首页 > 最新文献

2008 International Conference on Information Security and Assurance (isa 2008)最新文献

英文 中文
Collaborative Privacy Management System 协同隐私管理系统
Injoo Jang, Wenbo Shi, H. Yoo
In this paper, we consider a problem of monopolistic information management technologies. Most service providers have an access to any information. Even though the information is really a personal data, service providers can access with it merely with the user's first subscription. A collaborative privacy management system (Co- PMS) is suggested to satisfy the requirement. In this scheme, each user will provide ones own privacy policy by using a policy creation interface. The policy negotiation engine performs collaborative process with the certain service's data disclosure policy. This architecture provides more powerful right to each user to access ones own privacy policy and personal information. It also reinforces the security because of diverse privacy policy. It will develop the privacy policy based on security systems. We also expect the encrypted privacy policy to be used as an authentication certification.
本文研究了一个垄断信息管理技术问题。大多数服务提供者都可以访问任何信息。即使这些信息确实是个人数据,服务提供商也可以通过用户的第一次订阅来访问它。为了满足这一需求,提出了一种协同隐私管理系统(Co- PMS)。在该方案中,每个用户将通过使用策略创建接口提供自己的隐私策略。策略协商引擎与特定服务的数据公开策略执行协作流程。该体系结构为每个用户提供了更强大的权限来访问自己的隐私策略和个人信息。它还加强了安全性,因为多样化的隐私政策。它将制定基于安全系统的隐私政策。我们还期望将加密的隐私策略用作身份验证认证。
{"title":"Collaborative Privacy Management System","authors":"Injoo Jang, Wenbo Shi, H. Yoo","doi":"10.1109/ISA.2008.55","DOIUrl":"https://doi.org/10.1109/ISA.2008.55","url":null,"abstract":"In this paper, we consider a problem of monopolistic information management technologies. Most service providers have an access to any information. Even though the information is really a personal data, service providers can access with it merely with the user's first subscription. A collaborative privacy management system (Co- PMS) is suggested to satisfy the requirement. In this scheme, each user will provide ones own privacy policy by using a policy creation interface. The policy negotiation engine performs collaborative process with the certain service's data disclosure policy. This architecture provides more powerful right to each user to access ones own privacy policy and personal information. It also reinforces the security because of diverse privacy policy. It will develop the privacy policy based on security systems. We also expect the encrypted privacy policy to be used as an authentication certification.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132291086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine 用本地引导的虚拟机隐式检测隐藏进程
Yan Wen, Jinjing Zhao, Huaimin Wang
Currently stealth malware is becoming a major threat to the PC computers. Process hiding is the technique commonly used by stealth malware to evade detection by anti-malware scanners. On the defensive side, previous host-based approaches will be defeated once the privileged stealth malware controls a lower reach of the system. The virtual machine (VM) based solutions gain tamper resistance at the cost of losing the OS-level process view. Moreover, existing VM-based approaches cannot introspect the preinstalled OS which is just the protecting concern for PC users. In this paper, we present a new VM-based approach called Libra which accurately reproduces the software environment of the underlying preinstalled OS within the Libra VM and provides an OS-level semantic view of the processes. With our new local-booting technology, Libra VM just boots from the underlying host OS but not a newly installed OS image. Thus, Libra provides a way to detect the existing process-hiding stealth malware in the host OS. In addition, instead of depending on the guest information which is subvertable to the privileged guest malware, Libra adopts a unique technique to implicitly construct the trusted view of process list (TVPL) from within the virtualized hardware layer. Our evaluation results with real-world hiding-process rootkits, which are widely used by stealth malware, demonstrate its practicality and effectiveness.
