首页 > 最新文献

2011 Sixth International Conference on Availability, Reliability and Security最新文献

英文 中文
Van Wijngaarden Grammars and Metamorphism Van Wijngaarden语法和变形
Gueguen Geoffroy
Grammars are used to describe sentences structure, thanks to some sets of rules, which depends on the grammar type. A classification of grammars has been made by Noam Chomsky, which led to four well-known types. Yet, there are other types of grammars, which do not exactly fit in Chomsky's classification, such as the two-level grammars. As their name suggests it, the main idea behind these grammars is that they are composed of two grammars. Van Wijngaarden grammars, particularly, are such grammars. They are interesting by their power (expressiveness), which can be the same, under some hypotheses, as the most powerful grammars of Chomsky's classification, i.e. Type 0 grammars. Another point of interest is their relative conciseness and readability. Van Wijngaarden grammars can describe static and dynamic semantic of a language. So, by using them as a generative engine, it is possible to generate a possibly infinite set of words, while assuring us that they all have the same semantic.
语法是用来描述句子结构的,这要归功于一些规则集,这取决于语法类型。诺姆·乔姆斯基(Noam Chomsky)对语法进行了分类,并将其分为四种著名的类型。然而,还有其他类型的语法,并不完全符合乔姆斯基的分类,如两级语法。顾名思义,这些语法背后的主要思想是它们由两种语法组成。Van Wijngaarden语法就是这样的语法。它们的强大(表现力)是有趣的,在某些假设下,它可以与乔姆斯基分类中最强大的语法相同,即0型语法。另一个有趣的地方是它们的相对简洁性和可读性。Van Wijngaarden语法可以描述语言的静态和动态语义。因此,通过使用它们作为生成引擎,有可能生成无限的单词集合,同时保证它们都具有相同的语义。
{"title":"Van Wijngaarden Grammars and Metamorphism","authors":"Gueguen Geoffroy","doi":"10.1109/ARES.2011.72","DOIUrl":"https://doi.org/10.1109/ARES.2011.72","url":null,"abstract":"Grammars are used to describe sentences structure, thanks to some sets of rules, which depends on the grammar type. A classification of grammars has been made by Noam Chomsky, which led to four well-known types. Yet, there are other types of grammars, which do not exactly fit in Chomsky's classification, such as the two-level grammars. As their name suggests it, the main idea behind these grammars is that they are composed of two grammars. Van Wijngaarden grammars, particularly, are such grammars. They are interesting by their power (expressiveness), which can be the same, under some hypotheses, as the most powerful grammars of Chomsky's classification, i.e. Type 0 grammars. Another point of interest is their relative conciseness and readability. Van Wijngaarden grammars can describe static and dynamic semantic of a language. So, by using them as a generative engine, it is possible to generate a possibly infinite set of words, while assuring us that they all have the same semantic.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122972675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies 利用真假组织制服预防社会工程攻击的研究:无线电和体内通信技术的应用
M. Fujikawa, M. Nishigaki
Social engineering attack using real/fake organization's uniform is frequent everywhere in the world. If anyone can verify the uniformed person in front of him/her quickly, they can escape the damage from above fraud. So in this paper, we studied and proposed the uniformed person verification system. First, we developed the uniform-wearing detection system using IBC technology as a basis of our target system. Second, we made a prototype system which can notify verifier (genuine officer/employee) whether uniformed person in front of him/her is genuine officer/employee or not. High practicality, reliability, and safety of the prototype system were demonstrated by experimenting with actual uniform.
