首页 > 最新文献

2011 Sixth International Conference on Availability, Reliability and Security最新文献

英文 中文
Stepwise Refinement of Complex Dependability Models Using LARES+ 基于LARES+的复杂可靠性模型逐步细化
M. Walter
This article shows how the method LARES+ (Language for Reconfigurable Systems) is used to model a realistic fault-tolerant computer system comprising 60 components by step-wise refinement. The system under consideration has a highly irregular redundancy structure. Components are not assumed to be independent. In contrast, it is assumed that dormant components fail with a reduced failure rate, and that failure detection and reconfiguration is imperfect.
本文展示了如何使用LARES+(可重构系统语言)方法,通过逐步细化的方法对包含60个组件的现实容错计算机系统进行建模。所考虑的系统具有高度不规则的冗余结构。组件不被假定为独立的。相反,假设休眠组件以较低的故障率失败,并且故障检测和重新配置是不完善的。
{"title":"Stepwise Refinement of Complex Dependability Models Using LARES+","authors":"M. Walter","doi":"10.1109/ARES.2011.92","DOIUrl":"https://doi.org/10.1109/ARES.2011.92","url":null,"abstract":"This article shows how the method LARES+ (Language for Reconfigurable Systems) is used to model a realistic fault-tolerant computer system comprising 60 components by step-wise refinement. The system under consideration has a highly irregular redundancy structure. Components are not assumed to be independent. In contrast, it is assumed that dormant components fail with a reduced failure rate, and that failure detection and reconfiguration is imperfect.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133373180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Server-side Approach to Privacy Policy Matching 隐私策略匹配的服务器端方法
Åsmund Ahlmann Nyre, K. Bernsmed, Solvar Bo, Stian Pedersen
With the increasing use of online services that require sharing of information there is a need for Privacy Enhancing Technology tailored for personal information control. Commonly, web privacy is handled through matching of privacy policies and user preferences using software agents on the client side. In this paper, we propose a new approach to privacy policy matching we denote server-side matching. By moving the matching logic from the client to the server, the client is alleviated from the resource consuming process of obtaining and matching policies and the service provider is able to adapt services to users' privacy preferences. We describe the architecture of a general solution and a prototype implementation of selected parts. The solution has only been subject to rudimentary testing, but our initial evaluation is promising.
随着网上服务的使用越来越多,需要分享信息,因此需要为个人信息控制量身定制的隐私增强技术。通常,网络隐私是通过在客户端使用软件代理匹配隐私策略和用户偏好来处理的。本文提出了一种新的隐私策略匹配方法,即服务器端匹配。通过将匹配逻辑从客户端移动到服务器,客户端可以从获取和匹配策略的资源消耗过程中解脱出来,服务提供者可以根据用户的隐私偏好调整服务。我们描述了通用解决方案的体系结构和选定部分的原型实现。这个解决方案只经过了基本的测试,但我们的初步评估是有希望的。
{"title":"A Server-side Approach to Privacy Policy Matching","authors":"Åsmund Ahlmann Nyre, K. Bernsmed, Solvar Bo, Stian Pedersen","doi":"10.1109/ARES.2011.95","DOIUrl":"https://doi.org/10.1109/ARES.2011.95","url":null,"abstract":"With the increasing use of online services that require sharing of information there is a need for Privacy Enhancing Technology tailored for personal information control. Commonly, web privacy is handled through matching of privacy policies and user preferences using software agents on the client side. In this paper, we propose a new approach to privacy policy matching we denote server-side matching. By moving the matching logic from the client to the server, the client is alleviated from the resource consuming process of obtaining and matching policies and the service provider is able to adapt services to users' privacy preferences. We describe the architecture of a general solution and a prototype implementation of selected parts. The solution has only been subject to rudimentary testing, but our initial evaluation is promising.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Model-Based Security Verification and Testing for Smart-cards 智能卡基于模型的安全验证与测试
Elizabeta Fourneret, Martín Ochoa, F. Bouquet, Julien Botella, J. Jürjens, Parvaneh Yousefi
Model-Based Testing (MBT) is a widely used methodology for generating tests aiming to ensure that the system behaviour conforms to its specification. Recently, it has been successfully applied for testing certain security properties. However, for the success of this approach, it is an important prerequisite to consider the correctness of test models with respect to the given security property. In this paper we present an approach for smart-card specific security properties that permits to validate the system with MBT from test schemas. We combine this MBT approach with UMLsec security verification technique, by using UMLsec stereotypes to verify the model w.r.t. given security properties and gain more confidence in the model. We then define an automatic procedure to generate security test from the UMLsec model via so-called "test schemas". We validate this approach on a fragment of the Global Platform specification and report on available tool support.
