首页 > 最新文献

2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications最新文献

英文 中文
A Formal Approach for the Reconstruction of Potential Attack Scenarios 重构潜在攻击场景的形式化方法
S. Rekhis, N. Boudriga
In this paper, we provide a logic for digital investigation of security incidents and its high level-specification language. The logic is used to prove the existence or non-existence of potential attack scenarios which, if executed on the investigated system, would produce the different forms of specified evidences. To generate executable attack scenarios showing with details how the attack scenario was conducted and how the system behaved accordingly, we develop in this paper a Model Checker tool which provides tolerance to unknown attacks and integrates a technique for hypothetical actions generation.
在本文中,我们提供了一种安全事件数字调查的逻辑及其高级规范语言。该逻辑用于证明潜在攻击场景的存在或不存在,如果在被调查系统上执行,将产生不同形式的指定证据。为了生成可执行的攻击场景,详细显示攻击场景是如何进行的,以及系统如何相应地表现,我们在本文中开发了一个模型检查器工具,该工具提供了对未知攻击的容忍度,并集成了一种假设动作生成技术。
{"title":"A Formal Approach for the Reconstruction of Potential Attack Scenarios","authors":"S. Rekhis, N. Boudriga","doi":"10.1109/ICTTA.2008.4530278","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530278","url":null,"abstract":"In this paper, we provide a logic for digital investigation of security incidents and its high level-specification language. The logic is used to prove the existence or non-existence of potential attack scenarios which, if executed on the investigated system, would produce the different forms of specified evidences. To generate executable attack scenarios showing with details how the attack scenario was conducted and how the system behaved accordingly, we develop in this paper a Model Checker tool which provides tolerance to unknown attacks and integrates a technique for hypothetical actions generation.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128996884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comparison of the research units of ICT using MAUT via MBSC 利用MAUT通过MBSC进行ICT研究单位的比较
M. Mohamedpour, E. Asgharizadeh, K. Mohamedpour
Nowadays one of the most effective models for strategic planning implementation and performance measurement in organizations is Balanced Scorecard (BSC). The Balanced Scorecard has four aspects which are: 1-financial, 2- costumer, 3- internal business processes and 4- learning and growth; Accordance to these four aspects we can derive many indices to measure the performance of any institution carefully. Since the study was accomplished in a Telecommunication Research Center as a nonprofit and research organization in information and communication technology area which has 5 ICT related units; for more adoption to measure its performance and compare these units, BSC model was transformed into the Modified Balanced Scorecard (MBSC) and number of indices (attributes) were obtained to measure the performance of the units. Finally research units of ICT were compared and ranked by a new technique of multiple attribute decision making (MADM) approach of Operations Research (OR) which called multi-attribute utility theory (MAUT) technique.
平衡计分卡(BSC)是当今组织战略规划实施和绩效衡量最有效的模型之一。平衡计分卡有四个方面:1-财务,2-客户,3-内部业务流程,4-学习和成长;根据这四个方面,我们可以推导出许多指标来仔细衡量任何机构的绩效。由于该研究是在电信研究中心完成的,该中心是一家信息通信技术领域的非营利研究机构,拥有5个ICT相关单位;为了更好地衡量其绩效并对各单位进行比较,将平衡计分卡模型转化为修正平衡计分卡(MBSC),得到了衡量各单位绩效的指标(属性)数量。最后,运用运筹学多属性决策(MADM)方法的一种新技术——多属性效用理论(MAUT)技术,对ICT研究单位进行了比较和排序。
{"title":"Comparison of the research units of ICT using MAUT via MBSC","authors":"M. Mohamedpour, E. Asgharizadeh, K. Mohamedpour","doi":"10.1109/ICTTA.2008.4530317","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530317","url":null,"abstract":"Nowadays one of the most effective models for strategic planning implementation and performance measurement in organizations is Balanced Scorecard (BSC). The Balanced Scorecard has four aspects which are: 1-financial, 2- costumer, 3- internal business processes and 4- learning and growth; Accordance to these four aspects we can derive many indices to measure the performance of any institution carefully. Since the study was accomplished in a Telecommunication Research Center as a nonprofit and research organization in information and communication technology area which has 5 ICT related units; for more adoption to measure its performance and compare these units, BSC model was transformed into the Modified Balanced Scorecard (MBSC) and number of indices (attributes) were obtained to measure the performance of the units. Finally research units of ICT were compared and ranked by a new technique of multiple attribute decision making (MADM) approach of Operations Research (OR) which called multi-attribute utility theory (MAUT) technique.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124661833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Solutions in Mobile Autonomic Networks 移动自主网络中的安全解决方案
Mohamad Aljnidi, J. Leneutre, Télécom Paristech
Most of ad-hoc network features encourage self- management. This paper introduces security solutions for ad-hoc networks, taking into consideration their need for an autonomic nature. After defining autonomic networks, we present the MAutoNet (mobile autonomic network) which is our specific type of ad-hoc networks. Our general objective is to build an autonomic security system for MAutoNets. We introduce here a security-based network structure, according to which such system can control a MAutoNet. We then elaborate a relevant access control model that we call SRBAC (secure-relation-based access control). It is a variant of RBAC enhanced with trust management, which is required in autonomic communications.
