首页 > 最新文献

ACM Transactions on Information and System Security最新文献

英文 中文
Privacy-preserving distributed network troubleshooting—bridging the gap between theory and practice 隐私保护分布式网络故障排除-弥合理论与实践之间的差距
Q Engineering Pub Date : 2011-12-01 DOI: 10.1145/2043628.2043632
M. Burkhart, X. Dimitropoulos
Today, there is a fundamental imbalance in cybersecurity. While attackers act more and more globally and coordinated, network defense is limited to examine local information only due to privacy concerns. To overcome this privacy barrier, we use secure multiparty computation (MPC) for the problem of aggregating network data from multiple domains. We first optimize MPC comparison operations for processing high volume data in near real-time by not enforcing protocols to run in a constant number of synchronization rounds. We then implement a complete set of basic MPC primitives in the SEPIA library. For parallel invocations, SEPIA's basic operations are between 35 and several hundred times faster than those of comparable MPC frameworks. Using these operations, we develop four protocols tailored for distributed network monitoring and security applications: the entropy, distinct count, event correlation, and top-k protocols. Extensive evaluation shows that the protocols are suitable for near real-time data aggregation. For example, our top-k protocol PPTKS accurately aggregates counts for 180,000 distributed IP addresses in only a few minutes. Finally, we use SEPIA with real traffic data from 17 customers of a backbone network to collaboratively detect, analyze, and mitigate distributed anomalies. Our work follows a path starting from theory, going to system design, performance evaluation, and ending with measurement. Along this way, it makes a first effort to bridge two very disparate worlds: MPC theory and network monitoring and security practices.
今天,网络安全存在根本性的不平衡。当攻击者的行动越来越全球化和协调时,由于隐私问题,网络防御仅限于检查本地信息。为了克服这一隐私障碍,我们使用安全多方计算(MPC)来解决来自多个域的网络数据聚合问题。我们首先优化了MPC比较操作,以便在接近实时的情况下处理大容量数据,而不是强制协议在固定数量的同步轮中运行。然后,我们在SEPIA库中实现了一套完整的基本MPC原语。对于并行调用,SEPIA的基本操作要比类似的MPC框架快35到几百倍。使用这些操作,我们开发了为分布式网络监控和安全应用量身定制的四种协议:熵、不同计数、事件关联和top-k协议。广泛的评估表明,该协议适用于近实时数据聚合。例如,我们的top-k协议PPTKS在几分钟内准确地聚合了18万个分布式IP地址的计数。最后,我们使用SEPIA与来自骨干网络的17个客户的真实流量数据来协同检测,分析和缓解分布式异常。我们的工作遵循从理论开始,到系统设计,性能评估,最后以测量结束的路径。在这个过程中,它首次尝试连接两个完全不同的世界:MPC理论和网络监控与安全实践。
{"title":"Privacy-preserving distributed network troubleshooting—bridging the gap between theory and practice","authors":"M. Burkhart, X. Dimitropoulos","doi":"10.1145/2043628.2043632","DOIUrl":"https://doi.org/10.1145/2043628.2043632","url":null,"abstract":"Today, there is a fundamental imbalance in cybersecurity. While attackers act more and more globally and coordinated, network defense is limited to examine local information only due to privacy concerns. To overcome this privacy barrier, we use secure multiparty computation (MPC) for the problem of aggregating network data from multiple domains. We first optimize MPC comparison operations for processing high volume data in near real-time by not enforcing protocols to run in a constant number of synchronization rounds. We then implement a complete set of basic MPC primitives in the SEPIA library. For parallel invocations, SEPIA's basic operations are between 35 and several hundred times faster than those of comparable MPC frameworks. Using these operations, we develop four protocols tailored for distributed network monitoring and security applications: the entropy, distinct count, event correlation, and top-k protocols. Extensive evaluation shows that the protocols are suitable for near real-time data aggregation. For example, our top-k protocol PPTKS accurately aggregates counts for 180,000 distributed IP addresses in only a few minutes. Finally, we use SEPIA with real traffic data from 17 customers of a backbone network to collaboratively detect, analyze, and mitigate distributed anomalies. Our work follows a path starting from theory, going to system design, performance evaluation, and ending with measurement. Along this way, it makes a first effort to bridge two very disparate worlds: MPC theory and network monitoring and security practices.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"129 1","pages":"31:1-31:30"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77893398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On two RFID privacy notions and their relations 两种RFID隐私概念及其关系
Q Engineering Pub Date : 2011-12-01 DOI: 10.1145/2043628.2043631
Yingjiu Li, R. Deng, Junzuo Lai, Changshe Ma
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID protocol, denoted as unp-privacy. In this article, we first revisit the existing unpredictability-based RFID privacy models and point out their limitations. We then propose a new RFID privacy model, denoted as unp*-privacy, based on the indistinguishability of a real tag and a virtual tag. We formally clarify its relationship with the ind-privacy model. It is proven that ind-privacy is weaker than unp*-privacy. Moreover, the minimal (necessary and sufficient) condition on RFID tags to achieve unp*-privacy is determined. It is shown that if an RFID system is unp*-private, then the computational power of an RFID tag can be used to construct a pseudorandom function family provided that the RFID system is complete and sound. On the other hand, if each tag is able to compute a pseudorandom function, then the tags can be used to construct an RFID system with unp*-privacy. In this sense, a pseudorandom function family is the minimal requirement on an RFID tag's computational power for enforcing RFID system privacy. Finally, a new RFID mutual authentication protocol is proposed to satisfy the minimal requirement.
