首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Towards a security architecture for vehicular ad hoc networks 面向车载自组织网络的安全体系结构
Klaus Plößl, Thomas Nowey, C. Mletzko
Vehicular ad hoc networks (VANETs) have the potential to increase road safety and comfort. Especially because of the road safety functions, there is a strong demand for security in VANETs. After defining three application categories the paper outlines main security and privacy requirements in VANETs. Next, a security architecture for VANETs (SAV) is proposed that strives to satisfy the requirements. To find mechanisms applicable in the architecture a survey of existing mechanisms is given.
车辆自组织网络(VANETs)具有提高道路安全性和舒适性的潜力。特别是由于道路安全功能,对安全的需求非常强烈。在定义了三种应用类别之后,本文概述了vanet的主要安全和隐私要求。其次,提出了VANETs的安全体系结构(SAV),力求满足需求。为了找到适用于体系结构的机制,对现有机制进行了调查。
{"title":"Towards a security architecture for vehicular ad hoc networks","authors":"Klaus Plößl, Thomas Nowey, C. Mletzko","doi":"10.1109/ARES.2006.136","DOIUrl":"https://doi.org/10.1109/ARES.2006.136","url":null,"abstract":"Vehicular ad hoc networks (VANETs) have the potential to increase road safety and comfort. Especially because of the road safety functions, there is a strong demand for security in VANETs. After defining three application categories the paper outlines main security and privacy requirements in VANETs. Next, a security architecture for VANETs (SAV) is proposed that strives to satisfy the requirements. To find mechanisms applicable in the architecture a survey of existing mechanisms is given.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134624051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 156
Secure business process management: a roadmap 安全业务流程管理:路线图
T. Neubauer, M. Klemen, S. Biffl
The security of corporate business processes is crucial for the business success of companies. Existing business process management methodologies barely consider security and dependability objectives. Business processes and security issues are developed separately and often do not follow the same strategy. Growing business integration and legal requirements raise the need for secure business processes as security problems negatively affect profit and reputation of companies and their stakeholders. In this paper we summarize the state of the art of business process management and security and identify shortcomings of existing approaches. Based on that we identify research challenges and present a roadmap for secure business process management (SBPM) that allows an integrated view on business process management and security. This approach provides top management in process oriented enterprises with a stepwise methodology for the parallel and continuous development and improvement of business processes along with security issues over the whole business process life cycle.
公司业务流程的安全性对于公司的业务成功至关重要。现有的业务流程管理方法几乎没有考虑安全性和可靠性目标。业务流程和安全问题是分开开发的,通常不遵循相同的策略。不断增长的业务集成和法律需求提高了对安全业务流程的需求,因为安全问题会对公司及其涉众的利润和声誉产生负面影响。在本文中,我们总结了业务流程管理和安全性的现状,并指出了现有方法的缺点。在此基础上,我们确定了研究挑战,并提出了安全业务流程管理(SBPM)的路线图,该路线图允许对业务流程管理和安全性进行集成。此方法为面向流程的企业的高层管理人员提供了一种逐步的方法,用于并行和持续地开发和改进业务流程以及整个业务流程生命周期中的安全问题。
{"title":"Secure business process management: a roadmap","authors":"T. Neubauer, M. Klemen, S. Biffl","doi":"10.1109/ARES.2006.121","DOIUrl":"https://doi.org/10.1109/ARES.2006.121","url":null,"abstract":"The security of corporate business processes is crucial for the business success of companies. Existing business process management methodologies barely consider security and dependability objectives. Business processes and security issues are developed separately and often do not follow the same strategy. Growing business integration and legal requirements raise the need for secure business processes as security problems negatively affect profit and reputation of companies and their stakeholders. In this paper we summarize the state of the art of business process management and security and identify shortcomings of existing approaches. Based on that we identify research challenges and present a roadmap for secure business process management (SBPM) that allows an integrated view on business process management and security. This approach provides top management in process oriented enterprises with a stepwise methodology for the parallel and continuous development and improvement of business processes along with security issues over the whole business process life cycle.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
A dependable device discovery approach for pervasive computing middleware 面向普适计算中间件的可靠设备发现方法
Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri
Distributed applications and middleware services targeted for mobile devices must use device discovery service to provide any kind of service to other devices. Device discovery algorithms developed for wired networks are not suitable for mobile ad-hoc networks of pervasive computing environments. This research proposes a dependable device discovery mechanism for the middleware of the applications consisting of rapidly reconfiguring mobile devices. Our approach offers a comprehensive solution to potential problems that can arise in highly adaptive mobile ad-hoc networks of pervasive computing environments. The approach is robust enough to accommodate the device limitations and rapid changes in the resource strengths of each device in the network. We present three new device discovery algorithms in this paper: a window based broadcasting algorithm, a connectivity based dynamic algorithm, and a policy-based scalable algorithm. The algorithms vary in complexity and efficiency depending upon the pervasive computing applications. We identify the desirable dependability related characteristics of device discovery services and present how our algorithms realize those characteristics. Experimental results are presented to compare and contrast the algorithms.
