首页 > 最新文献

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

英文 中文
Visual robust oblivious watermarking technique 视觉鲁棒无关水印技术
C. Kung, H.H. Hsiao, W. Cheng, Y. Yan
With the rapid growth of the Internet, multimedia, and e-commerce, it becomes more convenient and fast for the users to interchange the information. However, it also caused serious problems, for example, the duplication of unauthorized data. Therefore, various techniques are developed to protect the intellectual property and personal information. Watermarking is one of commonly used techniques to hide information in images to discourage unauthorized copying. And watermarking is an owner-designed logo or trademark, which can be hidden in the owner's image products. When the watermarked images are distributed via the public channels, the unauthorized copying may be discouraged. This is because the owner can prove his ownership by extracting the watermark using open algorithms and some security keys. In the scheme, two parts, contour and texture, are separated with the character of human's vision. Position them into different frequency to protect the important character of vision.
随着互联网、多媒体和电子商务的快速发展,用户之间的信息交换变得更加方便和快捷。然而,它也造成了严重的问题,例如,未经授权的数据的复制。因此,开发了各种技术来保护知识产权和个人信息。水印是一种常用的技术来隐藏图像中的信息,以防止未经授权的复制。而水印是业主自行设计的标志或商标,可以隐藏在业主的形象产品中。当水印图像通过公共渠道分发时,可能会阻止未经授权的复制。这是因为所有者可以通过使用开放算法和一些安全密钥提取水印来证明自己的所有权。该方案根据人的视觉特征,将轮廓和纹理两部分分离开来。将它们置于不同的频率,以保护视力的重要特征。
{"title":"Visual robust oblivious watermarking technique","authors":"C. Kung, H.H. Hsiao, W. Cheng, Y. Yan","doi":"10.1109/CCST.2003.1297597","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297597","url":null,"abstract":"With the rapid growth of the Internet, multimedia, and e-commerce, it becomes more convenient and fast for the users to interchange the information. However, it also caused serious problems, for example, the duplication of unauthorized data. Therefore, various techniques are developed to protect the intellectual property and personal information. Watermarking is one of commonly used techniques to hide information in images to discourage unauthorized copying. And watermarking is an owner-designed logo or trademark, which can be hidden in the owner's image products. When the watermarked images are distributed via the public channels, the unauthorized copying may be discouraged. This is because the owner can prove his ownership by extracting the watermark using open algorithms and some security keys. In the scheme, two parts, contour and texture, are separated with the character of human's vision. Position them into different frequency to protect the important character of vision.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125767490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The analysis of primer mixtures and gunshot residues using scanning electron microscopy/energy dispersive X-ray analysis 使用扫描电子显微镜/能量色散x射线分析底火混合物和枪弹残留物
H. Meng, Hsei-chang Lee, Yu-Liang Chen
Although the analysis of GSR using SEM/EDX has been thoroughly studied, no literature on the SEM/EDX analysis of primer mixtures of center-fired cartridges has been reported. Thus, not only GSR but also primer mixtures generated from both reference cartridges and confiscated illegal cartridges were analyzed in this work. The aim of this work is to obtain elemental composition data of primer mixtures of handgun cartridges frequently encountered in Taiwan and to provide procedures for identifying cartridge used in criminal activities through elemental analysis of GSR and primer mixtures of suspected cartridge. Twenty-five kinds of cartridges with noncorrosive primers or lead-free primers were disassembled or test-fired to collect primer mixtures or GSR, respectively. Bullet and propellants of unfired ammunition were removed, the cartridge case was deprimed, and primer mixtures were then recovered. Gunshot residue samples were collected from shooter's hand, spent cartridge case, and target surface after test firing. Both primer mixture and GSR samples were then subjected to SEM/EDX analysis. The results revealed that all of the noncorrosive primer mixtures and GSR generated from cartridges with these primers contained unique elemental composition of lead (Pb), barium (Ba), and antimony (Sb). Only Ba and Sb were detected in two kinds of lead-free primer mixtures and GSR generated from cartridges with these primers, where none of Pb, Ba, and Sb were detected in samples from the other four kinds of lead-free cartridges. Characteristic elements of Pb, Ba, and Sb were detected in all primer and GSR samples collected from illegal cartridges and were not detected in samples from police duty cartridges. These results indicated that lead-free cartridges have not yet been used by criminals in Taiwan. The significant elemental difference between GSRs from different sources is especially useful in identifying possible shooter while the fired bullet is missing.
