首页 > 最新文献

2010 Fourth International Conference on Network and System Security最新文献

英文 中文
Validating Denial of Service Vulnerabilities in Web Services 验证Web服务中的拒绝服务漏洞
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.41
S. Suriadi, A. Clark, D. Schmidt
The loosely-coupled and dynamic nature of web services architectures has many benefits, but also leads to an increased vulnerability to denial of service attacks. While many papers have surveyed and described these vulnerabilities, they are often theoretical and lack experimental data to validate them, and assume an obsolete state of web services technologies. This paper describes experiments involving several denial of service vulnerabilities in well-known web services platforms, including Java Metro, Apache Axis, and Microsoft.NET. The results both confirm and deny the presence of some of the most well-known vulnerabilities in web services technologies. Specifically, major web services platforms appear to cope well with attacks that target memory exhaustion. However, attacks targeting CPU-time exhaustion are still effective, regardless of the victim’s platform.
web服务体系结构的松耦合和动态特性有很多好处,但也增加了对拒绝服务攻击的脆弱性。虽然许多论文已经调查和描述了这些漏洞,但它们通常是理论的,缺乏实验数据来验证它们,并且假设web服务技术的过时状态。本文描述了在知名web服务平台(包括Java Metro、Apache Axis和microt.net)中涉及几个拒绝服务漏洞的实验。结果既证实又否认了web服务技术中一些最著名的漏洞的存在。具体来说,主要的web服务平台似乎能够很好地应对以内存耗尽为目标的攻击。然而,针对cpu时间耗尽的攻击仍然是有效的,无论受害者的平台是什么。
{"title":"Validating Denial of Service Vulnerabilities in Web Services","authors":"S. Suriadi, A. Clark, D. Schmidt","doi":"10.1109/NSS.2010.41","DOIUrl":"https://doi.org/10.1109/NSS.2010.41","url":null,"abstract":"The loosely-coupled and dynamic nature of web services architectures has many benefits, but also leads to an increased vulnerability to denial of service attacks. While many papers have surveyed and described these vulnerabilities, they are often theoretical and lack experimental data to validate them, and assume an obsolete state of web services technologies. This paper describes experiments involving several denial of service vulnerabilities in well-known web services platforms, including Java Metro, Apache Axis, and Microsoft.NET. The results both confirm and deny the presence of some of the most well-known vulnerabilities in web services technologies. Specifically, major web services platforms appear to cope well with attacks that target memory exhaustion. However, attacks targeting CPU-time exhaustion are still effective, regardless of the victim’s platform.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Towards Identify Anonymization in Large Survey Rating Data 大型调查评级数据的识别匿名化研究
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.11
Xiaoxun Sun, Hua Wang
We study the challenge of identity protection in the large public survey rating data. Even though the survey participants do not reveal any of their ratings, their survey records are potentially identifiable by using information from other public sources. None of the existing anonymisation principles (e.g., $k$-anonymity, $l$-diversity, etc.) can effectively prevent such breaches in large survey rating data sets. In this paper, we tackle the problem by defining the $ (k, epsilon)$-anonymity principle. The principle requires for each transaction $t$ in the given survey rating data $T$, at least $ (k-1)$ other transactions in $T$ must have ratings similar with $t$, where the similarity is controlled by $epsilon$. We propose a greedy approach to anonymize survey rating data and apply the method to two real-life data sets to demonstrate their efficiency and practical utility.
