首页 > 最新文献

2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)最新文献

英文 中文
Generating Targeted Attack Scenarios against Availability for Critical Infrastructures 针对关键基础设施可用性生成针对性攻击场景
Yi-Ching Liao
Attack and defense are both essential to information security. Focusing on critical infrastructures, we aim to generate targeted attack scenarios against availability for attack, and propose corresponding monitoring and detection deployment for defense. We start with producing an asset inventory automatically with an open-source network exploration and security auditing tool, and assess vulnerabilities for each asset with open-source intelligence. With vulnerability metrics, we can construct more exploitable attack scenarios with the most impact on availability. With the adversary techniques derived from real-world incidents and attacks, we can construct more realistic attack scenarios integrated with industrial control systems. With current security advisories, we can construct more targeted attack scenarios against specific critical infrastructure sectors. As a result, we can propose proactive monitoring and timely detection deployment across all levels of the PURDUE model in order of the sequences of kill chain phases for defense.
信息安全要攻防并举。针对关键基础设施,针对可攻击性生成针对性的攻击场景,并提出相应的监控和检测部署进行防御。我们首先使用开源网络探索和安全审计工具自动生成资产清单,并使用开源智能评估每个资产的漏洞。使用漏洞度量,我们可以构建对可用性影响最大的更具可利用性的攻击场景。利用源自真实事件和攻击的攻击技术,我们可以构建与工业控制系统集成的更真实的攻击场景。有了当前的安全建议,我们可以针对特定的关键基础设施部门构建更有针对性的攻击场景。因此,我们可以按照防御杀伤链阶段的顺序,在PURDUE模型的各个层次上提出主动监测和及时检测部署。
{"title":"Generating Targeted Attack Scenarios against Availability for Critical Infrastructures","authors":"Yi-Ching Liao","doi":"10.1109/CMI53512.2021.9663753","DOIUrl":"https://doi.org/10.1109/CMI53512.2021.9663753","url":null,"abstract":"Attack and defense are both essential to information security. Focusing on critical infrastructures, we aim to generate targeted attack scenarios against availability for attack, and propose corresponding monitoring and detection deployment for defense. We start with producing an asset inventory automatically with an open-source network exploration and security auditing tool, and assess vulnerabilities for each asset with open-source intelligence. With vulnerability metrics, we can construct more exploitable attack scenarios with the most impact on availability. With the adversary techniques derived from real-world incidents and attacks, we can construct more realistic attack scenarios integrated with industrial control systems. With current security advisories, we can construct more targeted attack scenarios against specific critical infrastructure sectors. As a result, we can propose proactive monitoring and timely detection deployment across all levels of the PURDUE model in order of the sequences of kill chain phases for defense.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134328177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Saving the web by decentralizing data networks? A socio-technical reflection on the promise of decentralization and personal data stores 通过分散数据网络来拯救网络?对去中心化和个人数据存储前景的社会技术反思
P. Mechant, Ralf De Wolf, M. Van Compernolle, Glen Joris, Tom Evens, L. De Marez
In this article we elaborate on Personal Information Management Systems (PIMS) or Personal Data Stores (PDS) that provide a person with affordances for managing his/her personal data, giving him/her granular control over the data captured about him/her, and over how that data is shared and used. We examine the promise of PDS-enabled data cooperatives from a socio-technical approach by critically unpacking the current discourse on data activism and related concepts such as data cooperatives, data collaboratives or data bazaars in the context of PDSs. We highlight critical reflections on user empowerment, power symmetries and user appropriation. While we see promise in a collective approach to the management of (personal) data, as it may reorient markets and change who benefits from datafication, we point out that further research into the potential obstacles or hurdles that hinder the implementation of data cooperatives in a PDS-ecology and into what consumers think about these and other possible data management models, is needed.
