首页 > 最新文献

ACM Transactions on Information and System Security最新文献

英文 中文
On the consistency of distributed proofs with hidden subtrees 带隐子树的分布式证明的一致性
Q Engineering Pub Date : 2010-07-01 DOI: 10.1145/1805974.1805981
Adam J. Lee, Kazuhiro Minami, M. Winslett
Previous work has shown that distributed authorization systems that fail to sample a consistent snapshot of the underlying system during policy evaluation are vulnerable to a number of attacks. Unfortuantely, the consistency enforcement solutions presented in previous work were designed for systems in which only CA-certified evidence is used during the decision-making process, all of which is available to the decision-making node at runtime. In this article, we generalize previous results and present light-weight mechanisms through which consistency constraints can be enforced in proof systems in which the full details of a proof may be unavailable to the querier due to information release policies, and the existence of certificate authorities for certifying evidence is unlikely; these types of distributed proof systems are likely candidates for use in pervasive computing and sensor network environments. We present modifications to one such distributed proof system that enable three types of consistency constraints to be enforced while still respecting the same confidentiality and integrity policies as the original proof system. We then discuss how these techniques can be adapted and applied to other, less restrictive, distributed proof systems. Further, we detail a performance analysis that illustrates the modest overheads of our consistency enforcement schemes.
以前的工作表明,在策略评估期间未能采样底层系统的一致快照的分布式授权系统容易受到许多攻击。不幸的是,在之前的工作中提出的一致性执行解决方案是为在决策过程中只使用ca认证证据的系统设计的,所有这些证据都可以在运行时提供给决策节点。在本文中,我们概括了以前的结果,并提出了轻量级机制,通过该机制可以在证明系统中实施一致性约束,其中由于信息发布策略,查询者可能无法获得证明的全部细节,并且不太可能存在用于证明证据的证书颁发机构;这些类型的分布式证明系统很可能用于普适计算和传感器网络环境。我们对一个这样的分布式证明系统进行了修改,使三种类型的一致性约束得以实施,同时仍然尊重与原始证明系统相同的机密性和完整性策略。然后,我们讨论如何将这些技术应用于其他限制较少的分布式证明系统。此外,我们还详细介绍了性能分析,说明了一致性执行方案的适度开销。
{"title":"On the consistency of distributed proofs with hidden subtrees","authors":"Adam J. Lee, Kazuhiro Minami, M. Winslett","doi":"10.1145/1805974.1805981","DOIUrl":"https://doi.org/10.1145/1805974.1805981","url":null,"abstract":"Previous work has shown that distributed authorization systems that fail to sample a consistent snapshot of the underlying system during policy evaluation are vulnerable to a number of attacks. Unfortuantely, the consistency enforcement solutions presented in previous work were designed for systems in which only CA-certified evidence is used during the decision-making process, all of which is available to the decision-making node at runtime. In this article, we generalize previous results and present light-weight mechanisms through which consistency constraints can be enforced in proof systems in which the full details of a proof may be unavailable to the querier due to information release policies, and the existence of certificate authorities for certifying evidence is unlikely; these types of distributed proof systems are likely candidates for use in pervasive computing and sensor network environments. We present modifications to one such distributed proof system that enable three types of consistency constraints to be enforced while still respecting the same confidentiality and integrity policies as the original proof system. We then discuss how these techniques can be adapted and applied to other, less restrictive, distributed proof systems. Further, we detail a performance analysis that illustrates the modest overheads of our consistency enforcement schemes.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80169079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Editorial ESORICS 2007
Q Engineering Pub Date : 2010-07-01 DOI: 10.1145/1805974.1805975
J. Biskup, Javier López
This issue of TISSEC consists of three articles that elaborate research results originally contributed to the 12th European Symposium on Research in Computer Security (ESORICS’07) held in Dresden, Germany, September 24–26, 2007. The conference series of ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. Since 2002, it has taken place annually. The contributions to ESORICS present theory, mechanisms, applications, or practical experience on all traditional or emerging topics relevant for security in computing systems. The three articles of this special issue have been selected from 39 papers presented during the symposium out of 164 submissions. The articles examplarily demonstrate the scope of ESORICS, dealing with an advanced formal model for state-dependent access control, sophisticated language-based security for information-flow control, and security and privacy in databases employing cryptography. A common theme of the articles is to enable programmers and system administrators to reliably control the flow of information in complex computing environments. Becker and Nanz consider state-modifying authorization policies where actually granted access requests can have effects on the current state of the access control system. They show how to efficiently organize state updates in a well-structured architecture, and they provide both thorough semantics based on Transaction Logic and a sound and complete proof system for analyzing the actual achievements of state-modifying authorization policies. Barthe, Rezk, Russo, and Sabelfeld enhance language-based informationflow security by inspecting the subtle impact of the concept of multithreading for low-level programs as used, for example, in mobile code scenarios. In particular, they deal with the control of the timing behavior of an execution as exhibited by a security-aware scheduler. They achieve this goal by presenting a security-preserving compilation to be employed as part of the overall approach to proof carrying code. Ciriani, De Capitani di Vimercati, Foresti, Jajodia, Paraboschi, and Samarati contribute to security on the application level. More specifically, for enforcing confidentiality constraints in the context of data outsourcing, they study how to break sensitive associations among composed data by fragmentation and to encrypt the resulting fragments such that processing of the fragmented and encrypted data still remains sufficiently efficient. We would like to thank all the authors for following our invitation to contribute to this special issue and all the reviewers for their insightful and helpful comments. We are also grateful to Michael Reiter, former Editor-in-Chief,
