首页 > 最新文献

2013 European Intelligence and Security Informatics Conference最新文献

英文 中文
Tools and Methods for Security: Stimulating the Skill to Philosophize 安全的工具和方法:激发哲学思考的技能
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.36
I. Kavathatzopoulos, Ryoko Asai, Mikael Laaksoharju
Finding optimal solutions to security issues is very difficult or impossible. Conflicting interests and values decide what has to be done. Every thinkable answer contains both risks and possibilities. I our effort to find solutions we have always to negotiate and make compromises. A dialectic process is necessary in security in order to identify significant interests and values, and to formulate principles and policies. Handling security issues and working for secure IT systems demand continuous adjustment to relevant values as well as the necessary personal skills and suitable group processes. Focusing on the method and making sure that the right way of proceeding has been adopted is the way to get satisfactory answers to the problems of IT security. The philosophical method of deliberative thinking seems to be the basis of such methods.
找到安全问题的最佳解决方案非常困难,甚至是不可能的。相互冲突的利益和价值观决定了该做什么。每个可以想到的答案都包含风险和可能性。在我们努力寻找解决办法的过程中,我们总是要进行谈判并作出妥协。安全需要辩证的过程,以确定重大利益和价值,并制定原则和政策。处理安全问题和为安全的IT系统工作需要不断调整相关的价值观,以及必要的个人技能和合适的团队流程。关注方法,确保采用正确的处理方式,是对IT安全问题得到满意答案的方法。深思熟虑的哲学方法似乎是这些方法的基础。
{"title":"Tools and Methods for Security: Stimulating the Skill to Philosophize","authors":"I. Kavathatzopoulos, Ryoko Asai, Mikael Laaksoharju","doi":"10.1109/EISIC.2013.36","DOIUrl":"https://doi.org/10.1109/EISIC.2013.36","url":null,"abstract":"Finding optimal solutions to security issues is very difficult or impossible. Conflicting interests and values decide what has to be done. Every thinkable answer contains both risks and possibilities. I our effort to find solutions we have always to negotiate and make compromises. A dialectic process is necessary in security in order to identify significant interests and values, and to formulate principles and policies. Handling security issues and working for secure IT systems demand continuous adjustment to relevant values as well as the necessary personal skills and suitable group processes. Focusing on the method and making sure that the right way of proceeding has been adopted is the way to get satisfactory answers to the problems of IT security. The philosophical method of deliberative thinking seems to be the basis of such methods.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"46 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133072465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement 执法机关的合法数字证据收集:合法性、完整性和监管链要求
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.44
J. Rajamäki, J. Knuuttila
When carrying out criminal investigations, Law Enforcement Agencies (LEAs) apply new technology in very effective ways. However at worst, LEAs must perform many stages twice with the help of different technical tools. When investigating the identity of criminals LEAs may apply totally different technical tools than when gathering evidences for charge, because the data provided by investigating may not be valid in court. For that reason, a new monitoring system that goes beyond state of the art is needed. Three organizational layers need attentions: 1) LEA, the people that actually retrieve and store the information. 2) Prosecutors and their offices, how they get access to the information. 3) Courts, the final destination of the retrieved information. Until now, the information gathering tools for LEAs have been engineered focusing only on the best way to retrieve the information from the target. The attention paid to the legal, integrity and chain-of-custody requirements as well as social acceptance and legal oversight in connection with retrieving information has been inadequate and guidance on the matters has existed only in manuals written by legal departments.
