首页 > 最新文献

International Journal of Information Security and Privacy最新文献

英文 中文
Interview with Allen Hsieh, Business Consultant, China 采访Allen Hsieh,中国商业顾问
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-07-03 DOI: 10.1080/15536548.2015.1073536
Choton Basu
{"title":"Interview with Allen Hsieh, Business Consultant, China","authors":"Choton Basu","doi":"10.1080/15536548.2015.1073536","DOIUrl":"https://doi.org/10.1080/15536548.2015.1073536","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"37 1","pages":"182 - 183"},"PeriodicalIF":0.8,"publicationDate":"2015-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81495313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Security: SETA Program Status at Jordanian Universities 信息安全:约旦大学SETA项目现状
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-07-03 DOI: 10.1080/15536548.2015.1073535
Mohammad Eyadat
An information security education awareness training (SETA) program is considered one of the key factors for making the information technology environment more secure and efficient. This research aimed at investigating and determining the status of the SETA program in Jordanian universities. The findings indicated an alarmingly high rate of unawareness of security, with no education and training programs available in the surveyed Jordanian universities. The lack of adequate knowledge and security implementation among the majority of the communities of the surveyed universities showed the need of a well-designed SETA program in Jordanian universities.
信息安全教育意识培训(SETA)计划被认为是使信息技术环境更加安全和高效的关键因素之一。这项研究旨在调查和确定约旦大学SETA项目的现状。调查结果表明,在接受调查的约旦大学中,缺乏安全意识的比例高得惊人,没有提供教育和培训课程。在接受调查的大学中,大多数社区缺乏足够的知识和安全实施,这表明约旦大学需要一个设计良好的SETA方案。
{"title":"Information Security: SETA Program Status at Jordanian Universities","authors":"Mohammad Eyadat","doi":"10.1080/15536548.2015.1073535","DOIUrl":"https://doi.org/10.1080/15536548.2015.1073535","url":null,"abstract":"An information security education awareness training (SETA) program is considered one of the key factors for making the information technology environment more secure and efficient. This research aimed at investigating and determining the status of the SETA program in Jordanian universities. The findings indicated an alarmingly high rate of unawareness of security, with no education and training programs available in the surveyed Jordanian universities. The lack of adequate knowledge and security implementation among the majority of the communities of the surveyed universities showed the need of a well-designed SETA program in Jordanian universities.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"10 1","pages":"174 - 181"},"PeriodicalIF":0.8,"publicationDate":"2015-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84779497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Editorial Preface 编辑前言
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-07-03 DOI: 10.1080/15536548.2015.1073505
K. Bagchi
The third 2015 issue of JIPS contains three exciting research articles in addition to an interview with a leading business consultant and a review of a new “classic” book. Mobile malware detection is not an easy task. The first paper titled, “M0Droid, An Android Behavioral-Based Malware Detection Model” by Mohsen Damshenas, Ali Dehghantanha, KimKwang Raymond Choo and Ramlan Mahmud, deals with M0Droid, a behavioral-based Android malware detection technique. The authors propose a method to generate standardized mobile malware signatures and a method for comparing generated signatures. Running M0Droid against Genome dataset yields impressive detection rates. The second paper titled, “Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults” by Victoria Kisekka, Rajarshi Chakraborty, Sharmistha BagchiSen, and H. Raghav Rao looks into the ability of older adults to anticipate online threats. Several factors that influence older adults’ ability to distinguish between safe and unsafe websites were investigated with partial