首页 > 最新文献

2009 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
New approaches for intrusion detection based on logs correlation 基于日志关联的入侵检测新方法
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137316
Sayed Omid Azarkasb, S.S. Ghidary
Network administrators are able to correlate log file entries manually. Large volume and low quality of log files justify the need for further log processing. The manual log processing is lack of flexibility. It is time consuming, and one doesn't get the general view of the log files in the network. Without this general view it is hard to correlate information between the network components. Events seemingly unessential by themselves can in reality be a piece of a larger threat. In this regard, different log correlation methods are proposed to improve alert quality and to give a comprehensive view of system security. In this paper, we show how different attacks categorized in three categories with different behavior: Denial of Service (DoS) attacks, User-to-Root (U2R) & Remote-to-Local (R2L) attacks and Probing, are reflected in different logs and argue that some attacks are not evident when a single log is analyzed.
网络管理员可以手动关联日志文件条目。大容量和低质量的日志文件证明需要进一步的日志处理。手工日志处理缺乏灵活性。这很耗时,而且无法获得网络中日志文件的一般视图。如果没有这种总体视图,就很难在网络组件之间关联信息。看似无关紧要的事件本身,实际上可能是更大威胁的一部分。在这方面,提出了不同的日志关联方法,以提高警报质量,并给出了系统安全性的综合视图。在本文中,我们展示了三种不同行为的不同攻击分类:拒绝服务(DoS)攻击,用户到根(U2R)和远程到本地(R2L)攻击和探测,如何反映在不同的日志中,并认为当分析单个日志时,一些攻击并不明显。
{"title":"New approaches for intrusion detection based on logs correlation","authors":"Sayed Omid Azarkasb, S.S. Ghidary","doi":"10.1109/ISI.2009.5137316","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137316","url":null,"abstract":"Network administrators are able to correlate log file entries manually. Large volume and low quality of log files justify the need for further log processing. The manual log processing is lack of flexibility. It is time consuming, and one doesn't get the general view of the log files in the network. Without this general view it is hard to correlate information between the network components. Events seemingly unessential by themselves can in reality be a piece of a larger threat. In this regard, different log correlation methods are proposed to improve alert quality and to give a comprehensive view of system security. In this paper, we show how different attacks categorized in three categories with different behavior: Denial of Service (DoS) attacks, User-to-Root (U2R) & Remote-to-Local (R2L) attacks and Probing, are reflected in different logs and argue that some attacks are not evident when a single log is analyzed.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132520475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Propagation of online news: Dynamic patterns 在线新闻的传播:动态模式
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137321
Youzhong Wang, D. Zeng, Xiaolong Zheng, Fei-Yue Wang
A large portion of online news articles and postings are not originally created but reprinted or re-posted from other online news sources or portals. In this paper, we analyze the dynamics of online news propagation, using a large collection of Chinese online news activity data. We characterize prominent features of online news diffusion and compare them against the spreading patterns of the epidemic. Several critical factors influencing the news propagation process are identified, including the centrality and selectivity of source portals, and event variability.
很大一部分网络新闻文章和帖子不是原创的,而是从其他网络新闻来源或门户网站转载或转贴的。在本文中,我们使用大量的中国网络新闻活动数据来分析网络新闻传播的动态。我们描述了网络新闻传播的突出特征,并将其与疫情的传播模式进行了比较。确定了影响新闻传播过程的几个关键因素,包括源门户的中心性和选择性,以及事件可变性。
{"title":"Propagation of online news: Dynamic patterns","authors":"Youzhong Wang, D. Zeng, Xiaolong Zheng, Fei-Yue Wang","doi":"10.1109/ISI.2009.5137321","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137321","url":null,"abstract":"A large portion of online news articles and postings are not originally created but reprinted or re-posted from other online news sources or portals. In this paper, we analyze the dynamics of online news propagation, using a large collection of Chinese online news activity data. We characterize prominent features of online news diffusion and compare them against the spreading patterns of the epidemic. Several critical factors influencing the news propagation process are identified, including the centrality and selectivity of source portals, and event variability.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126438268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Color image watermarking algorithm in cepstrum domain 倒谱域彩色图像水印算法
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137310
Min-rui Zhang, Yangmei Zhang
A color image watermarking algorithm based on 2-D cepstrum transform is proposed. The proposed method inserts a gray scale image into a color host image. Experimental results show that the proposed algorithm can survive affine transformation, JPEG compression, median filtering, rescaling, rotation, cropping and noise attacks.
