首页 > 最新文献

Proceedings of the 8th International Conference on Security of Information and Networks最新文献

英文 中文
Protection from binary and multi-symbol packet length covert channels 保护二进制和多符号包长度隐蔽信道
A. Epishkina, K. Kogos
In this paper, we describe binary and multi-symbol packet length covert channels. Then we design a technique to estimate and limit their capacity. The method to choose parameters of counteraction tools is given, it takes into account an allowable value of covert channel capacity and error level. The novelty of the investigation undertaken is that the covert channel capacity is limited preliminary, whereas state of the art methods focus on detecting active IP covert channels.
本文描述了二进制和多符号包长度隐蔽信道。然后设计了一种估算和限制其容量的技术。给出了补偿工具参数的选择方法,该方法考虑了隐蔽信道容量和误差水平的允制值。所进行的调查的新颖之处在于隐蔽信道容量初步有限,而最先进的方法侧重于检测活跃的IP隐蔽信道。
{"title":"Protection from binary and multi-symbol packet length covert channels","authors":"A. Epishkina, K. Kogos","doi":"10.1145/2799979.2799994","DOIUrl":"https://doi.org/10.1145/2799979.2799994","url":null,"abstract":"In this paper, we describe binary and multi-symbol packet length covert channels. Then we design a technique to estimate and limit their capacity. The method to choose parameters of counteraction tools is given, it takes into account an allowable value of covert channel capacity and error level. The novelty of the investigation undertaken is that the covert channel capacity is limited preliminary, whereas state of the art methods focus on detecting active IP covert channels.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation user behavior on a security testbed using user behavior states graph 使用用户行为状态图在安全测试台上模拟用户行为
A. Amirkhanyan, Andrey Sapegin, Marian Gawron, Feng Cheng, C. Meinel
For testing new methods of network security or new algorithms of security analytics, we need the experimental environments as well as the testing data which are much as possible similar to the real-world data. Therefore, the researchers are always trying to find the best approaches and recommendations of creating and simulating testbeds, because the issue of automation of the testbed creation is a crucial goal to accelerate research progress. One of the ways to generate data is simulate the user behavior on the virtual machines, but the challenge is how to describe what we want to simulate. In this paper, we present a new approach of describing user behavior for the simulation tool. This approach meets requirements of simplicity and extensibility. And it could be used for generating user behavior scenarios to simulate them on Windows-family virtual machines. The proposed approached is applied to our developed simulation tool that we use for solving a problem of the lack of data for research in network security and security analytics areas by generating log dataset that could be used for testing new methods of network security and new algorithms of security analytics.
为了测试新的网络安全方法或新的安全分析算法,我们需要实验环境以及尽可能接近真实数据的测试数据。因此,研究人员一直在努力寻找创建和模拟试验台的最佳方法和建议,因为试验台创建的自动化问题是加快研究进展的关键目标。生成数据的方法之一是模拟虚拟机上的用户行为,但挑战在于如何描述我们想要模拟的内容。在本文中,我们提出了一种描述仿真工具的用户行为的新方法。这种方法满足简单性和可扩展性的要求。它还可以用于生成用户行为场景,以便在windows系列虚拟机上进行模拟。所提出的方法应用于我们开发的模拟工具,我们通过生成可用于测试网络安全和安全分析新方法和新算法的日志数据集来解决网络安全和安全分析领域研究数据缺乏的问题。
{"title":"Simulation user behavior on a security testbed using user behavior states graph","authors":"A. Amirkhanyan, Andrey Sapegin, Marian Gawron, Feng Cheng, C. Meinel","doi":"10.1145/2799979.2799985","DOIUrl":"https://doi.org/10.1145/2799979.2799985","url":null,"abstract":"For testing new methods of network security or new algorithms of security analytics, we need the experimental environments as well as the testing data which are much as possible similar to the real-world data. Therefore, the researchers are always trying to find the best approaches and recommendations of creating and simulating testbeds, because the issue of automation of the testbed creation is a crucial goal to accelerate research progress. One of the ways to generate data is simulate the user behavior on the virtual machines, but the