首页 > 最新文献

43rd Annual 2009 International Carnahan Conference on Security Technology最新文献

英文 中文
Dynamic intrusion detection system based on feature extraction and multidimensional hidden Markov model analysis 基于特征提取和多维隐马尔可夫模型分析的动态入侵检测系统
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335559
Chang-Lung Tsai, Allen Y. Chang, Chun-Jung Chen, Wen-Jieh Yu, Ling-Hong Chen
In this paper, a novel intrusion detection system based on diversity timing factor, combining the characteristic of dynamic and static adaption, sniffing from multi-stage and analyzing with multi-dimensional hidden Markov model has been proposed. In the proposed mechanism, detection, expert, and console modules are developed. In which, the detection module is deployed with numbers of independent sensors on each node/device of the network. This module not only takes the responsibility to detect and collect all of the desired information on each different timing period and stage, but also denotes specific weighting function to indicate the significance of possible influence and tune the value according to the frequency and times of the occurrence of security events on each collected data. All of the collected audit data and detected normal/abnormal signals will be transferred to the database of the expert module for further integrated evaluation on those multiple observing factors and processed with synthetic information and associative events analysis based on hidden Markov model algorithm on multidimensional. After then, the fuzzy inferring rule is applied for intrusion recognition and identification. The console module is assigned to manage the performance of the system, control all of the sensors for monitoring security events and generate alerts and offer periodically reports and present proposals for taking suitable response and making optimal decision. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.
本文提出了一种基于多样性时间因子的入侵检测系统,结合动态自适应和静态自适应的特点,利用多维隐马尔可夫模型进行多阶段嗅探和分析。在该机制中,开发了检测、专家和控制台模块。其中,检测模块在网络的每个节点/设备上部署了多个独立的传感器。该模块不仅负责在每个不同的时间段和阶段检测和收集所有需要的信息,而且还表示具体的权重函数,以表示可能影响的重要程度,并根据每个收集到的数据上安全事件发生的频率和次数来调整值。所有收集到的审计数据和检测到的正常/异常信号将被传输到专家模块的数据库中,对这些多个观察因素进行进一步的综合评价,并采用基于多维隐马尔可夫模型算法的综合信息和关联事件分析进行处理。然后,将模糊推理规则应用于入侵识别和识别。控制台模块负责管理系统的性能,控制所有监测安全事件的传感器,并生成警报,定期提供报告和建议,以便采取适当的响应和做出最佳决策。实验结果表明,所提出的入侵检测机制具有良好的效率和性能。
{"title":"Dynamic intrusion detection system based on feature extraction and multidimensional hidden Markov model analysis","authors":"Chang-Lung Tsai, Allen Y. Chang, Chun-Jung Chen, Wen-Jieh Yu, Ling-Hong Chen","doi":"10.1109/CCST.2009.5335559","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335559","url":null,"abstract":"In this paper, a novel intrusion detection system based on diversity timing factor, combining the characteristic of dynamic and static adaption, sniffing from multi-stage and analyzing with multi-dimensional hidden Markov model has been proposed. In the proposed mechanism, detection, expert, and console modules are developed. In which, the detection module is deployed with numbers of independent sensors on each node/device of the network. This module not only takes the responsibility to detect and collect all of the desired information on each different timing period and stage, but also denotes specific weighting function to indicate the significance of possible influence and tune the value according to the frequency and times of the occurrence of security events on each collected data. All of the collected audit data and detected normal/abnormal signals will be transferred to the database of the expert module for further integrated evaluation on those multiple observing factors and processed with synthetic information and associative events analysis based on hidden Markov model algorithm on multidimensional. After then, the fuzzy inferring rule is applied for intrusion recognition and identification. The console module is assigned to manage the performance of the system, control all of the sensors for monitoring security events and generate alerts and offer periodically reports and present proposals for taking suitable response and making optimal decision. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy friendly applications using citizen cards based on cryptographic smartcards 使用基于加密智能卡的公民卡的隐私友好应用程序
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335541
R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza
Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the Administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping the end-user anonymous. This requirement can be forced by the kind of application (e.g. restricted to certain ages), of by data protection laws, where there is no need to access personal data to provide a local service. Authors are proposing in this paper two solutions for this kind of services, benefiting from the already deployed citizen cards, reducing the cost of developing a new card, as well as maintain the card system.
