首页 > 最新文献

2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference最新文献

英文 中文
Trusted Logging for Grid Computing 网格计算的可信日志记录
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.9
J. Huh, A. Martin
The rise of many kinds of grid systems, and associated security threats, makes very necessary the provision of trustworthy services for audit and logging. However, existing solutions tend to put little emphasis on the security of logging. We present a number of use cases where the logs have security properties in their own rights, and so the logs themselves are highly privileged: hence, these need to be integrity and confidentiality protected while being generated, accessed, reconciled and analysed with distributed services spanning across multiple administrative domains. We derive a common set of secure logging requirements to address the security gaps which exist between these use cases and existing solutions.From the requirements, we propose a novel logging architecture for the grid based on virtual machine (VM) isolation and trusted computing capabilities: a small number of privileged driver VMs trigger all trusted logging requests and forward them to the secure logging service running within the log security manager. The logging service verifies the integrity of the log data and the security configurations of these driver VMs (log generators) before storing the logs.
各种网格系统的兴起以及相关的安全威胁,使得为审计和日志记录提供可信的服务变得非常必要。然而,现有的解决方案往往很少强调日志记录的安全性。我们提出了许多用例,其中日志在其自身权限中具有安全属性,因此日志本身具有高度特权:因此,在使用跨多个管理域的分布式服务生成、访问、协调和分析这些日志时,需要保护它们的完整性和机密性。我们导出了一组通用的安全日志记录需求,以解决这些用例和现有解决方案之间存在的安全差距。根据需求,我们提出了一种基于虚拟机隔离和可信计算能力的网格日志架构:少数特权驱动虚拟机触发所有可信日志请求,并将其转发给运行在日志安全管理器中的安全日志服务。日志服务在存储日志之前,会验证日志数据的完整性以及这些驱动虚拟机(日志生成器)的安全配置。
{"title":"Trusted Logging for Grid Computing","authors":"J. Huh, A. Martin","doi":"10.1109/APTC.2008.9","DOIUrl":"https://doi.org/10.1109/APTC.2008.9","url":null,"abstract":"The rise of many kinds of grid systems, and associated security threats, makes very necessary the provision of trustworthy services for audit and logging. However, existing solutions tend to put little emphasis on the security of logging. We present a number of use cases where the logs have security properties in their own rights, and so the logs themselves are highly privileged: hence, these need to be integrity and confidentiality protected while being generated, accessed, reconciled and analysed with distributed services spanning across multiple administrative domains. We derive a common set of secure logging requirements to address the security gaps which exist between these use cases and existing solutions.From the requirements, we propose a novel logging architecture for the grid based on virtual machine (VM) isolation and trusted computing capabilities: a small number of privileged driver VMs trigger all trusted logging requests and forward them to the secure logging service running within the log security manager. The logging service verifies the integrity of the log data and the security configurations of these driver VMs (log generators) before storing the logs.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126851166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Secure Virtual Disk Images for Grid Computing 用于网格计算的安全虚拟磁盘映像
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.17
C. Gebhardt, A. Tomlinson
We present in our paper a secure, flexible and transparent security architecture for virtual disk images.Virtual disk images are often overlooked in security concepts, especially in a grid environment where disk images are considered to be secure as long as they reside within the secured borders of the data center.However, for some applications this level of assurance is not satisfactory.In our security architecture, virtualized guests transparently benefit from integrity as well as confidentiality assurance.Traditional virtual disk images lack the ability of an efficient integrity protection mechanism.We base our concepts on trusted computing utilizing the Trusted Platform Module (TPM) to efficiently deliver integrity assurance to virtual disk images.Further, we allow a restrictive rule-set to be imposed by the virtual disk image owner, and we enable the owner to retain control over the virtual disk image throughout its life-cycle.