基于模型的测试(MBT)是一种广泛使用的方法,用于生成旨在确保系统行为符合其规范的测试。最近,它已经成功地应用于测试某些安全属性。然而,对于这种方法的成功,考虑相对于给定的安全属性的测试模型的正确性是一个重要的先决条件。在本文中,我们提出了一种针对智能卡特定安全属性的方法,该方法允许使用测试模式中的MBT验证系统。我们将这种MBT方法与UMLsec安全验证技术结合起来,通过使用UMLsec构造型来验证给定安全属性的模型,并在模型中获得更多的信心。然后我们定义一个自动过程,通过所谓的“测试模式”从UMLsec模型生成安全测试。我们在Global Platform规范的一个片段上验证这个方法,并报告可用的工具支持。
{"title":"Model-Based Security Verification and Testing for Smart-cards","authors":"Elizabeta Fourneret, Martín Ochoa, F. Bouquet, Julien Botella, J. Jürjens, Parvaneh Yousefi","doi":"10.1109/ARES.2011.46","DOIUrl":"https://doi.org/10.1109/ARES.2011.46","url":null,"abstract":"Model-Based Testing (MBT) is a widely used methodology for generating tests aiming to ensure that the system behaviour conforms to its specification. Recently, it has been successfully applied for testing certain security properties. However, for the success of this approach, it is an important prerequisite to consider the correctness of test models with respect to the given security property. In this paper we present an approach for smart-card specific security properties that permits to validate the system with MBT from test schemas. We combine this MBT approach with UMLsec security verification technique, by using UMLsec stereotypes to verify the model w.r.t. given security properties and gain more confidence in the model. We then define an automatic procedure to generate security test from the UMLsec model via so-called \"test schemas\". We validate this approach on a fragment of the Global Platform specification and report on available tool support.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Proactive Detection of Kernel-Mode Rootkits 主动检测内核模式Rootkits
Pablo Bravo, D. García
The sophistication of malicious software (malware) used to break the computer security has increased exponentially in the last years. Frequently, malware is hidden into a computer by software components called root kits. Therefore, early detection of root kits is of primary importance to avoid the uncontrolled operation of malware. Most of current techniques for root kit detection only allow a late detection after the malware has already been hidden by a root kit. In this paper, a new technique is presented that enables the proactive detection of root kits while they are hiding malware, and therefore, allowing that hiding can be avoided. The technique has been designed for root kits that operate in kernel-mode. This root kits are particularly difficult to detect because both the detector and the root kit are executed with the same privileges. This technique can be used to improve the detection capabilities of intrusion detection and prevention systems.