虽然用SEM/EDX分析GSR已经被深入研究过,但没有关于中心烧制枪弹底火混合物的SEM/EDX分析的文献报道。因此,本工作不仅分析了GSR,还分析了参考药筒和没收的非法药筒产生的引物混合物。本研究旨在取得台湾地区常见手枪枪弹底料混合物的元素组成资料,并透过对可疑枪弹的GSR及底料混合物进行元素分析,为识别犯罪活动中使用的枪弹提供程序。分别对25种无腐蚀性底漆和无铅底漆的枪弹进行拆解或试燃,收集底漆混合物或GSR。取出未发射弹药的子弹和推进剂,取出弹壳,然后回收底火混合物。试验射击后,从射击手、废弹壳和靶表面采集射击残留物样本。然后对引物混合物和GSR样品进行SEM/EDX分析。结果表明,所有的无腐蚀性底漆混合物和由这些底漆产生的GSR都含有独特的铅(Pb)、钡(Ba)和锑(Sb)元素组成。在两种无铅引物混合物中只检测到Ba和Sb,而在其他四种无铅引物混合物中未检测到Pb、Ba和Sb。在非法枪弹的引物和GSR样品中均检测到特征元素Pb、Ba和Sb,而在警察执勤枪弹样品中未检测到特征元素。这些结果表明,台湾的犯罪分子尚未使用无铅枪弹。来自不同来源的gsr之间的显著元素差异对于在发射的子弹丢失时识别可能的枪手特别有用。
{"title":"The analysis of primer mixtures and gunshot residues using scanning electron microscopy/energy dispersive X-ray analysis","authors":"H. Meng, Hsei-chang Lee, Yu-Liang Chen","doi":"10.1109/CCST.2003.1297587","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297587","url":null,"abstract":"Although the analysis of GSR using SEM/EDX has been thoroughly studied, no literature on the SEM/EDX analysis of primer mixtures of center-fired cartridges has been reported. Thus, not only GSR but also primer mixtures generated from both reference cartridges and confiscated illegal cartridges were analyzed in this work. The aim of this work is to obtain elemental composition data of primer mixtures of handgun cartridges frequently encountered in Taiwan and to provide procedures for identifying cartridge used in criminal activities through elemental analysis of GSR and primer mixtures of suspected cartridge. Twenty-five kinds of cartridges with noncorrosive primers or lead-free primers were disassembled or test-fired to collect primer mixtures or GSR, respectively. Bullet and propellants of unfired ammunition were removed, the cartridge case was deprimed, and primer mixtures were then recovered. Gunshot residue samples were collected from shooter's hand, spent cartridge case, and target surface after test firing. Both primer mixture and GSR samples were then subjected to SEM/EDX analysis. The results revealed that all of the noncorrosive primer mixtures and GSR generated from cartridges with these primers contained unique elemental composition of lead (Pb), barium (Ba), and antimony (Sb). Only Ba and Sb were detected in two kinds of lead-free primer mixtures and GSR generated from cartridges with these primers, where none of Pb, Ba, and Sb were detected in samples from the other four kinds of lead-free cartridges. Characteristic elements of Pb, Ba, and Sb were detected in all primer and GSR samples collected from illegal cartridges and were not detected in samples from police duty cartridges. These results indicated that lead-free cartridges have not yet been used by criminals in Taiwan. The significant elemental difference between GSRs from different sources is especially useful in identifying possible shooter while the fired bullet is missing.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124662418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting offensive routers: a straightforward approach 检测攻击性路由器:一个简单的方法
B.-T. Wang, H. Schulzrinne
Packet dropping attack (PDA) is a network attack that utilizes compromised network elements to degrade network performance or quality by intentionally dropping a certain amount of IP packets. The major distinction of the PDA from traditional denial-of service (DoS) attack is that some victims do not even discern that they are under attack. Offensive router detection (ORD) is a mechanism capable of detecting offensive routers that are performing the PDA. The ORD mechanism is based on the principle of conservation of flow in the network, and employs a new proposed ICMP message, Caddie message, which records packet forwarding information in the Caddie messages. Therefore, after analyzing the information, we can identify routers that are abnormally dropping packets. We show the advantages of the ORD mechanism over other existing network monitoring mechanisms and discusses storage and bandwidth overhead issues. We also demonstrate the advantages and the effectiveness of the approach by simulating the functionality of the ORD mechanism to detect four different packet-dropping patterns.