least square (PLS) regression analysis using a set of older adults age 55 years and older. The authors find that factors such as risk aversion, security education, and perceived ability in finding information online were positively associated with web-browsing safety. The third paper titled, “Information Security: SETA Program Status at Jordanian Universities” by Mohammad S. Eyadat delves into the important issue of the information security education awareness training (SETA) program at universities in Jordan. The author found a high rate of unawareness of security with no education and training programs available in the surveyed universities. In the Expert Opinion section, Choton Basu interviews Allen Hsieh, a consultant from China who recently consulted with Accenture in China. Hsieh observes that a big percentage of the phones in China are either jail-broken or otherwise problematic, and thus they are easier targets for exploits. In the Book Review section, Adolfo Coronado reviews “Introduction to Computer Security” authored by M. Goodrich & R. Tamassia and published by Addison-Wesley. Adolfo observes that the selection of topics in this book is relevant to any introductory book in computer security,
2015年第三期《JIPS》包含三篇令人兴奋的研究文章,以及对一位领先商业顾问的采访和对一本新的“经典”书籍的评论。手机恶意软件检测不是一件容易的事。Mohsen Damshenas、Ali Dehghantanha、KimKwang Raymond Choo和Ramlan Mahmud撰写的第一篇论文《M0Droid,基于Android行为的恶意软件检测模型》讨论了基于行为的Android恶意软件检测技术M0Droid。提出了一种生成标准化移动恶意软件签名的方法和一种比较生成签名的方法。在基因组数据集上运行M0Droid产生了令人印象深刻的检测率。第二篇论文题为“调查影响老年人网络浏览安全效果的因素”,作者是Victoria Kisekka、Rajarshi Chakraborty、Sharmistha BagchiSen和H. Raghav Rao,研究了老年人预测网络威胁的能力。影响老年人区分安全与不安全网站能力的几个因素采用偏最小二乘(PLS)回归分析对一组年龄在55岁及以上的老年人进行了调查。作者发现,风险规避、安全教育和在线查找信息的感知能力等因素与网络浏览安全呈正相关。第三篇论文题为“信息安全:约旦大学的SETA计划现状”,作者Mohammad S. Eyadat深入研究了约旦大学信息安全教育意识培训(SETA)计划的重要问题。作者发现,在被调查的大学中,由于没有提供教育和培训计划,安全意识不强的比例很高。在专家意见部分,Choton Basu采访了来自中国的顾问Allen Hsieh,他最近在埃森哲中国咨询。Hsieh观察到,中国有很大比例的手机要么是越狱的,要么是有其他问题的,因此它们更容易成为攻击目标。在书评部分,Adolfo Coronado评论了由M. Goodrich和R. Tamassia撰写并由Addison-Wesley出版的《计算机安全导论》。Adolfo注意到,本书的主题选择与任何计算机安全入门书籍都是相关的,
{"title":"Editorial Preface","authors":"K. Bagchi","doi":"10.1080/15536548.2015.1073505","DOIUrl":"https://doi.org/10.1080/15536548.2015.1073505","url":null,"abstract":"The third 2015 issue of JIPS contains three exciting research articles in addition to an interview with a leading business consultant and a review of a new “classic” book. Mobile malware detection is not an easy task. The first paper titled, “M0Droid, An Android Behavioral-Based Malware Detection Model” by Mohsen Damshenas, Ali Dehghantanha, KimKwang Raymond Choo and Ramlan Mahmud, deals with M0Droid, a behavioral-based Android malware detection technique. The authors propose a method to generate standardized mobile malware signatures and a method for comparing generated signatures. Running M0Droid against Genome dataset yields impressive detection rates. The second paper titled, “Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults” by Victoria Kisekka, Rajarshi Chakraborty, Sharmistha BagchiSen, and H. Raghav Rao looks into the ability of older adults to anticipate online threats. Several factors that influence older adults’ ability to distinguish between safe and unsafe websites were investigated with partial least square (PLS) regression analysis using a set of older adults age 55 years and older. The authors find that factors such as risk aversion, security education, and perceived ability in finding information online were positively associated with web-browsing safety. The third paper titled, “Information Security: SETA Program Status at Jordanian Universities” by Mohammad S. Eyadat delves into the important issue of the information security education awareness training (SETA) program at universities in Jordan. The author found a high rate of unawareness of security with no education and training programs available in the surveyed universities. In the Expert Opinion section, Choton Basu interviews Allen