首页 > 最新文献

2010 Fourth International Conference on Network and System Security最新文献

英文 中文
Password Entropy and Password Quality 密码熵和密码质量
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.18
Wanli Ma, John Campbell, D. Tran, Dale Kleeman
Passwords are the first line of defense for many computerized systems. The quality of these passwords decides the security strength of these systems. Many studies advocate using password entropy as an indicator for password quality where lower entropy suggests a weaker or less secure password. However, a closer examination of this literature shows that password entropy is very loosely defined. In this paper, we first discuss the calculation of password entropy and explain why it is an inadequate indicator of password quality. We then establish a password quality assessment scheme: password quality indicator (PQI). The PQI of a password is a pair (D, L), where D is the Levenshtein's editing distance of the password in relation to a dictionary of words and common mnemonics, and L is the effective password length. Finally, we propose to use PQI to prescribe the characteristics of good quality passwords.
密码是许多计算机化系统的第一道防线。这些密码的质量决定了这些系统的安全强度。许多研究主张使用密码熵作为密码质量的指标,熵越低意味着密码越弱或不安全。然而,仔细研究这些文献就会发现,密码熵的定义非常松散。本文首先讨论了密码熵的计算,并解释了为什么它是一个不充分的密码质量指标。然后,我们建立了一个密码质量评价方案:密码质量指标(PQI)。密码的PQI为一对(D, L),其中D为密码相对于单词和常用助记符字典的Levenshtein编辑距离,L为有效密码长度。最后,我们建议使用PQI来规定高质量密码的特征。
{"title":"Password Entropy and Password Quality","authors":"Wanli Ma, John Campbell, D. Tran, Dale Kleeman","doi":"10.1109/NSS.2010.18","DOIUrl":"https://doi.org/10.1109/NSS.2010.18","url":null,"abstract":"Passwords are the first line of defense for many computerized systems. The quality of these passwords decides the security strength of these systems. Many studies advocate using password entropy as an indicator for password quality where lower entropy suggests a weaker or less secure password. However, a closer examination of this literature shows that password entropy is very loosely defined. In this paper, we first discuss the calculation of password entropy and explain why it is an inadequate indicator of password quality. We then establish a password quality assessment scheme: password quality indicator (PQI). The PQI of a password is a pair (D, L), where D is the Levenshtein's editing distance of the password in relation to a dictionary of words and common mnemonics, and L is the effective password length. Finally, we propose to use PQI to prescribe the characteristics of good quality passwords.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124106262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
The Mobile Phone as a Multi OTP Device Using Trusted Computing 手机作为基于可信计算的多联机设备
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.39
Mohammed Al Zomai, A. Jøsang
The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their abilityto manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on giving the user a hardware token that generates one-time-passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this paper, we propose a scalable OTP solution using mobile phones and based on trusted computing technology that combines enhanced usability with strong security.
在线服务数量的快速增长导致每个用户需要管理的不同数字身份越来越多。因此,许多人感到凭据负担过重,这反过来又对他们安全管理凭据的能力产生了负面影响。密码可能是当今最常用的凭证类型。为了避免记住困难密码的繁琐任务,用户通常使用低熵和弱密码来降低安全性。弱密码和不良的密码习惯是对在线服务的安全威胁。已经开发了一些解决方案来消除用户创建和管理密码的需要。一个典型的解决方案是基于给用户一个硬件令牌来生成一次性密码,即单个会话或事务使用的密码。不幸的是,这些解决方案中的大多数都不能满足可伸缩性和/或可用性需求,或者它们根本不安全。在本文中,我们提出了一种基于可信计算技术的可扩展的移动电话OTP解决方案,该方案结合了增强的可用性和强大的安全性。
{"title":"The Mobile Phone as a Multi OTP Device Using Trusted Computing","authors":"Mohammed Al Zomai, A. Jøsang","doi":"10.1109/NSS.2010.39","DOIUrl":"https://doi.org/10.1109/NSS.2010.39","url":null,"abstract":"The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their abilityto manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on giving the user a hardware token that generates one-time-passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this paper, we propose a scalable OTP solution using mobile phones and based on trusted computing technology that combines enhanced usability with strong security.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128482142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Forensic Analysis of DoS Attack Traffic in MANET MANET中DoS攻击流量的取证分析
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.48
Yinghua Guo, Ivan Lee
This paper investigates distributed denial of service attacks using non-address-spoofing flood (NASF) over mobile ad hoc networks (MANET). Detection features based on statistical analysis of IDS log files and flow rate information are proposed. Detection of NASF attack is evaluated using three metrics, including detection ratio, detection time and false detection rate. Thus, the proposed framework address important issues in forensic science to identify what and when does the attack occur. Different NASF attack patterns with different network throughput degradations are simulated and examined in this paper.
