首页 > 最新文献

2011 Sixth International Conference on Availability, Reliability and Security最新文献

英文 中文
A Hypervisor-Based Bus System for Usage Control 基于管理程序的使用控制总线系统
Cornelius Moucha, Enrico Lovat, A. Pretschner
Data usage control is concerned with requirements on data after access has been granted. In order to enforce usage control requirements, it is necessary to track the different representations that the data may take (among others, file, window content, network packet). These representations exist at different layers of abstraction. As a consequence, in order to enforce usage control requirements, multiple data flow tracking and usage control enforcement monitors must exist, one at each layer. If a new representation is created at some layer of abstraction, e.g., if a cache file is created for a picture after downloading it with a browser, then the initiating layer (in the example, the browser) must notify the layer at which the new representation is created (in the example, the operating system). We present a bus system for system-wide usage control that, for security and performance reasons, is implemented in a hyper visor. We evaluate its security and performance.
数据使用控制涉及在获得访问权限后对数据的要求。为了加强使用控制需求,有必要跟踪数据可能采取的不同表示(其中包括文件、窗口内容、网络数据包)。这些表示存在于不同的抽象层。因此,为了执行使用控制需求,必须存在多个数据流跟踪和使用控制执行监视器,每层一个。如果在某个抽象层创建了一个新的表示,例如,如果在用浏览器下载图片后创建了一个缓存文件,那么初始层(在本例中为浏览器)必须通知创建新表示的层(在本例中为操作系统)。我们提出了一个用于系统范围使用控制的总线系统,出于安全和性能的原因,它在一个超级遮阳器中实现。我们评估了它的安全性和性能。
{"title":"A Hypervisor-Based Bus System for Usage Control","authors":"Cornelius Moucha, Enrico Lovat, A. Pretschner","doi":"10.1109/ARES.2011.44","DOIUrl":"https://doi.org/10.1109/ARES.2011.44","url":null,"abstract":"Data usage control is concerned with requirements on data after access has been granted. In order to enforce usage control requirements, it is necessary to track the different representations that the data may take (among others, file, window content, network packet). These representations exist at different layers of abstraction. As a consequence, in order to enforce usage control requirements, multiple data flow tracking and usage control enforcement monitors must exist, one at each layer. If a new representation is created at some layer of abstraction, e.g., if a cache file is created for a picture after downloading it with a browser, then the initiating layer (in the example, the browser) must notify the layer at which the new representation is created (in the example, the operating system). We present a bus system for system-wide usage control that, for security and performance reasons, is implemented in a hyper visor. We evaluate its security and performance.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115786858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations 用误用案例图、误用案例图和系统架构图进行安全漏洞和缓解的实验比较
P. Kárpáti, A. Opdahl, G. Sindre
The idea of security aware system development from the start of the engineering process is generally accepted nowadays and is becoming applied in practice. Many recent initiatives support this idea with special focus on security requirements elicitation. However, there are so far no techniques that provide integrated overviews of security threats and system architecture. One way to achieve this is by combining misuse cases with use case maps into misuse case maps (MUCM). This paper presents an experimental evaluation of MUCM diagrams focusing on identification of vulnerabilities and mitigations. The controlled experiment with 33 IT students included a complex hacker intrusion from the literature, illustrated either with MUCM or with alternative diagrams. The results suggest that participants using MUCM found significantly more mitigations than participants using regular misuse cases combined with system architecture diagrams.