在本文中,我们将详细介绍个人信息管理系统(PIMS)或个人数据存储(PDS),它们为个人提供管理个人数据的功能,使他/她能够细粒度地控制所捕获的关于他/她的数据,以及如何共享和使用这些数据。我们通过批判性地解析当前关于数据行动主义和相关概念(如数据合作社、数据协作或数据集市)的论述,从社会技术的角度审视了pds支持的数据合作社的前景。我们强调对用户授权、权力对称和用户挪用的批判性反思。虽然我们看到了集体管理(个人)数据的前景,因为它可能会重新定位市场并改变谁从数据化中受益,但我们指出,需要进一步研究阻碍在pds生态中实施数据合作社的潜在障碍或障碍,以及消费者对这些和其他可能的数据管理模式的看法。
{"title":"Saving the web by decentralizing data networks? A socio-technical reflection on the promise of decentralization and personal data stores","authors":"P. Mechant, Ralf De Wolf, M. Van Compernolle, Glen Joris, Tom Evens, L. De Marez","doi":"10.1109/cmi53512.2021.9663788","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663788","url":null,"abstract":"In this article we elaborate on Personal Information Management Systems (PIMS) or Personal Data Stores (PDS) that provide a person with affordances for managing his/her personal data, giving him/her granular control over the data captured about him/her, and over how that data is shared and used. We examine the promise of PDS-enabled data cooperatives from a socio-technical approach by critically unpacking the current discourse on data activism and related concepts such as data cooperatives, data collaboratives or data bazaars in the context of PDSs. We highlight critical reflections on user empowerment, power symmetries and user appropriation. While we see promise in a collective approach to the management of (personal) data, as it may reorient markets and change who benefits from datafication, we point out that further research into the potential obstacles or hurdles that hinder the implementation of data cooperatives in a PDS-ecology and into what consumers think about these and other possible data management models, is needed.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132718195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Issues in SMTP-based Email Systems 基于smtp的电子邮件系统中的安全问题
Bo Holst-Christensen, Erik Frokjar
The SMTP standard was originally published in 1982 and has since then become one of the mostly used methods for data communication. Since its publication the standard has been modified with many extensions intended to handle security issues. A selection of the most common security issues that surfaces when these extensions are used in practice is identified and discussed in relation to confidentiality, integrity, availability, and authentication. The complexity of the current situation makes it clear why organizations, mail service providers, and users have great difficulty in securely managing their email systems. Most email systems are vulnerable and cause serious security risks for individuals, organizations, and societies. The risks have grown to be critical for the digitization of our societies.
SMTP标准最初于1982年发布,从那时起就成为数据通信最常用的方法之一。自发布以来,该标准已经被修改了许多旨在处理安全问题的扩展。本文从保密性、完整性、可用性和身份验证等方面确定并讨论了在实践中使用这些扩展时出现的一些最常见的安全问题。当前形势的复杂性清楚地说明了为什么组织、邮件服务提供商和用户在安全管理其电子邮件系统方面存在很大困难。大多数电子邮件系统都是脆弱的,给个人、组织和社会带来了严重的安全风险。这些风险已经变得对我们社会的数字化至关重要。
{"title":"Security Issues in SMTP-based Email Systems","authors":"Bo Holst-Christensen, Erik Frokjar","doi":"10.1109/cmi53512.2021.9663741","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663741","url":null,"abstract":"The SMTP standard was originally published in 1982 and has since then become one of the mostly used methods for data communication. Since its publication the standard has been modified with many extensions intended to handle security issues. A selection of the most common security issues that surfaces when these extensions are used in practice is identified and discussed in relation to confidentiality, integrity, availability, and authentication. The complexity of the current situation makes it clear why organizations, mail service providers, and users have great difficulty in securely managing their email systems. Most email systems are vulnerable and cause serious security risks for individuals, organizations, and societies. The risks have grown to be critical for the digitization of our societies.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"39 1 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126138289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Public values and the interests of big tech companies: The case of the Austrian Contact Tracing App Stopp Corona 公共价值观和大型科技公司的利益:奥地利联系人追踪应用程序Stopp Corona的案例
V. Steinkogler
In April 2020, at the beginning of the COVID-19 pandemic, the Austrian Red Cross announced it was encouraging a cooperation with Google and Apple’s Exposure Notification Framework to develop the so-called Stopp Corona app – a contact tracing app which would support health personnel in monitoring the spread of the virus to prevent new infections [1]. The involvement of Google and Apple to support combating a public health emergency fuelled controversy over addressing profit-driven private interests at the expense of public values. Concerns have been raised about the dominant position of US based big tech companies in political decision concerning public values. This research investigates how public values are safeguarded in cooperation with big tech companies in the Austrian contact tracing app Stopp Corona. Contact tracing apps manifest a bigger trend in literature, signifying power dynamics of big tech companies, governments, and civil society in relation to public values. The theoretical foundation of this research form prevailing concepts from Media and Communication Studies (MCS) and Science and Technology Studies (STS) about power dynamics such as the expansion of digital platforms and infrastructures, the political economy of big tech companies, dependencies, and digital platforms and infrastructure governance. The cooperative responsibility framework guides the empirical investigation in four main steps. First steps identify key public values and main stakeholders. The next steps analyse public deliberations on advancing public values and the translation of public values based on the outcome of public deliberations. This research applies a qualitative case study, including document analysis and expert interviews. In total, 52 documents were analysed and six expert interviews conducted. Findings show that key public values at stake concerning Stopp Corona involve data protection and privacy, (cyber-)security and safety, accuracy, voluntariness and consent, accessibility, inclusiveness, transparency, trust, etc. Public deliberations of multiple stakeholders about public values can help to safeguard public values. While an involvement of EU, state, civil society, and science and research can be witnessed in defining and advancing public values, Google and Apple, ultimately, translate the outcome of public deliberations through technological design choices. Therefore, public deliberations require a public-value oriented process which is transparent and involves a strong civil society and science and research community, and a unified EU voice.
