首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Fair trading of information: a proposal for the economics of peer-to-peer systems 信息的公平交易:点对点系统的经济学建议
Kenji Saito, E. Morino, J. Murai
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are three classes of resource that can be exchanged in a P2P system: atoms (ex. physical goods by way of auctions), bits (ex. data files) and presences (ex. time slots for computing resources such as CPU, storage or bandwidth). If these are equally treated as commodities, however, the economy of the system is likely to collapse, because data files can be reproduced at a negligibly small cost whereas time slots for computing resources cannot even be stockpiled for future use. This paper clarifies this point by simulating a small world of traders, and proposes a novel way for applying the "reduction over time" feature of i-WAT, a P2P currency. In the proposed new economic order (NEO), bits are freely shared among participants, whereas their producers are supported by peers, being given freedom to issue exchange tickets whose values are reduced over time.
P2P货币可以成为一种强大的工具,以一种可信的方式促进交换,利用计算机网络和现实生活中未充分利用的资源。在P2P系统中可以交换的资源有三类:原子(例如通过拍卖的实物商品)、比特(例如数据文件)和存在(例如CPU、存储或带宽等计算资源的时隙)。然而,如果这些数据被平等地视为商品,那么系统的经济性可能会崩溃,因为数据文件可以以微不足道的小成本复制,而计算资源的时间段甚至不能储存起来以备将来使用。本文通过模拟一个交易者的小世界来澄清这一点,并提出了一种新的方法来应用P2P货币i-WAT的“随时间减少”特性。在提议的新经济秩序(NEO)中,比特币在参与者之间自由共享,而比特币的生产者得到同行的支持,可以自由发行价值随时间减少的交换券。
{"title":"Fair trading of information: a proposal for the economics of peer-to-peer systems","authors":"Kenji Saito, E. Morino, J. Murai","doi":"10.1109/ARES.2006.62","DOIUrl":"https://doi.org/10.1109/ARES.2006.62","url":null,"abstract":"A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are three classes of resource that can be exchanged in a P2P system: atoms (ex. physical goods by way of auctions), bits (ex. data files) and presences (ex. time slots for computing resources such as CPU, storage or bandwidth). If these are equally treated as commodities, however, the economy of the system is likely to collapse, because data files can be reproduced at a negligibly small cost whereas time slots for computing resources cannot even be stockpiled for future use. This paper clarifies this point by simulating a small world of traders, and proposes a novel way for applying the \"reduction over time\" feature of i-WAT, a P2P currency. In the proposed new economic order (NEO), bits are freely shared among participants, whereas their producers are supported by peers, being given freedom to issue exchange tickets whose values are reduced over time.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proposed framework for achieving interoperable services between European public administrations 为实现欧洲公共管理部门之间的可互操作服务而提出的框架
Amir Hayat, T. Rössler, Muhammad Alam
The interoperability issues among the public administrations of the European Union is in the spot light. An additional pressure on these public administrations comes from the fact that the need for exchanging vital records of mobile European citizens is on the rise. The citizens face difficult situations because of lack of integration and interoperability between the public administrations. In this paper we propose a framework with the help of which the public administrations in different Member States can securely and efficiently exchange citizen's vital records. The electronic identity (eID) concept plays a central role in this proposed framework. Our framework on one hand removes the burden of complex interactions, with several public administrations, from citizen end and on the other hand helps public administrations in becoming more efficient and providing better services without disturbing their internal processes.