安全感知系统开发的思想从工程过程的一开始就被普遍接受,并逐渐在实践中得到应用。许多最近的计划都支持这个想法,并特别关注安全需求的引出。然而,到目前为止,还没有技术能够提供安全威胁和系统架构的集成概述。实现这一点的一种方法是将滥用用例与用例图结合到滥用用例图(MUCM)中。本文提出了MUCM图的实验评估,重点是识别漏洞和缓解。33名IT专业学生参与的对照实验包括一个复杂的黑客入侵案例,该案例用MUCM或替代图表进行说明。结果表明,使用MUCM的参与者比使用常规滥用案例与系统架构图相结合的参与者发现了更多的缓解。
{"title":"Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations","authors":"P. Kárpáti, A. Opdahl, G. Sindre","doi":"10.1109/ARES.2011.77","DOIUrl":"https://doi.org/10.1109/ARES.2011.77","url":null,"abstract":"The idea of security aware system development from the start of the engineering process is generally accepted nowadays and is becoming applied in practice. Many recent initiatives support this idea with special focus on security requirements elicitation. However, there are so far no techniques that provide integrated overviews of security threats and system architecture. One way to achieve this is by combining misuse cases with use case maps into misuse case maps (MUCM). This paper presents an experimental evaluation of MUCM diagrams focusing on identification of vulnerabilities and mitigations. The controlled experiment with 33 IT students included a complex hacker intrusion from the literature, illustrated either with MUCM or with alternative diagrams. The results suggest that participants using MUCM found significantly more mitigations than participants using regular misuse cases combined with system architecture diagrams.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An Obfuscation-Based Approach against Injection Attacks 一种基于混淆的抗注入攻击方法
F. Baiardi, D. Sgandurra
We present an obfuscation strategy to protect a program against injection attacks. The strategy represents the program as a set of code fragments in-between two consecutive system calls (the system blocks) and a graph that represents the execution order of the fragment (the system block graph). The system blocks and the system block graph are partitioned between two virtual machines (VMs). The Blocks-VM stores and executes the system blocks but does not store any information on how control flows across the system blocks. This information is represented only by the system block graph stored in the Graph-VM, which correctly sequentializes the system blocks by analyzing the system block graph and accessing the Blocks-VM. At run-time, each time a system block ends, i.e. the program issues a system call, the execution of the Blocks-VM is frozen and control is transferred to the Graph-VM. After deducing the next system block to be executed from the system block graph, the current system block and the current system call, the Graph-VM updates the return address in the Blocks-VM so that the correct system block is executed and then resumes the Blocks-VM. To protect code integrity, the Graph-VM also stores a hash of each block. The overall strategy results in a clean separation between the program and its control-flow and this is important whenever the Graph-VM is in full control of the user whereas the Blocks-VM may be attacked through code injection. The Graph-VM can discover these attacks because either the current system call is not present in the original program or the hash of the current block is invalid. In all these cases, the Graph-VM halts the execution of the program. We present the algorithm that maps the program source code into the system blocks and the system block graph and discuss a first implementation of the run-time architecture along with some performance results.
我们提出了一种混淆策略来保护程序免受注入攻击。该策略将程序表示为两个连续系统调用之间的一组代码片段(系统块)和表示片段执行顺序的图(系统块图)。系统块和系统块图在两个虚拟机之间进行分区。blocks - vm存储和执行系统块,但不存储关于控制如何在系统块之间流动的任何信息。该信息仅由存储在graph - vm中的系统块图表示,通过分析系统块图并访问blocks - vm,可以正确地对系统块进行排序。在运行时,每次一个系统块结束时,即程序发出一个系统调用,block - vm的执行被冻结,控制权被转移到Graph-VM。在从系统块图、当前系统块和当前系统调用中推断出下一个要执行的系统块后,graph - vm更新Blocks-VM中的返回地址,以便执行正确的系统块,然后恢复Blocks-VM。为了保护代码的完整性,Graph-VM还存储了每个块的散列。整体策略导致程序与其控制流之间的清晰分离,每当Graph-VM完全控制用户时,这一点很重要,而block - vm可能通过代码注入受到攻击。图- vm可以发现这些攻击,因为当前系统调用不存在于原始程序中,或者当前块的哈希值无效。在所有这些情况下,Graph-VM停止程序的执行。我们提出了将程序源代码映射到系统块和系统块图的算法,并讨论了运行时体系结构的第一个实现以及一些性能结果。
{"title":"An Obfuscation-Based Approach against Injection Attacks","authors":"F. Baiardi, D. Sgandurra","doi":"10.1109/ARES.2011.17","DOIUrl":"https://doi.org/10.1109/ARES.2011.17","url":null,"abstract":"We present an obfuscation strategy to protect a program against injection attacks. The strategy represents the program as a set of code fragments in-between two consecutive system calls (the system blocks) and a graph that represents the execution order of the fragment (the system block graph). The system blocks and the system block graph are partitioned between two virtual machines (VMs). The Blocks-VM stores and executes the system blocks but does not store any information on how control flows across the system blocks. This information is represented only by the system block graph stored in the Graph-VM, which correctly sequentializes the system blocks by analyzing the system block graph and accessing the Blocks-VM. At run-time, each time a system block ends, i.e. the program issues a system call, the execution of the Blocks-VM is frozen and control is transferred to the Graph-VM. After deducing the next system block to be executed from the system block graph, the current system block and the current system call, the Graph-VM