针对移动设备的分布式应用程序和中间件服务必须使用设备发现服务向其他设备提供任何类型的服务。针对有线网络开发的设备发现算法不适用于普适计算环境下的移动自组织网络。本研究针对快速重新配置的移动设备组成的应用中间件提出了一种可靠的设备发现机制。我们的方法为普适计算环境的高度自适应移动自组织网络中可能出现的潜在问题提供了一个全面的解决方案。该方法具有足够的鲁棒性,可以适应设备限制和网络中每个设备资源强度的快速变化。本文提出了三种新的设备发现算法:基于窗口的广播算法、基于连通性的动态算法和基于策略的可扩展算法。算法的复杂度和效率随普适计算应用的不同而不同。我们确定了设备发现服务所需的可靠性相关特征,并介绍了我们的算法如何实现这些特征。实验结果对算法进行了比较和对比。
{"title":"A dependable device discovery approach for pervasive computing middleware","authors":"Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri","doi":"10.1109/ARES.2006.5","DOIUrl":"https://doi.org/10.1109/ARES.2006.5","url":null,"abstract":"Distributed applications and middleware services targeted for mobile devices must use device discovery service to provide any kind of service to other devices. Device discovery algorithms developed for wired networks are not suitable for mobile ad-hoc networks of pervasive computing environments. This research proposes a dependable device discovery mechanism for the middleware of the applications consisting of rapidly reconfiguring mobile devices. Our approach offers a comprehensive solution to potential problems that can arise in highly adaptive mobile ad-hoc networks of pervasive computing environments. The approach is robust enough to accommodate the device limitations and rapid changes in the resource strengths of each device in the network. We present three new device discovery algorithms in this paper: a window based broadcasting algorithm, a connectivity based dynamic algorithm, and a policy-based scalable algorithm. The algorithms vary in complexity and efficiency depending upon the pervasive computing applications. We identify the desirable dependability related characteristics of device discovery services and present how our algorithms realize those characteristics. Experimental results are presented to compare and contrast the algorithms.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134396235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A component based software architecture for e-government applications 电子政务应用程序的基于组件的软件体系结构
D. Beer, Raphael Kunis, G. Rünger
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software system being adaptable for the usage in many sectors of e-government applications we introduce the reference architecture for e-government (RAfEG) in this paper. The key features of the system are flexibility, security, adaptability and interoperability between authorities. The efficient usage of heterogeneous systems and heterogeneous hardware platforms, respectively, allows the execution of large interactive applications in e-government. Because security is a critical issue in e-government applications our solution uses different types of authentication and authorization methods and also supports secure communication between the interoperating heterogeneous systems. Due to the fact that the electronically supported execution of government procedures is the main aspect of the RAfEG system, an approach where these procedures are modeled as workflows and executed by an underlying workflow management system (WfMS) is the solution we present in this paper. Although many e-government applications exist at present, the RAfEG system is a new approach because it is able to cope with a wide range of internal official procedures and also highly adaptable to new procedures within e-government.