欧盟公共管理部门之间的互操作性问题备受关注。这些公共行政部门面临的另一个压力来自这样一个事实:交换流动欧洲公民重要记录的需求正在上升。由于公共行政部门之间缺乏整合和互操作性,公民面临困境。在本文中,我们提出了一个框架,在此框架的帮助下,不同成员国的公共行政部门可以安全有效地交换公民的生命记录。电子身份(eID)概念在该框架中起着核心作用。我们的框架一方面从公民方面消除了与若干公共行政部门进行复杂互动的负担,另一方面帮助公共行政部门提高效率和提供更好的服务,而不干扰其内部进程。
{"title":"Proposed framework for achieving interoperable services between European public administrations","authors":"Amir Hayat, T. Rössler, Muhammad Alam","doi":"10.1109/ARES.2006.97","DOIUrl":"https://doi.org/10.1109/ARES.2006.97","url":null,"abstract":"The interoperability issues among the public administrations of the European Union is in the spot light. An additional pressure on these public administrations comes from the fact that the need for exchanging vital records of mobile European citizens is on the rise. The citizens face difficult situations because of lack of integration and interoperability between the public administrations. In this paper we propose a framework with the help of which the public administrations in different Member States can securely and efficiently exchange citizen's vital records. The electronic identity (eID) concept plays a central role in this proposed framework. Our framework on one hand removes the burden of complex interactions, with several public administrations, from citizen end and on the other hand helps public administrations in becoming more efficient and providing better services without disturbing their internal processes.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127395565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sandboxing in myKlaim myKlaim中的沙箱
René Rydhof Hansen, Christian W. Probst, F. Nielson
The /spl mu/Klaim calculus is a process algebra designed to study the programming of distributed systems consisting of a number of locations each having their own tuple space and collection of mobile processes. Previous work has explored how to incorporate a notion of capabilities to be enforced dynamically by means of a reference monitor. Our first contribution is to describe a sandboxing semantics for the remote evaluation of mobile code; we then develop a succinct flow logic for statically guaranteeing the properties enforced by the reference monitor and hence for dispensing with the overhead of a dynamic reference monitor. Our second contribution is an extension of the calculus to interact with an environment; processes enter the system from the environment and we develop an entry-condition that is sufficient for ensuring that the resulting system continues to guarantee the properties that would otherwise need to be dynamically enforced by the reference monitor. We call the resulting calculus myKlaim.
/spl mu/Klaim微积分是一种进程代数,用于研究分布式系统的编程,分布式系统由许多位置组成,每个位置都有自己的元组空间和移动进程的集合。以前的工作已经探讨了如何通过引用监视器来整合要动态执行的功能的概念。我们的第一个贡献是描述了用于移动代码远程评估的沙箱语义;然后,我们开发一个简洁的流逻辑,用于静态地保证由引用监视器强制执行的属性,从而免除动态引用监视器的开销。我们的第二个贡献是扩展了微积分与环境的相互作用;流程从环境进入系统,我们开发了一个进入条件,该条件足以确保生成的系统继续保证需要由参考监视器动态执行的属性。我们称其为myKlaim。
{"title":"Sandboxing in myKlaim","authors":"René Rydhof Hansen, Christian W. Probst, F. Nielson","doi":"10.1109/ARES.2006.115","DOIUrl":"https://doi.org/10.1109/ARES.2006.115","url":null,"abstract":"The /spl mu/Klaim calculus is a process algebra designed to study the programming of distributed systems consisting of a number of locations each having their own tuple space and collection of mobile processes. Previous work has explored how to incorporate a notion of capabilities to be enforced dynamically by means of a reference monitor. Our first contribution is to describe a sandboxing semantics for the remote evaluation of mobile code; we then develop a succinct flow logic for statically guaranteeing the properties enforced by the reference monitor and hence for dispensing with the overhead of a dynamic reference monitor. Our second contribution is an extension of the calculus to interact with an environment; processes enter the system from the environment and we develop an entry-condition that is sufficient for ensuring that the resulting system continues to guarantee the properties that would otherwise need to be dynamically enforced by the reference monitor. We call the resulting calculus myKlaim.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration 防范P2P网络中的Sybil攻击:分类、挑战和自我注册的建议
J. Dinger, H. Hartenstein
The robustness of peer-to-peer (P2P) networks, in particular of DHT-based overlay networks, suffers significantly when a Sybil attack is performed. We tackle the issue of Sybil attacks from two sides. First, we clarify, analyze, and classify the P2P identifier assignment process. By clearly separating network participants from network nodes, two challenges of P2P networks under a Sybil attack become obvious: i) stability over time, and ii) identity differentiation. Second, as a starting point for a quantitative analysis of time-stability of P2P networks under Sybil attacks and under some assumptions with respect to identity differentiation, we propose an identity registration procedure called self-registration that makes use of the inherent distribution mechanisms of a P2P network.