市民卡现在正在部署。目前正在开发使用这种卡片的几种应用程序。市民可透过身份证提供不同的服务,包括政府所需的服务,以及私人公司的申请。不幸的是,现在有大量的应用程序无法使用这些卡提供的安全性,因为它们要求保持最终用户的匿名性。在不需要访问个人数据以提供本地服务的情况下,可以根据应用类型(例如限制于某些年龄)或数据保护法强制执行此要求。作者在本文中提出了两种解决方案,从已经部署的市民卡中获益,降低开发新卡的成本,以及维护卡系统。
{"title":"Privacy friendly applications using citizen cards based on cryptographic smartcards","authors":"R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza","doi":"10.1109/CCST.2009.5335541","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335541","url":null,"abstract":"Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the Administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping the end-user anonymous. This requirement can be forced by the kind of application (e.g. restricted to certain ages), of by data protection laws, where there is no need to access personal data to provide a local service. Authors are proposing in this paper two solutions for this kind of services, benefiting from the already deployed citizen cards, reducing the cost of developing a new card, as well as maintain the card system.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis 基于蜜罐跟踪和蚂蚁算法分析的入侵行为分析
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335531
Chang-Lung Tsai, Chun-Chi Tseng, Chin-Chuan Han
In this paper, a novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm has been proposed. In which, there are monitor module, track module, and analysis module developed. The intrusive behavior is then analyzed through the above modules. In the developed honey pot, all of the architecture, database, directory, security parameters are updated dynamically and timely to evade the probe test from the intruders. To record the traverse of an intrusion, the pheromone will be deposited as discovered. In addition, in order to exactly and correctly measure the capability of the intruders, the content of those discovered file, path and database will be updated and the security setting will also be enhanced timely to raise the difficulty of visiting or access again. All of the traverse of intruders and the corresponding behavior will be analyzed based on ant colony algorithm. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.
本文提出了一种基于蜜罐设计和蚁群算法诊断的入侵行为分析机制。其中开发了监控模块、跟踪模块和分析模块。然后通过上述模块对入侵行为进行分析。在开发的蜜罐中,所有的架构、数据库、目录、安全参数都是动态及时更新的,以逃避入侵者的探测测试。为了记录入侵的过程,信息素会被发现后储存起来。此外,为了准确准确地衡量入侵者的能力,我们会及时更新被发现的文件、路径和数据库的内容,并加强安全设置,以提高再次访问或访问的难度。在蚁群算法的基础上,分析入侵者的所有遍历过程和相应的行为。实验结果表明,所提出的入侵检测机制具有良好的效率和性能。
{"title":"Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis","authors":"Chang-Lung Tsai, Chun-Chi Tseng, Chin-Chuan Han","doi":"10.1109/CCST.2009.5335531","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335531","url":null,"abstract":"In this paper, a novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm has been proposed. In which, there are monitor module, track module, and analysis module developed. The intrusive behavior is then analyzed through the above modules. In the developed honey pot, all of the architecture, database, directory, security parameters are updated dynamically and timely to evade the probe test from the intruders. To record the traverse of an intrusion, the pheromone will be deposited as discovered. In addition, in order to exactly and correctly measure the capability of the intruders, the content of those discovered file, path and database will be updated and the security setting will also be enhanced timely to raise the difficulty of visiting or access again. All of the traverse of intruders and the corresponding behavior will be analyzed based on ant colony algorithm. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Omnitrax ranging leaky coaxial cable sensor technology update Omnitrax测距泄漏同轴电缆传感器技术更新
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335537
K. Harman
The OmniTrax® leaky coaxial cable perimeter intrusion detection system was first introduced at the 2004 International Carnahan Conference [1]. This sensor evolved from the technology of “GUIDAR” pioneered in the 1970's to bring intrusion location to perimeter sensors. OmniTrax theory of operation, based on a unique application of new Ultra Wideband Radar was described, as well as its feature of allowing pinpoint location of intrusions along 800m of sensor cable using a single processor. This feature is fundamentally important to direct the response force, and also for rapid debug and maintenance of the installation. Since that first presentation the sensor has been fully realized as one of the most cost-effective ranging perimeter sensors with its own integrated power and communications network. It has also been evaluated for both detection and environmental performance at our own local test site (SITE), and at independent government sensor test agencies. Further components of the technology have been developed to enlarge the range of site applications. This paper provides an update on the technology and its application including some new applications for leaky coaxial cable technology. One such new application has been selected for more detailed discussion in the paper entitled “A Rapid Deployment Guided Radar Sensor” that also appears in these proceedings.