研究了大型民意调查评级数据中身份保护的挑战。即使调查参与者没有透露他们的任何评级,他们的调查记录也有可能通过使用其他公共来源的信息来识别。现有的匿名原则(例如,$k$-匿名,$l$-多样性等)都不能有效防止大型调查评级数据集中的此类违规行为。在本文中,我们通过定义$ (k, epsilon)$-匿名原则来解决这个问题。该原则要求对于给定调查评级数据$t$中的每笔交易$t$, $t$中至少$ (k-1)$其他交易必须具有与$t$相似的评级,其中相似性由$epsilon$控制。我们提出了一种贪婪的方法来匿名化调查评级数据,并将该方法应用于两个现实生活中的数据集,以证明其效率和实用性。
{"title":"Towards Identify Anonymization in Large Survey Rating Data","authors":"Xiaoxun Sun, Hua Wang","doi":"10.1109/NSS.2010.11","DOIUrl":"https://doi.org/10.1109/NSS.2010.11","url":null,"abstract":"We study the challenge of identity protection in the large public survey rating data. Even though the survey participants do not reveal any of their ratings, their survey records are potentially identifiable by using information from other public sources. None of the existing anonymisation principles (e.g., $k$-anonymity, $l$-diversity, etc.) can effectively prevent such breaches in large survey rating data sets. In this paper, we tackle the problem by defining the $ (k, epsilon)$-anonymity principle. The principle requires for each transaction $t$ in the given survey rating data $T$, at least $ (k-1)$ other transactions in $T$ must have ratings similar with $t$, where the similarity is controlled by $epsilon$. We propose a greedy approach to anonymize survey rating data and apply the method to two real-life data sets to demonstrate their efficiency and practical utility.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128346911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Families of 2D & 3D Arrays for Sub-image Watermarking 用于子图像水印的新的二维和三维阵列族
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.64
O. Moreno, A. Tirkel, R. V. Schyndel, P. Udaya
This paper presents new families of two and three-dimensional arrays designed for watermarking. The array construction is algebraic, based on finite fields. The arrays have good auto and cross-correlation with other family members. The family size is large enough to be used in watermarking at the point of origin, providing a unique watermark for every video and image. Such watermarks have applications in surveillance, sub-image object tracking and as fingerprints for proof of tampering, audit trail monitoring and traitor tracing.
本文提出了新的用于水印的二维和三维阵列。数组的构造是基于有限域的代数构造。该阵列与其他家族成员具有良好的自相关和相互关系。家族大小足够大,可以用于原点的水印,为每个视频和图像提供独特的水印。这些水印在监控、子图像对象跟踪、篡改证据指纹、审计跟踪监控、叛逆者追踪等方面都有应用。
{"title":"New Families of 2D & 3D Arrays for Sub-image Watermarking","authors":"O. Moreno, A. Tirkel, R. V. Schyndel, P. Udaya","doi":"10.1109/NSS.2010.64","DOIUrl":"https://doi.org/10.1109/NSS.2010.64","url":null,"abstract":"This paper presents new families of two and three-dimensional arrays designed for watermarking. The array construction is algebraic, based on finite fields. The arrays have good auto and cross-correlation with other family members. The family size is large enough to be used in watermarking at the point of origin, providing a unique watermark for every video and image. Such watermarks have applications in surveillance, sub-image object tracking and as fingerprints for proof of tampering, audit trail monitoring and traitor tracing.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spatio-temporal Knowledge Discovery in Very Large METOC Data Sets 超大METOC数据集中的时空知识发现
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.61
D. Marks, Elias Ioup, J. Sample, M. Abdelguerfi, Fady Qaddoura
A system allowing for the efficient processing and viewing of dense METOC data sets stored in Network Common Data Format (netted) files is developed using advanced bitmap indexing. A method for netted data extraction and bitmap index creation is presented. Efficient geospatial range and pseudo-KNN queries are implemented. A two step filtering algorithm is shown to greatly enhance the speed of these geospatial queries, allowing for extremely efficient processing of the netted data.
使用先进的位图索引,开发了一个系统,允许有效地处理和查看存储在网络通用数据格式(netted)文件中的密集METOC数据集。提出了一种网状数据提取和位图索引创建的方法。实现了高效的地理空间范围和伪knn查询。一种两步过滤算法极大地提高了这些地理空间查询的速度,允许对网状数据进行极其有效的处理。
{"title":"Spatio-temporal Knowledge Discovery in Very Large METOC Data Sets","authors":"D. Marks, Elias Ioup, J. Sample, M. Abdelguerfi, Fady Qaddoura","doi":"10.1109/NSS.2010.61","DOIUrl":"https://doi.org/10.1109/NSS.2010.61","url":null,"abstract":"A system allowing for the efficient processing and viewing of dense METOC data sets stored in Network Common Data Format (netted) files is developed using advanced bitmap indexing. A method for netted data extraction and bitmap index creation is presented. Efficient geospatial range and pseudo-KNN queries are implemented. A two step filtering algorithm is shown to greatly enhance the speed of these geospatial queries, allowing for extremely efficient processing of the netted data.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128244638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding 一种误差最小的多比特自适应数据隐藏算法
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.57
Rong-Jian Chen, Yu-Cheng Peng, J. Lin, Jui-Lin Lai, S. Horng
This paper presents the novel multi-bit bitwise adaptive embedding algorithms for data hiding. These embedding algorithms can embed multi-bit (k-bit, k>=1 ) secret data into cover data only introduce minimum embedding error smaller than (2^(k-1)-1)*2^(i-k) according to the embedding location i. To achieve such a goal, the proposed embedding algorithm adaptively evaluates the most similar value to replace the original one and which can be divided into three steps: (1) embed logo data into cover data, (2) adaptively adjust the least-significant bits (LSBs) of cover data, and (3) adaptively adjust the maximum-significant bits (MSBs) of cover data. The proposed embedding algorithms are not only achieving minimum error but also suitable to hardware implementation due to it is based on logic, algebraic, and bit operations. Many simulations show that the proposed embedding algorithms perform good embedding quality for watermarking and steganography applications.
