首页 > 最新文献

Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)最新文献

英文 中文
On the impact of unwanted traffic onto a 3G network 不需要的流量对3G网络的影响
F. Ricciato, P. Svoboda, E. Hasenleithner, Wolfgang Fleischer
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking into account the presence of unwanted traffic might experience troubles during periods of massive exposure to it, e.g. large-scale infections. A concrete example was provided by the spreading of Code-Red-II in 2001, which caused several routers crashes worldwide. Similar events might take place in 3G networks as well, with further potential complications due to the functional complexity and the scarcity of radio resources. In this explorative paper, we show that unwanted traffic is present also in GPRS/UMTS, mainly due to the widespread use of 3G connect cards for laptops. Based on a mixture of real-world measurements and theoretical speculations, we investigate the potential impact of such traffic onto the underlying network. We show that under certain hypothetical network configuration settings unwanted traffic, and specifically scanning traffic from infected mobile stations, can cause large-scale wastage of logical resources, and in extreme cases starvation. We urge the research community and network operators to consider the issue of 3G robustness to unwanted traffic as a prominent research area. The goal of this paper is to trigger interest and at the same time move a first pioneering step in this direction
互联网上“不需要的”(或背景)流量的存在是众所周知的事实。原则上,任何在设计时没有考虑到不需要的流量存在的网络都可能在大量暴露期间遇到麻烦,例如大规模感染。一个具体的例子是2001年红色代码ii的传播,它导致了全球几台路由器的崩溃。类似的事件也可能发生在3G网络中,由于功能的复杂性和无线电资源的稀缺性,可能会进一步复杂化。在这篇探索性的论文中,我们表明在GPRS/UMTS中也存在不必要的流量,这主要是由于笔记本电脑3G连接卡的广泛使用。基于实际测量和理论推测的混合,我们研究了此类流量对底层网络的潜在影响。我们表明,在某些假设的网络配置设置下,不需要的流量,特别是来自受感染移动站的扫描流量,可能会导致逻辑资源的大规模浪费,在极端情况下会导致饥饿。我们敦促研究界和网络运营商将3G对不必要流量的稳健性问题作为一个突出的研究领域来考虑。本文的目标是激发人们的兴趣,同时在这个方向上迈出第一步
{"title":"On the impact of unwanted traffic onto a 3G network","authors":"F. Ricciato, P. Svoboda, E. Hasenleithner, Wolfgang Fleischer","doi":"10.1109/SECPERU.2006.13","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.13","url":null,"abstract":"The presence of \"unwanted\" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking into account the presence of unwanted traffic might experience troubles during periods of massive exposure to it, e.g. large-scale infections. A concrete example was provided by the spreading of Code-Red-II in 2001, which caused several routers crashes worldwide. Similar events might take place in 3G networks as well, with further potential complications due to the functional complexity and the scarcity of radio resources. In this explorative paper, we show that unwanted traffic is present also in GPRS/UMTS, mainly due to the widespread use of 3G connect cards for laptops. Based on a mixture of real-world measurements and theoretical speculations, we investigate the potential impact of such traffic onto the underlying network. We show that under certain hypothetical network configuration settings unwanted traffic, and specifically scanning traffic from infected mobile stations, can cause large-scale wastage of logical resources, and in extreme cases starvation. We urge the research community and network operators to consider the issue of 3G robustness to unwanted traffic as a prominent research area. The goal of this paper is to trigger interest and at the same time move a first pioneering step in this direction","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129275419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Service-Oriented Security Architecture for CII based on Sensor Networks 基于传感器网络的面向服务的CII安全体系结构
Javier López, J. A. Montenegro, R. Román
The extraordinary growth of the information society is originating a high dependency on ICT. This provokes that those strongly interrelated technological infrastructures, as well as the information systems that underpin them, become highly critical, since their disruption would lead to high economical, material and, sometimes, human loss. As a consequence, the protection of these critical information infrastructures is becoming a major objective for governments and companies. In this paper, we give an overview of the main challenges and open research issues on critical information infrastructure security, and introduce an on-going research project that, using wireless sensor networks as an underlying technology, is dealing with those problems. Our research project focuses on the development of protection, control, evaluation, maintenance and verification mechanisms, integrated into a secure service-oriented architecture
信息社会的飞速发展导致了对信息通信技术的高度依赖。这引起那些密切相关的技术基础设施以及支撑它们的信息系统变得非常关键,因为它们的破坏将导致巨大的经济、物质、有时甚至人员损失。因此,保护这些关键的信息基础设施正成为政府和公司的主要目标。在本文中,我们概述了关键信息基础设施安全的主要挑战和开放的研究问题,并介绍了一个正在进行的研究项目,该项目使用无线传感器网络作为底层技术,正在处理这些问题。我们的研究项目侧重于开发保护、控制、评估、维护和验证机制,并将其集成到一个安全的面向服务的体系结构中
