At Eurocrypt 2004, the concept of concurrent signatures was introduced by Chen, Kudla and Paterson. Concurrent signatures contribute a novel approach for the traditional problem of fair exchange of signatures. In this paper a general attack named the message substitute attack to the existing concurrent signatures protocol is proposed. Under the message substitute attack there is no concurrent in the existing concurrent signatures protocols including perfect concurrent signatures (PCS) protocol proposed by Susilo et al and its improvement iPCS1 protocol proposed by Guilin Wang et al. To prevent the message substitute attack, an i2PCS1 protocol which is an improvement on iPCS1 protocol is proposed. Further more an i3PCS1 protocol which is another improvement on iPCS1 protocol is proposed, the distinct advantage of i3PCS1 protocol is that its keystones are not published by the initial signer Alice finally but by the matching signer Bob, so that the matching signer Bob has some advantage over the initial signer Alice, while in almost all previous concurrent signatures protocols the initial signer Alice has some advantage. So the i3PCS1 Protocol differs from the previous concurrent signatures protocols.
{"title":"Message Substitute Attack on Concurrent Signatures Protocol and its Improvement","authors":"Yaling Zhang, Xiaofeng Wang","doi":"10.1109/ISECS.2008.214","DOIUrl":"https://doi.org/10.1109/ISECS.2008.214","url":null,"abstract":"At Eurocrypt 2004, the concept of concurrent signatures was introduced by Chen, Kudla and Paterson. Concurrent signatures contribute a novel approach for the traditional problem of fair exchange of signatures. In this paper a general attack named the message substitute attack to the existing concurrent signatures protocol is proposed. Under the message substitute attack there is no concurrent in the existing concurrent signatures protocols including perfect concurrent signatures (PCS) protocol proposed by Susilo et al and its improvement iPCS1 protocol proposed by Guilin Wang et al. To prevent the message substitute attack, an i2PCS1 protocol which is an improvement on iPCS1 protocol is proposed. Further more an i3PCS1 protocol which is another improvement on iPCS1 protocol is proposed, the distinct advantage of i3PCS1 protocol is that its keystones are not published by the initial signer Alice finally but by the matching signer Bob, so that the matching signer Bob has some advantage over the initial signer Alice, while in almost all previous concurrent signatures protocols the initial signer Alice has some advantage. So the i3PCS1 Protocol differs from the previous concurrent signatures protocols.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128506598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the fast development of the technology in Database and Internet, excessive information has become a problem that decision makers engage in electronic commerce have to affront. This paper firstly establishes the decision table for excessive data, then reduces knowledge of the decision table, and obtains the best rules. This can reduce the redundancy of the data, and improve the efficiency of knowledge obtaining. Because of the high time complexity and spatial complexity the general algorithm has, this paper proposed a new algorithm based on analogical matrix, and carried out the algorithm. The practice proves that the algorithm can improve the efficiency of knowledge obtaining, and the rules is tidy and best.
{"title":"The Algorithm of Obtaining Best Rules Based on Rough Set","authors":"Shulin Chen, Lei Wang","doi":"10.1109/ISECS.2008.14","DOIUrl":"https://doi.org/10.1109/ISECS.2008.14","url":null,"abstract":"With the fast development of the technology in Database and Internet, excessive information has become a problem that decision makers engage in electronic commerce have to affront. This paper firstly establishes the decision table for excessive data, then reduces knowledge of the decision table, and obtains the best rules. This can reduce the redundancy of the data, and improve the efficiency of knowledge obtaining. Because of the high time complexity and spatial complexity the general algorithm has, this paper proposed a new algorithm based on analogical matrix, and carried out the algorithm. The practice proves that the algorithm can improve the efficiency of knowledge obtaining, and the rules is tidy and best.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends SSL and SET: optimize and realize AES algorithm and integrate it into SSL protocol, establish secure hash algorithm based on the optimized AES and integrate it into SSL protocol, design and implement security proxy and micro authority certificate (CA) system.
{"title":"Key Technologies for Security Enhancing of Payment Gateway","authors":"Xuewang Zhang, Linlin Wang","doi":"10.1109/ISECS.2008.37","DOIUrl":"https://doi.org/10.1109/ISECS.2008.37","url":null,"abstract":"The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends SSL and SET: optimize and realize AES algorithm and integrate it into SSL protocol, establish secure hash algorithm based on the optimized AES and integrate it into SSL protocol, design and implement security proxy and micro authority certificate (CA) system.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125617213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alert correlation is the method used to analyze the implicit relation among attacks so as to discover real threats. There already have been several proposals on alert correlation, such as the methods based on predefined knowledge and the methods need no predefined knowledge. But they all have their drawbacks. Generally, the predefined knowledge based methods have no ability to recognize unknown attacks, and the non predefined knowledge based methods lack the capability to analyze multistep attacks. This paper presents a multilevel correlation method used in the Unified Platform of Network Security Management (UPNSM). This method combines the two methods mentioned above together in analyzing multisource alerts. The goal is to pull out false positive, extract real threats and discover unknown attacks. Experiments show that our multilevel correlation modeling and deployment techniques are effective in achieving this goal.