本文研究了在移动自组织网络(MANET)上使用非地址欺骗洪水(NASF)的分布式拒绝服务攻击。提出了基于IDS日志文件和流量信息统计分析的检测特征。采用检测率、检测时间和误检率三个指标对NASF攻击的检测进行评估。因此,拟议的框架解决了法医科学中的重要问题,以确定攻击发生的时间和内容。本文对具有不同网络吞吐量退化的不同的NASF攻击模式进行了仿真和检验。
{"title":"Forensic Analysis of DoS Attack Traffic in MANET","authors":"Yinghua Guo, Ivan Lee","doi":"10.1109/NSS.2010.48","DOIUrl":"https://doi.org/10.1109/NSS.2010.48","url":null,"abstract":"This paper investigates distributed denial of service attacks using non-address-spoofing flood (NASF) over mobile ad hoc networks (MANET). Detection features based on statistical analysis of IDS log files and flow rate information are proposed. Detection of NASF attack is evaluated using three metrics, including detection ratio, detection time and false detection rate. Thus, the proposed framework address important issues in forensic science to identify what and when does the attack occur. Different NASF attack patterns with different network throughput degradations are simulated and examined in this paper.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128191570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network 挖掘匿名流量:Tor匿名网络的深度分析
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.47
Chaabane Abdelberi, Pere Manils, M. Kâafar
Users' anonymity and privacy are among the major concerns of today's Internet. Anonymizing networks are then poised to become an important service to support anonymous-driven Internet communications and consequently enhance users' privacy protection. Indeed, Tor an example of anonymizing networks based on onion routing concept attracts more and more volunteers, and is now popular among dozens of thousands of Internet users. Surprisingly, very few researches shed light on such an anonymizing network. Beyond providing global statistics on the typical usage of Tor in the wild, we show that Tor is actually being is-used, as most of the observed traffic belongs to P2P applications. In particular, we quantify the BitTorrent traffic and show that the load of the latter on the Tor network is underestimated because of encrypted BitTorrent traffic (that can go unnoticed). Furthermore, this paper provides a deep analysis of both the HTTP and BitTorrent protocols giving a complete overview of their usage. We do not only report such usage in terms of traffic size and number of connections but also depict how users behave on top of Tor. We also show that Tor usage is now diverted from the onion routing concept and that Tor exit nodes are frequently used as 1-hop SOCKS proxies, through a so-called tunneling technique. We provide an efficient method allowing an exit node to detect such an abnormal usage. Finally, we report our experience in effectively crawling bridge nodes, supposedly revealed sparingly in Tor.