提出了一种新的多比特自适应数据隐藏嵌入算法。这些嵌入算法可以将多比特(k-bit, k>=1)的秘密数据嵌入到覆盖数据中,只需要根据嵌入位置i引入小于(2^(k-1)-1)*2^(i-k)的最小嵌入误差。为了实现这一目标,本文提出的嵌入算法自适应地评估最相似的值来替换原始值,该算法分为三个步骤:(1)将logo数据嵌入到封面数据中,(2)自适应调整封面数据的最低有效位(LSBs),(3)自适应调整封面数据的最高有效位(MSBs)。所提出的嵌入算法基于逻辑、代数和位运算,不仅实现了最小的误差,而且适合硬件实现。仿真结果表明,所提出的嵌入算法在水印和隐写应用中具有良好的嵌入质量。
{"title":"Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding","authors":"Rong-Jian Chen, Yu-Cheng Peng, J. Lin, Jui-Lin Lai, S. Horng","doi":"10.1109/NSS.2010.57","DOIUrl":"https://doi.org/10.1109/NSS.2010.57","url":null,"abstract":"This paper presents the novel multi-bit bitwise adaptive embedding algorithms for data hiding. These embedding algorithms can embed multi-bit (k-bit, k>=1 ) secret data into cover data only introduce minimum embedding error smaller than (2^(k-1)-1)*2^(i-k) according to the embedding location i. To achieve such a goal, the proposed embedding algorithm adaptively evaluates the most similar value to replace the original one and which can be divided into three steps: (1) embed logo data into cover data, (2) adaptively adjust the least-significant bits (LSBs) of cover data, and (3) adaptively adjust the maximum-significant bits (MSBs) of cover data. The proposed embedding algorithms are not only achieving minimum error but also suitable to hardware implementation due to it is based on logic, algebraic, and bit operations. Many simulations show that the proposed embedding algorithms perform good embedding quality for watermarking and steganography applications.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure 实时自适应法医健全安全关键基础设施的设计
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.38
R. Hunt, J. Slay
Network security design has seen significant advances in recent years. This has been demonstrated by a growing number of new encryption algorithms, more intelligent firewall and intrusion detection techniques, new developments in multifactor authentication, advances in malware protection and many more. During a similar period of time the industry has seen the need for network infrastructure which provides a greater degree of trust which has resulted in the development of forensic analysis tools which meet the requirements of law enforcement agencies. Such tools must provide for commercial intelligence and national security. This paper proposes that application of the common ground between security and forensics has great potential to provide for improvements in the effort to achieve real-time adaptive security. This implies an architecture which can detect security breaches and in real-time record and analyse traffic logs in a forensically sound manner, provide corrective feedback to security devices and attempt to trace back to the source of the attack. In addressing computer security and forensic analysis from a real-time perspective, this paper recognises that some of these processes already exist, but proposes methods whereby the ongoing damage and potential risk to critical infrastructure can be reduced. This requires the implementation of a highly integrated approach to security and forensics such that they can inter-work in real-time in order to address the significant security issues which currently face the industry.
