首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Availability constraints for avionic data buses 航空电子数据总线的可用性约束
A. Gabillon, L. Gallon
The three traditional objectives of computer security are confidentiality, integrity and availability. Availability can be defined as the prevention of denial of service. Confidentiality and integrity have been addressed in several theoretical works whereas the concept of availability has not been much investigated by the scientific community. This paper is an attempt to define through a case study the concept of availability. We first define a set of availability constraints that avionic data bus protocols should enforce. Then, we consider the ARINC 629 basic protocol (BP) which was implemented on the Boeing 777, and we check whether that ARINC 629 BP respects our availability constraints or not.
计算机安全的三个传统目标是机密性、完整性和可用性。可用性可以定义为防止拒绝服务。保密性和完整性已经在一些理论著作中得到了解决,而可用性的概念还没有得到科学界的广泛研究。本文试图通过一个案例研究来定义可用性的概念。我们首先定义一组航空电子数据总线协议应该执行的可用性约束。然后,我们考虑了在波音777上实现的ARINC 629基本协议(BP),并检查了ARINC 629 BP是否符合我们的可用性约束。
{"title":"Availability constraints for avionic data buses","authors":"A. Gabillon, L. Gallon","doi":"10.1109/ARES.2006.35","DOIUrl":"https://doi.org/10.1109/ARES.2006.35","url":null,"abstract":"The three traditional objectives of computer security are confidentiality, integrity and availability. Availability can be defined as the prevention of denial of service. Confidentiality and integrity have been addressed in several theoretical works whereas the concept of availability has not been much investigated by the scientific community. This paper is an attempt to define through a case study the concept of availability. We first define a set of availability constraints that avionic data bus protocols should enforce. Then, we consider the ARINC 629 basic protocol (BP) which was implemented on the Boeing 777, and we check whether that ARINC 629 BP respects our availability constraints or not.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"19 4 Part 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130784249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Active/active replication for highly available HPC system services 高可用性HPC系统服务的主/主复制
C. Engelmann, S. Scott, C. Leangsuksun, Xubin He
Today's high performance computing systems have several reliability deficiencies resulting in availability and serviceability issues. Head and service nodes represent a single point of failure and control for an entire system as they render it inaccessible and unmanageable in case of a failure until repair, causing a significant downtime. This paper introduces two distinct replication methods (internal and external) for providing symmetric active/active high availability for multiple head and service nodes running in virtual synchrony. It presents a comparison of both methods in terms of expected correctness, ease-of-use and performance based on early results from ongoing work in providing symmetric active/active high availability for two HPC system services (TORQUE and PVFS metadata server). It continues with a short description of a distributed mutual exclusion algorithm and a brief statement regarding the handling of Byzantine failures. This paper concludes with an overview of past and ongoing work, and a short summary of the presented research.
当今的高性能计算系统存在一些可靠性缺陷,从而导致可用性和可维护性问题。头节点和服务节点代表了整个系统的单点故障和控制,因为它们使系统在故障发生时无法访问和管理,直到修复,从而导致大量停机时间。本文介绍了两种不同的复制方法(内部和外部),用于为以虚拟同步方式运行的多个头部和服务节点提供对称的主动/主动高可用性。本文根据正在进行的为两个HPC系统服务(TORQUE和PVFS元数据服务器)提供对称主动/主动高可用性的工作的早期结果,对两种方法在预期正确性、易用性和性能方面进行了比较。接着简要介绍了分布式互斥算法,并简要介绍了拜占庭故障的处理。本文总结了过去和正在进行的工作,并对所提出的研究进行了简短的总结。
{"title":"Active/active replication for highly available HPC system services","authors":"C. Engelmann, S. Scott, C. Leangsuksun, Xubin He","doi":"10.1109/ARES.2006.23","DOIUrl":"https://doi.org/10.1109/ARES.2006.23","url":null,"abstract":"Today's high performance computing systems have several reliability deficiencies resulting in availability and serviceability issues. Head and service nodes represent a single point of failure and control for an entire system as they render it inaccessible and unmanageable in case of a failure until repair, causing a significant downtime. This paper introduces two distinct replication methods (internal and external) for providing symmetric active/active high availability for multiple head and service nodes running in virtual synchrony. It presents a comparison of both methods in terms of expected correctness, ease-of-use and performance based on early results from ongoing work in providing symmetric active/active high availability for two HPC system services (TORQUE and PVFS metadata server). It continues with a short description of a distributed mutual exclusion algorithm and a brief statement regarding the handling of Byzantine failures. This paper concludes with an overview of past and ongoing work, and a short summary of the presented research.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Tamper-resistant replicated peer-to-peer storage using hierarchical signatures 使用分层签名的防篡改复制点对点存储
Alexander Zangerl
Peer-to-peer-based file replication is a proven approach to provide cooperative robust backup for data: if one peer does not have a specific datum, another one might. If enough peers participate, the overall system can survive isolated failures. Applying this approach to distributed file integrity checking (or similar security-sensitive areas) requires that current and untampered information is distributed among the peers in such a way that a limited number of malicious peers cannot subvert or sabotage the overall system. This paper presents a mechanism to provide such tamper-resistant replicated storage in a decentralised peer-to-peer system where no component is trusted a priori. We present a system model for our mechanism, and discuss the threats and countermeasures used to detect tampering. We also give an analysis of various distribution strategies and their respective costs and benefits as observed in our research implementation.
