首页 > 最新文献

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

英文 中文
Face recognition for images from the same unknown person 人脸识别从同一未知的人的图像
Yea-Shuan Huang, Y. Tsai, Hong-Hsin Chao, Y. Chien
This paper mainly introduces (1) a face recognition method by using a newly designed radial basis function (RBF) neural net which can iteratively reduce a purposely defined classification-oriented error function, and (2) a decision-making mechanism by accumulating multiple individual face recognition results of the same unknown targeted person. To experiment on 50 persons (each person has 32 training samples and 100 testing samples), although the recognition rate of individual sample is only 86.5%, a perfect recognition accuracy (i.e. 100% accuracy) has been achieved by accumulating 20 temporal face images. This shows that the proposed approaches can produce various degrees of security to support different face recognition applications.
本文主要介绍了(1)一种利用新设计的径向基函数(RBF)神经网络的人脸识别方法,该方法可以迭代地减少有目的地定义的面向分类的误差函数;(2)一种通过积累同一未知目标人的多个个体人脸识别结果的决策机制。对50个人进行实验(每个人有32个训练样本和100个测试样本),虽然单个样本的识别率只有86.5%,但通过积累20张时间人脸图像,达到了完美的识别准确率(即100%准确率)。这表明所提出的方法可以产生不同程度的安全性,以支持不同的人脸识别应用。
{"title":"Face recognition for images from the same unknown person","authors":"Yea-Shuan Huang, Y. Tsai, Hong-Hsin Chao, Y. Chien","doi":"10.1109/CCST.2003.1297614","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297614","url":null,"abstract":"This paper mainly introduces (1) a face recognition method by using a newly designed radial basis function (RBF) neural net which can iteratively reduce a purposely defined classification-oriented error function, and (2) a decision-making mechanism by accumulating multiple individual face recognition results of the same unknown targeted person. To experiment on 50 persons (each person has 32 training samples and 100 testing samples), although the recognition rate of individual sample is only 86.5%, a perfect recognition accuracy (i.e. 100% accuracy) has been achieved by accumulating 20 temporal face images. This shows that the proposed approaches can produce various degrees of security to support different face recognition applications.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"165 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120981301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An extended object-oriented security model for high secure office environments 一个扩展的面向对象的安全模型,用于高度安全的办公环境
Bao-Chyuan Guan, Ping Wang, S. Chen, Ray-I Chang
In [S. Castano et al. (1992)], an object-oriented security model was proposed to protect documents in office environments. It defined role as a set of actions and responsibilities played by users to identify the operations that they can execute on documents. This scheme can make representation and realization easy while using modem object-oriented programming languages to model an information system. However, it simply considered the authorization of operation from an identified role to the document. The available time slot associated with this operation was not addressed. Moreover, actions and responsibilities to the access authorization of a peripheral device (such as the printer) were not specified. These characteristics are very important for a high-secure system in military or government that must protect information of different classifications against unauthorized access. After adoption of the UML 1.1 specification by the OMG membership in November 1997, Unified Modeling Language (UML) has been widely accepted as an object oriented software analysis/design methodology in the software engineering community. It provides most of the concepts and notations that are essential for documenting object oriented models. To demonstrate our approach, we have formulated security models for high secure office systems using the UML model.
