首页 > 最新文献

2011 Sixth International Conference on Availability, Reliability and Security最新文献

英文 中文
File Block Classification by Support Vector Machine 支持向量机的文件块分类
L. Sportiello, S. Zanero
Retrieval of files without the support of file system structures is arguably essential for digital forensics. Files are typically stored as sequences of data blocks, which have to be reconstructed in the retrieval process. This is commonly performed, among other approaches, through file carving, in general detecting the original block sequences by means of signatures of known headers and footers of files. Of course, this creates challenges with fragmented files, where blocks belonging to different files may be interleaved. Ways to classify file blocks into file types relying on their content may provide a support to achieve a successful reconstruction. We propose to classify file blocks using Support Vector Machines (SVMs), and we do so by studying in-depth the impact of an appropriate selection of the features used in the classification process. We analyze several potential features and test their performance over a large and representative collection of file blocks and file types. We find out that SVM classifiers can achieve a good accuracy and that a specific type of features (based on byte frequency distribution) performs well across almost all of the examined file types.
没有文件系统结构支持的文件检索可以说是数字取证的必要条件。文件通常以数据块序列的形式存储,这些数据块必须在检索过程中进行重构。除其他方法外,这通常是通过文件雕刻来实现的,通常通过对文件的已知页眉和页脚的签名来检测原始块序列。当然,这给碎片文件带来了挑战,其中属于不同文件的块可能是交错的。将文件块根据其内容分类为文件类型的方法可以为实现成功的重构提供支持。我们建议使用支持向量机(svm)对文件块进行分类,我们通过深入研究在分类过程中适当选择特征的影响来实现这一目标。我们分析了几个潜在的特性,并在大量具有代表性的文件块和文件类型集合上测试了它们的性能。我们发现SVM分类器可以达到很好的准确性,并且特定类型的特征(基于字节频率分布)在几乎所有被检查的文件类型中都表现良好。
{"title":"File Block Classification by Support Vector Machine","authors":"L. Sportiello, S. Zanero","doi":"10.1109/ARES.2011.52","DOIUrl":"https://doi.org/10.1109/ARES.2011.52","url":null,"abstract":"Retrieval of files without the support of file system structures is arguably essential for digital forensics. Files are typically stored as sequences of data blocks, which have to be reconstructed in the retrieval process. This is commonly performed, among other approaches, through file carving, in general detecting the original block sequences by means of signatures of known headers and footers of files. Of course, this creates challenges with fragmented files, where blocks belonging to different files may be interleaved. Ways to classify file blocks into file types relying on their content may provide a support to achieve a successful reconstruction. We propose to classify file blocks using Support Vector Machines (SVMs), and we do so by studying in-depth the impact of an appropriate selection of the features used in the classification process. We analyze several potential features and test their performance over a large and representative collection of file blocks and file types. We find out that SVM classifiers can achieve a good accuracy and that a specific type of features (based on byte frequency distribution) performs well across almost all of the examined file types.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123130916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Key Management Scheme Applicable to Various Topologies of Sensor Networks 适用于各种传感器网络拓扑结构的密钥管理方案
Hidetoshi Yukimaru, Yoshio Kakizaki, Keiichi Iwamura
A sensor node has extremely limited power supply capacity and operation performance, therefore, key management schemes that can be achieved with less calculation in sensor networks have been proposed. However, these key management schemes cannot be flexibly applied to various connection topologies and network configurations. In this paper, we propose a key management scheme that can be generally used in a network that supports various connection topologies and that is capable of adding new nodes. Finally, we implement and evaluate our scheme.