执法机构在进行刑事调查时,以非常有效的方式应用新科技。然而,在最坏的情况下,LEAs必须在不同技术工具的帮助下将许多阶段执行两次。在调查犯罪分子身份时,司法机构可能采用与收集指控证据完全不同的技术工具,因为调查提供的数据可能在法庭上无效。出于这个原因,需要一个超越最先进水平的新监测系统。需要注意三个组织层:1)LEA,即实际检索和存储信息的人员。2)检察机关和检察机关如何获得信息3)法院,检索信息的最终目的地。到目前为止,用于lea的信息收集工具的设计只关注于从目标检索信息的最佳方法。对检索资料方面的法律、完整性和监管链要求以及社会接受和法律监督的注意是不够的,关于这些事项的指导只存在于法律部门编写的手册中。
{"title":"Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement","authors":"J. Rajamäki, J. Knuuttila","doi":"10.1109/EISIC.2013.44","DOIUrl":"https://doi.org/10.1109/EISIC.2013.44","url":null,"abstract":"When carrying out criminal investigations, Law Enforcement Agencies (LEAs) apply new technology in very effective ways. However at worst, LEAs must perform many stages twice with the help of different technical tools. When investigating the identity of criminals LEAs may apply totally different technical tools than when gathering evidences for charge, because the data provided by investigating may not be valid in court. For that reason, a new monitoring system that goes beyond state of the art is needed. Three organizational layers need attentions: 1) LEA, the people that actually retrieve and store the information. 2) Prosecutors and their offices, how they get access to the information. 3) Courts, the final destination of the retrieved information. Until now, the information gathering tools for LEAs have been engineered focusing only on the best way to retrieve the information from the target. The attention paid to the legal, integrity and chain-of-custody requirements as well as social acceptance and legal oversight in connection with retrieving information has been inadequate and guidance on the matters has existed only in manuals written by legal departments.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124702035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon Effects 受武器影响建筑物的损害和防护能力评估
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.54
S. Bernhardsson, R. Forsen
FOI has for many years conducted experiments and developed models for assessment of damage and protective capacity of buildings exposed to weapon effects. The main tools used for these types of assessments are large scale, empirical based evaluations and more detailed finite element analyses. In this paper we present the tools that have been developed and the ongoing work at FOI in this area.
多年来,信息自由研究所进行了实验并开发了评估受到武器影响的建筑物的损害和保护能力的模型。用于这类评估的主要工具是大规模的、基于经验的评估和更详细的有限元分析。在本文中,我们介绍了已经开发的工具和信息自由在这一领域正在进行的工作。
{"title":"Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon Effects","authors":"S. Bernhardsson, R. Forsen","doi":"10.1109/EISIC.2013.54","DOIUrl":"https://doi.org/10.1109/EISIC.2013.54","url":null,"abstract":"FOI has for many years conducted experiments and developed models for assessment of damage and protective capacity of buildings exposed to weapon effects. The main tools used for these types of assessments are large scale, empirical based evaluations and more detailed finite element analyses. In this paper we present the tools that have been developed and the ongoing work at FOI in this area.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test 利用非接触式传感器进行无目标隐蔽信息测试的可行性评估
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.69
J. Proudfoot
The standard Concealed Information Test (CIT) requires the use of target items to elicit physiological response differences between those concealing information and those naïve to target items. Interpersonal Deception Theory contends that deceivers often exhibit both strategic and nonstrategic behaviors in an attempt to appear truthful. This paper proposes a study designed to ascertain the feasibility of using noncontact sensors to conduct a target less CIT to elicit cues of strategic and nonstrategic behaviors indicative of concealed knowledge and deception. The ability to implement a CIT without target items increases the feasibility of CIT use in a number of border control, passenger screening, and document adjudication contexts.
标准的隐藏信息测试(CIT)要求使用目标项目来引起隐藏信息者与naïve对目标项目的生理反应差异。人际欺骗理论认为,骗子经常表现出战略和非战略行为,试图表现出诚实。本文提出了一项研究,旨在确定使用非接触式传感器进行无目标CIT的可行性,以引出表明隐藏知识和欺骗的战略和非战略行为的线索。在没有目标项目的情况下实现CIT的能力增加了在许多边境控制、旅客筛选和文件裁决环境中使用CIT的可行性。
{"title":"Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test","authors":"J. Proudfoot","doi":"10.1109/EISIC.2013.69","DOIUrl":"https://doi.org/10.1109/EISIC.2013.69","url":null,"abstract":"The standard Concealed Information Test (CIT) requires the use of target items to elicit physiological response differences between those concealing information and those naïve to target items. Interpersonal Deception Theory contends that deceivers often exhibit both strategic and nonstrategic behaviors in an attempt to appear truthful. This paper proposes a study designed to ascertain the feasibility of using noncontact sensors to conduct a target less CIT to elicit cues of strategic and nonstrategic behaviors indicative of concealed knowledge and deception. The ability to implement a CIT without target items increases the feasibility of CIT use in a number of border control, passenger screening, and document adjudication contexts.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129667725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting Key Players in Criminal Networks Using Dynalink 利用动态链接检测犯罪网络中的关键人物
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.46
Andrew J. Park, Herbert H. Tsang
Detecting key players in criminal networks is an important aspect of criminal investigation because it promotes the efficient use of available resources (human, financial, time, etc.). In this paper, we propose a new technique of detecting key players in co-offending networks using the Dynalink framework. Dynalink is a social network visualization tool developed intentionally employs visual analytics to visualize networks interactively over time. This novel technique proposed here employs the intuitive concept of centrality in detecting key players in criminal networks. The tool will allow crime analysts and investigators to visualize networks interactively over time and use this technique to discover criminal patterns and key players.
