首页 > 最新文献

Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.最新文献

英文 中文
Cyberprofiling: offender profiling and geographic profiling of crime on the Internet 网络侧写:罪犯侧写和互联网上犯罪的地理侧写
B. Tompsett, A. M. Marshall, N. Semmens
A project to combine criminological techniques of profiling with Internet abuse and computer forensic data is outlined. The multidisciplinary approach which applies the expertise of lawyers, criminologists, computer forensics and Internet specialists together is seen as a response to the explosion of e-crimes. Future work that involves the presentation of the results of cyberprofiling is proposed.
一个项目,结合犯罪技术侧写与互联网滥用和计算机法医数据概述。将律师、犯罪学家、计算机取证和互联网专家的专业知识结合起来的多学科方法被视为对电子犯罪激增的回应。提出了涉及网络分析结果呈现的未来工作。
{"title":"Cyberprofiling: offender profiling and geographic profiling of crime on the Internet","authors":"B. Tompsett, A. M. Marshall, N. Semmens","doi":"10.1109/SECCMW.2005.1588290","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588290","url":null,"abstract":"A project to combine criminological techniques of profiling with Internet abuse and computer forensic data is outlined. The multidisciplinary approach which applies the expertise of lawyers, criminologists, computer forensics and Internet specialists together is seen as a response to the explosion of e-crimes. Future work that involves the presentation of the results of cyberprofiling is proposed.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133046171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sharing network logs for computer forensics: a new tool for the anonymization of netflow records 共享网络日志用于计算机取证:netflow记录匿名化的新工具
A. Slagell, Y. Li, K. Luo
The authors have begun to address the problem of anonymized data with the development of a new prototype tool CANINE: Converter and ANonymizer for Investigating Netflow Events. Originally, just a NetFlow converter, CANINE has been adapted to anonymize 8 of the most common fields found in all NetFlow formats. Most of these fields can be anonymized in multiple ways providing trade-offs between security and utility. This is the first tool the authors are aware of that supports many levels of anonymization and is the only NetFlow anonymizer of which we are aware ¿ besides a previous, less advanced tool they developed. This article is organized as follows. part 2 discusses related work in log anonymization. Part 3 discusses CANINE¿s anonymization algorithms and design decisions in depth. Finally, part 4 concludes and presents future work on CANINE and the anonymization of other log types.
作者已经开始解决匿名数据的问题,开发了一个新的原型工具CANINE:用于调查Netflow事件的转换器和匿名器。最初,它只是一个NetFlow转换器,CANINE已被用于匿名化所有NetFlow格式中最常见的8个字段。这些字段中的大多数都可以通过多种方式匿名化,从而在安全性和实用性之间进行权衡。这是作者所知道的第一个支持多级匿名化的工具,也是我们所知道的唯一一个NetFlow匿名器,除了他们之前开发的一个不太先进的工具之外。本文组织如下。第2部分讨论了日志匿名化的相关工作。第3部分将深入讨论CANINE的匿名化算法和设计决策。最后,第4部分总结并介绍了关于CANINE和其他日志类型匿名化的未来工作。
{"title":"Sharing network logs for computer forensics: a new tool for the anonymization of netflow records","authors":"A. Slagell, Y. Li, K. Luo","doi":"10.1109/SECCMW.2005.1588293","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588293","url":null,"abstract":"The authors have begun to address the problem of anonymized data with the development of a new prototype tool CANINE: Converter and ANonymizer for Investigating Netflow Events. Originally, just a NetFlow converter, CANINE has been adapted to anonymize 8 of the most common fields found in all NetFlow formats. Most of these fields can be anonymized in multiple ways providing trade-offs between security and utility. This is the first tool the authors are aware of that supports many levels of anonymization and is the only NetFlow anonymizer of which we are aware ¿ besides a previous, less advanced tool they developed. This article is organized as follows. part 2 discusses related work in log anonymization. Part 3 discusses CANINE¿s anonymization algorithms and design decisions in depth. Finally, part 4 concludes and presents future work on CANINE and the anonymization of other log types.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132256002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Advanced authentication and authorization for quality of service signaling 针对服务质量信令的高级认证和授权
T. Tsenov, H. Tschofenig, Xiaoming Fu, E. Korner
One of the key requirements of today's and future network infrastructures is to provide Quality of Service (QoS) support for end-to-end applications, by distinguishing the application flows and properly handling them in network nodes. As an important component to achieve Internet QoS, explicit signaling schemes for resource reservation have been proposed, which deal with admission, installation and refreshment of QoS reservation state information. To be useful, any QoS signaling protocol should provide a capability for authentication and authorization of the QoS requests, especially in environments where the end points are not trusted by the network nodes. However, existing protocols for QoS signaling encounter a number of authentication and authorization issues, which limit their application scenarios. The advent of NSIS QoS Signaling Layer Protocol (QoS-NSLP) offers the prospect to overcome some of these issues. After describing the overall design of QoS-NSLP, we present an approach to support advanced authentication and authorization capabilities by using the Extensible Authentication Protocol (EAP). In comparison with existing approaches, this approach, combined with the support for effective interaction with the Authentication, Authorization and Accounting (AAA) infrastructure, provides flexible and extensible authentication and authorization methods for the QoS signaling.