updates the return address in the Blocks-VM so that the correct system block is executed and then resumes the Blocks-VM. To protect code integrity, the Graph-VM also stores a hash of each block. The overall strategy results in a clean separation between the program and its control-flow and this is important whenever the Graph-VM is in full control of the user whereas the Blocks-VM may be attacked through code injection. The Graph-VM can discover these attacks because either the current system call is not present in the original program or the hash of the current block is invalid. In all these cases, the Graph-VM halts the execution of the program. We present the algorithm that maps the program source code into the system blocks and the system block graph and discuss a first implementation of the run-time architecture along with some performance results.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Context-aware, Personalized Delivery of Process Information: Viewpoints, Problems, and Requirements 关于过程信息的上下文感知、个性化交付:观点、问题和需求
Markus Hipp, Bela Mutschler, M. Reichert
Enterprises are confronted with an increasing amount of data. This data overload makes it difficult to provide knowledge-workers and decision-makers with the needed information. Particularly challenging in this context is the integrated provision of both structured and unstructured information depending on the current process context and user, i.e., the context-aware, personalized delivery of process information. Examples of unstructured process information include all kinds of office documents or e-mails. Examples of structured process information are business process models or data from enterprise information systems. Picking up the need for a context-aware, personalized delivery of process information, this paper presents results from three empirical studies: two exploratory case studies from the automotive domain and the healthcare sector, and an online survey among 219 participants. In a first step, we identify and describe problems with respect to process-oriented information management in general and the personalized provision of process information in particular. In a second step, we derive requirements on the user-adequate handling of process information.
企业面临着越来越多的数据。这种数据过载使得向知识工作者和决策者提供所需信息变得困难。在此上下文中,特别具有挑战性的是根据当前过程上下文和用户集成结构化和非结构化信息的提供,即,过程信息的上下文感知、个性化交付。非结构化过程信息的例子包括各种办公文档或电子邮件。结构化过程信息的例子是来自企业信息系统的业务过程模型或数据。考虑到对上下文感知、个性化流程信息交付的需求,本文介绍了三个实证研究的结果:两个来自汽车领域和医疗保健行业的探索性案例研究,以及一项针对219名参与者的在线调查。在第一步中,我们一般识别并描述与面向过程的信息管理有关的问题,特别是与过程信息的个性化提供有关的问题。在第二步中,我们推导出对过程信息的用户适当处理的需求。
{"title":"On the Context-aware, Personalized Delivery of Process Information: Viewpoints, Problems, and Requirements","authors":"Markus Hipp, Bela Mutschler, M. Reichert","doi":"10.1109/ARES.2011.65","DOIUrl":"https://doi.org/10.1109/ARES.2011.65","url":null,"abstract":"Enterprises are confronted with an increasing amount of data. This data overload makes it difficult to provide knowledge-workers and decision-makers with the needed information. Particularly challenging in this context is the integrated provision of both structured and unstructured information depending on the current process context and user, i.e., the context-aware, personalized delivery of process information. Examples of unstructured process information include all kinds of office documents or e-mails. Examples of structured process information are business process models or data from enterprise information systems. Picking up the need for a context-aware, personalized delivery of process information, this paper presents results from three empirical studies: two exploratory case studies from the automotive domain and the healthcare sector, and an online survey among 219 participants. In a first step, we identify and describe problems with respect to process-oriented information management in general and the personalized provision of process information in particular. In a second step, we derive requirements on the user-adequate handling of process information.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Probabilistic Fault-tolerance of Distributed Services: A Paradigm for Dependable Applications 分布式服务的概率容错:可靠应用的范例
K. Ravindran
The paper deals with a study of probabilistic methods to manage the dependability of a networked distributed system, in the presence of inaccuracies and partial knowledge of system models pertaining to failures. A distributed networked system (DIS) that collects raw data from sensors deployed in the field and delivers a composite data to an end-user is faced with two types of uncertainties: at 'information level' due to the multi-modal nature of raw data collected from the environment, and at 'control level' due to the incompleteness in knowledge about the application model. These have a compounded effect on the quality of fault-tolerance exhibited by a DIS. Based on service-layer abstractions, the paper identifies application-oriented metrics to quantify the quality of information flowing through a DIS. Even with imperfect information, the paper demonstrates how the high-level quality metrics and control algorithms enable achieving a reasonable degree of fault-tolerance in a probabilistic manner. A case study of replicated web services is also described.