丢包攻击(Packet drop attack, PDA)是一种利用受损的网元,故意丢弃一定数量的IP报文,从而降低网络性能或质量的网络攻击。PDA与传统的拒绝服务(DoS)攻击的主要区别在于,一些受害者甚至没有意识到他们正在受到攻击。攻击性路由器检测(ORD)是一种能够检测正在执行PDA的攻击性路由器的机制。ORD机制基于网络中流量守恒的原则,采用了一种新提出的ICMP报文——Caddie报文,在Caddie报文中记录报文的转发信息。因此,通过分析这些信息,我们可以识别出异常丢包的路由器。我们展示了ORD机制相对于其他现有网络监控机制的优势,并讨论了存储和带宽开销问题。我们还通过模拟ORD机制的功能来检测四种不同的数据包丢弃模式,从而证明了该方法的优点和有效性。
{"title":"Detecting offensive routers: a straightforward approach","authors":"B.-T. Wang, H. Schulzrinne","doi":"10.1109/CCST.2003.1297604","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297604","url":null,"abstract":"Packet dropping attack (PDA) is a network attack that utilizes compromised network elements to degrade network performance or quality by intentionally dropping a certain amount of IP packets. The major distinction of the PDA from traditional denial-of service (DoS) attack is that some victims do not even discern that they are under attack. Offensive router detection (ORD) is a mechanism capable of detecting offensive routers that are performing the PDA. The ORD mechanism is based on the principle of conservation of flow in the network, and employs a new proposed ICMP message, Caddie message, which records packet forwarding information in the Caddie messages. Therefore, after analyzing the information, we can identify routers that are abnormally dropping packets. We show the advantages of the ORD mechanism over other existing network monitoring mechanisms and discusses storage and bandwidth overhead issues. We also demonstrate the advantages and the effectiveness of the approach by simulating the functionality of the ORD mechanism to detect four different packet-dropping patterns.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Light-weight authentication and billing in mobile communications 移动通信中的轻量级认证和计费
Hsing-Bai Chen, Sue-Chen Hsueh
We present an efficient scheme for mobile devices to conduct transactions demanding high security. The use of cryptographic mechanisms is minimized by applying block-ciphers and one-way hash primitives, which can be operated with low-end processors and very little working space. Undeniable billing can be achieved by applying one-way hash chains. Owing to one-way hash functions, the integrity of the masked transactions and the billing information can be verified, even when the masked information is transmitted in public. Complicated cryptographic mechanisms, also the regulations among roaming countries, thus can be eliminated so that a light-weight billing can be achieved.
我们提出了一种高效的方案,用于移动设备进行要求高安全性的交易。通过应用块密码和单向散列原语,可以最大限度地减少加密机制的使用,这可以用低端处理器和非常小的工作空间进行操作。不可否认的计费可以通过应用单向哈希链来实现。由于单向哈希函数,即使在公开传输掩码信息时,也可以验证掩码交易和计费信息的完整性。因此,可以消除复杂的加密机制,以及漫游国家之间的规定,从而实现轻量级计费。
{"title":"Light-weight authentication and billing in mobile communications","authors":"Hsing-Bai Chen, Sue-Chen Hsueh","doi":"10.1109/CCST.2003.1297567","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297567","url":null,"abstract":"We present an efficient scheme for mobile devices to conduct transactions demanding high security. The use of cryptographic mechanisms is minimized by applying block-ciphers and one-way hash primitives, which can be operated with low-end processors and very little working space. Undeniable billing can be achieved by applying one-way hash chains. Owing to one-way hash functions, the integrity of the masked transactions and the billing information can be verified, even when the masked information is transmitted in public. Complicated cryptographic mechanisms, also the regulations among roaming countries, thus can be eliminated so that a light-weight billing can be achieved.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128538789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A simple key agreement protocol 一个简单的密钥协议协议
Eun-Kyung Ryu, Kee-Won Kim, K. Yoo
We propose a simple key agreement protocol(SKA) that provides key establishment with authentication over an insecure channel using only a human memorable password. The SKA is based on Diffie-Hellman scheme and has many of desirable security attributes: it resists off-line dictionary attacks mounted by either passive or active adversaries over network, allowing low-entropy passwords to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromise. Besides, it is secure against an adversary who captured a host's password file. Since user passwords are stored in a verifier form, the adversary cannot use it directly to compromise security. The proposed scheme here shows that it is more efficient in computational time and communication overhead over the existing schemes.