2020年4月,在COVID-19大流行开始时,奥地利红十字会宣布鼓励与b谷歌和苹果公司的暴露通知框架合作,开发所谓的Stopp Corona应用程序,这是一款接触者追踪应用程序,将支持卫生人员监测病毒的传播,以防止新的感染b[1]。b谷歌和苹果公司参与支持应对突发公共卫生事件,引发了有关以牺牲公共价值为代价解决利润驱动的私人利益的争议。人们对美国大型科技公司在涉及公共价值观的政治决策中的主导地位表示担忧。本研究调查了奥地利联系人追踪应用程序Stopp Corona中与大型科技公司合作如何维护公共价值。接触追踪应用在文学中体现了更大的趋势,它象征着大型科技公司、政府和公民社会在公共价值观方面的权力动态。本研究的理论基础来自媒体与传播研究(MCS)和科学与技术研究(STS)中关于权力动力学的流行概念,如数字平台和基础设施的扩张、大型科技公司的政治经济学、依赖关系、数字平台和基础设施治理。合作责任框架指导实证调查的四个主要步骤。第一步是确定关键的公共价值观和主要利益相关者。接下来的步骤是分析公众对推进公共价值观的讨论,以及基于公众讨论结果的公共价值观的翻译。本研究采用定性案例研究,包括文献分析和专家访谈。总共分析了52份文件,并进行了6次专家访谈。调查结果显示,与“停止冠状病毒”相关的关键公共价值观涉及数据保护和隐私、(网络)安全和安全、准确性、自愿和同意、可及性、包容性、透明度、信任等。多方利益相关者对公共价值的公开讨论有助于维护公共价值。虽然欧盟、国家、公民社会和科学研究的参与可以见证公共价值观的定义和推进,但b谷歌和苹果最终将公众审议的结果转化为技术设计选择。因此,公共审议需要一个以公共价值为导向的透明过程,并涉及强大的公民社会和科学研究团体,以及统一的欧盟声音。
{"title":"Public values and the interests of big tech companies: The case of the Austrian Contact Tracing App Stopp Corona","authors":"V. Steinkogler","doi":"10.1109/cmi53512.2021.9663767","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663767","url":null,"abstract":"In April 2020, at the beginning of the COVID-19 pandemic, the Austrian Red Cross announced it was encouraging a cooperation with Google and Apple’s Exposure Notification Framework to develop the so-called Stopp Corona app – a contact tracing app which would support health personnel in monitoring the spread of the virus to prevent new infections [1]. The involvement of Google and Apple to support combating a public health emergency fuelled controversy over addressing profit-driven private interests at the expense of public values. Concerns have been raised about the dominant position of US based big tech companies in political decision concerning public values. This research investigates how public values are safeguarded in cooperation with big tech companies in the Austrian contact tracing app Stopp Corona. Contact tracing apps manifest a bigger trend in literature, signifying power dynamics of big tech companies, governments, and civil society in relation to public values. The theoretical foundation of this research form prevailing concepts from Media and Communication Studies (MCS) and Science and Technology Studies (STS) about power dynamics such as the expansion of digital platforms and infrastructures, the political economy of big tech companies, dependencies, and digital platforms and infrastructure governance. The cooperative responsibility framework guides the empirical investigation in four main steps. First steps identify key public values and main stakeholders. The next steps analyse public deliberations on advancing public values and the translation of public values based on the outcome of public deliberations. This research applies a qualitative case study, including document analysis and expert interviews. In total, 52 documents were analysed and six expert interviews conducted. Findings show that key public values at stake concerning Stopp Corona involve data protection and privacy, (cyber-)security and safety, accuracy, voluntariness and consent, accessibility, inclusiveness, transparency, trust, etc. Public deliberations of multiple stakeholders about public values can help to safeguard public values. While an involvement of EU, state, civil society, and science and research can be witnessed in defining and advancing public values, Google and Apple, ultimately, translate the outcome of public deliberations through technological design choices. Therefore, public deliberations require a public-value oriented process which is transparent and involves a strong civil society and science and research community, and a unified EU voice.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance and Concepts of Identity-Centric Decentral Open-Source Databases 以身份为中心的分布式开源数据库的性能和概念