OmniTrax®泄漏同轴电缆周界入侵检测系统首次在2004年国际卡纳汉会议上推出[1]。这种传感器从20世纪70年代开创的“GUIDAR”技术演变而来,为周边传感器带来入侵定位。介绍了基于新型超宽带雷达的独特应用的OmniTrax操作理论,以及使用单个处理器可以沿着800米长的传感器电缆精确定位入侵的特点。这一特性对于指导响应力以及对安装的快速调试和维护至关重要。自第一次演示以来,该传感器已经完全实现了最具成本效益的测距周长传感器之一,具有自己的集成电源和通信网络。它还在我们自己的本地测试站点(site)和独立的政府传感器测试机构进行了检测和环境性能评估。该技术的进一步组成部分已被开发,以扩大现场应用的范围。本文介绍了泄漏同轴电缆技术及其应用的最新进展,包括泄漏同轴电缆技术的一些新应用。一种这样的新应用被选择在题为“快速部署制导雷达传感器”的论文中进行更详细的讨论,该论文也出现在这些会议中。
{"title":"Omnitrax ranging leaky coaxial cable sensor technology update","authors":"K. Harman","doi":"10.1109/CCST.2009.5335537","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335537","url":null,"abstract":"The OmniTrax® leaky coaxial cable perimeter intrusion detection system was first introduced at the 2004 International Carnahan Conference [1]. This sensor evolved from the technology of “GUIDAR” pioneered in the 1970's to bring intrusion location to perimeter sensors. OmniTrax theory of operation, based on a unique application of new Ultra Wideband Radar was described, as well as its feature of allowing pinpoint location of intrusions along 800m of sensor cable using a single processor. This feature is fundamentally important to direct the response force, and also for rapid debug and maintenance of the installation. Since that first presentation the sensor has been fully realized as one of the most cost-effective ranging perimeter sensors with its own integrated power and communications network. It has also been evaluated for both detection and environmental performance at our own local test site (SITE), and at independent government sensor test agencies. Further components of the technology have been developed to enlarge the range of site applications. This paper provides an update on the technology and its application including some new applications for leaky coaxial cable technology. One such new application has been selected for more detailed discussion in the paper entitled “A Rapid Deployment Guided Radar Sensor” that also appears in these proceedings.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fundamental upgrade of the internal network system within the National Police Agency of Japan 日本警察厅内部网络系统的根本性升级
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335558
T. Yasuhira
The National Police Agency has contributed to the construction, maintenance, and management of its own nationwide info-communications network composed of a microwave radio system operated by the NPA, dedicated lines leased from major carriers and so on. Due to overhanging crises of natural disasters and threats posed by people of malicious intent to the confidential police network, the NPA is urgently exposed to the pressure to upgrade its internal network system. Thanks to the remarkable progress in the field of IT, more securely and qualitatively reliable communications and efficient methods for information sharing have been actively proposed and developed by various IT vendors. By taking advantage of the latest technologies, the NPA is under the way to strengthen the whole of its own network.
警察厅利用警察厅运营的微波无线电系统和向主要通信公司租赁的专用线路等,建设、维护和管理了警察厅自己的全国信息通信网。由于自然灾害的危机和恶意分子对秘密警察网络的威胁迫在眉睫,国家警察厅迫切面临着内部网络系统升级的压力。由于IT领域的显著进步,各种IT厂商积极提出并开发了更加安全、质量可靠的通信和高效的信息共享方法。通过利用最新技术,国家警察正在加强其整个网络。
{"title":"Fundamental upgrade of the internal network system within the National Police Agency of Japan","authors":"T. Yasuhira","doi":"10.1109/CCST.2009.5335558","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335558","url":null,"abstract":"The National Police Agency has contributed to the construction, maintenance, and management of its own nationwide info-communications network composed of a microwave radio system operated by the NPA, dedicated lines leased from major carriers and so on. Due to overhanging crises of natural disasters and threats posed by people of malicious intent to the confidential police network, the NPA is urgently exposed to the pressure to upgrade its internal network system. Thanks to the remarkable progress in the field of IT, more securely and qualitatively reliable communications and efficient methods for information sharing have been actively proposed and developed by various IT vendors. By taking advantage of the latest technologies, the NPA is under the way to strengthen the whole of its own network.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131243893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The integrated security system of the Senate of the Italian Republic 意大利共和国参议院的综合安全系统
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335556
Giovanni Contardi, F. Garzia, R. Cusani
The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.)
