首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Fair trading of information: a proposal for the economics of peer-to-peer systems 信息的公平交易:点对点系统的经济学建议
Kenji Saito, E. Morino, J. Murai
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are three classes of resource that can be exchanged in a P2P system: atoms (ex. physical goods by way of auctions), bits (ex. data files) and presences (ex. time slots for computing resources such as CPU, storage or bandwidth). If these are equally treated as commodities, however, the economy of the system is likely to collapse, because data files can be reproduced at a negligibly small cost whereas time slots for computing resources cannot even be stockpiled for future use. This paper clarifies this point by simulating a small world of traders, and proposes a novel way for applying the "reduction over time" feature of i-WAT, a P2P currency. In the proposed new economic order (NEO), bits are freely shared among participants, whereas their producers are supported by peers, being given freedom to issue exchange tickets whose values are reduced over time.
P2P货币可以成为一种强大的工具,以一种可信的方式促进交换,利用计算机网络和现实生活中未充分利用的资源。在P2P系统中可以交换的资源有三类:原子(例如通过拍卖的实物商品)、比特(例如数据文件)和存在(例如CPU、存储或带宽等计算资源的时隙)。然而,如果这些数据被平等地视为商品,那么系统的经济性可能会崩溃,因为数据文件可以以微不足道的小成本复制,而计算资源的时间段甚至不能储存起来以备将来使用。本文通过模拟一个交易者的小世界来澄清这一点,并提出了一种新的方法来应用P2P货币i-WAT的“随时间减少”特性。在提议的新经济秩序(NEO)中,比特币在参与者之间自由共享,而比特币的生产者得到同行的支持,可以自由发行价值随时间减少的交换券。
{"title":"Fair trading of information: a proposal for the economics of peer-to-peer systems","authors":"Kenji Saito, E. Morino, J. Murai","doi":"10.1109/ARES.2006.62","DOIUrl":"https://doi.org/10.1109/ARES.2006.62","url":null,"abstract":"A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are three classes of resource that can be exchanged in a P2P system: atoms (ex. physical goods by way of auctions), bits (ex. data files) and presences (ex. time slots for computing resources such as CPU, storage or bandwidth). If these are equally treated as commodities, however, the economy of the system is likely to collapse, because data files can be reproduced at a negligibly small cost whereas time slots for computing resources cannot even be stockpiled for future use. This paper clarifies this point by simulating a small world of traders, and proposes a novel way for applying the \"reduction over time\" feature of i-WAT, a P2P currency. In the proposed new economic order (NEO), bits are freely shared among participants, whereas their producers are supported by peers, being given freedom to issue exchange tickets whose values are reduced over time.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Grid infrastructures for secure access to and use of bioinformatics data: experiences from the BRIDGES project 安全获取和使用生物信息学数据的网格基础设施:来自BRIDGES项目的经验
R. Sinnott, Micha Bayer, A. Stell, J. Koetsier
The BRIDGES project was funded by the UK Department of Trade and Industry (DTI) to address the needs of cardiovascular research scientists investigating the genetic causes of hypertension as part of the Wellcome Trust funded (#4.34M) cardiovascular functional genomics (CFG) project. Security was at the heart of the BRIDGES project and an advanced data and compute grid infrastructure incorporating latest grid authorisation technologies was developed and delivered to the scientists. We outline these grid infrastructures and describe the perceived security requirements at the project start including data classifications and how these evolved throughout the lifetime of the project. The uptake and adoption of the project results are also presented along with the challenges that must be overcome to support the secure exchange of life science data sets. We also present how we will use the BRIDGES experiences in future projects at the National e-Science Centre.
