首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Mitigating denial of service threats in GSM networks 减轻GSM网络中的拒绝服务威胁
V. Bocan, V. Cretu
Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which opens the avenue for distributed denial of service attacks. We propose a way to mitigate the attacks by adding minimal authentication to the GSM channel assignment protocol.
移动网络不仅给用户带来了巨大的好处,但也带来了固有的安全问题。在安全方面,随着移动网络的可用性在现代信息社会中变得越来越重要,不断出现的拒绝服务(DOS)攻击风险将演变成一个关键的危险。本文概述了GSM网络中的一个关键缺陷,该缺陷为分布式拒绝服务攻击开辟了道路。我们提出了一种通过在GSM信道分配协议中添加最小认证来减轻攻击的方法。
{"title":"Mitigating denial of service threats in GSM networks","authors":"V. Bocan, V. Cretu","doi":"10.1109/ARES.2006.81","DOIUrl":"https://doi.org/10.1109/ARES.2006.81","url":null,"abstract":"Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which opens the avenue for distributed denial of service attacks. We propose a way to mitigate the attacks by adding minimal authentication to the GSM channel assignment protocol.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130106785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Ensuring privacy for e-health services 确保电子医疗服务的隐私
George Yee, L. Korba, R. Song
The growth of the Internet has been accompanied by the growth of e-health services (e.g. online medical advice, online pharmacies). This proliferation of services and the increasing regulatory and legal requirements for personal privacy have fueled the need to protect the personal privacy of service users. Existing approaches for privacy protection such as access control are predicated on the e-service provider having possession and control over the user's personal data. In this paper, we propose a new approach to protecting personal privacy for e-health services: keeping possession and control over the user's personally identifiable information in the hands of the user as much as possible. Our approach can also be characterized as distributing personally identifiable information only on a "need to know" basis.
随着互联网的发展,电子保健服务(如在线医疗咨询、在线药房)也在增加。服务的激增以及对个人隐私的监管和法律要求的增加,推动了保护服务用户个人隐私的需要。现有的隐私保护方法(如访问控制)是基于电子服务提供商拥有和控制用户的个人数据。在本文中,我们提出了一种保护电子医疗服务个人隐私的新方法:尽可能地将用户个人身份信息的所有权和控制权掌握在用户手中。我们的方法也可以被描述为仅在“需要知道”的基础上分发个人身份信息。
{"title":"Ensuring privacy for e-health services","authors":"George Yee, L. Korba, R. Song","doi":"10.1109/ARES.2006.59","DOIUrl":"https://doi.org/10.1109/ARES.2006.59","url":null,"abstract":"The growth of the Internet has been accompanied by the growth of e-health services (e.g. online medical advice, online pharmacies). This proliferation of services and the increasing regulatory and legal requirements for personal privacy have fueled the need to protect the personal privacy of service users. Existing approaches for privacy protection such as access control are predicated on the e-service provider having possession and control over the user's personal data. In this paper, we propose a new approach to protecting personal privacy for e-health services: keeping possession and control over the user's personally identifiable information in the hands of the user as much as possible. Our approach can also be characterized as distributing personally identifiable information only on a \"need to know\" basis.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125543908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Privacy threats and issues in mobile RFID 移动射频识别中的隐私威胁和问题
Hyangjin Lee, Jeeyeon Kim
Radio frequency identification (RFID) technology that is used to identify objects and users and automatically takes advantage of contextual information such as user's location is expected to become an important and a core technology of ubiquitous infrastructure. This technology has been applied to many applications such as retail and supply chain. At recent, there are an increasing number of researches related to mobile RFID that provides RFID service to user with a reader embedded in the mobile device as the one of RFID applications. However, there are an increasing number of concerns, and even some resistance, related to user tracking and profiling using RFID technology. Therefore, in this paper, we review privacy threats that have been reported in various RFID applications and bring up some additional privacy threats in mobile RFID, impeding the deployment of mobile RFID. And we analyze whether various privacy protecting measures that have been proposed to address privacy problems in RFID can also apply to mobile RFID.
