首页 > 最新文献

2010 10th IEEE/IPSJ International Symposium on Applications and the Internet最新文献

英文 中文
Supporting Network Formation through Mining under Privacy Constraints 在隐私约束下通过挖掘支持网络形成
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.10
Florian Skopik, D. Schall, S. Dustdar
Single professionals and small companies come together and form virtual communities to compete with global players. In these collaboration networks, the actual business partners are discovered and alliances formed on demand. However, it is impossible for single members to keep track of the dynamics in large-scale networks. With the wide adoption of service-oriented architectures (SOA), interactions between partners have become observable. Monitoring collaborations enables the inference of social relations and the identification of successful partner compositions. Measuring the quality of social relations, such as the degree of trust based on the success of past interactions, are a powerful means to support the formation of alliances. However, by applying monitoring, also privacy concerns arise. In this paper we deal with concepts and tools to support group formations. We consider the trade-off between the benefits of sharing personal profiles and accounting for privacy concerns of the individual network members.
单身专业人士和小公司聚集在一起,形成虚拟社区,与全球玩家竞争。在这些协作网络中,可以根据需要发现实际的业务伙伴并形成联盟。然而,在大规模网络中,单个成员不可能跟踪动态。随着面向服务的体系结构(SOA)的广泛采用,合作伙伴之间的交互变得可以观察到。监测协作可以推断社会关系并确定成功的合作伙伴组合。衡量社会关系的质量,如基于过去互动成功的信任程度,是支持联盟形成的有力手段。然而,通过应用监控,也会产生隐私问题。在本文中,我们处理支持群体形成的概念和工具。我们考虑了共享个人资料的好处和考虑个人网络成员的隐私问题之间的权衡。
{"title":"Supporting Network Formation through Mining under Privacy Constraints","authors":"Florian Skopik, D. Schall, S. Dustdar","doi":"10.1109/SAINT.2010.10","DOIUrl":"https://doi.org/10.1109/SAINT.2010.10","url":null,"abstract":"Single professionals and small companies come together and form virtual communities to compete with global players. In these collaboration networks, the actual business partners are discovered and alliances formed on demand. However, it is impossible for single members to keep track of the dynamics in large-scale networks. With the wide adoption of service-oriented architectures (SOA), interactions between partners have become observable. Monitoring collaborations enables the inference of social relations and the identification of successful partner compositions. Measuring the quality of social relations, such as the degree of trust based on the success of past interactions, are a powerful means to support the formation of alliances. However, by applying monitoring, also privacy concerns arise. In this paper we deal with concepts and tools to support group formations. We consider the trade-off between the benefits of sharing personal profiles and accounting for privacy concerns of the individual network members.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115152991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Scalar Multiplication Algorithms Secure against Power Analysis Attacks for Koblitz Curve Cryptosystems Koblitz曲线密码系统抗功率分析攻击的高效标量乘法算法
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.112
Yong-hee Jang, Yong-jin Kwon
Recently, many power analysis attacks have been proposed. Since the attacks are powerful, it is very important to implement cryptosystems securely against the attacks. We propose countermeasures against power analysis attacks for elliptic curve cryptosystems based on Koblitz curves (KCs), which are a special class of elliptic curves. That is, we make our countermeasures be secure against SPA, DPA, and new DPA attacks, specially RPA, ZPA, using a random point at each execution of elliptic curve scalar multiplication. And since our countermeasures are designed to use the Frobenius map of KC, those are very fast. Also, we reduce the number of elliptic curve addition up to about 50% using pre-computed tables.