大多数自组织网络的特性鼓励自我管理。本文介绍了自组织网络的安全解决方案,考虑到它们对自治性质的需求。在定义了自主网络之后,我们提出了MAutoNet(移动自主网络),这是我们特定类型的ad-hoc网络。我们的总体目标是为MAutoNets建立一个自主安全系统。本文介绍了一种基于安全的网络结构,根据该结构,该系统可以控制一个MAutoNet。然后,我们详细阐述了一个相关的访问控制模型,我们称之为SRBAC(基于安全关系的访问控制)。它是RBAC的一种变体,增强了自主通信所需的信任管理。
{"title":"Security Solutions in Mobile Autonomic Networks","authors":"Mohamad Aljnidi, J. Leneutre, Télécom Paristech","doi":"10.1109/ICTTA.2008.4530194","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530194","url":null,"abstract":"Most of ad-hoc network features encourage self- management. This paper introduces security solutions for ad-hoc networks, taking into consideration their need for an autonomic nature. After defining autonomic networks, we present the MAutoNet (mobile autonomic network) which is our specific type of ad-hoc networks. Our general objective is to build an autonomic security system for MAutoNets. We introduce here a security-based network structure, according to which such system can control a MAutoNet. We then elaborate a relevant access control model that we call SRBAC (secure-relation-based access control). It is a variant of RBAC enhanced with trust management, which is required in autonomic communications.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Ontology for CMMI-ACQ Model CMMI-ACQ模型的本体
A. A. Sharifloo, Y. Motazedi, M. Shamsfard, R. Dehkharghani
This paper discusses an ontology developed to represent the CMMI-ACQ domain knowledge. CMMI introduces a collection of best practices that helps organizations improve their processes and CMMI-ACQ as one of its constellations is to provide organizations with a resource of effective and proven practices to support acquisition process improvement. This ontology has been developed based on SUMO upper ontology. Through the paper, CMMI and CMMI-ACQ will be illustrated. Also the ontology, its development methodology, and its potential application will be described.
