首页 > 最新文献

2014 10th International Conference on Information Assurance and Security最新文献

英文 中文
Security assurance of local data stored by HTML5 web application HTML5 web应用存储本地数据的安全保障
Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064619
Mayssa Jemel, A. Serhrouchni
Local data storage is one of the features that came with the HTML5 standard. Its purpose is to ensure the storage of web application's data in the device of the user rather than in the server side. With HTM5, the storage is no more achieved by proprietary solution as it is ensured by standardized APIs. However, with this new functionality that improves the user's quality of experience, it is crucial to reassure the end user about his data protection when they are stored locally and when they are externalized. In this work, our contribution deals with the assurance and security of data stored by HTML5 APIs. These measures are integrated into the browser to be performed automatically. In fact, data will be stored safely in a secure local space devoted to each user. As a proof of concept, we implemented our approach on the chromium browser, and we studied its performances.
本地数据存储是HTML5标准自带的特性之一。它的目的是确保web应用程序的数据存储在用户的设备中,而不是在服务器端。在html5中,存储不再由专有解决方案来实现,而是由标准化的api来保证。然而,有了这个提高用户体验质量的新功能,在数据存储在本地和外部化时,向最终用户保证数据保护是至关重要的。在这项工作中,我们的贡献涉及HTML5 api存储数据的保证和安全性。这些措施被集成到浏览器中自动执行。实际上,数据将安全地存储在专用于每个用户的安全本地空间中。作为概念验证,我们在chromium浏览器上实现了我们的方法,并研究了它的性能。
{"title":"Security assurance of local data stored by HTML5 web application","authors":"Mayssa Jemel, A. Serhrouchni","doi":"10.1109/ISIAS.2014.7064619","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064619","url":null,"abstract":"Local data storage is one of the features that came with the HTML5 standard. Its purpose is to ensure the storage of web application's data in the device of the user rather than in the server side. With HTM5, the storage is no more achieved by proprietary solution as it is ensured by standardized APIs. However, with this new functionality that improves the user's quality of experience, it is crucial to reassure the end user about his data protection when they are stored locally and when they are externalized. In this work, our contribution deals with the assurance and security of data stored by HTML5 APIs. These measures are integrated into the browser to be performed automatically. In fact, data will be stored safely in a secure local space devoted to each user. As a proof of concept, we implemented our approach on the chromium browser, and we studied its performances.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126981319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ETC: Effective trustworthy communication with two-mode authentication for disaster recovery ETC:有效的可信通信,具有用于灾难恢复的双模式身份验证
Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064627
Tanapat Ruengsatra, K. N. Nakorn, K. Rojviboonchai, K. Piromsopa
In this paper, we propose effective trusted communication (ETC) using two-mode authentication. ETC combines routing protocol and authentication protocol together to provide trusted communication especially in disaster situations. During disasters, a communication system plays an important role in rescuing victims. Due to infrastructure failure, mobile ad-hoc networks (MANET) must be used. Since most authentication methods rely on trusted-third party, they cannot be used in isolated mobile ad-hoc networks. In addition, most authentication protocols do not provide fast data transmission (if reliable). Our design of ETC allows authenticated communication without compromising data transmission speed.
本文提出了一种基于双模式认证的有效可信通信(ETC)方法。ETC将路由协议和认证协议结合在一起,提供可靠的通信,特别是在灾难情况下。在灾害中,通信系统在救援受害者方面发挥着重要作用。由于基础设施故障,必须使用移动自组织网络(MANET)。由于大多数身份验证方法依赖于可信的第三方,因此它们不能在孤立的移动自组织网络中使用。此外,大多数身份验证协议不提供快速数据传输(如果可靠的话)。我们的ETC设计允许在不影响数据传输速度的情况下进行身份验证通信。
{"title":"ETC: Effective trustworthy communication with two-mode authentication for disaster recovery","authors":"Tanapat Ruengsatra, K. N. Nakorn, K. Rojviboonchai, K. Piromsopa","doi":"10.1109/ISIAS.2014.7064627","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064627","url":null,"abstract":"In this paper, we propose effective trusted communication (ETC) using two-mode authentication. ETC combines routing protocol and authentication protocol together to provide trusted communication especially in disaster situations. During disasters, a communication system plays an important role in rescuing victims. Due to infrastructure failure, mobile ad-hoc networks (MANET) must be used. Since most authentication methods rely on trusted-third party, they cannot be used in isolated mobile ad-hoc networks. In addition, most authentication protocols do not provide fast data transmission (if reliable). Our design of ETC allows authenticated communication without compromising data transmission speed.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114585257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness 防火墙性能的实验研究:深入探讨防火墙效能的瓶颈
Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064623
Cheng-Hong Wang, Donghong Zhang, H. Lu, Jing Zhao, Zhenyu Zhang, Zheng Zheng
Performance is an important indicator of firewalls effectiveness, which represents capability of firewalls handling network requests. ModSecurity and iptables, two representative firewalls of packet filtering and application firewall, are studied experimentally in this paper. Firstly, we develop the experiments to test the capacity of these two kinds of firewalls. Secondly, we locate the bottlenecks for system resources such as CPU and memory usage that affect the firewalls performance by analyzing the collecting data from firewalls experiments. Finally, with the same settings, we compare the performance of the two kinds of firewalls by varying the parameters such as request rate, packet length, and maximum concurrent connections.