近年来,用于破坏计算机安全的恶意软件的复杂性呈指数级增长。通常,恶意软件是通过被称为根工具包的软件组件隐藏在计算机中的。因此,及早发现rootkit对于避免恶意软件失控运行至关重要。目前大多数根工具包检测技术只允许在恶意软件已经被根工具包隐藏之后进行后期检测。在本文中,提出了一种新技术,可以在根包隐藏恶意软件时主动检测,从而避免隐藏。该技术是为在内核模式下运行的根工具包设计的。这种根工具包特别难以检测,因为检测器和根工具包都以相同的特权执行。该技术可用于提高入侵检测和防御系统的检测能力。
{"title":"Proactive Detection of Kernel-Mode Rootkits","authors":"Pablo Bravo, D. García","doi":"10.1109/ARES.2011.78","DOIUrl":"https://doi.org/10.1109/ARES.2011.78","url":null,"abstract":"The sophistication of malicious software (malware) used to break the computer security has increased exponentially in the last years. Frequently, malware is hidden into a computer by software components called root kits. Therefore, early detection of root kits is of primary importance to avoid the uncontrolled operation of malware. Most of current techniques for root kit detection only allow a late detection after the malware has already been hidden by a root kit. In this paper, a new technique is presented that enables the proactive detection of root kits while they are hiding malware, and therefore, allowing that hiding can be avoided. The technique has been designed for root kits that operate in kernel-mode. This root kits are particularly difficult to detect because both the detector and the root kit are executed with the same privileges. This technique can be used to improve the detection capabilities of intrusion detection and prevention systems.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Limes Security Model for Information Flow Control 信息流控制的lime安全模型
Eckehard Hermann
In the business world, the protection of information and data objects and their well-directed flow is essential for the success of enterprises. The Chinese Wall Security Policy model (CWSP model), defined by Brewer and Nash in, provides access control based on the definition of conflict of interest classes. This model addresses in particular the commercial business sector. In their model Brewer and Nash made the implicit assumption that a conflict of interest is an equivalence relation. Lin presented a modified version of the model called the Aggressive Chinese Wall Security Policy model (ACWSP model). He showed in that the "conflict of interest" is a binary relation, but not, in general, an equivalence relation like Brewer and Nash assumed. Lin observed that the Conflict of Interest relation is symmetric but non-reflexive and non-transitive. In the world of business, symmetric conflict of interest classes are not the default. In this paper a new model is presented that is based on a non-symmetric, non-reflexive and non-transitive conflict of interest relation, where each object is allowed to define its own time dependent Conflict Function and Conflict Of Interest List. Before a subject is allowed to do a write access to an object, each object that has been read accessed by the same subject before has to acknowledge that it is free of conflict with the object the subject intends to write access currently. Otherwise the write access is denied.
在商业世界中,保护信息和数据对象及其定向良好的流对于企业的成功至关重要。由Brewer和Nash在2009年定义的中国墙安全策略模型(CWSP模型)基于利益冲突类的定义提供访问控制。这种模式特别针对商业部门。在布鲁尔和纳什的模型中,隐含地假设利益冲突是一种等价关系。林提出了该模型的修改版本,称为侵略性中国墙安全政策模型(ACWSP模型)。他指出,“利益冲突”是一种二元关系,而不是一般意义上的布鲁尔和纳什所假定的等价关系。林观察到,利益冲突关系是对称的,但非自反性和非传递性。在商业世界中,对称的利益冲突类并不是默认的。本文提出了一个基于非对称、非自反、非传递的利益冲突关系的新模型,该模型允许每个对象定义自己的时间相关的冲突函数和利益冲突表。在允许主体对对象进行写访问之前,之前被同一主体读访问过的每个对象都必须承认它与主体当前打算写访问的对象没有冲突。否则将拒绝写访问。
{"title":"The Limes Security Model for Information Flow Control","authors":"Eckehard Hermann","doi":"10.1109/ARES.2011.88","DOIUrl":"https://doi.org/10.1109/ARES.2011.88","url":null,"abstract":"In the business world, the protection of information and data objects and their well-directed flow is essential for the success of enterprises. The Chinese Wall Security Policy model (CWSP model), defined by Brewer and Nash in, provides access control based on the definition of conflict of interest classes. This model addresses in particular the commercial business sector. In their model Brewer and Nash made the implicit assumption that a conflict of interest is an equivalence relation. Lin presented a modified version of the model called the Aggressive Chinese Wall Security Policy model (ACWSP model). He showed in that the \"conflict of interest\" is a binary relation, but not, in general, an equivalence relation like Brewer and Nash assumed. Lin observed that the Conflict of Interest relation is symmetric but non-reflexive and non-transitive. In the world of business, symmetric conflict of interest classes are not the default. In this paper a new model is presented that is based on a non-symmetric, non-reflexive and non-transitive conflict of interest relation, where each object is allowed to define its own time dependent Conflict Function and Conflict Of Interest List. Before a subject is allowed to do a write access to an object, each object that has been read accessed by the same subject before has to acknowledge that it is free of conflict with the object the subject intends to write access currently. Otherwise the write access is denied.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fast Implementation of the Advanced Encryption Standard Using Atmega1281 使用Atmega1281快速实现高级加密标准
Kasumi Toriumi, Yoshio Kakizaki, Keiichi Iwamura
In recent years, wireless sensor network technology has been frequently used in various fields, thereby making it increasingly important to ensure that the data being transferred remains confidential. Symmetric-key cryptography, which does not require high computing capacity, is a method that is generally used because the computing and memory requirements of sensor nodes are low. An implementation of symmetric-key cryptography is needed in order to achieve high-speed processing of sensor nodes. In this paper, we propose and evaluate a fast implementation scheme of the Advanced Encryption Standard using an inline-assembler that is suitable for the ATmega1281 microcontroller. This microcontroller is a part of the Atmel AVR series and is often equipped with sensor nodes for use in wireless sensor networks.
