首页 > 最新文献

2008 Third International Conference on Risks and Security of Internet and Systems最新文献

英文 中文
Access control for cooperative systems: A comparative analysis 合作系统的访问控制:比较分析
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757460
Amine Baïna, Y. Deswarte, A. A. E. Kalam, M. Kaâniche
Collaboration allows sharing, processing and exchanging large amounts of data between individuals as well as groups and organizations. In this context, security and access control are important issues that should be studied, specified and enforced. In this paper, we discuss the different approaches that address access control for cooperative systems while putting emphasis on some important proposals; we conclude with a comparison between some interesting approaches, and we introduce some perspectives that help developing the domain.
协作允许在个人、团体和组织之间共享、处理和交换大量数据。在这种情况下,安全和访问控制是应该研究、指定和实施的重要问题。在本文中,我们讨论了解决协作系统访问控制的不同方法,并重点介绍了一些重要的建议;最后,我们将比较一些有趣的方法,并介绍一些有助于开发该领域的透视图。
{"title":"Access control for cooperative systems: A comparative analysis","authors":"Amine Baïna, Y. Deswarte, A. A. E. Kalam, M. Kaâniche","doi":"10.1109/CRISIS.2008.4757460","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757460","url":null,"abstract":"Collaboration allows sharing, processing and exchanging large amounts of data between individuals as well as groups and organizations. In this context, security and access control are important issues that should be studied, specified and enforced. In this paper, we discuss the different approaches that address access control for cooperative systems while putting emphasis on some important proposals; we conclude with a comparison between some interesting approaches, and we introduce some perspectives that help developing the domain.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133958808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Case study: Using digital signatures for the archival of medical records in hospitals 案例研究:在医院病历档案中使用数字签名
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757481
Sebastian Sageder, J. Sametinger, Andreas Wiesauer
Even in medium-sized hospitals, thousands of medical records are created every day. These documents have to be archived over many years. This is important for having access to information for later treatments of patients and for potential legal disputes. The latter makes signing of medical records important. The process of getting rid of paper in hospitals is quite challenging for many reasons. Using digital signatures is definitely one of these challenges. This article will report on this process and on experiences made in an Austrian medium-sized hospital.
即使在中型医院,每天也要创建数千份医疗记录。这些文件必须保存多年。这对于获得患者后期治疗和潜在法律纠纷的信息非常重要。后者使得签署医疗记录变得重要。由于许多原因,在医院摆脱纸张的过程相当具有挑战性。使用数字签名无疑是这些挑战之一。本文将报道这一过程以及奥地利一家中型医院的经验。
{"title":"Case study: Using digital signatures for the archival of medical records in hospitals","authors":"Sebastian Sageder, J. Sametinger, Andreas Wiesauer","doi":"10.1109/CRISIS.2008.4757481","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757481","url":null,"abstract":"Even in medium-sized hospitals, thousands of medical records are created every day. These documents have to be archived over many years. This is important for having access to information for later treatments of patients and for potential legal disputes. The latter makes signing of medical records important. The process of getting rid of paper in hospitals is quite challenging for many reasons. Using digital signatures is definitely one of these challenges. This article will report on this process and on experiences made in an Austrian medium-sized hospital.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"955 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113995581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quality assurance of Grid service provisioning by risk aware managing of resource failures 通过资源故障的风险意识管理来保证网格服务提供的质量
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757475
A. Keller, K. Voß, Dominic Battré, M. Hovestadt, O. Kao
Quality assurance is a key aspect in scope of the provisioning of grid services since end-users ask for specific quality of service (QoS) criteria defined in service level agreements (SLA). To commit to an SLA, grid providers need a risk analysis during SLA negotiation in order to estimate the probability of an SLA violation. In addition, such a risk analysis is necessary in the post-negotiation phase, in order to find the most profitable solution if not all SLAs can be fulfilled. Current job failure rates in grids (10-45%) highlight the necessity of fault-tolerance mechanisms. If not enough resources exist to compensate for all resource outages, the provider has to prefer those jobs which are in expectation the most profitable ones. Hence, this quality assurance ensures that obligations from the most important jobs will be fulfilled.