本文讨论了一个用于表示CMMI-ACQ领域知识的本体。CMMI引入了一组最佳实践,帮助组织改进其过程,CMMI- acq作为其星座之一,为组织提供有效且经过验证的实践资源,以支持获取过程的改进。该本体是在相扑上本体的基础上开发的。本文将对CMMI和CMMI- acq进行阐述。并对本体、开发方法及其潜在应用进行了阐述。
{"title":"An Ontology for CMMI-ACQ Model","authors":"A. A. Sharifloo, Y. Motazedi, M. Shamsfard, R. Dehkharghani","doi":"10.1109/ICTTA.2008.4530311","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530311","url":null,"abstract":"This paper discusses an ontology developed to represent the CMMI-ACQ domain knowledge. CMMI introduces a collection of best practices that helps organizations improve their processes and CMMI-ACQ as one of its constellations is to provide organizations with a resource of effective and proven practices to support acquisition process improvement. This ontology has been developed based on SUMO upper ontology. Through the paper, CMMI and CMMI-ACQ will be illustrated. Also the ontology, its development methodology, and its potential application will be described.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126881808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A 2.4-GHz Front-end System Design for WLAN Applications using 0.35μm SiGe BiCMOS Technology 基于0.35μm SiGe BiCMOS技术的2.4 ghz WLAN前端系统设计
F. Eshghabadi, M. Dousti, F. Temcamani, B. Delacressoniere, J. Gautier
A 2.4GHz front-end system design for wide spectrum WLAN applications is presented in a 0.35 μm SiGe BiCMOS Technology. This transceiver front-end contains a receive (Rx) chain with a two-stage cascode low noise amplifier (LNA) and an active down-conversion Rx mixer, and a transmit (Tx) chain composed of a Gilbert-Cell core up-conversion Tx mixer and a high-gain Driver Amplifier (DA). The high linear LNA shows a gain of 15.5 dB, an noise figure (NF) of 2.28 dB and an input- referred third-order intercept point (IP3) of +2.4 dBm with 1-dB gain bandwidth (BW) of 1.5 GHz. The single-balanced Rx mixer exhibited a gain and 1-dB gain BW of +6.8 dB and 1.5 GHz. Also a double-balanced Tx mixer with a gain and input/output return loss of -1.3dB and below -35dB, respectively, and a DA with a gain and output-referred IP3 of +29.2dB and +21.2dBm, respectively, is developed. The NF, input-referred IP3 and DC power consumption of Rx string (from antenna to Rx mixer) were achieved 4.4 dB, -15.4 dBm and 30 mW respectively. The output-referred IP3 and power consumption of Tx chain were +20.5 dBm and 125 mW, respectively.
提出了一种采用0.35 μm SiGe BiCMOS技术的2.4GHz宽频WLAN前端系统设计方案。该收发器前端包含一个带有两级级联码低噪声放大器(LNA)和一个有源下变频Rx混频器的接收(Rx)链,以及一个由吉尔伯特- cell核心上变频Tx混频器和一个高增益驱动放大器(DA)组成的发送(Tx)链。高线性LNA的增益为15.5 dB,噪声系数(NF)为2.28 dB,输入参考三阶截距点(IP3)为+2.4 dBm, 1 dB增益带宽(BW)为1.5 GHz。单平衡Rx混频器的增益和1db增益BW分别为+6.8 dB和1.5 GHz。此外,还开发了增益和输入/输出回波损耗分别为-1.3dB和-35dB以下的双平衡Tx混频器,以及增益和输出参考IP3分别为+29.2dB和+21.2dBm的DA。Rx串(从天线到Rx混频器)的NF、输入参考IP3和直流功耗分别达到4.4 dB、-15.4 dBm和30 mW。Tx链的输出参考IP3和功耗分别为+20.5 dBm和125 mW。
{"title":"A 2.4-GHz Front-end System Design for WLAN Applications using 0.35μm SiGe BiCMOS Technology","authors":"F. Eshghabadi, M. Dousti, F. Temcamani, B. Delacressoniere, J. Gautier","doi":"10.1109/ICTTA.2008.4530263","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530263","url":null,"abstract":"A 2.4GHz front-end system design for wide spectrum WLAN applications is presented in a 0.35 μm SiGe BiCMOS Technology. This transceiver front-end contains a receive (Rx) chain with a two-stage cascode low noise amplifier (LNA) and an active down-conversion Rx mixer, and a transmit (Tx) chain composed of a Gilbert-Cell core up-conversion Tx mixer and a high-gain Driver Amplifier (DA). The high linear LNA shows a gain of 15.5 dB, an noise figure (NF) of 2.28 dB and an input- referred third-order intercept point (IP3) of +2.4 dBm with 1-dB gain bandwidth (BW) of 1.5 GHz. The single-balanced Rx mixer exhibited a gain and 1-dB gain BW of +6.8 dB and 1.5 GHz. Also a double-balanced Tx mixer with a gain and input/output return loss of -1.3dB and below -35dB, respectively, and a DA with a gain and output-referred IP3 of +29.2dB and +21.2dBm, respectively, is developed. The NF, input-referred IP3 and DC power consumption of Rx string (from antenna to Rx mixer) were achieved 4.4 dB, -15.4 dBm and 30 mW respectively. The output-referred IP3 and power consumption of Tx chain were +20.5 dBm and 125 mW, respectively.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multimodal Biometric System Based on Fingerprint Identification and Iris Recognition 基于指纹识别和虹膜识别的多模态生物识别系统
F. Besbes, H. Trichili, B. Solaiman
Mono modal biometric systems encounter a variety of security problems and present sometimes unacceptable error rates. Some of these drawbacks can be overcome by setting up multimodal biometric systems. Multimodal biometrics consists in combining two or more biometric modalities in a single identification system to improve the recognition accuracy. However features of different biometrics have to be statistically independent. This paper proposes a multimodal biometric systems using fingerprint and iris recognition.