当Sybil攻击发生时,点对点(P2P)网络,特别是基于dht的覆盖网络的鲁棒性会受到严重影响。我们从两个方面来解决西比尔的袭击问题。首先,我们对P2P标识符分配过程进行了澄清、分析和分类。通过清楚地将网络参与者与网络节点分开,P2P网络在Sybil攻击下的两个挑战变得明显:i)随时间的稳定性,ii)身份分化。其次,作为定量分析P2P网络在Sybil攻击下的时间稳定性的起点,在一些关于身份分化的假设下,我们提出了一种称为自注册的身份注册过程,该过程利用了P2P网络固有的分布机制。
{"title":"Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration","authors":"J. Dinger, H. Hartenstein","doi":"10.1109/ARES.2006.45","DOIUrl":"https://doi.org/10.1109/ARES.2006.45","url":null,"abstract":"The robustness of peer-to-peer (P2P) networks, in particular of DHT-based overlay networks, suffers significantly when a Sybil attack is performed. We tackle the issue of Sybil attacks from two sides. First, we clarify, analyze, and classify the P2P identifier assignment process. By clearly separating network participants from network nodes, two challenges of P2P networks under a Sybil attack become obvious: i) stability over time, and ii) identity differentiation. Second, as a starting point for a quantitative analysis of time-stability of P2P networks under Sybil attacks and under some assumptions with respect to identity differentiation, we propose an identity registration procedure called self-registration that makes use of the inherent distribution mechanisms of a P2P network.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"46 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 139
A lightweight model of trust propagation in a multi-client network environment: to what extent does experience matter? 多客户端网络环境中信任传播的轻量级模型:经验在多大程度上重要?
M. Conrad, Timothy French, Wei Huang, C. Maple
The increasing growth in the application of global computing and pervasive systems has necessitated careful consideration of security issues. In particular, there has been a growth in the use of electronic communities, in which there exist many relationships between different entities. Such relationships require establishing trust between entities and a great deal of effort has been expended in developing accurate and reliable models of trust in such multi-client environments. Many of these models are complex and not necessarily guaranteed to give accurate trust predictions. In this paper we present a review of some of these models before proposing a simple, lightweight model for trust. The proposed model does not require the estimation of a large parameter set, nor make great assumptions about the parameters that affect trust.
全球计算和普适系统应用的日益增长需要仔细考虑安全问题。特别是,电子社区的使用有所增加,其中不同实体之间存在许多关系。这种关系需要在实体之间建立信任,在这种多客户端环境中开发准确可靠的信任模型已经花费了大量的精力。其中许多模型都很复杂,不一定能保证给出准确的信任预测。在本文中,我们对其中一些模型进行了回顾,然后提出了一个简单的轻量级信任模型。该模型不需要估计大的参数集,也不需要对影响信任的参数做大的假设。
{"title":"A lightweight model of trust propagation in a multi-client network environment: to what extent does experience matter?","authors":"M. Conrad, Timothy French, Wei Huang, C. Maple","doi":"10.1109/ARES.2006.8","DOIUrl":"https://doi.org/10.1109/ARES.2006.8","url":null,"abstract":"The increasing growth in the application of global computing and pervasive systems has necessitated careful consideration of security issues. In particular, there has been a growth in the use of electronic communities, in which there exist many relationships between different entities. Such relationships require establishing trust between entities and a great deal of effort has been expended in developing accurate and reliable models of trust in such multi-client environments. Many of these models are complex and not necessarily guaranteed to give accurate trust predictions. In this paper we present a review of some of these models before proposing a simple, lightweight model for trust. The proposed model does not require the estimation of a large parameter set, nor make great assumptions about the parameters that affect trust.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A novel artificial-immune-based approach for system-level fault diagnosis 基于人工免疫的系统级故障诊断新方法
M. Elhadef, S. Das, A. Nayak
The problem of self-diagnosis of multiprocessor and multicomputer systems under the generalized comparison model (GCM) is considered. GCM assumes that a set of jobs is assigned to pairs of units and that the outcomes are compared by the units themselves (self-diagnosis). Based on the set of comparison outcomes (agreements and disagreements among the units), the set of up to t faulty nodes is identified (t-diagnosable systems). This paper proposes an artificial-immune-based algorithm to solve the fault identification problem. The immune diagnosis algorithm correctly identifies the set of faulty units, and it has been evaluated using randomly generated t-diagnosable systems. Simulation results indicate that the proposed approach is a viable alternative to solve the GCM-based diagnosis problem.