发现犯罪网络中的关键人物是刑事调查的一个重要方面,因为它促进了有效利用现有资源(人力、财力、时间等)。在本文中,我们提出了一种使用Dynalink框架检测共犯网络中的关键参与者的新技术。Dynalink是一款社交网络可视化工具,专门采用可视化分析技术,随着时间的推移交互式地可视化网络。本文提出的新技术采用直观的中心性概念来检测犯罪网络中的关键参与者。该工具将允许犯罪分析人员和调查人员对网络进行互动可视化,并使用该技术发现犯罪模式和关键参与者。
{"title":"Detecting Key Players in Criminal Networks Using Dynalink","authors":"Andrew J. Park, Herbert H. Tsang","doi":"10.1109/EISIC.2013.46","DOIUrl":"https://doi.org/10.1109/EISIC.2013.46","url":null,"abstract":"Detecting key players in criminal networks is an important aspect of criminal investigation because it promotes the efficient use of available resources (human, financial, time, etc.). In this paper, we propose a new technique of detecting key players in co-offending networks using the Dynalink framework. Dynalink is a social network visualization tool developed intentionally employs visual analytics to visualize networks interactively over time. This novel technique proposed here employs the intuitive concept of centrality in detecting key players in criminal networks. The tool will allow crime analysts and investigators to visualize networks interactively over time and use this technique to discover criminal patterns and key players.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"10 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods 利用移动GIS和预测方法实现实时犯罪情报
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.27
M. Saravanan, Rakhi Thayyil, S. Narayanan
A crime investigation is an official effort to uncover information about a crime. In recent years the number of crime cases has been on a rise. The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. In this paper we propose a swift response system which can identify the most probable local suspects involved in a crime case, by analyzing the relevant case histories. We have looked into the mobile call detail records of suspects and victims to understand their presence in crime scenario. Records of Cell tower near crime scene have been analyzed to track the real perpetrators. With the knowledge of suspect's journey to crime and about the movements of people in the crime scene, we are able to model the system and to understand the probable suspects involved in the crime. Prediction techniques are used to filter and identify the different types of people present at the crime scene. To solve the case at a rapid pace, we have mapped the current location of the probable suspects using Mobile GIS. We have also evaluated the methods used in this system in comparison with traditional methods.
犯罪调查是官方为揭露犯罪信息所做的努力。近年来,犯罪案件的数量一直在上升。传统的、古老的情报和犯罪记录维护系统已经不能满足现有犯罪场景的要求。本文通过对相关案件历史的分析,提出了一种快速反应系统,可以识别出最可能参与犯罪案件的当地嫌疑人。我们调查了嫌疑人和受害者的手机通话记录,以了解他们在犯罪场景中的存在。分析了犯罪现场附近手机信号塔的记录,以追踪真正的肇事者。通过了解嫌疑人的犯罪过程以及犯罪现场人员的活动,我们能够对系统进行建模,并了解可能参与犯罪的嫌疑人。预测技术用于过滤和识别出现在犯罪现场的不同类型的人。为了快速解决案件,我们使用移动地理信息系统绘制了可能嫌疑人的当前位置。我们还将该系统中使用的方法与传统方法进行了比较。
{"title":"Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods","authors":"M. Saravanan, Rakhi Thayyil, S. Narayanan","doi":"10.1109/EISIC.2013.27","DOIUrl":"https://doi.org/10.1109/EISIC.2013.27","url":null,"abstract":"A crime investigation is an official effort to uncover information about a crime. In recent years the number of crime cases has been on a rise. The traditional and age-old system of intelligence and criminal record maintenance has failed to live up to the requirements of the existing crime scenario. In this paper we propose a swift response system which can identify the most probable local suspects involved in a crime case, by analyzing the relevant case histories. We have looked into the mobile call detail records of suspects and victims to understand their presence in crime scenario. Records of Cell tower near crime scene have been analyzed to track the real perpetrators. With the knowledge of suspect's journey to crime and about the movements of people in the crime scene, we are able to model the system and to understand the probable suspects involved in the crime. Prediction techniques are used to filter and identify the different types of people present at the crime scene. To solve the case at a rapid pace, we have mapped the current location of the probable suspects using Mobile GIS. We have also evaluated the methods used in this system in comparison with traditional methods.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121482406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Service Standardization with Utility Computing and Service Oriented Architecture as a Tool for Public Protection and Disaster Relief 使用效用计算和面向服务的体系结构作为公共保护和救灾工具的服务标准化
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.55
Information and Communication Technology (ICT) service of the Public Protection and Disaster Relief (PPDR) are currently delivered in heterogeneous and tailor made methods. Majority of PPDR actors prefers their own technology, contract and process implementation. Utility, cloud and service-oriented computing are cutting-edge technologies that standardize ICT services and solutions. This paper studies ICT services and argues technologies, contracts and processes should be standardized in PPDR. This research also explores leveraging benefits and challenges of cloud base utility and service-oriented computing.