由于传感器节点的供电能力和运行性能极为有限,因此提出了在传感器网络中计算量较少的密钥管理方案。但是,这些密钥管理方案不能灵活地应用于各种连接拓扑和网络配置。在本文中,我们提出了一种密钥管理方案,它可以在支持各种连接拓扑的网络中普遍使用,并且能够添加新节点。最后,对该方案进行了实现和评价。
{"title":"Key Management Scheme Applicable to Various Topologies of Sensor Networks","authors":"Hidetoshi Yukimaru, Yoshio Kakizaki, Keiichi Iwamura","doi":"10.1109/ARES.2011.69","DOIUrl":"https://doi.org/10.1109/ARES.2011.69","url":null,"abstract":"A sensor node has extremely limited power supply capacity and operation performance, therefore, key management schemes that can be achieved with less calculation in sensor networks have been proposed. However, these key management schemes cannot be flexibly applied to various connection topologies and network configurations. In this paper, we propose a key management scheme that can be generally used in a network that supports various connection topologies and that is capable of adding new nodes. Finally, we implement and evaluate our scheme.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ASPF: Adaptive anti-SPIT Policy-based Framework ASPF:自适应反吐痰策略框架
Yannis Soupionis, D. Gritzalis
Spam over Internet Telephony (SPIT) is a rising IP voice telephony threat. Voice over IP enables the transmission of telephone calls over the Internet, as opposed to plain old telephone service. Internet Telephony essentially means low-cost phone calls, i.e. a clear benefit for both consumers and businesses, which may also lead to cheap methods of mass advertising. Still, industry observers warn that VoIP's low-cost and openness makes it relatively easy for spammers to send unsolicited audio-commercials to VoIP voice-mail inboxes, in much the same way they currently bombard e-mail inboxes. In this paper we set the foundations of an adaptive approach that handles SPIT through an adaptive anti-SPIT policy-based framework (ASPF). ASPF incorporates a set of rules for SPIT detection, together with appropriate actions and controls that should be enforced, so as to counter these attacks. ASPF is formally described through an XML schema. A working prototype is also demonstrated for evaluating ASPF. The prototype is able to make policy alterations, based on abnormal network events.
网络电话垃圾邮件(SPIT)是一种日益严重的IP语音电话威胁。与普通的老式电话服务相反,IP语音使电话在互联网上传输成为可能。互联网电话本质上意味着低成本的电话,即对消费者和企业都有明显的好处,这也可能导致廉价的大众广告方法。不过,行业观察人士警告说,VoIP的低成本和开放性使得垃圾邮件发送者相对容易地向VoIP语音邮箱收件箱发送未经请求的音频广告,就像他们目前轰炸电子邮件收件箱的方式一样。在本文中,我们设置了自适应方法的基础,该方法通过自适应反基于策略的框架(ASPF)处理SPIT。ASPF包含了一组用于检测SPIT的规则,以及应该执行的适当操作和控制,以对抗这些攻击。ASPF是通过XML模式正式描述的。还演示了一个用于评估ASPF的工作原型。原型能够根据异常的网络事件做出策略更改。
{"title":"ASPF: Adaptive anti-SPIT Policy-based Framework","authors":"Yannis Soupionis, D. Gritzalis","doi":"10.1109/ARES.2011.29","DOIUrl":"https://doi.org/10.1109/ARES.2011.29","url":null,"abstract":"Spam over Internet Telephony (SPIT) is a rising IP voice telephony threat. Voice over IP enables the transmission of telephone calls over the Internet, as opposed to plain old telephone service. Internet Telephony essentially means low-cost phone calls, i.e. a clear benefit for both consumers and businesses, which may also lead to cheap methods of mass advertising. Still, industry observers warn that VoIP's low-cost and openness makes it relatively easy for spammers to send unsolicited audio-commercials to VoIP voice-mail inboxes, in much the same way they currently bombard e-mail inboxes. In this paper we set the foundations of an adaptive approach that handles SPIT through an adaptive anti-SPIT policy-based framework (ASPF). ASPF incorporates a set of rules for SPIT detection, together with appropriate actions and controls that should be enforced, so as to counter these attacks. ASPF is formally described through an XML schema. A working prototype is also demonstrated for evaluating ASPF. The prototype is able to make policy alterations, based on abnormal network events.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets 基于SysML和随机奖励网的服务器系统年轻化建模与分析
E. Andrade, F. Machida, Dong Seong Kim, Kishor S. Trivedi
High-availability assurance of server systems is becoming an important issue, since many mission-critical applications are implemented on server systems. To achieve high-availability, software rejuvenation is a practical technique to reduce unexpected downtime caused by software aging in software applications running on server systems. Although analytic models of software rejuvenation are well-studied, such analysis is not used in server system administration due to the complexity of modeling. In this paper, we present an availability modeling method for server system with software rejuvenation based on SysML that is used to describe system configurations and maintenance operations semi-formally. The proposed approach allows system administrators, who do not have expertise in availability modeling, to design and study the effects of different rejuvenation policies deployed in server systems. To show the applicability of the proposed modeling and evaluation process, a case study of a web application server is presented. We show the correctness of our modeling method by comparing the conventional models for condition-based and time-based software rejuvenation.