{"title":"Service-Oriented Security Architecture for CII based on Sensor Networks","authors":"Javier López, J. A. Montenegro, R. Román","doi":"10.1109/SECPERU.2006.19","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.19","url":null,"abstract":"The extraordinary growth of the information society is originating a high dependency on ICT. This provokes that those strongly interrelated technological infrastructures, as well as the information systems that underpin them, become highly critical, since their disruption would lead to high economical, material and, sometimes, human loss. As a consequence, the protection of these critical information infrastructures is becoming a major objective for governments and companies. In this paper, we give an overview of the main challenges and open research issues on critical information infrastructure security, and introduce an on-going research project that, using wireless sensor networks as an underlying technology, is dealing with those problems. Our research project focuses on the development of protection, control, evaluation, maintenance and verification mechanisms, integrated into a secure service-oriented architecture","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Using One-Way Chains to Provide Message Authentication without Shared Secrets 使用单向链提供没有共享秘密的消息身份验证
B. Groza
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret and by using only one-way chains. Such a protocol may have many applications and may be of interest especially in constrained environments where computational power is limited since one-way chains may be constructed using some of the simplest cryptographic one-way functions. We propose and investigate two approaches based on one-way chains, which we call: delayed message authentication and direct message authentication. Both of them have some shortcomings and a final hybrid approach, which combines their advantages without inheriting their weaknesses, appears to be quite useful and effective
本文的目标是提出一种不使用任何共享密钥且仅使用单向链的加密协议,在两个实体之间的信息交换中提供真实性。这样的协议可能有许多应用,特别是在计算能力有限的受限环境中,因为单向链可以使用一些最简单的加密单向函数来构建,因此可能会引起人们的兴趣。我们提出并研究了两种基于单向链的方法,我们称之为延迟消息认证和直接消息认证。它们都有一些缺点,最后的混合方法结合了它们的优点而不继承它们的缺点,似乎是非常有用和有效的
{"title":"Using One-Way Chains to Provide Message Authentication without Shared Secrets","authors":"B. Groza","doi":"10.1109/SECPERU.2006.21","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.21","url":null,"abstract":"The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret and by using only one-way chains. Such a protocol may have many applications and may be of interest especially in constrained environments where computational power is limited since one-way chains may be constructed using some of the simplest cryptographic one-way functions. We propose and investigate two approaches based on one-way chains, which we call: delayed message authentication and direct message authentication. Both of them have some shortcomings and a final hybrid approach, which combines their advantages without inheriting their weaknesses, appears to be quite useful and effective","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128025314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Enhanced privacy in key-exchange protocols by one-time ID 通过一次性ID增强密钥交换协议中的隐私性
K. Imamoto, K. Sakurai
This paper considers how two parties communicate securely over an adversary-controlled network. We especially focus on the problem of ID protection because of the rapid development of mobile network where any transferred message is easily eavesdropped on. We analyze several existing key exchange protocols and point out their problems: e.g. incompleteness of ID protection and vulnerability to DoS attacks. Then we model the notion of ID protection and construct a protocol with provable security
本文考虑了双方如何在对手控制的网络上安全通信。由于移动网络的快速发展,任何传输的信息都很容易被窃听,因此我们特别关注ID保护问题。分析了现有的几种密钥交换协议,指出了它们存在的问题,如身份保护不完备、易受DoS攻击等。然后对身份保护的概念进行了建模,构造了一个具有可证明安全性的协议
{"title":"Enhanced privacy in key-exchange protocols by one-time ID","authors":"K. Imamoto, K. Sakurai","doi":"10.1109/SECPERU.2006.9","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.9","url":null,"abstract":"This paper considers how two parties communicate securely over an adversary-controlled network. We especially focus on the problem of ID protection because of the rapid development of mobile network where any transferred message is easily eavesdropped on. We analyze several existing key exchange protocols and point out their problems: e.g. incompleteness of ID protection and vulnerability to DoS attacks. Then we model the notion of ID protection and construct a protocol with provable security","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132130724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of TruMan, a trust manager component for distributed systems 分布式系统信任管理器TruMan的设计与实现
V. Casola, L. Coppolino, A. Mazzeo, N. Mazzocca, M. Rak