最近,提出了许多功率分析攻击。由于攻击非常强大,因此安全实现密码系统以抵御攻击非常重要。针对椭圆曲线密码系统的功率分析攻击,提出了一种基于Koblitz曲线(KCs)的对策。也就是说,我们在每次执行椭圆曲线标量乘法时使用一个随机点,使我们的对策对SPA、DPA和新的DPA攻击(特别是RPA、ZPA)是安全的。由于我们的对策是使用KC的Frobenius地图,所以速度非常快。此外,我们使用预计算表将椭圆曲线加法的数量减少了约50%。
{"title":"Efficient Scalar Multiplication Algorithms Secure against Power Analysis Attacks for Koblitz Curve Cryptosystems","authors":"Yong-hee Jang, Yong-jin Kwon","doi":"10.1109/SAINT.2010.112","DOIUrl":"https://doi.org/10.1109/SAINT.2010.112","url":null,"abstract":"Recently, many power analysis attacks have been proposed. Since the attacks are powerful, it is very important to implement cryptosystems securely against the attacks. We propose countermeasures against power analysis attacks for elliptic curve cryptosystems based on Koblitz curves (KCs), which are a special class of elliptic curves. That is, we make our countermeasures be secure against SPA, DPA, and new DPA attacks, specially RPA, ZPA, using a random point at each execution of elliptic curve scalar multiplication. And since our countermeasures are designed to use the Frobenius map of KC, those are very fast. Also, we reduce the number of elliptic curve addition up to about 50% using pre-computed tables.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123301191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Proposal of Privacy Management Architecture 一种隐私管理体系结构方案
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.74
Yoshinori Osawa, S. Imamura, Atsushi Takeda, G. Kitagata, N. Shiratori, K. Hashimoto
Recent use of web services has spread over a wide variety of application areas. Users are requested to disclose private information for the use of web services. Such a disclosure is facing the risk of leaking private information. Privacy leakage is becoming one of the serious social problems. For the better use of web services, it is necessary to provide a reliable scheme for privacy management. There are many cases of private information leakage which are caused by user's misuse or unintended disclosure. In order to prevent users from unnecessarily leaking of private information, the users will be asked to clearly define information disclosure criteria. This paper discusses a privacy management architecture to prevent users from unnecessary leaking of private information. We demonstrate a prototype implementation how the proposed architecture effectively works in the initial setting of web services.
最近web服务的使用已经扩展到各种各样的应用程序领域。用户被要求披露使用网络服务的私人信息。这样的披露面临着泄露私人信息的风险。隐私泄露正在成为严重的社会问题之一。为了更好地利用web服务,有必要提供可靠的隐私管理方案。由于用户的误用或无意披露而导致的隐私信息泄露案例很多。为了防止用户不必要地泄露私人信息,将要求用户明确定义信息披露标准。本文讨论了一种防止用户不必要的隐私信息泄露的隐私管理体系结构。我们将演示一个原型实现,说明所建议的体系结构如何在web服务的初始设置中有效地工作。
{"title":"A Proposal of Privacy Management Architecture","authors":"Yoshinori Osawa, S. Imamura, Atsushi Takeda, G. Kitagata, N. Shiratori, K. Hashimoto","doi":"10.1109/SAINT.2010.74","DOIUrl":"https://doi.org/10.1109/SAINT.2010.74","url":null,"abstract":"Recent use of web services has spread over a wide variety of application areas. Users are requested to disclose private information for the use of web services. Such a disclosure is facing the risk of leaking private information. Privacy leakage is becoming one of the serious social problems. For the better use of web services, it is necessary to provide a reliable scheme for privacy management. There are many cases of private information leakage which are caused by user's misuse or unintended disclosure. In order to prevent users from unnecessarily leaking of private information, the users will be asked to clearly define information disclosure criteria. This paper discusses a privacy management architecture to prevent users from unnecessary leaking of private information. We demonstrate a prototype implementation how the proposed architecture effectively works in the initial setting of web services.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Signage with Audience Detection Using TV Broadcasting Waves 利用电视广播电波进行观众检测的数字标牌
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.99
Kaori Maeda, M. Nishi, Teruaki Yoshida, Kaoru Suzuki, Hiroyuki Inoue
We propose of a digital signage system with a new audience detection system using TV broadcasting waves and show its experimental trial at our university for about three months. For audience motion detection, we use received level fluctuations of TV broadcasting waves by sensing physical movement. The authors have already developed this detection technique and we applied this as audience detection of digital signage. When our detection method detects human motion, a digital signage system will turned on its display. This flow grabs more attention to the signage display and effectiveness of saving electric power. Through the experimental trial, we show that our detection method provides effectiveness for audience detection of digital signage with a big monitor and we can save the electric power of 60-70% of the signage display and one of 94% in business days and in holidays, respectively.