这期TISSEC由三篇文章组成,这些文章详细阐述了最初为2007年9月24日至26日在德国德累斯顿举行的第12届欧洲计算机安全研究研讨会(ESORICS ' 07)贡献的研究成果。ESORICS系列会议已成为欧洲计算机安全领域的研究盛会。该研讨会始于1990年,在不同的欧洲国家隔年举办一次。自2002年以来,每年举行一次。对ESORICS的贡献展示了与计算系统安全相关的所有传统或新兴主题的理论、机制、应用或实践经验。本期特刊的三篇文章是从本次研讨会上提交的164篇论文中的39篇论文中挑选出来的。这两篇文章举例说明了ESORICS的范围,讨论了用于依赖状态的访问控制的高级形式化模型、用于信息流控制的复杂的基于语言的安全性,以及使用加密技术的数据库中的安全性和隐私性。这些文章的一个共同主题是使程序员和系统管理员能够可靠地控制复杂计算环境中的信息流。Becker和Nanz考虑了状态修改授权策略,其中实际授予的访问请求可能对访问控制系统的当前状态产生影响。它们展示了如何在结构良好的体系结构中有效地组织状态更新,并提供了基于事务逻辑的完整语义和用于分析状态修改授权策略实际成果的健全完整的证明系统。Barthe、Rezk、Russo和Sabelfeld通过研究多线程概念对低级程序(例如在移动代码场景中)的微妙影响,增强了基于语言的信息流安全性。特别是,它们处理由安全感知调度器显示的执行计时行为的控制。他们通过提供一种安全保护编译来实现这一目标,该编译将被用作携带证明代码的总体方法的一部分。Ciriani、De Capitani di Vimercati、Foresti、Jajodia、Paraboschi和Samarati对应用程序级别的安全性做出了贡献。更具体地说,为了在数据外包的背景下加强机密性约束,他们研究了如何通过碎片来打破组合数据之间的敏感关联,并对产生的碎片进行加密,从而使碎片化和加密数据的处理仍然足够有效。我们要感谢所有的作者接受我们的邀请为本期特刊撰稿,感谢所有的审稿人提出的有见地和有益的意见。我们还要感谢前主编Michael Reiter,
{"title":"Editorial ESORICS 2007","authors":"J. Biskup, Javier López","doi":"10.1145/1805974.1805975","DOIUrl":"https://doi.org/10.1145/1805974.1805975","url":null,"abstract":"This issue of TISSEC consists of three articles that elaborate research results originally contributed to the 12th European Symposium on Research in Computer Security (ESORICS’07) held in Dresden, Germany, September 24–26, 2007. The conference series of ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. Since 2002, it has taken place annually. The contributions to ESORICS present theory, mechanisms, applications, or practical experience on all traditional or emerging topics relevant for security in computing systems. The three articles of this special issue have been selected from 39 papers presented during the symposium out of 164 submissions. The articles examplarily demonstrate the scope of ESORICS, dealing with an advanced formal model for state-dependent access control, sophisticated language-based security for information-flow control, and security and privacy in databases employing cryptography. A common theme of the articles is to enable programmers and system administrators to reliably control the flow of information in complex computing environments. Becker and Nanz consider state-modifying authorization policies where actually granted access requests can have effects on the current state of the access control system. They show how to efficiently organize state updates in a well-structured architecture, and they provide both thorough semantics based on Transaction Logic and a sound and complete proof system for analyzing the actual achievements of state-modifying authorization policies. Barthe, Rezk, Russo, and Sabelfeld enhance language-based informationflow security by inspecting the subtle impact of the concept of multithreading for low-level programs as used, for example, in mobile code scenarios. In particular, they deal with the control of the timing behavior of an execution as exhibited by a security-aware scheduler. They achieve this goal by presenting a security-preserving compilation to be employed as part of the overall approach to proof carrying code. Ciriani, De Capitani di Vimercati, Foresti, Jajodia, Paraboschi, and Samarati contribute to security on the application level. More specifically, for enforcing confidentiality constraints in the context of data outsourcing, they study how to break sensitive associations among composed data by fragmentation and to encrypt the resulting fragments such that processing of the fragmented and encrypted data still remains sufficiently efficient. We would like to thank all the authors for following our invitation to contribute to this special issue and all the reviewers for their insightful and helpful comments. We are also grateful to Michael Reiter, former Editor-in-Chief,","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84478687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework to enforce access control over data streams 对数据流实施访问控制的框架
Q Engineering Pub Date : 2010-07-01 DOI: 10.1145/1805974.1805984
B. Carminati, E. Ferrari, Jianneng Cao, K. Tan
Although access control is currently a key component of any computational system, it is only recently that mechanisms to guard against unauthorized access to streaming data have started to be investigated. To cope with this lack, in this article, we propose a general framework to protect streaming data, which is, as much as possible, independent from the target stream engine. Differently from RDBMSs, up to now a standard query language for data streams has not yet emerged and this makes the development of a general solution to access control enforcement more difficult. The framework we propose in this article is based on an expressive role-based access control model proposed by us. It exploits a query rewriting mechanism, which rewrites user queries in such a way that they do not return tuples/attributes that should not be accessed according to the specified access control policies. Furthermore, the framework contains a deployment module able to translate the rewritten query in such a way that it can be executed by different stream engines, therefore, overcoming the lack of standardization. In the article, besides presenting all the components of our framework, we prove the correctness and completeness of the query rewriting algorithm, and we present some experiments that show the feasibility of the developed techniques.