提出了一种基于二维倒谱变换的彩色图像水印算法。该方法将灰度图像插入到彩色主图像中。实验结果表明,该算法能够经受仿射变换、JPEG压缩、中值滤波、缩放、旋转、裁剪和噪声攻击。
{"title":"Color image watermarking algorithm in cepstrum domain","authors":"Min-rui Zhang, Yangmei Zhang","doi":"10.1109/ISI.2009.5137310","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137310","url":null,"abstract":"A color image watermarking algorithm based on 2-D cepstrum transform is proposed. The proposed method inserts a gray scale image into a color host image. Experimental results show that the proposed algorithm can survive affine transformation, JPEG compression, median filtering, rescaling, rotation, cropping and noise attacks.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123068356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finding leaders from opinion networks 从意见网络中寻找领导者
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137323
Hengmin Zhou, D. Zeng, Changli Zhang
This paper is motivated to utilize results from opinion mining to facilitate social network analysis. We introduce the concept of Opinion Networks and propose a PageRank-like algorithm, named OpinionRank, to rank the nodes in an opinion network. This proposed approach has been applied to real-world datasets and initial experiments indicate that the sentiment information is helpful for finding leaders of online communities and that the OpinionRank method outperforms benchmark methods that ignore sentiment information.
本文的动机是利用意见挖掘的结果来促进社会网络分析。我们引入了意见网络的概念,并提出了一种类似pagerank的算法,名为OpinionRank,用于对意见网络中的节点进行排名。该方法已应用于现实世界的数据集,初步实验表明,情感信息有助于寻找在线社区的领导者,并且OpinionRank方法优于忽略情感信息的基准方法。
{"title":"Finding leaders from opinion networks","authors":"Hengmin Zhou, D. Zeng, Changli Zhang","doi":"10.1109/ISI.2009.5137323","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137323","url":null,"abstract":"This paper is motivated to utilize results from opinion mining to facilitate social network analysis. We introduce the concept of Opinion Networks and propose a PageRank-like algorithm, named OpinionRank, to rank the nodes in an opinion network. This proposed approach has been applied to real-world datasets and initial experiments indicate that the sentiment information is helpful for finding leaders of online communities and that the OpinionRank method outperforms benchmark methods that ignore sentiment information.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120980132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Injecting a permission-based delegation model to secure web-based workflow systems 注入基于权限的委托模型来保护基于web的工作流系统
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137279
Xiaoran Wang, Coskun Bayrak
Web-based workflow systems have emerged in almost every business because they can support dynamic business processes over heterogeneous computing systems which is the requirement of a modern business. At the same time security and flexibility have become the two most important aspects in those systems. Role-based Access Control has been injected to Web-based workflow systems to control access (without hindering the process), which has greatly facilitated the access control management. However, a high-level user may want to delegate one of his permissions to a member. In this case, a flexible delegation would be required to achieve this functionality. In this research, we investigated the idea of delegation and developed a framework for injecting Permission-based Delegation Model (PBDM(WEB)) to secure Web-based workflow systems. PBDM(WEB) supports Role-based Access Control, flexible permission-based delegation and ability-based delegation, interoperation among multi-domain systems and consistency of authorization.
基于web的工作流系统已经出现在几乎所有业务中,因为它们可以在异构计算系统之上支持动态业务流程,这是现代业务的需求。同时,安全性和灵活性也成为这些系统中最重要的两个方面。将基于角色的访问控制注入到基于web的工作流系统中,在不妨碍流程的情况下实现访问控制,极大地方便了访问控制管理。但是,高级用户可能希望将其权限委托给某个成员。在这种情况下,需要灵活的委托来实现此功能。在这项研究中,我们研究了委托的概念,并开发了一个框架,用于注入基于权限的委托模型(PBDM)来保护基于WEB的工作流系统。PBDM(WEB)支持基于角色的访问控制、灵活的基于权限的授权和基于能力的授权、多域系统间的互操作和授权一致性。
{"title":"Injecting a permission-based delegation model to secure web-based workflow systems","authors":"Xiaoran Wang, Coskun Bayrak","doi":"10.1109/ISI.2009.5137279","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137279","url":null,"abstract":"Web-based workflow systems have emerged in almost every business because they can support dynamic business processes over heterogeneous computing systems which is the requirement of a modern business. At the same time security and flexibility have become the two most important aspects in those systems. Role-based Access Control has been injected to Web-based workflow systems to control access (without hindering the process), which has greatly facilitated the access control management. However, a high-level user may want to delegate one of his permissions to a member. In this case, a flexible delegation would be required to achieve this functionality. In this research, we investigated the idea of delegation and developed a framework for injecting Permission-based Delegation Model (PBDM(WEB)) to secure Web-based workflow systems. PBDM(WEB) supports Role-based Access Control, flexible permission-based delegation and ability-based delegation, interoperation among multi-domain systems and consistency of authorization.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116653704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Practical privacy-preserving protocols for criminal investigations 实用的刑事调查隐私保护协议
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137301
F. Kerschbaum, A. Schaad, Debmalya Biswas
Social Network Analysis (SNA) is now a commonly used tool in criminal investigations, but evidence gathering and analysis is often restricted by data privacy laws. We consider the case where multiple investigators want to collaborate but do not yet have sufficient evidence that justifies a plaintext data exchange. We propose a practical solution that allows an investigator to expand his current view without actually exchanging sensitive private information. The investigator gets a partially anonymized view of the entire social network, while preserving his known view.