BRIDGES项目由英国贸易和工业部(DTI)资助,作为Wellcome Trust资助(#4.34M)心血管功能基因组学(CFG)项目的一部分,旨在解决心血管研究科学家调查高血压遗传原因的需求。安全是BRIDGES项目的核心,先进的数据和计算网格基础设施结合最新的网格授权技术被开发并交付给科学家。我们概述了这些网格基础设施,并描述了在项目开始时感知到的安全需求,包括数据分类以及这些需求在整个项目生命周期中的演变情况。本文还介绍了项目成果的吸收和采用,以及为支持生命科学数据集的安全交换必须克服的挑战。我们还介绍了我们将如何在国家电子科学中心的未来项目中使用BRIDGES的经验。
{"title":"Grid infrastructures for secure access to and use of bioinformatics data: experiences from the BRIDGES project","authors":"R. Sinnott, Micha Bayer, A. Stell, J. Koetsier","doi":"10.1109/ARES.2006.69","DOIUrl":"https://doi.org/10.1109/ARES.2006.69","url":null,"abstract":"The BRIDGES project was funded by the UK Department of Trade and Industry (DTI) to address the needs of cardiovascular research scientists investigating the genetic causes of hypertension as part of the Wellcome Trust funded (#4.34M) cardiovascular functional genomics (CFG) project. Security was at the heart of the BRIDGES project and an advanced data and compute grid infrastructure incorporating latest grid authorisation technologies was developed and delivered to the scientists. We outline these grid infrastructures and describe the perceived security requirements at the project start including data classifications and how these evolved throughout the lifetime of the project. The uptake and adoption of the project results are also presented along with the challenges that must be overcome to support the secure exchange of life science data sets. We also present how we will use the BRIDGES experiences in future projects at the National e-Science Centre.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Analysis of current VPN technologies 当前VPN技术分析
Thomas Berger
This paper deals with current virtual private network (VPN) technologies, such as Internet protocol security (IPSec), layer two tunneling protocol (L2TP), and point to point tunneling protocol (PPTP). Furthermore, the VPN solution of the Austrian company Phion Information Technologies is presented. After a short introduction to the basics of each protocol, the strengths and weaknesses of each technology are outlined, as far as interoperability, manageability, and practical problems is concerned. This is done by means of a practical analysis and comparison of the results. The analysis includes performance measurement, link quality and stability analysis, feature comparison, interaction with TCP/IP protocols, and some basic security attacks. In order to provide comparable results, all technologies were tested in the same manner. However, this paper does not provide explicit recommendations which technology is to be preferred.
本文讨论了当前的虚拟专用网(VPN)技术,如互联网协议安全(IPSec)、第二层隧道协议(L2TP)和点对点隧道协议(PPTP)。此外,还介绍了奥地利Phion信息技术公司的VPN解决方案。在对每种协议的基础知识进行简短介绍之后,就互操作性、可管理性和实际问题而言,概述了每种技术的优缺点。这是通过对结果的实际分析和比较来实现的。分析包括性能测量、链路质量和稳定性分析、特性比较、与TCP/IP协议的交互以及一些基本的安全攻击。为了提供可比较的结果,所有技术都以相同的方式进行了测试。然而,本文并没有提供明确的建议,哪种技术是首选。
{"title":"Analysis of current VPN technologies","authors":"Thomas Berger","doi":"10.1109/ARES.2006.30","DOIUrl":"https://doi.org/10.1109/ARES.2006.30","url":null,"abstract":"This paper deals with current virtual private network (VPN) technologies, such as Internet protocol security (IPSec), layer two tunneling protocol (L2TP), and point to point tunneling protocol (PPTP). Furthermore, the VPN solution of the Austrian company Phion Information Technologies is presented. After a short introduction to the basics of each protocol, the strengths and weaknesses of each technology are outlined, as far as interoperability, manageability, and practical problems is concerned. This is done by means of a practical analysis and comparison of the results. The analysis includes performance measurement, link quality and stability analysis, feature comparison, interaction with TCP/IP protocols, and some basic security attacks. In order to provide comparable results, all technologies were tested in the same manner. However, this paper does not provide explicit recommendations which technology is to be preferred.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117220761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
A novel artificial-immune-based approach for system-level fault diagnosis 基于人工免疫的系统级故障诊断新方法
M. Elhadef, S. Das, A. Nayak
The problem of self-diagnosis of multiprocessor and multicomputer systems under the generalized comparison model (GCM) is considered. GCM assumes that a set of jobs is assigned to pairs of units and that the outcomes are compared by the units themselves (self-diagnosis). Based on the set of comparison outcomes (agreements and disagreements among the units), the set of up to t faulty nodes is identified (t-diagnosable systems). This paper proposes an artificial-immune-based algorithm to solve the fault identification problem. The immune diagnosis algorithm correctly identifies the set of faulty units, and it has been evaluated using randomly generated t-diagnosable systems. Simulation results indicate that the proposed approach is a viable alternative to solve the GCM-based diagnosis problem.