单模态生物识别系统遇到各种各样的安全问题,有时呈现不可接受的错误率。其中一些缺点可以通过建立多模式生物识别系统来克服。多模态生物识别是将两种或两种以上的生物识别模态组合在一个单一的识别系统中,以提高识别的准确性。然而,不同生物特征在统计上必须是独立的。提出了一种基于指纹和虹膜识别的多模态生物识别系统。
{"title":"Multimodal Biometric System Based on Fingerprint Identification and Iris Recognition","authors":"F. Besbes, H. Trichili, B. Solaiman","doi":"10.1109/ICTTA.2008.4530129","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530129","url":null,"abstract":"Mono modal biometric systems encounter a variety of security problems and present sometimes unacceptable error rates. Some of these drawbacks can be overcome by setting up multimodal biometric systems. Multimodal biometrics consists in combining two or more biometric modalities in a single identification system to improve the recognition accuracy. However features of different biometrics have to be statistically independent. This paper proposes a multimodal biometric systems using fingerprint and iris recognition.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"261 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120881766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Fixed End Timeout Technique (FETOT) for Planned Disconnection in Mobile Database over Fixed Network with Weighted Data Distribution 基于加权数据分布的固定网络下移动数据库计划断开的固定端超时技术
M. Khder, A. Zin, H. Zulaiha, A. Othman
Data allocation can be used to improve data availability in distributed database environments. In such a system, a mechanism is required to distribute the data (allocate it) to the system nodes in the mobile or fixed network and to maintain the consistency of the data. The high increase for working in the disconnected mode leads to develop some models that handle the transactions during the connection, disconnection, and reconnection mode and that models have to able to manage the two networks: the fixed and the mobile network to act as peer to peer network. Most of the transaction management which using the time-out based still suffering from the long time to get the last consistent database copy, and most of the transaction management models didn't pay attention to the data distribution between the fixed network and the mobile network according to the neediness for the data, so that model distribute the data equally between the two networks even one of the networks need more data than the other. In this paper we focus on proposing the fixed end timeout technique (FETOT) for planned disconnection in mobile database over fixed network with weighted data distribution, a model will connect between the mobile network and the fixed network; we are proposing a new method to: ldr mange the data in the fixed network and the mobile network at the same time. ldr Reduce the delay in the total commit time for the timeout-based models. ldr Allocate the data to the mobile and fixed network according to the neediness by using weight factor.