目前,公共保护和救灾(PPDR)的信息和通信技术(ICT)服务以异构和定制的方式提供。大多数PPDR参与者更喜欢他们自己的技术、合同和流程实现。公用事业、云计算和面向服务的计算是标准化ICT服务和解决方案的前沿技术。本文对信息通信技术服务进行了研究,认为PPDR中的技术、合同和流程应该标准化。本研究还探讨了利用基于云的实用程序和面向服务的计算的优势和挑战。
{"title":"Service Standardization with Utility Computing and Service Oriented Architecture as a Tool for Public Protection and Disaster Relief","authors":"","doi":"10.1109/EISIC.2013.55","DOIUrl":"https://doi.org/10.1109/EISIC.2013.55","url":null,"abstract":"Information and Communication Technology (ICT) service of the Public Protection and Disaster Relief (PPDR) are currently delivered in heterogeneous and tailor made methods. Majority of PPDR actors prefers their own technology, contract and process implementation. Utility, cloud and service-oriented computing are cutting-edge technologies that standardize ICT services and solutions. This paper studies ICT services and argues technologies, contracts and processes should be standardized in PPDR. This research also explores leveraging benefits and challenges of cloud base utility and service-oriented computing.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130822328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation 检查站模拟:为边境巡逻检查站设计和资源分配提供信息的工具
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.65
Jeffrey L. Jenkins, Jim Marquardson, J. Proudfoot, J. Valacich, E. Golob, J. Nunamaker
Proper resource allocation at Border Patrol checkpoints is essential for effective and efficient screening. Improper resource allocation can lead to flushing-i.e., allowing cars to pass through a checkpoint without screening-or cost inefficiencies. To better inform resource allocation, we present a prototype simulation that models the major processes of an operational checkpoint. Data for the simulation was collected during extensive site visits to checkpoints on the U.S. northern and southern borders. In a case study, we configure the simulation to model the Tucson Sector, I-19 checkpoint. We found that the checkpoint can handle current traffic demands, but additional screening capacity is needed to accommodate traffic in the next 20 years.
在边境巡逻检查站适当分配资源对有效和高效率的检查至关重要。不适当的资源分配可能导致冲洗,即比如允许汽车不经过检查就通过检查站,或者成本效率低下。为了更好地为资源分配提供信息,我们提出了一个原型模拟,对操作检查点的主要过程进行建模。模拟的数据是在对美国北部和南部边境的检查站进行广泛的实地考察期间收集的。在一个案例研究中,我们将模拟配置为图森区I-19检查站的模型。我们发现检查站可以应付目前的交通需求,但需要额外的检查能力来适应未来20年的交通。
{"title":"The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation","authors":"Jeffrey L. Jenkins, Jim Marquardson, J. Proudfoot, J. Valacich, E. Golob, J. Nunamaker","doi":"10.1109/EISIC.2013.65","DOIUrl":"https://doi.org/10.1109/EISIC.2013.65","url":null,"abstract":"Proper resource allocation at Border Patrol checkpoints is essential for effective and efficient screening. Improper resource allocation can lead to flushing-i.e., allowing cars to pass through a checkpoint without screening-or cost inefficiencies. To better inform resource allocation, we present a prototype simulation that models the major processes of an operational checkpoint. Data for the simulation was collected during extensive site visits to checkpoints on the U.S. northern and southern borders. In a case study, we configure the simulation to model the Tucson Sector, I-19 checkpoint. We found that the checkpoint can handle current traffic demands, but additional screening capacity is needed to accommodate traffic in the next 20 years.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud Forensics: A Technical Approach to Virtual Machine Acquisition 云取证:虚拟机获取的技术方法
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.59
L. Holt, Mohammad Hammoudeh
The cloud is radically changing the face of information technology. Traditional digital forensic procedures, software, and hardware are incapable of scaling to the cloud. This paper introduces a new system, leveraging cloud management SDK's to enable highly scalable Virtual Machine (VM) acquisition from cloud infrastructures.