本文提出了一种安全、灵活、透明的虚拟磁盘镜像安全体系结构。虚拟磁盘映像在安全概念中经常被忽略,特别是在网格环境中,只要磁盘映像位于数据中心的安全边界内,它们就被认为是安全的。然而,对于某些应用程序,这种级别的保证并不令人满意。在我们的安全体系结构中,虚拟化客户机可以从完整性和机密性保证中明显受益。传统的虚拟磁盘映像缺乏有效的完整性保护机制。我们的概念基于可信计算,利用可信平台模块(trusted Platform Module, TPM)有效地向虚拟磁盘映像提供完整性保证。此外,我们允许虚拟磁盘映像所有者施加限制性规则集,并使所有者能够在整个生命周期中保持对虚拟磁盘映像的控制。
{"title":"Secure Virtual Disk Images for Grid Computing","authors":"C. Gebhardt, A. Tomlinson","doi":"10.1109/APTC.2008.17","DOIUrl":"https://doi.org/10.1109/APTC.2008.17","url":null,"abstract":"We present in our paper a secure, flexible and transparent security architecture for virtual disk images.Virtual disk images are often overlooked in security concepts, especially in a grid environment where disk images are considered to be secure as long as they reside within the secured borders of the data center.However, for some applications this level of assurance is not satisfactory.In our security architecture, virtualized guests transparently benefit from integrity as well as confidentiality assurance.Traditional virtual disk images lack the ability of an efficient integrity protection mechanism.We base our concepts on trusted computing utilizing the Trusted Platform Module (TPM) to efficiently deliver integrity assurance to virtual disk images.Further, we allow a restrictive rule-set to be imposed by the virtual disk image owner, and we enable the owner to retain control over the virtual disk image throughout its life-cycle.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128259190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Enriched Trusted Platform and its Application on DRM 增强可信平台及其在DRM中的应用
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.10
Yongdong Wu, F. Bao
The TCG (Trusted Computing Group) is an industry working group which aims to establish industry standards for trust and security in computing platforms. This paper enriches the TCG architecture by adding a SPM (Secure Process Manager) into the trusted platform as a kernel component for the purpose of process management. To attest a process/software to a remote peer, SPM will attest itself first and then sign the software description for remote verification. In comparison with the direct process attestation method, this indirection method simplifies the attestation significantly in the case of software updating, since the number of SPM versions is much fewer than that of softwares. Moreover, this paper introduces a DRM (Digital Right Management) scheme over the enriched architecture so as to enforce usage control with the standard resource in TPM (Trusted Platform Module) chip.
TCG(可信计算组)是一个行业工作组,旨在为计算平台的信任和安全建立行业标准。本文通过在可信平台中添加SPM(安全进程管理器)作为内核组件来丰富TCG体系结构,以实现进程管理的目的。为了向远程对等体证明进程/软件,SPM将首先证明自己,然后为远程验证的软件描述签名。与直接过程认证方法相比,这种间接认证方法在软件更新的情况下大大简化了认证,因为SPM的版本数量远远少于软件的版本数量。在此基础上引入了数字版权管理(DRM)方案,利用可信平台模块(TPM)芯片中的标准资源对其进行使用控制。
{"title":"Enriched Trusted Platform and its Application on DRM","authors":"Yongdong Wu, F. Bao","doi":"10.1109/APTC.2008.10","DOIUrl":"https://doi.org/10.1109/APTC.2008.10","url":null,"abstract":"The TCG (Trusted Computing Group) is an industry working group which aims to establish industry standards for trust and security in computing platforms. This paper enriches the TCG architecture by adding a SPM (Secure Process Manager) into the trusted platform as a kernel component for the purpose of process management. To attest a process/software to a remote peer, SPM will attest itself first and then sign the software description for remote verification. In comparison with the direct process attestation method, this indirection method simplifies the attestation significantly in the case of software updating, since the number of SPM versions is much fewer than that of softwares. Moreover, this paper introduces a DRM (Digital Right Management) scheme over the enriched architecture so as to enforce usage control with the standard resource in TPM (Trusted Platform Module) chip.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129635643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Is Your Virtual Machine Monitor Secure? 你的虚拟机监视器安全吗?