近年来,无线传感器网络技术被频繁地应用于各个领域,因此确保传输数据的保密性变得越来越重要。对称密钥加密对计算能力要求不高,对传感器节点的计算和内存要求较低,是一种常用的加密方法。为了实现传感器节点的高速处理,需要实现对称密钥加密。在本文中,我们提出并评估了一种使用内联汇编器的高级加密标准的快速实现方案,该方案适用于ATmega1281微控制器。该微控制器是Atmel AVR系列的一部分,通常配备用于无线传感器网络的传感器节点。
{"title":"Fast Implementation of the Advanced Encryption Standard Using Atmega1281","authors":"Kasumi Toriumi, Yoshio Kakizaki, Keiichi Iwamura","doi":"10.1109/ARES.2011.57","DOIUrl":"https://doi.org/10.1109/ARES.2011.57","url":null,"abstract":"In recent years, wireless sensor network technology has been frequently used in various fields, thereby making it increasingly important to ensure that the data being transferred remains confidential. Symmetric-key cryptography, which does not require high computing capacity, is a method that is generally used because the computing and memory requirements of sensor nodes are low. An implementation of symmetric-key cryptography is needed in order to achieve high-speed processing of sensor nodes. In this paper, we propose and evaluate a fast implementation scheme of the Advanced Encryption Standard using an inline-assembler that is suitable for the ATmega1281 microcontroller. This microcontroller is a part of the Atmel AVR series and is often equipped with sensor nodes for use in wireless sensor networks.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121159340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base 基于可扩展知识库的面向服务系统安全评估
Christian Jung, M. Rudolph, R. Schwarz
Service-oriented software architectures promise enhanced interoperability, reusability, and flexibility for the implementation of business processes. However, assuring the quality of SOA software is challenging due to the distributed, inhomogeneous, and often non-transparent nature of service building blocks. Especially security, which is an overarching quality concern of a system, poses a hard problem for quality assurance in a SOA context. We have developed SiSOA, a method for static security analysis of SOA systems based on reverse-engineering techniques to recover the software architecture and to extract security-related information from available system artifacts. In SiSOA, the extraction and aggregation of security facts is controlled by security rules stored in an extensible knowledge base. In this paper, we describe the structure of the SiSOA knowledge base, its underlying principles, and its role within the SiSOA methodology. We briefly survey our SiSOA prototype tool, and we illustrate the application of knowledge base rules with exemplary security scenarios.