当今和未来网络基础设施的关键要求之一,是通过区分应用流并在网络节点中对其进行适当处理,为端到端应用提供服务质量(QoS)支持。作为实现互联网 QoS 的重要组成部分,人们提出了明确的资源预订信令方案,该方案涉及 QoS 预订状态信息的接纳、安装和刷新。任何 QoS 信令协议都应提供 QoS 请求的认证和授权功能,尤其是在终端不受网络节点信任的环境中,这样的协议才有用。然而,现有的 QoS 信令协议存在许多认证和授权问题,限制了它们的应用场景。NSIS QoS 信令层协议(QoS-NSLP)的出现为克服这些问题提供了前景。在介绍了 QoS-NSLP 的总体设计后,我们提出了一种通过使用可扩展身份验证协议(EAP)来支持高级身份验证和授权功能的方法。与现有方法相比,这种方法与支持与认证、授权和计费(AAA)基础设施有效互动相结合,为 QoS 信令提供了灵活、可扩展的认证和授权方法。
{"title":"Advanced authentication and authorization for quality of service signaling","authors":"T. Tsenov, H. Tschofenig, Xiaoming Fu, E. Korner","doi":"10.1109/SECCMW.2005.1588317","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588317","url":null,"abstract":"One of the key requirements of today's and future network infrastructures is to provide Quality of Service (QoS) support for end-to-end applications, by distinguishing the application flows and properly handling them in network nodes. As an important component to achieve Internet QoS, explicit signaling schemes for resource reservation have been proposed, which deal with admission, installation and refreshment of QoS reservation state information. To be useful, any QoS signaling protocol should provide a capability for authentication and authorization of the QoS requests, especially in environments where the end points are not trusted by the network nodes. However, existing protocols for QoS signaling encounter a number of authentication and authorization issues, which limit their application scenarios. The advent of NSIS QoS Signaling Layer Protocol (QoS-NSLP) offers the prospect to overcome some of these issues. After describing the overall design of QoS-NSLP, we present an approach to support advanced authentication and authorization capabilities by using the Extensible Authentication Protocol (EAP). In comparison with existing approaches, this approach, combined with the support for effective interaction with the Authentication, Authorization and Accounting (AAA) infrastructure, provides flexible and extensible authentication and authorization methods for the QoS signaling.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127495083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trust, the "wisdom of crowds", and societal norms: the creation, maintenance, and reasoning about trust in peer networks 信任、“群体智慧”和社会规范:同伴网络中信任的创造、维护和推理
F.C. Colon Osorio, J. Whitney
In a peer network environment, which is typical in ad-hoc wireless networks, nodes collaborate to achieve some collective end. There is no hierarchy within the network, all nodes being given equal authority. No channel to nodes outside of the peer network is assumed to exist. In this untraditional environment we must provide traditional security properties and assure fairness in order to enable the secure, collaborative success of the network. One solution is to form a Trusted Domain, and exclude perceived dishonest and unfair members. Such solutions have previously been intolerant of masquerading, and have suffered from a lack of precise control over the allocation and exercise of privileges within the Trusted Domain. We introduce a model based on the work of Yang et. al. 2002 and Narasimha et. al. 2003 that provides granular control over privileges, and guards against masquerading. Continued good behavior is rewarded by an escalation of privileges, while requiring an increased commitment of resources. Bad behavior results in expulsion from the Trusted Domain. In colluding with malicious nodes, well behaved nodes risk losing privileges gained over time; collusion is thereby discouraged.
