首页 > 最新文献

14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)最新文献

英文 中文
CAFE - collaborative agents for filtering e-mails CAFE—过滤电子邮件的协作代理
Lorenzo Lazzari, M. Mari, A. Poggi
CAFE (collaborative agents for filtering e-mails) is a multiagent system to collaboratively filter spam from users' mail stream. CAFE associates a proxy agent with each user, and this agent represents a sort of interface between the user's e-mail client (i.e. Microsoft Outlook, Eudora, etc.) and the e-mail server. With the support of other types of agents, the proxy agent makes a classification of new messages into three categories: ham (good messages), spam and spam-presumed. The system analyzes every single e-mail using essentially three kinds of approach: a first approach based on the usage of a hash function, a static approach using DNSBL (DNS-based black lists) databases and a dynamic approach based on a Bayesian algorithm.
CAFE(过滤电子邮件的协作代理)是一个多代理系统,用于协作过滤用户邮件流中的垃圾邮件。CAFE为每个用户关联一个代理代理,这个代理代表用户的电子邮件客户端(例如Microsoft Outlook、Eudora等)和电子邮件服务器之间的某种接口。在其他类型代理的支持下,代理代理将新消息分为三类:ham(正常消息)、spam(垃圾邮件)和spam- suppose(垃圾邮件)。该系统基本上使用三种方法分析每一封电子邮件:第一种方法基于散列函数的使用,一种静态方法使用DNSBL(基于dns的黑名单)数据库,一种动态方法基于贝叶斯算法。
{"title":"CAFE - collaborative agents for filtering e-mails","authors":"Lorenzo Lazzari, M. Mari, A. Poggi","doi":"10.1109/WETICE.2005.23","DOIUrl":"https://doi.org/10.1109/WETICE.2005.23","url":null,"abstract":"CAFE (collaborative agents for filtering e-mails) is a multiagent system to collaboratively filter spam from users' mail stream. CAFE associates a proxy agent with each user, and this agent represents a sort of interface between the user's e-mail client (i.e. Microsoft Outlook, Eudora, etc.) and the e-mail server. With the support of other types of agents, the proxy agent makes a classification of new messages into three categories: ham (good messages), spam and spam-presumed. The system analyzes every single e-mail using essentially three kinds of approach: a first approach based on the usage of a hash function, a static approach using DNSBL (DNS-based black lists) databases and a dynamic approach based on a Bayesian algorithm.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An evaluation of Java application containers according to security requirements 根据安全需求对Java应用程序容器进行评估
Almut Herzog, N. Shahmehri
Web browsers, Web servers, Java application servers and OSGi frameworks are all instances of Java execution environments that tun more or less untrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java application containers. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java container. This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java containers for Java applications, applets, servlets, OSGi bundles, and Enterprise Java Beans. For comparison, the requirements are also examined for a C++ application.
Web浏览器、Web服务器、Java应用程序服务器和OSGi框架都是Java执行环境的实例,它们或多或少地运行不受信任的Java应用程序。在所有这些环境中,Java应用程序可以来自不同的来源。因此,应用程序开发人员很少知道目标Java执行环境中存在哪些其他应用程序。本文从安全性的角度研究了需要强加到这种容器上的需求,以及不同的Java应用程序容器是如何实现这些需求的。更具体地说,我们展示了考虑Java容器的资产、威胁和漏洞的一般风险分析。此风险分析暴露了一般的Java安全性问题,并导致了一组安全性需求。然后使用这些安全需求来评估用于Java应用程序、applet、servlet、OSGi包和Enterprise Java Beans的现有Java容器的安全体系结构。为了进行比较,还对c++应用程序的需求进行了检查。
{"title":"An evaluation of Java application containers according to security requirements","authors":"Almut Herzog, N. Shahmehri","doi":"10.1109/WETICE.2005.18","DOIUrl":"https://doi.org/10.1109/WETICE.2005.18","url":null,"abstract":"Web browsers, Web servers, Java application servers and OSGi frameworks are all instances of Java execution environments that tun more or less untrusted Java applications. In all these environments, Java applications can come from different sources. Consequently, application developers rarely know which other applications exist in the target Java execution environment. This paper investigates the requirements that need to be imposed on such a container from a security point of view and how the requirements have been implemented by different Java application containers. More specifically, we show a general risk analysis considering assets, threats and vulnerabilities of a Java container. This risk analysis exposes generic Java security problems and leads to a set of security requirements. These security requirements are then used to evaluate the security architecture of existing Java containers for Java applications, applets, servlets, OSGi bundles, and Enterprise Java Beans. For comparison, the requirements are also examined for a C++ application.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129726962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Application of lightweight formal methods to software security 轻量级形式化方法在软件安全中的应用
D. Gilliam, J. Powell, M. Bishop
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines several formal techniques can increase the confidence in the verification of software security properties. Such an approach which specifies security properties in a library that can be re-used by 2 instruments and their methodologies developed for the National Aeronautics and Space Administration (NASA) at the Jet Propulsion Laboratory (JPL) are described herein The flexible modeling framework (FMF) is a model based verification instrument that uses Promela and the SPIN model checker. The property based tester (PET) uses TASPEC and a test execution monitor (TEM). They are used to reduce vulnerabilities and unwanted exposures in software during the development and maintenance life cycles. These instruments are currently being piloted with a COTS server-agent application.