Obtaining a measure of the trustability of a system in an open environment is a difficult task since trust concepts involve different quality criteria including non-technological aspects. Quality criteria and, above all, security mechanisms are commonly characterized by means of a set of statements making part of a policy. We are working on an evaluation methodology allowing automatic management for semi-formal policies and in this paper we propose a trust manager architecture (TruMan) enabling our methodology and an implementation of such architecture. We also present a proof-of-concept case study where TruMan is adopted in the context of service oriented architectures
在开放环境中获得系统的可信度度量是一项困难的任务,因为信任概念涉及不同的质量标准,包括非技术方面。质量标准,尤其是安全机制,通常通过一组构成策略一部分的声明来表征。我们正在研究一种评估方法,允许对半正式策略进行自动管理,在本文中,我们提出了一种信任管理器体系结构(TruMan),支持我们的方法和这种体系结构的实现。我们还提供了一个概念验证案例研究,其中在面向服务的体系结构上下文中采用了TruMan
{"title":"Design and implementation of TruMan, a trust manager component for distributed systems","authors":"V. Casola, L. Coppolino, A. Mazzeo, N. Mazzocca, M. Rak","doi":"10.1109/SECPERU.2006.7","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.7","url":null,"abstract":"Obtaining a measure of the trustability of a system in an open environment is a difficult task since trust concepts involve different quality criteria including non-technological aspects. Quality criteria and, above all, security mechanisms are commonly characterized by means of a set of statements making part of a policy. We are working on an evaluation methodology allowing automatic management for semi-formal policies and in this paper we propose a trust manager architecture (TruMan) enabling our methodology and an implementation of such architecture. We also present a proof-of-concept case study where TruMan is adopted in the context of service oriented architectures","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128233557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
iHIDE: hiding sources of information in WSNs iHIDE:隐藏wsn中的信息源
L. Kazatzopoulos, C. Delakouridis, G. Marias, P. Georgiadis
In the most deployment scenarios of wireless sensor networks (WSNs) the sensors are statically distributed and configured to propagate the captured information towards the sink-sensor. This information might be unclassified, such as environmental data, or private, such as the location of an important asset. In the latter case, security mechanisms might be essential to ensure the confidentiality of the location of the information source. Such mechanisms might exploit light cryptographic systems, such us elliptic curve, to authenticate and cipher the information that is relayed towards the sink. On the other hand, the static configuration of WSNs might simplify the apocalypses of the information source. An eavesdropper might use reverse packet-routing engineering to expose the location of the sensor that captured and reported the phenomenon. To deal with this issue, we have introduced a novel approach, called iHIDE - information hiding in distributing environments, to enable source-location privacy in WSNs. iHIDE adopts a non-geographical, overlay routing method for packet delivery. This paper introduces the architecture, and assesses its performance through simulation experiments, providing comparisons with relative approaches
在大多数无线传感器网络(wsn)的部署场景中,传感器是静态分布的,并配置为将捕获的信息传播到接收器传感器。这些信息可能是非机密的,如环境数据,也可能是私有的,如重要资产的位置。在后一种情况下,安全机制对于确保信息源位置的机密性可能是必不可少的。这种机制可能利用轻密码系统,如椭圆曲线,来验证和加密传递给接收器的信息。另一方面,无线传感器网络的静态配置可以简化信息源的配置。窃听者可能会使用反向分组路由工程来暴露捕获和报告该现象的传感器的位置。为了解决这个问题,我们引入了一种新的方法,称为iHIDE -分布环境中的信息隐藏,以实现wsn中的源位置隐私。iHIDE采用一种非地理的、覆盖的路由方式进行分组传递。本文介绍了该方法的体系结构,并通过仿真实验对其性能进行了评估,与相关方法进行了比较
{"title":"iHIDE: hiding sources of information in WSNs","authors":"L. Kazatzopoulos, C. Delakouridis, G. Marias, P. Georgiadis","doi":"10.1109/SECPERU.2006.11","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.11","url":null,"abstract":"In the most deployment scenarios of wireless sensor networks (WSNs) the sensors are statically distributed and configured to propagate the captured information towards the sink-sensor. This information might be unclassified, such as environmental data, or private, such as the location of an important asset. In the latter case, security mechanisms might be essential to ensure the confidentiality of the location of the information source. Such mechanisms might exploit light cryptographic systems, such us elliptic curve, to authenticate and cipher the information that is relayed towards the sink. On the other hand, the static configuration of WSNs might simplify the apocalypses of the information source. An eavesdropper might use reverse packet-routing engineering to expose the location of the sensor that captured and reported the phenomenon. To deal with this issue, we have introduced a novel approach, called iHIDE - information hiding in distributing environments, to enable source-location privacy in WSNs. iHIDE adopts a non-geographical, overlay routing method for packet delivery. This paper introduces the architecture, and assesses its performance through simulation experiments, providing comparisons with relative approaches","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116092182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Pervasive trusted computing 普及可信计算