面向服务的软件体系结构承诺增强业务流程实现的互操作性、可重用性和灵活性。然而,由于服务构建块的分布式、非同构和通常不透明的特性,保证SOA软件的质量是具有挑战性的。特别是安全性,它是系统的首要质量关注点,在SOA上下文中对质量保证提出了一个难题。我们开发了SiSOA,这是一种基于逆向工程技术的SOA系统静态安全分析方法,用于恢复软件体系结构并从可用的系统工件中提取与安全相关的信息。在SiSOA中,安全事实的提取和聚合由存储在可扩展知识库中的安全规则控制。在本文中,我们描述了SiSOA知识库的结构,它的基本原则,以及它在SiSOA方法中的作用。我们简要介绍了我们的SiSOA原型工具,并通过示例性的安全场景说明了知识库规则的应用。
{"title":"Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base","authors":"Christian Jung, M. Rudolph, R. Schwarz","doi":"10.1109/ARES.2011.109","DOIUrl":"https://doi.org/10.1109/ARES.2011.109","url":null,"abstract":"Service-oriented software architectures promise enhanced interoperability, reusability, and flexibility for the implementation of business processes. However, assuring the quality of SOA software is challenging due to the distributed, inhomogeneous, and often non-transparent nature of service building blocks. Especially security, which is an overarching quality concern of a system, poses a hard problem for quality assurance in a SOA context. We have developed SiSOA, a method for static security analysis of SOA systems based on reverse-engineering techniques to recover the software architecture and to extract security-related information from available system artifacts. In SiSOA, the extraction and aggregation of security facts is controlled by security rules stored in an extensible knowledge base. In this paper, we describe the structure of the SiSOA knowledge base, its underlying principles, and its role within the SiSOA methodology. We briefly survey our SiSOA prototype tool, and we illustrate the application of knowledge base rules with exemplary security scenarios.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments ESPOON:在外包环境中实施加密的安全策略
M. R. Asghar, Mihaela Ion, G. Russello, B. Crispo
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies. However, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. Current solutions are based on cryptographic operations that embed security policies with the security mechanism. Therefore, the enforcement of such policies is performed by allowing the authorised parties to access the appropriate keys. We believe that such solutions are far too rigid because they strictly intertwine authorisation policies with the enforcing mechanism. In this paper, we want to address the issue of enforcing security policies in an untrusted environment while protecting the policy confidentiality. Our solution ESPOON is aiming at providing a clear separation between security policies and the enforcement mechanism. However, the enforcement mechanism should learn as less as possible about both the policies and the requester attributes.
在外包环境中实施安全策略对于基于策略的系统来说仍然是一个公开的挑战。一方面,采取适当的安全决策需要访问策略。但是,如果在不受信任的环境中允许这样的访问,那么机密信息可能会被策略泄露。当前的解决方案基于将安全策略嵌入安全机制的加密操作。因此,通过允许授权方访问适当的密钥来执行此类策略。我们认为,这种解决方案过于僵化,因为它们将授权政策与执行机制严格地纠缠在一起。在本文中,我们希望解决在不受信任的环境中执行安全策略的问题,同时保护策略的机密性。我们的解决方案ESPOON旨在提供安全策略和执行机制之间的明确分离。但是,强制执行机制应该尽可能少地了解策略和请求者属性。
{"title":"ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments","authors":"M. R. Asghar, Mihaela Ion, G. Russello, B. Crispo","doi":"10.1109/ARES.2011.23","DOIUrl":"https://doi.org/10.1109/ARES.2011.23","url":null,"abstract":"The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies. However, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. Current solutions are based on cryptographic operations that embed security policies with the security mechanism. Therefore, the enforcement of such policies is performed by allowing the authorised parties to access the appropriate keys. We believe that such solutions are far too rigid because they strictly intertwine authorisation policies with the enforcing mechanism. In this paper, we want to address the issue of enforcing security policies in an untrusted environment while protecting the policy confidentiality. Our solution ESPOON is aiming at providing a clear separation between security policies and the enforcement mechanism. However, the enforcement mechanism should learn as less as possible about both the policies and the requester attributes.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123212540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An Approach to Access Control under Uncertainty 一种不确定条件下的访问控制方法
Farzad Salim, Jason Reid, E. Dawson, U. Dulleck
In dynamic and uncertain environments such as healthcare, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. The uncertainty stems from the unpredictability of users' operational needs as well as their private incentives to misuse permissions. In Role Based Access Control (RBAC), a user's legitimate access request may be denied because its need has not been anticipated by the security administrator. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. This paper introduces a novel approach to access control under uncertainty and presents it in the context of RBAC. By taking insights from the field of economics, in particular the insurance literature, we propose a formal model where the value of resources are explicitly defined and an RBAC policy (entailing those predictable access needs) is only used as a reference point to determine the price each user has to pay for access, as opposed to representing hard and fast rules that are always rigidly applied.