challenge is how to describe what we want to simulate. In this paper, we present a new approach of describing user behavior for the simulation tool. This approach meets requirements of simplicity and extensibility. And it could be used for generating user behavior scenarios to simulate them on Windows-family virtual machines. The proposed approached is applied to our developed simulation tool that we use for solving a problem of the lack of data for research in network security and security analytics areas by generating log dataset that could be used for testing new methods of network security and new algorithms of security analytics.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Large-scale systems security evolution: control theory approach 大规模系统安全演化:控制理论方法
T. Stepanova, D. Zegzhda
Rapidly expanding information technologies field clearly discovers tendency of increasing computer systems' heterogeneity and distribution level. In this paper authors reveal the hidden attributes of IT security evolution towards more assumptions about attacker power and less assertions on provided security level. The proposed view of IT security evolution makes it possible to classify security providing technologies in terms of control theory. This comparison, in turn, allows to borrow a rich theoretical framework of appropriate control theory methods (for non-linear, non-stationary, discrete-continuous automatic control systems) and adopt them for cyber security purposes. Moreover, proposed control theory view enables prediction of the future security evolution stages and allows to partially determine them.
迅速发展的信息技术领域清楚地显示出计算机系统异构和分布水平不断提高的趋势。在本文中,作者揭示了IT安全发展的隐藏属性,即更多地假设攻击者的能力,而更少地断言所提供的安全级别。所提出的IT安全演化观点使得根据控制理论对安全提供技术进行分类成为可能。这种比较反过来又允许借用适当的控制理论方法(用于非线性、非平稳、离散连续自动控制系统)的丰富理论框架,并将其用于网络安全目的。此外,提出的控制理论观点能够预测未来的安全演变阶段,并允许部分确定它们。
{"title":"Large-scale systems security evolution: control theory approach","authors":"T. Stepanova, D. Zegzhda","doi":"10.1145/2799979.2799993","DOIUrl":"https://doi.org/10.1145/2799979.2799993","url":null,"abstract":"Rapidly expanding information technologies field clearly discovers tendency of increasing computer systems' heterogeneity and distribution level. In this paper authors reveal the hidden attributes of IT security evolution towards more assumptions about attacker power and less assertions on provided security level. The proposed view of IT security evolution makes it possible to classify security providing technologies in terms of control theory. This comparison, in turn, allows to borrow a rich theoretical framework of appropriate control theory methods (for non-linear, non-stationary, discrete-continuous automatic control systems) and adopt them for cyber security purposes. Moreover, proposed control theory view enables prediction of the future security evolution stages and allows to partially determine them.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133507842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A new algorithm for unkeyed jam resistance 一种新的无键抗干扰算法
Hamid Hanifi, L. Baird, R. Thurimella
An important problem for secure communication is that of achieving jam resistance, without any prior shared secret between the sender and receiver, and without limits on the assumed computational power of the attacker. To date, only one system has been proposed for this, the BBC system, which is based on coding theory using codes derived from arbitrary hash functions. It is unfortunate that only one, narrow solution has been found for this important problem. We now propose a new algorithm for this problem: the HBT algorithm. It is very different from BBC, using codes based on monotone Boolean functions (MBF), rather than hash functions. It is also more general. We show that despite being very different from BBC, the latter can be viewed as a special case of it. In fact, a theorem proves that all such codes are special cases of this new system. We give empirical results suggesting that this new approach is useful, and describe directions for future research.