尽管访问控制目前是任何计算系统的关键组成部分,但直到最近才开始研究防止未经授权访问流数据的机制。为了解决这一不足,在本文中,我们提出了一个通用框架来保护流数据,该框架尽可能独立于目标流引擎。与rdbms不同的是,到目前为止,还没有出现用于数据流的标准查询语言,这使得开发用于访问控制实施的通用解决方案更加困难。本文提出的框架是基于我们提出的一个表达性的基于角色的访问控制模型。它利用了查询重写机制,该机制以不返回根据指定的访问控制策略不应访问的元组/属性的方式重写用户查询。此外,该框架还包含一个部署模块,该模块能够转换重写的查询,使其可以由不同的流引擎执行,从而克服了缺乏标准化的问题。在本文中,除了展示了我们的框架的所有组件外,我们还证明了查询重写算法的正确性和完整性,并给出了一些实验来证明所开发技术的可行性。
{"title":"A framework to enforce access control over data streams","authors":"B. Carminati, E. Ferrari, Jianneng Cao, K. Tan","doi":"10.1145/1805974.1805984","DOIUrl":"https://doi.org/10.1145/1805974.1805984","url":null,"abstract":"Although access control is currently a key component of any computational system, it is only recently that mechanisms to guard against unauthorized access to streaming data have started to be investigated. To cope with this lack, in this article, we propose a general framework to protect streaming data, which is, as much as possible, independent from the target stream engine. Differently from RDBMSs, up to now a standard query language for data streams has not yet emerged and this makes the development of a general solution to access control enforcement more difficult. The framework we propose in this article is based on an expressive role-based access control model proposed by us. It exploits a query rewriting mechanism, which rewrites user queries in such a way that they do not return tuples/attributes that should not be accessed according to the specified access control policies. Furthermore, the framework contains a deployment module able to translate the rewritten query in such a way that it can be executed by different stream engines, therefore, overcoming the lack of standardization. In the article, besides presenting all the components of our framework, we prove the correctness and completeness of the query rewriting algorithm, and we present some experiments that show the feasibility of the developed techniques.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88883836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Practical and efficient cryptographic enforcement of interval-based access control policies 基于间隔的访问控制策略的实用和有效的加密实施
Q Engineering Pub Date : 2010-05-26 DOI: 10.1145/1952982.1952996
J. Crampton
The enforcement of access control policies using cryptography has received considerable attention in recent years and the security of such enforcement schemes is increasingly well understood. Recent work in the area has considered the efficient enforcement of temporal and geo-spatial access control policies, and asymptotic results for the time and space complexity of efficient enforcement schemes have been obtained. However, for practical purposes, it is useful to have explicit bounds for the complexity of enforcement schemes. In this article we consider interval-based access control policies, of which temporal and geo-spatial access control policies are special cases. We define enforcement schemes for interval-based access control policies for which it is possible, in almost all cases, to obtain exact values for the schemes' complexity, thereby subsuming a substantial body of work in the literature. Moreover, our enforcement schemes are more practical than existing schemes, in the sense that they operate in the same way as standard cryptographic enforcement schemes, unlike other efficient schemes in the literature. The main difference between our approach and earlier work is that we develop techniques that are specific to the cryptographic enforcement of interval-based access control policies, rather than applying generic techniques that give rise to complex constructions and asymptotic bounds.