安全性的正式规范和验证已被证明是一项具有挑战性的任务。没有一种方法被证明是可行的。相反,结合几种正式技术的集成方法可以增加对软件安全属性验证的信心。本文描述了这样一种方法,该方法指定了库中的安全属性,该库可被2种仪器及其为美国国家航空航天局(NASA)在喷气推进实验室(JPL)开发的方法重用。灵活建模框架(FMF)是一种基于模型的验证仪器,使用Promela和SPIN模型检查器。基于属性的测试人员(PET)使用TASPEC和测试执行监视器(TEM)。它们用于减少软件在开发和维护生命周期中的漏洞和不必要的暴露。这些仪器目前正在使用COTS服务器代理应用程序进行试验。
{"title":"Application of lightweight formal methods to software security","authors":"D. Gilliam, J. Powell, M. Bishop","doi":"10.1109/WETICE.2005.19","DOIUrl":"https://doi.org/10.1109/WETICE.2005.19","url":null,"abstract":"Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines several formal techniques can increase the confidence in the verification of software security properties. Such an approach which specifies security properties in a library that can be re-used by 2 instruments and their methodologies developed for the National Aeronautics and Space Administration (NASA) at the Jet Propulsion Laboratory (JPL) are described herein The flexible modeling framework (FMF) is a model based verification instrument that uses Promela and the SPIN model checker. The property based tester (PET) uses TASPEC and a test execution monitor (TEM). They are used to reduce vulnerabilities and unwanted exposures in software during the development and maintenance life cycles. These instruments are currently being piloted with a COTS server-agent application.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124698164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
GridSPN: a grid-based non Markovian Petri nets tool GridSPN:一个基于网格的非马尔可夫Petri网工具
S. Distefano, A. Puliafito, M. Scarpa
This paper describes the new features implemented in WebSPN, a modeling tool for the analysis of non-Markovian stochastic Petri nets. WebSPN adopts a discretization of time and an approximation of non-exponentially distributed firing time transitions by means of the phase type distribution. To improve the MPICH parallel implementation of this algorithm, in this paper we describe the porting of WebSPN from the MPI to the grid computational paradigm. Besides a better flexibility in accessing computational and storage resources, one of the main advantages is the introduction of a fault recovery system to detect and recover from eventual machine faults. The resulting new tool is named GridSPN.
