首页 > 最新文献

2008 Sixth Annual Conference on Privacy, Security and Trust最新文献

英文 中文
Private and Cheating-Free Outsourcing of Algebraic Computations 代数计算的私有和无作弊外包
Pub Date : 2008-10-01 DOI: 10.1109/PST.2008.12
David Benjamin, M. Atallah
We give protocols for the secure and private outsourcing of linear algebra computations, that enable a client to securely outsource expensive algebraic computations (like the multiplication of huge matrices) to two remote servers, such that the servers learn nothing about the customer's private input or the result of the computation,and any attempted corruption of the answer by the servers is detected with high probability. The computational work done locally by the client is linear in the size of its input and does not require the client to carry out locally any expensive encryptions of such input.The computational burden on the servers is proportional to the time complexity of the current practically used algorithms for solving the algebraic problem (e.g., proportional to n3 for multiplying two ntimesn matrices). If the servers were to collude against the client,then they would only find out the client's private inputs, but they would not be able to corrupt the answer without detection by the client.
我们给出了用于线性代数计算的安全和私有外包的协议,它使客户能够安全地将昂贵的代数计算(如巨大矩阵的乘法)外包给两个远程服务器,这样服务器就不会了解客户的私有输入或计算结果,并且服务器对答案的任何企图破坏都是高概率检测到的。客户机在本地完成的计算工作在其输入的大小上是线性的,并且不需要客户机在本地对此类输入执行任何昂贵的加密。服务器上的计算负担与当前用于解决代数问题的实际使用算法的时间复杂度成正比(例如,与n3相乘两个ntimesn矩阵成正比)。如果服务器串通起来反对客户端,那么它们只会发现客户端的私人输入,但它们无法在客户端检测不到的情况下破坏答案。
{"title":"Private and Cheating-Free Outsourcing of Algebraic Computations","authors":"David Benjamin, M. Atallah","doi":"10.1109/PST.2008.12","DOIUrl":"https://doi.org/10.1109/PST.2008.12","url":null,"abstract":"We give protocols for the secure and private outsourcing of linear algebra computations, that enable a client to securely outsource expensive algebraic computations (like the multiplication of huge matrices) to two remote servers, such that the servers learn nothing about the customer's private input or the result of the computation,and any attempted corruption of the answer by the servers is detected with high probability. The computational work done locally by the client is linear in the size of its input and does not require the client to carry out locally any expensive encryptions of such input.The computational burden on the servers is proportional to the time complexity of the current practically used algorithms for solving the algebraic problem (e.g., proportional to n3 for multiplying two ntimesn matrices). If the servers were to collude against the client,then they would only find out the client's private inputs, but they would not be able to corrupt the answer without detection by the client.","PeriodicalId":422934,"journal":{"name":"2008 Sixth Annual Conference on Privacy, Security and Trust","volume":"5 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132536469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 211
Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks 结合隐私结果:教老狗新把戏
Pub Date : 2008-10-01 DOI: 10.1109/PST.2008.27
E. Brown, T. A. Kosa
Canadian government bodies are subject to a number of requirements, including legislation, regulations,directives and policies, that speaks to informational privacy. These have come to be considered synonymous with the completion of a Privacy Impact Assessment. Some go so far as to specifically require an assessment, but few speak to specific technical content. Nor are there process requirements for sustaining privacy standards once the assessment document is submitted. At best, recommendations are identified to enhance the privacy posture of a program area's information management practices, but there is no mechanism to ensure that they are implemented. We propose the PIA process be adapted to mandate privacy outcomes in terms of specific actions that must betaken once the assessment is complete. Starting with the established PIA document, the program area can identify how to best marry the privacy requirements with the established business processes supporting the service delivery line. The result would incorporate privacy outcomes as ongoing activities and include not only consideration of agency requirements for personal information management, but also the impact to an individual's informational privacy.