研究了广义比较模型(GCM)下多处理机和多计算机系统的自诊断问题。GCM假设将一组作业分配给成对的单元,并且由单元本身比较结果(自我诊断)。基于一组比较结果(单元之间的一致和不一致),可以识别多达t个故障节点的集合(t-可诊断系统)。本文提出了一种基于人工免疫的故障识别算法。免疫诊断算法正确识别故障单元集,并使用随机生成的t诊断系统对其进行了评估。仿真结果表明,该方法是解决基于gcm的诊断问题的可行方案。
{"title":"A novel artificial-immune-based approach for system-level fault diagnosis","authors":"M. Elhadef, S. Das, A. Nayak","doi":"10.1109/ARES.2006.10","DOIUrl":"https://doi.org/10.1109/ARES.2006.10","url":null,"abstract":"The problem of self-diagnosis of multiprocessor and multicomputer systems under the generalized comparison model (GCM) is considered. GCM assumes that a set of jobs is assigned to pairs of units and that the outcomes are compared by the units themselves (self-diagnosis). Based on the set of comparison outcomes (agreements and disagreements among the units), the set of up to t faulty nodes is identified (t-diagnosable systems). This paper proposes an artificial-immune-based algorithm to solve the fault identification problem. The immune diagnosis algorithm correctly identifies the set of faulty units, and it has been evaluated using randomly generated t-diagnosable systems. Simulation results indicate that the proposed approach is a viable alternative to solve the GCM-based diagnosis problem.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121701983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integration of quantum cryptography in 802.11 networks 802.11网络中量子加密的集成
T. Nguyen, M. Sfaxi, S. Ghernaouti-Helie
Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still premature. In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys in 802.11 wireless networks. We also propose a scheme for the integration of quantum cryptography in 802.11i security mechanisms for the establishment of the PTK (pairwise transient key).
量子密码被认为是实现长期密码系统绝对安全的一种有前途的解决方案。虽然量子加密技术在光纤网络中的应用取得了很大的进展,但在移动网络中的应用研究还不成熟。在本文中,我们分析了在802.11无线网络中使用量子技术来分发加密密钥的好处。我们还提出了一种将量子密码学集成到802.11i安全机制中的方案,用于建立PTK(成对瞬态密钥)。
{"title":"Integration of quantum cryptography in 802.11 networks","authors":"T. Nguyen, M. Sfaxi, S. Ghernaouti-Helie","doi":"10.1109/ARES.2006.75","DOIUrl":"https://doi.org/10.1109/ARES.2006.75","url":null,"abstract":"Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still premature. In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys in 802.11 wireless networks. We also propose a scheme for the integration of quantum cryptography in 802.11i security mechanisms for the establishment of the PTK (pairwise transient key).","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122051688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Workshop-based multiobjective security safeguard selection 基于车间的多目标安全防护选择
T. Neubauer, C. Stummer, E. Weippl
Companies spend considerable amounts of resources on minimizing security breaches but often neglect efficient security measures and/or are not aware whether their investments are effective. While security safeguards traditionally are evaluated through a single (aggregated) criterion such as the return on investment, this may not suffice any longer as economic and legal requirements force top management to pay more attention to security issues. Thus, there is a demand for decision support tools that assist decision makers in allocating security safeguards with respect to multiple objectives of the involved stakeholders. This paper proposes a tool called MOS/sup 3/T (multi-objective security safeguard selection tool), that integrates ideas from multiobjective decision making in a workshop environment The stepwise procedure for the assessment and interactive selection of sets of security safeguards improves security awareness of top management while minimizing the resources required for implementing a proper security environment that meets a corporate's needs.
公司在最小化安全漏洞上花费了相当多的资源,但往往忽视了有效的安全措施和/或不知道他们的投资是否有效。虽然安全保障传统上是通过单一(聚合)标准来评估的,例如投资回报,但这可能不再足够,因为经济和法律需求迫使最高管理层更多地关注安全问题。因此,需要决策支持工具来帮助决策者针对涉众的多个目标分配安全保障。本文提出了一种称为MOS/sup 3/T(多目标安全保障选择工具)的工具,该工具集成了车间环境中多目标决策的思想。安全保障措施集的逐步评估和交互式选择过程提高了最高管理层的安全意识,同时最大限度地减少了实现满足企业需求的适当安全环境所需的资源。
{"title":"Workshop-based multiobjective security safeguard selection","authors":"T. Neubauer, C. Stummer, E. Weippl","doi":"10.1109/ARES.2006.144","DOIUrl":"https://doi.org/10.1109/ARES.2006.144","url":null,"abstract":"Companies spend considerable amounts of resources on minimizing security breaches but often neglect efficient security measures and/or are not aware whether their investments are effective. While security safeguards traditionally are evaluated through a single (aggregated) criterion such as the return on investment, this may not suffice any longer as economic and legal requirements force top management to pay more attention to security issues. Thus, there is a demand for decision support tools that assist decision makers in allocating security safeguards with respect to multiple objectives of the involved stakeholders. This paper proposes a tool called MOS/sup 3/T (multi-objective security safeguard selection tool), that integrates ideas from multiobjective decision making in a workshop environment The stepwise procedure for the assessment and interactive selection of sets of security safeguards improves security awareness of top management while minimizing the resources required for implementing a proper security environment that meets a corporate's needs.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"530 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Analysis of current VPN technologies 当前VPN技术分析
Thomas Berger
This paper deals with current virtual private network (VPN) technologies, such as Internet protocol security (IPSec), layer two tunneling protocol (L2TP), and point to point tunneling protocol (PPTP). Furthermore, the VPN solution of the Austrian company Phion Information Technologies is presented. After a short introduction to the basics of each protocol, the strengths and weaknesses of each technology are outlined, as far as interoperability, manageability, and practical problems is concerned. This is done by means of a practical analysis and comparison of the results. The analysis includes performance measurement, link quality and stability analysis, feature comparison, interaction with TCP/IP protocols, and some basic security attacks. In order to provide comparable results, all technologies were tested in the same manner. However, this paper does not provide explicit recommendations which technology is to be preferred.
