首页 > 最新文献

2011 Sixth International Conference on Availability, Reliability and Security最新文献

英文 中文
Evaluating RBAC Supported Techniques and their Validation and Verification 评估RBAC支持的技术及其验证和验证
Nafees Qamar, Y. Ledru, Akram Idani
This paper evaluates the security specification techniques that employ Role Based Access Control (RBAC) variants. RBAC offers a special kind of access control mechanism based on the use of roles to grant permissions. Its variants include role hierarchy and separation of duty (SoD) constraints. The overall management of a RBAC supported system is made through its administrative, review and supporting system functions. In this paper, a summary of semi-formal and formal techniques employing RBAC is provided along with their benefits and limitations. Here, semi-formal techniques refer to UML+OCL while formal ones are based on Alloy. This paper may guide through the process of selecting an appropriate technique to specify security rules. This is done by analyzing the degree of coverage of RBAC including some extensions like SoD and role hierarchy. We also investigate the use of validation and verification tools in these techniques. We find that formal techniques are more amenable to automated analysis as compared to semi-formal ones. Semi-formal techniques are rich in specifying RBAC variants but have prototypic tools. Session based dynamic aspects of RBAC have been partly covered in both techniques.
本文评估了采用基于角色的访问控制(RBAC)变体的安全规范技术。RBAC提供了一种基于角色授予权限的特殊访问控制机制。它的变体包括角色层次和职责分离(SoD)约束。RBAC支持系统的全面管理是通过其行政、审查和支持系统功能进行的。本文总结了采用RBAC的半正式和正式技术,以及它们的优点和局限性。这里,半形式化技术是指UML+OCL,而形式化技术是基于Alloy的。本文可以指导如何选择适当的技术来指定安全规则。这是通过分析RBAC的覆盖程度来完成的,包括一些扩展,如SoD和角色层次结构。我们还研究了这些技术中验证和验证工具的使用。我们发现,与半正式技术相比,正式技术更适合于自动化分析。半形式化技术在指定RBAC变体方面非常丰富,但具有原型工具。基于会话的RBAC动态方面在这两种技术中都有部分介绍。
{"title":"Evaluating RBAC Supported Techniques and their Validation and Verification","authors":"Nafees Qamar, Y. Ledru, Akram Idani","doi":"10.1109/ARES.2011.112","DOIUrl":"https://doi.org/10.1109/ARES.2011.112","url":null,"abstract":"This paper evaluates the security specification techniques that employ Role Based Access Control (RBAC) variants. RBAC offers a special kind of access control mechanism based on the use of roles to grant permissions. Its variants include role hierarchy and separation of duty (SoD) constraints. The overall management of a RBAC supported system is made through its administrative, review and supporting system functions. In this paper, a summary of semi-formal and formal techniques employing RBAC is provided along with their benefits and limitations. Here, semi-formal techniques refer to UML+OCL while formal ones are based on Alloy. This paper may guide through the process of selecting an appropriate technique to specify security rules. This is done by analyzing the degree of coverage of RBAC including some extensions like SoD and role hierarchy. We also investigate the use of validation and verification tools in these techniques. We find that formal techniques are more amenable to automated analysis as compared to semi-formal ones. Semi-formal techniques are rich in specifying RBAC variants but have prototypic tools. Session based dynamic aspects of RBAC have been partly covered in both techniques.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132552781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Biometric authentication as a service for enterprise identity management deployment: a data protection perspective 用于企业身份管理部署的生物识别身份验证服务:数据保护视角
C. Senk, Florian Dotzler
Biometric Authentication as a Service is an innovative approach for strong authentication in web environments based on the Software as a Service model. However, both the adoption of SaaS systems and biometric technologies negatively correlate with perceived privacy and data protection risks. We specify a list of evaluation criteria for BioAaaS systems from a data protection point of view including elements specific to both biometrics and SaaS. We further apply these criteria on a prototypical implementation of a SaaS-compliant biometric authentication service based on keystroke dynamics for enterprise deployment. The assessment shows that for the most part the prototype conforms to technical data protection requirements. At the organizational level the selection and control of a trust-worthy provider and the conclusion of the service agreement remain.