近年来,使用密码学实施访问控制策略受到了相当大的关注,并且对这种实施方案的安全性也越来越了解。该领域最近的工作考虑了时间和地理空间访问控制策略的有效执行,并获得了有效执行方案的时间和空间复杂性的渐近结果。然而,出于实际目的,对执行方案的复杂性有明确的限制是有用的。在本文中,我们考虑基于间隔的访问控制策略,其中时间和地理空间访问控制策略是特殊情况。我们定义了基于间隔的访问控制策略的实施方案,在几乎所有情况下,都有可能获得方案复杂性的精确值,从而包含了文献中的大量工作。此外,我们的强制方案比现有方案更实用,因为它们以与标准加密强制方案相同的方式运行,而不像文献中的其他有效方案。我们的方法与早期工作的主要区别在于,我们开发了特定于基于间隔的访问控制策略的加密实施的技术,而不是应用导致复杂结构和渐近边界的通用技术。
{"title":"Practical and efficient cryptographic enforcement of interval-based access control policies","authors":"J. Crampton","doi":"10.1145/1952982.1952996","DOIUrl":"https://doi.org/10.1145/1952982.1952996","url":null,"abstract":"The enforcement of access control policies using cryptography has received considerable attention in recent years and the security of such enforcement schemes is increasingly well understood. Recent work in the area has considered the efficient enforcement of temporal and geo-spatial access control policies, and asymptotic results for the time and space complexity of efficient enforcement schemes have been obtained. However, for practical purposes, it is useful to have explicit bounds for the complexity of enforcement schemes.\u0000 In this article we consider interval-based access control policies, of which temporal and geo-spatial access control policies are special cases. We define enforcement schemes for interval-based access control policies for which it is possible, in almost all cases, to obtain exact values for the schemes' complexity, thereby subsuming a substantial body of work in the literature. Moreover, our enforcement schemes are more practical than existing schemes, in the sense that they operate in the same way as standard cryptographic enforcement schemes, unlike other efficient schemes in the literature. The main difference between our approach and earlier work is that we develop techniques that are specific to the cryptographic enforcement of interval-based access control policies, rather than applying generic techniques that give rise to complex constructions and asymptotic bounds.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79178688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Deterring voluntary trace disclosure in re-encryption mix-networks 阻止重新加密混合网络中的自愿跟踪披露
Q Engineering Pub Date : 2010-02-01 DOI: 10.1145/1698750.1698758
Xiaofeng Wang, P. Golle, M. Jakobsson, Alex Tsow
Mix-networks, a family of anonymous messaging protocols, have been engineered to withstand a wide range of theoretical internal and external adversaries. An undetectable insider threat—voluntary partial trace disclosures by server administrators—remains a troubling source of vulnerability. An administrator's cooperation could be the resulting coercion, bribery, or a simple change of interests. While eliminating this insider threat is impossible, it is feasible to deter such unauthorized disclosures by bundling them with additional penalties. We abstract these costs with collateral keys, which grant access to customizable resources. This article introduces the notion of trace-deterring mix-networks, which encode collateral keys for every server-node into every end-to-end message trace. The network reveals no keying material when the input-to-output transitions of individual servers remain secret. Two permutation strategies for encoding key information into traces, mix-and-flip and all-or-nothing, are presented. We analyze their trade-offs with respect to computational efficiency, anonymity sets, and colluding message senders. Our techniques have sufficiently low overhead for deployment in large-scale elections, thereby providing a sort of publicly verifiable privacy guarantee.
混合网络(Mix-networks)是一系列匿名消息传递协议,其设计可以抵御理论上广泛的内部和外部攻击。无法检测到的内部威胁——服务器管理员自愿披露部分跟踪信息——仍然是一个令人不安的漏洞来源。管理员的合作可能是胁迫、贿赂或简单的利益变化所导致的。虽然消除这种内部威胁是不可能的,但通过附加处罚来阻止这种未经授权的披露是可行的。我们用附属键抽象这些成本,附属键授予对可定制资源的访问权。本文介绍了跟踪阻止混合网络的概念,它将每个服务器节点的附带密钥编码到每个端到端消息跟踪中。当单个服务器的输入到输出转换仍然保密时,网络不会泄露任何密钥材料。提出了将关键信息编码成轨迹的两种排列策略:混合-翻转和全或无。我们分析了它们在计算效率、匿名集和串通消息发送方方面的权衡。我们的技术具有足够低的开销,可以部署在大规模选举中,从而提供了一种可公开验证的隐私保证。
{"title":"Deterring voluntary trace disclosure in re-encryption mix-networks","authors":"Xiaofeng Wang, P. Golle, M. Jakobsson, Alex Tsow","doi":"10.1145/1698750.1698758","DOIUrl":"https://doi.org/10.1145/1698750.1698758","url":null,"abstract":"Mix-networks, a family of anonymous messaging protocols, have been engineered to withstand a wide range of theoretical internal and external adversaries. An undetectable insider threat—voluntary partial trace disclosures by server administrators—remains a troubling source of vulnerability. An administrator's cooperation could be the resulting coercion, bribery, or a simple change of interests. While eliminating this insider threat is impossible, it is feasible to deter such unauthorized disclosures by bundling them with additional penalties. We abstract these costs with collateral keys, which grant access to customizable resources. This article introduces the notion of trace-deterring mix-networks, which encode collateral keys for every server-node into every end-to-end message trace. The network reveals no keying material when the input-to-output transitions of individual servers remain secret. Two permutation strategies for encoding key information into traces, mix-and-flip and all-or-nothing, are presented. We analyze their trade-offs with respect to computational efficiency, anonymity sets, and colluding message senders. Our techniques have sufficiently low overhead for deployment in large-scale elections, thereby providing a sort of publicly verifiable privacy guarantee.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75034094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Split-ballot voting: everlasting privacy with distributed trust 分选投票:具有分布式信任的永久隐私
Q Engineering Pub Date : 2010-02-01 DOI: 10.1145/1315245.1315277
T. Moran, M. Naor
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every voter with the means to verify that all the votes were counted correctly (universal verifiability) while preserving ballot secrecy. The protocol has "everlasting privacy": even a computationally unbounded adversary gains no information about specific votes from observing the protocol's output. Unlike previous protocols with these properties, this protocol distributes trust between two authorities: a single corrupt authority will not cause voter privacy to be breached. Finally, the protocol is receipt-free: a voter cannot prove how she voted even she wants to do so. We formally prove the security of the protocol in the Universal Composability framework, based on number-theoretic assumptions.