基于点对点的文件复制是一种经过验证的为数据提供协作性健壮备份的方法:如果一个对等点没有特定的数据,另一个可能有。如果有足够多的对等体参与,整个系统就可以承受孤立的故障。将此方法应用于分布式文件完整性检查(或类似的安全敏感领域)需要在对等点之间分发当前的和未篡改的信息,以便有限数量的恶意对等点无法破坏或破坏整个系统。本文提出了一种在分散的点对点系统中提供这种防篡改复制存储的机制,在这种系统中,没有组件是先验可信的。我们提出了该机制的系统模型,并讨论了用于检测篡改的威胁和对策。我们还分析了在我们的研究实施中观察到的各种分销策略及其各自的成本和收益。
{"title":"Tamper-resistant replicated peer-to-peer storage using hierarchical signatures","authors":"Alexander Zangerl","doi":"10.1109/ARES.2006.129","DOIUrl":"https://doi.org/10.1109/ARES.2006.129","url":null,"abstract":"Peer-to-peer-based file replication is a proven approach to provide cooperative robust backup for data: if one peer does not have a specific datum, another one might. If enough peers participate, the overall system can survive isolated failures. Applying this approach to distributed file integrity checking (or similar security-sensitive areas) requires that current and untampered information is distributed among the peers in such a way that a limited number of malicious peers cannot subvert or sabotage the overall system. This paper presents a mechanism to provide such tamper-resistant replicated storage in a decentralised peer-to-peer system where no component is trusted a priori. We present a system model for our mechanism, and discuss the threats and countermeasures used to detect tampering. We also give an analysis of various distribution strategies and their respective costs and benefits as observed in our research implementation.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132319056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A 2/sup d/-tree-based blocking method for microaggregating very large data sets 一种基于2/sup /-tree的阻塞方法,用于微聚合非常大的数据集
A. Solanas, A. Martmez-Balleste, J. Domingo-Ferrer, J. M. Mateo-Sanz
Blocking is a well-known technique used to partition a set of records into several subsets of manageable size. The standard approach to blocking is to split the records according to the values of one or several attributes (called blocking attributes). This paper presents a new blocking method based on 2/sup d/-trees for intelligently partitioning very large data sets for micro aggregation. A number of experiments has been carried out in order to compare our method with the most typical univariate one.
阻塞是一种众所周知的技术,用于将一组记录划分为几个可管理大小的子集。阻塞的标准方法是根据一个或多个属性(称为阻塞属性)的值拆分记录。本文提出了一种基于2/sup /-树的块化方法,用于对超大数据集进行微聚合智能分区。为了将我们的方法与最典型的单变量方法进行比较,进行了许多实验。
{"title":"A 2/sup d/-tree-based blocking method for microaggregating very large data sets","authors":"A. Solanas, A. Martmez-Balleste, J. Domingo-Ferrer, J. M. Mateo-Sanz","doi":"10.1109/ARES.2006.1","DOIUrl":"https://doi.org/10.1109/ARES.2006.1","url":null,"abstract":"Blocking is a well-known technique used to partition a set of records into several subsets of manageable size. The standard approach to blocking is to split the records according to the values of one or several attributes (called blocking attributes). This paper presents a new blocking method based on 2/sup d/-trees for intelligently partitioning very large data sets for micro aggregation. A number of experiments has been carried out in order to compare our method with the most typical univariate one.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On the reliability of Web clusters with partial replication of contents 关于内容部分复制的Web集群的可靠性
José Daniel García Sánchez, J. Carretero, Javier Fernández, Félix García, D. E. Singh, A. Calderón
Traditionally, distributed Web servers have used two strategies for allocating files on server nodes: full replication and full distribution. While full replication provides a highly reliable solution, it limits storage capacity to the capacity of the smallest node. On the other hand, full distribution provides higher storage capacity at the cost of lower reliability. A hybrid solution is partial replication where every file is allocated to a small number of nodes. The most promising architecture for a partial replication strategy is the Web cluster architecture. However, Web clusters present a big flaw from reliability perspective as they contain a single point of failure. To correct this flaw, in this paper we present a modified architecture: the Web cluster with distributed Web switch. Reliability of Web clusters is evaluated for different replication strategies. System evaluations show that our proposal leads to a highly reliable solution with high scalability.