Felix Bandosz
In order to deal with instable Internet connections various decentral databases (DDBs) for mobile (web) applications were developed. These databases provide applications with locally stored data and synchronize changes automatically with central servers or with directly reachable devices. Moreover, identity centric networking allows us to sign data and restrict access at the edge node level without connection to central instances. This allows us to build data networks which are able to use fast Internet connections or resilient node-to-node paths seamlessly.In this paper, we derive general challenges and specific solutions extracted out of three decentral open-source DDBs. In order to identify their practical strengths and to measure their performance we synchronize small and big data, disconnect instances from each other and use instances as data relays. During a total of five scenarios, we examine the correctness of data, storage consumption and network traffic.
为了处理不稳定的互联网连接,人们开发了各种用于移动(web)应用程序的分布式数据库(ddb)。这些数据库为应用程序提供本地存储的数据,并与中央服务器或直接可访问的设备自动同步更改。此外,以身份为中心的网络允许我们在边缘节点级别签署数据并限制访问,而无需连接到中心实例。这使我们能够构建能够无缝使用快速互联网连接或弹性节点到节点路径的数据网络。在本文中,我们从三个分散的开源ddb中提取了一般的挑战和具体的解决方案。为了确定它们的实际优势并衡量它们的性能,我们同步小数据和大数据,断开实例之间的连接,并使用实例作为数据中继。在总共五个场景中,我们检查了数据、存储消耗和网络流量的正确性。
{"title":"Performance and Concepts of Identity-Centric Decentral Open-Source Databases","authors":"Felix Bandosz","doi":"10.1109/CMI53512.2021.9663811","DOIUrl":"https://doi.org/10.1109/CMI53512.2021.9663811","url":null,"abstract":"In order to deal with instable Internet connections various decentral databases (DDBs) for mobile (web) applications were developed. These databases provide applications with locally stored data and synchronize changes automatically with central servers or with directly reachable devices. Moreover, identity centric networking allows us to sign data and restrict access at the edge node level without connection to central instances. This allows us to build data networks which are able to use fast Internet connections or resilient node-to-node paths seamlessly.In this paper, we derive general challenges and specific solutions extracted out of three decentral open-source DDBs. In order to identify their practical strengths and to measure their performance we synchronize small and big data, disconnect instances from each other and use instances as data relays. During a total of five scenarios, we examine the correctness of data, storage consumption and network traffic.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122683118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The use of facial recognition for online business with the perspective of customer adoption 从客户接受的角度来看,在网上业务中使用面部识别
Mengjie Zeng, C. Chiu
Facial recognition technology is an emerging digital payment method in online business to provide customers with a better shopping experience. Therefore, this study aims at analyzing factors influencing customers’ perception of facial recognition in online shopping. The research combines the privacy-trust-behavioral-intention model and innovation resistance theory to create a new model. Based on the new model, the study investigates the influence of hedonic motivation, privacy, and innovation resistance on customers’ intention to use and recommend facial recognition. The study shows that privacy and innovation resistance negatively influence customers’ acceptance of facial recognition in online business. At the same time, the hedonic motivation reflects positively from the customers’ side—this paper benefits e-commerce to improve facial recognition in online shopping and improve customers’ online shopping experience.