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.18
P. Karger
It is widely believed that the use of a virtual machine monitor (VMM) is at least as secure, if not more secure than separate systems. In reality, the security of a single system running in a virtual machine can never be as secure as that single system running in its own dedicated physical hardware. If for no other reason, the security of that system in a virtual machine depends on the correct operation of both the operating system and the hypervisor software, while in a dedicated physical computer, it depends only on the correct operation of the operating system. The VMM case always has more opportunity for exploitable security flaws. While many people view virtual machine monitors as something special and different, in realty they are just special-purpose operating systems. The major difference is that the API to a virtual machine monitor is the instruction set of the virtual machine, while the API to an operating system is a set of system calls to manipulate processes, file systems, perform I/O, etc. To the extent that a particular VMM uses paravirtualization, it begins to look more like a classical operating system than a VMM.
人们普遍认为,使用虚拟机监视器(VMM)至少与使用单独的系统一样安全,甚至更安全。实际上,在虚拟机中运行的单个系统的安全性永远不会像在其专用物理硬件中运行的单个系统那样安全。如果没有其他原因,虚拟机中该系统的安全性取决于操作系统和管理程序软件的正确操作,而在专用物理计算机中,它仅取决于操作系统的正确操作。VMM的情况总是有更多的机会利用安全漏洞。虽然许多人将虚拟机监视器视为特殊的、不同的东西,但实际上它们只是特殊用途的操作系统。主要区别在于,虚拟机监视器的API是虚拟机的指令集,而操作系统的API是一组系统调用,用于操作进程、文件系统、执行I/O等。在某种程度上,一个特定的VMM使用了半虚拟化,它开始看起来更像一个经典的操作系统,而不是一个VMM。
{"title":"Is Your Virtual Machine Monitor Secure?","authors":"P. Karger","doi":"10.1109/APTC.2008.18","DOIUrl":"https://doi.org/10.1109/APTC.2008.18","url":null,"abstract":"It is widely believed that the use of a virtual machine monitor (VMM) is at least as secure, if not more secure than separate systems. In reality, the security of a single system running in a virtual machine can never be as secure as that single system running in its own dedicated physical hardware. If for no other reason, the security of that system in a virtual machine depends on the correct operation of both the operating system and the hypervisor software, while in a dedicated physical computer, it depends only on the correct operation of the operating system. The VMM case always has more opportunity for exploitable security flaws. While many people view virtual machine monitors as something special and different, in realty they are just special-purpose operating systems. The major difference is that the API to a virtual machine monitor is the instruction set of the virtual machine, while the API to an operating system is a set of system calls to manipulate processes, file systems, perform I/O, etc. To the extent that a particular VMM uses paravirtualization, it begins to look more like a classical operating system than a VMM.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129137073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fine Grained Transaction Log for Data Recovery in Database Systems 用于数据库系统数据恢复的细粒度事务日志
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.7
Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang
Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of "extended read operations" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.