加拿大政府机构受到许多要求的约束,包括涉及信息隐私的法律、法规、指令和政策。这些已被视为完成隐私影响评估的同义词。有些甚至特别要求进行评估,但很少涉及具体的技术内容。一旦提交评估文件,也没有维持隐私标准的流程要求。在最好的情况下,确定建议是为了增强规划领域的信息管理实践的隐私状态,但是没有机制来确保它们被实现。我们建议调整PIA流程,以在评估完成后必须采取的具体行动方面强制要求隐私结果。从已建立的PIA文档开始,计划领域可以确定如何最好地将隐私需求与支持服务交付线的已建立的业务流程结合起来。结果将把隐私结果纳入持续活动,不仅考虑机构对个人信息管理的要求,而且考虑对个人信息隐私的影响。
{"title":"Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks","authors":"E. Brown, T. A. Kosa","doi":"10.1109/PST.2008.27","DOIUrl":"https://doi.org/10.1109/PST.2008.27","url":null,"abstract":"Canadian government bodies are subject to a number of requirements, including legislation, regulations,directives and policies, that speaks to informational privacy. These have come to be considered synonymous with the completion of a Privacy Impact Assessment. Some go so far as to specifically require an assessment, but few speak to specific technical content. Nor are there process requirements for sustaining privacy standards once the assessment document is submitted. At best, recommendations are identified to enhance the privacy posture of a program area's information management practices, but there is no mechanism to ensure that they are implemented. We propose the PIA process be adapted to mandate privacy outcomes in terms of specific actions that must betaken once the assessment is complete. Starting with the established PIA document, the program area can identify how to best marry the privacy requirements with the established business processes supporting the service delivery line. The result would incorporate privacy outcomes as ongoing activities and include not only consideration of agency requirements for personal information management, but also the impact to an individual's informational privacy.","PeriodicalId":422934,"journal":{"name":"2008 Sixth Annual Conference on Privacy, Security and Trust","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114644775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System 基于信誉系统的聚合属性信任评估框架
Pub Date : 2008-10-01 DOI: 10.1109/PST.2008.28
A. Mohan, D. Blough
To enable a rich attribute-based authorization system, it is desirable that a large number of user attributes are available, possibly provided by multiple entities. The user may be required to aggregate his attributes and present them to a service provider to prove he has the right to access some service. In this paper, we present AttributeTrust - a policy-based privacy enhanced framework for aggregating user attributes and evaluating confidence in these attributes. We envision a future where attribute providers will be commonplace and service providers will face the problem of choosing one among multiple attribute providers that can provide the same user attribute. In AttributeTrust, we address this problem by means of a reputation system model based on transitive trust. Entities express confidence in other entities to supply trusted attributes, forming chains from a service provider to different attribute providers. A service provider uses this transitive reputation to decide whether to accept a particular attribute from a specific attribute provider.We discuss how the AttributeTrust model prevents common attacks on reputation systems. AttributeTrust differs from the current approaches by deriving its attack resistance from its specific context of attribute provisioning, its voting mechanism formulation, and unique properties of its confidence relationships.
要启用丰富的基于属性的授权系统,需要有大量可用的用户属性,这些属性可能由多个实体提供。用户可能需要聚合其属性并将其呈现给服务提供者,以证明他有权访问某些服务。在本文中,我们提出了AttributeTrust——一个基于策略的隐私增强框架,用于聚合用户属性并评估这些属性的置信度。我们设想在未来,属性提供程序将变得司空见惯,服务提供程序将面临在多个可以提供相同用户属性的属性提供程序中选择一个的问题。在AttributeTrust中,我们通过基于可传递信任的声誉系统模型来解决这个问题。实体表示对其他实体的信任,以提供受信任的属性,形成从服务提供者到不同属性提供者的链。服务提供者使用此传递声誉来决定是否接受来自特定属性提供者的特定属性。我们讨论AttributeTrust模型如何防止对信誉系统的常见攻击。AttributeTrust与当前方法的不同之处在于,它的抗攻击能力来自于其特定的属性配置上下文、投票机制的制定以及其信任关系的独特属性。
{"title":"AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System","authors":"A. Mohan, D. Blough","doi":"10.1109/PST.2008.28","DOIUrl":"https://doi.org/10.1109/PST.2008.28","url":null,"abstract":"To enable a rich attribute-based authorization system, it is desirable that a large number of user attributes are available, possibly provided by multiple entities. The user may be required to aggregate his attributes and present them to a service provider to prove he has the right to access some service. In this paper, we present AttributeTrust - a policy-based privacy enhanced framework for aggregating user attributes and evaluating confidence in these attributes. We envision a future where attribute providers will be commonplace and service providers will face the problem of choosing one among multiple attribute providers that can provide the same user attribute. In AttributeTrust, we address this problem by means of a reputation system model based on transitive trust. Entities express confidence in other entities to supply trusted attributes, forming chains from a service provider to different attribute providers. A service provider uses this transitive reputation to decide whether to accept a particular attribute from a specific attribute provider.We discuss how the AttributeTrust model prevents common attacks on reputation systems. AttributeTrust differs from the current approaches by deriving its attack resistance from its specific context of attribute provisioning, its voting mechanism formulation, and unique properties of its confidence relationships.","PeriodicalId":422934,"journal":{"name":"2008 Sixth Annual Conference on Privacy, Security and Trust","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124815005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Encoding the Program Correctness Proofs as Programs in PCC Technology 用PCC技术将程序正确性证明编码为程序
Pub Date : 2008-10-01 DOI: 10.1109/PST.2008.20
Heidar Pirzadeh, Danny Dubé
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inherently large. The approaches proposed to alleviate this, suffer from drawbacks of their own especially the enlargement of the trusted computing base, in which any bug may cause an unsafe program to be accepted. We propose a generic extended PCC framework (EPCC) in which, instead of the proof, a proof generator for the program in question is transmitted. This framework enables the execution of the proof generator and the recovery of the proof on the consumer side in a secure manner.