传统上,分布式Web服务器使用两种策略在服务器节点上分配文件:完全复制和完全分发。虽然完全复制提供了高可靠性的解决方案,但它将存储容量限制为最小节点的容量。另一方面,全分布以较低的可靠性为代价提供了较高的存储容量。混合解决方案是部分复制,其中将每个文件分配给少量节点。对于部分复制策略来说,最有前途的体系结构是Web集群体系结构。然而,从可靠性的角度来看,Web集群存在一个很大的缺陷,因为它们包含单点故障。为了纠正这一缺陷,本文提出了一种改进的架构:带有分布式Web交换机的Web集群。对不同复制策略下Web集群的可靠性进行了评估。系统评估表明,我们的方案具有高可靠性和高可扩展性。
{"title":"On the reliability of Web clusters with partial replication of contents","authors":"José Daniel García Sánchez, J. Carretero, Javier Fernández, Félix García, D. E. Singh, A. Calderón","doi":"10.1109/ARES.2006.90","DOIUrl":"https://doi.org/10.1109/ARES.2006.90","url":null,"abstract":"Traditionally, distributed Web servers have used two strategies for allocating files on server nodes: full replication and full distribution. While full replication provides a highly reliable solution, it limits storage capacity to the capacity of the smallest node. On the other hand, full distribution provides higher storage capacity at the cost of lower reliability. A hybrid solution is partial replication where every file is allocated to a small number of nodes. The most promising architecture for a partial replication strategy is the Web cluster architecture. However, Web clusters present a big flaw from reliability perspective as they contain a single point of failure. To correct this flaw, in this paper we present a modified architecture: the Web cluster with distributed Web switch. Reliability of Web clusters is evaluated for different replication strategies. System evaluations show that our proposal leads to a highly reliable solution with high scalability.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126494559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A hybrid network intrusion detection technique using random forests 基于随机森林的混合网络入侵检测技术
Jiong Zhang, Mohammad Zulkernine
Intrusion detection is important in network security. Most current network intrusion detection systems (NIDSs) employ either misuse detection or anomaly detection. However, misuse detection cannot detect unknown intrusions, and anomaly detection usually has high false positive rate. To overcome the limitations of both techniques, we incorporate both anomaly and misuse detection into the NIDS. In this paper, we present our framework of the hybrid system. The system combines the misuse detection and anomaly detection components in which the random forests algorithm is applied. We discuss the advantages of the framework and also report our experimental results over the KDD'99 dataset. The results show that the proposed approach can improve the detection performance of the NIDSs, where only anomaly or misuse detection technique is used.
入侵检测是网络安全的重要组成部分。目前大多数网络入侵检测系统采用误用检测或异常检测。然而,误用检测无法检测到未知入侵,异常检测的误报率较高。为了克服这两种技术的局限性,我们将异常和误用检测结合到NIDS中。在本文中,我们提出了混合系统的框架。该系统结合了误用检测和异常检测两部分,其中采用了随机森林算法。我们讨论了该框架的优点,并报告了我们在KDD'99数据集上的实验结果。结果表明,在仅使用异常或误用检测技术的情况下,该方法可以提高nids的检测性能。
{"title":"A hybrid network intrusion detection technique using random forests","authors":"Jiong Zhang, Mohammad Zulkernine","doi":"10.1109/ARES.2006.7","DOIUrl":"https://doi.org/10.1109/ARES.2006.7","url":null,"abstract":"Intrusion detection is important in network security. Most current network intrusion detection systems (NIDSs) employ either misuse detection or anomaly detection. However, misuse detection cannot detect unknown intrusions, and anomaly detection usually has high false positive rate. To overcome the limitations of both techniques, we incorporate both anomaly and misuse detection into the NIDS. In this paper, we present our framework of the hybrid system. The system combines the misuse detection and anomaly detection components in which the random forests algorithm is applied. We discuss the advantages of the framework and also report our experimental results over the KDD'99 dataset. The results show that the proposed approach can improve the detection performance of the NIDSs, where only anomaly or misuse detection technique is used.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"85 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126084565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 189
Efficient link failure detection and localization using P2P-overlay networks 利用p2p覆盖网络进行有效的链路故障检测和定位
B. Emmert, A. Binzenhöfer
Peer-to-peer (P2P) networks offer a great potential that goes well beyond simple file-sharing. We present a novel approach for using P2P-overlay networks to ensure a sustainable operation of a distributed system. In particular, we show how to detect and localize the causes of physical link failures using the maintenance traffic of a P2P overlay network. The network monitoring architecture can be set up autonomously thereby reducing both the installation costs and the traffic overhead.