攻击后恶意提交的事务的数据恢复日益成为一个重要的问题。数据恢复的损害评估需要一个事务日志,该日志记录了所有恶意和良性事务读取或写入的数据项。不幸的是,传统的撤销/重做日志不能记录事务的读操作;现有的审计机制无法捕获数据项的操作。本文引入了“扩展读操作”的概念,说明了扩展读操作是如何引起损害扩散的,并在此基础上提出了一种细粒度的事务日志(FGTL)。日志记录提交事务的只读和涉及更新的操作(读和写)的所有数据项,甚至提取SQL语句中的子查询读取的数据项。开发了一个原型系统,称为FGTL发生器,用于产生FGTL。基于TPC-W基准的实验证明了该方法的有效性。
{"title":"Fine Grained Transaction Log for Data Recovery in Database Systems","authors":"Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang","doi":"10.1109/APTC.2008.7","DOIUrl":"https://doi.org/10.1109/APTC.2008.7","url":null,"abstract":"Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of \"extended read operations\" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Mobile Payment via Trusted Computing 通过可信计算实现安全移动支付
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.24
Qi Li, Xinwen Zhang, Jean-Pierre Seifert, H. Zhong
Mobile payment (m-payment) received significant attention because it enables an easy payment mechanism and becomes an important complement to traditional payment means. However, m-payment over open devices and networks poses security challenges of a new dimension. Although many researchers address security issues in m-payment, there are still some security problems that are not well resolved, such as platform integrity and user privacy protection. In this paper, we propose a general payment architecture with Trusted Computing (TC) technologies to secure mobile payment. Using only a simple mobile payment infrastructure, a platform integrity protection solution is proposed to secure payment software downloading, application initialization, and secure payment transactions. We further propose two schemes to enhance the performance and flexibility of our solution. The first scheme provides platform attestation using an identity-based signature (IBS) algorithm instead of a traditional credential-based public-key signature algorithm within Trusted Computing Group (TCG) technologies, which fully utilizes the merits of the mobile computing infrastructure and improves the flexibility and performance of the payment solution. The second scheme provides attestation caching without sacrificing security achievements. We have implemented a real prototype system based on an emulated payment environment. Our security analysis and experimental results prove that our scheme can effectively meet the security requirements of a practical m-payment with acceptable performance.
移动支付(m-payment)因其提供了一种便捷的支付机制,成为传统支付方式的重要补充而备受关注。然而,在开放设备和网络上的移动支付带来了新的安全挑战。虽然很多研究者都在关注移动支付中的安全问题,但仍然存在一些安全问题没有很好地解决,比如平台完整性和用户隐私保护。在本文中,我们提出了一种基于可信计算(TC)技术的通用支付架构来保证移动支付的安全。基于简单的移动支付基础架构,提出了一种平台完整性保护方案,以保证支付软件下载、应用程序初始化和支付交易的安全。我们进一步提出了两个方案,以提高我们的解决方案的性能和灵活性。第一种方案使用基于身份的签名(IBS)算法代替可信计算组(TCG)技术中的传统基于凭证的公钥签名算法提供平台认证,充分利用了移动计算基础设施的优点,提高了支付解决方案的灵活性和性能。第二种方案在不牺牲安全成就的情况下提供证明缓存。我们已经实现了一个基于仿真支付环境的真实原型系统。我们的安全性分析和实验结果证明,我们的方案可以有效地满足实际移动支付的安全要求,并且性能可以接受。
{"title":"Secure Mobile Payment via Trusted Computing","authors":"Qi Li, Xinwen Zhang, Jean-Pierre Seifert, H. Zhong","doi":"10.1109/APTC.2008.24","DOIUrl":"https://doi.org/10.1109/APTC.2008.24","url":null,"abstract":"Mobile payment (m-payment) received significant attention because it enables an easy payment mechanism and becomes an important complement to traditional payment means. However, m-payment over open devices and networks poses security challenges of a new dimension. Although many researchers address security issues in m-payment, there are still some security problems that are not well resolved, such as platform integrity and user privacy protection. In this paper, we propose a general payment architecture with Trusted Computing (TC) technologies to secure mobile payment. Using only a simple mobile payment infrastructure, a platform integrity protection solution is proposed to secure payment software downloading, application initialization, and secure payment transactions. We further propose two schemes to enhance the performance and flexibility of our solution. The first scheme provides platform attestation using an identity-based signature (IBS) algorithm instead of a traditional credential-based public-key signature algorithm within Trusted Computing Group (TCG) technologies, which fully utilizes the merits of the mobile computing infrastructure and improves the flexibility and performance of the payment solution. The second scheme provides attestation caching without sacrificing security achievements. We have implemented a real prototype system based on an emulated payment environment. Our security analysis and experimental results prove that our scheme can effectively meet the security requirements of a practical m-payment with acceptable performance.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Mutual Information Based Watermarking Detection in Wavelet Domain for Copyright Protection 基于互信息的小波域版权保护水印检测
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.12
Ting Luo, Guanglin Xing, Lei Shi
A new robust watermarking approach is proposed in wavelet domain in this paper. It is robust to both compressive and geometric attacks. The watermark is embedded into the wavelet transform modulus maxima (WTMM) of the host image, which is shift-invariant compared to the other wavelet domain watermarking approaches. On the other hand, scale and rotation invariants are achieved by the geometric normalization during watermark detection. Mutual Information approach is proposed to improve the robustness of watermark detection, which can capture higher order statistics of image than that of the correlation detection. Case studies involve various attacks such as shifting, lossy compression, scaling, rotation and median filtering on the watermark are presented and discussed on their effectiveness.