利用真假组织的制服进行社会工程攻击在世界各地都很常见。如果任何人都能迅速核实他/她面前的穿制服的人,他们可以避免上述欺诈的损害。因此,本文研究并提出了统一人员验证系统。首先,我们开发了基于IBC技术的制服检测系统作为目标系统的基础。其次,我们做了一个原型系统,可以通知验证者(真正的官员/员工)他/她面前穿制服的人是否是真正的官员/员工。通过对实际制服的试验,验证了原型系统具有较高的实用性、可靠性和安全性。
{"title":"A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies","authors":"M. Fujikawa, M. Nishigaki","doi":"10.1109/ARES.2011.123","DOIUrl":"https://doi.org/10.1109/ARES.2011.123","url":null,"abstract":"Social engineering attack using real/fake organization's uniform is frequent everywhere in the world. If anyone can verify the uniformed person in front of him/her quickly, they can escape the damage from above fraud. So in this paper, we studied and proposed the uniformed person verification system. First, we developed the uniform-wearing detection system using IBC technology as a basis of our target system. Second, we made a prototype system which can notify verifier (genuine officer/employee) whether uniformed person in front of him/her is genuine officer/employee or not. High practicality, reliability, and safety of the prototype system were demonstrated by experimenting with actual uniform.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence 数字取证信息:数字证据可视化过程的实现
G. Osborne, J. Slay
Infovis enables us to combine the language of the eyes with the language of the mind, empowering all manner of people to be data detectives. Formalised processes for the integration of infovis techniques within the digital forensics domain are few and far between. One such process, the Explore, Investigate and Correlate process has been developed and provides a series of phases and key principles on which to build systems that integrate infovis techniques within the digital forensics investigative workflow. This paper presents refinements to this process and a proof-of-concept implementation. How the implementation achieves the goals of the process, the techniques it uses and how it helps to reduce information overload within the digital forensics domain are examined.
Infovis使我们能够将眼睛的语言与心灵的语言结合起来,使各种各样的人都能成为数据侦探。将信息取证技术集成到数字取证领域的形式化流程少之又少。一个这样的过程,探索、调查和关联过程已经被开发出来,它提供了一系列的阶段和关键原则,在这些阶段和关键原则的基础上,构建了在数字取证调查工作流程中集成信息技术的系统。本文提出了对该过程的改进和概念验证实现。研究了实现如何实现流程的目标、它使用的技术以及它如何帮助减少数字取证领域中的信息过载。
{"title":"Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence","authors":"G. Osborne, J. Slay","doi":"10.1109/ARES.2011.36","DOIUrl":"https://doi.org/10.1109/ARES.2011.36","url":null,"abstract":"Infovis enables us to combine the language of the eyes with the language of the mind, empowering all manner of people to be data detectives. Formalised processes for the integration of infovis techniques within the digital forensics domain are few and far between. One such process, the Explore, Investigate and Correlate process has been developed and provides a series of phases and key principles on which to build systems that integrate infovis techniques within the digital forensics investigative workflow. This paper presents refinements to this process and a proof-of-concept implementation. How the implementation achieves the goals of the process, the techniques it uses and how it helps to reduce information overload within the digital forensics domain are examined.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Bulletin Boards in Voting Systems: Modelling and Measuring Privacy 投票系统中的公告板:隐私建模和测量
H. Jonker, Jun Pang
Transparency is crucial to ensuring fair, honest elections. Transparency is achieved by making information (e.g. election result) public. In e-voting literature, this publication is often described in terms of a bulletin board. While privacy of voting systems has been actively studied in recent years, resulting in various analysis frameworks, to date there has not been an explicit modelling of bulletin board in any such framework. Privacy implications of bulletin boards are thus understudied. In this paper, we extend the semantics of the framework of Jonker, Mauw and Pang to model a bulletin board and capture coercion-resistance. The usage of the extended framework is illustrated by an application to the Pret a Voter voting system. Moreover, we present an information-theoretical measure of privacy loss in elections.