我们提出了一个简单的密钥协议(SKA),该协议仅使用人类可记忆的密码在不安全的通道上提供密钥建立和身份验证。SKA基于Diffie-Hellman方案,具有许多理想的安全属性:它可以抵抗网络上被动或主动对手发起的离线字典攻击,允许安全使用低熵密码。它还提供了完美的前向保密,可以保护过去的会话和密码免受未来的泄露。此外,它对于捕获主机密码文件的攻击者来说是安全的。由于用户密码以验证器形式存储,攻击者不能直接使用它来破坏安全性。本文提出的方案在计算时间和通信开销方面比现有方案更有效。
{"title":"A simple key agreement protocol","authors":"Eun-Kyung Ryu, Kee-Won Kim, K. Yoo","doi":"10.1109/CCST.2003.1297548","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297548","url":null,"abstract":"We propose a simple key agreement protocol(SKA) that provides key establishment with authentication over an insecure channel using only a human memorable password. The SKA is based on Diffie-Hellman scheme and has many of desirable security attributes: it resists off-line dictionary attacks mounted by either passive or active adversaries over network, allowing low-entropy passwords to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromise. Besides, it is secure against an adversary who captured a host's password file. Since user passwords are stored in a verifier form, the adversary cannot use it directly to compromise security. The proposed scheme here shows that it is more efficient in computational time and communication overhead over the existing schemes.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131062982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Audio content based feature extraction on subband domain 基于子带域的音频内容特征提取
J.-R.J. Shieh
Content-based audio feature extraction is key to obtaining important message from audio information. Research in the past several years has focused on the use of speech recognition techniques that are not directly applicable to compressed audio bit stream. However, subband coding based MPEG-1 audio layer III (MP3) is now useful for any system with limited channel capacity for its high quality to bit rate ratio. It has been widely adopted in audio-on-demand, music link via ISDN and digital satellite broadcasting. Message collection is easier if audio content can be extract directly on subband domain. Several useful algorithms are proposed here to manifest this idea.
基于内容的音频特征提取是从音频信息中获取重要信息的关键。过去几年的研究主要集中在不能直接应用于压缩音频比特流的语音识别技术上。然而,基于子带编码的MPEG-1音频层III (MP3)由于其高质量比特率比,现在对任何信道容量有限的系统都很有用。它已被广泛应用于音频点播、ISDN音乐链路和数字卫星广播中。如果音频内容可以直接在子带域上提取,则消息收集将更加容易。这里提出了几个有用的算法来说明这个想法。
{"title":"Audio content based feature extraction on subband domain","authors":"J.-R.J. Shieh","doi":"10.1109/CCST.2003.1297618","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297618","url":null,"abstract":"Content-based audio feature extraction is key to obtaining important message from audio information. Research in the past several years has focused on the use of speech recognition techniques that are not directly applicable to compressed audio bit stream. However, subband coding based MPEG-1 audio layer III (MP3) is now useful for any system with limited channel capacity for its high quality to bit rate ratio. It has been widely adopted in audio-on-demand, music link via ISDN and digital satellite broadcasting. Message collection is easier if audio content can be extract directly on subband domain. Several useful algorithms are proposed here to manifest this idea.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132260837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Contingency planning: emergency preparedness for terrorist attacks 应急计划:针对恐怖袭击的应急准备
H.-M. Wang
The terrorist attack is one type of emergency caused by humans. This emergency is rare, but can cause catastrophic effects. In the aftermath of 9-11, it is proprietary security personnel's responsibility to help every employee get back to "business as normal" while at the same time, being prepared for possible terrorist attacks. An up-to-date contingency plan is expected to help security managers to fulfill this role. Security managers should reassess or develop the contingency plan by using the Federal Emergency Management Agency's (FEMA) guidebook. They are encouraged to adopt the Homeland Security Advisory System, or alternatively to develop a simple color-coded system, to response the threats of terrorist attack in stages. They are suggested to consider three factors-top executive's commitment, adequate trainings, and coordination with public agencies-in the planning.