本文研究了一种概率方法来管理网络分布式系统的可靠性,在不准确和部分知识的情况下,系统模型与故障有关。分布式网络系统(DIS)从部署在现场的传感器收集原始数据,并向最终用户提供复合数据,它面临两种类型的不确定性:由于从环境中收集的原始数据的多模态性质,在“信息级”,以及由于应用模型知识的不完整性,在“控制级”。这些对DIS所表现出的容错质量产生了复合影响。基于服务层抽象,本文确定了面向应用的指标,以量化流经DIS的信息质量。即使信息不完美,本文也演示了高级质量指标和控制算法如何以概率方式实现合理程度的容错。还描述了复制web服务的一个案例研究。
{"title":"Probabilistic Fault-tolerance of Distributed Services: A Paradigm for Dependable Applications","authors":"K. Ravindran","doi":"10.1109/ARES.2011.21","DOIUrl":"https://doi.org/10.1109/ARES.2011.21","url":null,"abstract":"The paper deals with a study of probabilistic methods to manage the dependability of a networked distributed system, in the presence of inaccuracies and partial knowledge of system models pertaining to failures. A distributed networked system (DIS) that collects raw data from sensors deployed in the field and delivers a composite data to an end-user is faced with two types of uncertainties: at 'information level' due to the multi-modal nature of raw data collected from the environment, and at 'control level' due to the incompleteness in knowledge about the application model. These have a compounded effect on the quality of fault-tolerance exhibited by a DIS. Based on service-layer abstractions, the paper identifies application-oriented metrics to quantify the quality of information flowing through a DIS. Even with imperfect information, the paper demonstrates how the high-level quality metrics and control algorithms enable achieving a reasonable degree of fault-tolerance in a probabilistic manner. A case study of replicated web services is also described.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126704993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information LiDSec——一种用于保护文本个人信息隐私发布的轻量级假名化方法
Reza Rawassizadeh, Johannes Heurix, Soheil Khosravipour, A. Tjoa
Sharing personal information benefits both data providers and data consumers in many ways. Recent advances in sensor networks and personal archives enable users to record personal information including emails, social networking activities, or life events (life logging). These information objects are usually privacy sensitive and thus need to be protected adequately when being shared. In this work, we present a lightweight pseudonymization framework which allows users to benefit from sharing their personal information while still preserving their privacy. Furthermore, this approach increases the data owners' awareness of what information they are sharing, thus rendering data publishing more transparent.