{"title":"Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation","authors":"Zheng Wu, Debao Xiao, Min Xiao, Xi Peng","doi":"10.1109/ISECS.2008.85","DOIUrl":"https://doi.org/10.1109/ISECS.2008.85","url":null,"abstract":"Alert correlation is the method used to analyze the implicit relation among attacks so as to discover real threats. There already have been several proposals on alert correlation, such as the methods based on predefined knowledge and the methods need no predefined knowledge. But they all have their drawbacks. Generally, the predefined knowledge based methods have no ability to recognize unknown attacks, and the non predefined knowledge based methods lack the capability to analyze multistep attacks. This paper presents a multilevel correlation method used in the Unified Platform of Network Security Management (UPNSM). This method combines the two methods mentioned above together in analyzing multisource alerts. The goal is to pull out false positive, extract real threats and discover unknown attacks. Experiments show that our multilevel correlation modeling and deployment techniques are effective in achieving this goal.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127089395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A distributed e-business authentication scheme based on conic curve is proposed. This scheme is composed of two parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analyse its security. The entire process guarantees the security and reliability.
{"title":"A Distributed Electronic Authentication Scheme in E-Business System","authors":"Xinxia Song, Zhigang Chen","doi":"10.1109/ISECS.2008.125","DOIUrl":"https://doi.org/10.1109/ISECS.2008.125","url":null,"abstract":"A distributed e-business authentication scheme based on conic curve is proposed. This scheme is composed of two parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analyse its security. The entire process guarantees the security and reliability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shipbuilding is a typical complex system engineering and requires many different enterprises and plants to work cooperatively to strive for the maximum profit. Supported by the computer, information, and Internet technology etc., CSCW plays a very crucial role in the multi-team, multi-subject, multi-layer field. Therefore, CSCW is necessary to be applied into the shipbuilding industry according to the shipbuilding characters and market requirements. Firstly, a collaborative shipbuilding system is set up and analyzed in detail, and then a collaborative decision support system is built up in order to make operations fluent. In the end, a collaborative ship commerce system is constructed and discussed. The application of CSCW is evidently useful to improve the shipbuilding industry and enhance the enterprisepsilas competitive capability.
{"title":"Research on the Application of CSCW in Shipbuilding Industry","authors":"Qingying Zhang, Weihong Yue, Chengfang Wang","doi":"10.1109/ISECS.2008.40","DOIUrl":"https://doi.org/10.1109/ISECS.2008.40","url":null,"abstract":"Shipbuilding is a typical complex system engineering and requires many different enterprises and plants to work cooperatively to strive for the maximum profit. Supported by the computer, information, and Internet technology etc., CSCW plays a very crucial role in the multi-team, multi-subject, multi-layer field. Therefore, CSCW is necessary to be applied into the shipbuilding industry according to the shipbuilding characters and market requirements. Firstly, a collaborative shipbuilding system is set up and analyzed in detail, and then a collaborative decision support system is built up in order to make operations fluent. In the end, a collaborative ship commerce system is constructed and discussed. The application of CSCW is evidently useful to improve the shipbuilding industry and enhance the enterprisepsilas competitive capability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114173712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of Internet generated the wave of E-Commerce, which can lead an expansion of IT industry. This paper focuses on the relationship between of ownership motivation and corporate performance in IT companies because the showing of low occupational stability of managers in IT industry. With an empirical research through all 99 IT companies from Shanghai and Shenzhen stock market as the sample data, this paper founded that the average managerial ownership is quite small and has no effect on corporate performance, but there is an U-curved relationship between the population ratio of managerial stockholder and corporate performance.