在[S。Castano et al.(1992)],提出了一种面向对象的安全模型来保护办公环境中的文档。它将角色定义为用户所扮演的一组操作和职责,以确定他们可以在文档上执行的操作。该方案在使用现代面向对象编程语言对信息系统进行建模时易于表示和实现。但是,它只考虑从已标识的角色到文档的操作授权。未寻址与此操作关联的可用时隙。此外,没有指定外围设备(如打印机)访问授权的操作和责任。这些特性对于必须保护不同分类的信息免遭未经授权访问的军事或政府高安全性系统非常重要。在1997年11月OMG成员采用UML 1.1规范之后,统一建模语言(UML)作为一种面向对象的软件分析/设计方法在软件工程社区被广泛接受。它提供了记录面向对象模型所必需的大部分概念和符号。为了演示我们的方法,我们使用UML模型为高度安全的办公系统制定了安全模型。
{"title":"An extended object-oriented security model for high secure office environments","authors":"Bao-Chyuan Guan, Ping Wang, S. Chen, Ray-I Chang","doi":"10.1109/CCST.2003.1297535","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297535","url":null,"abstract":"In [S. Castano et al. (1992)], an object-oriented security model was proposed to protect documents in office environments. It defined role as a set of actions and responsibilities played by users to identify the operations that they can execute on documents. This scheme can make representation and realization easy while using modem object-oriented programming languages to model an information system. However, it simply considered the authorization of operation from an identified role to the document. The available time slot associated with this operation was not addressed. Moreover, actions and responsibilities to the access authorization of a peripheral device (such as the printer) were not specified. These characteristics are very important for a high-secure system in military or government that must protect information of different classifications against unauthorized access. After adoption of the UML 1.1 specification by the OMG membership in November 1997, Unified Modeling Language (UML) has been widely accepted as an object oriented software analysis/design methodology in the software engineering community. It provides most of the concepts and notations that are essential for documenting object oriented models. To demonstrate our approach, we have formulated security models for high secure office systems using the UML model.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126634559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of a computer-aided system for risk assessment on information systems 资讯系统风险评估之电脑辅助系统设计
Gen-Yih Liao, Chen Song
The Internet creates an efficient environment for businesses to conduct transactions, while also creating a channel for outsiders to access organizational assets. To determine the reasonable amount of security investment, security officers would conduct risk assessment to evaluate the risk values in existing systems. In traditional risk assessment processes, however, heavy dependence on human experts leads to difficulties in automating risk assessment. We propose a transaction based computer aided system to facilitate risk assessment on information systems. The proposed system evaluates assets with business transactions, which facilitates the procedures of asset evaluation. The likelihood model used by the system can assist the risk analysts in conducting what-if analyses to determine risk values. Therefore, the proposed system contributes in enhancing the level of automation regarding risk assessment.
互联网为企业进行交易创造了一个有效的环境,同时也为外部人员访问组织资产创造了一个渠道。为确定合理的保安投资金额,保安人员会进行风险评估,评估现有系统的风险值。然而,在传统的风险评估过程中,对人类专家的严重依赖导致了风险评估自动化的困难。我们建议一个以交易为基础的电脑辅助系统,以方便资讯系统的风险评估。建议的系统以商业交易评估资产,方便了资产评估的程序。系统使用的似然模型可以帮助风险分析人员进行假设分析,以确定风险值。因此,建议的系统有助于提高风险评估的自动化水平。
{"title":"Design of a computer-aided system for risk assessment on information systems","authors":"Gen-Yih Liao, Chen Song","doi":"10.1109/CCST.2003.1297553","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297553","url":null,"abstract":"The Internet creates an efficient environment for businesses to conduct transactions, while also creating a channel for outsiders to access organizational assets. To determine the reasonable amount of security investment, security officers would conduct risk assessment to evaluate the risk values in existing systems. In traditional risk assessment processes, however, heavy dependence on human experts leads to difficulties in automating risk assessment. We propose a transaction based computer aided system to facilitate risk assessment on information systems. The proposed system evaluates assets with business transactions, which facilitates the procedures of asset evaluation. The likelihood model used by the system can assist the risk analysts in conducting what-if analyses to determine risk values. Therefore, the proposed system contributes in enhancing the level of automation regarding risk assessment.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114140343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Integrate the structure of negotiation certification of set and the intelligent mobile agent 集协商认证结构与智能移动代理相结合
Po-Hsian Huang
The Internet with far-reaching characteristic and various network technologies become modern medium for information to spread and market. E-Commerce promoted the convenience of consumption and competitive advantage of business, and gradually affected national competition ability. The key factors of trade on the network are trust and safety. The internal electronic signature has already passed, so trade of e-commerce is effective. Issue the digital certificate through the organization of third party certification. To establish trustful mechanism for e-commerce, the other problem is safety of trade. Safe mechanisms of trade presently contain secure socket layer ( SSL ) and secure electronic transaction (SET) . There are different applications of agent in lots of domains. The application of automatic negotiation agent is mostly in the sale Website. It supports purchasers find out appropriate sellers and negotiate with them, saved the cost and time that both parties search and negotiate with each other. However, the recognition and certification of trade really contain its necessity in the agent, particularly in mobile agent. We combine SET with the intelligent mobile agent, and uses current structure of negotiation on the Internet. Promote the trading safety of intelligent mobile agent by the certification of SET. Flexibly handle the different needs of purchasers in the negotiation rather than only limit to exchange data.