安全通信的一个重要问题是实现抗干扰,在发送方和接收方之间没有任何事先共享的秘密,并且不限制攻击者的假设计算能力。到目前为止,只有一个系统已经提出了这一点,BBC系统,它是基于编码理论,使用从任意哈希函数派生的代码。不幸的是,对于这个重要问题只找到了一种狭隘的解决办法。我们现在提出了一种新的算法:HBT算法。它与BBC非常不同,使用基于单调布尔函数(MBF)的代码,而不是哈希函数。它也更普遍。我们表明,尽管与BBC有很大的不同,但后者可以被视为它的一个特例。事实上,一个定理证明了所有这些码都是这个新系统的特殊情况。我们给出了实证结果,表明这种新方法是有用的,并描述了未来的研究方向。
{"title":"A new algorithm for unkeyed jam resistance","authors":"Hamid Hanifi, L. Baird, R. Thurimella","doi":"10.1145/2799979.2800008","DOIUrl":"https://doi.org/10.1145/2799979.2800008","url":null,"abstract":"An important problem for secure communication is that of achieving jam resistance, without any prior shared secret between the sender and receiver, and without limits on the assumed computational power of the attacker. To date, only one system has been proposed for this, the BBC system, which is based on coding theory using codes derived from arbitrary hash functions. It is unfortunate that only one, narrow solution has been found for this important problem. We now propose a new algorithm for this problem: the HBT algorithm. It is very different from BBC, using codes based on monotone Boolean functions (MBF), rather than hash functions. It is also more general. We show that despite being very different from BBC, the latter can be viewed as a special case of it. In fact, a theorem proves that all such codes are special cases of this new system. We give empirical results suggesting that this new approach is useful, and describe directions for future research.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A classification framework for distinct cyber-attacks based on occurrence patterns 基于发生模式的不同网络攻击分类框架
M. S. Awan, Mohammed A. Alghamdi, Sultan H. Almotiri, P. Burnap, O. Rana
An increasingly mature, stealthy and dynamic techniques and attack vectors used by cyber criminals have made the critical network infrastructure more vulnerable to security breaches. Following 'Bring Your Own Device (BYOD)' policies and remote-work style of accessing network infra structure leaves the whole network vulnerable to new unknown malware, botnets, advanced persistent threats, coordinated attack patterns, etc., in addition to existing vulnerabilities inherent in software applications. Such an environment demands a network administrator to understand the nature and patterns of cyber-attacks targeting the network infra structure so that appropriate measures could be introduced. In this paper we propose a framework to classify cyber-attacks based on their pattern of occurrence. We validate the classification approach using real malicious traffic logs by focusing on: i) temporal behaviour of cyber-attacks; ii) correlation between cyber-attacks; and iii) targeted software applications.
网络犯罪分子使用的越来越成熟、隐蔽和动态的技术和攻击媒介,使得关键的网络基础设施更容易受到安全漏洞的攻击。遵循“自带设备(BYOD)”策略和远程工作方式访问网络基础设施,除了软件应用程序固有的现有漏洞外,整个网络还容易受到新的未知恶意软件、僵尸网络、高级持续威胁、协同攻击模式等的攻击。这种环境要求网络管理员了解针对网络基础设施的网络攻击的性质和模式,以便引入适当的措施。本文提出了一个基于网络攻击发生模式的网络攻击分类框架。我们通过关注以下方面来验证使用真实恶意流量日志的分类方法:i)网络攻击的时间行为;Ii)网络攻击之间的相关性;iii)有针对性的软件应用。
{"title":"A classification framework for distinct cyber-attacks based on occurrence patterns","authors":"M. S. Awan, Mohammed A. Alghamdi, Sultan H. Almotiri, P. Burnap, O. Rana","doi":"10.1145/2799979.2800037","DOIUrl":"https://doi.org/10.1145/2799979.2800037","url":null,"abstract":"An increasingly mature, stealthy and dynamic techniques and attack vectors used by cyber criminals have made the critical network infrastructure more vulnerable to security breaches. Following 'Bring Your Own Device (BYOD)' policies and remote-work style of accessing network infra structure leaves the whole network vulnerable to new unknown malware, botnets, advanced persistent threats, coordinated attack patterns, etc., in addition to existing vulnerabilities inherent in software applications. Such an environment demands a network administrator to understand the nature and patterns of cyber-attacks targeting the network infra structure so that appropriate measures could be introduced. In this paper we propose a framework to classify cyber-attacks based on their pattern of occurrence. We validate the classification approach using real malicious traffic logs by focusing on: i) temporal behaviour of cyber-attacks; ii) correlation between cyber-attacks; and iii) targeted software applications.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121608669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
sandFOX: secure sandboxed and isolated environment for firefox browser sandFOX: firefox浏览器的安全沙盒和隔离环境
Anil Saini, M. Gaur, V. Laxmi, P. Nanda