{"title":"Ownership Motivation and Corporate Performance in IT Industry under the Wave of E-Commerce: An Empirical Study based on Chinese Public Companies","authors":"Qi Yue, Hailin Lan, Luan Jiang","doi":"10.1109/ISECS.2008.30","DOIUrl":"https://doi.org/10.1109/ISECS.2008.30","url":null,"abstract":"The development of Internet generated the wave of E-Commerce, which can lead an expansion of IT industry. This paper focuses on the relationship between of ownership motivation and corporate performance in IT companies because the showing of low occupational stability of managers in IT industry. With an empirical research through all 99 IT companies from Shanghai and Shenzhen stock market as the sample data, this paper founded that the average managerial ownership is quite small and has no effect on corporate performance, but there is an U-curved relationship between the population ratio of managerial stockholder and corporate performance.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120919198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An intrusion detection system (IDS) attempts to identify attacks by comparing collected data to predefined signatures known to be malicious (signature-based IDS) or to a model of legal behaviour (anomaly-based IDS). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms. Two reasons for the large number of false alarms, caused by incorrect classification of events in current systems, one is the simplistic aggregation of model outputs inthe decision phase. The other reason is the lack of integration of additional information into the decision process. To mitigate these shortcomings, this paper proposes a two stratum Bayesian networks based anomaly detection and decision model for intrusion detection system. Bayesian networks improve the aggregation of outputs, such as empirical data and allow one to seamlessly incorporate additional information. Experimental results clearly demonstrate the efficiency of our approach to improve the accuracy of the intrusion detection and decision process in an anomaly based IDS.
{"title":"Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System","authors":"Huijuan Lu, Jianguo Chen, Wei Wei","doi":"10.1109/ISECS.2008.178","DOIUrl":"https://doi.org/10.1109/ISECS.2008.178","url":null,"abstract":"An intrusion detection system (IDS) attempts to identify attacks by comparing collected data to predefined signatures known to be malicious (signature-based IDS) or to a model of legal behaviour (anomaly-based IDS). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms. Two reasons for the large number of false alarms, caused by incorrect classification of events in current systems, one is the simplistic aggregation of model outputs inthe decision phase. The other reason is the lack of integration of additional information into the decision process. To mitigate these shortcomings, this paper proposes a two stratum Bayesian networks based anomaly detection and decision model for intrusion detection system. Bayesian networks improve the aggregation of outputs, such as empirical data and allow one to seamlessly incorporate additional information. Experimental results clearly demonstrate the efficiency of our approach to improve the accuracy of the intrusion detection and decision process in an anomaly based IDS.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Unsupervised or supervised anomaly intrusion detection techniques have great utility with the context of network intrusion detection system. However, large amount of labeled attack instances used by supervised approaches are difficult to obtain. And this makes most existing supervised techniques hardly be implemented in the real world. Unsupervised methods are superior in their independency on prior knowledge, but it is also very difficult for these methods to achieve high detection rate as well as low false positive rate. In this paper, we proposed an anomaly intrusion detection model based on small labeled instances that outperform existing unsupervised methods with a detection performance very close to that of the supervised one. We evaluated our methods by conducting experiments with network records from the KDD CUP 1999 data set. The results showed that our algorithm is an efficient method in detecting both known and unknown attacks.
无监督或有监督异常入侵检测技术在网络入侵检测系统中有着广泛的应用。然而,监督方法所使用的大量标记攻击实例难以获得。这使得大多数现有的监督技术很难在现实世界中实现。无监督方法在对先验知识的独立性方面具有优势,但也很难达到高的检测率和低的误报率。在本文中,我们提出了一种基于小标记实例的异常入侵检测模型,该模型优于现有的无监督方法,并且检测性能非常接近有监督方法。我们通过对KDD CUP 1999数据集的网络记录进行实验来评估我们的方法。结果表明,该算法是一种有效的检测已知和未知攻击的方法。
{"title":"An Anomaly Intrusion Detection Model Based on Limited Labeled Instances","authors":"Shanqing Guo, Zhong-Hua Zhao","doi":"10.1109/ISECS.2008.26","DOIUrl":"https://doi.org/10.1109/ISECS.2008.26","url":null,"abstract":"Unsupervised or supervised anomaly intrusion detection techniques have great utility with the context of network intrusion detection system. However, large amount of labeled attack instances used by supervised approaches are difficult to obtain. And this makes most existing supervised techniques hardly be implemented in the real world. Unsupervised methods are superior in their independency on prior knowledge, but it is also very difficult for these methods to achieve high detection rate as well as low false positive rate. In this paper, we proposed an anomaly intrusion detection model based on small labeled instances that outperform existing unsupervised methods with a detection performance very close to that of the supervised one. We evaluated our methods by conducting experiments with network records from the KDD CUP 1999 data set. The results showed that our algorithm is an efficient method in detecting both known and unknown attacks.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129968894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service system are analyzed in detail. The method for improving security and optimize efficiency of trusted time stamping are discussed.
{"title":"Electronic Time Stamping Safety and Efficiency Optimize Technique Research","authors":"Hong-Jiao Ma, Yu Hua, Wei Guo","doi":"10.1109/ISECS.2008.11","DOIUrl":"https://doi.org/10.1109/ISECS.2008.11","url":null,"abstract":"Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service system are analyzed in detail. The method for improving security and optimize efficiency of trusted time stamping are discussed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"411 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}