用户的匿名和隐私是当今互联网的主要关注点之一。匿名网络将成为一项重要的服务,以支持匿名驱动的互联网通信,从而增强用户的隐私保护。事实上,Tor——一个基于洋葱路由概念的匿名网络的例子——吸引了越来越多的志愿者,现在在成千上万的互联网用户中很受欢迎。令人惊讶的是,很少有研究揭示了这样一个匿名网络。除了提供Tor在野外典型使用情况的全球统计数据外,我们还表明Tor实际上正在被使用,因为大多数观察到的流量属于P2P应用程序。特别是,我们量化了BitTorrent流量,并表明后者在Tor网络上的负载被低估了,因为加密了BitTorrent流量(这可能会被忽视)。此外,本文还对HTTP和BitTorrent协议进行了深入的分析,对它们的使用进行了全面的概述。我们不仅在流量大小和连接数量方面报告了这种使用情况,而且还描述了用户在Tor之上的行为。我们还展示了Tor的使用现在从洋葱路由概念中转移出来,并且Tor出口节点经常被用作1跳SOCKS代理,通过所谓的隧道技术。我们提供了一种有效的方法,允许出口节点检测这种异常使用。最后,我们报告了我们在有效地爬行桥节点方面的经验,据说在Tor中很少显示。
{"title":"Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network","authors":"Chaabane Abdelberi, Pere Manils, M. Kâafar","doi":"10.1109/NSS.2010.47","DOIUrl":"https://doi.org/10.1109/NSS.2010.47","url":null,"abstract":"Users' anonymity and privacy are among the major concerns of today's Internet. Anonymizing networks are then poised to become an important service to support anonymous-driven Internet communications and consequently enhance users' privacy protection. Indeed, Tor an example of anonymizing networks based on onion routing concept attracts more and more volunteers, and is now popular among dozens of thousands of Internet users. Surprisingly, very few researches shed light on such an anonymizing network. Beyond providing global statistics on the typical usage of Tor in the wild, we show that Tor is actually being is-used, as most of the observed traffic belongs to P2P applications. In particular, we quantify the BitTorrent traffic and show that the load of the latter on the Tor network is underestimated because of encrypted BitTorrent traffic (that can go unnoticed). Furthermore, this paper provides a deep analysis of both the HTTP and BitTorrent protocols giving a complete overview of their usage. We do not only report such usage in terms of traffic size and number of connections but also depict how users behave on top of Tor. We also show that Tor usage is now diverted from the onion routing concept and that Tor exit nodes are frequently used as 1-hop SOCKS proxies, through a so-called tunneling technique. We provide an efficient method allowing an exit node to detect such an abnormal usage. Finally, we report our experience in effectively crawling bridge nodes, supposedly revealed sparingly in Tor.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132867124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features 基于残差特征多模态融合的数字视频篡改检测
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.8
G. Chetty, M. Biswas, Rashmi Singh
In this paper, we propose novel algorithmic models based on feature transformation in cross-modal subspace and their multimodal fusion for different types of residue features extracted from several intra-frame and inter frame pixel sub-blocks in video sequences for detecting digital video tampering or forgery. An evaluation of proposed residue features – the noise residue features and the quantization features, their transformation in cross-modal subspace, and their multimodal fusion, for emulated copy-move tamper scenario shows a significant improvement in tamper detection accuracy as compared to single mode features without transformation in cross-modal subspace.
本文提出了一种基于跨模态子空间特征变换及其多模态融合的新算法模型,用于检测视频序列中帧内和帧间像素子块中提取的不同类型残留特征。对模拟复制-移动篡改场景的残留特征——噪声残留特征和量化特征及其在跨模态子空间中的变换和多模态融合的评价表明,与未在跨模态子空间中进行变换的单模态特征相比,篡改检测精度有显著提高。
{"title":"Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features","authors":"G. Chetty, M. Biswas, Rashmi Singh","doi":"10.1109/NSS.2010.8","DOIUrl":"https://doi.org/10.1109/NSS.2010.8","url":null,"abstract":"In this paper, we propose novel algorithmic models based on feature transformation in cross-modal subspace and their multimodal fusion for different types of residue features extracted from several intra-frame and inter frame pixel sub-blocks in video sequences for detecting digital video tampering or forgery. An evaluation of proposed residue features – the noise residue features and the quantization features, their transformation in cross-modal subspace, and their multimodal fusion, for emulated copy-move tamper scenario shows a significant improvement in tamper detection accuracy as compared to single mode features without transformation in cross-modal subspace.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130800446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network 基于协作覆盖网络的洪水型DDoS攻击全局检测
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.68
Thaneswaran Velauthapillai, A. Harwood, S. Karunasekera
Flooding-based Distributed Denial of Service (DDoS) attacks present a serious threat to the stability of the Internet. Identifying the attacks rapidly and accurately is significant for the efficient operation of Internet applications and services. Recent observations in the U.S. indicate a significant increase of cyber attacks on U.S. military information systems in 2009. Current technologies are still unable to withstand large-scale DDoS attacks. Single point detection and response is a first step to defeat such distributed attacks. Distributed global defense systems, using a coordinated effort, go much further towards thwarting such attacks. In this paper, we propose a distributed defense infrastructure to detect DDoS attacks globally using a cooperative overlay network and a gossip-based information exchange protocol. Our NS2 based simulation results show that the proposed solution can detect attacks with a detection rate as high as 0.99 with false alarms below 0.01. This compares favorably against other widely known methods including change-point detection, TTL analysis and wavelet analysis.