Browser functionalities can be widely extended by browser extensions. One of the key features that makes browser extensions so powerful is that they run with "high" privileges. As a consequence, a vulnerable or malicious extension might expose browser, and operating system (OS) resources to possible attacks such as privilege escalation, information stealing, and session hijacking. The resources are referred as browser as well as OS components accessed through browser extension such as accessing information on the web application, executing arbitrary processes, and even access files from a host file system. This paper presents sandFOX (secure sandbox and iso- lated environment), a client-side browser policies for constructing sandbox environment. sandFOX allows the browser extension to express fine-grained OS specific security policies that are enforced at runtime. In particular, our proposed policies provide the protection to OS resources (e.g., host file system, network and processes) from the browser attacks. We use Security-Enhanced Linux (SELinux) to tune OS and build a sandbox that helps in reducing potential damage from attacks on the OS resources. To show the practicality of sandFOX in a range of settings, we compute the effectiveness of sandFOX for various browser attacks on OS resources. We also show that sandFOX enabled browser experiences low overhead on loading pages and utilizes negligible memory when running with sandbox environment.
浏览器功能可以通过浏览器扩展进行广泛扩展。使浏览器扩展如此强大的一个关键特性是它们以“高”权限运行。因此,易受攻击或恶意的扩展可能会将浏览器和操作系统(OS)资源暴露给可能的攻击,例如特权升级、信息窃取和会话劫持。这些资源被称为浏览器以及通过浏览器扩展访问的操作系统组件,例如访问web应用程序上的信息,执行任意进程,甚至访问主机文件系统中的文件。本文提出了构建沙盒环境的客户端浏览器策略sandFOX (secure sandbox and iso- lated environment)。sandFOX允许浏览器扩展表达在运行时强制执行的细粒度操作系统特定的安全策略。特别是,我们建议的策略提供了对操作系统资源(例如,主机文件系统,网络和进程)免受浏览器攻击的保护。我们使用Security-Enhanced Linux (SELinux)来调优操作系统并构建一个沙箱,以帮助减少对操作系统资源的攻击所造成的潜在损害。为了展示sandFOX在一系列设置中的实用性,我们计算了sandFOX在各种浏览器攻击操作系统资源时的有效性。我们还展示了启用sandFOX的浏览器在加载页面时的开销很低,并且在沙箱环境下运行时使用的内存可以忽略不计。
{"title":"sandFOX: secure sandboxed and isolated environment for firefox browser","authors":"Anil Saini, M. Gaur, V. Laxmi, P. Nanda","doi":"10.1145/2799979.2800000","DOIUrl":"https://doi.org/10.1145/2799979.2800000","url":null,"abstract":"Browser functionalities can be widely extended by browser extensions. One of the key features that makes browser extensions so powerful is that they run with \"high\" privileges. As a consequence, a vulnerable or malicious extension might expose browser, and operating system (OS) resources to possible attacks such as privilege escalation, information stealing, and session hijacking. The resources are referred as browser as well as OS components accessed through browser extension such as accessing information on the web application, executing arbitrary processes, and even access files from a host file system. This paper presents sandFOX (secure sandbox and iso- lated environment), a client-side browser policies for constructing sandbox environment. sandFOX allows the browser extension to express fine-grained OS specific security policies that are enforced at runtime. In particular, our proposed policies provide the protection to OS resources (e.g., host file system, network and processes) from the browser attacks. We use Security-Enhanced Linux (SELinux) to tune OS and build a sandbox that helps in reducing potential damage from attacks on the OS resources. To show the practicality of sandFOX in a range of settings, we compute the effectiveness of sandFOX for various browser attacks on OS resources. We also show that sandFOX enabled browser experiences low overhead on loading pages and utilizes negligible memory when running with sandbox environment.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117310043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application of cluster analysis for the assessment of the share of fraud victims among bank card holders 应用聚类分析评估银行卡持卡人中诈骗受害者的比例
S. Alkhasov, Alexander Tselykh, A. Tselykh
In this paper, we present a method for the assessment of the share of cardholders most prone to various types of bank fraud (i.e. fishing, vishing, skimming). For this purpose, a forecasting information system has been designed. It is based on a clustering module used for output of a certain set of cluster indices that depend on the percentage of aggrieved clients in the training sample. The k-means method is used for clustering. The initial coordinates of centroids are defined using advanced k-means++ algorithm.