本文提出了一种新的具有良好安全特性的投票协议。协议的投票阶段可以在没有计算机的情况下由人来完成;它为每个选民提供了验证所有选票都被正确计算(普遍可验证性)的手段,同时保持了选票的保密性。该协议具有“永久隐私”:即使是计算无界的对手也无法通过观察协议的输出获得有关特定投票的信息。与以前具有这些属性的协议不同,该协议在两个权威机构之间分配信任:单个腐败的权威机构不会导致选民隐私被破坏。最后,该协议是无收据的:选民无法证明她是如何投票的,即使她想这样做。基于数论假设,在通用可组合性框架下正式证明了协议的安全性。
{"title":"Split-ballot voting: everlasting privacy with distributed trust","authors":"T. Moran, M. Naor","doi":"10.1145/1315245.1315277","DOIUrl":"https://doi.org/10.1145/1315245.1315277","url":null,"abstract":"In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every voter with the means to verify that all the votes were counted correctly (universal verifiability) while preserving ballot secrecy. The protocol has \"everlasting privacy\": even a computationally unbounded adversary gains no information about specific votes from observing the protocol's output. Unlike previous protocols with these properties, this protocol distributes trust between two authorities: a single corrupt authority will not cause voter privacy to be breached. Finally, the protocol is receipt-free: a voter cannot prove how she voted even she wants to do so. We formally prove the security of the protocol in the Universal Composability framework, based on number-theoretic assumptions.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79905219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks CANDID:用于自动防止SQL注入攻击的动态候选评估
Q Engineering Pub Date : 2010-02-01 DOI: 10.1145/1698750.1698754
Prithvi Bisht, P. Madhusudan, V. Venkatakrishnan
SQL injection attacks are one of the top-most threats for applications written for the Web. These attacks are launched through specially crafted user inputs, on Web applications that use low-level string operations to construct SQL queries. In this work, we exhibit a novel and powerful scheme for automatically transforming Web applications to render them safe against all SQL injection attacks. A characteristic diagnostic feature of SQL injection attacks is that they change the intended structure of queries issued. Our technique for detecting SQL injection is to dynamically mine the programmer-intended query structure on any input, and detect attacks by comparing it against the structure of the actual query issued. We propose a simple and novel mechanism, called Candid, for mining programmer intended queries by dynamically evaluating runs over benign candidate inputs. This mechanism is theoretically well founded and is based on inferring intended queries by considering the symbolic query computed on a program run. Our approach has been implemented in a tool called Candid that retrofits Web applications written in Java to defend them against SQL injection attacks. We have also implemented Candid by modifying a Java Virtual Machine, which safeguards applications without requiring retrofitting. We report extensive experimental results that show that our approach performs remarkably well in practice.