本文提出了一种利用电视电波进行观众检测的新型数字标牌系统,并在我校进行了为期三个月的实验试验。对于观众运动检测,我们通过感知物理运动来利用电视广播电波的接收电平波动。作者已经开发了这种检测技术,我们将其应用于数字标牌的受众检测。当我们的检测方法检测到人体运动时,数字标牌系统将打开其显示。这一流程让人们更加关注标识的展示和节能效果。通过实验试验表明,我们的检测方法对大显示器数字标牌的受众检测是有效的,在工作日和节假日,我们可以分别节省标牌显示60-70%和94%的电力。
{"title":"Digital Signage with Audience Detection Using TV Broadcasting Waves","authors":"Kaori Maeda, M. Nishi, Teruaki Yoshida, Kaoru Suzuki, Hiroyuki Inoue","doi":"10.1109/SAINT.2010.99","DOIUrl":"https://doi.org/10.1109/SAINT.2010.99","url":null,"abstract":"We propose of a digital signage system with a new audience detection system using TV broadcasting waves and show its experimental trial at our university for about three months. For audience motion detection, we use received level fluctuations of TV broadcasting waves by sensing physical movement. The authors have already developed this detection technique and we applied this as audience detection of digital signage. When our detection method detects human motion, a digital signage system will turned on its display. This flow grabs more attention to the signage display and effectiveness of saving electric power. Through the experimental trial, we show that our detection method provides effectiveness for audience detection of digital signage with a big monitor and we can save the electric power of 60-70% of the signage display and one of 94% in business days and in holidays, respectively.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125692722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A MAC-address Relaying NAT Router for PC Identification from Outside of a LAN 用于局域网外PC识别的mac地址中继NAT路由器
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.97
R. Murakami, N. Yamai, K. Okayama
NAT (Network Address Translation) is well-known as one of the short-term solutions of IPv4 address exhaustion. NAT is a technique that shares a single IP address in several PCs, and is widely used for alleviating the IPv4 address exhaustion and as a security solution. However, when a backbone network has access control function for PCs based on their IP addresses, it cannot identify the PCs under a NAT router since their original IP addresses are hidden by the NAT router. In this research, we focus on MAC address which identifies PC at datalink layer and propose a NAT router which relays the MAC addresses of PCs inside of a LAN to the outside. Since the source MAC addresses of packets sent from PCs are preserved even after being relayed by the NAT router, a LAN access control server outside of the NAT router can still identify these PCs based on their MAC addresses instead of their IP addresses.
NAT (Network Address Translation)是IPv4地址耗尽的一种短期解决方案。NAT是一种在多台pc中共享一个IP地址的技术,广泛用于缓解IPv4地址枯竭和安全解决方案。但是,当骨干网根据IP地址对pc进行访问控制时,由于NAT路由器隐藏了pc的原始IP地址,骨干网无法识别NAT路由器下的pc。在本研究中,我们重点研究了在数据链路层识别PC机的MAC地址,并提出了一种NAT路由器,它将局域网内PC机的MAC地址中继到外部。由于pc发送的数据包的源MAC地址在经过NAT路由器转发后仍然被保留,因此NAT路由器外的LAN访问控制服务器仍然可以根据MAC地址而不是IP地址来识别这些pc。
{"title":"A MAC-address Relaying NAT Router for PC Identification from Outside of a LAN","authors":"R. Murakami, N. Yamai, K. Okayama","doi":"10.1109/SAINT.2010.97","DOIUrl":"https://doi.org/10.1109/SAINT.2010.97","url":null,"abstract":"NAT (Network Address Translation) is well-known as one of the short-term solutions of IPv4 address exhaustion. NAT is a technique that shares a single IP address in several PCs, and is widely used for alleviating the IPv4 address exhaustion and as a security solution. However, when a backbone network has access control function for PCs based on their IP addresses, it cannot identify the PCs under a NAT router since their original IP addresses are hidden by the NAT router. In this research, we focus on MAC address which identifies PC at datalink layer and propose a NAT router which relays the MAC addresses of PCs inside of a LAN to the outside. Since the source MAC addresses of packets sent from PCs are preserved even after being relayed by the NAT router, a LAN access control server outside of the NAT router can still identify these PCs based on their MAC addresses instead of their IP addresses.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129181057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reactive Programming Optimizations in Pervasive Computing 普适计算中的响应式编程优化
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.92
Chao Chen, Yi Xu, Kun Li, A. Helal
Pervasive computing systems are begging for programming models and methodologies specifically suited to the particular cyber-physical nature of these systems. Reactive (rule-based) programming is an attractive model to use due to its built-in safety features and intuitive application development style. Without careful optimization however, reactive programming engines could turn into monstrous power drains of the pervasive system and its sensor network. In this paper we propose two optimizations for reactivity engines. The first, which we prove to be optimal, assumes all sensors in the space are equally important to the application. The other, which is adaptive, employs and estimates a probability for each sensor based on application usage. Both optimizations use a mixed push/pull approach to achieve optimal or near optimal energy efficiency. We present an experimental evaluation of the two algorithms to quantify their performance over a range of parameters.