社交网络分析(SNA)现在是刑事调查中常用的工具,但证据收集和分析往往受到数据隐私法的限制。我们考虑的情况是,多个调查人员想要合作,但还没有足够的证据证明明文数据交换是合理的。我们提出了一个实用的解决方案,允许调查员在不实际交换敏感私人信息的情况下扩大他目前的观点。调查人员得到了整个社会网络的部分匿名视图,同时保留了他已知的视图。
{"title":"Practical privacy-preserving protocols for criminal investigations","authors":"F. Kerschbaum, A. Schaad, Debmalya Biswas","doi":"10.1109/ISI.2009.5137301","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137301","url":null,"abstract":"Social Network Analysis (SNA) is now a commonly used tool in criminal investigations, but evidence gathering and analysis is often restricted by data privacy laws. We consider the case where multiple investigators want to collaborate but do not yet have sufficient evidence that justifies a plaintext data exchange. We propose a practical solution that allows an investigator to expand his current view without actually exchanging sensitive private information. The investigator gets a partially anonymized view of the entire social network, while preserving his known view.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of impact of variable message signs on traffic surveillance in Kuala Lumpur 吉隆坡可变信息标志对交通监控的影响评估
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137309
A. M. Roshandeh, O. C. Puan
Variable message signs (VMS), also known as changeable message signs (CMS) or dynamic message signs (DMS), are traffic control devices to communicate with motorists. A VMS is generally used to inform motorists the roadway, traffic, or weather conditions. It is also used to display travel times and public service announcements. This study attempts to utilize archived traffic data from the MRR1 freeway area in Kuala Lumpur to assess the accuracy with which VMS display travel time estimates, and driver response to display messages of varying lengths and formatting. Results show that usage of Variable Message Signs reduces the average travel times during the duration of the incident until the clearing of the resulting congestion by a significant amount. Under the presence of VMS, there is a significant shift of people from higher travel times in case of incident to lower travel times. The results demonstrate that VMS has no significant impact on gap but occupancy comes down.
可变信息标志(VMS),也称为可变信息标志(CMS)或动态信息标志(DMS),是一种交通控制装置,用于与驾驶者沟通。VMS通常用于通知驾驶员道路、交通或天气状况。它也被用来显示旅行时间和公共服务公告。本研究试图利用吉隆坡MRR1高速公路区域的存档交通数据来评估VMS显示旅行时间估计的准确性,以及驾驶员对不同长度和格式的显示信息的响应。结果表明,可变消息标志的使用减少了事故期间的平均旅行时间,直到清除造成的拥堵的显著量。在VMS的存在下,人们在发生事故时从较高的出行时间转向较低的出行时间。结果表明,VMS对差距没有显著影响,但占用率下降。
{"title":"Assessment of impact of variable message signs on traffic surveillance in Kuala Lumpur","authors":"A. M. Roshandeh, O. C. Puan","doi":"10.1109/ISI.2009.5137309","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137309","url":null,"abstract":"Variable message signs (VMS), also known as changeable message signs (CMS) or dynamic message signs (DMS), are traffic control devices to communicate with motorists. A VMS is generally used to inform motorists the roadway, traffic, or weather conditions. It is also used to display travel times and public service announcements. This study attempts to utilize archived traffic data from the MRR1 freeway area in Kuala Lumpur to assess the accuracy with which VMS display travel time estimates, and driver response to display messages of varying lengths and formatting. Results show that usage of Variable Message Signs reduces the average travel times during the duration of the incident until the clearing of the resulting congestion by a significant amount. Under the presence of VMS, there is a significant shift of people from higher travel times in case of incident to lower travel times. The results demonstrate that VMS has no significant impact on gap but occupancy comes down.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121779826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Automatically Classifying Documents by Ideological and Organizational Affiliation 按思想和组织归属自动分类文件
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137294
Moshe Koppel, Navot Akiva, Eli Alshech, Kfir Bar
We show how an Arabic language religious-political document can be automatically classified according to the ideological stream and organizational affiliation that it represents. Tests show that our methods achieve near-perfect accuracy.