RFID系统的隐私性越来越受到RFID社区的关注。基本上,文献中有两种RFID隐私概念:一种基于两个标签的不可区分性,表示为独立隐私,另一种基于RFID协议输出的不可预测性,表示为非独立隐私。在本文中,我们首先回顾现有的基于不可预测性的RFID隐私模型,并指出它们的局限性。然后,我们提出了一种新的RFID隐私模型,表示为unp*-隐私,基于真实标签和虚拟标签的不可区分性。我们正式澄清了它与独立隐私模型的关系。证明了ind-privacy比unp -privacy弱。此外,确定了RFID标签实现unp*隐私的最小(必要和充分)条件。研究表明,如果一个RFID系统是unp*私有的,那么只要RFID系统是完整健全的,那么一个RFID标签的计算能力就可以用来构造一个伪随机函数族。另一方面,如果每个标签都能够计算一个伪随机函数,则可以使用这些标签构建具有unp*-隐私的RFID系统。从这个意义上说,伪随机函数族是对RFID标签计算能力的最小要求,以实现RFID系统隐私。最后,提出了一种满足最小要求的RFID互认证协议。
{"title":"On two RFID privacy notions and their relations","authors":"Yingjiu Li, R. Deng, Junzuo Lai, Changshe Ma","doi":"10.1145/2043628.2043631","DOIUrl":"https://doi.org/10.1145/2043628.2043631","url":null,"abstract":"Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID protocol, denoted as unp-privacy. In this article, we first revisit the existing unpredictability-based RFID privacy models and point out their limitations. We then propose a new RFID privacy model, denoted as unp*-privacy, based on the indistinguishability of a real tag and a virtual tag. We formally clarify its relationship with the ind-privacy model. It is proven that ind-privacy is weaker than unp*-privacy. Moreover, the minimal (necessary and sufficient) condition on RFID tags to achieve unp*-privacy is determined. It is shown that if an RFID system is unp*-private, then the computational power of an RFID tag can be used to construct a pseudorandom function family provided that the RFID system is complete and sound. On the other hand, if each tag is able to compute a pseudorandom function, then the tags can be used to construct an RFID system with unp*-privacy. In this sense, a pseudorandom function family is the minimal requirement on an RFID tag's computational power for enforcing RFID system privacy. Finally, a new RFID mutual authentication protocol is proposed to satisfy the minimal requirement.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"6 1","pages":"30:1-30:23"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84227145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Guest Editorial SACMAT 2009 and 2010 客座编辑SACMAT 2009和2010
Q Engineering Pub Date : 2011-11-01 DOI: 10.1145/2043621.2043622
J. Joshi, B. Carminati
This issue of TISSEC includes extended versions of articles selected from the programs of the 14th and 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2009 and SACMAT 2010), which were held, respectively, in Stresa, Italy on June 3-5, 2009, and in Pittsburgh, USA on June 9-11, 2010. These symposiums continued the SACMAT tradition of being the premier forum for presentation of research results on cutting edge issues of access control, including models, systems, applications, and theory. SACMAT 2009 received 75 submissions from around the world. After a rigorous review process and program committee discussion, 24 papers were included in the program. SACMAT 2010 attracted a total of 79 papers from Africa, Asia, Australia, Europe and North America. In SACMAT 2010, submissions were anonymous, and each of them was reviewed according to a blind review process by at least three reviewers who are experts in the field. As result of this review process, the SACMAT 2010 program committee selected 19 articles that cover a variety of topics, including RBAC, policy analysis, role engineering and access control in distributed environments. Based on the original reviews and the feedback from session chairs, two papers from SACMAT 2009 and two papers from SACMAT 2010 were invited for submission for this special issue. The journal submissions went through an additional review process by selected members of the SACMAT 2010 program committee as well as external reviewers. The authors were