在对等网络环境中(这在自组织无线网络中很典型),节点协作以实现某种集体目的。在网络中没有层次结构,所有节点都被赋予平等的权力。假定不存在通往对等网络之外节点的通道。在这种非传统的环境中,我们必须提供传统的安全属性并确保公平性,以实现网络的安全、协作成功。一种解决方案是建立一个可信域,排除被认为不诚实和不公平的成员。这种解决方案以前不能容忍伪装,并且在可信域中缺乏对特权分配和行使的精确控制。我们介绍了一个基于Yang等人2002年和Narasimha等人2003年工作的模型,该模型提供了对特权的粒度控制,并防止伪装。持续的良好行为会得到更多特权的奖励,同时需要更多的资源投入。不良行为将导致被驱逐出受信任域。在与恶意节点串通的过程中,行为良好的节点可能会失去随着时间推移而获得的特权;因此不鼓励勾结。
{"title":"Trust, the \"wisdom of crowds\", and societal norms: the creation, maintenance, and reasoning about trust in peer networks","authors":"F.C. Colon Osorio, J. Whitney","doi":"10.1109/SECCMW.2005.1588314","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588314","url":null,"abstract":"In a peer network environment, which is typical in ad-hoc wireless networks, nodes collaborate to achieve some collective end. There is no hierarchy within the network, all nodes being given equal authority. No channel to nodes outside of the peer network is assumed to exist. In this untraditional environment we must provide traditional security properties and assure fairness in order to enable the secure, collaborative success of the network. One solution is to form a Trusted Domain, and exclude perceived dishonest and unfair members. Such solutions have previously been intolerant of masquerading, and have suffered from a lack of precise control over the allocation and exercise of privileges within the Trusted Domain. We introduce a model based on the work of Yang et. al. 2002 and Narasimha et. al. 2003 that provides granular control over privileges, and guards against masquerading. Continued good behavior is rewarded by an escalation of privileges, while requiring an increased commitment of resources. Bad behavior results in expulsion from the Trusted Domain. In colluding with malicious nodes, well behaved nodes risk losing privileges gained over time; collusion is thereby discouraged.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"26 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133002703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Caching alternatives for a MANET-oriented OCSP scheme 面向manet的OCSP方案的缓存替代方案
G. Marias, K. Papapanagiotou, P. Georgiadis
Even though mobile ad hoc networks (MANETs) have been receiving increasing attention for more than a decade, many issues still remain unsolved, including the implementation and design of adequate security and trust mechanisms. The infrastructure-less nature of MANETs renders trust establishment a rather complex issue. Many solutions using public key cryptography and digital certificates have been proposed in this direction. However, the problem of certificate revocation and certificate status information distribution in MANETs has not yet been fully addressed. ADOPT (Ad-hoc Distributed OCSP for Trust) proposes the deployment of a lightweight, distributed, on-demand scheme based on cached OCSP responses, which can efficiently provide up-to-date certificate status information. As accurate and current revocation information is critical for any application based on public key certificates, ADOPT's caching mechanism should ensure that cached responses are updated regularly. This paper discusses caching issues and time parameters concerning ADOPT and proposes various alternatives that fit into different scenarios.