SQL注入攻击是为Web编写的应用程序面临的最大威胁之一。这些攻击是通过精心设计的用户输入在使用低级字符串操作构造SQL查询的Web应用程序上发起的。在这项工作中,我们展示了一种新颖而强大的方案,用于自动转换Web应用程序,使其免受所有SQL注入攻击。SQL注入攻击的一个特征诊断特性是,它们会改变所发出查询的预期结构。我们检测SQL注入的技术是在任何输入上动态挖掘程序员预期的查询结构,并通过将其与发出的实际查询的结构进行比较来检测攻击。我们提出了一种简单而新颖的机制,称为Candid,用于通过动态评估良性候选输入上的运行来挖掘程序员想要的查询。这种机制在理论上是有充分依据的,它基于通过考虑在程序运行时计算的符号查询来推断预期的查询。我们的方法已经在一个名为Candid的工具中实现,该工具可以改进用Java编写的Web应用程序,以保护它们免受SQL注入攻击。我们还通过修改Java虚拟机实现了Candid,该虚拟机可以保护应用程序而无需进行改造。我们报告了大量的实验结果,表明我们的方法在实践中表现得非常好。
{"title":"CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks","authors":"Prithvi Bisht, P. Madhusudan, V. Venkatakrishnan","doi":"10.1145/1698750.1698754","DOIUrl":"https://doi.org/10.1145/1698750.1698754","url":null,"abstract":"SQL injection attacks are one of the top-most threats for applications written for the Web. These attacks are launched through specially crafted user inputs, on Web applications that use low-level string operations to construct SQL queries. In this work, we exhibit a novel and powerful scheme for automatically transforming Web applications to render them safe against all SQL injection attacks.\u0000 A characteristic diagnostic feature of SQL injection attacks is that they change the intended structure of queries issued. Our technique for detecting SQL injection is to dynamically mine the programmer-intended query structure on any input, and detect attacks by comparing it against the structure of the actual query issued. We propose a simple and novel mechanism, called Candid, for mining programmer intended queries by dynamically evaluating runs over benign candidate inputs. This mechanism is theoretically well founded and is based on inferring intended queries by considering the symbolic query computed on a program run. Our approach has been implemented in a tool called Candid that retrofits Web applications written in Java to defend them against SQL injection attacks. We have also implemented Candid by modifying a Java Virtual Machine, which safeguards applications without requiring retrofitting. We report extensive experimental results that show that our approach performs remarkably well in practice.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87837413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 184
Authenticated error-correcting codes with applications to multicast authentication 组播身份验证应用的身份验证纠错码
Q Engineering Pub Date : 2010-02-01 DOI: 10.1145/1698750.1698757
Anna Lysyanskaya, R. Tamassia, Nikos Triandopoulos
We consider the problem of authenticating a stream of packets transmitted over a network controlled by an adversary who may perform arbitrary attacks on the stream: He may drop or modify chosen packets, rearrange the order of the packets in any way, and inject new, random, or specially crafted packets into the stream. In contrast, prior work on the multicast authentication problem has focused on a less powerful adversarial network model or has examined a considerably more restrictive setting with specific timing or structural assumptions about the network. We model the ability of the network to modify a stream of n packets with two parameters: the survival rate α (0 <α≤ 1) denoting the fraction of the packets that are guaranteed to reach any particular receiver unmodified and the flood rate β (β ≥ 1) indicating the factor by which the size of the received stream at any particular receiver may exceed the size of the transmitted stream. Combining error-correcting codes with standard cryptographic primitives, our approach gives almost the same security guarantees as if each packet were individually signed, but requires only one signature operation for the entire stream and adds to each transmitted packet only a small amount of authentication information, proportional to β/α2. We prove the security and correctness of our scheme and analyze its performance in terms of communication overhead and computational effort at the sender and the receiver. Our results demonstrate how list decoding can be transformed into unambiguous decoding in the public-key model and the bounded computational model for the underlying communication channel. Overall, our technique provides an authenticated error-correcting code of independent interest that may be useful in other settings.
我们考虑对网络上传输的数据包流进行身份验证的问题,攻击者可能对流进行任意攻击:他可能丢弃或修改选择的数据包,以任何方式重新排列数据包的顺序,并向流注入新的,随机的或特制的数据包。相比之下,先前关于多播身份验证问题的工作主要集中在一个不太强大的对抗网络模型上,或者研究了一个具有特定时间或网络结构假设的限制性更大的设置。我们用两个参数来模拟网络修改n个数据包流的能力:存活率α (0 <α≤1)表示保证未修改地到达任何特定接收器的数据包的比例,泛洪率β (β≥1)表示在任何特定接收器接收的流的大小可能超过发送流的大小的因素。将纠错码与标准加密原语相结合,我们的方法提供了几乎相同的安全保证,就好像每个数据包都单独签名一样,但只需要对整个流进行一次签名操作,并且只向每个传输的数据包添加少量与β/α2成比例的认证信息。我们证明了我们的方案的安全性和正确性,并从通信开销和发送方和接收方的计算工作量方面分析了它的性能。我们的结果演示了如何在底层通信通道的公钥模型和有界计算模型中将列表解码转换为无二义解码。总的来说,我们的技术提供了一种独立的身份验证纠错代码,可能在其他设置中很有用。