研究了广义比较模型(GCM)下多处理机和多计算机系统的自诊断问题。GCM假设将一组作业分配给成对的单元,并且由单元本身比较结果(自我诊断)。基于一组比较结果(单元之间的一致和不一致),可以识别多达t个故障节点的集合(t-可诊断系统)。本文提出了一种基于人工免疫的故障识别算法。免疫诊断算法正确识别故障单元集,并使用随机生成的t诊断系统对其进行了评估。仿真结果表明,该方法是解决基于gcm的诊断问题的可行方案。
{"title":"A novel artificial-immune-based approach for system-level fault diagnosis","authors":"M. Elhadef, S. Das, A. Nayak","doi":"10.1109/ARES.2006.10","DOIUrl":"https://doi.org/10.1109/ARES.2006.10","url":null,"abstract":"The problem of self-diagnosis of multiprocessor and multicomputer systems under the generalized comparison model (GCM) is considered. GCM assumes that a set of jobs is assigned to pairs of units and that the outcomes are compared by the units themselves (self-diagnosis). Based on the set of comparison outcomes (agreements and disagreements among the units), the set of up to t faulty nodes is identified (t-diagnosable systems). This paper proposes an artificial-immune-based algorithm to solve the fault identification problem. The immune diagnosis algorithm correctly identifies the set of faulty units, and it has been evaluated using randomly generated t-diagnosable systems. Simulation results indicate that the proposed approach is a viable alternative to solve the GCM-based diagnosis problem.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121701983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sandboxing in myKlaim myKlaim中的沙箱
René Rydhof Hansen, Christian W. Probst, F. Nielson
The /spl mu/Klaim calculus is a process algebra designed to study the programming of distributed systems consisting of a number of locations each having their own tuple space and collection of mobile processes. Previous work has explored how to incorporate a notion of capabilities to be enforced dynamically by means of a reference monitor. Our first contribution is to describe a sandboxing semantics for the remote evaluation of mobile code; we then develop a succinct flow logic for statically guaranteeing the properties enforced by the reference monitor and hence for dispensing with the overhead of a dynamic reference monitor. Our second contribution is an extension of the calculus to interact with an environment; processes enter the system from the environment and we develop an entry-condition that is sufficient for ensuring that the resulting system continues to guarantee the properties that would otherwise need to be dynamically enforced by the reference monitor. We call the resulting calculus myKlaim.
/spl mu/Klaim微积分是一种进程代数,用于研究分布式系统的编程,分布式系统由许多位置组成,每个位置都有自己的元组空间和移动进程的集合。以前的工作已经探讨了如何通过引用监视器来整合要动态执行的功能的概念。我们的第一个贡献是描述了用于移动代码远程评估的沙箱语义;然后,我们开发一个简洁的流逻辑,用于静态地保证由引用监视器强制执行的属性,从而免除动态引用监视器的开销。我们的第二个贡献是扩展了微积分与环境的相互作用;流程从环境进入系统,我们开发了一个进入条件,该条件足以确保生成的系统继续保证需要由参考监视器动态执行的属性。我们称其为myKlaim。
{"title":"Sandboxing in myKlaim","authors":"René Rydhof Hansen, Christian W. Probst, F. Nielson","doi":"10.1109/ARES.2006.115","DOIUrl":"https://doi.org/10.1109/ARES.2006.115","url":null,"abstract":"The /spl mu/Klaim calculus is a process algebra designed to study the programming of distributed systems consisting of a number of locations each having their own tuple space and collection of mobile processes. Previous work has explored how to incorporate a notion of capabilities to be enforced dynamically by means of a reference monitor. Our first contribution is to describe a sandboxing semantics for the remote evaluation of mobile code; we then develop a succinct flow logic for statically guaranteeing the properties enforced by the reference monitor and hence for dispensing with the overhead of a dynamic reference monitor. Our second contribution is an extension of the calculus to interact with an environment; processes enter the system from the environment and we develop an entry-condition that is sufficient for ensuring that the resulting system continues to guarantee the properties that would otherwise need to be dynamically enforced by the reference monitor. We call the resulting calculus myKlaim.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration 防范P2P网络中的Sybil攻击:分类、挑战和自我注册的建议
J. Dinger, H. Hartenstein
The robustness of peer-to-peer (P2P) networks, in particular of DHT-based overlay networks, suffers significantly when a Sybil attack is performed. We tackle the issue of Sybil attacks from two sides. First, we clarify, analyze, and classify the P2P identifier assignment process. By clearly separating network participants from network nodes, two challenges of P2P networks under a Sybil attack become obvious: i) stability over time, and ii) identity differentiation. Second, as a starting point for a quantitative analysis of time-stability of P2P networks under Sybil attacks and under some assumptions with respect to identity differentiation, we propose an identity registration procedure called self-registration that makes use of the inherent distribution mechanisms of a P2P network.