目前,隐形恶意软件正成为个人电脑的主要威胁。进程隐藏是隐形恶意软件通常使用的技术,以逃避反恶意软件扫描器的检测。在防御方面,一旦特权隐身恶意软件控制了系统的较低范围,以前基于主机的方法将被击败。基于虚拟机(VM)的解决方案以失去操作系统级进程视图为代价获得了抗篡改能力。此外,现有的基于虚拟机的方法无法对预安装的操作系统进行内省,这只是对PC用户的保护问题。在本文中,我们提出了一种名为Libra的基于虚拟机的新方法,该方法准确地再现了Libra虚拟机中底层预装操作系统的软件环境,并提供了操作系统级别的进程语义视图。通过我们新的本地启动技术,Libra VM只从底层主机操作系统启动,而不是从新安装的操作系统映像启动。因此,Libra提供了一种检测主机操作系统中现有进程隐藏隐形恶意软件的方法。此外,Libra采用了一种独特的技术,从虚拟化硬件层内隐式地构建进程列表可信视图(TVPL),而不是依赖于可被特权客户恶意软件颠覆的客户信息。我们对隐身恶意软件广泛使用的真实隐藏过程rootkit进行了评估,结果证明了其实用性和有效性。
{"title":"Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine","authors":"Yan Wen, Jinjing Zhao, Huaimin Wang","doi":"10.1109/ISA.2008.22","DOIUrl":"https://doi.org/10.1109/ISA.2008.22","url":null,"abstract":"Currently stealth malware is becoming a major threat to the PC computers. Process hiding is the technique commonly used by stealth malware to evade detection by anti-malware scanners. On the defensive side, previous host-based approaches will be defeated once the privileged stealth malware controls a lower reach of the system. The virtual machine (VM) based solutions gain tamper resistance at the cost of losing the OS-level process view. Moreover, existing VM-based approaches cannot introspect the preinstalled OS which is just the protecting concern for PC users. In this paper, we present a new VM-based approach called Libra which accurately reproduces the software environment of the underlying preinstalled OS within the Libra VM and provides an OS-level semantic view of the processes. With our new local-booting technology, Libra VM just boots from the underlying host OS but not a newly installed OS image. Thus, Libra provides a way to detect the existing process-hiding stealth malware in the host OS. In addition, instead of depending on the guest information which is subvertable to the privileged guest malware, Libra adopts a unique technique to implicitly construct the trusted view of process list (TVPL) from within the virtualized hardware layer. Our evaluation results with real-world hiding-process rootkits, which are widely used by stealth malware, demonstrate its practicality and effectiveness.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123516975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Performance Analysis of STBC Based on STTC System 基于STTC系统的STBC性能分析
Chul-Gyu Kang, Chang-Heon Oh
Multi-path fading is a significant problem in wireless communication systems. Therefore, we need a reliable system to overcome the multi-path fading. In this paper, we proposed the use of a STBC based on a STTC system to improve the reliability of wireless communication systems in multi-path fading environments. We also analyzed the performance of the proposed system and found it efficient. The proposed system was able to acquire not only a diversity gain and coding gain from the STTC system, but also a diversity gain from the STBC system without stimulating an additional channel bandwidth. Furthermore, the simulation results matched the theoretical Chernoff upper bound well, particularly in the high Eb/N0.
多径衰落是无线通信系统中的一个重要问题。因此,我们需要一个可靠的系统来克服多径衰落。为了提高多径衰落环境下无线通信系统的可靠性,本文提出在STTC系统的基础上使用STBC。我们还分析了该系统的性能,发现它是有效的。该系统不仅可以从STTC系统获得分集增益和编码增益,还可以在不增加额外信道带宽的情况下从STBC系统获得分集增益。此外,模拟结果与理论Chernoff上界吻合较好,特别是在高Eb/N0区域。
{"title":"Performance Analysis of STBC Based on STTC System","authors":"Chul-Gyu Kang, Chang-Heon Oh","doi":"10.1109/ISA.2008.81","DOIUrl":"https://doi.org/10.1109/ISA.2008.81","url":null,"abstract":"Multi-path fading is a significant problem in wireless communication systems. Therefore, we need a reliable system to overcome the multi-path fading. In this paper, we proposed the use of a STBC based on a STTC system to improve the reliability of wireless communication systems in multi-path fading environments. We also analyzed the performance of the proposed system and found it efficient. The proposed system was able to acquire not only a diversity gain and coding gain from the STTC system, but also a diversity gain from the STBC system without stimulating an additional channel bandwidth. Furthermore, the simulation results matched the theoretical Chernoff upper bound well, particularly in the high Eb/N0.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128313023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
S3PR: Secure Serverless Search Protocols for RFID RFID的安全无服务器搜索协议
S. Ahamed, F. Rahman, E. Hoque, F. Kawsar, T. Nakajima
For RFID tags to proliferate in our day to day life, they will have to offer practical, low cost and secured mechanisms for tag authentication which has been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. In this paper we propose a lightweight and serverless RFID tag searching protocol. This protocol can search a particular tag efficiently without server's intervention. Furthermore they are secured against major security threats.