提出了一种新的小波域鲁棒水印方法。它对压缩攻击和几何攻击都具有鲁棒性。该方法将水印嵌入到主图像的小波变换模极大值(WTMM)中,与其他小波域水印方法相比,该方法具有平移不变性。另一方面,水印检测过程中通过几何归一化实现尺度不变量和旋转不变量。为了提高水印检测的鲁棒性,提出了互信息检测方法,该方法可以捕获比相关检测更高阶的图像统计量。案例研究涉及水印的移动、有损压缩、缩放、旋转和中值滤波等攻击,并讨论了它们的有效性。
{"title":"Mutual Information Based Watermarking Detection in Wavelet Domain for Copyright Protection","authors":"Ting Luo, Guanglin Xing, Lei Shi","doi":"10.1109/APTC.2008.12","DOIUrl":"https://doi.org/10.1109/APTC.2008.12","url":null,"abstract":"A new robust watermarking approach is proposed in wavelet domain in this paper. It is robust to both compressive and geometric attacks. The watermark is embedded into the wavelet transform modulus maxima (WTMM) of the host image, which is shift-invariant compared to the other wavelet domain watermarking approaches. On the other hand, scale and rotation invariants are achieved by the geometric normalization during watermark detection. Mutual Information approach is proposed to improve the robustness of watermark detection, which can capture higher order statistics of image than that of the correlation detection. Case studies involve various attacks such as shifting, lossy compression, scaling, rotation and median filtering on the watermark are presented and discussed on their effectiveness.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115304043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Specification and Verification Method on Component Composition of Real-Time Reactive Systems 实时响应系统组件组成的规范与验证方法
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.14
Yangli Jia, Zhoujun Li, Xutao Du, Zhenling Zhang
Timed component interface control flow automata (TCICFA) is presented to specify and verify composite real-time components' invocation behavior and timing constraint information. By analyzing TCICFAs, a component reachability graph (CRG) can be constructed based on the constructing algorithm we presented. Each node in CRG is equipped with a state formula which has been computed with the construction of the CRG, and assertions can be made at each node to express safety, real-time liveness and other trustworthiness properties. Then all kinds of nonfunctional trustworthiness properties of composite components in real-time reactive systems (RTRS) can be verified based on the CRG using a SAT solver.
提出了定时组件接口控制流自动机(TCICFA)来指定和验证组合实时组件的调用行为和定时约束信息。通过对构件可达性图的分析,提出了基于构件可达性图的构造算法。CRG中的每个节点都配备了一个状态公式,该状态公式是在CRG的构建过程中计算出来的,并且可以在每个节点上进行断言,以表达安全性、实时性和其他可信赖性。然后利用SAT求解器基于CRG对实时反应系统(RTRS)中复合部件的各种非功能可信特性进行验证。
{"title":"A Specification and Verification Method on Component Composition of Real-Time Reactive Systems","authors":"Yangli Jia, Zhoujun Li, Xutao Du, Zhenling Zhang","doi":"10.1109/APTC.2008.14","DOIUrl":"https://doi.org/10.1109/APTC.2008.14","url":null,"abstract":"Timed component interface control flow automata (TCICFA) is presented to specify and verify composite real-time components' invocation behavior and timing constraint information. By analyzing TCICFAs, a component reachability graph (CRG) can be constructed based on the constructing algorithm we presented. Each node in CRG is equipped with a state formula which has been computed with the construction of the CRG, and assertions can be made at each node to express safety, real-time liveness and other trustworthiness properties. Then all kinds of nonfunctional trustworthiness properties of composite components in real-time reactive systems (RTRS) can be verified based on the CRG using a SAT solver.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133655368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(How) Can We Manage the Trustworthiness of Security Infrastructures and Services? (如何)管理安全基础设施和服务的可信度?