required to incorporate significant technical extensions into their extended versions. Each article went through two rounds of reviews where the authors were requested to respond to the review comments and update the submissions accordingly. As the result of this review process, we finalized three articles to be included in this special issue. The first two articles are from the SACMAT 2009 program and the third article is from the SACMAT 2010 program. The first article titled “Group-Centric Secure Information-Sharing Models for Isolated Groups” by Ram Krishnan, Jianwei Niu, Ravi Sandhu, and William H. Winsborough proposes a theory for Group-Centric Secure Information Sharing (g-SIS) with isolated groups and formalizes a family of g-SIS models. The proposed g-SIS approach brings together users and objects in a group from different external sources and facilitates information sharing. The authors focus on the authorization semantics of group operations of join, leave for users and add, remove and create for objects. They use first-order temporal logic to define the core properties and some additional properties related to authorization consequences of these operations. They show that the core properties are logically consistent and mutually dependent. Further, they specify authorization behavior for a family of g-SIS models and prove that these models satisfy the core and selected additional properties. The second article titled “Combining Discretionary Policy wi
本期TISSEC收录了第十四届和第十五届ACM访问控制模型与技术研讨会(SACMAT 2009和SACMAT 2010)的文章扩展版,这两届研讨会分别于2009年6月3-5日在意大利斯特雷萨和2010年6月9-11日在美国匹兹堡举行。这些研讨会延续了SACMAT作为展示访问控制前沿问题研究成果的主要论坛的传统,包括模型、系统、应用和理论。SACMAT 2009收到了来自世界各地的75份意见书。经过严格的审查过程和项目委员会的讨论,24篇论文被纳入项目。SACMAT 2010共吸引了来自非洲、亚洲、澳大利亚、欧洲和北美的79篇论文。在SACMAT 2010中,提交的材料是匿名的,每一份材料都由至少三名该领域的专家根据盲审程序进行审查。作为审查过程的结果,SACMAT 2010计划委员会选择了19篇文章,涵盖了各种主题,包括RBAC、策略分析、角色工程和分布式环境中的访问控制。根据原始评论和会议主席的反馈,本特刊邀请了来自SACMAT 2009的两篇论文和来自SACMAT 2010的两篇论文。期刊提交经过了SACMAT 2010计划委员会选定成员以及外部审稿人的额外审查过程。作者被要求在他们的扩展版本中加入重要的技术扩展。每篇文章都经过两轮评审,作者被要求对评审意见做出回应,并相应地更新提交的文章。作为这个审查过程的结果,我们最终确定了三篇文章将被纳入本期特刊。前两篇文章来自SACMAT 2009项目,第三篇文章来自SACMAT 2010项目。由Ram Krishnan、Jianwei Niu、Ravi Sandhu和William H. Winsborough撰写的第一篇题为“孤立组的以组为中心的安全信息共享模型”的文章提出了一个与孤立组的以组为中心的安全信息共享(g-SIS)理论,并形式化了g-SIS模型族。建议的g-SIS方法将来自不同外部来源的用户和对象聚集在一个组中,并促进信息共享。作者着重于用户的join、leave和对象的add、remove和create组操作的授权语义。它们使用一阶时间逻辑来定义核心属性以及与这些操作的授权结果相关的一些附加属性。它们表明,核心属性在逻辑上是一致的和相互依赖的。此外,它们还指定了一系列g-SIS模型的授权行为,并证明这些模型满足核心和选定的附加属性。毛子青、李宁辉、陈红、蒋绪贤等人的第二篇文章《操作系统中自由决策策略与强制信息流的结合》,将自由决策策略与MAC中的动态信息流技术相结合,提出了一种信息流增强的自由访问控制(IFDAC)模型。作者描述了IFDAC的设计,说明了它与现有可用的强制完整性保护模型的关系。并分析它们的安全属性。作者还描述了他们在Linux上对IFEDAC的实现,并给出了他们的评估结果。第三篇文章题为“异构数据联合中的访问控制策略转换、验证和最小化”,作者Gregory Leighton和Denilson Barbosa讨论了跨访问控制策略的实施问题
{"title":"Guest Editorial SACMAT 2009 and 2010","authors":"J. Joshi, B. Carminati","doi":"10.1145/2043621.2043622","DOIUrl":"https://doi.org/10.1145/2043621.2043622","url":null,"abstract":"This issue of TISSEC includes extended versions of articles selected from the programs of the 14th and 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2009 and SACMAT 2010), which were held, respectively, in Stresa, Italy on June 3-5, 2009, and in Pittsburgh, USA on June 9-11, 2010. These symposiums continued the SACMAT tradition of being the premier forum for presentation of research results on cutting edge issues of access control, including models, systems, applications, and theory. SACMAT 2009 received 75 submissions from around the world. After a rigorous review process and program committee discussion, 24 papers were included in the program. SACMAT 2010 attracted a total of 79 papers from Africa, Asia, Australia, Europe and North America. In SACMAT 2010, submissions were