S. Balfe, Shiqun Li, Jianying Zhou
This paper analyses the role trusted computing can play in a pervasive/ubiquitous environment. Traditionally, the ideology of Weiser (1991) and others when considering the pervasive computing vista, dictated that computers would invisibly integrate themselves into the background environment, providing useful services to users, as well as contextual information as to their surroundings. While mindful of this invisibility property, we examine trusted computing as a component of devices that themselves hold the promise of ubiquity. In this respect, we examine a contrived application scenario in order to abstract a number of useful properties trusted computing can provide in a pervasive setting
本文分析了可信计算在普适/泛在环境中所扮演的角色。传统上,Weiser(1991)和其他人在考虑普适计算远景时的意识形态规定,计算机将无形地将自己集成到背景环境中,为用户提供有用的服务,以及与周围环境相关的上下文信息。在注意到这种不可见性的同时,我们将可信计算作为设备的一个组成部分进行研究,这些设备本身具有无处不在的前景。在这方面,我们将研究一个人为的应用程序场景,以便抽象可信计算在普及设置中可以提供的许多有用属性
{"title":"Pervasive trusted computing","authors":"S. Balfe, Shiqun Li, Jianying Zhou","doi":"10.1109/SECPERU.2006.14","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.14","url":null,"abstract":"This paper analyses the role trusted computing can play in a pervasive/ubiquitous environment. Traditionally, the ideology of Weiser (1991) and others when considering the pervasive computing vista, dictated that computers would invisibly integrate themselves into the background environment, providing useful services to users, as well as contextual information as to their surroundings. While mindful of this invisibility property, we examine trusted computing as a component of devices that themselves hold the promise of ubiquity. In this respect, we examine a contrived application scenario in order to abstract a number of useful properties trusted computing can provide in a pervasive setting","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128872001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A conceptual architecture of a trusted mobile environment 可信移动环境的概念架构
Zheng Yan
Trust is crucial in mobile communications. How to establish a trusted mobile environment is becoming more and more important for mobile device venders, mobile service providers and mobile networking operators. This paper presents a conceptual architecture towards establishing a trusted mobile environment. The contribution of this paper is a) specifying the architecture of a trusted mobile environment; b) by developing the conceptual architecture, explaining key motivations behind the location of every element in the architecture; and c) evaluating the architecture by applying it into a mobile peer-to-peer system
信任在移动通信中至关重要。如何建立一个可信的移动环境对移动设备供应商、移动服务提供商和移动网络运营商来说变得越来越重要。本文提出了一个建立可信移动环境的概念架构。本文的贡献是a)指定可信移动环境的体系结构;B)通过开发概念架构,解释架构中每个元素位置背后的关键动机;c)通过将其应用于移动点对点系统来评估该体系结构
{"title":"A conceptual architecture of a trusted mobile environment","authors":"Zheng Yan","doi":"10.1109/SECPERU.2006.1","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.1","url":null,"abstract":"Trust is crucial in mobile communications. How to establish a trusted mobile environment is becoming more and more important for mobile device venders, mobile service providers and mobile networking operators. This paper presents a conceptual architecture towards establishing a trusted mobile environment. The contribution of this paper is a) specifying the architecture of a trusted mobile environment; b) by developing the conceptual architecture, explaining key motivations behind the location of every element in the architecture; and c) evaluating the architecture by applying it into a mobile peer-to-peer system","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122434325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An effective approach for accurate estimation of trust of distant information sources in the semantic Web 语义Web中远程信息源信任的一种有效估计方法
Vangelis G. Bintzios, Thanasis G. Papaioannou, G. Stamoulis
To assess the trustworthiness of the information published in the World Wide Web referrals are often employed. This is due to the fact that most information sources are visited only occasionally by the same client, and thus, direct own experience rarely suffices. The accuracy of trust inference for unknown information sources may considerably deteriorate due to "noise" or to the intervention of malicious nodes producing and propagating untrustworthy referrals. In this paper, we describe an innovative approach for trust inference in the semantic Web and in trust networks in general, referred to as FACiLE (faith assessment combining last edges). Unlike all other approaches, FACilE infers a trust value for an information source from a proper combination of only the direct trust values of its neighbours. We evaluate the efficiency of our approach by means of a series of simulation experiments run for a wide variety of mixes of sources of untrustworthy information. FACiLE outperforms other trust-inference approach in the most interesting cases of population mixes