基于洪水的分布式拒绝服务(DDoS)攻击对互联网的稳定造成了严重威胁。快速准确地识别这些攻击对于Internet应用程序和服务的高效运行具有重要意义。美国最近的观察表明,2009年针对美国军事信息系统的网络攻击显著增加。目前的技术还无法抵御大规模的DDoS攻击。单点检测和响应是挫败这种分布式攻击的第一步。分布式的全球防御系统,通过协同努力,在挫败此类攻击方面走得更远。在本文中,我们提出了一种分布式防御基础设施,利用协作覆盖网络和基于八卦的信息交换协议来检测全局DDoS攻击。我们基于NS2的仿真结果表明,该方案可以检测到高达0.99的攻击,而假警报低于0.01。这与其他众所周知的方法,包括变点检测,TTL分析和小波分析相比是有利的。
{"title":"Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network","authors":"Thaneswaran Velauthapillai, A. Harwood, S. Karunasekera","doi":"10.1109/NSS.2010.68","DOIUrl":"https://doi.org/10.1109/NSS.2010.68","url":null,"abstract":"Flooding-based Distributed Denial of Service (DDoS) attacks present a serious threat to the stability of the Internet. Identifying the attacks rapidly and accurately is significant for the efficient operation of Internet applications and services. Recent observations in the U.S. indicate a significant increase of cyber attacks on U.S. military information systems in 2009. Current technologies are still unable to withstand large-scale DDoS attacks. Single point detection and response is a first step to defeat such distributed attacks. Distributed global defense systems, using a coordinated effort, go much further towards thwarting such attacks. In this paper, we propose a distributed defense infrastructure to detect DDoS attacks globally using a cooperative overlay network and a gossip-based information exchange protocol. Our NS2 based simulation results show that the proposed solution can detect attacks with a detection rate as high as 0.99 with false alarms below 0.01. This compares favorably against other widely known methods including change-point detection, TTL analysis and wavelet analysis.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The PU-Tree: A Partition-Based Uncertain High-Dimensional Indexing Algorithm pu树:一种基于分区的不确定高维索引算法
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.60
Yi Zhuang
This paper proposes a partition-based uncertain high-dimensional indexing algorithm, called PU-Tree. In the PU-Tree, all (n)data objects are first grouped into some clusters by a k-Means clustering algorithm. Then each object’s corresponding uncertain sphere is partitioned into several slices in terms of the zero-distance. Finally a unified key of each data object is computed by adopting multi-attribute encoding scheme, which are inserted by a B+-tree. Thus, given a query object, its probabilistic range search in high-dimensional spaces is transformed into the search in the single dimensional space with the aid of the PU-Tree. Extensive performance studies are conducted to evaluate the effectiveness and efficiency of the proposed scheme.