生物识别认证即服务是一种基于软件即服务模型的web环境中强认证的创新方法。然而,采用SaaS系统和生物识别技术都与感知到的隐私和数据保护风险负相关。我们从数据保护的角度为BioAaaS系统指定了一系列评估标准,其中包括生物识别和SaaS特定的元素。我们进一步将这些标准应用于符合saas的基于击键动力学的生物识别身份验证服务的原型实现,以供企业部署。评估表明,样机在很大程度上符合技术数据保护要求。在组织层面,选择和控制一个值得信赖的提供者和服务协议的缔结仍然存在。
{"title":"Biometric authentication as a service for enterprise identity management deployment: a data protection perspective","authors":"C. Senk, Florian Dotzler","doi":"10.1109/ARES.2011.14","DOIUrl":"https://doi.org/10.1109/ARES.2011.14","url":null,"abstract":"Biometric Authentication as a Service is an innovative approach for strong authentication in web environments based on the Software as a Service model. However, both the adoption of SaaS systems and biometric technologies negatively correlate with perceived privacy and data protection risks. We specify a list of evaluation criteria for BioAaaS systems from a data protection point of view including elements specific to both biometrics and SaaS. We further apply these criteria on a prototypical implementation of a SaaS-compliant biometric authentication service based on keystroke dynamics for enterprise deployment. The assessment shows that for the most part the prototype conforms to technical data protection requirements. At the organizational level the selection and control of a trust-worthy provider and the conclusion of the service agreement remain.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132711062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Deriving Current State RBAC Models from Event Logs 从事件日志派生当前状态RBAC模型
Anne Baumgraß
Process-aware information systems are used to execute business processes to reach the operational goals of an organization. In this context, access control policies are defined to govern the choice in behavior of such systems. In a role engineering process these access control policies can be defined and customized. This paper introduces a new automated approach to derive current state access control policies from event logs extracted from process-aware information systems. For this purpose, the two standard formats for event logs called MXML and XES are used. It is demonstrated how this derivation can ease certain steps in the scenario-driven role engineering process, that are otherwise time-consuming and can get tedious if conducted manually.
流程感知信息系统用于执行业务流程,以达到组织的操作目标。在这种情况下,定义了访问控制策略来管理此类系统的行为选择。在角色工程过程中,可以定义和定制这些访问控制策略。本文介绍了一种从进程感知信息系统中提取的事件日志中派生当前状态访问控制策略的自动化方法。为此,使用了两种标准的事件日志格式MXML和x。演示了此派生如何简化场景驱动的角色工程过程中的某些步骤,否则这些步骤将非常耗时,并且如果手动执行可能会变得乏味。
{"title":"Deriving Current State RBAC Models from Event Logs","authors":"Anne Baumgraß","doi":"10.1109/ARES.2011.104","DOIUrl":"https://doi.org/10.1109/ARES.2011.104","url":null,"abstract":"Process-aware information systems are used to execute business processes to reach the operational goals of an organization. In this context, access control policies are defined to govern the choice in behavior of such systems. In a role engineering process these access control policies can be defined and customized. This paper introduces a new automated approach to derive current state access control policies from event logs extracted from process-aware information systems. For this purpose, the two standard formats for event logs called MXML and XES are used. It is demonstrated how this derivation can ease certain steps in the scenario-driven role engineering process, that are otherwise time-consuming and can get tedious if conducted manually.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"142 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114102538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Crowds Based on Secret-Sharing 基于秘密共享的人群
S. Rass, R. Wigoutschnigg, P. Schartner
Anonymous communication has been a long recognized problem, and various solutions of different performance have been proposed over the last decades. Manifold differently strong security notions, being specific for the sender or receiver, are found in the literature. We consider protection of both, the sender's and receiver's identity from each other and a coalition of intermediate relay nodes. The Crowds-system is known to provide probabilistic sender anonymity, but receiver anonymity is only given for asymptotically large networks. Assuming that the adversary notices the communication as such, we prove that the strongest form of receiver anonymity (under this assumption) is efficiently achievable for finite-size (even small) networks. Our construction is secure in the sense that a passive threshold adversary cannot disclose the receiver's identity with a chance better than guessing this information.