射频识别(RFID)技术用于识别物体和用户,并自动利用用户位置等上下文信息,有望成为无处不在的基础设施的重要核心技术。该技术已应用于零售和供应链等许多应用领域。近年来,有关移动RFID的研究越来越多,将读卡器嵌入到移动设备中为用户提供RFID服务是RFID的应用之一。然而,对于使用RFID技术进行用户跟踪和分析,存在越来越多的担忧,甚至一些阻力。因此,在本文中,我们回顾了各种RFID应用中已经报道的隐私威胁,并提出了移动RFID中一些阻碍移动RFID部署的额外隐私威胁。并分析了为解决RFID中的隐私问题而提出的各种隐私保护措施是否也适用于移动RFID。
{"title":"Privacy threats and issues in mobile RFID","authors":"Hyangjin Lee, Jeeyeon Kim","doi":"10.1109/ARES.2006.96","DOIUrl":"https://doi.org/10.1109/ARES.2006.96","url":null,"abstract":"Radio frequency identification (RFID) technology that is used to identify objects and users and automatically takes advantage of contextual information such as user's location is expected to become an important and a core technology of ubiquitous infrastructure. This technology has been applied to many applications such as retail and supply chain. At recent, there are an increasing number of researches related to mobile RFID that provides RFID service to user with a reader embedded in the mobile device as the one of RFID applications. However, there are an increasing number of concerns, and even some resistance, related to user tracking and profiling using RFID technology. Therefore, in this paper, we review privacy threats that have been reported in various RFID applications and bring up some additional privacy threats in mobile RFID, impeding the deployment of mobile RFID. And we analyze whether various privacy protecting measures that have been proposed to address privacy problems in RFID can also apply to mobile RFID.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128767422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
A system architecture for enhanced availability of tightly coupled distributed systems 增强紧密耦合分布式系统可用性的系统架构
Johannes Osrael, Lorenz Froihofer, K. M. Göschka, S. Beyer, Pablo Galdámez, F. D. Muñoz-Escoí
We present a system architecture which facilitates enhanced availability of tightly coupled distributed systems by temporarily relaxing constraint consistency. Three different types of consistency are distinguished in tightly coupled distributed systems - replica consistency, concurrency consistency, and constraint consistency. Constraint consistency defines the correctness of the system with respect to a set of data integrity rules (application defined predicates). Traditional systems either guarantee strong constraint consistency or no constraint consistency at all. However, a class of systems exists, where data integrity can be temporarily relaxed in order to enhance availability, i.e. constraint consistency can be traded against availability. This allows for a context- and situation-specific optimum of availability. This paper presents the basic concepts of the trading process and the proposed system architecture to enable a fine-grained tuning of the trade-off in tightly coupled distributed systems.
我们提出了一种系统架构,通过暂时放松约束一致性来增强紧密耦合分布式系统的可用性。在紧密耦合的分布式系统中,一致性有三种不同的类型——副本一致性、并发一致性和约束一致性。约束一致性定义了系统相对于一组数据完整性规则(应用程序定义的谓词)的正确性。传统系统要么保证强约束一致性,要么根本没有约束一致性。然而,存在一类系统,其中可以暂时放松数据完整性以增强可用性,即约束一致性可以与可用性交换。这允许特定于上下文和情况的最佳可用性。本文介绍了交易过程的基本概念和提出的系统架构,以便在紧密耦合的分布式系统中对交易进行细粒度调优。
{"title":"A system architecture for enhanced availability of tightly coupled distributed systems","authors":"Johannes Osrael, Lorenz Froihofer, K. M. Göschka, S. Beyer, Pablo Galdámez, F. D. Muñoz-Escoí","doi":"10.1109/ARES.2006.19","DOIUrl":"https://doi.org/10.1109/ARES.2006.19","url":null,"abstract":"We present a system architecture which facilitates enhanced availability of tightly coupled distributed systems by temporarily relaxing constraint consistency. Three different types of consistency are distinguished in tightly coupled distributed systems - replica consistency, concurrency consistency, and constraint consistency. Constraint consistency defines the correctness of the system with respect to a set of data integrity rules (application defined predicates). Traditional systems either guarantee strong constraint consistency or no constraint consistency at all. However, a class of systems exists, where data integrity can be temporarily relaxed in order to enhance availability, i.e. constraint consistency can be traded against availability. This allows for a context- and situation-specific optimum of availability. This paper presents the basic concepts of the trading process and the proposed system architecture to enable a fine-grained tuning of the trade-off in tightly coupled distributed systems.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128302581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Using a Bayesian averaging model for estimating the reliability of decisions in multimodal biometrics 用贝叶斯平均模型估计多模态生物识别决策的可靠性
C. Maple, V. Schetinin
The issue of reliable authentication is of increasing importance in modern society. Corporations, businesses and individuals often wish to restrict access to logical or physical resources to those with relevant privileges. A popular method for authentication is the use of biometric data, but the uncertainty that arises due to the lack of uniqueness in biometrics has lead there to be a great deal of effort invested into multimodal biometrics. These multimodal biometric systems can give rise to large, distributed data sets that are used to decide the authenticity of a user. Bayesian model averaging (BMA) methodology has been used to allow experts to evaluate the reliability of decisions made in data mining applications. The use of decision tree (DT) models within the BMA methodology gives experts additional information on how decisions are made. In this paper we discuss how DT models within the BMA methodology can be used for authentication in multimodal biometric systems.