提出了一种基于分区的不确定高维索引算法PU-Tree。在PU-Tree中,首先通过k-Means聚类算法将所有(n)个数据对象分组到一些簇中。然后根据零距离将每个目标对应的不确定球划分为若干块。最后采用多属性编码方案计算每个数据对象的统一密钥,并通过B+树插入密钥。这样,给定一个查询对象,借助PU-Tree将其在高维空间的概率范围搜索转化为在单维空间的概率范围搜索。我们进行了广泛的表现研究,以评估拟议计划的成效和效率。
{"title":"The PU-Tree: A Partition-Based Uncertain High-Dimensional Indexing Algorithm","authors":"Yi Zhuang","doi":"10.1109/NSS.2010.60","DOIUrl":"https://doi.org/10.1109/NSS.2010.60","url":null,"abstract":"This paper proposes a partition-based uncertain high-dimensional indexing algorithm, called PU-Tree. In the PU-Tree, all (n)data objects are first grouped into some clusters by a k-Means clustering algorithm. Then each object’s corresponding uncertain sphere is partitioned into several slices in terms of the zero-distance. Finally a unified key of each data object is computed by adopting multi-attribute encoding scheme, which are inserted by a B+-tree. Thus, given a query object, its probabilistic range search in high-dimensional spaces is transformed into the search in the single dimensional space with the aid of the PU-Tree. Extensive performance studies are conducted to evaluate the effectiveness and efficiency of the proposed scheme.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114328606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Purpose Based Access Control in XML Databases System 基于目的的XML数据库系统访问控制
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.28
Lili Sun, Hua Wang, Raj Jururajin, S. Sriprakash
With the growing importance of privacy in data access, much research has been done on the privacy protecting technology in recent years. Developing an access control model and related mechanisms to support a selective access data become important. The extensible markup language (XML) is rapidly emerging as the new standard language for semi-structured data representation and exchange on the Internet. And now more and more information is distributed in XML format. In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated with a given data elements in an XML document specifies the intended use of the data elements. An important issue addressed in this article is the granularity of data labeling for data elements in XML documents and tree databases with which purposes can be associated. We address this issue in XML databases and propose different labeling schemes for XML documents. We also propose an approach to represent purpose information to support access control based on purpose information. Our proposed solution relies on usage access control (UAC) models as well as the components which based on the notions of the purpose information used in subjects and objects. Finally, comparisons with related works are analysed.
随着隐私在数据访问中的重要性日益提高,近年来人们对隐私保护技术进行了大量的研究。开发访问控制模型和相关机制来支持选择性访问数据变得非常重要。可扩展标记语言(XML)正迅速成为Internet上半结构化数据表示和交换的新标准语言。现在越来越多的信息以XML格式发布。在本文中,我们提出了一种基于目的概念的保护隐私访问控制的综合方法。在我们的模型中,与XML文档中给定数据元素关联的目的信息指定了数据元素的预期用途。本文要解决的一个重要问题是XML文档和树数据库中数据元素的数据标记粒度。我们在XML数据库中解决了这个问题,并为XML文档提出了不同的标记方案。我们还提出了一种表示目的信息的方法,以支持基于目的信息的访问控制。我们提出的解决方案依赖于使用访问控制(UAC)模型以及基于主题和对象中使用的目的信息概念的组件。最后,与相关文献进行了比较分析。
{"title":"A Purpose Based Access Control in XML Databases System","authors":"Lili Sun, Hua Wang, Raj Jururajin, S. Sriprakash","doi":"10.1109/NSS.2010.28","DOIUrl":"https://doi.org/10.1109/NSS.2010.28","url":null,"abstract":"With the growing importance of privacy in data access, much research has been done on the privacy protecting technology in recent years. Developing an access control model and related mechanisms to support a selective access data become important. The extensible markup language (XML) is rapidly emerging as the new standard language for semi-structured data representation and exchange on the Internet. And now more and more information is distributed in XML format. In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated with a given data elements in an XML document specifies the intended use of the data elements. An important issue addressed in this article is the granularity of data labeling for data elements in XML documents and tree databases with which purposes can be associated. We address this issue in XML databases and propose different labeling schemes for XML documents. We also propose an approach to represent purpose information to support access control based on purpose information. Our proposed solution relies on usage access control (UAC) models as well as the components which based on the notions of the purpose information used in subjects and objects. Finally, comparisons with related works are analysed.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems 参与式传感系统中位置隐私和数据完整性折衷的新型匿名化技术
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.73
M. Murshed, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam
In participatory sensing system community people contribute information to be shared by everybody. However, none would be tolerant enough to contribute voluntarily if her privacy is not protected. This has evoked the idea of research in the area of preserving privacy in participatory sensing system. On the other hand, data integrity is desired imperatively to make the service trustworthy and user-friendly. In this paper, we have investigated the performance of a greedy algorithm and its randomized variant to achieve an acceptable tradeoff between these two orthogonal key parameters. We have also analyzed the ability of a third party adversary to decode privacy-sensitive data by eavesdropping. Our experimental results show that the proposed method is performing satisfactorily as an approach of balancing user privacy and data integrity.