匿名通信一直是一个公认的问题,在过去的几十年里,人们提出了各种不同性能的解决方案。在文献中可以找到多种不同的强安全概念,具体针对发送方或接收方。我们考虑了双方的保护,发送方和接收方的相互身份以及中间中继节点的联盟。众所周知,crowds系统提供了概率发送者匿名性,但接收者匿名性仅适用于渐近大型网络。假设对手注意到这样的通信,我们证明最强形式的接收者匿名(在此假设下)对于有限大小(甚至较小)的网络是有效实现的。从某种意义上说,我们的结构是安全的,因为被动阈值攻击者不可能比猜测这些信息更有机会泄露接收者的身份。
{"title":"Crowds Based on Secret-Sharing","authors":"S. Rass, R. Wigoutschnigg, P. Schartner","doi":"10.1109/ARES.2011.60","DOIUrl":"https://doi.org/10.1109/ARES.2011.60","url":null,"abstract":"Anonymous communication has been a long recognized problem, and various solutions of different performance have been proposed over the last decades. Manifold differently strong security notions, being specific for the sender or receiver, are found in the literature. We consider protection of both, the sender's and receiver's identity from each other and a coalition of intermediate relay nodes. The Crowds-system is known to provide probabilistic sender anonymity, but receiver anonymity is only given for asymptotically large networks. Assuming that the adversary notices the communication as such, we prove that the strongest form of receiver anonymity (under this assumption) is efficiently achievable for finite-size (even small) networks. Our construction is secure in the sense that a passive threshold adversary cannot disclose the receiver's identity with a chance better than guessing this information.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129769470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development and Trial Application of Prototype Program for "Social-MRC": Social Consensus Formation Support System Concerning IT Risk Countermeasures “社会- mrc”原型方案的开发与试验应用:IT风险对策社会共识形成支持系统
R. Sasaki, Kazushige Takakusaki, Masaru Ohkawara, H. Yajima, H. Masuda, Tetsurou Kobayashi
The problem of multiple risks is that a countermeasure taken to reduce one risk can increase other risks. To address this problem, a system to support social consensus formation is needed to mitigate the risks. When the number of people necessary for consensus formation is low, such as within an organization, the gMultiple Risk Communicatorh (MRC) developed previously by the authors offers a possible solution to this problem. However, the MRC cannot be applied to problems in which the number of stakeholders exceeds several thousand, and so an innovative solution was necessary. Accordingly, the authors modified and expanded the MRC and developed the concept of gSocial-MRCh to comprehensively support risk communication on two levels: communication among opinion leaders and communication with the participation of ordinary stakeholders. We created a prototype program for Social-MRC and ran a trial application on the information filtering issue for children. In this paper, we describe the refined concept of Social-MRC and evaluate the results of the trial application.
多重风险的问题是,为减少一种风险而采取的对策可能会增加其他风险。为了解决这个问题,需要一个支持社会共识形成的系统来减轻风险。当达成共识所需的人数较低时,例如在一个组织中,作者先前开发的“多重风险沟通器”(MRC)提供了一个可能的解决方案。然而,MRC不能应用于利益相关者超过几千人的问题,因此创新的解决方案是必要的。据此,作者对MRC进行了修改和扩展,并发展了“社会-MRC”的概念,从意见领袖之间的沟通和普通利益相关者参与的沟通两个层面全面支持风险沟通。我们为Social-MRC创建了一个原型程序,并针对儿童的信息过滤问题运行了一个试验应用程序。在本文中,我们描述了社会- mrc的改进概念,并评估了试验应用的结果。
{"title":"Development and Trial Application of Prototype Program for \"Social-MRC\": Social Consensus Formation Support System Concerning IT Risk Countermeasures","authors":"R. Sasaki, Kazushige Takakusaki, Masaru Ohkawara, H. Yajima, H. Masuda, Tetsurou Kobayashi","doi":"10.1109/ARES.2011.76","DOIUrl":"https://doi.org/10.1109/ARES.2011.76","url":null,"abstract":"The problem of multiple risks is that a countermeasure taken to reduce one risk can increase other risks. To address this problem, a system to support social consensus formation is needed to mitigate the risks. When the number of people necessary for consensus formation is low, such as within an organization, the gMultiple Risk Communicatorh (MRC) developed previously by the authors offers a possible solution to this problem. However, the MRC cannot be applied to problems in which the number of stakeholders exceeds several thousand, and so an innovative solution was necessary. Accordingly, the authors modified and expanded the MRC and developed the concept of gSocial-MRCh to comprehensively support risk communication on two levels: communication among opinion leaders and communication with the participation of ordinary stakeholders. We created a prototype program for Social-MRC and ran a trial application on the information filtering issue for children. In this paper, we describe the refined concept of Social-MRC and evaluate the results of the trial application.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128482777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Saving Personal Data in the Mobile Phone 有关在流动电话储存个人资料的调查
I. Androulidakis, G. Kandus
Modern smart phones have provided users countless opportunities to access, process and store data in various ways and formats. Inevitably, the user himself has started storing personal data too in the mobile phone. Drawing results from a study we realized, in a sample of 7172 students in 17 Universities of 10 Eastern and Southern Europe countries, we are initially providing useful insight into the practice of saving personal data in mobile phones. Furthermore, we are examining the effect it has to security awareness, feeling and practices of students discovering that there is indeed a statistically significant connection. These results can help both academia and industry focus their security awareness campaigns and efforts to specific subsets of users that mostly need them. Finally, as there are not available any already validated questionnaires in regards to this specific research topic, our research, apart from revealing the situation, aims at providing a basis for the formulation of similar questionnaires for future use.