近年来,网络安全设计取得了重大进展。越来越多的新加密算法、更智能的防火墙和入侵检测技术、多因素身份验证的新发展、恶意软件保护的进步等等都证明了这一点。在类似的时期,该行业已经看到需要提供更大程度的信任的网络基础设施,这导致了满足执法机构要求的法医分析工具的开发。这些工具必须为商业情报和国家安全服务。本文提出,将安全和取证之间的共同点应用于实现实时自适应安全的努力中,具有很大的潜力。这意味着一个架构可以检测安全漏洞,实时记录和分析流量日志,以一种法医合理的方式,向安全设备提供纠正反馈,并试图追溯到攻击的来源。在从实时角度解决计算机安全和取证分析时,本文认识到其中一些过程已经存在,但提出了可以减少关键基础设施持续损害和潜在风险的方法。这就需要实现高度集成的安全和取证方法,以便它们能够实时交互,以解决当前行业面临的重大安全问题。
{"title":"The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure","authors":"R. Hunt, J. Slay","doi":"10.1109/NSS.2010.38","DOIUrl":"https://doi.org/10.1109/NSS.2010.38","url":null,"abstract":"Network security design has seen significant advances in recent years. This has been demonstrated by a growing number of new encryption algorithms, more intelligent firewall and intrusion detection techniques, new developments in multifactor authentication, advances in malware protection and many more. During a similar period of time the industry has seen the need for network infrastructure which provides a greater degree of trust which has resulted in the development of forensic analysis tools which meet the requirements of law enforcement agencies. Such tools must provide for commercial intelligence and national security. This paper proposes that application of the common ground between security and forensics has great potential to provide for improvements in the effort to achieve real-time adaptive security. This implies an architecture which can detect security breaches and in real-time record and analyse traffic logs in a forensically sound manner, provide corrective feedback to security devices and attempt to trace back to the source of the attack. In addressing computer security and forensic analysis from a real-time perspective, this paper recognises that some of these processes already exist, but proposes methods whereby the ongoing damage and potential risk to critical infrastructure can be reduced. This requires the implementation of a highly integrated approach to security and forensics such that they can inter-work in real-time in order to address the significant security issues which currently face the industry.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134024700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Improved PageRank Algorithm: Immune to Spam 一种改进的PageRank算法:对垃圾邮件免疫
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.12
B. Pu, Tingzhu Huang, Chun Wen
As Google claims on its webpage, PageRank$^{{rm TM}}$ is the heart of software and continues to provide the basis for all of web search tools. In this algorithm, one page's PageRank value is divided evenly among all its outlinks. This paper discusses the value not-even distributed question, and puts forward an improved PageRank algorithm. By illustrating examples, we verify the effectiveness of our new algorithm and especially immunity to electronic spam.
正如谷歌在其网页上所宣称的,PageRank$^{{rm TM}}$是软件的核心,并继续为所有网络搜索工具提供基础。在这个算法中,一个页面的PageRank值在所有的外链中平均分配。本文讨论了值不均匀分布问题,提出了一种改进的PageRank算法。通过实例验证了新算法的有效性,特别是对电子垃圾邮件的免疫能力。
{"title":"An Improved PageRank Algorithm: Immune to Spam","authors":"B. Pu, Tingzhu Huang, Chun Wen","doi":"10.1109/NSS.2010.12","DOIUrl":"https://doi.org/10.1109/NSS.2010.12","url":null,"abstract":"As Google claims on its webpage, PageRank$^{{rm TM}}$ is the heart of software and continues to provide the basis for all of web search tools. In this algorithm, one page's PageRank value is divided evenly among all its outlinks. This paper discusses the value not-even distributed question, and puts forward an improved PageRank algorithm. By illustrating examples, we verify the effectiveness of our new algorithm and especially immunity to electronic spam.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123482779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Trust-Involved Access Control in Collaborative Open Social Networks 基于信任的协作开放社会网络访问控制
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.13
Hua Wang, Lili Sun
This paper proposes a trust involved management framework for supporting privacy preserving access control policies and mechanisms. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is an access control model that provides full support for expressing highly complex privacy related policies, taking into account features like purposes and obligations. A policy refers to an access right that a subject can have on an object, based on relationship, trust, purpose and obligations. The structure of purpose involved access control policy is studied. Finally a discussion of our work in comparison with other access control and frameworks such as EPAL is discussed.