在参与式传感系统社区中,人们贡献信息供大家共享。然而,如果她的隐私不受保护,没有人会宽容到自愿捐款。这引起了人们对参与式传感系统中隐私保护领域的研究。另一方面,为了使服务可信和用户友好,数据完整性是必需的。在本文中,我们研究了贪婪算法及其随机变体的性能,以实现这两个正交关键参数之间的可接受权衡。我们还分析了第三方对手通过窃听解码隐私敏感数据的能力。实验结果表明,作为一种平衡用户隐私和数据完整性的方法,该方法的性能令人满意。
{"title":"A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems","authors":"M. Murshed, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam","doi":"10.1109/NSS.2010.73","DOIUrl":"https://doi.org/10.1109/NSS.2010.73","url":null,"abstract":"In participatory sensing system community people contribute information to be shared by everybody. However, none would be tolerant enough to contribute voluntarily if her privacy is not protected. This has evoked the idea of research in the area of preserving privacy in participatory sensing system. On the other hand, data integrity is desired imperatively to make the service trustworthy and user-friendly. In this paper, we have investigated the performance of a greedy algorithm and its randomized variant to achieve an acceptable tradeoff between these two orthogonal key parameters. We have also analyzed the ability of a third party adversary to decode privacy-sensitive data by eavesdropping. Our experimental results show that the proposed method is performing satisfactorily as an approach of balancing user privacy and data integrity.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123713946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Business Process-Based Information Security Risk Assessment 基于业务流程的信息安全风险评估
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.37
Kobra Khanmohammadi, S. Houmb
Limited information security budget in organizations make it necessary to effectively prioritize among security requirements. The goal is to make the most out of the available budget and to achieve a balanced overall security level. This leads to maximize the investment outcome. Many existing information security risk assessment approaches identify and assess risks to critical assets and are asset-driven approaches. These are limited in that it is hard to keep track of dependencies between assets and to produce realistic estimates of their values to an organization. We present a new security risk assessment approach focusing on business goals rather than assets and the processes supporting or contributing to these goals. Risks are identified and evaluated on a business process level and aggregated over all such processes depending on their criticality, role and importance for the organization as a whole. We illustrate our approach using examples from the banking industry, as well as discuss how our approach deals with some of the ambiguities involved in expert intensive and asset-driven information security risk assessment.
组织中有限的信息安全预算使得有必要对安全需求进行有效的优先排序。目标是最大限度地利用可用的预算,并实现平衡的整体安全级别。这将导致投资结果最大化。许多现有的信息安全风险评估方法识别和评估关键资产的风险,并且是资产驱动的方法。它们的局限性在于,很难跟踪资产之间的依赖关系,也很难对它们对组织的价值做出现实的估计。我们提出了一种新的安全风险评估方法,侧重于业务目标,而不是资产和支持或促成这些目标的过程。在业务流程级别上识别和评估风险,并根据其对整个组织的临界性、角色和重要性在所有此类流程上进行汇总。我们使用来自银行业的示例来说明我们的方法,并讨论我们的方法如何处理专家密集型和资产驱动的信息安全风险评估中涉及的一些模糊性。
{"title":"Business Process-Based Information Security Risk Assessment","authors":"Kobra Khanmohammadi, S. Houmb","doi":"10.1109/NSS.2010.37","DOIUrl":"https://doi.org/10.1109/NSS.2010.37","url":null,"abstract":"Limited information security budget in organizations make it necessary to effectively prioritize among security requirements. The goal is to make the most out of the available budget and to achieve a balanced overall security level. This leads to maximize the investment outcome. Many existing information security risk assessment approaches identify and assess risks to critical assets and are asset-driven approaches. These are limited in that it is hard to keep track of dependencies between assets and to produce realistic estimates of their values to an organization. We present a new security risk assessment approach focusing on business goals rather than assets and the processes supporting or contributing to these goals. Risks are identified and evaluated on a business process level and aggregated over all such processes depending on their criticality, role and importance for the organization as a whole. We illustrate our approach using examples from the banking industry, as well as discuss how our approach deals with some of the ambiguities involved in expert intensive and asset-driven information security risk assessment.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
2010 Fourth International Conference on Network and System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1