一个复杂场地的安全很大程度上依赖于综合技术系统的使用。集成系统的任何弱点都涉及到站点本身安全性的弱点。为此,有必要设计和实现高度集成、高效、可靠的安防系统。作者阐述了意大利共和国参议院综合安全系统的设计与实现工作。
{"title":"The integrated security system of the Senate of the Italian Republic","authors":"Giovanni Contardi, F. Garzia, R. Cusani","doi":"10.1109/CCST.2009.5335556","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335556","url":null,"abstract":"The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.)","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130497429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Security of generalized signature scheme based on discrete logarithms and factorization 基于离散对数和因子分解的广义签名方案的安全性
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335530
Chien-Lung Hsu, Yu-Hao Chuang, Wei-Hua He, So-Lin Yen, C. Tseng, Chia-Wen Chen
In 2005, Pon et al. proposed a generalized signature scheme based on the intractability of solving two well-known cryptographic assumptions, the factorization (FAC) and the discrete logarithm problem (DLP). They claimed that their scheme is still secure, provided that one of these two assumptions is solved. This paper, however, will show that Pon et al.'s scheme is insecure against the universal forgery attack if the adversary can solve the DLP.
2005年,Pon等人提出了一种广义签名方案,该方案基于求解两个众所周知的密码学假设——因子分解(FAC)和离散对数问题(DLP)的难解性。他们声称,只要这两个假设中的一个得到解决,他们的方案仍然是安全的。然而,本文将证明Pon等人的方案对于普遍伪造攻击是不安全的,如果对手能够解出DLP。
{"title":"Security of generalized signature scheme based on discrete logarithms and factorization","authors":"Chien-Lung Hsu, Yu-Hao Chuang, Wei-Hua He, So-Lin Yen, C. Tseng, Chia-Wen Chen","doi":"10.1109/CCST.2009.5335530","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335530","url":null,"abstract":"In 2005, Pon et al. proposed a generalized signature scheme based on the intractability of solving two well-known cryptographic assumptions, the factorization (FAC) and the discrete logarithm problem (DLP). They claimed that their scheme is still secure, provided that one of these two assumptions is solved. This paper, however, will show that Pon et al.'s scheme is insecure against the universal forgery attack if the adversary can solve the DLP.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133744917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using learning content management systems as highly adaptive and efficient supporting tool for (recurrent) training — an applied perspective 使用学习内容管理系统作为(经常性)培训的高适应性和高效的支持工具-应用视角
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335566
Hofer Franziska, Wetter Olive Emil, Graf Roland
The nature of the daily security business at airports (e.g. fast changing regulations) demands more and more flexible training and communication solutions for security officers at airports. Classical classroom training is a proven way for (re− training, but alternative tools, in particular e-solutions, could be taken into account more often to support the classical method of training.
机场日常保安业务的性质(例如法规的快速变化)要求机场保安人员有越来越灵活的培训和沟通解决方案。经典的课堂培训是一种经过验证的再培训方式,但可以更多地考虑其他工具,特别是电子解决方案,以支持经典的培训方法。
{"title":"Using learning content management systems as highly adaptive and efficient supporting tool for (recurrent) training — an applied perspective","authors":"Hofer Franziska, Wetter Olive Emil, Graf Roland","doi":"10.1109/CCST.2009.5335566","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335566","url":null,"abstract":"The nature of the daily security business at airports (e.g. fast changing regulations) demands more and more flexible training and communication solutions for security officers at airports. Classical classroom training is a proven way for (re− training, but alternative tools, in particular e-solutions, could be taken into account more often to support the classical method of training.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robustness against misuse - a new attribute of technical systems 抗误用的健壮性——技术系统的新属性
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335516
Z. Vintr, D. Valis
Operation of a number of technical systems is related to the danger of events' occurrence posing threat to human health and life, resulting in material damage or damage to the environment. Methods and procedures used for risk management take into consideration also a failure of a human factor as a possible cause of dangerous events' occurrence, but they do not give us opportunity to take into account a possible intention of man who can cause a dangerous event on purpose. In view of the terrorist threat we lack a coherent methodology which would enable us to influence system ability so that it could reduce its consequences or it could be protected against misuse by its design solution. This ability of a system is called robustness against misuse. The article presents fundamental approaches of new methodology which enable us to specify systems' robustness requirements, to describe and classify “weak” points of the systems, to analyze and assess robustness level, and to find and suggest effective ways of increasing the systems' robustness against misuse. The presented methodology is based on the assumption that similarly, as in case of dependability and safety, the assurance of system robustness should be also an object of systematic attention in all phases of the system life cycle, and that the system robustness against misuse is formed in a crucial manner mainly in the early phases of a life cycle (so called premanufacturing stages - conception, development, design).