互联网以其深远的特性和多种网络技术成为现代信息传播和营销的媒介。电子商务促进了消费的便利性和商业的竞争优势,并逐渐影响到国家的竞争力。网络交易的关键因素是信任和安全。内部电子签名已经通过,所以电子商务的交易是有效的。通过第三方认证机构颁发数字证书。建立电子商务信任机制,另一个问题是贸易安全。目前的安全交易机制包括安全套接字层(SSL)和安全电子交易(SET)。agent在许多领域有不同的应用。自动谈判代理的应用多在销售网站中。它支持买家找到合适的卖家并与他们进行谈判,节省了双方搜索和谈判的成本和时间。然而,行业的认可和认证在代理商尤其是流动代理商中确实有其必要性。我们将SET与智能移动代理相结合,采用当前互联网上的协商结构。通过SET认证,促进智能移动代理的交易安全。在谈判中灵活处理买方的不同需求,而不仅仅局限于交换数据。
{"title":"Integrate the structure of negotiation certification of set and the intelligent mobile agent","authors":"Po-Hsian Huang","doi":"10.1109/CCST.2003.1297566","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297566","url":null,"abstract":"The Internet with far-reaching characteristic and various network technologies become modern medium for information to spread and market. E-Commerce promoted the convenience of consumption and competitive advantage of business, and gradually affected national competition ability. The key factors of trade on the network are trust and safety. The internal electronic signature has already passed, so trade of e-commerce is effective. Issue the digital certificate through the organization of third party certification. To establish trustful mechanism for e-commerce, the other problem is safety of trade. Safe mechanisms of trade presently contain secure socket layer ( SSL ) and secure electronic transaction (SET) . There are different applications of agent in lots of domains. The application of automatic negotiation agent is mostly in the sale Website. It supports purchasers find out appropriate sellers and negotiate with them, saved the cost and time that both parties search and negotiate with each other. However, the recognition and certification of trade really contain its necessity in the agent, particularly in mobile agent. We combine SET with the intelligent mobile agent, and uses current structure of negotiation on the Internet. Promote the trading safety of intelligent mobile agent by the certification of SET. Flexibly handle the different needs of purchasers in the negotiation rather than only limit to exchange data.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pocket device for authentication and data integrity on Internet banking applications 袖珍装置的身份验证和数据完整性的网上银行应用程序
F. de la Puente, J. D. Sandoval, P. Hernandez
During the last decades we have witnessed an exponential growth of the number of computer viruses. However, the real threat we are now facing is not so much the fact that a virus can make thousands of copies of itself in our computer, but the wide range of things they can do with the data stored or processed in it. One field in which this fact should be considered with special care is electronic banking. These online services are normally accessed from personal computers with low protection. The operating systems used on these computers tend to sacrifice the security on behalf of the commodity of the user. Under such circumstances, it would be rather easy to implement a man-in-the-middle attack in order to intercept the data exchanged with the bank. This way an attacker could end up controlling the money in our bank accounts. In order to illustrate this assertion, we outline some possible attacks that can break the security of several security systems, from passwords authentication to smart cards. The conclusion that we extract from here is that we cannot trust our computers: The data we input on the computer can be stolen, the data exchanged with other computers on the Web can also be intercepted and even modified, and the output we get from the computer monitor may not correspond to the data it is about to process and send in our name. Therefore, an trusted device is needed when performing banking operations over the Internet. Here we propose a digital signer device that not only provides a tamper proof storage for the digital signature but also provides its own display and keyboard. This system improves the security of smart cards by avoiding its dependence on the computer to interface with the user, making it immune to virus attacks.