在现代社会,可靠的认证问题越来越重要。公司、企业和个人通常希望将逻辑或物理资源的访问权限限制为具有相关特权的人。一种流行的身份验证方法是使用生物识别数据,但由于生物识别缺乏唯一性而产生的不确定性导致人们在多模式生物识别技术上投入了大量精力。这些多模态生物识别系统可以产生用于确定用户真实性的大型分布式数据集。贝叶斯模型平均(BMA)方法已被用于允许专家评估数据挖掘应用中所做决策的可靠性。在BMA方法中使用决策树(DT)模型为专家提供了关于如何做出决策的额外信息。在本文中,我们讨论了如何将BMA方法中的DT模型用于多模态生物识别系统中的身份验证。
{"title":"Using a Bayesian averaging model for estimating the reliability of decisions in multimodal biometrics","authors":"C. Maple, V. Schetinin","doi":"10.1109/ARES.2006.141","DOIUrl":"https://doi.org/10.1109/ARES.2006.141","url":null,"abstract":"The issue of reliable authentication is of increasing importance in modern society. Corporations, businesses and individuals often wish to restrict access to logical or physical resources to those with relevant privileges. A popular method for authentication is the use of biometric data, but the uncertainty that arises due to the lack of uniqueness in biometrics has lead there to be a great deal of effort invested into multimodal biometrics. These multimodal biometric systems can give rise to large, distributed data sets that are used to decide the authenticity of a user. Bayesian model averaging (BMA) methodology has been used to allow experts to evaluate the reliability of decisions made in data mining applications. The use of decision tree (DT) models within the BMA methodology gives experts additional information on how decisions are made. In this paper we discuss how DT models within the BMA methodology can be used for authentication in multimodal biometric systems.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122982005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Censorship-resistant and anonymous P2P filesharing 抗审查和匿名P2P文件共享
Regine Endsuleit, Thilo Mie
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Instead, only fragments that do not contain any information about the original file in the information theoretic sense are uploaded. Reconstruction of a file requires all fragments it has been decomposed into. By this, in conjunction with other cryptographic methods, we yield significant legal advantages for server operators, as well as censorship-resistance, anonymity, secure routing, authenticated file update and integrity checks.
我们提出了一个P2P文件共享系统,它允许共享文件的冗余存储,以一种没有参与服务器存储可能危及其运营商的数据的方式。相反,只上传不包含信息理论意义上的原始文件的任何信息的片段。文件的重建需要它被分解成的所有片段。通过这种方法,结合其他加密方法,我们为服务器运营商提供了显著的法律优势,以及审查阻力,匿名性,安全路由,身份验证文件更新和完整性检查。
{"title":"Censorship-resistant and anonymous P2P filesharing","authors":"Regine Endsuleit, Thilo Mie","doi":"10.1109/ARES.2006.41","DOIUrl":"https://doi.org/10.1109/ARES.2006.41","url":null,"abstract":"We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Instead, only fragments that do not contain any information about the original file in the information theoretic sense are uploaded. Reconstruction of a file requires all fragments it has been decomposed into. By this, in conjunction with other cryptographic methods, we yield significant legal advantages for server operators, as well as censorship-resistance, anonymity, secure routing, authenticated file update and integrity checks.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116464495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Access control in a privacy-aware eLearning environment 隐私敏感的电子学习环境中的访问控制
Elke Franz, Hagen Wahrig, Alexander Böttcher, K. Borcea-Pfitzmann
Access control is necessary to prevent illegal accesses to shared resources. Within eLearning, access control is required in order to protect provided contents and services as well as user data. Usually, access rights are assigned to users of a system. However, in a system that applies privacy-enhancing identity management (PIM) common approaches cannot be directly utilized since users do not act under fix login names. Within this paper, we want to discuss how protection of contents as well as of user data can be realized in such an environment. The context of our work is the eLearning application BluES'n which additionally aims at providing users a flexible working environment. All functionality needed for realizing access control is provided by a PIM-aware platform which is currently developed within the European project PRIME.