为了使RFID标签在我们的日常生活中普及,他们必须提供实用、低成本和安全的标签认证机制,这已经成为研究人员近十年来的兴趣。RFID身份认证的一个扩展是RFID标签搜索,但目前还没有得到足够的重视。但我们坚信,在不久的将来,标签搜索将是一个重要的问题。本文提出了一种轻量级、无服务器的RFID标签搜索协议。该协议可以在不需要服务器干预的情况下高效地搜索特定标签。此外,它们还能抵御重大安全威胁。
{"title":"S3PR: Secure Serverless Search Protocols for RFID","authors":"S. Ahamed, F. Rahman, E. Hoque, F. Kawsar, T. Nakajima","doi":"10.1109/ISA.2008.70","DOIUrl":"https://doi.org/10.1109/ISA.2008.70","url":null,"abstract":"For RFID tags to proliferate in our day to day life, they will have to offer practical, low cost and secured mechanisms for tag authentication which has been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. In this paper we propose a lightweight and serverless RFID tag searching protocol. This protocol can search a particular tag efficiently without server's intervention. Furthermore they are secured against major security threats.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127290523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Foot Step Based Person Identification Using Histogram Similarity and Wavelet Decomposition 基于直方图相似度和小波分解的脚步声识别
A. Mostayed, Sikyung Kim, M.M. Gani Mazumder, Se Jin Park
Research in person identification and authentication has attracted significant attention from the researchers and scientists. This paper presents a biometric user authentication based on a person's foot step. The advantage of this recognition method over other types of biometrics is that it enables unobtrusive user authentication where other types of biometrics are not available. Firstly the ground reaction force data was extracted using force plate to gather ground reaction force for individuals. Later we utilized the discrete wavelet transform to de-noise the experimental data and in the final step, histograms were used to identify different person's foot step. The experimental results show improvements in identification accuracies compared to previously reported work.
人身识别与身份认证的研究已经引起了研究者和科学家们的极大关注。提出了一种基于人的脚步特征的生物识别用户认证方法。与其他类型的生物识别技术相比,这种识别方法的优点是,在其他类型的生物识别技术不可用的情况下,它支持不显眼的用户身份验证。首先利用测力板提取地面反力数据,收集个体地面反力;然后利用离散小波变换对实验数据进行去噪处理,最后利用直方图识别不同人的脚步。实验结果表明,与先前报道的工作相比,该方法的识别精度有所提高。
{"title":"Foot Step Based Person Identification Using Histogram Similarity and Wavelet Decomposition","authors":"A. Mostayed, Sikyung Kim, M.M. Gani Mazumder, Se Jin Park","doi":"10.1109/ISA.2008.46","DOIUrl":"https://doi.org/10.1109/ISA.2008.46","url":null,"abstract":"Research in person identification and authentication has attracted significant attention from the researchers and scientists. This paper presents a biometric user authentication based on a person's foot step. The advantage of this recognition method over other types of biometrics is that it enables unobtrusive user authentication where other types of biometrics are not available. Firstly the ground reaction force data was extracted using force plate to gather ground reaction force for individuals. Later we utilized the discrete wavelet transform to de-noise the experimental data and in the final step, histograms were used to identify different person's foot step. The experimental results show improvements in identification accuracies compared to previously reported work.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An Authentication Mechanism of Digital Contents in Pervasive Computing Environment 普适计算环境下数字内容的认证机制
Eun-Gyeom Jang, Byoung-Soo Koh, Yong-Rak Choi
Digital content services in pervasive computing environment provide a vast range of information and rapidly. However, in this environment where various information flow the copyright infringement problems such as modification and fraudulent use of digital content without permission of copyright holder are increased. In this paper, we proposed an original digital content authentication method to protect the intellectual property from such infringements. The proposed mechanism sets the scope of content usage and limits the access privilege to digital content by copyright holder. The modification of digital content and its usage are act of copyright infringement. That is, modification of color and resolution out of the limited scope and partial modification or extraction are part of copyright infringement. Consequently, we proposed a mechanism which proves the fact of trespass by extracting and comparing the similarity of the original and the target content.