本文提出了一个涉及信任的管理框架,用于支持保护隐私的访问控制策略和机制。该机制对包含个人可识别信息的数据实施访问策略。该框架的关键组件是访问控制模型,该模型充分支持表达高度复杂的隐私相关策略,同时考虑到目的和义务等特性。策略是指主体基于关系、信任、目的和义务对客体所具有的访问权。研究了目标访问控制策略的结构。最后讨论了我们的工作与其他访问控制和框架(如EPAL)的比较。
{"title":"Trust-Involved Access Control in Collaborative Open Social Networks","authors":"Hua Wang, Lili Sun","doi":"10.1109/NSS.2010.13","DOIUrl":"https://doi.org/10.1109/NSS.2010.13","url":null,"abstract":"This paper proposes a trust involved management framework for supporting privacy preserving access control policies and mechanisms. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is an access control model that provides full support for expressing highly complex privacy related policies, taking into account features like purposes and obligations. A policy refers to an access right that a subject can have on an object, based on relationship, trust, purpose and obligations. The structure of purpose involved access control policy is studied. Finally a discussion of our work in comparison with other access control and frameworks such as EPAL is discussed.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121162878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns 一种基于流量元数据模式挖掘的移动自组网密钥分发方案
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.83
Ahmad Jabas, Wael Abdulal, Ramachandram Sirandas
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains how to set up secure sessions among nodes with low communication overhead and simple re-keying.
移动自组织网络(MANET)是一组独立的无线移动节点,可以动态部署。本文通过挖掘网络层的流量,提取元数据模式,并将其作为令牌在应用层中使用,解决了MANET中密钥分配的关键问题。介绍了一种简单、容错和可伸缩的方法,不需要任何先决条件。它解释了如何通过低通信开销和简单的重键在节点之间建立安全会话。
{"title":"An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns","authors":"Ahmad Jabas, Wael Abdulal, Ramachandram Sirandas","doi":"10.1109/NSS.2010.83","DOIUrl":"https://doi.org/10.1109/NSS.2010.83","url":null,"abstract":"Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains how to set up secure sessions among nodes with low communication overhead and simple re-keying.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122578611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
vESP: A Video-Enabled Enterprise Search Platform vESP:支持视频的企业搜索平台
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.9
P. Halvorsen, Dag Johansen, B. Olstad, T. Kupka, Sverre Tennøe
In this paper, we present how to provide a novel and potentially disruptive multimedia service by modifying a widely deployed commercial enterprise search engine. The idea is to transparently integrate rich multimedia data with traditional textual-oriented query results. This includes that the search engine automatically discovers and extracts relevant scenes from a large knowledge repository of existing videos and produces a new, customized video of events matching the user query. To evaluate our prototype, we have performed experiments using a data set from a knowledge repository in Microsoft consisting of PowerPoint presentations with corresponding videos. Our initial results demonstrate that such integration can be implemented efficiently, and that potential users prefer to have the opportunity to enrich the search results with corresponding video.
在本文中,我们介绍了如何通过修改广泛部署的商业企业搜索引擎来提供一种新颖且具有潜在破坏性的多媒体服务。其思想是透明地将丰富的多媒体数据与传统的面向文本的查询结果集成在一起。这包括搜索引擎自动从现有视频的大型知识库中发现和提取相关场景,并生成与用户查询匹配的事件的新定制视频。为了评估我们的原型,我们使用来自Microsoft知识库的数据集进行了实验,这些数据集由带有相应视频的PowerPoint演示文稿组成。我们的初步结果表明,这种集成可以有效地实现,并且潜在用户更愿意有机会用相应的视频来丰富搜索结果。
{"title":"vESP: A Video-Enabled Enterprise Search Platform","authors":"P. Halvorsen, Dag Johansen, B. Olstad, T. Kupka, Sverre Tennøe","doi":"10.1109/NSS.2010.9","DOIUrl":"https://doi.org/10.1109/NSS.2010.9","url":null,"abstract":"In this paper, we present how to provide a novel and potentially disruptive multimedia service by modifying a widely deployed commercial enterprise search engine. The idea is to transparently integrate rich multimedia data with traditional textual-oriented query results. This includes that the search engine automatically discovers and extracts relevant scenes from a large knowledge repository of existing videos and produces a new, customized video of events matching the user query. To evaluate our prototype, we have performed experiments using a data set from a knowledge repository in Microsoft consisting of PowerPoint presentations with corresponding videos. Our initial results demonstrate that such integration can be implemented efficiently, and that potential users prefer to have the opportunity to enrich the search results with corresponding video.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124498812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2010 Fourth International Conference on Network and System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1