访问控制是防止非法访问共享资源的必要手段。在eLearning中,为了保护所提供的内容和服务以及用户数据,需要访问控制。通常,访问权限被分配给系统的用户。但是,在应用增强隐私的身份管理(PIM)的系统中,不能直接利用常见的方法,因为用户不使用固定的登录名。在本文中,我们想讨论如何在这样的环境中实现内容和用户数据的保护。我们的工作背景是电子学习应用程序BluES'n,该应用程序旨在为用户提供灵活的工作环境。实现访问控制所需的所有功能都由一个pim感知平台提供,该平台目前在欧洲项目PRIME中开发。
{"title":"Access control in a privacy-aware eLearning environment","authors":"Elke Franz, Hagen Wahrig, Alexander Böttcher, K. Borcea-Pfitzmann","doi":"10.1109/ARES.2006.20","DOIUrl":"https://doi.org/10.1109/ARES.2006.20","url":null,"abstract":"Access control is necessary to prevent illegal accesses to shared resources. Within eLearning, access control is required in order to protect provided contents and services as well as user data. Usually, access rights are assigned to users of a system. However, in a system that applies privacy-enhancing identity management (PIM) common approaches cannot be directly utilized since users do not act under fix login names. Within this paper, we want to discuss how protection of contents as well as of user data can be realized in such an environment. The context of our work is the eLearning application BluES'n which additionally aims at providing users a flexible working environment. All functionality needed for realizing access control is provided by a PIM-aware platform which is currently developed within the European project PRIME.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116017844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Web service discovery, replication, and synchronization in ad-hoc networks 自组织网络中的Web服务发现、复制和同步
Lukasz Juszczyk, J. Lazowski, S. Dustdar
Mobile ad-hoc networks with their arbitrary topologies are a difficult domain for providing highly available Web services. Since hosts can move unpredictably, finding services and featuring their constant and reliable functionality poses a challenge. In this paper we present a flexible system which is not only bound to ad-hoc networks, but can be used in any other environment. Our solution offers a discovery technique which keeps UDDI information in distributed registries up-to-date and includes a replication and synchronization mechanism which provides backup services for a highly increased service dependability.
具有任意拓扑结构的移动自组织网络是提供高可用性Web服务的困难领域。由于主机的移动是不可预测的,因此寻找服务并展示其持续可靠的功能是一个挑战。在本文中,我们提出了一个灵活的系统,它不仅限于自组织网络,而且可以在任何其他环境中使用。我们的解决方案提供了一种发现技术,该技术使分布式注册中心中的UDDI信息保持最新,并包括一个复制和同步机制,该机制为高度增加的服务可靠性提供了备份服务。
{"title":"Web service discovery, replication, and synchronization in ad-hoc networks","authors":"Lukasz Juszczyk, J. Lazowski, S. Dustdar","doi":"10.1109/ARES.2006.143","DOIUrl":"https://doi.org/10.1109/ARES.2006.143","url":null,"abstract":"Mobile ad-hoc networks with their arbitrary topologies are a difficult domain for providing highly available Web services. Since hosts can move unpredictably, finding services and featuring their constant and reliable functionality poses a challenge. In this paper we present a flexible system which is not only bound to ad-hoc networks, but can be used in any other environment. Our solution offers a discovery technique which keeps UDDI information in distributed registries up-to-date and includes a replication and synchronization mechanism which provides backup services for a highly increased service dependability.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130476250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Designing mutual-aid model for RAQ (rarely asked question) in e-government: practical use of anonymity 电子政务中RAQ(很少被问到的问题)的互助模型设计:匿名的实际应用
Akiko Orita
To ensure the availability of e-government, it is necessary to handle diversity of administrative cases properly. This paper proposes RAQ (rarely asked questions) to cover minor, non-conforming cases which are overlooked. We focused on effects of anonymity to prevent prejudice and to decrease the barrier to join. We did case study on non-conforming case in Japan, treating four kinds of mutual-aid on the Internet. As a result, we discovered that unofficial ways of information sharing are more effective to solve problems than official ways .The process to solve problems itself plays a role of covering diversity of cases, which are not aggregated to FAQ. Thus, we led RAQ, instead of FAQ. RAQ contains details of problems and empathy among people concerned. We argue that to ensure to RAQ functions in e-government, it is necessary not only to make the best use of unofficial, informal mutual-aids but also promote information disclosure to be referred.