共享个人信息在很多方面对数据提供者和数据消费者都有好处。传感器网络和个人档案的最新进展使用户能够记录个人信息,包括电子邮件、社交网络活动或生活事件(生活日志)。这些信息对象通常是隐私敏感的,因此在共享时需要充分保护。在这项工作中,我们提出了一个轻量级的假名化框架,允许用户从分享他们的个人信息中受益,同时仍然保护他们的隐私。此外,这种方法提高了数据所有者对他们正在共享的信息的认识,从而使数据发布更加透明。
{"title":"LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information","authors":"Reza Rawassizadeh, Johannes Heurix, Soheil Khosravipour, A. Tjoa","doi":"10.1109/ARES.2011.93","DOIUrl":"https://doi.org/10.1109/ARES.2011.93","url":null,"abstract":"Sharing personal information benefits both data providers and data consumers in many ways. Recent advances in sensor networks and personal archives enable users to record personal information including emails, social networking activities, or life events (life logging). These information objects are usually privacy sensitive and thus need to be protected adequately when being shared. In this work, we present a lightweight pseudonymization framework which allows users to benefit from sharing their personal information while still preserving their privacy. Furthermore, this approach increases the data owners' awareness of what information they are sharing, thus rendering data publishing more transparent.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"38 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126745541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Accurate Adware Detection Using Opcode Sequence Extraction 使用操作码序列提取准确的广告软件检测
R. Shahzad, Niklas Lavesson, H. Johnson
Adware represents a possible threat to the security and privacy of computer users. Traditional signature-based and heuristic-based methods have not been proven to be successful at detecting this type of software. This paper presents an adware detection approach based on the application of data mining on disassembled code. The main contributions of the paper is a large publicly available adware data set, an accurate adware detection algorithm, and an extensive empirical evaluation of several candidate machine learning techniques that can be used in conjunction with the algorithm. We have extracted sequences of opcodes from adware and benign software and we have then applied feature selection, using different configurations, to obtain 63 data sets. Six data mining algorithms have been evaluated on these data sets in order to find an efficient and accurate detector. Our experimental results show that the proposed approach can be used to accurately detect both novel and known adware instances even though the binary difference between adware and legitimate software is usually small.
广告软件可能对计算机用户的安全和隐私构成威胁。传统的基于签名和启发式的方法在检测此类软件方面尚未被证明是成功的。提出了一种基于数据挖掘在反汇编代码中的应用的广告软件检测方法。本文的主要贡献是一个大型的公开广告软件数据集,一个准确的广告软件检测算法,以及对几种候选机器学习技术的广泛经验评估,这些技术可以与该算法结合使用。我们从广告软件和良性软件中提取了操作码序列,然后应用特征选择,使用不同的配置,获得63个数据集。为了找到一种高效、准确的检测器,我们在这些数据集上对六种数据挖掘算法进行了评估。我们的实验结果表明,即使广告软件和合法软件之间的二进制差异通常很小,所提出的方法也可以用来准确地检测新的和已知的广告软件实例。
{"title":"Accurate Adware Detection Using Opcode Sequence Extraction","authors":"R. Shahzad, Niklas Lavesson, H. Johnson","doi":"10.1109/ARES.2011.35","DOIUrl":"https://doi.org/10.1109/ARES.2011.35","url":null,"abstract":"Adware represents a possible threat to the security and privacy of computer users. Traditional signature-based and heuristic-based methods have not been proven to be successful at detecting this type of software. This paper presents an adware detection approach based on the application of data mining on disassembled code. The main contributions of the paper is a large publicly available adware data set, an accurate adware detection algorithm, and an extensive empirical evaluation of several candidate machine learning techniques that can be used in conjunction with the algorithm. We have extracted sequences of opcodes from adware and benign software and we have then applied feature selection, using different configurations, to obtain 63 data sets. Six data mining algorithms have been evaluated on these data sets in order to find an efficient and accurate detector. Our experimental results show that the proposed approach can be used to accurately detect both novel and known adware instances even though the binary difference between adware and legitimate software is usually small.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125824758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems SWAT:用于可靠安全进程感知信息系统的安全工作流分析工具包
R. Accorsi, Claus Wonnemann, S. Dochow
This paper reports on ongoing work on SWAT, a new toolkit for security workflow analysis. SWAT provides a platform for the realization and testing of well-founded methods to detect information leaks in workflows, both for the workflow certification and for audit based upon the execution traces. Besides presenting the SWAT's functionality and high-level architecture, an example illustrates its operation.