本文讨论了当前的虚拟专用网(VPN)技术,如互联网协议安全(IPSec)、第二层隧道协议(L2TP)和点对点隧道协议(PPTP)。此外,还介绍了奥地利Phion信息技术公司的VPN解决方案。在对每种协议的基础知识进行简短介绍之后,就互操作性、可管理性和实际问题而言,概述了每种技术的优缺点。这是通过对结果的实际分析和比较来实现的。分析包括性能测量、链路质量和稳定性分析、特性比较、与TCP/IP协议的交互以及一些基本的安全攻击。为了提供可比较的结果,所有技术都以相同的方式进行了测试。然而,本文并没有提供明确的建议,哪种技术是首选。
{"title":"Analysis of current VPN technologies","authors":"Thomas Berger","doi":"10.1109/ARES.2006.30","DOIUrl":"https://doi.org/10.1109/ARES.2006.30","url":null,"abstract":"This paper deals with current virtual private network (VPN) technologies, such as Internet protocol security (IPSec), layer two tunneling protocol (L2TP), and point to point tunneling protocol (PPTP). Furthermore, the VPN solution of the Austrian company Phion Information Technologies is presented. After a short introduction to the basics of each protocol, the strengths and weaknesses of each technology are outlined, as far as interoperability, manageability, and practical problems is concerned. This is done by means of a practical analysis and comparison of the results. The analysis includes performance measurement, link quality and stability analysis, feature comparison, interaction with TCP/IP protocols, and some basic security attacks. In order to provide comparable results, all technologies were tested in the same manner. However, this paper does not provide explicit recommendations which technology is to be preferred.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117220761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Reliability modeling strategy of an industrial system 工业系统可靠性建模策略
Dr S M Rizwan, Dr K P Ramachandran
This paper outlines a reliability modeling strategy and its application to the industry. Since many industries are operated and controlled by programmable logic controllers, a modeling strategy, inspired by reliability analysis and using the data available for one of the biscuit manufacturing industry is suggested. System effectiveness is analyzed and various reliability indices are obtained using semi-Markov and regenerative processes. Profit incurred to the system is obtained mathematically. Graph is essentially established to study the pattern of profit with respect to revenue per unit up time for the case example under study.
本文概述了一种可靠性建模策略及其在工业中的应用。由于许多行业都是由可编程逻辑控制器操作和控制的,因此,在可靠性分析的启发下,利用某饼干制造行业的现有数据,提出了一种建模策略。利用半马尔可夫过程和再生过程分析了系统的有效性,得到了系统的各种可靠性指标。系统产生的利润是用数学方法计算出来的。图的建立本质上是为了研究所研究的案例中每单位上线时间的利润与收入的关系。
{"title":"Reliability modeling strategy of an industrial system","authors":"Dr S M Rizwan, Dr K P Ramachandran","doi":"10.1109/ARES.2006.107","DOIUrl":"https://doi.org/10.1109/ARES.2006.107","url":null,"abstract":"This paper outlines a reliability modeling strategy and its application to the industry. Since many industries are operated and controlled by programmable logic controllers, a modeling strategy, inspired by reliability analysis and using the data available for one of the biscuit manufacturing industry is suggested. System effectiveness is analyzed and various reliability indices are obtained using semi-Markov and regenerative processes. Profit incurred to the system is obtained mathematically. Graph is essentially established to study the pattern of profit with respect to revenue per unit up time for the case example under study.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1