我们展示了一份阿拉伯语的宗教政治文件是如何根据它所代表的意识形态流和组织隶属关系自动分类的。测试表明,我们的方法达到了近乎完美的准确度。
{"title":"Automatically Classifying Documents by Ideological and Organizational Affiliation","authors":"Moshe Koppel, Navot Akiva, Eli Alshech, Kfir Bar","doi":"10.1109/ISI.2009.5137294","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137294","url":null,"abstract":"We show how an Arabic language religious-political document can be automatically classified according to the ideological stream and organizational affiliation that it represents. Tests show that our methods achieve near-perfect accuracy.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Experiment setup for temporal distributed intrusion detection system on Amazon's elastic compute cloud 基于Amazon弹性计算云的实时分布式入侵检测系统实验设置
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137329
Noah Guilbault, R. Guha
In order to test the proposed distributed intrusion detection system there is a need for sufficient hardware and software in place as to provide a reasonable approximation of the actual conditions that such a system would expect to encounter if deployed in a live environment. These hardware and software requirements are compounded when attempting to test a distributed grid computing system because such systems typically can often scale to the hundreds or even thousands of computers. Even if sufficient hardware is obtainable, the generation of accurate test data accurately depicting normal patterns of network or Internet traffic can provide additional challenges, especially when the data is time sensitive. This paper demonstrates a method by which a distributed grid based IDS can be designed and implemented using virtual servers deployed on Amazon.com's Elastic Compute Cloud service.
为了测试拟议的分布式入侵检测系统,需要有足够的硬件和软件,以提供一个合理的近似实际情况,这种系统在实际环境中部署时可能会遇到的情况。在尝试测试分布式网格计算系统时,这些硬件和软件需求是复杂的,因为这样的系统通常可以扩展到数百甚至数千台计算机。即使有足够的硬件,生成准确描述网络或Internet流量正常模式的准确测试数据也会带来额外的挑战,特别是当数据对时间敏感时。本文演示了一种基于分布式网格的入侵检测系统的设计和实现方法,该方法使用部署在亚马逊弹性计算云服务上的虚拟服务器。
{"title":"Experiment setup for temporal distributed intrusion detection system on Amazon's elastic compute cloud","authors":"Noah Guilbault, R. Guha","doi":"10.1109/ISI.2009.5137329","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137329","url":null,"abstract":"In order to test the proposed distributed intrusion detection system there is a need for sufficient hardware and software in place as to provide a reasonable approximation of the actual conditions that such a system would expect to encounter if deployed in a live environment. These hardware and software requirements are compounded when attempting to test a distributed grid computing system because such systems typically can often scale to the hundreds or even thousands of computers. Even if sufficient hardware is obtainable, the generation of accurate test data accurately depicting normal patterns of network or Internet traffic can provide additional challenges, especially when the data is time sensitive. This paper demonstrates a method by which a distributed grid based IDS can be designed and implemented using virtual servers deployed on Amazon.com's Elastic Compute Cloud service.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121250511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Enforcing IRM security policies: Two case studies 实施IRM安全策略:两个案例研究
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137306
Micah Jones, Kevin W. Hamlen
SPoX (Security Policy XML) is a declarative language for specifying application security policies for enforcement by In-lined Reference Monitors. Two case studies are presented that demonstrate how this language can be used to effectively enforce application-specific security policies for untrusted Java applications in the absence of source code.
SPoX(安全策略XML)是一种声明性语言,用于指定内联引用监视器执行的应用程序安全策略。本文提供了两个案例研究,演示了在没有源代码的情况下,如何使用这种语言对不受信任的Java应用程序有效地实施特定于应用程序的安全策略。
{"title":"Enforcing IRM security policies: Two case studies","authors":"Micah Jones, Kevin W. Hamlen","doi":"10.1109/ISI.2009.5137306","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137306","url":null,"abstract":"SPoX (Security Policy XML) is a declarative language for specifying application security policies for enforcement by In-lined Reference Monitors. Two case studies are presented that demonstrate how this language can be used to effectively enforce application-specific security policies for untrusted Java applications in the absence of source code.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2009 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1