普适计算系统需要特别适合这些系统的特定网络物理性质的编程模型和方法。由于其内置的安全特性和直观的应用程序开发风格,响应式(基于规则的)编程是一种很有吸引力的模型。然而,如果没有仔细的优化,反应式编程引擎可能会变成无处不在的系统及其传感器网络的巨大能量消耗。本文针对反应性发动机提出了两种优化方案。第一种,我们证明是最优的,假设空间中的所有传感器对应用都同样重要。另一种是自适应的,根据应用的使用情况,采用并估计每个传感器的概率。这两种优化都使用混合推/拉方法来实现最佳或接近最佳的能源效率。我们提出两种算法的实验评价量化他们的表现在一系列参数。
{"title":"Reactive Programming Optimizations in Pervasive Computing","authors":"Chao Chen, Yi Xu, Kun Li, A. Helal","doi":"10.1109/SAINT.2010.92","DOIUrl":"https://doi.org/10.1109/SAINT.2010.92","url":null,"abstract":"Pervasive computing systems are begging for programming models and methodologies specifically suited to the particular cyber-physical nature of these systems. Reactive (rule-based) programming is an attractive model to use due to its built-in safety features and intuitive application development style. Without careful optimization however, reactive programming engines could turn into monstrous power drains of the pervasive system and its sensor network. In this paper we propose two optimizations for reactivity engines. The first, which we prove to be optimal, assumes all sensors in the space are equally important to the application. The other, which is adaptive, employs and estimates a probability for each sensor based on application usage. Both optimizations use a mixed push/pull approach to achieve optimal or near optimal energy efficiency. We present an experimental evaluation of the two algorithms to quantify their performance over a range of parameters.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125986354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
CUBIQ: Cross UBIQuitous Platform Architecture CUBIQ:跨平台架构
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.47
H. Dempo, Makiko Yoshida
CUBIQ is a common and shared platform which mediates diversified sensor systems and ubiquitous applications. The platform enhances ubiquitous applications through diversified federations among sensors, services and applications. The platform offer transparent context data access, real-time and scalable data dissemination and processing and intelligent service collaborations.