普适计算环境下的数字内容服务提供了范围广泛、速度快的信息。然而,在这种多种信息流动的环境下,未经版权所有者许可修改和欺诈使用数字内容等侵犯版权的问题有所增加。在本文中,我们提出了一种原创数字内容认证方法来保护知识产权免受此类侵权。该机制设定了内容的使用范围,并限制了版权持有人对数字内容的访问权限。修改和使用数字内容是侵犯版权的行为。也就是说,超出限定范围的修改色彩和解析度以及部分修改或摘取都属于侵犯著作权的行为。因此,我们提出了一种通过提取和比较原始内容和目标内容的相似性来证明侵权事实的机制。
{"title":"An Authentication Mechanism of Digital Contents in Pervasive Computing Environment","authors":"Eun-Gyeom Jang, Byoung-Soo Koh, Yong-Rak Choi","doi":"10.1109/ISA.2008.35","DOIUrl":"https://doi.org/10.1109/ISA.2008.35","url":null,"abstract":"Digital content services in pervasive computing environment provide a vast range of information and rapidly. However, in this environment where various information flow the copyright infringement problems such as modification and fraudulent use of digital content without permission of copyright holder are increased. In this paper, we proposed an original digital content authentication method to protect the intellectual property from such infringements. The proposed mechanism sets the scope of content usage and limits the access privilege to digital content by copyright holder. The modification of digital content and its usage are act of copyright infringement. That is, modification of color and resolution out of the limited scope and partial modification or extraction are part of copyright infringement. Consequently, we proposed a mechanism which proves the fact of trespass by extracting and comparing the similarity of the original and the target content.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121890210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Parallel GNFS Algorithm with the Improved Linbox Montgomery Block Lanczos Method for Integer Factorization 基于改进Linbox Montgomery Block Lanczos方法的并行GNFS整数分解算法
L. Tianruo Yang, Li Xu, Jong Hyuk Park
RSA algorithm is a very popular public key cryptosystem which has been widely used in industries. Its security relies on the difficulty of factoring large integers. The general number field sieve (GNFS) is so far the best known algorithm for factoring large integers over 110 digits. The Montgomery's block Lanczos method from Linbox is for solving large and sparse linear systems over finite fields and it can be integrated into GNFS algorithm. This paper introduces an improved Montgomery block Lanczos method, based on the version developed in Linbox, integrated with our previously developed parallel GNFS algorithm. This method has a better performance comparing with the original one, can find more solutions or dependencies than the original one with less time complexities. Implementation details and experimental results will be provided as well in the paper as well.
RSA算法是一种非常流行的公钥密码系统,在工业上得到了广泛的应用。它的安全性依赖于分解大整数的难度。通用数字字段筛选(GNFS)是迄今为止最著名的分解超过110位的大整数的算法。Linbox的Montgomery’s block Lanczos方法用于求解有限域上的大型稀疏线性系统,可以集成到GNFS算法中。本文介绍了一种改进的Montgomery block Lanczos方法,该方法基于Linbox开发的版本,并与我们之前开发的并行GNFS算法相结合。与原方法相比,该方法具有更好的性能,可以比原方法找到更多的解或依赖项,且时间复杂度更小。本文还将提供实现细节和实验结果。
{"title":"A Parallel GNFS Algorithm with the Improved Linbox Montgomery Block Lanczos Method for Integer Factorization","authors":"L. Tianruo Yang, Li Xu, Jong Hyuk Park","doi":"10.1109/ISA.2008.113","DOIUrl":"https://doi.org/10.1109/ISA.2008.113","url":null,"abstract":"RSA algorithm is a very popular public key cryptosystem which has been widely used in industries. Its security relies on the difficulty of factoring large integers. The general number field sieve (GNFS) is so far the best known algorithm for factoring large integers over 110 digits. The Montgomery's block Lanczos method from Linbox is for solving large and sparse linear systems over finite fields and it can be integrated into GNFS algorithm. This paper introduces an improved Montgomery block Lanczos method, based on the version developed in Linbox, integrated with our previously developed parallel GNFS algorithm. This method has a better performance comparing with the original one, can find more solutions or dependencies than the original one with less time complexities. Implementation details and experimental results will be provided as well in the paper as well.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model of Sharing Based Multi-Agent to Support Adaptive Service in Ubiquitous Environment 泛在环境下支持自适应服务的基于共享的多智能体模型
Hyogun Yoon, Eungyeong Kim, Malrey Lee, Jeawan Lee, T. Gatton
In order to provide users with intelligent services, ubiquitous computing needs to make user situation analysis in consideration of users' mobility. Thus, this paper defines context structure for recognizing dynamic changes in users' environment and proposes a model of multi-agent for processing users' context. The proposed context structure distinguishes between dynamic and static contexts according to the volume of context change, and defines communication protocols among agents. By doing so, the user can get service for own in dynamic environment.