服务器系统的高可用性保证正成为一个重要问题,因为许多关键任务应用程序都是在服务器系统上实现的。为了实现高可用性,软件再生是一种实用的技术,用于减少运行在服务器系统上的软件应用程序因软件老化而导致的意外停机时间。尽管软件再生的分析模型得到了很好的研究,但由于建模的复杂性,这种分析并未用于服务器系统管理。本文提出了一种基于SysML的具有软件再生功能的服务器系统可用性建模方法,用于半形式化地描述系统配置和维护操作。所建议的方法允许没有可用性建模专业知识的系统管理员设计和研究部署在服务器系统中的不同恢复策略的效果。为了说明所提出的建模和评估过程的适用性,给出了一个web应用服务器的案例研究。我们通过比较基于条件和基于时间的软件再生的传统模型来证明我们建模方法的正确性。
{"title":"Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets","authors":"E. Andrade, F. Machida, Dong Seong Kim, Kishor S. Trivedi","doi":"10.1109/ARES.2011.28","DOIUrl":"https://doi.org/10.1109/ARES.2011.28","url":null,"abstract":"High-availability assurance of server systems is becoming an important issue, since many mission-critical applications are implemented on server systems. To achieve high-availability, software rejuvenation is a practical technique to reduce unexpected downtime caused by software aging in software applications running on server systems. Although analytic models of software rejuvenation are well-studied, such analysis is not used in server system administration due to the complexity of modeling. In this paper, we present an availability modeling method for server system with software rejuvenation based on SysML that is used to describe system configurations and maintenance operations semi-formally. The proposed approach allows system administrators, who do not have expertise in availability modeling, to design and study the effects of different rejuvenation policies deployed in server systems. To show the applicability of the proposed modeling and evaluation process, a case study of a web application server is presented. We show the correctness of our modeling method by comparing the conventional models for condition-based and time-based software rejuvenation.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Roadmap to Approaches for Carving of Fragmented Multimedia Files 分割多媒体文件的方法路线图
R. Poisel, S. Tjoa
File carving is a recovery technique which does not consider file tables or other meta-data which is used to organize data on storage media. As files can be recovered based only on their content and/or structure this technique is an indispensable task during digital investigations. The main contribution of this paper is a survey about new approaches in the file carving research field and a roadmap that outlines the necessary steps towards video file carving. So far many approaches for the recovery of digital images have been proposed. After a short discussion of relevant representatives in this domain we focus on the applicability of these approaches to the recovery of multimedia files. Further this paper discusses ideas from the forensics wiki for their applicability to such a file carver. Finally our findings are summarized verbally and visually as a roadmap.
文件雕刻是一种恢复技术,它不考虑用于组织存储介质上的数据的文件表或其他元数据。由于文件只能根据其内容和/或结构进行恢复,因此该技术在数字调查中是必不可少的任务。本文的主要贡献是概述了文件雕刻研究领域的新方法,并概述了视频文件雕刻的必要步骤的路线图。到目前为止,已经提出了许多恢复数字图像的方法。在对该领域的相关代表进行简短讨论之后,我们将重点讨论这些方法对多媒体文件恢复的适用性。此外,本文还讨论了取证wiki对这种文件雕刻器的适用性。最后,我们的发现被口头和视觉地总结为路线图。
{"title":"Roadmap to Approaches for Carving of Fragmented Multimedia Files","authors":"R. Poisel, S. Tjoa","doi":"10.1109/ARES.2011.118","DOIUrl":"https://doi.org/10.1109/ARES.2011.118","url":null,"abstract":"File carving is a recovery technique which does not consider file tables or other meta-data which is used to organize data on storage media. As files can be recovered based only on their content and/or structure this technique is an indispensable task during digital investigations. The main contribution of this paper is a survey about new approaches in the file carving research field and a roadmap that outlines the necessary steps towards video file carving. So far many approaches for the recovery of digital images have been proposed. After a short discussion of relevant representatives in this domain we focus on the applicability of these approaches to the recovery of multimedia files. Further this paper discusses ideas from the forensics wiki for their applicability to such a file carver. Finally our findings are summarized verbally and visually as a roadmap.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Web Services Security Policy Assertion Trade-offs Web服务安全策略断言权衡
Tristan Lavarack, M. Coetzee
Web services security requirements and capabilities are described in security policies. To enable the seamless interoperation between services, security policy intersection aims to provide a security policy that will satisfy both the service provider and consumer. Not only are there numerous problems with this approach, but is it also difficult for administrators to evaluate the resultant security level supported by such a policy. In contrast to this approach, security policy trade-off analysis can allow parties to make compromises to accommodate each other, while still achieving a satisfactory security level. This paper focuses on modeling the decisions and compromises to be made by web services providers or consumers to be able to interact with each other securely. The security policy support system built to model this problem employs domain vocabularies, fuzzy techniques and domain-specific preferences.