透明度对于确保公平、诚实的选举至关重要。透明度是通过公开信息(例如选举结果)来实现的。在电子投票文献中,这种出版物通常被描述为公告板。虽然近年来对投票系统的隐私进行了积极研究,产生了各种分析框架,但迄今为止,在任何此类框架中都没有明确的公告板建模。因此,电子公告板对隐私的影响尚未得到充分研究。在本文中,我们扩展了Jonker, Mauw和Pang框架的语义来模拟公告板并捕获矫顽性。通过Pret a Voter投票系统的一个应用程序说明了扩展框架的使用。此外,我们提出了选举中隐私损失的信息理论测量。
{"title":"Bulletin Boards in Voting Systems: Modelling and Measuring Privacy","authors":"H. Jonker, Jun Pang","doi":"10.1109/ARES.2011.50","DOIUrl":"https://doi.org/10.1109/ARES.2011.50","url":null,"abstract":"Transparency is crucial to ensuring fair, honest elections. Transparency is achieved by making information (e.g. election result) public. In e-voting literature, this publication is often described in terms of a bulletin board. While privacy of voting systems has been actively studied in recent years, resulting in various analysis frameworks, to date there has not been an explicit modelling of bulletin board in any such framework. Privacy implications of bulletin boards are thus understudied. In this paper, we extend the semantics of the framework of Jonker, Mauw and Pang to model a bulletin board and capture coercion-resistance. The usage of the extended framework is illustrated by an application to the Pret a Voter voting system. Moreover, we present an information-theoretical measure of privacy loss in elections.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130578883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cyber-Physical Systems Based Modeling of Dependability of Complex Network Systems 基于信息物理系统的复杂网络系统可靠性建模
K. Ravindran
We use the cyber-physical systems (CPS) framework to infuse intelligent adaptation behaviors in complex network systems to achieve dependability. The CPS framework is anchored on "intelligent physical worlds" (IPW) around which complex adaptation behaviors are built. An IPW is an embodiment of control software functions wrapped around the raw physical processes (e.g., servers, links, sensors, actuators), performing the core system activities while adapting its behavior to the changing environment conditions and user inputs. The IPW exhibits an intelligent behavior over a limited operating region of the system (in contrast with traditional models where the physical world is dumb). To perform over wide operating regions, the IPW interacts with an intelligent computational world (ICW) to patch itself with control parameters and procedures relevant in those changed conditions. The modular decomposition of an application into IPW and ICW lowers the design complexity of dependable network systems, and simplifies the system verification/testing.
我们使用网络物理系统(CPS)框架在复杂网络系统中注入智能适应行为以实现可靠性。CPS框架以“智能物理世界”(IPW)为基础,复杂的适应行为围绕着它建立起来。IPW是包裹在原始物理过程(例如,服务器、链路、传感器、执行器)周围的控制软件功能的体现,执行核心系统活动,同时调整其行为以适应不断变化的环境条件和用户输入。IPW在系统的有限操作区域内表现出智能行为(与物理世界是哑的传统模型相反)。为了在更广泛的操作区域内运行,IPW与智能计算世界(ICW)相互作用,用与这些变化条件相关的控制参数和程序来修补自己。将应用模块分解为IPW和ICW,降低了可靠网络系统的设计复杂性,简化了系统验证/测试。
{"title":"Cyber-Physical Systems Based Modeling of Dependability of Complex Network Systems","authors":"K. Ravindran","doi":"10.1109/ARES.2011.90","DOIUrl":"https://doi.org/10.1109/ARES.2011.90","url":null,"abstract":"We use the cyber-physical systems (CPS) framework to infuse intelligent adaptation behaviors in complex network systems to achieve dependability. The CPS framework is anchored on \"intelligent physical worlds\" (IPW) around which complex adaptation behaviors are built. An IPW is an embodiment of control software functions wrapped around the raw physical processes (e.g., servers, links, sensors, actuators), performing the core system activities while adapting its behavior to the changing environment conditions and user inputs. The IPW exhibits an intelligent behavior over a limited operating region of the system (in contrast with traditional models where the physical world is dumb). To perform over wide operating regions, the IPW interacts with an intelligent computational world (ICW) to patch itself with control parameters and procedures relevant in those changed conditions. The modular decomposition of an application into IPW and ICW lowers the design complexity of dependable network systems, and simplifies the system verification/testing.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128537131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Countermeasures for Content Leaks by Video Recording 视频内容泄露对策研究
M. Fujikawa, Junki Akimoto, F. Oda, K. Moriyasu, S. Fuchi, Y. Takeda
The authors have been engaged in the study of countermeasures to prevent the leak of onscreen movies using a digital video camera. One of the studies is the development of a transparent sheet that emits infrared (IR) light, which is applied to the screen and generates optical noise in the onscreen photographic images when recorded. Another study is the development of a method to detect the presence of the IR-cut filter near the display, which compromises the function of the IR emitting sheet as a countermeasure to prevent video recording using the IR-cut filter. This report is prepared as an advance report because it was confirmed that the feasibility of such countermeasures is enhanced.