CUBIQ是一个通用和共享的平台,它调解了多样化的传感器系统和无处不在的应用。该平台通过传感器、服务和应用之间的多样化联合,增强了无处不在的应用。该平台提供透明的上下文数据访问、实时和可扩展的数据传播和处理以及智能服务协作。
{"title":"CUBIQ: Cross UBIQuitous Platform Architecture","authors":"H. Dempo, Makiko Yoshida","doi":"10.1109/SAINT.2010.47","DOIUrl":"https://doi.org/10.1109/SAINT.2010.47","url":null,"abstract":"CUBIQ is a common and shared platform which mediates diversified sensor systems and ubiquitous applications. The platform enhances ubiquitous applications through diversified federations among sensors, services and applications. The platform offer transparent context data access, real-time and scalable data dissemination and processing and intelligent service collaborations.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130074389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Supporting USB Devices for the Global Migration 支持USB设备进行全局迁移
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.59
Hidenobu Watanabe, H. Masaoka, T. Ohigashi, T. Kondo, K. Nishimura, R. Aibara
Virtualization has been also used as desktop utility and supports VM migration, which is a function to migrate a VM (Virtual Machine) from a physical host to another. However, it cannot migrate hardware configuration of peripherals. We focus on USB devices as peripherals and provide the USB device connection method by combination of MAT and USB/IP for the global migration. In our system, MAT is implemented into VM and solves mismatch of VM's IP address caused by VM migration. We define VM migration capable of migrating among distinct hosts over different network segments as the global migration. USB device connectivity between host and VM is ensured by USB/IP. Combination of MAT and USB/IP allows a migrated VM to connect a USB device attaching to any hosts after migration. This paper describes the proposed mechanism for the global migration supporting USB devices.
虚拟化也被用作桌面实用程序,并支持VM迁移,这是一种将VM(虚拟机)从物理主机迁移到另一个物理主机的功能。但是,它不能迁移外设的硬件配置。我们以USB设备为外设,提供MAT与USB/IP相结合的USB设备连接方法,实现USB设备的全球迁移。在我们的系统中,MAT被实现到VM中,解决了由于VM迁移导致的VM IP地址不匹配的问题。我们将能够在不同网段的不同主机之间迁移的虚拟机迁移定义为全局迁移。主机和虚拟机之间通过USB/IP连接USB设备。MAT和USB/IP的结合,使得迁移后的虚拟机可以连接绑定到任意主机上的USB设备。本文描述了支持USB设备的全球迁移机制。
{"title":"Supporting USB Devices for the Global Migration","authors":"Hidenobu Watanabe, H. Masaoka, T. Ohigashi, T. Kondo, K. Nishimura, R. Aibara","doi":"10.1109/SAINT.2010.59","DOIUrl":"https://doi.org/10.1109/SAINT.2010.59","url":null,"abstract":"Virtualization has been also used as desktop utility and supports VM migration, which is a function to migrate a VM (Virtual Machine) from a physical host to another. However, it cannot migrate hardware configuration of peripherals. We focus on USB devices as peripherals and provide the USB device connection method by combination of MAT and USB/IP for the global migration. In our system, MAT is implemented into VM and solves mismatch of VM's IP address caused by VM migration. We define VM migration capable of migrating among distinct hosts over different network segments as the global migration. USB device connectivity between host and VM is ensured by USB/IP. Combination of MAT and USB/IP allows a migrated VM to connect a USB device attaching to any hosts after migration. This paper describes the proposed mechanism for the global migration supporting USB devices.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130128700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Routing Method for Inbound E-mail Delivery Considering Route and MTA Conditions on Multihomed Environment 多主环境下考虑路由和MTA条件的入站电子邮件投递动态路由方法
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.96
Sho Jitsuto, Yong Jin, K. Okayama, N. Yamai
To operate e-mail systems stably multihomed networks are well used. As an operation method on multihomed networks, we have proposed a dynamic route selection method considering status of networks. However, status of Mail Transfer Agents(MTAs) have not been considered in this method so that a heavily loaded MTA would be possibly selected. In this paper, we propose a new dynamic route selection method considering not only status of networks but also that of MTAs. With this method, an appropriate route could be selected based on status of networks and MTAs so that dynamic load balancing of MTAs could be realized. Furthermore in case failed MTAs exist, such MTAs could be avoided automatically.