Web服务安全需求和功能在安全策略中描述。为了支持服务之间的无缝互操作,安全策略交叉旨在提供一个同时满足服务提供者和使用者的安全策略。这种方法不仅存在许多问题,而且管理员很难评估这种策略所支持的最终安全级别。与此方法相反,安全策略权衡分析可以允许各方做出妥协以适应彼此,同时仍然达到令人满意的安全级别。本文的重点是对web服务提供者或消费者为能够安全地相互交互而做出的决策和妥协进行建模。为对该问题建模而构建的安全策略支持系统采用领域词汇表、模糊技术和特定于领域的首选项。
{"title":"Web Services Security Policy Assertion Trade-offs","authors":"Tristan Lavarack, M. Coetzee","doi":"10.1109/ARES.2011.80","DOIUrl":"https://doi.org/10.1109/ARES.2011.80","url":null,"abstract":"Web services security requirements and capabilities are described in security policies. To enable the seamless interoperation between services, security policy intersection aims to provide a security policy that will satisfy both the service provider and consumer. Not only are there numerous problems with this approach, but is it also difficult for administrators to evaluate the resultant security level supported by such a policy. In contrast to this approach, security policy trade-off analysis can allow parties to make compromises to accommodate each other, while still achieving a satisfactory security level. This paper focuses on modeling the decisions and compromises to be made by web services providers or consumers to be able to interact with each other securely. The security policy support system built to model this problem employs domain vocabularies, fuzzy techniques and domain-specific preferences.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129913542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Inductive Approach to Provable Anonymity 一种可证明匿名的归纳方法
Yongjian Li, Jun Pang
We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et al. Our formalization relies on inductive definitions of message distinguish ability and observational equivalence over observed traces by the intruder. Our theory differs from its original proposal which essentially boils down to the existence of a reinterpretation function. We build our theory in Isabelle/HOL to have a mechanical framework for the analysis of anonymity protocols. Its feasibility is illustrated through the onion routing protocol.
我们将Garcia等人提出的可证明匿名的概念形式化到一个定理证明中。我们的形式化依赖于信息区分能力的归纳定义和入侵者对观察轨迹的观察等效性。我们的理论不同于它最初的建议,它本质上归结为存在一个重新解释功能。我们在Isabelle/HOL中建立了我们的理论,为匿名协议的分析提供了一个机械框架。通过洋葱路由协议说明了其可行性。
{"title":"An Inductive Approach to Provable Anonymity","authors":"Yongjian Li, Jun Pang","doi":"10.1109/ARES.2011.70","DOIUrl":"https://doi.org/10.1109/ARES.2011.70","url":null,"abstract":"We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et al. Our formalization relies on inductive definitions of message distinguish ability and observational equivalence over observed traces by the intruder. Our theory differs from its original proposal which essentially boils down to the existence of a reinterpretation function. We build our theory in Isabelle/HOL to have a mechanical framework for the analysis of anonymity protocols. Its feasibility is illustrated through the onion routing protocol.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116309710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Learning Privacy Preferences 学习隐私偏好
Inger Anne Tøndel, Åsmund Ahlmann Nyre, K. Bernsmed
This paper suggests a machine learning approach to preference generation in the context of privacy agents. With this solution, users are relieved from the complex task of specifying their preferences beforehand, disconnected from actual situations. Instead, historical privacy decisions are used as a basis for providing privacy recommendations to users in new situations. The solution also takes into account the reasons why users act as they do, and allows users to benefit from information on the privacy trade-offs made by others.
本文提出了一种基于机器学习的隐私代理偏好生成方法。有了这个解决方案,用户可以从事先指定他们的偏好的复杂任务中解脱出来,脱离实际情况。相反,历史隐私决策被用作在新情况下向用户提供隐私建议的基础。该解决方案还考虑了用户行为的原因,并允许用户从其他人所做的隐私权衡信息中受益。
{"title":"Learning Privacy Preferences","authors":"Inger Anne Tøndel, Åsmund Ahlmann Nyre, K. Bernsmed","doi":"10.1109/ARES.2011.96","DOIUrl":"https://doi.org/10.1109/ARES.2011.96","url":null,"abstract":"This paper suggests a machine learning approach to preference generation in the context of privacy agents. With this solution, users are relieved from the complex task of specifying their preferences beforehand, disconnected from actual situations. Instead, historical privacy decisions are used as a basis for providing privacy recommendations to users in new situations. The solution also takes into account the reasons why users act as they do, and allows users to benefit from information on the privacy trade-offs made by others.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance Evaluation of ID-based Group Key Agreement Protocols 基于id的组密钥协商协议的性能评价
Elisavet Konstantinou, Eleni Klaoudatou, Pavlos Kamparmpakis
In this paper we present all ID-based Group Key Agreement (GKA) protocols proposed so far in the literature and evaluate their efficiency. The protocols have been categorized into 5 different classes and we have computed their computation and communication complexity having as parameter the size of the group. Our theoretical analysis shows in detail the computation and communication cost of the protocols taking into account also the size of the sent messages, while our extensive experimental assessments compare their total energy cost for different group sizes. Furthermore, our evaluation is presented in a generalized way and can therefore serve as a reference point for future evaluations and for the design of new, improved ID-based GKA protocols.