作者们一直在研究利用数码摄像机防止电影外泄的对策。其中一项研究是开发一种能发射红外线(IR)的透明薄片,这种薄片被应用到屏幕上,并在记录屏幕上的摄影图像时产生光学噪声。另一项研究是开发一种方法来检测显示器附近IR-cut滤波器的存在,这损害了IR发射片的功能,作为防止使用IR-cut滤波器录制视频的对策。本报告是作为事前报告编写的,因为确认了这种对策的可行性得到了加强。
{"title":"Study of Countermeasures for Content Leaks by Video Recording","authors":"M. Fujikawa, Junki Akimoto, F. Oda, K. Moriyasu, S. Fuchi, Y. Takeda","doi":"10.1109/ARES.2011.126","DOIUrl":"https://doi.org/10.1109/ARES.2011.126","url":null,"abstract":"The authors have been engaged in the study of countermeasures to prevent the leak of onscreen movies using a digital video camera. One of the studies is the development of a transparent sheet that emits infrared (IR) light, which is applied to the screen and generates optical noise in the onscreen photographic images when recorded. Another study is the development of a method to detect the presence of the IR-cut filter near the display, which compromises the function of the IR emitting sheet as a countermeasure to prevent video recording using the IR-cut filter. This report is prepared as an advance report because it was confirmed that the feasibility of such countermeasures is enhanced.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters 灾害过程中部分匿名微数据指纹集的概化模式研究
S. Schrittwieser, Peter Kieseberg, I. Echizen, Sven Wohlgemuth, N. Sonehara
In the event of large natural and artificial disasters, it is of vital importance to provide all sorts of data to the relief organizations (fire department, red cross,...) to enhance their effectivity. Still, some of this data (e.g. regarding personal information on health status) may be considered private. k-anonymity can be utilized to mitigate the risks resulting from disclosure of such data, however, sometimes it is not possible to achieve a suitable size for k in order to completely anonymize the data without interfering with rescue operations. Still, this data will be sensitive after the disaster recovery is finished. Thus we aim at protecting the data by devising an intrinsic fingerprinting-scheme that allows to detect the source of eventually disclosed information afterwards. Our approach uses the properties directly derived from the anonymization process to generate unique fingerprints for every data set.
