service supported by an object is modeled to be a set of methods and quality of service (QoS). In addition to finding a peer which holds a target object, it is critical to discuss what peer is allowed to manipulate the target object in what method. In this paper, we take an acquaintance approach to finding and manipulating objects in P2P overlay networks. An acquaintance peer of a peer p is a peer whose service the peer p know and with which the peer p can directly communicate. If an access request is issued, a peer has to find where a target object exists, how to obtain an access right on the target object, and how to manipulate the target object. In this paper, we discuss ways to obtain results which satisfying an access requests by the cooperation of acquaintances. Acquaintance peers of a peer p may knows different information on target peers since it takes time to propagate change information of the target peers and peers may be faulty. Here, it is critical to discuss how much a peer can trust each acquaintance. We define the trustworthiness of an acquaintance peer in terms of the acquaintance relations among the peers.
对象支持的服务被建模为一组方法和服务质量(QoS)。除了寻找保存目标对象的对等体之外,讨论允许哪个对等体以什么方法操作目标对象也很重要。在本文中,我们采用一种熟悉的方法来寻找和操作P2P覆盖网络中的对象。对等体p的熟人对等体是指对等体p知道其服务并且可以直接与之通信的对等体。如果发出访问请求,对等体必须找到目标对象存在的位置,如何获得对目标对象的访问权限,以及如何操作目标对象。本文讨论了如何通过熟人的合作获得满足访问请求的结果。由于传播目标对等体的变化信息需要时间,并且对等体可能出现故障,因此,对等体p的熟人对等体可能知道目标对等体的不同信息。在这里,讨论一个同伴可以在多大程度上信任每个熟人是至关重要的。我们根据熟人之间的熟人关系来定义熟人的可信度。
{"title":"Satisfiability and trustworthiness of peers in peer-to-peer overlay networks","authors":"Y. Nakajima, Kenichi Watanabe, Naohiro Hayashibara, M. Takizawa, T. Enokido, S. Deen","doi":"10.1109/ARES.2006.116","DOIUrl":"https://doi.org/10.1109/ARES.2006.116","url":null,"abstract":"Service supported by an object is modeled to be a set of methods and quality of service (QoS). In addition to finding a peer which holds a target object, it is critical to discuss what peer is allowed to manipulate the target object in what method. In this paper, we take an acquaintance approach to finding and manipulating objects in P2P overlay networks. An acquaintance peer of a peer p is a peer whose service the peer p know and with which the peer p can directly communicate. If an access request is issued, a peer has to find where a target object exists, how to obtain an access right on the target object, and how to manipulate the target object. In this paper, we discuss ways to obtain results which satisfying an access requests by the cooperation of acquaintances. Acquaintance peers of a peer p may knows different information on target peers since it takes time to propagate change information of the target peers and peers may be faulty. Here, it is critical to discuss how much a peer can trust each acquaintance. We define the trustworthiness of an acquaintance peer in terms of the acquaintance relations among the peers.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125039960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Gait recognition using acceleration from MEMS 基于MEMS加速度的步态识别
D. Gafurov, Kirsi Helkala, Torkjel Søndrol
This paper presents an approach on recognising individuals based on 3D acceleration data from walking, which are collected using MEMS. Unlike most other gait recognition methods, which are based on video source, our approach uses walking acceleration in three directions: vertical, backward-forward and sideways. Using gait samples from 21 individuals and applying two methods, histogram similarity and cycle length, the equal error rates of 5% and 9% are achieved, respectively.
本文提出了一种基于微机电系统采集的三维行走加速度数据的个体识别方法。与大多数其他基于视频源的步态识别方法不同,我们的方法在三个方向上使用行走加速度:垂直、前后和侧向。利用21个个体的步态样本,采用直方图相似度和周期长度两种方法,错误率分别为5%和9%。
{"title":"Gait recognition using acceleration from MEMS","authors":"D. Gafurov, Kirsi Helkala, Torkjel Søndrol","doi":"10.1109/ARES.2006.68","DOIUrl":"https://doi.org/10.1109/ARES.2006.68","url":null,"abstract":"This paper presents an approach on recognising individuals based on 3D acceleration data from walking, which are collected using MEMS. Unlike most other gait recognition methods, which are based on video source, our approach uses walking acceleration in three directions: vertical, backward-forward and sideways. Using gait samples from 21 individuals and applying two methods, histogram similarity and cycle length, the equal error rates of 5% and 9% are achieved, respectively.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127372733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1