一些技术系统的运行涉及到威胁人类健康和生命的事件发生的危险,造成物质损害或环境破坏。用于风险管理的方法和程序也考虑到人为因素的失败是危险事件发生的可能原因,但它们没有给我们机会考虑可能故意造成危险事件的人的意图。鉴于恐怖主义威胁,我们缺乏一种连贯的方法,使我们能够影响系统能力,从而减少其后果,或者通过其设计解决方案保护系统免受滥用。系统的这种能力被称为抗误用的健壮性。本文介绍了新方法的基本方法,使我们能够指定系统的鲁棒性需求,描述和分类系统的“弱点”,分析和评估鲁棒性水平,并发现和建议有效的方法来增加系统的鲁棒性,防止误用。所提出的方法是基于这样的假设:类似地,在可靠性和安全性的情况下,系统稳健性的保证也应该是系统生命周期的所有阶段系统关注的对象,并且系统抗误用的稳健性主要在生命周期的早期阶段(所谓的预制造阶段-概念,开发,设计)以关键的方式形成。
{"title":"Robustness against misuse - a new attribute of technical systems","authors":"Z. Vintr, D. Valis","doi":"10.1109/CCST.2009.5335516","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335516","url":null,"abstract":"Operation of a number of technical systems is related to the danger of events' occurrence posing threat to human health and life, resulting in material damage or damage to the environment. Methods and procedures used for risk management take into consideration also a failure of a human factor as a possible cause of dangerous events' occurrence, but they do not give us opportunity to take into account a possible intention of man who can cause a dangerous event on purpose. In view of the terrorist threat we lack a coherent methodology which would enable us to influence system ability so that it could reduce its consequences or it could be protected against misuse by its design solution. This ability of a system is called robustness against misuse. The article presents fundamental approaches of new methodology which enable us to specify systems' robustness requirements, to describe and classify “weak” points of the systems, to analyze and assess robustness level, and to find and suggest effective ways of increasing the systems' robustness against misuse. The presented methodology is based on the assumption that similarly, as in case of dependability and safety, the assurance of system robustness should be also an object of systematic attention in all phases of the system life cycle, and that the system robustness against misuse is formed in a crucial manner mainly in the early phases of a life cycle (so called premanufacturing stages - conception, development, design).","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114261560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis on compact data formats for the performance of handwritten signature biometrics 手写体签名生物识别性能的压缩数据格式分析
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335512
O. Miguel-Hurtado, L. Mengibar-Pozo, Inmaculada Tomeo-Reyes, J. Liu-Jimenez
This paper deals with the Signature Data Formats proposed by ISO 19794 project: 19794 part 7 Full Format and Compact Format (published in 2007) and the new 19794 part 11, which is under development. It will be shown how these formats handle the raw data coming from a Signature Input Device, and what the size of a Biometric Information Record is for each one. Another compression method, using LZ77 compression algorithm, is proposed and tested. The paper will also show the impact of using these compact formats on the performance of two different algorithms: Dynamic Time Warping and Gaussian Mixture Models. MCyT and SVC2004 signature databases have been used to carry out all tests.
本文讨论了由ISO 19794项目提出的签名数据格式:19794第7部分完整格式和压缩格式(2007年出版)以及正在开发中的新的19794第11部分。将展示这些格式如何处理来自签名输入设备的原始数据,以及每种格式的生物特征信息记录的大小。提出了采用LZ77压缩算法的另一种压缩方法,并进行了测试。本文还将展示使用这些压缩格式对两种不同算法性能的影响:动态时间翘曲和高斯混合模型。使用MCyT和SVC2004特征数据库进行所有测试。
{"title":"Analysis on compact data formats for the performance of handwritten signature biometrics","authors":"O. Miguel-Hurtado, L. Mengibar-Pozo, Inmaculada Tomeo-Reyes, J. Liu-Jimenez","doi":"10.1109/CCST.2009.5335512","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335512","url":null,"abstract":"This paper deals with the Signature Data Formats proposed by ISO 19794 project: 19794 part 7 Full Format and Compact Format (published in 2007) and the new 19794 part 11, which is under development. It will be shown how these formats handle the raw data coming from a Signature Input Device, and what the size of a Biometric Information Record is for each one. Another compression method, using LZ77 compression algorithm, is proposed and tested. The paper will also show the impact of using these compact formats on the performance of two different algorithms: Dynamic Time Warping and Gaussian Mixture Models. MCyT and SVC2004 signature databases have been used to carry out all tests.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
43rd Annual 2009 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1