本文描述了WebSPN(一个用于分析非马尔可夫随机Petri网的建模工具)中实现的新特性。WebSPN采用时间离散化方法,通过相型分布近似非指数分布的发射时间跃移。为了改进该算法的MPICH并行实现,本文描述了将WebSPN从MPI移植到网格计算范式的过程。除了在访问计算和存储资源方面具有更好的灵活性外,主要优点之一是引入了故障恢复系统来检测和恢复最终的机器故障。生成的新工具名为GridSPN。
{"title":"GridSPN: a grid-based non Markovian Petri nets tool","authors":"S. Distefano, A. Puliafito, M. Scarpa","doi":"10.1109/WETICE.2005.39","DOIUrl":"https://doi.org/10.1109/WETICE.2005.39","url":null,"abstract":"This paper describes the new features implemented in WebSPN, a modeling tool for the analysis of non-Markovian stochastic Petri nets. WebSPN adopts a discretization of time and an approximation of non-exponentially distributed firing time transitions by means of the phase type distribution. To improve the MPICH parallel implementation of this algorithm, in this paper we describe the porting of WebSPN from the MPI to the grid computational paradigm. Besides a better flexibility in accessing computational and storage resources, one of the main advantages is the introduction of a fault recovery system to detect and recover from eventual machine faults. The resulting new tool is named GridSPN.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Role engineering of information system using extended RBAC model 基于扩展RBAC模型的信息系统角色工程
A. Poniszewska-Marańda
The role-based access control (RBAC) model is one of the policies used to access control in information systems for enterprises. The RBAC model is a powerful technology for managing and enforcing security in large-scale, enterprise-wide systems. Many implementations of this model, including the RBAC96 model, have been already proposed. This paper presents an extension of the standard RBAC model together with its implementation using the Unified Modeling Language (UML). The presented model is developed for the role engineering in the security of information system. In the paper, the union of the RBAC model, which controls access in the information system, and the UML language, i.e. a unified method of object analysis and design, is proposed. The presented approach of the RBAC model consists in role creation via defining appropriate permissions. The entire procedure is performed in two stages; first permissions assigned to a function are defined, and then definitions of functions assigned to a particular role are provided.
基于角色的访问控制(RBAC)模型是企业信息系统中用于访问控制的策略之一。RBAC模型是一种强大的技术,用于在大型企业范围的系统中管理和实施安全性。该模型的许多实现,包括RBAC96模型,已经被提出。本文提出了标准RBAC模型的扩展及其使用统一建模语言(UML)的实现。该模型是针对信息系统安全中的角色工程而开发的。本文提出了信息系统中控制访问的RBAC模型与UML语言的结合,即统一的对象分析和设计方法。RBAC模型提出的方法包括通过定义适当的权限来创建角色。整个过程分两个阶段进行;首先定义分配给功能的权限,然后提供分配给特定角色的功能的定义。
{"title":"Role engineering of information system using extended RBAC model","authors":"A. Poniszewska-Marańda","doi":"10.1109/WETICE.2005.50","DOIUrl":"https://doi.org/10.1109/WETICE.2005.50","url":null,"abstract":"The role-based access control (RBAC) model is one of the policies used to access control in information systems for enterprises. The RBAC model is a powerful technology for managing and enforcing security in large-scale, enterprise-wide systems. Many implementations of this model, including the RBAC96 model, have been already proposed. This paper presents an extension of the standard RBAC model together with its implementation using the Unified Modeling Language (UML). The presented model is developed for the role engineering in the security of information system. In the paper, the union of the RBAC model, which controls access in the information system, and the UML language, i.e. a unified method of object analysis and design, is proposed. The presented approach of the RBAC model consists in role creation via defining appropriate permissions. The entire procedure is performed in two stages; first permissions assigned to a function are defined, and then definitions of functions assigned to a particular role are provided.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Entropy based worm and anomaly detection in fast IP networks 基于熵的快速IP网络蠕虫和异常检测
A. Wagner, B. Plattner
Detecting massive network events like worm outbreaks in fast IP networks such as Internet backbones, is hard. One problem is that the amount of traffic data does not allow real-time analysis of details. Another problem is that the specific characteristics of these events are not known in advance. There is a need for analysis methods that are real-time capable and can handle large amounts of traffic data. We have developed an entropy-based approach that determines and reports entropy contents of traffic parameters such as IP addresses. Changes in the entropy content indicate a massive network event. We give analyses on two Internet worms as proof-of-concept. While our primary focus is detection of fast worms, our approach should also be able to detect other network events. We discuss implementation alternatives and give benchmark results. We also show that our approach scales very well.