面部识别技术是一种新兴的在线支付方式,为顾客提供更好的购物体验。因此,本研究旨在分析影响顾客在网上购物中对面部识别认知的因素。本研究将隐私-信任-行为-意图模型与创新阻力理论相结合,建立了一个新的模型。基于新模型,本研究考察了享乐动机、隐私和创新阻力对消费者使用和推荐面部识别意愿的影响。研究表明,隐私和创新阻力对在线业务中客户对面部识别的接受程度产生了负面影响。同时,享乐动机从顾客的角度反映出积极的一面。本文有利于电子商务提高网上购物中的人脸识别,改善顾客的网上购物体验。
{"title":"The use of facial recognition for online business with the perspective of customer adoption","authors":"Mengjie Zeng, C. Chiu","doi":"10.1109/cmi53512.2021.9663766","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663766","url":null,"abstract":"Facial recognition technology is an emerging digital payment method in online business to provide customers with a better shopping experience. Therefore, this study aims at analyzing factors influencing customers’ perception of facial recognition in online shopping. The research combines the privacy-trust-behavioral-intention model and innovation resistance theory to create a new model. Based on the new model, the study investigates the influence of hedonic motivation, privacy, and innovation resistance on customers’ intention to use and recommend facial recognition. The study shows that privacy and innovation resistance negatively influence customers’ acceptance of facial recognition in online business. At the same time, the hedonic motivation reflects positively from the customers’ side—this paper benefits e-commerce to improve facial recognition in online shopping and improve customers’ online shopping experience.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The European Commission contribution to cybersecurity through the ECHO project 欧盟委员会通过ECHO项目对网络安全的贡献
A. Zanasi, Daniele Cristofori, Graziano Giorgi
This paper introduces the work carried out within project ECHO (European network of Cybersecurity centres and competence Hub for innovation and Operations), one of the four pilot projects financed under the H2020 framework aiming to connect and share knowledge across multiple domains, while building a common cybersecurity strategy for Europe, inside the framework of the European Cybersecurity Competence Center located in Bucharest. The question is: what can EU countries do to strengthen the Union’s cyber defence and ensure a secure cybersecurity ecosystem that would protect citizens, economy and infrastructures from cyber-attacks? The first step is to assure that EU citizens are aware of these risks and are ready to fight them. To this purpose, ECHO project develops: (1) a marketplace of multi-sector services coming from multiple cyber ranges, the E-FCR (ECHO Federated Cyber Range), to be applied in several areas, with particular attention to the Healthcare sector, (2) a distributed platform, the E-EWS (ECHO Early Warning System), for information sharing across organizational boundaries that provides companies with a common operational cyber threat situation picture tailored for different types of users (from technical cyber experts to management executives). This paper gives an overview of the architecture of these solutions, highlighting why they could become paramount for a standardised cybersecurity training at European and international levels.
本文介绍了项目ECHO(欧洲网络安全中心和创新与运营能力中心网络)中开展的工作,该项目是H2020框架下资助的四个试点项目之一,旨在连接和共享多个领域的知识,同时在位于布加勒斯特的欧洲网络安全能力中心框架内为欧洲建立共同的网络安全战略。问题是:欧盟国家可以做些什么来加强欧盟的网络防御,并确保一个安全的网络安全生态系统,以保护公民、经济和基础设施免受网络攻击?第一步是确保欧盟公民意识到这些风险,并准备好与之抗争。为此,ECHO项目发展:(1)来自多个网络范围的多部门服务市场,即E-FCR (ECHO联邦网络范围),将应用于多个领域,特别关注医疗保健领域;(2)分布式平台,即E-EWS (ECHO早期预警系统);用于跨组织边界的信息共享,为公司提供针对不同类型用户(从技术网络专家到管理人员)量身定制的通用操作网络威胁情况图。本文概述了这些解决方案的架构,强调了为什么它们对于欧洲和国际层面的标准化网络安全培训至关重要。
{"title":"The European Commission contribution to cybersecurity through the ECHO project","authors":"A. Zanasi, Daniele Cristofori, Graziano Giorgi","doi":"10.1109/cmi53512.2021.9663786","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663786","url":null,"abstract":"This paper introduces the work carried out within project ECHO (European network of Cybersecurity centres and competence Hub for innovation and Operations), one of the four pilot projects financed under the H2020 framework aiming to connect and share knowledge across multiple domains, while building a common cybersecurity strategy for Europe, inside the framework of the European Cybersecurity Competence Center located in Bucharest. The question is: what can EU countries do to strengthen the Union’s cyber defence and ensure a secure cybersecurity ecosystem that would protect citizens, economy and infrastructures from cyber-attacks? The first step is to assure that EU citizens are aware of these risks and are ready to fight them. To this purpose, ECHO project develops: (1) a marketplace of multi-sector services coming from multiple cyber ranges, the E-FCR (ECHO Federated Cyber Range), to be applied in several areas, with particular attention to the Healthcare sector, (2) a distributed platform, the E-EWS (ECHO Early Warning System), for information sharing across organizational boundaries that provides companies with a common operational cyber threat situation picture tailored for different types of users (from technical cyber experts to management executives). This paper gives an overview of the architecture of these solutions, highlighting why they could become paramount for a standardised cybersecurity training at European and international levels.