{"title":"Authenticated error-correcting codes with applications to multicast authentication","authors":"Anna Lysyanskaya, R. Tamassia, Nikos Triandopoulos","doi":"10.1145/1698750.1698757","DOIUrl":"https://doi.org/10.1145/1698750.1698757","url":null,"abstract":"We consider the problem of authenticating a stream of packets transmitted over a network controlled by an adversary who may perform arbitrary attacks on the stream: He may drop or modify chosen packets, rearrange the order of the packets in any way, and inject new, random, or specially crafted packets into the stream. In contrast, prior work on the multicast authentication problem has focused on a less powerful adversarial network model or has examined a considerably more restrictive setting with specific timing or structural assumptions about the network.\u0000 We model the ability of the network to modify a stream of n packets with two parameters: the survival rate α (0 <α≤ 1) denoting the fraction of the packets that are guaranteed to reach any particular receiver unmodified and the flood rate β (β ≥ 1) indicating the factor by which the size of the received stream at any particular receiver may exceed the size of the transmitted stream. Combining error-correcting codes with standard cryptographic primitives, our approach gives almost the same security guarantees as if each packet were individually signed, but requires only one signature operation for the entire stream and adds to each transmitted packet only a small amount of authentication information, proportional to β/α2. We prove the security and correctness of our scheme and analyze its performance in terms of communication overhead and computational effort at the sender and the receiver. Our results demonstrate how list decoding can be transformed into unambiguous decoding in the public-key model and the bounded computational model for the underlying communication channel. Overall, our technique provides an authenticated error-correcting code of independent interest that may be useful in other settings.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90748305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction 通过基于虚拟机的“开箱即用”语义视图重构实现恶意软件的隐形检测和监控
Q Engineering Pub Date : 2010-02-01 DOI: 10.1145/1698750.1698752
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
An alarming trend in recent malware incidents is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive side, a fundamental limitation of traditional host-based antimalware systems is that they run inside the very hosts they are protecting (“in-the-box”), making them vulnerable to counter detection and subversion by malware. To address this limitation, recent solutions based on virtual machine (VM) technologies advocate placing the malware detection facilities outside of the protected VM (“out-of-the-box”). However, they gain tamper resistance at the cost of losing the internal semantic view of the host, which is enjoyed by “in-the-box” approaches. This poses a technical challenge known as the semantic gap. In this article, we present the design, implementation, and evaluation of VMwatcher—an “out-of-the-box” approach that overcomes the semantic gap challenge. A new technique called guest view casting is developed to reconstruct internal semantic views (e.g., files, processes, and kernel modules) of a VM nonintrusively from the outside. More specifically, the new technique casts semantic definitions of guest OS data structures and functions on virtual machine monitor (VMM)-level VM states, so that the semantic view can be reconstructed. Furthermore, we extend guest view casting to reconstruct details of system call events (e.g., the process that makes the system call as well as the system call number, parameters, and return value) in the VM, enriching the semantic view. With the semantic gap effectively narrowed, we identify three unique malware detection and monitoring capabilities: (i) view comparison-based malware detection and its demonstration in rootkit detection; (ii) “out-of-the-box” deployment of off-the-shelf anti malware software with improved detection accuracy and tamper-resistance; and (iii) nonintrusive system call monitoring for malware and intrusion behavior observation. We have implemented a proof-of-concept VMwatcher prototype on a number of VMM platforms. Our evaluation experiments with real-world malware, including elusive kernel-level rootkits, demonstrate VMwatcher's practicality and effectiveness.
在最近的恶意软件事件中,一个令人担忧的趋势是,他们配备了隐形技术来检测、逃避和破坏受害者的恶意软件检测设施。在防御方面,传统的基于主机的反恶意软件系统的一个基本限制是它们在它们所保护的主机内运行(“在盒子里”),使它们容易受到恶意软件的反检测和颠覆。为了解决这一限制,最近基于虚拟机(VM)技术的解决方案主张将恶意软件检测设施置于受保护的VM之外(“开箱即用”)。然而,它们以失去主机的内部语义视图为代价获得了抗篡改性,而“盒内”方法享有这种特性。这带来了一个被称为语义差距的技术挑战。在本文中,我们介绍了vmwatch的设计、实现和评估——这是一种克服语义差距挑战的“开箱即用”方法。开发了一种称为访客视图转换的新技术,用于从外部非侵入性地重建VM的内部语义视图(例如,文件,进程和内核模块)。更具体地说,新技术将客户机操作系统数据结构和功能的语义定义投射到虚拟机监视器(VMM)级别的VM状态上,从而可以重构语义视图。此外,我们扩展了来宾视图转换,以在VM中重构系统调用事件的细节(例如,进行系统调用的进程以及系统调用号、参数和返回值),从而丰富了语义视图。随着语义差距的有效缩小,我们确定了三种独特的恶意软件检测和监控功能:(i)查看基于比较的恶意软件检测及其在rootkit检测中的演示;(ii)“开箱即用”部署现成的反恶意软件,提高检测准确性和防篡改能力;(三)针对恶意软件和入侵行为观察的非侵入性系统调用监控。我们已经在许多VMM平台上实现了一个概念验证的VMwatcher原型。我们对真实世界的恶意软件(包括难以捉摸的内核级rootkit)进行了评估实验,证明了VMwatcher的实用性和有效性。