在互联网主干等快速IP网络中检测蠕虫爆发等大规模网络事件是很困难的。一个问题是,大量的交通数据无法对细节进行实时分析。另一个问题是,这些事件的具体特征事先并不为人所知。我们需要能够实时处理大量交通数据的分析方法。我们已经开发了一种基于熵的方法来确定和报告流量参数(如IP地址)的熵内容。熵含量的变化表明发生了大规模的网络事件。我们给出了两个网络蠕虫的分析作为概念验证。虽然我们的主要重点是检测快速蠕虫,但我们的方法也应该能够检测其他网络事件。我们讨论了实现方案并给出了基准测试结果。我们还表明,我们的方法可扩展性非常好。
{"title":"Entropy based worm and anomaly detection in fast IP networks","authors":"A. Wagner, B. Plattner","doi":"10.1109/WETICE.2005.35","DOIUrl":"https://doi.org/10.1109/WETICE.2005.35","url":null,"abstract":"Detecting massive network events like worm outbreaks in fast IP networks such as Internet backbones, is hard. One problem is that the amount of traffic data does not allow real-time analysis of details. Another problem is that the specific characteristics of these events are not known in advance. There is a need for analysis methods that are real-time capable and can handle large amounts of traffic data. We have developed an entropy-based approach that determines and reports entropy contents of traffic parameters such as IP addresses. Changes in the entropy content indicate a massive network event. We give analyses on two Internet worms as proof-of-concept. While our primary focus is detection of fast worms, our approach should also be able to detect other network events. We discuss implementation alternatives and give benchmark results. We also show that our approach scales very well.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 284
A conceptual framework for understanding collaborative systems evaluation 理解协作系统评估的概念框架
Josie P. H. Huang
This paper presents a conceptual framework for the understanding of collaborative systems evaluation. Based on previous research, a conceptual framework for understanding collaborative system evaluation is introduced using the lifecycle based approach. This concept is supported through a follow up evaluation activity within the DIECoM project (Distributed Integrated Environment for Configuration Management), an EC Framework V project. Consequently, the issues are identified from the findings of the follow up as needing further investigation.
本文提出了一个理解协同系统评估的概念框架。在前人研究的基础上,采用基于生命周期的方法,提出了理解协同系统评估的概念框架。这个概念通过DIECoM项目(配置管理的分布式集成环境)中的后续评估活动得到支持,DIECoM项目是一个EC框架V项目。因此,从后续工作的调查结果中确定了需要进一步调查的问题。
{"title":"A conceptual framework for understanding collaborative systems evaluation","authors":"Josie P. H. Huang","doi":"10.1109/WETICE.2005.5","DOIUrl":"https://doi.org/10.1109/WETICE.2005.5","url":null,"abstract":"This paper presents a conceptual framework for the understanding of collaborative systems evaluation. Based on previous research, a conceptual framework for understanding collaborative system evaluation is introduced using the lifecycle based approach. This concept is supported through a follow up evaluation activity within the DIECoM project (Distributed Integrated Environment for Configuration Management), an EC Framework V project. Consequently, the issues are identified from the findings of the follow up as needing further investigation.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A strong user authentication protocol for GSM GSM的强用户认证协议
Özer Aydemir, A. Selçuk
Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings certain limitations and restrictions on the functionality of the system. In this paper, we propose a user authentication protocol for the global standards for mobile (GSM) which permits the use of weak secrets (e.g. passwords or PINs) for authentication, providing new flexibilities for the GSM users.
传统的蜂窝电话网络认证协议都是针对设备认证而非用户认证而设计的,这给系统的功能带来了一定的限制和制约。本文提出了一种允许使用弱秘密(如密码或pin)进行认证的GSM全球标准用户认证协议,为GSM用户提供了新的灵活性。
{"title":"A strong user authentication protocol for GSM","authors":"Özer Aydemir, A. Selçuk","doi":"10.1109/WETICE.2005.12","DOIUrl":"https://doi.org/10.1109/WETICE.2005.12","url":null,"abstract":"Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings certain limitations and restrictions on the functionality of the system. In this paper, we propose a user authentication protocol for the global standards for mobile (GSM) which permits the use of weak secrets (e.g. passwords or PINs) for authentication, providing new flexibilities for the GSM users.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Trust infrastructure for policy based messaging in open environments 开放环境中基于策略的消息传递的信任基础结构
Gansen Zhao, D. Chadwick
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed mechanism for secure messaging. The openness of computing environments challenges the PBM model due to the varying trust relations between the different systems and their different behaviour. This paper present a design of a trust infrastructure which is developed based on a public key infrastructure. The trust infrastructure publishes policy enforcement information about the messaging systems, and engenders trust through consistent and mandatory policy enforcement by the systems. It incorporates policy-based management mechanisms to provide flexible and customised messaging services. Secure messaging is achieved by defining security related policies and confining messaging systems' behaviour to defined security constraints. The process of PBM is also described, including publishing certificates, sending messages, accessing messages, and enforcing policies.