anonymous, and each of them was reviewed according to a blind review process by at least three reviewers who are experts in the field. As result of this review process, the SACMAT 2010 program committee selected 19 articles that cover a variety of topics, including RBAC, policy analysis, role engineering and access control in distributed environments. Based on the original reviews and the feedback from session chairs, two papers from SACMAT 2009 and two papers from SACMAT 2010 were invited for submission for this special issue. The journal submissions went through an additional review process by selected members of the SACMAT 2010 program committee as well as external reviewers. The authors were required to incorporate significant technical extensions into their extended versions. Each article went through two rounds of reviews where the authors were requested to respond to the review comments and update the submissions accordingly. As the result of this review process, we finalized three articles to be included in this special issue. The first two articles are from the SACMAT 2009 program and the third article is from the SACMAT 2010 program. The first article titled “Group-Centric Secure Information-Sharing Models for Isolated Groups” by Ram Krishnan, Jianwei Niu, Ravi Sandhu, and William H. Winsborough proposes a theory for Group-Centric Secure Information Sharing (g-SIS) with isolated groups and formalizes a family of g-SIS models. The proposed g-SIS approach brings together users and objects in a group from different external sources and facilitates information sharing. The authors focus on the authorization semantics of group operations of join, leave for users and add, remove and create for objects. They use first-order temporal logic to define the core properties and some additional properties related to authorization consequences of these operations. They show that the core properties are logically consistent and mutually dependent. Further, they specify authorization behavior for a family of g-SIS models and prove that these models satisfy the core and selected additional properties. The second article titled “Combining Discretionary Policy wi","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"36 1","pages":"22:1-22:2"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88339265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations 异构数据联合中的访问控制策略转换、验证和最小化
Q Engineering Pub Date : 2011-11-01 DOI: 10.1145/2043621.2043625
G. Leighton, Denilson Barbosa
Data federations provide seamless access to multiple heterogeneous and autonomous data sources pertaining to a large organization. As each source database defines its own access control policies for a set of local identities, enforcing such policies across the federation becomes a challenge. In this article, we first consider the problem of translating existing access control policies defined over source databases in a manner that allows the original semantics to be observed while becoming applicable across the entire data federation. We show that such a translation is always possible, and provide an algorithm for automating the translation. We show that verifying whether a translated policy obeys the semantics of the original access control policy defined over a source database is intractable, even under restrictive scenarios. We then describe a practical algorithmic framework for translating relational access control policies into their XML equivalent, expressed in the eXtensible Access Control Markup Language. Finally, we examine the difficulty of minimizing translated policies, and contribute a minimization algorithm applicable to nonrecursive translated policies.