对电子政务应用日益增长的需求导致这一领域出现了许多新方法。为了满足灵活的政府对政府(G2G)软件系统的需求,使其能够适应电子政务应用的许多领域,本文介绍了电子政务参考体系结构(RAfEG)。该系统的主要特点是灵活性、安全性、适应性和权限之间的互操作性。异构系统和异构硬件平台的有效使用分别允许在电子政务中执行大型交互式应用程序。由于安全性是电子政务应用程序中的一个关键问题,我们的解决方案使用不同类型的身份验证和授权方法,并且还支持互操作异构系统之间的安全通信。由于电子支持政府程序的执行是RAfEG系统的主要方面,因此我们在本文中提出的解决方案是将这些程序建模为工作流并由底层工作流管理系统(WfMS)执行。虽然目前有许多电子政府的应用,但RAfEG系统是一种新的方法,因为它能够处理广泛的内部官方程序,并高度适应电子政府内的新程序。
{"title":"A component based software architecture for e-government applications","authors":"D. Beer, Raphael Kunis, G. Rünger","doi":"10.1109/ARES.2006.3","DOIUrl":"https://doi.org/10.1109/ARES.2006.3","url":null,"abstract":"The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software system being adaptable for the usage in many sectors of e-government applications we introduce the reference architecture for e-government (RAfEG) in this paper. The key features of the system are flexibility, security, adaptability and interoperability between authorities. The efficient usage of heterogeneous systems and heterogeneous hardware platforms, respectively, allows the execution of large interactive applications in e-government. Because security is a critical issue in e-government applications our solution uses different types of authentication and authorization methods and also supports secure communication between the interoperating heterogeneous systems. Due to the fact that the electronically supported execution of government procedures is the main aspect of the RAfEG system, an approach where these procedures are modeled as workflows and executed by an underlying workflow management system (WfMS) is the solution we present in this paper. Although many e-government applications exist at present, the RAfEG system is a new approach because it is able to cope with a wide range of internal official procedures and also highly adaptable to new procedures within e-government.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The security issue of federated data warehouses in the area of evidence-based medicine 循证医学领域联邦数据仓库的安全问题
O. Mangisengi, W. Eßmayr, Johannes Huber, E. Weippl
Healthcare organisations practicing evidence-based medicine strive to unite their data assets in order to achieve a wider knowledge base for more sophisticated research as well as to provide a matured decision support service for the care givers. The central point of such an integrated system is a data warehouse, to which all participants have access. Due to the high confidentiality of healthcare data, and the privacy policy of participating organisations, the proposed warehouse is not created physically but as a federated system. Its conceptual model is based on a widely accepted international standard to overwhelm the heterogeneity of the components. Any disclosure of health data, especially when related to a particular person, could be irreparably harmful, and their protection is even legally prescribed. Depersonalisation and pseudonymisation are used to ensure that personal identities are made secret before sending data to the federation. In this paper a case study of a federation of health insurance data warehouses (HEWAF) is described. The protection of data privacy and confidentiality in the underlying warehouse is guaranteed through reliable security measures in the federation.
实践循证医学的医疗保健组织努力统一他们的数据资产,以便为更复杂的研究获得更广泛的知识库,并为护理人员提供成熟的决策支持服务。这种集成系统的中心点是所有参与者都可以访问的数据仓库。由于医疗保健数据的高度机密性和参与组织的隐私政策,建议的仓库不是物理创建的,而是作为联邦系统创建的。其概念模型基于广泛接受的国际标准,以克服组件的异质性。任何健康数据的泄露,特别是与某个人有关的健康数据的泄露,都可能造成无法弥补的伤害,对这些数据的保护甚至是法律规定的。在向联邦发送数据之前,使用去个人化和假名化来确保个人身份保密。本文描述了一个健康保险数据仓库联盟(HEWAF)的案例研究。底层仓库中的数据隐私和机密性保护是通过联邦中可靠的安全措施来保证的。
{"title":"The security issue of federated data warehouses in the area of evidence-based medicine","authors":"O. Mangisengi, W. Eßmayr, Johannes Huber, E. Weippl","doi":"10.1109/ARES.2006.132","DOIUrl":"https://doi.org/10.1109/ARES.2006.132","url":null,"abstract":"Healthcare organisations practicing evidence-based medicine strive to unite their data assets in order to achieve a wider knowledge base for more sophisticated research as well as to provide a matured decision support service for the care givers. The central point of such an integrated system is a data warehouse, to which all participants have access. Due to the high confidentiality of healthcare data, and the privacy policy of participating organisations, the proposed warehouse is not created physically but as a federated system. Its conceptual model is based on a widely accepted international standard to overwhelm the heterogeneity of the components. Any disclosure of health data, especially when related to a particular person, could be irreparably harmful, and their protection is even legally prescribed. Depersonalisation and pseudonymisation are used to ensure that personal identities are made secret before sending data to the federation. In this paper a case study of a federation of health insurance data warehouses (HEWAF) is described. The protection of data privacy and confidentiality in the underlying warehouse is guaranteed through reliable security measures in the federation.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134574062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Personalized security for e-services 电子服务的个性化安全
George Yee
The growth of the Internet has been accompanied by a proliferation of e-services. The increasing attacks on these services by malicious individuals have highlighted the need for security. The security requirements of an e-service may be specified by the service provider in a security policy. However, a service consumer may have security preferences that are not reflected in this policy. In order for service providers to reach a wider market, a way of personalizing a security policy to a particular consumer is needed. We introduce the concept of security personalization, derive the content of an e-service security policy suitable for personalization, and describe four approaches for such personalization, including the design and use of a context-aware security policy agent (CASPA) that personalizes an e-service security policy to the needs of the consumer on-the-fly. We further give recommendations on applying the personalization approaches based on their advantages and disadvantages.