在发生重大自然灾害和人为灾害时,向救援组织(消防部门、红十字会等)提供各种数据以提高其工作效率是至关重要的。尽管如此,其中一些数据(例如关于健康状况的个人信息)可能被视为私人数据。可以利用k-匿名来减轻披露此类数据所带来的风险,然而,有时不可能达到合适的k大小,以便在不干扰救援行动的情况下完全匿名化数据。但是,在灾难恢复完成后,这些数据仍然是敏感的。因此,我们的目标是通过设计一种内在的指纹识别方案来保护数据,该方案允许检测最终披露信息的来源。我们的方法使用直接从匿名化过程中获得的属性来为每个数据集生成唯一的指纹。
{"title":"Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters","authors":"S. Schrittwieser, Peter Kieseberg, I. Echizen, Sven Wohlgemuth, N. Sonehara","doi":"10.1109/ARES.2011.101","DOIUrl":"https://doi.org/10.1109/ARES.2011.101","url":null,"abstract":"In the event of large natural and artificial disasters, it is of vital importance to provide all sorts of data to the relief organizations (fire department, red cross,...) to enhance their effectivity. Still, some of this data (e.g. regarding personal information on health status) may be considered private. k-anonymity can be utilized to mitigate the risks resulting from disclosure of such data, however, sometimes it is not possible to achieve a suitable size for k in order to completely anonymize the data without interfering with rescue operations. Still, this data will be sensitive after the disaster recovery is finished. Thus we aim at protecting the data by devising an intrinsic fingerprinting-scheme that allows to detect the source of eventually disclosed information afterwards. Our approach uses the properties directly derived from the anonymization process to generate unique fingerprints for every data set.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"311 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122802790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network 基于智能移动代理社会的Ad Hoc网络分布式入侵检测模型
Ghenima Bourkache, M. Mezghiche, K. Tamine
The evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible the introduction of various applications in mobile adhoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient regarding security, we need a second line of defence, Intrusion Detection. The focus of this paper is on distributed and intelligent intrusion detection. We propose a model for building a distributed and behavioural intrusion detection system by using a classification method.
无线网络技术的发展和移动计算硬件的最新进步使得在移动自组织网络中引入各种应用成为可能。不仅这些网络的基础设施本身就很脆弱,而且它们对安全性的要求也越来越高。由于加密和身份验证等入侵防御机制在安全性方面是不够的,我们需要第二道防线——入侵检测。本文的研究重点是分布式智能入侵检测。提出了一种基于分类方法的分布式行为入侵检测系统模型。
{"title":"A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network","authors":"Ghenima Bourkache, M. Mezghiche, K. Tamine","doi":"10.1109/ARES.2011.131","DOIUrl":"https://doi.org/10.1109/ARES.2011.131","url":null,"abstract":"The evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible the introduction of various applications in mobile adhoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient regarding security, we need a second line of defence, Intrusion Detection. The focus of this paper is on distributed and intelligent intrusion detection. We propose a model for building a distributed and behavioural intrusion detection system by using a classification method.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129275809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Considering Dependent Components in the Terminal Pair Reliability Problem 终端对可靠性问题中相关分量的考虑
Minh Lê, M. Walter
The determination of the reliability value for technical systems whose components are subjected to random failure possesses a wide range of applicability, e.g. in data communication networks, computer architectures and electrical power networks. The inherent redundancy structures can be described by reliability block diagrams (RBDs) and by solving those RBDs the reliability of the respective system can be computed. The problem of solving the RBD in order to compute the reliability is well-known as the terminal pair reliability problem. If it is assumed that system components fail independently, pure combinatorial methods can be applied to determine the required probability. However, as soon as there are some dependencies concerning the failure of components we cannot utilize pure combinatorial methods unless we do some suitable modifications which take the dependencies into account. For this purpose we present a hybrid method based on the idea of factoring in combination with series and parallel reductions for systems with dependent component failures. The method is hybrid in the sense that dependent probability terms arisen from our proposed algorithm can be obtained by the help of a stochastic solver. The algorithm comprises clauses for carrying out series and parallel reductions in parallel with factoring. In addition to that we propose how to deal with multiple occurring components.