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127517073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling LoRaWAN Communication with Out-of-coverage End Nodes in DTN Scenarios Through an Optimised Duty-cycle 通过优化占空比实现DTN场景下LoRaWAN与未覆盖端节点的通信
Mohamed Msaad, Muhammad Waleed, Sokol Kosta
This paper presents the idea of using LoRaWAN based sensors in isolated areas with intermittent gateway presence. The intent is to expand the network coverage to areas with no preexisting infrastructure, and automate the data collection process in Delay Tolerant Network (DTN) scenarios. The use case considered in the paper is that of ocean monitoring, where sensor nodes can be deployed far from the shore to record ocean-related data, while gateways located on ships collect the sensors’ telemetry when the ship passes close by the nodes. We discuss the LoRaWAN capabilities and limitations for such scenario, focusing in particular on the energy consumption on the end nodes’ side. Finally, we present an optimized strategy that optimizes the duty cycle for these remote nodes. The experiments show that by adopting this solution, the nodes spend less energy, which leads to their lifespan to be extended significantly.
本文提出了在具有间歇性网关存在的孤立区域使用基于LoRaWAN的传感器的想法。其目的是将网络覆盖范围扩展到没有预先存在基础设施的地区,并在容忍延迟网络(DTN)场景中实现数据收集过程的自动化。本文考虑的用例是海洋监测,其中传感器节点可以部署在远离海岸的地方记录海洋相关数据,而位于船上的网关则在船舶经过节点附近时收集传感器的遥测数据。我们将讨论LoRaWAN在这种情况下的功能和限制,特别关注终端节点端的能耗。最后,我们提出了一个优化策略,优化这些远程节点的占空比。实验表明,采用该方案,节点消耗的能量更少,寿命显著延长。
{"title":"Enabling LoRaWAN Communication with Out-of-coverage End Nodes in DTN Scenarios Through an Optimised Duty-cycle","authors":"Mohamed Msaad, Muhammad Waleed, Sokol Kosta","doi":"10.1109/cmi53512.2021.9663774","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663774","url":null,"abstract":"This paper presents the idea of using LoRaWAN based sensors in isolated areas with intermittent gateway presence. The intent is to expand the network coverage to areas with no preexisting infrastructure, and automate the data collection process in Delay Tolerant Network (DTN) scenarios. The use case considered in the paper is that of ocean monitoring, where sensor nodes can be deployed far from the shore to record ocean-related data, while gateways located on ships collect the sensors’ telemetry when the ship passes close by the nodes. We discuss the LoRaWAN capabilities and limitations for such scenario, focusing in particular on the energy consumption on the end nodes’ side. Finally, we present an optimized strategy that optimizes the duty cycle for these remote nodes. The experiments show that by adopting this solution, the nodes spend less energy, which leads to their lifespan to be extended significantly.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131491005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mapping mobile money loan ecosystem: insights from Ghana 绘制移动货币贷款生态系统:来自加纳的见解
Kwami Ahiabenu
Mobile money service is now ubiquitous in Ghana, enabling several new services such as mobile money loans with over 17.1 million active mobile money accounts, however, there are few studies on Ghana’s mobile money loan services in literature, therefore this paper is important in many ways since it contributes to the body of knowledge in this area. Based on the mixed method, the paper analyze data from expert interviews and a survey of 579 respondents through the lens of Actor-Network Theory. It critically examines the evolution of the mobile money loan ecosystem and its vital role in the financial system. The results show that transactions data remain vital determinants of mobile money credit scoring mechanisms using a machine learning algorithm. It discusses the balancing act of ensuring better loan repayment through tightening up loan default prediction factors that do not exclude prospective loan applicants, especially persons outside the formal financial system. This paper contributes to our understanding of the mobile money loan ecosystem, visualizing its value chain and providing indicators on improving its sustainability.