在过去的几十年里,我们目睹了计算机病毒数量的指数级增长。然而,我们现在面临的真正威胁并不是病毒可以在我们的计算机中复制数千份,而是病毒可以对计算机中存储或处理的数据做各种各样的事情。电子银行是一个需要特别考虑这一事实的领域。这些在线服务通常是通过个人电脑访问的,保护程度较低。这些计算机上使用的操作系统往往会为了用户的商品而牺牲安全性。在这种情况下,为了拦截与银行交换的数据,很容易实现中间人攻击。这样一来,攻击者最终可能会控制我们银行账户里的钱。为了说明这一断言,我们概述了一些可能破坏几个安全系统安全性的攻击,从密码身份验证到智能卡。我们从中得出的结论是,我们不能相信我们的计算机:我们在计算机上输入的数据可能被窃取,在网络上与其他计算机交换的数据也可能被拦截甚至修改,我们从计算机显示器上得到的输出可能与它即将以我们的名义处理和发送的数据不对应。因此,在Internet上执行银行操作时,需要一个可信的设备。在这里,我们提出了一种数字签名设备,它不仅为数字签名提供防篡改存储,而且还提供了自己的显示器和键盘。该系统避免了智能卡与用户交互时对计算机的依赖,提高了智能卡的安全性,使其免受病毒攻击。
{"title":"Pocket device for authentication and data integrity on Internet banking applications","authors":"F. de la Puente, J. D. Sandoval, P. Hernandez","doi":"10.1109/CCST.2003.1297533","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297533","url":null,"abstract":"During the last decades we have witnessed an exponential growth of the number of computer viruses. However, the real threat we are now facing is not so much the fact that a virus can make thousands of copies of itself in our computer, but the wide range of things they can do with the data stored or processed in it. One field in which this fact should be considered with special care is electronic banking. These online services are normally accessed from personal computers with low protection. The operating systems used on these computers tend to sacrifice the security on behalf of the commodity of the user. Under such circumstances, it would be rather easy to implement a man-in-the-middle attack in order to intercept the data exchanged with the bank. This way an attacker could end up controlling the money in our bank accounts. In order to illustrate this assertion, we outline some possible attacks that can break the security of several security systems, from passwords authentication to smart cards. The conclusion that we extract from here is that we cannot trust our computers: The data we input on the computer can be stolen, the data exchanged with other computers on the Web can also be intercepted and even modified, and the output we get from the computer monitor may not correspond to the data it is about to process and send in our name. Therefore, an trusted device is needed when performing banking operations over the Internet. Here we propose a digital signer device that not only provides a tamper proof storage for the digital signature but also provides its own display and keyboard. This system improves the security of smart cards by avoiding its dependence on the computer to interface with the user, making it immune to virus attacks.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134032760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of certificate on the ECC authentication protocol for point-to-point communications 证书在点对点通信ECC认证协议中的应用
J. Mar, Konrad Lee
An elliptic curve cryptosystem (ECC) public-key authentication protocol, which employs the certificate to greatly improve the 3GPP/UMTS security, is present. When the certificate validity intervals are properly set, the increase in the signaling load for the ECC/UMTS authentication protocol can be reduced for point-to-point communications.
提出了一种椭圆曲线密码系统(ECC)公钥认证协议,该协议利用证书大大提高了3GPP/UMTS的安全性。通过合理设置证书的有效间隔,可以减少点对点通信中ECC/UMTS认证协议信令负载的增加。
{"title":"Application of certificate on the ECC authentication protocol for point-to-point communications","authors":"J. Mar, Konrad Lee","doi":"10.1109/CCST.2003.1297563","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297563","url":null,"abstract":"An elliptic curve cryptosystem (ECC) public-key authentication protocol, which employs the certificate to greatly improve the 3GPP/UMTS security, is present. When the certificate validity intervals are properly set, the increase in the signaling load for the ECC/UMTS authentication protocol can be reduced for point-to-point communications.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The development of PKI interoperability in Taiwan PKI互操作性在台湾的发展
G. Tai, C. Ou
Taiwan established its first Certification Authority, namely, Government Certification Authority (GCA), in 1998 which launched the electronic certification services in Taiwan. From year 2001 to 2004, Government Public Key Infrastructure (GPKI) is being established according to the planning set forth in E-Government Program with the aim of strengthening electronic government infrastructure and establishing electronic certification and security applications for executive administration. Some commercial PKIs such as eCA, TaiCA and Hitrust have established in Taiwan in recent years. PKI interoperability becomes a major issue. Several Interoperability methods, such as strict hierarchy and bridge certificate authority (BCA), have been deployed in different PKI domains. Global PKI interoperability in Taiwan is adopting BCA as a major CA-CA interoperability engine, which will bridge trust relationship between different PKI domains.