{"title":"Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction","authors":"Xuxian Jiang, Xinyuan Wang, Dongyan Xu","doi":"10.1145/1698750.1698752","DOIUrl":"https://doi.org/10.1145/1698750.1698752","url":null,"abstract":"An alarming trend in recent malware incidents is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive side, a fundamental limitation of traditional host-based antimalware systems is that they run inside the very hosts they are protecting (“in-the-box”), making them vulnerable to counter detection and subversion by malware. To address this limitation, recent solutions based on virtual machine (VM) technologies advocate placing the malware detection facilities outside of the protected VM (“out-of-the-box”). However, they gain tamper resistance at the cost of losing the internal semantic view of the host, which is enjoyed by “in-the-box” approaches. This poses a technical challenge known as the semantic gap.\u0000 In this article, we present the design, implementation, and evaluation of VMwatcher—an “out-of-the-box” approach that overcomes the semantic gap challenge. A new technique called guest view casting is developed to reconstruct internal semantic views (e.g., files, processes, and kernel modules) of a VM nonintrusively from the outside. More specifically, the new technique casts semantic definitions of guest OS data structures and functions on virtual machine monitor (VMM)-level VM states, so that the semantic view can be reconstructed. Furthermore, we extend guest view casting to reconstruct details of system call events (e.g., the process that makes the system call as well as the system call number, parameters, and return value) in the VM, enriching the semantic view. With the semantic gap effectively narrowed, we identify three unique malware detection and monitoring capabilities: (i) view comparison-based malware detection and its demonstration in rootkit detection; (ii) “out-of-the-box” deployment of off-the-shelf anti malware software with improved detection accuracy and tamper-resistance; and (iii) nonintrusive system call monitoring for malware and intrusion behavior observation. We have implemented a proof-of-concept VMwatcher prototype on a number of VMM platforms. Our evaluation experiments with real-world malware, including elusive kernel-level rootkits, demonstrate VMwatcher's practicality and effectiveness.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76013083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 110
How much anonymity does network latency leak? 网络延迟泄漏了多少匿名性?
Q Engineering Pub Date : 2010-02-01 DOI: 10.1145/1315245.1315257
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by "local" adversaries who control only a few machines, and have low enough delay to support anonymous use of network services like web browsing and remote login. One consequence of these goals is that these services leak some information about the network latency between the sender and one or more nodes in the system. This paper reports on three experiments that partially measure the extent to which such leakage can compromise anonymity. First, using a public dataset of pairwise round-trip times (RTTs) between 2000 Internet hosts, we estimate that on average, knowing the network location of host A and the RTT to host B leaks 3.64 bits of information about the network location of B. Second, we describe an attack that allows a pair of colluding web sites to predict, based on local timing information and with no additional resources, whether two connections from the same Tor exit node are using the same circuit with 17% equal error rate. Finally, we describe an attack that allows a malicious website, with access to a network coordinate system and one corrupted Tor router, to recover roughly 6.8 bits of network location per hour.
低延迟匿名系统,如Tor, AN。ON、crowd和Anonymizer.com旨在提供匿名连接,这些连接既无法被只控制几台机器的“本地”对手追踪,又具有足够低的延迟,以支持匿名使用网络服务,如网页浏览和远程登录。这些目标的一个后果是,这些服务会泄漏有关发送方与系统中一个或多个节点之间的网络延迟的一些信息。本文报告了三个实验,这些实验部分地测量了这种泄漏可能损害匿名性的程度。首先,使用2000台互联网主机之间的双向往返时间(RTT)的公共数据集,我们估计,平均而言,知道主机a的网络位置和主机B的RTT泄露了关于B的网络位置的3.64位信息。其次,我们描述了一种攻击,允许一对串通的网站根据本地时间信息和没有额外资源来预测,来自同一Tor出口节点的两个连接是否使用相同的电路,错误率为17%。最后,我们描述了一种攻击,允许恶意网站访问网络坐标系统和一个损坏的Tor路由器,每小时恢复大约6.8位的网络位置。
{"title":"How much anonymity does network latency leak?","authors":"Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin","doi":"10.1145/1315245.1315257","DOIUrl":"https://doi.org/10.1145/1315245.1315257","url":null,"abstract":"Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by \"local\" adversaries who control only a few machines, and have low enough delay to support anonymous use of network services like web browsing and remote login. One consequence of these goals is that these services leak some information about the network latency between the sender and one or more nodes in the system. This paper reports on three experiments that partially measure the extent to which such leakage can compromise anonymity. First, using a public dataset of pairwise round-trip times (RTTs) between 2000 Internet hosts, we estimate that on average, knowing the network location of host A and the RTT to host B leaks 3.64 bits of information about the network location of B. Second, we describe an attack that allows a pair of colluding web sites to predict, based on local timing information and with no additional resources, whether two connections from the same Tor exit node are using the same circuit with 17% equal error rate. Finally, we describe an attack that allows a malicious website, with access to a network coordinate system and one corrupted Tor router, to recover roughly 6.8 bits of network location per hour.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77024416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 94
期刊
ACM Transactions on Information and System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1