为了稳定地运行电子邮件系统,多主网络被广泛使用。作为多宿主网络的一种操作方法,我们提出了一种考虑网络状态的动态路由选择方法。但是,在此方法中没有考虑邮件传输代理(Mail Transfer Agents, MTA)的状态,因此可能会选择负载较重的MTA。本文提出了一种既考虑网络状态又考虑mta状态的动态路由选择方法。该方法可以根据网络和mta的状态选择合适的路由,从而实现mta的动态负载均衡。此外,如果存在失败的mta,则可以自动避免此类mta。
{"title":"A Dynamic Routing Method for Inbound E-mail Delivery Considering Route and MTA Conditions on Multihomed Environment","authors":"Sho Jitsuto, Yong Jin, K. Okayama, N. Yamai","doi":"10.1109/SAINT.2010.96","DOIUrl":"https://doi.org/10.1109/SAINT.2010.96","url":null,"abstract":"To operate e-mail systems stably multihomed networks are well used. As an operation method on multihomed networks, we have proposed a dynamic route selection method considering status of networks. However, status of Mail Transfer Agents(MTAs) have not been considered in this method so that a heavily loaded MTA would be possibly selected. In this paper, we propose a new dynamic route selection method considering not only status of networks but also that of MTAs. With this method, an appropriate route could be selected based on status of networks and MTAs so that dynamic load balancing of MTAs could be realized. Furthermore in case failed MTAs exist, such MTAs could be avoided automatically.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124367381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs 基于程序自动生成测试用例的SQL注入漏洞分析与检测
Pub Date : 2010-07-19 DOI: 10.1109/SAINT.2010.60
Michelle Ruse, Tanmoy Sarkar, Samik Basu
SQL injection attacks occur due to vulnerabilities in the design of queries where a malicious user can take advantage of input opportunities to insert code in the queries that modify the query-conditions resulting in unauthorized database access. We provide a novel technique to identify the possibilities of such attacks. The central theme of our technique is based on automatically developing a model for a SQL query such that the model captures the dependencies between various components (sub-queries) of the query. We, then, analyze the model using CREST test-case generator and identify the conditions under which the query corresponding to the model is deemed vulnerable. We further analyze the obtained condition-set to identify its subset; this subset being referred to as the causal set of the vulnerability. Our technique considers the semantics of the query conditions, i.e., the relationship between the conditions, and as such complements the existing techniques which only rely on syntactic structure of the SQL query. In short, our technique can detect vulnerabilities in nested SQL queries, and can provide results with no false positives or false negatives when compared to the existing techniques.
SQL注入攻击的发生是由于查询设计中的漏洞,恶意用户可以利用输入机会在查询中插入代码,修改查询条件,从而导致未经授权的数据库访问。我们提供了一种新的技术来识别这种攻击的可能性。我们技术的中心主题是基于自动开发SQL查询的模型,这样模型就可以捕获查询的各个组件(子查询)之间的依赖关系。然后,我们使用CREST测试用例生成器分析模型,并确定在哪些条件下与模型对应的查询被认为是易受攻击的。我们进一步分析得到的条件集来识别它的子集;这个子集被称为漏洞的因果集。我们的技术考虑了查询条件的语义,即条件之间的关系,这样就补充了仅依赖于SQL查询的语法结构的现有技术。简而言之,我们的技术可以检测嵌套SQL查询中的漏洞,并且与现有技术相比,可以提供没有假阳性或假阴性的结果。
{"title":"Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs","authors":"Michelle Ruse, Tanmoy Sarkar, Samik Basu","doi":"10.1109/SAINT.2010.60","DOIUrl":"https://doi.org/10.1109/SAINT.2010.60","url":null,"abstract":"SQL injection attacks occur due to vulnerabilities in the design of queries where a malicious user can take advantage of input opportunities to insert code in the queries that modify the query-conditions resulting in unauthorized database access. We provide a novel technique to identify the possibilities of such attacks. The central theme of our technique is based on automatically developing a model for a SQL query such that the model captures the dependencies between various components (sub-queries) of the query. We, then, analyze the model using CREST test-case generator and identify the conditions under which the query corresponding to the model is deemed vulnerable. We further analyze the obtained condition-set to identify its subset; this subset being referred to as the causal set of the vulnerability. Our technique considers the semantics of the query conditions, i.e., the relationship between the conditions, and as such complements the existing techniques which only rely on syntactic structure of the SQL query. In short, our technique can detect vulnerabilities in nested SQL queries, and can provide results with no false positives or false negatives when compared to the existing techniques.","PeriodicalId":381377,"journal":{"name":"2010 10th IEEE/IPSJ International Symposium on Applications and the Internet","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
期刊
2010 10th IEEE/IPSJ International Symposium on Applications and the Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1