当Sybil攻击发生时,点对点(P2P)网络,特别是基于dht的覆盖网络的鲁棒性会受到严重影响。我们从两个方面来解决西比尔的袭击问题。首先,我们对P2P标识符分配过程进行了澄清、分析和分类。通过清楚地将网络参与者与网络节点分开,P2P网络在Sybil攻击下的两个挑战变得明显:i)随时间的稳定性,ii)身份分化。其次,作为定量分析P2P网络在Sybil攻击下的时间稳定性的起点,在一些关于身份分化的假设下,我们提出了一种称为自注册的身份注册过程,该过程利用了P2P网络固有的分布机制。
{"title":"Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration","authors":"J. Dinger, H. Hartenstein","doi":"10.1109/ARES.2006.45","DOIUrl":"https://doi.org/10.1109/ARES.2006.45","url":null,"abstract":"The robustness of peer-to-peer (P2P) networks, in particular of DHT-based overlay networks, suffers significantly when a Sybil attack is performed. We tackle the issue of Sybil attacks from two sides. First, we clarify, analyze, and classify the P2P identifier assignment process. By clearly separating network participants from network nodes, two challenges of P2P networks under a Sybil attack become obvious: i) stability over time, and ii) identity differentiation. Second, as a starting point for a quantitative analysis of time-stability of P2P networks under Sybil attacks and under some assumptions with respect to identity differentiation, we propose an identity registration procedure called self-registration that makes use of the inherent distribution mechanisms of a P2P network.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"46 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 139
A lightweight model of trust propagation in a multi-client network environment: to what extent does experience matter? 多客户端网络环境中信任传播的轻量级模型:经验在多大程度上重要?
M. Conrad, Timothy French, Wei Huang, C. Maple
The increasing growth in the application of global computing and pervasive systems has necessitated careful consideration of security issues. In particular, there has been a growth in the use of electronic communities, in which there exist many relationships between different entities. Such relationships require establishing trust between entities and a great deal of effort has been expended in developing accurate and reliable models of trust in such multi-client environments. Many of these models are complex and not necessarily guaranteed to give accurate trust predictions. In this paper we present a review of some of these models before proposing a simple, lightweight model for trust. The proposed model does not require the estimation of a large parameter set, nor make great assumptions about the parameters that affect trust.
全球计算和普适系统应用的日益增长需要仔细考虑安全问题。特别是,电子社区的使用有所增加,其中不同实体之间存在许多关系。这种关系需要在实体之间建立信任,在这种多客户端环境中开发准确可靠的信任模型已经花费了大量的精力。其中许多模型都很复杂,不一定能保证给出准确的信任预测。在本文中,我们对其中一些模型进行了回顾,然后提出了一个简单的轻量级信任模型。该模型不需要估计大的参数集,也不需要对影响信任的参数做大的假设。
{"title":"A lightweight model of trust propagation in a multi-client network environment: to what extent does experience matter?","authors":"M. Conrad, Timothy French, Wei Huang, C. Maple","doi":"10.1109/ARES.2006.8","DOIUrl":"https://doi.org/10.1109/ARES.2006.8","url":null,"abstract":"The increasing growth in the application of global computing and pervasive systems has necessitated careful consideration of security issues. In particular, there has been a growth in the use of electronic communities, in which there exist many relationships between different entities. Such relationships require establishing trust between entities and a great deal of effort has been expended in developing accurate and reliable models of trust in such multi-client environments. Many of these models are complex and not necessarily guaranteed to give accurate trust predictions. In this paper we present a review of some of these models before proposing a simple, lightweight model for trust. The proposed model does not require the estimation of a large parameter set, nor make great assumptions about the parameters that affect trust.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Integration of quantum cryptography in 802.11 networks 802.11网络中量子加密的集成
T. Nguyen, M. Sfaxi, S. Ghernaouti-Helie
Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still premature. In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys in 802.11 wireless networks. We also propose a scheme for the integration of quantum cryptography in 802.11i security mechanisms for the establishment of the PTK (pairwise transient key).