数据联合提供了对属于大型组织的多个异构和自治数据源的无缝访问。由于每个源数据库都为一组本地身份定义了自己的访问控制策略,因此跨联合强制执行这些策略成为一项挑战。在本文中,我们首先考虑转换在源数据库上定义的现有访问控制策略的问题,以一种允许在整个数据联合中应用的同时观察原始语义的方式。我们证明了这样的翻译总是可能的,并提供了一个自动翻译的算法。我们表明,即使在限制性场景下,验证翻译后的策略是否遵守在源数据库上定义的原始访问控制策略的语义也是难以处理的。然后,我们描述了一个实用的算法框架,用于将关系访问控制策略转换成等价的XML,用可扩展访问控制标记语言表示。最后,我们研究了最小化翻译策略的难度,并提出了一种适用于非递归翻译策略的最小化算法。
{"title":"Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations","authors":"G. Leighton, Denilson Barbosa","doi":"10.1145/2043621.2043625","DOIUrl":"https://doi.org/10.1145/2043621.2043625","url":null,"abstract":"Data federations provide seamless access to multiple heterogeneous and autonomous data sources pertaining to a large organization. As each source database defines its own access control policies for a set of local identities, enforcing such policies across the federation becomes a challenge. In this article, we first consider the problem of translating existing access control policies defined over source databases in a manner that allows the original semantics to be observed while becoming applicable across the entire data federation. We show that such a translation is always possible, and provide an algorithm for automating the translation. We show that verifying whether a translated policy obeys the semantics of the original access control policy defined over a source database is intractable, even under restrictive scenarios. We then describe a practical algorithmic framework for translating relational access control policies into their XML equivalent, expressed in the eXtensible Access Control Markup Language. Finally, we examine the difficulty of minimizing translated policies, and contribute a minimization algorithm applicable to nonrecursive translated policies.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"97 1","pages":"25:1-25:28"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76028059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems 操作系统中自由决策与强制信息流的结合
Q Engineering Pub Date : 2011-11-01 DOI: 10.1145/2043621.2043624
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
Discretionary Access Control (DAC) is the primary access control mechanism in today’s major operating systems. It is, however, vulnerable to Trojan Horse attacks and attacks exploiting buggy software. We propose to combine the discretionary policy in DAC with the dynamic information flow techniques in MAC, therefore achieving the best of both worlds, that is, the DAC’s easy-to-use discretionary policy specification and MAC’s defense against threats caused by Trojan Horses and buggy programs. We propose the Information Flow Enhanced Discretionary Access Control (IFEDAC) model that implements this design philosophy. We describe our design of IFEDAC, and discuss its relationship with the Usable Mandatory Integrity Protection (UMIP) model proposed earlier by us. In addition, we analyze their security property and their relationships with other protection systems. We also describe our implementations of IFEDAC in Linux and the evaluation results and deployment experiences of the systems.
自主访问控制(DAC)是当今主要操作系统的主要访问控制机制。然而,它很容易受到特洛伊木马攻击和利用漏洞软件的攻击。我们建议将DAC中的自由裁量策略与MAC中的动态信息流技术相结合,从而实现两者的最佳效果,即DAC易于使用的自由裁量策略规范和MAC对特洛伊木马和错误程序造成的威胁的防御。我们提出了实现这一设计理念的信息流增强自主访问控制(IFEDAC)模型。我们描述了我们的IFEDAC设计,并讨论了它与我们之前提出的可用强制完整性保护(UMIP)模型的关系。此外,我们还分析了它们的安全特性以及它们与其他保护系统的关系。我们还描述了我们在Linux上实现的IFEDAC,以及系统的评估结果和部署经验。
{"title":"Combining Discretionary Policy with Mandatory Information Flow in Operating Systems","authors":"Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang","doi":"10.1145/2043621.2043624","DOIUrl":"https://doi.org/10.1145/2043621.2043624","url":null,"abstract":"Discretionary Access Control (DAC) is the primary access control mechanism in today’s major operating systems. It is, however, vulnerable to Trojan Horse attacks and attacks exploiting buggy software. We propose to combine the discretionary policy in DAC with the dynamic information flow techniques in MAC, therefore achieving the best of both worlds, that is, the DAC’s easy-to-use discretionary policy specification and MAC’s defense against threats caused by Trojan Horses and buggy programs. We propose the Information Flow Enhanced Discretionary Access Control (IFEDAC) model that implements this design philosophy. We describe our design of IFEDAC, and discuss its relationship with the Usable Mandatory Integrity Protection (UMIP) model proposed earlier by us. In addition, we analyze their security property and their relationships with other protection systems. We also describe our implementations of IFEDAC in Linux and the evaluation results and deployment experiences of the systems.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"107 1","pages":"24:1-24:27"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81382223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Group-Centric Secure Information-Sharing Models for Isolated Groups 孤立组的以组为中心的安全信息共享模型