为了评估在万维网上发布的信息的可信度,通常采用推荐。这是因为大多数信息源只是偶尔由同一客户访问,因此,直接的个人经验很少足够。由于“噪声”或恶意节点产生和传播不可信引用的干预,对未知信息源的信任推理的准确性可能会大大降低。在本文中,我们描述了一种用于语义Web和一般信任网络中的信任推理的创新方法,称为FACiLE(结合最后边的信任评估)。与所有其他方法不同,FACilE仅从其邻居的直接信任值的适当组合中推断出信息源的信任值。我们通过一系列模拟实验来评估我们的方法的效率,这些实验运行于各种各样的不可信信息来源的混合中。在最有趣的人口混合情况下,FACiLE优于其他信任推理方法
{"title":"An effective approach for accurate estimation of trust of distant information sources in the semantic Web","authors":"Vangelis G. Bintzios, Thanasis G. Papaioannou, G. Stamoulis","doi":"10.1109/SECPERU.2006.4","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.4","url":null,"abstract":"To assess the trustworthiness of the information published in the World Wide Web referrals are often employed. This is due to the fact that most information sources are visited only occasionally by the same client, and thus, direct own experience rarely suffices. The accuracy of trust inference for unknown information sources may considerably deteriorate due to \"noise\" or to the intervention of malicious nodes producing and propagating untrustworthy referrals. In this paper, we describe an innovative approach for trust inference in the semantic Web and in trust networks in general, referred to as FACiLE (faith assessment combining last edges). Unlike all other approaches, FACilE infers a trust value for an information source from a proper combination of only the direct trust values of its neighbours. We evaluate the efficiency of our approach by means of a series of simulation experiments run for a wide variety of mixes of sources of untrustworthy information. FACiLE outperforms other trust-inference approach in the most interesting cases of population mixes","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"303 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113959044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal Processors 标准非对称和对称密码算法在TI信号处理器上的实现
M. Marković, G. Dordevic
In this work, possible optimization techniques for realization of asymmetrical and symmetrical standard cryptographic algorithms on assembler of Texas Instruments TMS320C54x family of digital signal processors are considered. Optimization of RSA asymmetrical, as well as IDEA and AES (Rijndael) symmetrical algorithms are evaluated. Possible optimization techniques for RSA algorithm are related to multiplication, modular reduction and RSA private key operation procedures. We have modified the original Karatsuba-Offman's algorithm and obtain a less recursive algorithm and use it for possible optimization. A cryptographic throughput and a speed of the signal processor's realization of IDEA and AES symmetrical algorithms in ECB mode are also analyzed. Besides, an optimization procedure in AES algorithm using specific tables is also discussed. Obtained results show that the TMS320C54x family of signal processors is suitable for the standard asymmetrical and symmetrical algorithms' realization
在这项工作中,考虑了在德州仪器TMS320C54x系列数字信号处理器汇编器上实现非对称和对称标准密码算法的可能优化技术。对RSA非对称算法、IDEA和AES (Rijndael)对称算法的优化进行了评价。RSA算法可能的优化技术涉及乘法、模约和RSA私钥操作程序。我们修改了原来的Karatsuba-Offman算法,得到了一个递归较小的算法,并将其用于可能的优化。分析了ECB模式下IDEA和AES对称算法的加密吞吐量和信号处理器的实现速度。此外,还讨论了使用特定表对AES算法进行优化的过程。结果表明,TMS320C54x系列信号处理器适用于标准的非对称和对称算法的实现
{"title":"On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal Processors","authors":"M. Marković, G. Dordevic","doi":"10.1109/SECPERU.2006.12","DOIUrl":"https://doi.org/10.1109/SECPERU.2006.12","url":null,"abstract":"In this work, possible optimization techniques for realization of asymmetrical and symmetrical standard cryptographic algorithms on assembler of Texas Instruments TMS320C54x family of digital signal processors are considered. Optimization of RSA asymmetrical, as well as IDEA and AES (Rijndael) symmetrical algorithms are evaluated. Possible optimization techniques for RSA algorithm are related to multiplication, modular reduction and RSA private key operation procedures. We have modified the original Karatsuba-Offman's algorithm and obtain a less recursive algorithm and use it for possible optimization. A cryptographic throughput and a speed of the signal processor's realization of IDEA and AES symmetrical algorithms in ECB mode are also analyzed. Besides, an optimization procedure in AES algorithm using specific tables is also discussed. Obtained results show that the TMS320C54x family of signal processors is suitable for the standard asymmetrical and symmetrical algorithms' realization","PeriodicalId":174651,"journal":{"name":"Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128177677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1