携带证明码(PCC)及其相关方法在实际应用中存在的关键问题之一是难以传输和存储本质上较大的证明。为缓解这一问题而提出的方法都有其自身的缺点,特别是可信计算基础的扩大,其中任何错误都可能导致不安全的程序被接受。我们提出了一个通用的扩展PCC框架(EPCC),其中传输的不是证明,而是有关程序的证明生成器。该框架允许以安全的方式在消费者端执行证明生成器和恢复证明。
{"title":"Encoding the Program Correctness Proofs as Programs in PCC Technology","authors":"Heidar Pirzadeh, Danny Dubé","doi":"10.1109/PST.2008.20","DOIUrl":"https://doi.org/10.1109/PST.2008.20","url":null,"abstract":"One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inherently large. The approaches proposed to alleviate this, suffer from drawbacks of their own especially the enlargement of the trusted computing base, in which any bug may cause an unsafe program to be accepted. We propose a generic extended PCC framework (EPCC) in which, instead of the proof, a proof generator for the program in question is transmitted. This framework enables the execution of the proof generator and the recovery of the proof on the consumer side in a secure manner.","PeriodicalId":422934,"journal":{"name":"2008 Sixth Annual Conference on Privacy, Security and Trust","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134292396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes 无线传感器网络中一种有效的基于声誉的路由机制:测试移动性和敌对节点的影响
Pub Date : 2008-10-01 DOI: 10.1109/PST.2008.31
N. Lewis, N. Foukia
In previous works, we proposed a routing approach where nodes in a wireless sensor network (WSN) rely on trusted neighbors and neighborspsila reputation to dynamically select the best route to the destination. In this paper, we extend these previous works by adding mobile nodes to the WSN and investigating how the movements of nodes in a mobile WSN affect the success rate of routing data from a source to a destination. We also implement hostile nodes to test how our route selection and reputation mechanisms cope in their presence.
在以前的工作中,我们提出了一种路由方法,其中无线传感器网络(WSN)中的节点依赖可信邻居和邻居的信誉来动态选择到达目的地的最佳路由。在本文中,我们通过在WSN中添加移动节点来扩展这些先前的工作,并研究移动WSN中节点的运动如何影响数据从源路由到目的地的成功率。我们还实现了敌对节点,以测试我们的路由选择和声誉机制如何应对它们的存在。
{"title":"An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes","authors":"N. Lewis, N. Foukia","doi":"10.1109/PST.2008.31","DOIUrl":"https://doi.org/10.1109/PST.2008.31","url":null,"abstract":"In previous works, we proposed a routing approach where nodes in a wireless sensor network (WSN) rely on trusted neighbors and neighborspsila reputation to dynamically select the best route to the destination. In this paper, we extend these previous works by adding mobile nodes to the WSN and investigating how the movements of nodes in a mobile WSN affect the success rate of routing data from a source to a destination. We also implement hostile nodes to test how our route selection and reputation mechanisms cope in their presence.","PeriodicalId":422934,"journal":{"name":"2008 Sixth Annual Conference on Privacy, Security and Trust","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132313653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2008 Sixth Annual Conference on Privacy, Security and Trust
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1