要保证电子政务的可用性,就必须妥善处理行政案件的多样性。本文提出了RAQ(极少问问题)来涵盖次要的、被忽略的不符合情况。我们关注匿名的效果,以防止偏见和减少加入的障碍。我们对日本的不规范案例进行了个案研究,探讨了网络互助的四种类型。结果发现,非正式的信息共享方式比正式的信息共享方式更能有效地解决问题,解决问题的过程本身就起到了覆盖案例多样性的作用,而这些案例并没有聚合成FAQ。因此,我们领导了RAQ,而不是FAQ。RAQ包含了问题的细节和相关人员之间的共鸣。本文认为,要保证电子政务中信息咨询服务的功能,既要充分利用非正式、非正式的互助,又要促进信息公开的参考。
{"title":"Designing mutual-aid model for RAQ (rarely asked question) in e-government: practical use of anonymity","authors":"Akiko Orita","doi":"10.1109/ARES.2006.51","DOIUrl":"https://doi.org/10.1109/ARES.2006.51","url":null,"abstract":"To ensure the availability of e-government, it is necessary to handle diversity of administrative cases properly. This paper proposes RAQ (rarely asked questions) to cover minor, non-conforming cases which are overlooked. We focused on effects of anonymity to prevent prejudice and to decrease the barrier to join. We did case study on non-conforming case in Japan, treating four kinds of mutual-aid on the Internet. As a result, we discovered that unofficial ways of information sharing are more effective to solve problems than official ways .The process to solve problems itself plays a role of covering diversity of cases, which are not aggregated to FAQ. Thus, we led RAQ, instead of FAQ. RAQ contains details of problems and empathy among people concerned. We argue that to ensure to RAQ functions in e-government, it is necessary not only to make the best use of unofficial, informal mutual-aids but also promote information disclosure to be referred.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115095347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Grid infrastructures for secure access to and use of bioinformatics data: experiences from the BRIDGES project 安全获取和使用生物信息学数据的网格基础设施:来自BRIDGES项目的经验
R. Sinnott, Micha Bayer, A. Stell, J. Koetsier
The BRIDGES project was funded by the UK Department of Trade and Industry (DTI) to address the needs of cardiovascular research scientists investigating the genetic causes of hypertension as part of the Wellcome Trust funded (#4.34M) cardiovascular functional genomics (CFG) project. Security was at the heart of the BRIDGES project and an advanced data and compute grid infrastructure incorporating latest grid authorisation technologies was developed and delivered to the scientists. We outline these grid infrastructures and describe the perceived security requirements at the project start including data classifications and how these evolved throughout the lifetime of the project. The uptake and adoption of the project results are also presented along with the challenges that must be overcome to support the secure exchange of life science data sets. We also present how we will use the BRIDGES experiences in future projects at the National e-Science Centre.
BRIDGES项目由英国贸易和工业部(DTI)资助,作为Wellcome Trust资助(#4.34M)心血管功能基因组学(CFG)项目的一部分,旨在解决心血管研究科学家调查高血压遗传原因的需求。安全是BRIDGES项目的核心,先进的数据和计算网格基础设施结合最新的网格授权技术被开发并交付给科学家。我们概述了这些网格基础设施,并描述了在项目开始时感知到的安全需求,包括数据分类以及这些需求在整个项目生命周期中的演变情况。本文还介绍了项目成果的吸收和采用,以及为支持生命科学数据集的安全交换必须克服的挑战。我们还介绍了我们将如何在国家电子科学中心的未来项目中使用BRIDGES的经验。
{"title":"Grid infrastructures for secure access to and use of bioinformatics data: experiences from the BRIDGES project","authors":"R. Sinnott, Micha Bayer, A. Stell, J. Koetsier","doi":"10.1109/ARES.2006.69","DOIUrl":"https://doi.org/10.1109/ARES.2006.69","url":null,"abstract":"The BRIDGES project was funded by the UK Department of Trade and Industry (DTI) to address the needs of cardiovascular research scientists investigating the genetic causes of hypertension as part of the Wellcome Trust funded (#4.34M) cardiovascular functional genomics (CFG) project. Security was at the heart of the BRIDGES project and an advanced data and compute grid infrastructure incorporating latest grid authorisation technologies was developed and delivered to the scientists. We outline these grid infrastructures and describe the perceived security requirements at the project start including data classifications and how these evolved throughout the lifetime of the project. The uptake and adoption of the project results are also presented along with the challenges that must be overcome to support the secure exchange of life science data sets. We also present how we will use the BRIDGES experiences in future projects at the National e-Science Centre.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1