在本文中,我们提出了一种评估持卡人最容易发生各种类型银行欺诈(即钓鱼,钓鱼,撇脂)的份额的方法。为此目的,设计了一个预报信息系统。它基于一个聚类模块,该模块用于输出一组特定的聚类指数,这些指数取决于训练样本中受害客户的百分比。聚类采用k-means方法。使用先进的k-means++算法定义质心的初始坐标。
{"title":"Application of cluster analysis for the assessment of the share of fraud victims among bank card holders","authors":"S. Alkhasov, Alexander Tselykh, A. Tselykh","doi":"10.1145/2799979.2800033","DOIUrl":"https://doi.org/10.1145/2799979.2800033","url":null,"abstract":"In this paper, we present a method for the assessment of the share of cardholders most prone to various types of bank fraud (i.e. fishing, vishing, skimming). For this purpose, a forecasting information system has been designed. It is based on a clustering module used for output of a certain set of cluster indices that depend on the percentage of aggrieved clients in the training sample. The k-means method is used for clustering. The initial coordinates of centroids are defined using advanced k-means++ algorithm.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114003515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improved trust based key management for end-to-end secure communication in cellular networks 蜂窝网络中端到端安全通信改进的基于信任的密钥管理
Naila Mukhtar, M. S. Baig, L. A. Khan
Use of mobile phones has tremendously increased over last two decades. Common man's life revolves around the usage of cell phones from payment of bills to secure conversation with family and friends. End-To-End Security is an important concern for such security critical applications with focus on key management. We have presented a model based on Web-of-trust style key management, with server involvement for mobile devices in cellular network environment. Our introduced server has some additive roles and responsibilities, which will help in efficient public key management by using the cellular network service. As public key cryptographic operations are computationally intensive, so proposed scheme is tested on mobile device for processing capability.
在过去的二十年里,手机的使用大大增加了。普通人的生活围绕着手机的使用展开,从支付账单到与家人和朋友的安全对话。端到端安全性是这类关注密钥管理的安全关键型应用程序的一个重要关注点。我们提出了一个基于信任网络风格的密钥管理模型,在蜂窝网络环境中为移动设备提供了服务器参与。我们引入的服务器具有一些附加的角色和职责,这将有助于使用蜂窝网络服务进行有效的公钥管理。由于公钥加密操作的计算量大,因此在移动设备上测试了该方案的处理能力。
{"title":"Improved trust based key management for end-to-end secure communication in cellular networks","authors":"Naila Mukhtar, M. S. Baig, L. A. Khan","doi":"10.1145/2799979.2800014","DOIUrl":"https://doi.org/10.1145/2799979.2800014","url":null,"abstract":"Use of mobile phones has tremendously increased over last two decades. Common man's life revolves around the usage of cell phones from payment of bills to secure conversation with family and friends. End-To-End Security is an important concern for such security critical applications with focus on key management. We have presented a model based on Web-of-trust style key management, with server involvement for mobile devices in cellular network environment. Our introduced server has some additive roles and responsibilities, which will help in efficient public key management by using the cellular network service. As public key cryptographic operations are computationally intensive, so proposed scheme is tested on mobile device for processing capability.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Problems of data protection in industrial corporations enterprise architecture 工业企业架构中的数据保护问题
V. Glukhov, I. Ilin, A. Anisiforov
The paper investigates and analyzes problems of data protection in industrial corporations at all stages of the life cycle of its architecture. The basic risks and threats of information security are shown up, covering all layers of the enterprise architecture, which must be taken into account when building the security architecture. Also those threats of information security are investigated which are difficult to prevent through a variety of means and methods of special protection.