本文介绍了目前文献中提出的所有基于id的组密钥协议(GKA),并评估了它们的效率。这些协议被分为5个不同的类别,我们计算了它们的计算和通信复杂性,并以组的大小为参数。我们的理论分析详细显示了考虑到发送消息大小的协议的计算和通信成本,而我们广泛的实验评估比较了它们在不同组大小下的总能量成本。此外,我们的评估以一种广义的方式提出,因此可以作为未来评估和设计新的、改进的基于id的GKA协议的参考点。
{"title":"Performance Evaluation of ID-based Group Key Agreement Protocols","authors":"Elisavet Konstantinou, Eleni Klaoudatou, Pavlos Kamparmpakis","doi":"10.1109/ARES.2011.63","DOIUrl":"https://doi.org/10.1109/ARES.2011.63","url":null,"abstract":"In this paper we present all ID-based Group Key Agreement (GKA) protocols proposed so far in the literature and evaluate their efficiency. The protocols have been categorized into 5 different classes and we have computed their computation and communication complexity having as parameter the size of the group. Our theoretical analysis shows in detail the computation and communication cost of the protocols taking into account also the size of the sent messages, while our extensive experimental assessments compare their total energy cost for different group sizes. Furthermore, our evaluation is presented in a generalized way and can therefore serve as a reference point for future evaluations and for the design of new, improved ID-based GKA protocols.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115802721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing 基于模式的云计算领域ISO 27000环境建立和资产识别支持
Kristian Beckers, Holger Schmidt, Jan-Christoph Küster, Stephan Faßbender
The ISO 27000 is a well-established series of information security standards. The scope for applying these standards can be an organisation as a whole, single business processes or even an IT application or IT infrastructure. The context establishment and the asset identification are among the first steps to be performed. The quality of the results produced when performing these steps has a crucial influence on the subsequent steps such as identifying loss, vulnerabilities, possible attacks and defining countermeasures. Thus, a context analysis to gather all necessary information in the initial steps is important, but is not offered in the standard. In this paper, we focus on the scope of cloud computing systems and present a way to support the context establishment and the asset identification described in ISO 27005. A cloud system analysis pattern and different kinds of stakeholder templates serve to understand and describe a given cloud development problem, i.e. the envisaged IT systems and the relevant parts of the operational environment. We illustrate our support using an online banking cloud scenario.
ISO 27000是一套完善的信息安全标准。应用这些标准的范围可以是整个组织、单个业务流程,甚至是IT应用程序或IT基础设施。上下文建立和资产标识是要执行的第一步。执行这些步骤时产生的结果质量对后续步骤(如识别损失、漏洞、可能的攻击和定义对策)具有至关重要的影响。因此,在初始步骤中收集所有必要信息的上下文分析很重要,但标准中没有提供。在本文中,我们关注云计算系统的范围,并提出一种支持ISO 27005中描述的上下文建立和资产识别的方法。云系统分析模式和不同类型的涉众模板用于理解和描述给定的云开发问题,即设想的IT系统和操作环境的相关部分。我们使用一个在线银行云场景来说明我们的支持。
{"title":"Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing","authors":"Kristian Beckers, Holger Schmidt, Jan-Christoph Küster, Stephan Faßbender","doi":"10.1109/ARES.2011.55","DOIUrl":"https://doi.org/10.1109/ARES.2011.55","url":null,"abstract":"The ISO 27000 is a well-established series of information security standards. The scope for applying these standards can be an organisation as a whole, single business processes or even an IT application or IT infrastructure. The context establishment and the asset identification are among the first steps to be performed. The quality of the results produced when performing these steps has a crucial influence on the subsequent steps such as identifying loss, vulnerabilities, possible attacks and defining countermeasures. Thus, a context analysis to gather all necessary information in the initial steps is important, but is not offered in the standard. In this paper, we focus on the scope of cloud computing systems and present a way to support the context establishment and the asset identification described in ISO 27005. A cloud system analysis pattern and different kinds of stakeholder templates serve to understand and describe a given cloud development problem, i.e. the envisaged IT systems and the relevant parts of the operational environment. We illustrate our support using an online banking cloud scenario.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133142161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
期刊
2011 Sixth International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1