点对点(P2P)网络提供了巨大的潜力,远远超出了简单的文件共享。我们提出了一种使用p2p覆盖网络来确保分布式系统可持续运行的新方法。特别是,我们展示了如何使用P2P覆盖网络的维护流量来检测和定位物理链路故障的原因。网络监控体系结构可以自主设置,从而降低了安装成本和流量开销。
{"title":"Efficient link failure detection and localization using P2P-overlay networks","authors":"B. Emmert, A. Binzenhöfer","doi":"10.1109/ARES.2006.58","DOIUrl":"https://doi.org/10.1109/ARES.2006.58","url":null,"abstract":"Peer-to-peer (P2P) networks offer a great potential that goes well beyond simple file-sharing. We present a novel approach for using P2P-overlay networks to ensure a sustainable operation of a distributed system. In particular, we show how to detect and localize the causes of physical link failures using the maintenance traffic of a P2P overlay network. The network monitoring architecture can be set up autonomously thereby reducing both the installation costs and the traffic overhead.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116611646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Model driven security 模型驱动的安全性
D. Basin
Summary form only given. We present an approach to integrating security into the system design process. Namely, models are made of system designs along with their security requirements, and security architectures are automatically generated from the resulting security-design models. We call the resulting approach "model driven security" as it represents a specialization of model driven development to the domain of system security. To illustrate these ideas we present SecureUML, a modeling language based on UML for modeling system designs along with their security requirements. From SecureUML models, we automatically generate security architectures, built from declarative and procedural access control mechanisms, for distributed middleware-based applications. The process has been implemented in the ArcStyler tool, which generates security infrastructures based on Sun's Enterprise Java Bean standard. We report on case studies using this tool, which illustrate the flexibility and power of our approach.
只提供摘要形式。我们提出了一种将安全性集成到系统设计过程中的方法。也就是说,模型是由系统设计和它们的安全需求组成的,安全体系结构是由生成的安全设计模型自动生成的。我们将最终的方法称为“模型驱动的安全性”,因为它代表了模型驱动开发对系统安全性领域的专门化。为了说明这些思想,我们提出了SecureUML,这是一种基于UML的建模语言,用于对系统设计及其安全需求进行建模。从SecureUML模型中,我们自动生成基于声明性和过程性访问控制机制的安全体系结构,用于基于中间件的分布式应用程序。这个过程已经在ArcStyler工具中实现,ArcStyler工具基于Sun的企业Java Bean标准生成安全基础设施。我们报告了使用此工具的案例研究,这些案例说明了我们方法的灵活性和强大性。
{"title":"Model driven security","authors":"D. Basin","doi":"10.1109/ARES.2006.82","DOIUrl":"https://doi.org/10.1109/ARES.2006.82","url":null,"abstract":"Summary form only given. We present an approach to integrating security into the system design process. Namely, models are made of system designs along with their security requirements, and security architectures are automatically generated from the resulting security-design models. We call the resulting approach \"model driven security\" as it represents a specialization of model driven development to the domain of system security. To illustrate these ideas we present SecureUML, a modeling language based on UML for modeling system designs along with their security requirements. From SecureUML models, we automatically generate security architectures, built from declarative and procedural access control mechanisms, for distributed middleware-based applications. The process has been implemented in the ArcStyler tool, which generates security infrastructures based on Sun's Enterprise Java Bean standard. We report on case studies using this tool, which illustrate the flexibility and power of our approach.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"877 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123031103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Achieving fairness and timeliness in a previous electronic contract signing protocol 实现了以往电子合同签署协议的公平性和及时性
M. Payeras-Capellà, J. Ferrer-Gomila, L. H. Rotger
In ACISP 04, the authors of (F. Bao et al., 2004) suggested a fair exchange protocol for electronic contract signing between two parts. The protocol is an improvement of a previous one (S. Micali, 2003) and solves the vulnerabilities of that protocol. In (F. Bao et al., 2004) one of the signers can contact a trusted third party to resolve the exchange if he can't conclude it in the usual way. However, the other signer cannot contact the trusted third party, and for this reason, this signer can't know the final state of the exchange until, if it is the case, the trusted third party contact him or her. In this paper we have improved the protocol so that both signers can contact the TTP and solve the exchange whenever they want. We propose an asynchronous and fair protocol that improves the protocol presented in (F. Bao et al., 2004) maintaining the efficiency of the original protocol.