为了向用户提供智能服务,普适计算需要考虑用户的移动性,进行用户态势分析。为此,本文定义了识别用户环境动态变化的上下文结构,并提出了处理用户上下文的多智能体模型。提出的上下文结构根据上下文的变化量来区分动态上下文和静态上下文,并定义了代理之间的通信协议。通过这种方式,用户可以在动态环境中为自己获得服务。
{"title":"A Model of Sharing Based Multi-Agent to Support Adaptive Service in Ubiquitous Environment","authors":"Hyogun Yoon, Eungyeong Kim, Malrey Lee, Jeawan Lee, T. Gatton","doi":"10.1109/ISA.2008.64","DOIUrl":"https://doi.org/10.1109/ISA.2008.64","url":null,"abstract":"In order to provide users with intelligent services, ubiquitous computing needs to make user situation analysis in consideration of users' mobility. Thus, this paper defines context structure for recognizing dynamic changes in users' environment and proposes a model of multi-agent for processing users' context. The proposed context structure distinguishes between dynamic and static contexts according to the volume of context change, and defines communication protocols among agents. By doing so, the user can get service for own in dynamic environment.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Unified Threat Model for Assessing Threat in Web Applications Web应用威胁评估的统一威胁模型
Xiaohong Li, Ke He
This paper presents a unified threat model for assessing threat in web applications. We extend the threat tree model with more semantic and context information about threat to form the new model which is used to analyze and evaluate threat in the software design stage. We utilize historical statistical information contained in this model to design threat mitigation schemes. The threat assessing results and mitigation schemes can be used to direct secure coding and testing. This makes it possible to design threat-resistant web applications by means of detecting and mitigating threat in the early software design stage.
本文提出了一种统一的web应用威胁评估模型。我们利用更多的威胁语义和上下文信息对威胁树模型进行扩展,形成新的模型,用于软件设计阶段的威胁分析和评估。我们利用该模型中包含的历史统计信息来设计威胁缓解方案。威胁评估结果和缓解方案可用于指导安全编码和测试。这使得在早期软件设计阶段通过检测和减轻威胁来设计抗威胁的web应用程序成为可能。
{"title":"A Unified Threat Model for Assessing Threat in Web Applications","authors":"Xiaohong Li, Ke He","doi":"10.1109/ISA.2008.47","DOIUrl":"https://doi.org/10.1109/ISA.2008.47","url":null,"abstract":"This paper presents a unified threat model for assessing threat in web applications. We extend the threat tree model with more semantic and context information about threat to form the new model which is used to analyze and evaluate threat in the software design stage. We utilize historical statistical information contained in this model to design threat mitigation schemes. The threat assessing results and mitigation schemes can be used to direct secure coding and testing. This makes it possible to design threat-resistant web applications by means of detecting and mitigating threat in the early software design stage.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127746568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Preserving Privacy in Joining Recommender Systems 在加入推荐系统中保护隐私
C.-L.A. Hsieh, J. Zhan, D. Zeng, Feiyue Wang
In the E-commerce era, recommender system is introduced to share customer experience and comments. At the same time, there is a need for E-commerce entities to join their recommender system databases to enhance the reliability toward prospective customers and also to maximize the precision of target marketing. However, there will be a privacy disclosure hazard while joining recommender system databases. In order to preserve privacy in merging recommender system databases, we design a novel algorithm based on ElGamal scheme of homomorphic encryption.
在电子商务时代,引入了推荐系统来分享客户的体验和评论。同时,电子商务实体需要加入其推荐系统数据库,以提高对潜在客户的可靠性,并最大限度地提高目标营销的准确性。然而,在加入推荐系统数据库时会有隐私泄露的危险。为了保护推荐系统数据库合并过程中的隐私,我们设计了一种基于ElGamal同态加密方案的新算法。
{"title":"Preserving Privacy in Joining Recommender Systems","authors":"C.-L.A. Hsieh, J. Zhan, D. Zeng, Feiyue Wang","doi":"10.1109/ISA.2008.101","DOIUrl":"https://doi.org/10.1109/ISA.2008.101","url":null,"abstract":"In the E-commerce era, recommender system is introduced to share customer experience and comments. At the same time, there is a need for E-commerce entities to join their recommender system databases to enhance the reliability toward prospective customers and also to maximize the precision of target marketing. However, there will be a privacy disclosure hazard while joining recommender system databases. In order to preserve privacy in merging recommender system databases, we design a novel algorithm based on ElGamal scheme of homomorphic encryption.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2008 International Conference on Information Security and Assurance (isa 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1