现代智能手机为用户提供了无数以各种方式和格式访问、处理和存储数据的机会。不可避免地,用户自己也开始在手机上存储个人数据。根据我们在10个东欧和南欧国家的17所大学的7172名学生样本中实现的一项研究的结果,我们初步提供了在手机上保存个人数据的实践的有用见解。此外,我们正在研究它对学生的安全意识、感觉和实践的影响,发现确实存在统计学上显著的联系。这些结果可以帮助学术界和工业界将安全意识活动和工作重点放在最需要它们的特定用户子集上。最后,由于目前还没有针对这一具体研究课题的有效问卷,我们的研究除了揭示情况外,还旨在为今后类似问卷的制定提供依据。
{"title":"A Survey on Saving Personal Data in the Mobile Phone","authors":"I. Androulidakis, G. Kandus","doi":"10.1109/ARES.2011.98","DOIUrl":"https://doi.org/10.1109/ARES.2011.98","url":null,"abstract":"Modern smart phones have provided users countless opportunities to access, process and store data in various ways and formats. Inevitably, the user himself has started storing personal data too in the mobile phone. Drawing results from a study we realized, in a sample of 7172 students in 17 Universities of 10 Eastern and Southern Europe countries, we are initially providing useful insight into the practice of saving personal data in mobile phones. Furthermore, we are examining the effect it has to security awareness, feeling and practices of students discovering that there is indeed a statistically significant connection. These results can help both academia and industry focus their security awareness campaigns and efforts to specific subsets of users that mostly need them. Finally, as there are not available any already validated questionnaires in regards to this specific research topic, our research, apart from revealing the situation, aims at providing a basis for the formulation of similar questionnaires for future use.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129892956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
System State Discovery Via Information Content Clustering of System Logs 基于系统日志信息内容聚类的系统状态发现
A. Makanju, A. N. Zincir-Heywood, E. Milios
Self-awareness is an important attribute for any system to have before it is capable of self-management. A system needs to have a continuous stream of real-time data to analyze to allow it be aware of its internal state. To this end, previous approaches have utilized system performance metrics and system log data to characterize system internal state. In using system logs to characterize system internal state, the computation of strongly correlated message types is necessary. In this work, we show that strongly correlated message types can be easily discovered without much computation. Our work explores a natural behaviour of system logs where system log data partitioned using source and time information contain correlated message types. We demonstrate how the groups of partitions, which contain correlated message types, can be found by clustering the partitions based on their entropy-based information content. We evaluate our method using cluster cohesion, cluster separation and cluster conceptual purity as metrics. The results show that our proposed method not only produces well-formed clusters but also clusters that can be mapped to different alert states with a high degree of confidence.