在ACISP 04中,(F. Bao et al., 2004)的作者提出了一个公平的交换协议,用于双方之间的电子合同签署。该协议是对先前协议(S. Micali, 2003)的改进,并解决了该协议的漏洞。在(F. Bao et al., 2004)中,如果签名者不能以通常的方式完成交易,可以联系可信的第三方来解决交易。但是,另一个签名者不能联系可信的第三方,因此,在可信的第三方联系他或她之前,该签名者无法知道交换的最终状态。在本文中,我们对协议进行了改进,使双方签名者可以随时联系到TTP并解决交换问题。我们提出了一种异步和公平的协议,它改进了(F. Bao et al., 2004)中提出的协议,保持了原始协议的效率。
{"title":"Achieving fairness and timeliness in a previous electronic contract signing protocol","authors":"M. Payeras-Capellà, J. Ferrer-Gomila, L. H. Rotger","doi":"10.1109/ARES.2006.22","DOIUrl":"https://doi.org/10.1109/ARES.2006.22","url":null,"abstract":"In ACISP 04, the authors of (F. Bao et al., 2004) suggested a fair exchange protocol for electronic contract signing between two parts. The protocol is an improvement of a previous one (S. Micali, 2003) and solves the vulnerabilities of that protocol. In (F. Bao et al., 2004) one of the signers can contact a trusted third party to resolve the exchange if he can't conclude it in the usual way. However, the other signer cannot contact the trusted third party, and for this reason, this signer can't know the final state of the exchange until, if it is the case, the trusted third party contact him or her. In this paper we have improved the protocol so that both signers can contact the TTP and solve the exchange whenever they want. We propose an asynchronous and fair protocol that improves the protocol presented in (F. Bao et al., 2004) maintaining the efficiency of the original protocol.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure enhanced wireless transfer protocol 安全增强无线传输协议
Jin-Cherng Lin, Yu-Hsin Kao, Chengjin Yang
When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage secret keys and also requires software upgrade only instead of changing hardware equipment. However, implementing TKIP on the exiting equipment, the transmission performance is decreased dramatically. This paper, therefore, proposes a new transfer scheme to enhance previous WEP and TKIP protocols - secure enhanced wireless transfer protocol (SEWTP). SEWTP provides an encryption algorithm on top of current hardware that improves low performance in TKIP but without compromising security level in the mean time. This is achieved by encrypting secret key twice. Secret key are stored at both access point (AP) and wireless client so that it can be compared and validated.
当IEEE 802.11i草案提出TKIP时,期望在主动和被动攻击方法上改进WEP。TKIP使用更复杂的方法来分发和管理密钥,并且只需要软件升级而不需要更换硬件设备。然而,在现有设备上实施TKIP后,传输性能明显下降。因此,本文提出了一种新的传输方案来增强以前的WEP和TKIP协议——安全增强无线传输协议(SEWTP)。SEWTP在现有硬件之上提供了一种加密算法,可以改善TKIP中的低性能,但同时不会影响安全级别。这是通过对密钥进行两次加密来实现的。密钥存储在接入点(AP)和无线客户端,以便进行比较和验证。
{"title":"Secure enhanced wireless transfer protocol","authors":"Jin-Cherng Lin, Yu-Hsin Kao, Chengjin Yang","doi":"10.1109/ARES.2006.122","DOIUrl":"https://doi.org/10.1109/ARES.2006.122","url":null,"abstract":"When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage secret keys and also requires software upgrade only instead of changing hardware equipment. However, implementing TKIP on the exiting equipment, the transmission performance is decreased dramatically. This paper, therefore, proposes a new transfer scheme to enhance previous WEP and TKIP protocols - secure enhanced wireless transfer protocol (SEWTP). SEWTP provides an encryption algorithm on top of current hardware that improves low performance in TKIP but without compromising security level in the mean time. This is achieved by encrypting secret key twice. Secret key are stored at both access point (AP) and wireless client so that it can be compared and validated.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1