互联网的发展伴随着电子服务的激增。恶意个人对这些服务的攻击越来越多,这凸显了安全的必要性。电子服务的安全需求可以由服务提供者在安全策略中指定。但是,服务使用者可能具有未在此策略中反映的安全首选项。为了让服务提供者进入更广阔的市场,需要一种针对特定消费者个性化安全策略的方法。我们介绍了安全个性化的概念,推导了适合个性化的电子服务安全策略的内容,并描述了这种个性化的四种方法,包括上下文感知安全策略代理(CASPA)的设计和使用,该代理可以根据消费者的动态需求个性化电子服务安全策略。针对个性化方法的优缺点,提出了应用个性化方法的建议。
{"title":"Personalized security for e-services","authors":"George Yee","doi":"10.1109/ARES.2006.92","DOIUrl":"https://doi.org/10.1109/ARES.2006.92","url":null,"abstract":"The growth of the Internet has been accompanied by a proliferation of e-services. The increasing attacks on these services by malicious individuals have highlighted the need for security. The security requirements of an e-service may be specified by the service provider in a security policy. However, a service consumer may have security preferences that are not reflected in this policy. In order for service providers to reach a wider market, a way of personalizing a security policy to a particular consumer is needed. We introduce the concept of security personalization, derive the content of an e-service security policy suitable for personalization, and describe four approaches for such personalization, including the design and use of a context-aware security policy agent (CASPA) that personalizes an e-service security policy to the needs of the consumer on-the-fly. We further give recommendations on applying the personalization approaches based on their advantages and disadvantages.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134155210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Unlocking repositories: federated security solution for attribute and policy based access to repositories via Web services 解锁存储库:用于通过Web服务访问基于属性和策略的存储库的联合安全解决方案
M. Hatala, Ty Mey Eap, Ashok Shah
In this paper we describe our novel solution for Web services enabling users from the trusted organizations to access learning objects in the repository based on their attributes in their home organizations. The solution extends a Web-based Shibboleth system into the realm of Web services. It utilizes the Web services security SAML profile and combines it with the XACML access control policies. The technical solution is described in the context of the course management systems with complex access policies in operation at our campus.