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.11
Shouhuai Xu
The Internet has become a vital communication infrastructure. However, the same Internet has also become the vehicle for many powerful malicious attacks (e.g., botnets) that could turn it into doing more harm than good. This has led to the development, and sometimes deployment, of various security infrastructures and services (e.g., PKI, DNSSEC and TPM). Unfortunately, it seems inevitable, at least for the many years to come, that malicious attacks would remain successfully. Therefore, it has become increasingly more important to be able to understand, model, and ultimately manage the trustworthiness of security infrastructures and services. In this talk the speaker will expose his view towards solving this challenging and important problem. Some initial results and open problems will be discussed as well.
互联网已经成为一个重要的通信基础设施。然而,同样的互联网也成为许多强大的恶意攻击(例如,僵尸网络)的工具,这可能会使它弊大于利。这导致了各种安全基础设施和服务(例如PKI、DNSSEC和TPM)的开发,有时甚至是部署。不幸的是,至少在未来的许多年里,恶意攻击似乎不可避免地会继续成功。因此,能够理解、建模并最终管理安全基础设施和服务的可信性变得越来越重要。在这次演讲中,演讲者将阐述他对解决这一具有挑战性和重要问题的看法。一些初步结果和有待解决的问题也将被讨论。
{"title":"(How) Can We Manage the Trustworthiness of Security Infrastructures and Services?","authors":"Shouhuai Xu","doi":"10.1109/APTC.2008.11","DOIUrl":"https://doi.org/10.1109/APTC.2008.11","url":null,"abstract":"The Internet has become a vital communication infrastructure. However, the same Internet has also become the vehicle for many powerful malicious attacks (e.g., botnets) that could turn it into doing more harm than good. This has led to the development, and sometimes deployment, of various security infrastructures and services (e.g., PKI, DNSSEC and TPM). Unfortunately, it seems inevitable, at least for the many years to come, that malicious attacks would remain successfully. Therefore, it has become increasingly more important to be able to understand, model, and ultimately manage the trustworthiness of security infrastructures and services. In this talk the speaker will expose his view towards solving this challenging and important problem. Some initial results and open problems will be discussed as well.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":" 46","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Development of Trusted Computing in China 可信计算在中国的研究与发展
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.19
Huanguo Zhang
Summary form only given. Through the practice of information security, people have realized that the causation of security mainly comes from microcomputer terminal. To ensure the source security of microcomputer terminal, the solution must synthetically integrate different security technologies including chips, hardware architecture, and operating system, etc., which is the original idea of trusted computing.
只提供摘要形式。通过信息安全实践,人们认识到安全的根源主要来自于微机终端。为了保证微型计算机终端的源头安全,解决方案必须综合集成芯片、硬件架构、操作系统等不同的安全技术,这就是可信计算的原始思想。
{"title":"Research and Development of Trusted Computing in China","authors":"Huanguo Zhang","doi":"10.1109/APTC.2008.19","DOIUrl":"https://doi.org/10.1109/APTC.2008.19","url":null,"abstract":"Summary form only given. Through the practice of information security, people have realized that the causation of security mainly comes from microcomputer terminal. To ensure the source security of microcomputer terminal, the solution must synthetically integrate different security technologies including chips, hardware architecture, and operating system, etc., which is the original idea of trusted computing.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129458928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1