性能是衡量防火墙有效性的重要指标,它代表了防火墙处理网络请求的能力。本文对包过滤和应用防火墙两种具有代表性的防火墙ModSecurity和iptables进行了实验研究。首先,我们开发了实验来测试这两种防火墙的容量。其次,通过分析收集到的防火墙实验数据,找出影响防火墙性能的CPU、内存等系统资源瓶颈;最后,在相同的设置下,我们通过改变请求速率、数据包长度和最大并发连接等参数来比较两种防火墙的性能。
{"title":"An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness","authors":"Cheng-Hong Wang, Donghong Zhang, H. Lu, Jing Zhao, Zhenyu Zhang, Zheng Zheng","doi":"10.1109/ISIAS.2014.7064623","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064623","url":null,"abstract":"Performance is an important indicator of firewalls effectiveness, which represents capability of firewalls handling network requests. ModSecurity and iptables, two representative firewalls of packet filtering and application firewall, are studied experimentally in this paper. Firstly, we develop the experiments to test the capacity of these two kinds of firewalls. Secondly, we locate the bottlenecks for system resources such as CPU and memory usage that affect the firewalls performance by analyzing the collecting data from firewalls experiments. Finally, with the same settings, we compare the performance of the two kinds of firewalls by varying the parameters such as request rate, packet length, and maximum concurrent connections.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132374881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Passive video forgery detection techniques: A survey 被动视频伪造检测技术综述
Pub Date : 1900-01-01 DOI: 10.1109/ISIAS.2014.7064616
Ainuddin Wahid Abdul Wahab, M. Bagiwa, M. Idris, Suleman Khan, Z. Razak, M. Ariffin
Technological advancement of various video and image processing tools has made tempering of digital video easy and faster. This review paper focuses on passive techniques that are employed for detecting forgeries in a digital video. Passive forgery detection techniques are methods used for detecting the authenticity of a video without depending on pre-embedded information. The techniques exploit the use of statistical or mathematical properties that are distorted as a result of video tempering for forgery detection. Passive video forgery detection approach has a great prospect in multimedia security, information security and pattern recognition. In this paper, we divide passive techniques for video forensics into three categories; Statistical correlation of video features, frame-based for detecting statistical anomalies, and the inconsistency features of different digital equipment. The discussion also covers the trends, limitations and idea for improvements of passive forgery detection techniques.
各种视频和图像处理工具的技术进步使得数字视频的回火变得简单和快速。这篇综述论文的重点是被动技术,用于检测伪造的数字视频。被动伪造检测技术是用于检测视频真实性的方法,而不依赖于预嵌入的信息。该技术利用统计或数学属性,这些属性由于视频回火而失真,用于伪造检测。被动视频伪造检测方法在多媒体安全、信息安全和模式识别等领域具有广阔的应用前景。本文将被动视频取证技术分为三类;视频特征的统计相关性,基于帧的统计异常检测,以及不同数字设备的不一致特征。讨论了被动伪造检测技术的发展趋势、局限性和改进思路。
{"title":"Passive video forgery detection techniques: A survey","authors":"Ainuddin Wahid Abdul Wahab, M. Bagiwa, M. Idris, Suleman Khan, Z. Razak, M. Ariffin","doi":"10.1109/ISIAS.2014.7064616","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064616","url":null,"abstract":"Technological advancement of various video and image processing tools has made tempering of digital video easy and faster. This review paper focuses on passive techniques that are employed for detecting forgeries in a digital video. Passive forgery detection techniques are methods used for detecting the authenticity of a video without depending on pre-embedded information. The techniques exploit the use of statistical or mathematical properties that are distorted as a result of video tempering for forgery detection. Passive video forgery detection approach has a great prospect in multimedia security, information security and pattern recognition. In this paper, we divide passive techniques for video forensics into three categories; Statistical correlation of video features, frame-based for detecting statistical anomalies, and the inconsistency features of different digital equipment. The discussion also covers the trends, limitations and idea for improvements of passive forgery detection techniques.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
2014 10th International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1