恐怖袭击是人类造成的一种紧急情况。这种紧急情况很少见,但会造成灾难性的影响。在9-11之后,公司的保安人员有责任帮助每位员工恢复“正常工作”,同时为可能发生的恐怖袭击做好准备。最新的应急计划有望帮助安全管理人员履行这一职责。安全管理人员应根据联邦紧急事务管理局(FEMA)的指南重新评估或制定应急计划。他们被鼓励采用国土安全咨询系统,或者开发一个简单的颜色编码系统,以分阶段应对恐怖袭击的威胁。建议他们在规划时考虑三个因素:高层管理人员的承诺、充分的培训和与公共机构的协调。
{"title":"Contingency planning: emergency preparedness for terrorist attacks","authors":"H.-M. Wang","doi":"10.1109/CCST.2003.1297616","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297616","url":null,"abstract":"The terrorist attack is one type of emergency caused by humans. This emergency is rare, but can cause catastrophic effects. In the aftermath of 9-11, it is proprietary security personnel's responsibility to help every employee get back to \"business as normal\" while at the same time, being prepared for possible terrorist attacks. An up-to-date contingency plan is expected to help security managers to fulfill this role. Security managers should reassess or develop the contingency plan by using the Federal Emergency Management Agency's (FEMA) guidebook. They are encouraged to adopt the Homeland Security Advisory System, or alternatively to develop a simple color-coded system, to response the threats of terrorist attack in stages. They are suggested to consider three factors-top executive's commitment, adequate trainings, and coordination with public agencies-in the planning.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114229205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assigning cryptographic keys to access control in a multi-attribute hierarchy 在多属性层次结构中为访问控制分配加密密钥
Bao-Chyuan Guan, Ping Wang, Yen-Fu Chen, Ray-I Chang
We consider access control in a multiattribute hierarchy and propose a new approach to assign cryptographic keys for this hierarchy. Access control through authorization is important to a high-secure system in military or government where unauthorized users are not allowed to access secret data. A real application system for the high-secure military workflow is considered. Every particular working activity in the workflow must associate multiattributes. The application system is based on the Petri net model, we define the access control problem in our system as a multiattribute hierarchy environment. A Petri net is represented by a directed, bipartite graph in which nodes are either places (represent conditions) or transitions (represent activities). A token that is located in a place signifies that its condition is true. When all the places to a transition have a token, the transition is enabled. Our problem objective is to assign suitable cryptographic keys to this multiattribute hierarchy. Based on a description on security requirements, our algorithm can verify and generate the keys automatically.
我们考虑了多属性层次结构中的访问控制,并提出了一种为该层次结构分配密钥的新方法。通过授权进行访问控制对于军事或政府中的高安全性系统非常重要,因为未经授权的用户不允许访问机密数据。考虑了高安全性军事工作流程的实际应用系统。工作流中的每个特定工作活动都必须关联多个属性。应用系统基于Petri网模型,我们将系统中的访问控制问题定义为一个多属性层次环境。Petri网由有向二部图表示,其中的节点要么是位置(表示条件),要么是过渡(表示活动)。位于某个位置的令牌表示其条件为真。当转换的所有位置都有令牌时,就启用了转换。我们的问题目标是为这个多属性层次结构分配合适的加密密钥。基于对安全需求的描述,我们的算法可以自动验证并生成密钥。
{"title":"Assigning cryptographic keys to access control in a multi-attribute hierarchy","authors":"Bao-Chyuan Guan, Ping Wang, Yen-Fu Chen, Ray-I Chang","doi":"10.1109/CCST.2003.1297582","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297582","url":null,"abstract":"We consider access control in a multiattribute hierarchy and propose a new approach to assign cryptographic keys for this hierarchy. Access control through authorization is important to a high-secure system in military or government where unauthorized users are not allowed to access secret data. A real application system for the high-secure military workflow is considered. Every particular working activity in the workflow must associate multiattributes. The application system is based on the Petri net model, we define the access control problem in our system as a multiattribute hierarchy environment. A Petri net is represented by a directed, bipartite graph in which nodes are either places (represent conditions) or transitions (represent activities). A token that is located in a place signifies that its condition is true. When all the places to a transition have a token, the transition is enabled. Our problem objective is to assign suitable cryptographic keys to this multiattribute hierarchy. Based on a description on security requirements, our algorithm can verify and generate the keys automatically.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of information and communication security forensic technology capability in Taiwan 台湾地区信息通信安全取证技术能力研究
I. Lin, Hong-Cheng Yang, Guo-Long Gu, A. C. Lin
There are constant occurrences of Internet security problems due to its rapid development. It is important to maintain Internet security system during and after the occurrences to collect evidence and forensics essences by various devices, such as hard disk, system log, firewall, IDS log, processes, as well as Internet connections. It would be even more beneficial to the forensic process if evidence could be established and kept well before such an incident happened. Most government organizations lack sufficient knowledge of security system techniques and they still believe that this technical part of the work belongs to the police. In fact, we cannot guarantee a perfect stage, but at least we can figure out what the problem is and trace where the attack is from, and that is the mission of computer forensics. Schools or institutes that are engaged in research and development of relative security system techniques are doing their own work; thus, capabilities of computer forensics have been dispersed. Therefore, in order to enhance the forensic skill of information and communication security and ability, what we really need is a complete plan so as to integrate the forensic skill of information and communication security and ability.