Hsieh, a consultant from China who recently consulted with Accenture in China. Hsieh observes that a big percentage of the phones in China are either jail-broken or otherwise problematic, and thus they are easier targets for exploits. In the Book Review section, Adolfo Coronado reviews “Introduction to Computer Security” authored by M. Goodrich & R. Tamassia and published by Addison-Wesley. Adolfo observes that the selection of topics in this book is relevant to any introductory book in computer security,","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"25 1","pages":"139 - 140"},"PeriodicalIF":0.8,"publicationDate":"2015-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77437914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps 使用四叉树熵图的智能手机用户位置隐私保护
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-04-03 DOI: 10.1080/15536548.2015.1045372
Xiaoen Ju, K. Shin
The ever-increasing popularity of location-based services poses a serious threat to users’ location privacy. Most protection systems, however, rely on an anonymization server, which itself becomes one source of untrustworthiness. This article presents EMP2—a new location privacy protection scheme based on a quadtree entropy map, enabling the protection of users’ location privacy only with their smartphones. EMP2 accurately estimates the uncertainty of users' intended destinations and dynamically adjusts the protection level to defend against sophisticated inference attacks based on query correlation. Our evaluation demonstrates that EMP2 can effectively protect users’ location privacy with reasonable computation time and resource consumption.
位置服务的日益普及对用户的位置隐私构成了严重的威胁。然而,大多数保护系统依赖于匿名服务器,这本身就成为了不可信的来源之一。本文提出了一种新的基于四叉树熵图的位置隐私保护方案emp2,实现了仅通过智能手机对用户的位置隐私进行保护。EMP2能够准确估计用户预期目的地的不确定性,并根据查询相关性动态调整防护级别,防御复杂的推理攻击。我们的评估表明,EMP2在合理的计算时间和资源消耗下,可以有效地保护用户的位置隐私。
{"title":"Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps","authors":"Xiaoen Ju, K. Shin","doi":"10.1080/15536548.2015.1045372","DOIUrl":"https://doi.org/10.1080/15536548.2015.1045372","url":null,"abstract":"The ever-increasing popularity of location-based services poses a serious threat to users’ location privacy. Most protection systems, however, rely on an anonymization server, which itself becomes one source of untrustworthiness. This article presents EMP2—a new location privacy protection scheme based on a quadtree entropy map, enabling the protection of users’ location privacy only with their smartphones. EMP2 accurately estimates the uncertainty of users' intended destinations and dynamically adjusts the protection level to defend against sophisticated inference attacks based on query correlation. Our evaluation demonstrates that EMP2 can effectively protect users’ location privacy with reasonable computation time and resource consumption.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"60 1","pages":"62 - 79"},"PeriodicalIF":0.8,"publicationDate":"2015-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84176221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Human Key: Identification and Authentication in Wearable Devices Using Gait 人的钥匙:基于步态的可穿戴设备识别与认证
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-04-03 DOI: 10.1080/15536548.2015.1046286
Pallavi Meharia, D. Agrawal
With the advent of wearable devices and the commonality of on-body monitoring devices, a future is anticipated in which the body-area networks will become commonplace in daily life. It is envisioned that the whole process will be automated wherein a user wearing such a device automatically enables the associated security mechanism and establishes communication between that user and her surroundings. This article addresses a technique to identify the wearer of the device and proposes an encryption scheme for secure communication, allowing for identification and authentication before establishing communication. It suggests using gait as a metric for identity association using wearable sensors.