在本文中,我们描述了新的Web服务解决方案,该解决方案允许来自受信任组织的用户根据其所在组织中的属性访问存储库中的学习对象。该解决方案将基于Web的Shibboleth系统扩展到Web服务领域。它利用Web服务安全SAML配置文件,并将其与XACML访问控制策略相结合。该技术解决方案是在我们校园运行的具有复杂访问策略的课程管理系统的背景下描述的。
{"title":"Unlocking repositories: federated security solution for attribute and policy based access to repositories via Web services","authors":"M. Hatala, Ty Mey Eap, Ashok Shah","doi":"10.1109/ARES.2006.140","DOIUrl":"https://doi.org/10.1109/ARES.2006.140","url":null,"abstract":"In this paper we describe our novel solution for Web services enabling users from the trusted organizations to access learning objects in the repository based on their attributes in their home organizations. The solution extends a Web-based Shibboleth system into the realm of Web services. It utilizes the Web services security SAML profile and combines it with the XACML access control policies. The technical solution is described in the context of the course management systems with complex access policies in operation at our campus.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121871513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multipath key exchange on P2P networks P2P网络上的多路径密钥交换
Yuuki Takano, N. Isozaki, Y. Shinoda
Distributed-hash-table (DHT) has been proposed to solve the problem of scaling for P2P networks. However, there are some problems of security in P2P networks. One of the problem is that key exchange is not performed preventing against endangering security. This reason may be the fact that P2P networks have no trusted server. Although certification and authentication are able to protect key exchange from spoofing and man-in-the-middle attacks, these cannot be applied because of that. Therefore, an attacker can easily compromise key exchange since P2P networks should accept any node whether it is malicious or not, and every node of P2P networks plays a role of router. Until today, for the above reasons, there is no way to exchange the secret key on P2P networks protecting against encountering security. In this paper, we propose a key exchange method on P2P networks protecting against spoofing and man-in-the-middle attacks. For the purpose of protecting key exchange from encountering security, we present the enhanced routings which are directional and probabilistic routings.
分布式哈希表(DHT)是为了解决P2P网络的可扩展性问题而提出的。然而,P2P网络存在着一些安全问题。其中一个问题是没有进行密钥交换,防止危及安全。这个原因可能是P2P网络没有可信的服务器。尽管认证和身份验证能够保护密钥交换免受欺骗和中间人攻击,但由于这个原因,它们无法应用。因此,攻击者很容易破坏密钥交换,因为P2P网络无论是否恶意都要接受任何节点,而P2P网络的每个节点都扮演着路由器的角色。直到今天,由于上述原因,还没有办法在P2P网络上交换密钥以防止遇到安全问题。本文提出了一种在P2P网络上防止欺骗和中间人攻击的密钥交换方法。为了防止密钥交换遇到安全问题,我们提出了增强路由,即定向路由和概率路由。
{"title":"Multipath key exchange on P2P networks","authors":"Yuuki Takano, N. Isozaki, Y. Shinoda","doi":"10.1109/ARES.2006.87","DOIUrl":"https://doi.org/10.1109/ARES.2006.87","url":null,"abstract":"Distributed-hash-table (DHT) has been proposed to solve the problem of scaling for P2P networks. However, there are some problems of security in P2P networks. One of the problem is that key exchange is not performed preventing against endangering security. This reason may be the fact that P2P networks have no trusted server. Although certification and authentication are able to protect key exchange from spoofing and man-in-the-middle attacks, these cannot be applied because of that. Therefore, an attacker can easily compromise key exchange since P2P networks should accept any node whether it is malicious or not, and every node of P2P networks plays a role of router. Until today, for the above reasons, there is no way to exchange the secret key on P2P networks protecting against encountering security. In this paper, we propose a key exchange method on P2P networks protecting against spoofing and man-in-the-middle attacks. For the purpose of protecting key exchange from encountering security, we present the enhanced routings which are directional and probabilistic routings.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124178935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An optimal round two-party password-authenticated key agreement protocol 一种最优的轮询双方密码认证密钥协议
M. A. Strangio
Key agreement protocols constitute one of the most valuable cryptographic primitives since they allow two (or more) users to setup a private and authenticated communication channel over a public network. This paper is concerned with key agreement protocols in the symmetric trust model, wherein the shared key is a password. This setting is very appealing from the user's perspective since two parties, in principle, can easily agree on a shared password beforehand (e.g. on the telephone). However, designing such protocols represents an interesting challenge since there is no standard way of choosing a password that achieves an optimum trade-off between usability and security. Indeed, passwords belonging to a highly structured language (including PINs personal identification numbers) are essentially equivalent to low entropy strings. A fundamental goal is that of obtaining secure and efficient protocols, with optimum computational complexity, round complexity and communication efficiency. These properties make them ideal candidates for mobile devices. We present a new construction (DH-BPAKE) based on the encrypted key exchange protocol of Bellovin and Merritt augmented with an efficient key confirmation round. The communication model is asynchronous, meaning that each party can simultaneously send a message to the other party. In addition, we formally prove security in a modified version of the model of Boyko et al. (which is based on the model of Shoup).