自我意识是任何系统在能够进行自我管理之前必须具备的重要属性。系统需要有连续的实时数据流进行分析,以使其能够了解其内部状态。为此,以前的方法利用系统性能指标和系统日志数据来描述系统内部状态。在使用系统日志描述系统内部状态时,需要计算强相关消息类型。在这项工作中,我们证明了不需要大量计算就可以很容易地发现强相关的消息类型。我们的工作探索了系统日志的自然行为,其中使用源和时间信息分区的系统日志数据包含相关的消息类型。我们将演示如何根据基于熵的信息内容对分区进行聚类,从而找到包含相关消息类型的分区组。我们使用聚类内聚、聚类分离和聚类概念纯度作为度量来评估我们的方法。结果表明,该方法不仅生成了格式良好的聚类,而且生成的聚类能够以高置信度映射到不同的警报状态。
{"title":"System State Discovery Via Information Content Clustering of System Logs","authors":"A. Makanju, A. N. Zincir-Heywood, E. Milios","doi":"10.1109/ARES.2011.51","DOIUrl":"https://doi.org/10.1109/ARES.2011.51","url":null,"abstract":"Self-awareness is an important attribute for any system to have before it is capable of self-management. A system needs to have a continuous stream of real-time data to analyze to allow it be aware of its internal state. To this end, previous approaches have utilized system performance metrics and system log data to characterize system internal state. In using system logs to characterize system internal state, the computation of strongly correlated message types is necessary. In this work, we show that strongly correlated message types can be easily discovered without much computation. Our work explores a natural behaviour of system logs where system log data partitioned using source and time information contain correlated message types. We demonstrate how the groups of partitions, which contain correlated message types, can be found by clustering the partitions based on their entropy-based information content. We evaluate our method using cluster cohesion, cluster separation and cluster conceptual purity as metrics. The results show that our proposed method not only produces well-formed clusters but also clusters that can be mapped to different alert states with a high degree of confidence.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116533147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Visualization Method for Helping Children Assess the Risk of Websites 帮助儿童评估网站风险的可视化方法
T. Kajiyama
Since children cannot live in a safe cyberspace environment for ever, setting up filtering or using educational materials are commonly used. A more effective approach to helping children assess website risk is to provide an environment in which children can better understand a website's features and determine the risks of accessing the website for themselves. We have constructed a prototype visualization system for helping children understand website features and use them to identify high-risk websites. We applied a graphical search interface named 'Concentric Ring View' which we proposed to support flexible retrieval for multi-attribute metadata. It was tested using actual and dummy websites featuring five attributes: action, color, atmosphere, number of images, and number of links. The risk level of each actual website was estimated by the features of the portal sites through which it was accessed. A dummy website was used when the actual one was deemed to be too risky. The testing revealed several distinguishing characteristics of high-risk websites. Adding other search attributes such as structure and text appearance should make it possible to characterize risky websites more completely.
由于儿童不可能永远生活在安全的网络环境中,所以设置过滤或使用教育材料是常用的方法。帮助儿童评估网站风险的更有效方法是提供一个环境,让儿童更好地了解网站的功能,并确定自己访问网站的风险。我们构建了一个原型可视化系统,帮助孩子们了解网站的特征,并利用这些特征来识别高风险网站。我们提出了一个名为“同心圆视图”的图形搜索界面,以支持对多属性元数据的灵活检索。测试使用了真实的和虚拟的网站,这些网站有五个属性:动作、颜色、氛围、图片数量和链接数量。每个实际网站的风险等级是通过访问它的门户网站的特征来估计的。当真实的网站被认为风险太大时,就会使用虚拟网站。测试揭示了高风险网站的几个显著特征。添加其他搜索属性,如结构和文本外观,应该可以更完整地描述危险网站。
{"title":"A Visualization Method for Helping Children Assess the Risk of Websites","authors":"T. Kajiyama","doi":"10.1109/ARES.2011.102","DOIUrl":"https://doi.org/10.1109/ARES.2011.102","url":null,"abstract":"Since children cannot live in a safe cyberspace environment for ever, setting up filtering or using educational materials are commonly used. A more effective approach to helping children assess website risk is to provide an environment in which children can better understand a website's features and determine the risks of accessing the website for themselves. We have constructed a prototype visualization system for helping children understand website features and use them to identify high-risk websites. We applied a graphical search interface named 'Concentric Ring View' which we proposed to support flexible retrieval for multi-attribute metadata. It was tested using actual and dummy websites featuring five attributes: action, color, atmosphere, number of images, and number of links. The risk level of each actual website was estimated by the features of the portal sites through which it was accessed. A dummy website was used when the actual one was deemed to be too risky. The testing revealed several distinguishing characteristics of high-risk websites. Adding other search attributes such as structure and text appearance should make it possible to characterize risky websites more completely.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126588981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security 电信服务安全需求概要:软件工程师如何解决安全问题
A. Zuccato, Nils Daniels, Cheevarat Jampathom
Security requirement engineering for services is in practice frequently performed by security non-experts. For them the security requirements and their dependencies are not directly known. To mitigate this, the paper suggests the usage of a business oriented security requirement profiles (e.g. VoIP, IP-TV...) containing information security, privacy, fraud/abuse, resilience and assurance requirements. The criteria and the creation process for such reusable and adaptable profiles are shown. Then the requirement profiles are set in context with a development process. We show how to stepwise adjust the profile to the actual service needs at development stages where the budget and knowledge are available. Finally, experiences from real projects are presented.