质量保证是网格服务供应范围的一个关键方面,因为最终用户需要在服务水平协议(SLA)中定义的特定服务质量(QoS)标准。为了提交SLA,网格提供商需要在SLA协商期间进行风险分析,以估计SLA违反的概率。此外,在协商后阶段,这样的风险分析是必要的,以便在并非所有sla都可以实现的情况下找到最有利可图的解决方案。目前电网的作业失败率(10-45%)突出了容错机制的必要性。如果没有足够的资源来补偿所有的资源中断,提供者必须优先选择那些预期最有利可图的作业。因此,这种质量保证确保了最重要工作的义务将得到履行。
{"title":"Quality assurance of Grid service provisioning by risk aware managing of resource failures","authors":"A. Keller, K. Voß, Dominic Battré, M. Hovestadt, O. Kao","doi":"10.1109/CRISIS.2008.4757475","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757475","url":null,"abstract":"Quality assurance is a key aspect in scope of the provisioning of grid services since end-users ask for specific quality of service (QoS) criteria defined in service level agreements (SLA). To commit to an SLA, grid providers need a risk analysis during SLA negotiation in order to estimate the probability of an SLA violation. In addition, such a risk analysis is necessary in the post-negotiation phase, in order to find the most profitable solution if not all SLAs can be fulfilled. Current job failure rates in grids (10-45%) highlight the necessity of fault-tolerance mechanisms. If not enough resources exist to compensate for all resource outages, the provider has to prefer those jobs which are in expectation the most profitable ones. Hence, this quality assurance ensures that obligations from the most important jobs will be fulfilled.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125283177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An algebraic-functional framework for distributed access control 分布式访问控制的代数-函数框架
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757458
Clara Bertolissi, M. Fernández
We propose an access control model that takes into account the specific behaviour of distributed, highly dynamic environments, and describe their representation using an algebraic-functional framework. The declarative nature of the model facilitates the analysis of policies, and direct implementations for access control checking even when resources and information are widely dispersed.
我们提出了一种访问控制模型,该模型考虑了分布式、高度动态环境的特定行为,并使用代数-函数框架描述了它们的表示。该模型的声明性有助于分析策略,并指导访问控制检查的实现,即使资源和信息分布广泛。
{"title":"An algebraic-functional framework for distributed access control","authors":"Clara Bertolissi, M. Fernández","doi":"10.1109/CRISIS.2008.4757458","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757458","url":null,"abstract":"We propose an access control model that takes into account the specific behaviour of distributed, highly dynamic environments, and describe their representation using an algebraic-functional framework. The declarative nature of the model facilitates the analysis of policies, and direct implementations for access control checking even when resources and information are widely dispersed.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129058989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards an automated firewall security policies validation process 迈向自动化防火墙安全策略验证过程
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757489
Ryma Abassi, S. Fatmi
A security policy constitutes one of the major actors in the protection of communication networks. However, it can be one of their weaknesses if it is inadequate according to the network security requirements. For this, a security policy has to be validated before its deployment. Unfortunately, in the literature, there is no well established validation mechanisms ensuring the well founded of such security policies. This paper proposes a validation framework for security policies based on the concept of executable specifications and applied to the firewall case. The main contributions provided by this paper concerns the adaptation of some concepts and mechanisms traditionally used in software engineering for validation aims, such as specification, executable specification or reachability graph.