技术系统的部件遭受随机失效的可靠性值的确定具有广泛的适用性,例如在数据通信网络、计算机体系结构和电力网络中。固有冗余结构可以用可靠性框图(rbd)来描述,通过求解这些可靠性框图,可以计算出相应系统的可靠性。为了计算可靠性而求解RBD的问题被称为终端对可靠性问题。如果假设系统组件独立失效,则可以采用纯组合方法来确定所需的概率。然而,只要存在一些与组件故障有关的依赖关系,我们就不能使用纯组合方法,除非我们做一些适当的修改,将依赖关系考虑在内。为此,我们提出了一种基于因式分解与串联、并联约简相结合的混合方法。该方法是混合的,因为我们提出的算法产生的相关概率项可以通过随机求解器得到。该算法包括与因式分解并行进行串行和并行约简的子句。除此之外,我们还提出了如何处理多个出现的组件。
{"title":"Considering Dependent Components in the Terminal Pair Reliability Problem","authors":"Minh Lê, M. Walter","doi":"10.1109/ARES.2011.91","DOIUrl":"https://doi.org/10.1109/ARES.2011.91","url":null,"abstract":"The determination of the reliability value for technical systems whose components are subjected to random failure possesses a wide range of applicability, e.g. in data communication networks, computer architectures and electrical power networks. The inherent redundancy structures can be described by reliability block diagrams (RBDs) and by solving those RBDs the reliability of the respective system can be computed. The problem of solving the RBD in order to compute the reliability is well-known as the terminal pair reliability problem. If it is assumed that system components fail independently, pure combinatorial methods can be applied to determine the required probability. However, as soon as there are some dependencies concerning the failure of components we cannot utilize pure combinatorial methods unless we do some suitable modifications which take the dependencies into account. For this purpose we present a hybrid method based on the idea of factoring in combination with series and parallel reductions for systems with dependent component failures. The method is hybrid in the sense that dependent probability terms arisen from our proposed algorithm can be obtained by the help of a stochastic solver. The algorithm comprises clauses for carrying out series and parallel reductions in parallel with factoring. In addition to that we propose how to deal with multiple occurring components.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125723400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
User-Centered Information Security Policy Development in a Post-Stuxnet World 后震网时代以用户为中心的信息安全策略发展
Shamal Faily, I. Flechais
A balanced approach is needed for developing information security policies in Critical National Infrastructure (CNI) contexts. Requirements Engineering methods can facilitate such an approach, but these tend to focus on either security at the expense of usability, or vice-versa, it is also uncertain whether existing techniques are useful when the time available for applying them is limited. In this paper, we describe a case study where Usability and Requirements Engineering techniques were used to derive missing requirements for an information security policy for a UK water company following reports of the Stuxnet worm. We motivate and describe the approach taken while carrying out this case study, and conclude with three lessons informing future efforts to integrate Security, Usability, and Requirements Engineering techniques for secure system design.
在关键国家基础设施(CNI)环境中,需要一种平衡的方法来制定信息安全政策。需求工程方法可以促进这样的方法,但是这些方法倾向于以牺牲可用性为代价来关注安全性,或者相反,当可用的时间有限时,现有的技术是否有用也是不确定的。在本文中,我们描述了一个案例研究,在该案例中,可用性和需求工程技术被用于推导出英国自来水公司在Stuxnet蠕虫报告之后的信息安全策略的缺失需求。我们激励并描述了在执行这个案例研究时所采取的方法,并总结了三个教训,这些教训告诉了将来为安全系统设计集成安全性、可用性和需求工程技术的努力。
{"title":"User-Centered Information Security Policy Development in a Post-Stuxnet World","authors":"Shamal Faily, I. Flechais","doi":"10.1109/ARES.2011.111","DOIUrl":"https://doi.org/10.1109/ARES.2011.111","url":null,"abstract":"A balanced approach is needed for developing information security policies in Critical National Infrastructure (CNI) contexts. Requirements Engineering methods can facilitate such an approach, but these tend to focus on either security at the expense of usability, or vice-versa, it is also uncertain whether existing techniques are useful when the time available for applying them is limited. In this paper, we describe a case study where Usability and Requirements Engineering techniques were used to derive missing requirements for an information security policy for a UK water company following reports of the Stuxnet worm. We motivate and describe the approach taken while carrying out this case study, and conclude with three lessons informing future efforts to integrate Security, Usability, and Requirements Engineering techniques for secure system design.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123165617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2011 Sixth International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1