服务的安全需求工程在实践中经常由非安全专家执行。对他们来说,安全需求及其依赖关系并不是直接知道的。为了缓解这种情况,本文建议使用面向业务的安全需求配置文件(例如VoIP、IP-TV…),其中包含信息安全、隐私、欺诈/滥用、弹性和保证需求。给出了这种可重用和可适应的概要文件的标准和创建过程。然后在开发过程的上下文中设置需求概要文件。我们将展示如何在有预算和知识的开发阶段逐步调整概要文件以适应实际服务需求。最后,介绍了实际工程的经验。
{"title":"Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security","authors":"A. Zuccato, Nils Daniels, Cheevarat Jampathom","doi":"10.1109/ARES.2011.81","DOIUrl":"https://doi.org/10.1109/ARES.2011.81","url":null,"abstract":"Security requirement engineering for services is in practice frequently performed by security non-experts. For them the security requirements and their dependencies are not directly known. To mitigate this, the paper suggests the usage of a business oriented security requirement profiles (e.g. VoIP, IP-TV...) containing information security, privacy, fraud/abuse, resilience and assurance requirements. The criteria and the creation process for such reusable and adaptable profiles are shown. Then the requirement profiles are set in context with a development process. We show how to stepwise adjust the profile to the actual service needs at development stages where the budget and knowledge are available. Finally, experiences from real projects are presented.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129170414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Enhancing Fuzzing Technique for OKL4 Syscalls Testing OKL4系统调用测试的增强模糊技术
A. Gauthier, Clement Mazin, Julien Iguchi-Cartigny, Jean-Louis Lanet
Virtual machine monitor is a hot topic in the embedded community. Apart from high end system, current processors for embedded systems do not have any instructions helping to virtualize an operating system. Based on this fact, most of the current hyper visors for embedded devices use the Para virtualization technique. This is the case of the OKL4 kernel which is based on the L4 micro-kernel and implements among other the Linux kernel as guest OS. We introduce our ongoing work for testing the security of OKL4. We have chosen to focus on the most low level OKL4 interface usable from an external actor: the system call API. Because all operating system components use directly or indirectly these system calls, a minor flaw at this level can impact in chain the entire system including a virtualized kernel. We have developed a model describing the OKL4 system calls. This model also contains all constraints applicable to a system call. Based on these models, we are working on a tool using the constraints to compute a reduced set of system call input values which are highly likely to generate flaws in OKL4 if they are not fully checked by the hypervisor.
虚拟机监控是嵌入式领域的研究热点。除了高端系统之外,目前用于嵌入式系统的处理器没有任何有助于虚拟化操作系统的指令。基于这一事实,目前大多数用于嵌入式设备的超级监控程序都使用了Para虚拟化技术。OKL4内核就是这种情况,它基于L4微内核,并与其他Linux内核一起作为客户机操作系统实现。我们将介绍正在进行的OKL4安全性测试工作。我们选择将重点放在可从外部参与者获得的最底层OKL4接口上:系统调用API。因为所有操作系统组件都直接或间接地使用这些系统调用,所以这个级别上的一个小缺陷可能会连锁地影响包括虚拟内核在内的整个系统。我们已经开发了一个描述OKL4系统调用的模型。该模型还包含适用于系统调用的所有约束。基于这些模型,我们正在开发一种工具,使用约束来计算一组减少的系统调用输入值,如果管理程序没有完全检查这些值,这些值很可能在OKL4中产生缺陷。
{"title":"Enhancing Fuzzing Technique for OKL4 Syscalls Testing","authors":"A. Gauthier, Clement Mazin, Julien Iguchi-Cartigny, Jean-Louis Lanet","doi":"10.1109/ARES.2011.116","DOIUrl":"https://doi.org/10.1109/ARES.2011.116","url":null,"abstract":"Virtual machine monitor is a hot topic in the embedded community. Apart from high end system, current processors for embedded systems do not have any instructions helping to virtualize an operating system. Based on this fact, most of the current hyper visors for embedded devices use the Para virtualization technique. This is the case of the OKL4 kernel which is based on the L4 micro-kernel and implements among other the Linux kernel as guest OS. We introduce our ongoing work for testing the security of OKL4. We have chosen to focus on the most low level OKL4 interface usable from an external actor: the system call API. Because all operating system components use directly or indirectly these system calls, a minor flaw at this level can impact in chain the entire system including a virtualized kernel. We have developed a model describing the OKL4 system calls. This model also contains all constraints applicable to a system call. Based on these models, we are working on a tool using the constraints to compute a reduced set of system call input values which are highly likely to generate flaws in OKL4 if they are not fully checked by the hypervisor.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134112397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2011 Sixth International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1