安全策略是保护通信网络的主要角色之一。然而,如果不能满足网络安全要求,这可能是他们的弱点之一。为此,必须在部署安全策略之前对其进行验证。不幸的是,在文献中,没有建立良好的验证机制来确保这些安全策略的良好建立。本文提出了一个基于可执行规范概念的安全策略验证框架,并将其应用于防火墙案例。本文提供的主要贡献是对软件工程中用于验证目的的一些传统概念和机制的改编,例如规范、可执行规范或可达性图。
{"title":"Towards an automated firewall security policies validation process","authors":"Ryma Abassi, S. Fatmi","doi":"10.1109/CRISIS.2008.4757489","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757489","url":null,"abstract":"A security policy constitutes one of the major actors in the protection of communication networks. However, it can be one of their weaknesses if it is inadequate according to the network security requirements. For this, a security policy has to be validated before its deployment. Unfortunately, in the literature, there is no well established validation mechanisms ensuring the well founded of such security policies. This paper proposes a validation framework for security policies based on the concept of executable specifications and applied to the firewall case. The main contributions provided by this paper concerns the adaptation of some concepts and mechanisms traditionally used in software engineering for validation aims, such as specification, executable specification or reachability graph.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134240926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A formal security framework for mobile agent systems: Specification and verification 移动代理系统的正式安全框架:规范和验证
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757465
M. Loulou, A. Kacem, M. Jmaiel, M. Mosbah
Security in mobile agent systems is twofold: protection of mobile agents and protection of agent execution system. Indeed, the proposed solutions for the security of distributed systems arenpsilat sufficient. Moreover, therepsilas no solution which treats the different concerns of security in the mobile agent systems. To achieve this goal, we use formal foundations which provide a rigorous reasoning about security of mobile agent systems. We propose in this paper a formal framework for the security in mobile agent systems which consists of three basic frameworks. The specification framework proposes, explicitly, a generic definition of security policies that may be enhanced by several concepts related to one or more security models. For illustration, we present a security policy enhancement based on the concepts of the RBAC model. Inevitably, we associate to the specification framework a verification framework which checks the consistency of the proposed specifications as well as the consistency intra-policy. In response to the dynamic changes of security requirements in mobile agent systems, we propose a third framework for the reconfiguration of policies.
移动代理系统的安全性包括两个方面:对移动代理的保护和对代理执行系统的保护。实际上,为分布式系统的安全性提出的解决方案是不够的。此外,目前还没有解决移动代理系统中安全问题的解决方案。为了实现这一目标,我们使用了形式化的基础,它提供了关于移动代理系统安全性的严格推理。本文提出了一个移动代理系统安全的形式化框架,该框架由三个基本框架组成。规范框架明确地提出了安全策略的一般定义,该定义可以通过与一个或多个安全模型相关的几个概念来增强。为了说明这一点,我们提出了一个基于RBAC模型概念的安全策略增强。不可避免地,我们将一个验证框架与规范框架联系起来,该框架检查建议的规范的一致性以及策略内的一致性。针对移动代理系统中安全需求的动态变化,我们提出了第三种策略重构框架。
{"title":"A formal security framework for mobile agent systems: Specification and verification","authors":"M. Loulou, A. Kacem, M. Jmaiel, M. Mosbah","doi":"10.1109/CRISIS.2008.4757465","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757465","url":null,"abstract":"Security in mobile agent systems is twofold: protection of mobile agents and protection of agent execution system. Indeed, the proposed solutions for the security of distributed systems arenpsilat sufficient. Moreover, therepsilas no solution which treats the different concerns of security in the mobile agent systems. To achieve this goal, we use formal foundations which provide a rigorous reasoning about security of mobile agent systems. We propose in this paper a formal framework for the security in mobile agent systems which consists of three basic frameworks. The specification framework proposes, explicitly, a generic definition of security policies that may be enhanced by several concepts related to one or more security models. For illustration, we present a security policy enhancement based on the concepts of the RBAC model. Inevitably, we associate to the specification framework a verification framework which checks the consistency of the proposed specifications as well as the consistency intra-policy. In response to the dynamic changes of security requirements in mobile agent systems, we propose a third framework for the reconfiguration of policies.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133639764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Anomaly-based intrusion detection using distributed intelligent systems 基于异常的分布式智能系统入侵检测
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757462
B. Morel
Anomaly based intrusion detection suffers from the uncontrollability of the rate of false alarms (false positive). What one computer may not be able to accomplish (reliable detection of a new malware with small false positive) many networked intelligently may. This paper is a proof of concept of that idea based on simulation with real data analysis. It speculates on how such set-up could be made part of a large scale intelligent system.