云正在从根本上改变信息技术的面貌。传统的数字取证程序、软件和硬件无法扩展到云。本文介绍了一个新的系统,利用云管理SDK来实现从云基础设施获取高度可扩展的虚拟机(VM)。
{"title":"Cloud Forensics: A Technical Approach to Virtual Machine Acquisition","authors":"L. Holt, Mohammad Hammoudeh","doi":"10.1109/EISIC.2013.59","DOIUrl":"https://doi.org/10.1109/EISIC.2013.59","url":null,"abstract":"The cloud is radically changing the face of information technology. Traditional digital forensic procedures, software, and hardware are incapable of scaling to the cloud. This paper introduces a new system, leveraging cloud management SDK's to enable highly scalable Virtual Machine (VM) acquisition from cloud infrastructures.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"18 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131711652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards e-Passport Duplicate Enrollment Check in the European Union 迈向欧盟电子护照副本登记核查
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.64
M. Butt, Sandra Marti, A. Nouak, Jörg Köplin, Ramachandra Raghavendra, Guoqiang Li
Automated border control gates are now being more and more deployed at airports to smooth border crossings with reduced man power and more convenience to the passenger. In order to use these new gates the traveler is required to present an electronic passport (e-Passport or biometric passport). Lots of efforts have been undertaken to improve the security of the infrastructure at borders or by adding various security features to the passport. However, the weakest point in the passport issuance process is the enrolment step for passport applicant including the breeder documents authenticity and the duplicate enrolment check. The goal of duplicate enrolment check is to prevent the issuance of duplicate illegal passports containing possibly fake identities. A solution to this problem needs to be flexible and precise if the solution is meant for large-scale deployments and eventually standardization. This paper describes how a duplicate enrolment check can be realized securely between European Union member states using distributed databases of alphanumeric data and multiple biometric modalities.
现在,机场越来越多地部署自动边境控制门,以减少人力,方便旅客,使过境更加顺畅。为了使用这些新的登机口,旅客需要出示电子护照(电子护照或生物识别护照)。为改善边境基础设施的安全,或为护照增加各种安全特征,已经作出了许多努力。然而,护照签发过程中的最薄弱环节是护照申请人的登记步骤,包括申请人证件的真实性和登记副本的核查。双重登记检查的目的是防止签发可能含有假身份的双重非法护照。如果解决方案要用于大规模部署并最终实现标准化,那么这个问题的解决方案需要灵活和精确。本文描述了如何使用字母数字数据和多种生物识别模式的分布式数据库在欧盟成员国之间安全地实现重复登记检查。
{"title":"Towards e-Passport Duplicate Enrollment Check in the European Union","authors":"M. Butt, Sandra Marti, A. Nouak, Jörg Köplin, Ramachandra Raghavendra, Guoqiang Li","doi":"10.1109/EISIC.2013.64","DOIUrl":"https://doi.org/10.1109/EISIC.2013.64","url":null,"abstract":"Automated border control gates are now being more and more deployed at airports to smooth border crossings with reduced man power and more convenience to the passenger. In order to use these new gates the traveler is required to present an electronic passport (e-Passport or biometric passport). Lots of efforts have been undertaken to improve the security of the infrastructure at borders or by adding various security features to the passport. However, the weakest point in the passport issuance process is the enrolment step for passport applicant including the breeder documents authenticity and the duplicate enrolment check. The goal of duplicate enrolment check is to prevent the issuance of duplicate illegal passports containing possibly fake identities. A solution to this problem needs to be flexible and precise if the solution is meant for large-scale deployments and eventually standardization. This paper describes how a duplicate enrolment check can be realized securely between European Union member states using distributed databases of alphanumeric data and multiple biometric modalities.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133786358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2013 European Intelligence and Security Informatics Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1