基于策略的消息传递(PBM)旨在携带带有消息的安全策略,这些策略将在接收方系统上执行,以提供安全特性。PBM促进了安全消息传递的分布式机制。计算环境的开放性对PBM模型提出了挑战,因为不同系统之间存在不同的信任关系和不同的行为。本文提出了一种基于公钥基础设施的信任基础设施的设计。信任基础结构发布关于消息传递系统的策略实施信息,并通过系统一致和强制的策略实施来产生信任。它结合了基于策略的管理机制,以提供灵活的定制消息传递服务。通过定义与安全相关的策略并将消息传递系统的行为限制在已定义的安全约束中,可以实现安全消息传递。还描述了PBM的过程,包括发布证书、发送消息、访问消息和执行策略。
{"title":"Trust infrastructure for policy based messaging in open environments","authors":"Gansen Zhao, D. Chadwick","doi":"10.1109/WETICE.2005.60","DOIUrl":"https://doi.org/10.1109/WETICE.2005.60","url":null,"abstract":"Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed mechanism for secure messaging. The openness of computing environments challenges the PBM model due to the varying trust relations between the different systems and their different behaviour. This paper present a design of a trust infrastructure which is developed based on a public key infrastructure. The trust infrastructure publishes policy enforcement information about the messaging systems, and engenders trust through consistent and mandatory policy enforcement by the systems. It incorporates policy-based management mechanisms to provide flexible and customised messaging services. Secure messaging is achieved by defining security related policies and confining messaging systems' behaviour to defined security constraints. The process of PBM is also described, including publishing certificates, sending messages, accessing messages, and enforcing policies.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132541812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
WETICE 2005 Tenth Securities Technologies (ST) Workshop Report (Formerly Enterprise Security (ES)) WETICE 2005第十届证券技术(ST)工作坊报告(原企业证券(ES))
D. Gilliam
The Securities Technologies (ST) Workshop was formerly called the Enterprise Security (ES) Workshop. The name was changed to reflect better a more comprehensive name to the topics being discussed which ranged beyond just security in and for the enterprise. The Workshop deals with topics that span multiple enterprises, including Peer to Peer (P2P), Grid Computing, security of large-scale backbones, software security, et al. Consequently, it was suggested that the Workshop consider a name change to more accurately reflect the topics of the papers it was receiving and delivering. Several names were considered and Security Technologies was selected. However, the name Enterprise Security has not been dropped as it was the name under which it was organized originally.
证券技术(ST)车间以前称为企业安全(ES)车间。更改了名称,以更好地反映正在讨论的主题的更全面的名称,其范围不仅仅是企业内部和企业的安全性。研讨会涉及多个企业的主题,包括点对点(P2P)、网格计算、大型骨干网络的安全、软件安全等。因此,有人建议讲习班考虑更改名称,以便更准确地反映它所收到和提供的文件的主题。考虑了几个名字后,安全技术公司被选中。但是,企业安全这个名称并没有被删除,因为它是最初组织时使用的名称。
{"title":"WETICE 2005 Tenth Securities Technologies (ST) Workshop Report (Formerly Enterprise Security (ES))","authors":"D. Gilliam","doi":"10.1109/WETICE.2005.68","DOIUrl":"https://doi.org/10.1109/WETICE.2005.68","url":null,"abstract":"The Securities Technologies (ST) Workshop was formerly called the Enterprise Security (ES) Workshop. The name was changed to reflect better a more comprehensive name to the topics being discussed which ranged beyond just security in and for the enterprise. The Workshop deals with topics that span multiple enterprises, including Peer to Peer (P2P), Grid Computing, security of large-scale backbones, software security, et al. Consequently, it was suggested that the Workshop consider a name change to more accurately reflect the topics of the papers it was receiving and delivering. Several names were considered and Security Technologies was selected. However, the name Enterprise Security has not been dropped as it was the name under which it was organized originally.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115530878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1