尽管十多年来移动自组织网络(manet)受到越来越多的关注,但许多问题仍然没有得到解决,包括适当的安全和信任机制的实施和设计。manet的无基础设施特性使得信任建立成为一个相当复杂的问题。在这个方向上,已经提出了许多使用公钥加密和数字证书的解决方案。然而,证书撤销和证书状态信息分发问题在MANETs中尚未得到充分解决。采用(Ad-hoc Distributed OCSP for Trust)提出了一种基于缓存OCSP响应的轻量级、分布式、按需方案的部署,该方案可以有效地提供最新的证书状态信息。由于准确和最新的撤销信息对于任何基于公钥证书的应用程序都是至关重要的,因此ADOPT的缓存机制应该确保定期更新缓存的响应。本文讨论了有关ADOPT的缓存问题和时间参数,并提出了适合不同场景的各种替代方案。
{"title":"Caching alternatives for a MANET-oriented OCSP scheme","authors":"G. Marias, K. Papapanagiotou, P. Georgiadis","doi":"10.1109/SECCMW.2005.1588315","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588315","url":null,"abstract":"Even though mobile ad hoc networks (MANETs) have been receiving increasing attention for more than a decade, many issues still remain unsolved, including the implementation and design of adequate security and trust mechanisms. The infrastructure-less nature of MANETs renders trust establishment a rather complex issue. Many solutions using public key cryptography and digital certificates have been proposed in this direction. However, the problem of certificate revocation and certificate status information distribution in MANETs has not yet been fully addressed. ADOPT (Ad-hoc Distributed OCSP for Trust) proposes the deployment of a lightweight, distributed, on-demand scheme based on cached OCSP responses, which can efficiently provide up-to-date certificate status information. As accurate and current revocation information is critical for any application based on public key certificates, ADOPT's caching mechanism should ensure that cached responses are updated regularly. This paper discusses caching issues and time parameters concerning ADOPT and proposes various alternatives that fit into different scenarios.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115586458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Reasoning about trust groups to coordinate mobile ad-hoc systems 关于协调移动自组织系统的信任组的推理
L. Capra
The increasing popularity of mobile computing devices, coupled with rapid advances in wireless networking technologies, have created the infrastructure needed to support the anywhere-anytime computing paradigm. Middleware systems have started to appear that aim at facilitating coordination among these devices, without the user even thinking about it, thus receding technology into the background. However, faced with overwhelming choice, additional support is required for applications to decide who can be trusted among this plethora of interacting peers. In this paper we propose a coordination model that exploits trust groups in order to promote safe interactions in the ubiquitous environment. Trust groups are asymmetric, that is, each device has its own view of the groups it belongs to, and long-lived, that is, their lifetime spans an extended period of time, despite group membership being dynamically handled. The dynamics of trust group creation, evolution and termination are described, based on the history of interactions of the device and on the ontology used to encode the context of trust. The programmer efforts required to reason about trust groups when coordinating mobile ad-hoc systems are discussed.
移动计算设备的日益普及,再加上无线网络技术的快速发展,已经创建了支持随时随地计算范式所需的基础设施。中间件系统已经开始出现,旨在促进这些设备之间的协调,而用户甚至不需要考虑它,从而将技术退到后台。然而,面对大量的选择,应用程序需要额外的支持来决定在这众多的交互对等点中谁可以被信任。在本文中,我们提出了一种利用信任组来促进泛在环境中安全交互的协调模型。信任组是不对称的,也就是说,每个设备都有自己所属的组的视图,并且是长寿命的,也就是说,尽管组成员关系是动态处理的,但它们的生命周期跨越了很长的一段时间。基于设备的交互历史和用于编码信任上下文的本体,描述了信任组的创建、演化和终止的动态。讨论了在协调移动自组织系统时,程序员推断信任组所需的工作。
{"title":"Reasoning about trust groups to coordinate mobile ad-hoc systems","authors":"L. Capra","doi":"10.1109/SECCMW.2005.1588307","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588307","url":null,"abstract":"The increasing popularity of mobile computing devices, coupled with rapid advances in wireless networking technologies, have created the infrastructure needed to support the anywhere-anytime computing paradigm. Middleware systems have started to appear that aim at facilitating coordination among these devices, without the user even thinking about it, thus receding technology into the background. However, faced with overwhelming choice, additional support is required for applications to decide who can be trusted among this plethora of interacting peers. In this paper we propose a coordination model that exploits trust groups in order to promote safe interactions in the ubiquitous environment. Trust groups are asymmetric, that is, each device has its own view of the groups it belongs to, and long-lived, that is, their lifetime spans an extended period of time, despite group membership being dynamically handled. The dynamics of trust group creation, evolution and termination are described, based on the history of interactions of the device and on the ontology used to encode the context of trust. The programmer efforts required to reason about trust groups when coordinating mobile ad-hoc systems are discussed.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124822405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Privacy preserving ubiquitous service provisioning based on Bayesian network conversion 基于贝叶斯网络转换的保隐私泛在服务提供
H. Kasai, Uchida Wataru, S. Kurakake
Protecting personal privacy is already seen as a crucial requirement in the implementation of service provisioning in the ubiquitous environment. From the view point of preserving personal privacy, the simplest approach would be for users not to reveal any kind of private information at any time while keeping the number of available services unrestricted. Meanwhile, from the service provider's point of view, though this has been not clearly stated so far, their service logics should also be hidden from others because those logics may leak their know-how. This paper presents an ubiquitous service provisioning mechanism that gives more opportunities for users to get available services while preserving the secrecy of users' and providers' sensitive information. The basic idea of this mechanism is to share service execution procedures between the service provider and the user by exchanging converted service logic described in the form of Bayesian decision networks. This paper describes the proposed mechanism and the conversion algorithm for the Bayesian networks, and details the system architecture and implementation.