本文对工业企业在其体系结构生命周期的各个阶段的数据保护问题进行了调查和分析。揭示了信息安全的基本风险和威胁,涵盖了企业体系结构的各个层面,是构建安全体系结构时必须考虑的问题。并对通过各种特殊保护手段和方法难以防范的信息安全威胁进行了研究。
{"title":"Problems of data protection in industrial corporations enterprise architecture","authors":"V. Glukhov, I. Ilin, A. Anisiforov","doi":"10.1145/2799979.2800032","DOIUrl":"https://doi.org/10.1145/2799979.2800032","url":null,"abstract":"The paper investigates and analyzes problems of data protection in industrial corporations at all stages of the life cycle of its architecture. The basic risks and threats of information security are shown up, covering all layers of the enterprise architecture, which must be taken into account when building the security architecture. Also those threats of information security are investigated which are difficult to prevent through a variety of means and methods of special protection.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131872260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Record linkage applications in health services research: opportunities and challenges 记录链接在卫生服务研究中的应用:机遇与挑战
R. Thurimella, Rinku Dewri, William Mitchell
When aggregating medical data for research, it is necessary to link data on the same person, but from different sources. Linking enables a researcher to conduct longitudinal studies. Typically such linking can be accomplished by using personal identifying information, such as names, birthdates, addresses, and national or local identifying codes, though occasionally this method does not work because of incompleteness or inaccuracies in the data. For research, the Health Insurance Portability and Accountability Act (HIPAA) privacy rules severely restrict researcher access to identifiers. Therefore, an important research problem is how to link data from a geographic region whose data sources have significant overlap in the actual patients included. In this talk, I describe various challenges and opportunities that exist while tackling this problem.
在汇总医学数据进行研究时,有必要将来自不同来源的同一个人的数据联系起来。链接使研究人员能够进行纵向研究。通常,这种链接可以通过使用个人识别信息来完成,例如姓名、出生日期、地址以及国家或地方的识别码,尽管有时由于数据不完整或不准确,这种方法不起作用。对于研究,《健康保险流通与责任法案》(HIPAA)的隐私规则严格限制了研究人员对标识符的访问。因此,一个重要的研究问题是如何链接来自地理区域的数据,其数据源在实际纳入的患者中有明显的重叠。在这次演讲中,我描述了在解决这个问题的过程中存在的各种挑战和机遇。
{"title":"Record linkage applications in health services research: opportunities and challenges","authors":"R. Thurimella, Rinku Dewri, William Mitchell","doi":"10.1145/2799979.2799983","DOIUrl":"https://doi.org/10.1145/2799979.2799983","url":null,"abstract":"When aggregating medical data for research, it is necessary to link data on the same person, but from different sources. Linking enables a researcher to conduct longitudinal studies. Typically such linking can be accomplished by using personal identifying information, such as names, birthdates, addresses, and national or local identifying codes, though occasionally this method does not work because of incompleteness or inaccuracies in the data. For research, the Health Insurance Portability and Accountability Act (HIPAA) privacy rules severely restrict researcher access to identifiers. Therefore, an important research problem is how to link data from a geographic region whose data sources have significant overlap in the actual patients included. In this talk, I describe various challenges and opportunities that exist while tackling this problem.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133254102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 8th International Conference on Security of Information and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1