移动货币服务现在在加纳无处不在,使几个新的服务,如移动货币贷款超过1710万活跃的移动货币账户,然而,在加纳的移动货币贷款服务的文献研究很少,因此这篇论文是重要的,因为它有助于在这一领域的知识体系。本文采用混合方法,运用行动者网络理论对专家访谈和579名受访者的调查数据进行分析。它批判性地考察了移动货币贷款生态系统的演变及其在金融体系中的重要作用。结果表明,交易数据仍然是使用机器学习算法的移动货币信用评分机制的重要决定因素。它讨论了通过收紧贷款违约预测因素来确保更好的贷款偿还的平衡行为,这些因素不排除潜在的贷款申请人,特别是正规金融体系之外的人。本文有助于我们对移动货币贷款生态系统的理解,将其价值链可视化,并提供提高其可持续性的指标。
{"title":"Mapping mobile money loan ecosystem: insights from Ghana","authors":"Kwami Ahiabenu","doi":"10.1109/cmi53512.2021.9663800","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663800","url":null,"abstract":"Mobile money service is now ubiquitous in Ghana, enabling several new services such as mobile money loans with over 17.1 million active mobile money accounts, however, there are few studies on Ghana’s mobile money loan services in literature, therefore this paper is important in many ways since it contributes to the body of knowledge in this area. Based on the mixed method, the paper analyze data from expert interviews and a survey of 579 respondents through the lens of Actor-Network Theory. It critically examines the evolution of the mobile money loan ecosystem and its vital role in the financial system. The results show that transactions data remain vital determinants of mobile money credit scoring mechanisms using a machine learning algorithm. It discusses the balancing act of ensuring better loan repayment through tightening up loan default prediction factors that do not exclude prospective loan applicants, especially persons outside the formal financial system. This paper contributes to our understanding of the mobile money loan ecosystem, visualizing its value chain and providing indicators on improving its sustainability.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132367283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To download, or not to download, that is the question: Investigating Belgian residents’ motivation to download or not download the COVID-19 contact-tracing app Coronalert 下载还是不下载,这是一个问题:调查比利时居民下载或不下载COVID-19接触者追踪应用Coronalert的动机
Giulia Zampedri
This research explores COVID-19 contact-tracing apps (CTAs) from a citizen perspective by looking at the meaning they attribute to CTAs and their motivation to not use such kinds of apps. As such, it looks at the Belgian CTA Coronalert and semi structured interviews were used to investigate Belgian residents’ opinions.What emerged from the interviews is that the meaning participants attribute to the CTA Coronalert is different from the meaning the app itself has and the meaning the government gave to the app. The app was created as a safe and privacy-preserving solution, however, participants expressed concern over privacy violations and lack of data transparency.
本研究从市民的角度探讨了新冠病毒接触者追踪应用程序(cta)的意义和不使用这类应用程序的动机。因此,它着眼于比利时CTA Coronalert和半结构化访谈,用于调查比利时居民的意见。从采访中可以看出,参与者赋予CTA Coronalert的意义与应用程序本身的意义和政府赋予应用程序的意义不同。该应用程序是作为安全和隐私保护的解决方案而开发的,但参与者对侵犯隐私和缺乏数据透明度表示担忧。
{"title":"To download, or not to download, that is the question: Investigating Belgian residents’ motivation to download or not download the COVID-19 contact-tracing app Coronalert","authors":"Giulia Zampedri","doi":"10.1109/cmi53512.2021.9663819","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663819","url":null,"abstract":"This research explores COVID-19 contact-tracing apps (CTAs) from a citizen perspective by looking at the meaning they attribute to CTAs and their motivation to not use such kinds of apps. As such, it looks at the Belgian CTA Coronalert and semi structured interviews were used to investigate Belgian residents’ opinions.What emerged from the interviews is that the meaning participants attribute to the CTA Coronalert is different from the meaning the app itself has and the meaning the government gave to the app. The app was created as a safe and privacy-preserving solution, however, participants expressed concern over privacy violations and lack of data transparency.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129244037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1