随着可穿戴设备的出现和身体监测设备的普及,身体区域网络将在日常生活中变得司空见惯。设想整个过程将是自动化的,其中佩戴这种设备的用户自动启用相关的安全机制并在该用户与其周围环境之间建立通信。本文介绍了一种识别设备佩戴者的技术,并提出了一种用于安全通信的加密方案,允许在建立通信之前进行识别和身份验证。它建议使用步态作为可穿戴传感器的身份关联度量。
{"title":"The Human Key: Identification and Authentication in Wearable Devices Using Gait","authors":"Pallavi Meharia, D. Agrawal","doi":"10.1080/15536548.2015.1046286","DOIUrl":"https://doi.org/10.1080/15536548.2015.1046286","url":null,"abstract":"With the advent of wearable devices and the commonality of on-body monitoring devices, a future is anticipated in which the body-area networks will become commonplace in daily life. It is envisioned that the whole process will be automated wherein a user wearing such a device automatically enables the associated security mechanism and establishes communication between that user and her surroundings. This article addresses a technique to identify the wearer of the device and proposes an encryption scheme for secure communication, allowing for identification and authentication before establishing communication. It suggests using gait as a metric for identity association using wearable sensors.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"114 1","pages":"80 - 96"},"PeriodicalIF":0.8,"publicationDate":"2015-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79209308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and Its Defense 跨站脚本(XSS)滥用与防御:几种测试平台环境的利用及其防御
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-04-03 DOI: 10.1080/15536548.2015.1044865
B. B. Gupta, Shashank Gupta, S. Gangwar, Manoj Kumar, P. K. Meena
Today cyber physical systems (CPS) facilitate physical world devices to integrate with several Internet data sources and services. In the contemporary era of Web 2.0 technologies, web applications are being developed on several advanced technologies (e.g., AJAX, JavaScript, Flash, ASP.net). However, due to the frequent usage in daily life, web applications are constantly under attack. Cross-site scripting (XSS) attacks are presently the most exploited security problems in the modern web applications. XSS attacks are generally caused by the improper sanitization of user-supplied input on the applications. These attacked use vulnerabilities in the source code, resulting in serious consequences such as stealing of session-identifications embedded in cookies, passwords, credit card numbers, and several other related personal credentials. This article describes a three-fold approach: 1) testing the vulnerabilities of XSS attack on the local host server Apache Tomcat by utilizing the malicious scripts from XSS cheat sheet website; 2) exploiting the same vulnerabilities on Web Goat; and 3) exploiting encoded versions of the injected scripts for testing the level of XSS attack prevention capability. Based on the observed results, further work is also discussed.
今天,网络物理系统(CPS)促进了物理世界设备与多个Internet数据源和服务的集成。在Web 2.0技术的当代时代,Web应用程序正在使用几种先进技术(例如,AJAX, JavaScript, Flash, ASP.net)进行开发。然而,由于在日常生活中的频繁使用,web应用程序不断受到攻击。跨站点脚本(XSS)攻击是目前现代web应用程序中最容易被利用的安全问题。XSS攻击通常是由于对用户提供的应用程序输入的处理不当造成的。这些攻击者利用源代码中的漏洞,导致了严重的后果,比如窃取嵌入在cookie中的会话标识、密码、信用卡号和其他一些相关的个人凭证。本文介绍了一种三方面的方法:1)利用XSS小抄网站的恶意脚本,在本地主机服务器Apache Tomcat上测试跨站攻击的漏洞;2)利用Web Goat上的相同漏洞;3)利用注入脚本的编码版本来测试XSS攻击防御能力的水平。在此基础上,对进一步的工作进行了讨论。
{"title":"Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and Its Defense","authors":"B. B. Gupta, Shashank Gupta, S. Gangwar, Manoj Kumar, P. K. Meena","doi":"10.1080/15536548.2015.1044865","DOIUrl":"https://doi.org/10.1080/15536548.2015.1044865","url":null,"abstract":"Today cyber physical systems (CPS) facilitate physical world devices to integrate with several Internet data sources and services. In the contemporary era of Web 2.0 technologies, web applications are being developed on several advanced technologies (e.g., AJAX, JavaScript, Flash, ASP.net). However, due to the frequent usage in daily life, web applications are constantly under attack. Cross-site scripting (XSS) attacks are presently the most exploited security problems in the modern web applications. XSS attacks are generally caused by the improper sanitization of user-supplied input on the applications. These attacked use vulnerabilities in the source code, resulting in serious consequences such as stealing of session-identifications embedded in cookies, passwords, credit card numbers, and several other related personal credentials. This article describes a three-fold approach: 1) testing the vulnerabilities of XSS attack on the local host server Apache Tomcat by utilizing the malicious scripts from XSS cheat sheet website; 2) exploiting the same vulnerabilities on Web Goat; and 3) exploiting encoded versions of the injected scripts for testing the level of XSS attack prevention capability. Based on the observed results, further work is also discussed.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"1 1","pages":"118 - 136"},"PeriodicalIF":0.8,"publicationDate":"2015-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75866837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Special Issue on Secured Communication in Wireless and Wired Networks 无线和有线网络中的安全通信特刊
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-04-03 DOI: 10.1080/15536548.2015.1044863
D. Agrawal
The emergence of the Internet of Things (IoT) has enlarged the network scope even in daily life now as many household items are being served or connected. Due to such infiltration of networking, th...