台湾于1998年成立了第一个认证机构,即政府认证机构(GCA),在台湾推出了电子认证服务。从2001年到2004年,政府将根据电子政府计划的规划,建立政府公开密码匙基础设施,以加强电子政府基础设施,建立行政管理的电子认证和安全应用程序。近年来,一些商业pki如eCA、TaiCA和Hitrust在台湾成立。PKI互操作性成为一个主要问题。在不同的PKI域中,已经部署了严格层次结构和桥接证书颁发(BCA)等多种互操作性方法。台湾的全球PKI互操作性采用BCA作为主要的CA-CA互操作性引擎,它将架起不同PKI域之间信任关系的桥梁。
{"title":"The development of PKI interoperability in Taiwan","authors":"G. Tai, C. Ou","doi":"10.1109/CCST.2003.1297594","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297594","url":null,"abstract":"Taiwan established its first Certification Authority, namely, Government Certification Authority (GCA), in 1998 which launched the electronic certification services in Taiwan. From year 2001 to 2004, Government Public Key Infrastructure (GPKI) is being established according to the planning set forth in E-Government Program with the aim of strengthening electronic government infrastructure and establishing electronic certification and security applications for executive administration. Some commercial PKIs such as eCA, TaiCA and Hitrust have established in Taiwan in recent years. PKI interoperability becomes a major issue. Several Interoperability methods, such as strict hierarchy and bridge certificate authority (BCA), have been deployed in different PKI domains. Global PKI interoperability in Taiwan is adopting BCA as a major CA-CA interoperability engine, which will bridge trust relationship between different PKI domains.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An electronic voting scheme based on undeniable blind signature scheme 一种基于不可否认盲签名的电子投票方案
Sung-Hyun Yun, Sung-jin Lee
Voting is an important social activity in democratic society. The realization of electronic democracy is based on the security of electronic voting scheme. Therefore, it is necessary to use the cryptographic technique for secure election. The electronic voting scheme based on undeniable blind signature scheme is proposed for providing anonymity of voters and ensuring that the intermediate voting results do not affect the entire election. In order to make practical voting scheme, we assume that the voting authorization center is trustful and the IP trace between the voting authorization center and a voter is not available. The proposed scheme fully conforms to the requirements of large scale election such as privacy, fairness, unreusability, unforgeability and eligibility.
选举是民主社会中一项重要的社会活动。电子民主的实现是以电子投票方案的安全性为基础的。因此,使用加密技术进行安全选举是必要的。为了保证选民的匿名性和中间投票结果不影响整个选举,提出了基于不可否认盲签名方案的电子投票方案。为了实现实际的投票方案,我们假设投票授权中心是可信的,并且投票授权中心与投票人之间的IP追踪不可用。该方案完全符合大规模选举的隐私性、公平性、不可重用性、不可伪造性、合格性等要求。
{"title":"An electronic voting scheme based on undeniable blind signature scheme","authors":"Sung-Hyun Yun, Sung-jin Lee","doi":"10.1109/CCST.2003.1297554","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297554","url":null,"abstract":"Voting is an important social activity in democratic society. The realization of electronic democracy is based on the security of electronic voting scheme. Therefore, it is necessary to use the cryptographic technique for secure election. The electronic voting scheme based on undeniable blind signature scheme is proposed for providing anonymity of voters and ensuring that the intermediate voting results do not affect the entire election. In order to make practical voting scheme, we assume that the voting authorization center is trustful and the IP trace between the voting authorization center and a voter is not available. The proposed scheme fully conforms to the requirements of large scale election such as privacy, fairness, unreusability, unforgeability and eligibility.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An authorization mechanism for Web services using an attribute certificate 使用属性证书的Web服务授权机制
M. Kang, K. Kim, Hwangbin Ryou
Web services make the distributed computing based on XML technology possible and are being watched with a new technology to replace the existing distributed computing such as CORBA, Java RMI, and DCOM. One of the issues that needs to be solved to deploy Web services is just Web services security. It is necessary to satisfy the security features like user authentication, confidentiality, integrity, nonrepudiation, and user authorization. We design and implement a system that makes the effective authorization for Web service users possible by using an attribute certificate for Web services.