数据分配可用于提高分布式数据库环境中的数据可用性。在这样的系统中,需要一种机制来将数据分发(分配)到移动或固定网络中的系统节点,并保持数据的一致性。由于在断开模式下工作的大量增加,导致开发了一些处理连接、断开和重新连接模式下的事务的模型,这些模型必须能够管理固定网络和移动网络这两个网络作为点对点网络。大多数基于超时的事务管理仍然存在获取最后一个一致的数据库副本的时间较长的问题,并且大多数事务管理模型没有根据数据的需求来考虑固定网络和移动网络之间的数据分布,使得数据在两个网络之间均匀分布,甚至一个网络需要的数据比另一个网络多。本文重点提出了一种基于加权数据分布的移动数据库计划断连的固定端超时技术(FETOT),该技术在移动网络和固定网络之间建立了一个连接模型;我们提出了一种新的LDR同时管理固定网络和移动网络数据的方法。ldr减少基于超时的模型的总提交时间延迟。ldr根据需要使用权重因子将数据分配到移动网络和固定网络。
{"title":"Fixed End Timeout Technique (FETOT) for Planned Disconnection in Mobile Database over Fixed Network with Weighted Data Distribution","authors":"M. Khder, A. Zin, H. Zulaiha, A. Othman","doi":"10.1109/ICTTA.2008.4530196","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530196","url":null,"abstract":"Data allocation can be used to improve data availability in distributed database environments. In such a system, a mechanism is required to distribute the data (allocate it) to the system nodes in the mobile or fixed network and to maintain the consistency of the data. The high increase for working in the disconnected mode leads to develop some models that handle the transactions during the connection, disconnection, and reconnection mode and that models have to able to manage the two networks: the fixed and the mobile network to act as peer to peer network. Most of the transaction management which using the time-out based still suffering from the long time to get the last consistent database copy, and most of the transaction management models didn't pay attention to the data distribution between the fixed network and the mobile network according to the neediness for the data, so that model distribute the data equally between the two networks even one of the networks need more data than the other. In this paper we focus on proposing the fixed end timeout technique (FETOT) for planned disconnection in mobile database over fixed network with weighted data distribution, a model will connect between the mobile network and the fixed network; we are proposing a new method to: ldr mange the data in the fixed network and the mobile network at the same time. ldr Reduce the delay in the total commit time for the timeout-based models. ldr Allocate the data to the mobile and fixed network according to the neediness by using weight factor.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114082725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Key Capsulation Technique Based on Fingerprint Vault: Anatomy and attack 基于指纹库的生物识别密钥封装技术:解剖与攻击
W.L.W. AlTarawneh, W. L. Woo
All cryptographic algorithms have a proven security but they suffer from the key management problems: hiding a key and unlocking it with biometric or other approximately matching data. We propose a practical key capsulation mechanism with a simple and intuitive design concept to overcome the management and security issues. Capsulation process solved the problems of key management and distributes level of security on capsulation shields. Keys entropy depends on level of shielding, secret key depend on degree of polynomial, while encryption key depend on constructed vault entropy, and it is slightly more efficient in terms of encryption/decryption speed because it used a heading capsulation technique on covering the ciphertexts. Our results in term of attack computation complexity analysis are encouraging, while it is acceptable for the authorized users.
所有加密算法都具有经过验证的安全性,但它们都存在密钥管理问题:隐藏密钥并使用生物识别或其他近似匹配的数据解锁密钥。我们提出了一种实用的密钥封装机制,设计理念简单直观,克服了管理和安全问题。封装过程解决了密钥管理问题,并在封装屏蔽上分配了安全级别。密钥熵取决于屏蔽级别,秘密密钥取决于多项式的程度,而加密密钥取决于构造的保险库熵,并且由于使用了标题封装技术来覆盖密文,因此在加密/解密速度方面略有效率。我们在攻击计算复杂度分析方面的结果是令人鼓舞的,而授权用户可以接受。
{"title":"Biometric Key Capsulation Technique Based on Fingerprint Vault: Anatomy and attack","authors":"W.L.W. AlTarawneh, W. L. Woo","doi":"10.1109/ICTTA.2008.4530122","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530122","url":null,"abstract":"All cryptographic algorithms have a proven security but they suffer from the key management problems: hiding a key and unlocking it with biometric or other approximately matching data. We propose a practical key capsulation mechanism with a simple and intuitive design concept to overcome the management and security issues. Capsulation process solved the problems of key management and distributes level of security on capsulation shields. Keys entropy depends on level of shielding, secret key depend on degree of polynomial, while encryption key depend on constructed vault entropy, and it is slightly more efficient in terms of encryption/decryption speed because it used a heading capsulation technique on covering the ciphertexts. Our results in term of attack computation complexity analysis are encouraging, while it is acceptable for the authorized users.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis about the Diffusion of Data Standards inside European Public Organizations 欧洲公共组织内部数据标准扩散分析
B. Rossi, B. Russo, G. Succi
One of the top objectives of European Commission, is to grant that the introduction of eGovernment does not lead to new barriers due to a lack of interoperability. In this sense, we consider Free/Libre Open Source Software (FLOSS) and specifically Open Data Standards (ODS) as important in order to decrease interoperability barriers among organizations. In this paper, we investigate empirically the current state of deployment of data standards in European organizations by means of a large sample of data collected in six Public Administrations. We draw three main conclusions. First, proprietary formats still dominate in different categories. Second, the average file size is generally increasing in the last years in the sample public organizations. This can be critical in data exchange and interoperability due to increasing complexity of documents. Third, there are indications of an increase in ODS usage in the last years in the sample organizations considered.