随着物联网(IoT)的出现,在日常生活中服务或连接的物品越来越多,网络的范围也随之扩大。由于网络的渗透,……
{"title":"Special Issue on Secured Communication in Wireless and Wired Networks","authors":"D. Agrawal","doi":"10.1080/15536548.2015.1044863","DOIUrl":"https://doi.org/10.1080/15536548.2015.1044863","url":null,"abstract":"The emergence of the Internet of Things (IoT) has enlarged the network scope even in daily life now as many household items are being served or connected. Due to such infiltration of networking, th...","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"6 1","pages":"59 - 61"},"PeriodicalIF":0.8,"publicationDate":"2015-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74281971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Theoretic and Statistical Drive Sanitization Models 信息论和统计驱动消毒模型
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-04-03 DOI: 10.1080/15536548.2015.1045380
Jeffrey Medsger, A. Srinivasan, Jie Wu
Current drive sanitization techniques employ little or no intelligence to determine if the area being sanitized, with data overwriting, actually contains sensitive resident data. All data blocks in the target area are sanitized, utilizing brute-force sanitization techniques of one to several wipe passes. In reality, a significant number of drives needing sanitization may contain areas with no sensitive data—or even any data. Consequently, sanitizing such areas is counterintuitive and counterproductive. This article proposes two information-theoretic techniques—ERASE and ERASERS, which utilize an entropy measurement of data blocks for quick and effective drive sanitization. The first technique, ERASE, computes the entropy of each data block in the target area. Subsequently, all data blocks, which have an entropy within the user-specified sensitivity range, are wiped. The second technique, ERASERS, which is an extension of ERASE, employs random sampling to enhance the speed performance of ERASE. To achieve this goal, ERASERS divides the target area into subpopulations, performs random sampling of blocks from each subpopulation, and computes the entropy of each sampled block. If the entropy of any sampled block, within a subpopulation, is within the user-specified sensitive entropy range, the entire subpopulation is wiped.
当前的驱动器清理技术很少或根本没有使用智能来确定正在清理的区域(数据覆盖)是否实际上包含敏感的驻留数据。利用一到几次擦除的暴力清理技术,对目标区域中的所有数据块进行清理。实际上,需要清理的大量驱动器可能包含没有敏感数据甚至没有数据的区域。因此,对这些区域进行消毒是违反直觉和适得其反的。本文提出了两种信息理论技术- erase和ERASERS,它们利用数据块的熵测量来快速有效地对驱动器进行消毒。第一种技术,ERASE,计算目标区域中每个数据块的熵。随后,在用户指定的灵敏度范围内具有熵的所有数据块被擦除。第二种技术是ERASERS,它是ERASE的扩展,采用随机采样来提高ERASE的速度性能。为了实现这一目标,ERASERS将目标区域划分为子种群,从每个子种群中随机抽取块,并计算每个采样块的熵。如果子种群中任何采样块的熵在用户指定的敏感熵范围内,则清除整个子种群。
{"title":"Information Theoretic and Statistical Drive Sanitization Models","authors":"Jeffrey Medsger, A. Srinivasan, Jie Wu","doi":"10.1080/15536548.2015.1045380","DOIUrl":"https://doi.org/10.1080/15536548.2015.1045380","url":null,"abstract":"Current drive sanitization techniques employ little or no intelligence to determine if the area being sanitized, with data overwriting, actually contains sensitive resident data. All data blocks in the target area are sanitized, utilizing brute-force sanitization techniques of one to several wipe passes. In reality, a significant number of drives needing sanitization may contain areas with no sensitive data—or even any data. Consequently, sanitizing such areas is counterintuitive and counterproductive. This article proposes two information-theoretic techniques—ERASE and ERASERS, which utilize an entropy measurement of data blocks for quick and effective drive sanitization. The first technique, ERASE, computes the entropy of each data block in the target area. Subsequently, all data blocks, which have an entropy within the user-specified sensitivity range, are wiped. The second technique, ERASERS, which is an extension of ERASE, employs random sampling to enhance the speed performance of ERASE. To achieve this goal, ERASERS divides the target area into subpopulations, performs random sampling of blocks from each subpopulation, and computes the entropy of each sampled block. If the entropy of any sampled block, within a subpopulation, is within the user-specified sensitive entropy range, the entire subpopulation is wiped.