基于异常的入侵检测存在误报率不可控的问题。一台计算机可能无法完成的工作(对带有小误报的新恶意软件的可靠检测),许多联网的智能计算机可以完成。本文通过对实际数据的仿真分析,对该思想的概念进行了验证。它推测如何使这种设置成为大规模智能系统的一部分。
{"title":"Anomaly-based intrusion detection using distributed intelligent systems","authors":"B. Morel","doi":"10.1109/CRISIS.2008.4757462","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757462","url":null,"abstract":"Anomaly based intrusion detection suffers from the uncontrollability of the rate of false alarms (false positive). What one computer may not be able to accomplish (reliable detection of a new malware with small false positive) many networked intelligently may. This paper is a proof of concept of that idea based on simulation with real data analysis. It speculates on how such set-up could be made part of a large scale intelligent system.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122651577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Firewalls anomalies’ detection system based on web services / mobile agents interactions 基于web服务/移动代理交互的防火墙异常检测系统
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757484
Fakher Ben Ftima, K. Karoui, H. Ghézala
Firewalls are core elements in network security. However, detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed systems specially Web services applications. In this work, we propose a firewall anomaliespsila detection system based on interactions between the Web services and the mobile agents technologies. Then, we highlight the trumps of this approach compared to the client/server model.
防火墙是网络安全的核心要素。然而,检测异常,特别是在分布式防火墙中,已经成为一项复杂的任务。移动代理为不同的分布式系统(特别是Web服务应用程序)之间的通信提供了一种有趣的方法。本文提出了一种基于Web服务与移动代理技术交互的防火墙异常检测系统。然后,我们将重点介绍与客户机/服务器模型相比,这种方法的优势。
{"title":"Firewalls anomalies’ detection system based on web services / mobile agents interactions","authors":"Fakher Ben Ftima, K. Karoui, H. Ghézala","doi":"10.1109/CRISIS.2008.4757484","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757484","url":null,"abstract":"Firewalls are core elements in network security. However, detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed systems specially Web services applications. In this work, we propose a firewall anomaliespsila detection system based on interactions between the Web services and the mobile agents technologies. Then, we highlight the trumps of this approach compared to the client/server model.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128054154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network 要是我能信任我的警察就好了!SIM:通过开放网络部署访问权限的基于代理的审计解决方案
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757467
Christophe Incoul, B. Gâteau, Jocelyn Aubert, Nicolas Bounoughaz, C. Feltus
Dynamic and evolved environment make the Information Systems (IS), and consequently access rights to its components, always more complex to define and to manage. To bring up a contribution for improving that matter, our paperpsilas first objective is to realize the development of an automated deployment of policies from an administrative platform that encompasses business requirements down to infrastructurepsilas components and devices. This objective is achieved by adapting the XACML OASIS framework and by formalizing a protocol for information exchange through different components of a multi-agent system. The second paperpsilas objective aims at providing guaranties that defined and deployed access rights are continuously aligned with business requirements. This objective is completed by complementary developments that aim to perform a systematic and/or on-demand audit of the effective rights against the desired ones. This second objective is achieved by adding new functionality to the proposed agents architecture and by adapting the protocol accordingly. Practically, this research has been performed in the framework of the SIM project and has privileged free and open source components for the prototyping phase.