随着互联网的快速发展,网络安全问题时有发生。通过硬盘、系统日志、防火墙、IDS日志、进程以及Internet连接等各种设备收集证据和取证要点,在事件发生期间和事件发生后维护互联网安全系统是非常重要的。如果能在这类事件发生之前确立并妥善保存证据,对法医程序将更为有利。大多数政府机构缺乏足够的安全系统技术知识,他们仍然认为这项工作的技术部分属于警察。事实上,我们不能保证一个完美的阶段,但至少我们可以找出问题是什么,追踪攻击来自哪里,这就是计算机取证的任务。从事相关安全系统技术研究开发的学校、机构正在开展本职工作;因此,计算机取证的能力已经分散。因此,为了提高信息通信安全取证技能和能力,我们真正需要的是一个完整的计划,以整合信息通信安全取证技能和能力。
{"title":"A study of information and communication security forensic technology capability in Taiwan","authors":"I. Lin, Hong-Cheng Yang, Guo-Long Gu, A. C. Lin","doi":"10.1109/CCST.2003.1297591","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297591","url":null,"abstract":"There are constant occurrences of Internet security problems due to its rapid development. It is important to maintain Internet security system during and after the occurrences to collect evidence and forensics essences by various devices, such as hard disk, system log, firewall, IDS log, processes, as well as Internet connections. It would be even more beneficial to the forensic process if evidence could be established and kept well before such an incident happened. Most government organizations lack sufficient knowledge of security system techniques and they still believe that this technical part of the work belongs to the police. In fact, we cannot guarantee a perfect stage, but at least we can figure out what the problem is and trace where the attack is from, and that is the mission of computer forensics. Schools or institutes that are engaged in research and development of relative security system techniques are doing their own work; thus, capabilities of computer forensics have been dispersed. Therefore, in order to enhance the forensic skill of information and communication security and ability, what we really need is a complete plan so as to integrate the forensic skill of information and communication security and ability.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face recognition in a transformed domain 变换域中的人脸识别
M. Faúndez-Zanuy
This paper proposes the use of a discrete cosine transform (DCT) instead of the eigenfaces method (Karhunen-Loeve Transform) for biometric identification based on frontal face images. Experimental results show better recognition accuracies and reduced computational burden. This paper includes results with different classifiers and a combination of them.
本文提出使用离散余弦变换(DCT)代替特征脸方法(Karhunen-Loeve变换)进行基于正面人脸图像的生物特征识别。实验结果表明,该方法具有较好的识别精度和较低的计算负担。本文包括不同分类器的结果和它们的组合。
{"title":"Face recognition in a transformed domain","authors":"M. Faúndez-Zanuy","doi":"10.1109/CCST.2003.1297575","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297575","url":null,"abstract":"This paper proposes the use of a discrete cosine transform (DCT) instead of the eigenfaces method (Karhunen-Loeve Transform) for biometric identification based on frontal face images. Experimental results show better recognition accuracies and reduced computational burden. This paper includes results with different classifiers and a combination of them.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1