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"32 1","pages":"117 - 97"},"PeriodicalIF":0.8,"publicationDate":"2015-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82108224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, Github, and More, by Matthew A. Russell 挖掘社交网络:数据挖掘Facebook, Twitter, LinkedIn, Google+, Github等,作者:Matthew A. Russell
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-04-03 DOI: 10.1080/15536548.2015.1046287
Dehghantanha Ali
{"title":"Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, Github, and More, by Matthew A. Russell","authors":"Dehghantanha Ali","doi":"10.1080/15536548.2015.1046287","DOIUrl":"https://doi.org/10.1080/15536548.2015.1046287","url":null,"abstract":"","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"278 1","pages":"137 - 138"},"PeriodicalIF":0.8,"publicationDate":"2015-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80092237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Healthshark: Using Twitter for Situational Awareness in Public Health Healthshark:在公共卫生中使用Twitter进行态势感知
IF 0.8 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2015-01-02 DOI: 10.1080/15536548.2015.1010984
Alana Platt, Levi Citrin, C. Hood
Monitoring outbreaks of contagious diseases is an important task for public health officials and they must receive outbreak information quickly to respond to this threat. Social network sites such as Twitter can be leveraged to track self-reporting of diseases in real time. This work presents a prototype system, HealthShark, which monitors Twitter for mentions of contagious diseases. The authors outline the features of HealthShark, perform a user study to assess its usefulness as a tool for monitoring disease outbreaks, and discuss potential privacy concerns’ impact on the design of such a system.
监测传染病的爆发是公共卫生官员的一项重要任务,他们必须迅速收到疫情信息,以应对这一威胁。可以利用Twitter等社交网站实时跟踪疾病的自我报告。这项工作提出了一个原型系统,HealthShark,它监测Twitter上提到的传染病。这组作者概述了HealthShark的特点,进行了一项用户研究,以评估它作为监测疾病爆发工具的实用性,并讨论了潜在的隐私问题对这种系统设计的影响。
{"title":"Healthshark: Using Twitter for Situational Awareness in Public Health","authors":"Alana Platt, Levi Citrin, C. Hood","doi":"10.1080/15536548.2015.1010984","DOIUrl":"https://doi.org/10.1080/15536548.2015.1010984","url":null,"abstract":"Monitoring outbreaks of contagious diseases is an important task for public health officials and they must receive outbreak information quickly to respond to this threat. Social network sites such as Twitter can be leveraged to track self-reporting of diseases in real time. This work presents a prototype system, HealthShark, which monitors Twitter for mentions of contagious diseases. The authors outline the features of HealthShark, perform a user study to assess its usefulness as a tool for monitoring disease outbreaks, and discuss potential privacy concerns’ impact on the design of such a system.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"132 1","pages":"19 - 37"},"PeriodicalIF":0.8,"publicationDate":"2015-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79650520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Information Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1