欧盟委员会的首要目标之一是保证电子政务的引入不会因为缺乏互操作性而导致新的障碍。从这个意义上说,我们认为自由/自由开源软件(FLOSS),特别是开放数据标准(ODS)对于减少组织之间的互操作性障碍非常重要。在本文中,我们通过在六个公共管理部门收集的大量数据样本,实证地调查了欧洲组织中数据标准部署的现状。我们得出了三个主要结论。首先,专有格式仍然在不同的类别中占主导地位。其次,在过去几年中,样本公共组织的平均文件大小普遍增加。由于文档的复杂性不断增加,这在数据交换和互操作性中非常重要。第三,有迹象表明,在过去几年中所考虑的样本组织中消耗臭氧层物质的使用有所增加。
{"title":"Analysis about the Diffusion of Data Standards inside European Public Organizations","authors":"B. Rossi, B. Russo, G. Succi","doi":"10.1109/ICTTA.2008.4529953","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4529953","url":null,"abstract":"One of the top objectives of European Commission, is to grant that the introduction of eGovernment does not lead to new barriers due to a lack of interoperability. In this sense, we consider Free/Libre Open Source Software (FLOSS) and specifically Open Data Standards (ODS) as important in order to decrease interoperability barriers among organizations. In this paper, we investigate empirically the current state of deployment of data standards in European organizations by means of a large sample of data collected in six Public Administrations. We draw three main conclusions. First, proprietary formats still dominate in different categories. Second, the average file size is generally increasing in the last years in the sample public organizations. This can be critical in data exchange and interoperability due to increasing complexity of documents. Third, there are indications of an increase in ODS usage in the last years in the sample organizations considered.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ontology-driven Requirements Engineering: Building the OntoREM Meta Model 本体驱动的需求工程:构建OntoREM元模型
M. Kossmann, R. Wong, M. Odeh, A. Gillies
The present paper gives an insight into the process of developing the metamodel of OntoREM, an ontology-driven requirements engineering methodology, which is currently being developed at the University of the West of England in close cooperation with Airbus. The approach suggested by Noy and McGuinness (2000) has been followed to build a first version of the metamodel of OntoREM as an ontology specified in OWL using Protege-OWL. The outcomes and shortcomings of applying this approach in the context of OntoREM have been assessed showing a major shift in the way that requirements engineering is practiced from process-driven to also knowledge- driven requirements engineering. This, however, necessitates further empirical evaluation of the implementation of OntoREM.
本文深入介绍了OntoREM元模型的开发过程,这是一种本体驱动的需求工程方法,目前正在西英格兰大学与空中客车公司密切合作开发。Noy和McGuinness(2000)提出的方法被用于使用Protege-OWL构建OntoREM元模型的第一个版本,作为OWL中指定的本体。在OntoREM环境中应用这种方法的结果和缺点已经被评估,显示了需求工程实践方式的主要转变,从过程驱动到知识驱动的需求工程。然而,这需要对OntoREM的实施进行进一步的实证评估。
{"title":"Ontology-driven Requirements Engineering: Building the OntoREM Meta Model","authors":"M. Kossmann, R. Wong, M. Odeh, A. Gillies","doi":"10.1109/ICTTA.2008.4530315","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530315","url":null,"abstract":"The present paper gives an insight into the process of developing the metamodel of OntoREM, an ontology-driven requirements engineering methodology, which is currently being developed at the University of the West of England in close cooperation with Airbus. The approach suggested by Noy and McGuinness (2000) has been followed to build a first version of the metamodel of OntoREM as an ontology specified in OWL using Protege-OWL. The outcomes and shortcomings of applying this approach in the context of OntoREM have been assessed showing a major shift in the way that requirements engineering is practiced from process-driven to also knowledge- driven requirements engineering. This, however, necessitates further empirical evaluation of the implementation of OntoREM.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1