量子密码被认为是实现长期密码系统绝对安全的一种有前途的解决方案。虽然量子加密技术在光纤网络中的应用取得了很大的进展,但在移动网络中的应用研究还不成熟。在本文中,我们分析了在802.11无线网络中使用量子技术来分发加密密钥的好处。我们还提出了一种将量子密码学集成到802.11i安全机制中的方案,用于建立PTK(成对瞬态密钥)。
{"title":"Integration of quantum cryptography in 802.11 networks","authors":"T. Nguyen, M. Sfaxi, S. Ghernaouti-Helie","doi":"10.1109/ARES.2006.75","DOIUrl":"https://doi.org/10.1109/ARES.2006.75","url":null,"abstract":"Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still premature. In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys in 802.11 wireless networks. We also propose a scheme for the integration of quantum cryptography in 802.11i security mechanisms for the establishment of the PTK (pairwise transient key).","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122051688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Offline Internet banking fraud detection 线下互联网银行欺诈检测
V. Aggelis
Nowadays, most important topic about Internet banking is security. Banks' basic concern is ensuring their customers' electronic transactions. Nevertheless, fraudsters are becoming more sophisticated and they act really clever to achieve their target. Having this knowledge, banks try to optimize their detection systems in order to detect fraud and investigate suspect online behavior and transactions. Object of this paper is to demonstrate one successful fraud detection model which is established in Greece. Apart from the offline Internet banking fraud detection system itself, which is described briefly, our scope is to present its contribution in fast and reliable detection of any "strange" transaction including fraudulent ones.
目前,网上银行最重要的话题就是安全问题。银行最关心的是确保客户的电子交易。然而,欺诈者正变得越来越老练,他们表现得非常聪明,以达到他们的目标。有了这些知识,银行试图优化他们的检测系统,以检测欺诈并调查可疑的在线行为和交易。本文的目的是展示一个在希腊建立的成功的欺诈检测模型。除了简单描述的线下互联网银行欺诈检测系统本身外,我们的范围是展示它在快速可靠地检测任何“奇怪”交易(包括欺诈交易)方面的贡献。
{"title":"Offline Internet banking fraud detection","authors":"V. Aggelis","doi":"10.1109/ARES.2006.89","DOIUrl":"https://doi.org/10.1109/ARES.2006.89","url":null,"abstract":"Nowadays, most important topic about Internet banking is security. Banks' basic concern is ensuring their customers' electronic transactions. Nevertheless, fraudsters are becoming more sophisticated and they act really clever to achieve their target. Having this knowledge, banks try to optimize their detection systems in order to detect fraud and investigate suspect online behavior and transactions. Object of this paper is to demonstrate one successful fraud detection model which is established in Greece. Apart from the offline Internet banking fraud detection system itself, which is described briefly, our scope is to present its contribution in fast and reliable detection of any \"strange\" transaction including fraudulent ones.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133581038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
RATING: rigorous assessment of trust in identity management 评级:对身份管理信任的严格评估
Rajarajan Sampath, Deepak Goel
Trust can be an important aspect for decision-making in the Internet. This paper proposes a new trust establishment model for identity management on the Internet. After discussing the challenges and opportunities of a trust model in identity management, we describe our trust model in detail. The fundamental difference to existing models (or the lack of) in identity management is the establishment of trust and evaluation of trust in this model changes over time. Leaving greater incentives to constantly seek and learn from the past behavior to influence their future. Moreover this model acknowledges the heterogeneity of service providers, and lastly this model proposes some attenuation measures to counter biased ratings in identity management scenarios.
信任是互联网决策的一个重要方面。提出了一种新的基于Internet的身份管理信任建立模型。在讨论了信任模型在身份管理中的挑战和机遇之后,我们详细描述了我们的信任模型。与身份管理中现有模型(或缺乏)的根本区别在于,该模型中信任的建立和信任的评估会随着时间的推移而变化。留下更大的动机,不断寻求和学习过去的行为,以影响他们的未来。此外,该模型承认服务提供商的异质性,最后,该模型提出了一些衰减措施,以对抗身份管理场景中有偏见的评级。
{"title":"RATING: rigorous assessment of trust in identity management","authors":"Rajarajan Sampath, Deepak Goel","doi":"10.1109/ARES.2006.103","DOIUrl":"https://doi.org/10.1109/ARES.2006.103","url":null,"abstract":"Trust can be an important aspect for decision-making in the Internet. This paper proposes a new trust establishment model for identity management on the Internet. After discussing the challenges and opportunities of a trust model in identity management, we describe our trust model in detail. The fundamental difference to existing models (or the lack of) in identity management is the establishment of trust and evaluation of trust in this model changes over time. Leaving greater incentives to constantly seek and learn from the past behavior to influence their future. Moreover this model acknowledges the heterogeneity of service providers, and lastly this model proposes some attenuation measures to counter biased ratings in identity management scenarios.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132289955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1