保护个人隐私已经被视为在无处不在的环境中实现服务供应的关键需求。从保护个人隐私的角度来看,最简单的方法是用户在任何时候都不泄露任何类型的私人信息,同时保持可用服务的数量不受限制。同时,从服务提供者的角度来看,虽然到目前为止还没有明确说明,但他们的服务逻辑也应该对其他人隐藏,因为这些逻辑可能会泄露他们的专有技术。提出了一种无处不在的服务提供机制,在保证用户和提供者敏感信息保密性的同时,为用户提供更多获得可用服务的机会。该机制的基本思想是通过交换以贝叶斯决策网络形式描述的转换后的服务逻辑,在服务提供者和用户之间共享服务执行过程。本文描述了所提出的贝叶斯网络的机制和转换算法,并详细介绍了系统的结构和实现。
{"title":"Privacy preserving ubiquitous service provisioning based on Bayesian network conversion","authors":"H. Kasai, Uchida Wataru, S. Kurakake","doi":"10.1109/SECCMW.2005.1588298","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588298","url":null,"abstract":"Protecting personal privacy is already seen as a crucial requirement in the implementation of service provisioning in the ubiquitous environment. From the view point of preserving personal privacy, the simplest approach would be for users not to reveal any kind of private information at any time while keeping the number of available services unrestricted. Meanwhile, from the service provider's point of view, though this has been not clearly stated so far, their service logics should also be hidden from others because those logics may leak their know-how. This paper presents an ubiquitous service provisioning mechanism that gives more opportunities for users to get available services while preserving the secrecy of users' and providers' sensitive information. The basic idea of this mechanism is to share service execution procedures between the service provider and the user by exchanging converted service logic described in the form of Bayesian decision networks. This paper describes the proposed mechanism and the conversion algorithm for the Bayesian networks, and details the system architecture and implementation.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy in distributed reputation management 分布式信誉管理中的隐私
K. Ylitalo, Yki Kortesniemi
In online communities, the users typically do not meet personally, and, thus, they have to estimate the trustwor- thiness of the other parties using other means. To assist these estimations, various reputation systems have been developed. But collecting the required reputation information, which, essentially, is information about the user's past, also creates privacy con- cerns. In this paper, we examine how the distribution of reputation management using P2P networks deals with the privacy concerns of processing reputation information. We analyze the distributed reputation management from three angles: how the requirements of fair use practices should be reflected on the system design, what classes of information is leaked and, finally, how to manage the risks related to the social and technical issues. I. INTRODUCTION In online communities, people are typically strangers to each other and do not meet face to face. Consequently, estimating the trustworthiness of the other parties is more difficult than in every day life. To assist users in their trust decisions and to reduce the related risks, various reputation systems are being developed. These systems collect reputation information about the the users' past behavior, and have a mechanism to provide trustworthiness estimates based on the information. Characteristically, many of the current online communities manage the reputation information in a centralized manner. One of the most analyzed examples is the eBay's feedback forum (12). In this type of a centralized solution, one benefit is that the trusted third party (in this case: eBay) can play an important role in trust evaluations. In contrast, fully distributed peer-to-peer (P2P) networks have no centralized trusted third parties and the actual interactions happen directly between the peers. The peers, e.g., provide storage capacity to the community and they have to be able to evaluate other peers' trustworthiness on their own. Although the reputation information is useful in trustwor- thiness estimation (33), (23), collecting this information also presents privacy problems. In reputation management, the privacy problems arise when large amounts of the information is easily available and the user can be identified. In particu- lar, the identifiable information enables undesired tracing of the user's past behavior and preferences. And these threats increase along with the current trend of boosting data storage and processing capacity, which allows the possible malicious peers more capacity for monitoring others. In this paper, we examine how the decentralization of reputation management in P2P networks deals with the privacy concerns of processing reputation information. Fundamentally, the reputation information itself has to be public at least within the target community to be of any use. This means that the users, who have agreed to being evaluated by the reputation system, have also willingly given up some of their privacy. However, this