Web服务使基于XML技术的分布式计算成为可能,并以一种新的技术取代现有的分布式计算,如CORBA、Java RMI和DCOM。部署Web服务需要解决的问题之一就是Web服务安全性。必须满足用户身份验证、机密性、完整性、不可否认性和用户授权等安全特性。我们设计并实现了一个系统,该系统通过使用Web服务的属性证书来实现对Web服务用户的有效授权。
{"title":"An authorization mechanism for Web services using an attribute certificate","authors":"M. Kang, K. Kim, Hwangbin Ryou","doi":"10.1109/CCST.2003.1297551","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297551","url":null,"abstract":"Web services make the distributed computing based on XML technology possible and are being watched with a new technology to replace the existing distributed computing such as CORBA, Java RMI, and DCOM. One of the issues that needs to be solved to deploy Web services is just Web services security. It is necessary to satisfy the security features like user authentication, confidentiality, integrity, nonrepudiation, and user authorization. We design and implement a system that makes the effective authorization for Web service users possible by using an attribute certificate for Web services.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel blind signature scheme possessed with dual protections 一种具有双重保护的新型盲签名方案
J. Jen-Rong Chen, An-Pin Chen, R. Wen-Mao Lin
The basic theories for designing digital signatures are factorization or discrete logarithm. Generally, when building an information system, the defense ability of the system is relatively weak if using either discrete logarithm or factorization theories alone. A blind signature scheme allows a person to sign an unknown message from others without knowing the disclosure of the content. It can be widely applied to secret electronic voting, anonymous digital cash systems, database security etc. In view of the high security and efficiency and the need of a mechanism of blind signature in the future informationalized society, it is definitely essential to work out a way to eliminate the negative factors developed while building the system. We follow the main idea mentioned above and provide a novel blind signature scheme.
设计数字签名的基本理论是因式分解或离散对数。通常,在构建信息系统时,如果单独使用离散对数或分解理论,系统的防御能力相对较弱。盲签名方案允许一个人在不知道内容泄露的情况下签署来自他人的未知消息。它可以广泛应用于秘密电子投票、匿名数字现金系统、数据库安全等领域。鉴于未来信息化社会对盲签名的高安全性和高效性以及盲签名机制的需求,如何消除盲签名系统建设过程中产生的负面因素是十分必要的。我们遵循上述的主要思想,提出了一种新的盲签名方案。
{"title":"A novel blind signature scheme possessed with dual protections","authors":"J. Jen-Rong Chen, An-Pin Chen, R. Wen-Mao Lin","doi":"10.1109/CCST.2003.1297547","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297547","url":null,"abstract":"The basic theories for designing digital signatures are factorization or discrete logarithm. Generally, when building an information system, the defense ability of the system is relatively weak if using either discrete logarithm or factorization theories alone. A blind signature scheme allows a person to sign an unknown message from others without knowing the disclosure of the content. It can be widely applied to secret electronic voting, anonymous digital cash systems, database security etc. In view of the high security and efficiency and the need of a mechanism of blind signature in the future informationalized society, it is definitely essential to work out a way to eliminate the negative factors developed while building the system. We follow the main idea mentioned above and provide a novel blind signature scheme.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1