密钥协议协议是最有价值的加密原语之一,因为它们允许两个(或更多)用户在公共网络上建立私有和经过身份验证的通信通道。本文研究了对称信任模型下的密钥协商协议,其中共享密钥为密码。从用户的角度来看,这种设置非常有吸引力,因为原则上双方可以很容易地事先商定共享密码(例如在电话中)。然而,设计这样的协议是一个有趣的挑战,因为没有标准的方法来选择在可用性和安全性之间实现最佳权衡的密码。实际上,属于高度结构化语言的密码(包括pin个人识别号码)本质上等同于低熵字符串。一个基本的目标是获得安全有效的协议,具有最佳的计算复杂度,轮复杂度和通信效率。这些特性使它们成为移动设备的理想选择。本文提出了一种新的基于Bellovin和Merritt加密密钥交换协议的DH-BPAKE结构,并增强了一个有效的密钥确认轮。通信模型是异步的,这意味着每一方都可以同时向另一方发送消息。此外,我们在Boyko等人的模型的修改版本(基于Shoup的模型)中正式证明了安全性。
{"title":"An optimal round two-party password-authenticated key agreement protocol","authors":"M. A. Strangio","doi":"10.1109/ARES.2006.29","DOIUrl":"https://doi.org/10.1109/ARES.2006.29","url":null,"abstract":"Key agreement protocols constitute one of the most valuable cryptographic primitives since they allow two (or more) users to setup a private and authenticated communication channel over a public network. This paper is concerned with key agreement protocols in the symmetric trust model, wherein the shared key is a password. This setting is very appealing from the user's perspective since two parties, in principle, can easily agree on a shared password beforehand (e.g. on the telephone). However, designing such protocols represents an interesting challenge since there is no standard way of choosing a password that achieves an optimum trade-off between usability and security. Indeed, passwords belonging to a highly structured language (including PINs personal identification numbers) are essentially equivalent to low entropy strings. A fundamental goal is that of obtaining secure and efficient protocols, with optimum computational complexity, round complexity and communication efficiency. These properties make them ideal candidates for mobile devices. We present a new construction (DH-BPAKE) based on the encrypted key exchange protocol of Bellovin and Merritt augmented with an efficient key confirmation round. The communication model is asynchronous, meaning that each party can simultaneously send a message to the other party. In addition, we formally prove security in a modified version of the model of Boyko et al. (which is based on the model of Shoup).","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124429138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Automatically translating dynamic fault trees into dynamic Bayesian networks by means of a software tool 利用软件工具将动态故障树自动转换为动态贝叶斯网络
S. Montani, L. Portinale, A. Bobbio, D. Raiteri
This paper presents a software tool allowing the automatic analysis of a dynamic fault tree (DFT) exploiting its conversion to a dynamic Bayesian network (DBN). First, the architecture of the tool is described, together with the rules implemented in the tool, to convert dynamic gates in DBNs. Then, the tool is tested on a case of system: its DFT model and the corresponding DBN are provided and analyzed by means of the tool. The obtained unreliability results are compared with those returned by other tools, in order to verify their correctness.
本文提出了一种软件工具,可以利用动态故障树(DFT)向动态贝叶斯网络(DBN)的转换,对动态故障树(DFT)进行自动分析。首先,描述了该工具的体系结构,以及该工具中实现的规则,以转换dbn中的动态门。然后,在一个系统实例上对该工具进行了测试,给出了该系统的DFT模型和相应的DBN,并利用该工具进行了分析。将得到的不可靠度结果与其他工具返回的结果进行比较,以验证其正确性。
{"title":"Automatically translating dynamic fault trees into dynamic Bayesian networks by means of a software tool","authors":"S. Montani, L. Portinale, A. Bobbio, D. Raiteri","doi":"10.1109/ARES.2006.34","DOIUrl":"https://doi.org/10.1109/ARES.2006.34","url":null,"abstract":"This paper presents a software tool allowing the automatic analysis of a dynamic fault tree (DFT) exploiting its conversion to a dynamic Bayesian network (DBN). First, the architecture of the tool is described, together with the rules implemented in the tool, to convert dynamic gates in DBNs. Then, the tool is tested on a case of system: its DFT model and the corresponding DBN are provided and analyzed by means of the tool. The obtained unreliability results are compared with those returned by other tools, in order to verify their correctness.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1