在在线社区中,用户通常不会亲自见面,因此,他们必须使用其他方法来估计其他各方的可信度。为了协助这些评估,开发了各种声誉系统。但是,收集必要的声誉信息,本质上是关于用户过去的信息,也会产生隐私问题。在本文中,我们研究了使用P2P网络的声誉管理分布如何处理处理声誉信息的隐私问题。本文从三个角度对分布式信誉管理进行了分析:合理使用实践的要求应如何体现在制度设计中,泄露的信息类型是什么,以及如何管理与社会和技术问题相关的风险。在网络社区中,人们通常是陌生人,不见面。因此,估计对方的可信度比在日常生活中要困难得多。为了帮助用户作出信任决定并减少相关风险,正在开发各种信誉系统。这些系统收集有关用户过去行为的信誉信息,并具有基于这些信息提供可信度估计的机制。典型的特点是,当前许多在线社区以集中的方式管理声誉信息。分析最多的例子之一是eBay的反馈论坛(12)。在这种集中式解决方案中,一个好处是受信任的第三方(在本例中是eBay)可以在信任评估中发挥重要作用。相反,完全分布式的点对点(P2P)网络没有集中可信的第三方,实际的交互直接发生在对等体之间。例如,对等体为社区提供存储容量,它们必须能够自己评估其他对等体的可信度。尽管声誉信息在可信度估计中很有用(33),(23),但收集这些信息也会带来隐私问题。在声誉管理中,当大量信息很容易获得并且用户可以被识别时,就会出现隐私问题。特别是,可识别的信息可以对用户过去的行为和偏好进行不必要的跟踪。这些威胁随着当前数据存储和处理能力的提高而增加,这使得可能的恶意对等体有更多的能力来监视其他恶意对等体。在本文中,我们研究了P2P网络中声誉管理的去中心化如何处理处理声誉信息的隐私问题。从根本上说,声誉信息本身必须是公开的,至少在目标社区内是公开的。这意味着同意接受信誉系统评估的用户也愿意放弃一些隐私。然而,这并不意味着他们会自动放弃所有隐私。在我们的研究中,我们研究了如何增强用户的隐私,以便只披露必要的信息,从而不向他人披露不必要的信息。我们认为,即使没有收集额外的信息来帮助用户的信任决策,其不受控制的可用性是一个隐私问题,因为信息总是链接到用户的标识符。为了解决这些问题,我们从三个互补的角度研究分布式声誉管理。首先,我们考察了数据保护立法所提出的公平信息实践应如何反映在分布式信誉管理的设计中。其次,我们讨论了分布式信誉管理背景下不同类型的隐私,最后,我们考虑了如何管理隐私风险。结果表明,保护任意一个节点的隐私比防止多个节点声誉信息被集体滥用要困难得多。可能的不当行为可以变得更加困难,但所有的隐私问题都不能被包容性地解决——一定程度的隐私损失是用户为获得声誉所必须付出的代价。
{"title":"Privacy in distributed reputation management","authors":"K. Ylitalo, Yki Kortesniemi","doi":"10.1109/SECCMW.2005.1588297","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588297","url":null,"abstract":"In online communities, the users typically do not meet personally, and, thus, they have to estimate the trustwor- thiness of the other parties using other means. To assist these estimations, various reputation systems have been developed. But collecting the required reputation information, which, essentially, is information about the user's past, also creates privacy con- cerns. In this paper, we examine how the distribution of reputation management using P2P networks deals with the privacy concerns of processing reputation information. We analyze the distributed reputation management from three angles: how the requirements of fair use practices should be reflected on the system design, what classes of information is leaked and, finally, how to manage the risks related to the social and technical issues. I. INTRODUCTION In online communities, people are typically strangers to each other and do not meet face to face. Consequently, estimating the trustworthiness of the other parties is more difficult than in every day life. To assist users in their trust decisions and to reduce the related risks, various reputation systems are being developed. These systems collect reputation information about the the users' past behavior, and have a mechanism to provide trustworthiness estimates based on the information. Characteristically, many of the current online communities manage the reputation information in a centralized manner. One of the most analyzed examples is the eBay's feedback forum (12). In this type of a centralized solution, one benefit is that the trusted third party (in this case: eBay) can play an important role in trust evaluations. In contrast, fully distributed peer-to-peer (P2P) networks have no centralized trusted third parties and the actual interactions happen directly between the peers. The peers, e.g., provide storage capacity to the community and they have to be able to evaluate other peers' trustworthiness on their own. Although the reputation information is useful in trustwor- thiness estimation (33), (23), collecting this information also presents privacy problems. In reputation management, the privacy problems arise when large amounts of the information is easily available and the user can be identified. In particu- lar, the identifiable information enables undesired tracing of the user's past behavior and preferences. And these threats increase along with the current trend of boosting data storage and processing capacity, which