在医疗保健等动态和不确定的环境中,安全性和信息可用性的需求难以平衡,基于静态策略的访问控制方法无论多么全面,都不是最优的。这种不确定性源于用户操作需求的不可预测性以及他们滥用权限的私人动机。在基于角色的访问控制(RBAC)中,用户的合法访问请求可能会被拒绝,因为安全管理员没有预料到其需求。另外,即使正确指定了策略,授权用户也可能意外或故意滥用授予的权限。本文介绍了一种新的不确定访问控制方法,并在RBAC的背景下进行了介绍。通过从经济学领域,特别是保险文献中获取见解,我们提出了一个正式的模型,其中明确定义了资源的价值,并且RBAC策略(包含那些可预测的访问需求)仅用作确定每个用户必须为访问支付的价格的参考点,而不是表示总是严格应用的硬性规则。
{"title":"An Approach to Access Control under Uncertainty","authors":"Farzad Salim, Jason Reid, E. Dawson, U. Dulleck","doi":"10.1109/ARES.2011.11","DOIUrl":"https://doi.org/10.1109/ARES.2011.11","url":null,"abstract":"In dynamic and uncertain environments such as healthcare, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. The uncertainty stems from the unpredictability of users' operational needs as well as their private incentives to misuse permissions. In Role Based Access Control (RBAC), a user's legitimate access request may be denied because its need has not been anticipated by the security administrator. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. This paper introduces a novel approach to access control under uncertainty and presents it in the context of RBAC. By taking insights from the field of economics, in particular the insurance literature, we propose a formal model where the value of resources are explicitly defined and an RBAC policy (entailing those predictable access needs) is only used as a reference point to determine the price each user has to pay for access, as opposed to representing hard and fast rules that are always rigidly applied.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117161812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Trustworthiness Benchmarking of Web Applications Using Static Code Analysis 基于静态代码分析的Web应用程序可信度基准测试
Afonso Araújo Neto, M. Vieira
Benchmarking the security of web applications is complex and, although there are many proposals of metrics, no consensual quantitative security metric has been proposed so far. Static analysis is an effective approach for detecting vulnerabilities, but the complexity of applications and the large variety of vulnerabilities prevent any single tool from being foolproof. In this application paper we investigate the hypothesis of combining the output of multiple static code analyzers to define metrics for comparing the trustworthiness of web applications. Various experiments, including a benchmarking campaign over seven distinct open source web forums, show that the raw number of vulnerabilities reported by a set of tools allows rough trustworthiness comparison. We also study the use of normalization and false positive rate estimation to calibrate the output of each tool. Results show that calibration allows computing a very accurate metric that can be used to easily and automatically compare different applications.
对web应用程序的安全性进行基准测试是复杂的,尽管有许多度量标准的建议,但到目前为止还没有提出共识的定量安全度量标准。静态分析是检测漏洞的有效方法,但是应用程序的复杂性和漏洞的多样性使任何单一工具都无法做到万无一失。在这篇应用论文中,我们研究了结合多个静态代码分析器的输出来定义比较web应用程序可信度的指标的假设。各种实验,包括在七个不同的开源网络论坛上进行的基准测试活动,表明一组工具报告的原始漏洞数量可以进行粗略的可信度比较。我们还研究了使用归一化和假阳性率估计来校准每个工具的输出。结果表明,校准允许计算一个非常精确的度量,可以很容易地和自动地比较不同的应用。
{"title":"Trustworthiness Benchmarking of Web Applications Using Static Code Analysis","authors":"Afonso Araújo Neto, M. Vieira","doi":"10.1109/ARES.2011.37","DOIUrl":"https://doi.org/10.1109/ARES.2011.37","url":null,"abstract":"Benchmarking the security of web applications is complex and, although there are many proposals of metrics, no consensual quantitative security metric has been proposed so far. Static analysis is an effective approach for detecting vulnerabilities, but the complexity of applications and the large variety of vulnerabilities prevent any single tool from being foolproof. In this application paper we investigate the hypothesis of combining the output of multiple static code analyzers to define metrics for comparing the trustworthiness of web applications. Various experiments, including a benchmarking campaign over seven distinct open source web forums, show that the raw number of vulnerabilities reported by a set of tools allows rough trustworthiness comparison. We also study the use of normalization and false positive rate estimation to calibrate the output of each tool. Results show that calibration allows computing a very accurate metric that can be used to easily and automatically compare different applications.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115354041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2011 Sixth International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1