动态和不断发展的环境使得信息系统(IS)及其组件的访问权限的定义和管理总是更加复杂。为了改进这一问题,本文的第一个目标是实现从包含业务需求到基础设施替代组件和设备的管理平台的策略自动部署的开发。通过调整XACML OASIS框架和通过多代理系统的不同组件进行信息交换的形式化协议,可以实现这一目标。第二篇论文的目标是保证定义和部署的访问权限始终与业务需求保持一致。这一目标是通过补充发展来完成的,这些发展旨在对有效权利和期望权利进行系统和/或按需审计。第二个目标是通过向提议的代理体系结构添加新功能并相应地调整协议来实现的。实际上,这项研究是在SIM项目的框架内进行的,并且在原型设计阶段享有免费和开源组件的特权。
{"title":"If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network","authors":"Christophe Incoul, B. Gâteau, Jocelyn Aubert, Nicolas Bounoughaz, C. Feltus","doi":"10.1109/CRISIS.2008.4757467","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757467","url":null,"abstract":"Dynamic and evolved environment make the Information Systems (IS), and consequently access rights to its components, always more complex to define and to manage. To bring up a contribution for improving that matter, our paperpsilas first objective is to realize the development of an automated deployment of policies from an administrative platform that encompasses business requirements down to infrastructurepsilas components and devices. This objective is achieved by adapting the XACML OASIS framework and by formalizing a protocol for information exchange through different components of a multi-agent system. The second paperpsilas objective aims at providing guaranties that defined and deployed access rights are continuously aligned with business requirements. This objective is completed by complementary developments that aim to perform a systematic and/or on-demand audit of the effective rights against the desired ones. This second objective is achieved by adding new functionality to the proposed agents architecture and by adapting the protocol accordingly. Practically, this research has been performed in the framework of the SIM project and has privileged free and open source components for the prototyping phase.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125345115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new timestamping schema in the Bounded Storage Model 有界存储模型中的新时间戳模式
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757479
A. B. Shil, Kaouther Blibech Sinaoui, R. Robbana
Timestamping [1] is a cryptographic technique for adding a reliable date to a document in order to prove its existence at a given time. Several solutions of timestamping exist. They are all based on cryptographic techniques as digital signatures and hash functions. However, with the increase of computing power and the evolution of cryptanalysis methods, cryptography becomes more and more the target of criticism. That's why we need new directions and orientations for timestamping techniques. One of these directions was introduced in [2] and dealt with non interactive timestamping solutions in the Bounded Storage Model. In the Bounded Storage Model, we make the hypothesis that user's storage capacity is bounded but user's computing power is unlimited. In this paper, we first present the existing timestamping systems. Then we introduce the Bounded Storage Model. Finally, we present a new timestamping schema that we have conceived in the bounded storage model.
时间戳[1]是一种加密技术,用于向文档添加可靠的日期,以证明其在给定时间的存在性。存在几种时间戳的解决方案。它们都基于数字签名和哈希函数等加密技术。然而,随着计算能力的提高和密码分析方法的发展,密码学越来越成为人们批评的对象。这就是为什么我们需要时间戳技术的新方向和方向。[2]中引入了其中一个方向,并处理了有界存储模型中的非交互式时间戳解决方案。在有限存储模型中,我们假设用户的存储容量是有限的,而用户的计算能力是无限的。本文首先介绍了现有的时间戳系统。然后介绍了有界存储模型。最后,我们提出了在有界存储模型中构思的一个新的时间戳模式。
{"title":"A new timestamping schema in the Bounded Storage Model","authors":"A. B. Shil, Kaouther Blibech Sinaoui, R. Robbana","doi":"10.1109/CRISIS.2008.4757479","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757479","url":null,"abstract":"Timestamping [1] is a cryptographic technique for adding a reliable date to a document in order to prove its existence at a given time. Several solutions of timestamping exist. They are all based on cryptographic techniques as digital signatures and hash functions. However, with the increase of computing power and the evolution of cryptanalysis methods, cryptography becomes more and more the target of criticism. That's why we need new directions and orientations for timestamping techniques. One of these directions was introduced in [2] and dealt with non interactive timestamping solutions in the Bounded Storage Model. In the Bounded Storage Model, we make the hypothesis that user's storage capacity is bounded but user's computing power is unlimited. In this paper, we first present the existing timestamping systems. Then we introduce the Bounded Storage Model. Finally, we present a new timestamping schema that we have conceived in the bounded storage model.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133003884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2008 Third International Conference on Risks and Security of Internet and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1