allows the possible malicious peers more capacity for monitoring others. In this paper, we examine how the decentralization of reputation management in P2P networks deals with the privacy concerns of processing reputation information. Fundamentally, the reputation information itself has to be public at least within the target community to be of any use. This means that the users, who have agreed to being evaluated by the reputation system, have also willingly given up some of their privacy. However, this","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trusted Internet forensics: design of a network forensics appliance 可信互联网取证:网络取证设备的设计
D. Bruschi, M. Monga, E. Rosti
With the spreading of cyber-crime, computer forensics has emerged as a new discipline in the system security arena. Some work is being done towards the definition of methodologies for the collection of digital evidences from storage devices that can withstand legal analysis in court. On the contrary, the collection of network evidences that allows for a selection of the traffic and guarantees legal admissibility is still an open field. In this paper we present the architecture of TIF, trusted Internet forensics, a network appliance that collects data from the network for forensics purposes. Such an appliance relies on a trusted computing platform in order to allow for the verification of the computational chain so that the data collected could be used as evidence in court.
随着网络犯罪的蔓延,计算机取证作为系统安全领域的一门新兴学科应运而生。目前正在进行一些工作,以确定从存储设备中收集数字证据的方法,以便经得起法庭的法律分析。而对于网络证据的收集,既要对流量进行选择,又要保证法律上的可采性,仍然是一个开放的领域。在本文中,我们介绍了TIF(可信Internet取证)的体系结构,它是一种从网络收集数据用于取证目的的网络设备。这种设备依赖于一个可信的计算平台,以便允许对计算链进行验证,以便收集的数据可以用作法庭上的证据。
{"title":"Trusted Internet forensics: design of a network forensics appliance","authors":"D. Bruschi, M. Monga, E. Rosti","doi":"10.1109/SECCMW.2005.1588292","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588292","url":null,"abstract":"With the spreading of cyber-crime, computer forensics has emerged as a new discipline in the system security arena. Some work is being done towards the definition of methodologies for the collection of digital evidences from storage devices that can withstand legal analysis in court. On the contrary, the collection of network evidences that allows for a selection of the traffic and guarantees legal admissibility is still an open field. In this paper we present the architecture of TIF, trusted Internet forensics, a network appliance that collects data from the network for forensics purposes. Such an appliance relies on a trusted computing platform in order to allow for the verification of the computational chain so that the data collected could be used as evidence in court.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115407050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Demonstration of security through collaboration in the digital business ecosystem 通过数字商业生态系统中的协作来展示安全性
J. Seigneur
Trustworthy decentralised identity mechanisms are promising to foster the digital business ecosystem (DBE), an EU-funded FP6 1ST Integrated Project. Progress has been made and driver small and medium enterprises (SMEs) users, which rely on the DBE technical commons, lobby for more security. However, such decentralised security mechanisms still remain on the research agenda. This demonstration presents the current state of security in the DBE.
值得信赖的去中心化身份机制有望促进数字商业生态系统(DBE),这是欧盟资助的FP6第一综合项目。已经取得了进展,并推动依赖DBE技术共享的中小型企业(sme)用户游说提高安全性。然而,这种分散的安全机制仍然在研究议程上。这个演示展示了DBE中的当前安全状态。
{"title":"Demonstration of security through collaboration in the digital business ecosystem","authors":"J. Seigneur","doi":"10.1109/SECCMW.2005.1588302","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588302","url":null,"abstract":"Trustworthy decentralised identity mechanisms are promising to foster the digital business ecosystem (DBE), an EU-funded FP6 1ST Integrated Project. Progress has been made and driver small and medium enterprises (SMEs) users, which rely on the DBE technical commons, lobby for more security. However, such decentralised security mechanisms still remain on the research agenda. This demonstration presents the current state of security in the DBE.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125208960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1