本文报告了用于安全工作流分析的新工具包SWAT正在进行的工作。SWAT为实现和测试建立良好的方法提供了一个平台,用于检测工作流中的信息泄漏,包括工作流认证和基于执行跟踪的审计。除了介绍SWAT的功能和高级体系结构外,还有一个示例说明其操作。
{"title":"SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems","authors":"R. Accorsi, Claus Wonnemann, S. Dochow","doi":"10.1109/ARES.2011.108","DOIUrl":"https://doi.org/10.1109/ARES.2011.108","url":null,"abstract":"This paper reports on ongoing work on SWAT, a new toolkit for security workflow analysis. SWAT provides a platform for the realization and testing of well-founded methods to detect information leaks in workflows, both for the workflow certification and for audit based upon the execution traces. Besides presenting the SWAT's functionality and high-level architecture, an example illustrates its operation.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126615101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Information Security Automation: How Far Can We Go? 信息安全自动化:我们能走多远?
Raydel Montesino, Stefan Fenz
Information security management is a very complex task which involves the implementation and monitoring of more than 130 security controls. To achieve greater efficiency in this process it is necessary to automate as many controls as possible. This paper provides an analysis of how many controls can be automated, based on the standards ISO 27001 and NIST SP800-53. Furthermore, we take the automation potential of controls included in the Consensus Audit Guidelines into account. Finally, we provide an overview of security applications that support automation in the operation of information security controls to increase the efficiency of information security management.
信息安全管理是一项非常复杂的任务,涉及130多种安全控制措施的实施和监控。为了在这个过程中实现更高的效率,有必要使尽可能多的控制自动化。本文根据ISO 27001和NIST SP800-53标准,分析了有多少控制可以自动化。此外,我们考虑了共识审计指南中包含的控制的自动化潜力。最后,我们概述了支持信息安全控制操作自动化的安全应用程序,以提高信息安全管理的效率。
{"title":"Information Security Automation: How Far Can We Go?","authors":"Raydel Montesino, Stefan Fenz","doi":"10.1109/ARES.2011.48","DOIUrl":"https://doi.org/10.1109/ARES.2011.48","url":null,"abstract":"Information security management is a very complex task which involves the implementation and monitoring of more than 130 security controls. To achieve greater efficiency in this process it is necessary to automate as many controls as possible. This paper provides an analysis of how many controls can be automated, based on the standards ISO 27001 and NIST SP800-53. Furthermore, we take the automation potential of controls included in the Consensus Audit Guidelines into account. Finally, we provide an overview of security applications that support automation in the operation of information security controls to increase the efficiency of information security management.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115981393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Privacy Verification Using Ontologies 使用本体进行隐私验证
M. Kost, J. Freytag, F. Kargl, A. Kung
As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a comprehensive approach for privacy requirement engineering, implementation, and verification is largely missing. This paper extends current design methods by additional (formal) steps which take advantage of ontologies. The proposed extensions result in a systematic approach that better protects privacy in future information systems.
由于信息系统在参与者之间广泛交换信息,因此可能会因误用而引起隐私问题。设计隐私(PbD)方法在系统的设计和实现过程中考虑了不同利益相关者的隐私需求。目前,隐私需求工程、实现和验证的综合方法在很大程度上是缺失的。本文通过利用本体的额外(正式)步骤扩展了当前的设计方法。所建议的扩展产生了一种系统的方法,可以更好地保护未来信息系统中的隐私。
{"title":"Privacy Verification Using Ontologies","authors":"M. Kost, J. Freytag, F. Kargl, A. Kung","doi":"10.1109/ARES.2011.97","DOIUrl":"https://doi.org/10.1109/ARES.2011.97","url":null,"abstract":"As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a comprehensive approach for privacy requirement engineering, implementation, and verification is largely missing. This paper extends current design methods by additional (formal) steps which take advantage of ontologies. The proposed extensions result in a systematic approach that better protects privacy in future information systems.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124908779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
期刊
2011 Sixth International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1