Q Engineering Pub Date : 2011-11-01 DOI: 10.1145/2043621.2043623
R. Krishnan, Jianwei Niu, R. Sandhu, W. Winsborough
Group-Centric Secure Information Sharing (g-SIS) envisions bringing users and objects together in a group to facilitate agile sharing of information brought in from external sources as well as creation of new information within the group. We expect g-SIS to be orthogonal and complementary to authorization systems deployed within participating organizations. The metaphors “secure meeting room” and “subscription service” characterize the g-SIS approach. The focus of this article is on developing the foundations of isolated g-SIS models. Groups are isolated in the sense that membership of a user or an object in a group does not affect their authorizations in other groups. Present contributions include the following: formal specification of core properties that at once help to characterize the family of g-SIS models and provide a “sanity check” for full policy specifications; informal discussion of policy design decisions that differentiate g-SIS policies from one another with respect to the authorization semantics of group operations; formalization and verification of a specific member of the family of g-SIS models; demonstration that the core properties are logically consistent and mutually independent; and identification of several directions for future extensions. The formalized specification is highly abstract. Besides certain well-formedness requirements that specify, for instance, a user cannot leave a group unless she is a member, it constrains only whether user-level read and write operations are authorized and it does so solely in terms of the history of group operations; join and leave for users and add, create, and remove for objects. This makes temporal logic one of the few formalisms in which the specification can be clearly and concisely expressed. The specification serves as a reference point that is the first step in deriving authorization-system component specifications from which a programmer with little security expertise could implement a high-assurance enforcement system for the specified policy.
以组为中心的安全信息共享(g-SIS)设想将用户和对象聚集在一个组中,以促进从外部来源引入的信息的敏捷共享以及在组内创建新信息。我们期望g-SIS与参与组织内部署的授权系统是正交和互补的。“安全会议室”和“订阅服务”是g-SIS方法的特征。本文的重点是开发孤立g-SIS模型的基础。组是隔离的,因为组中的用户或对象的成员身份不会影响它们在其他组中的授权。目前的贡献包括以下内容:核心属性的正式规范,可以立即帮助描述g-SIS模型族,并为完整的策略规范提供“完整性检查”;对策略设计决策的非正式讨论,这些决策根据组操作的授权语义区分g-SIS策略;g-SIS模型家族中特定成员的形式化和验证;证明核心属性在逻辑上是一致且相互独立的;并确定了未来扩展的几个方向。形式化的规范是高度抽象的。除了某些格式良好的要求,例如,用户不能离开组,除非她是组的成员,它只限制用户级别的读写操作是否被授权,并且它完全根据组操作的历史来进行;用户的连接和离开,对象的添加、创建和删除。这使得时间逻辑成为能够清晰而简洁地表达规范的少数形式之一。该规范用作参考点,它是派生授权系统组件规范的第一步,稍有安全专业知识的程序员可以从中为指定的策略实现高保证的实施系统。
{"title":"Group-Centric Secure Information-Sharing Models for Isolated Groups","authors":"R. Krishnan, Jianwei Niu, R. Sandhu, W. Winsborough","doi":"10.1145/2043621.2043623","DOIUrl":"https://doi.org/10.1145/2043621.2043623","url":null,"abstract":"Group-Centric Secure Information Sharing (g-SIS) envisions bringing users and objects together in a group to facilitate agile sharing of information brought in from external sources as well as creation of new information within the group. We expect g-SIS to be orthogonal and complementary to authorization systems deployed within participating organizations. The metaphors “secure meeting room” and “subscription service” characterize the g-SIS approach.\u0000 The focus of this article is on developing the foundations of isolated g-SIS models. Groups are isolated in the sense that membership of a user or an object in a group does not affect their authorizations in other groups. Present contributions include the following: formal specification of core properties that at once help to characterize the family of g-SIS models and provide a “sanity check” for full policy specifications; informal discussion of policy design decisions that differentiate g-SIS policies from one another with respect to the authorization semantics of group operations; formalization and verification of a specific member of the family of g-SIS models; demonstration that the core properties are logically consistent and mutually independent; and identification of several directions for future extensions.\u0000 The formalized specification is highly abstract. Besides certain well-formedness requirements that specify, for instance, a user cannot leave a group unless she is a member, it constrains only whether user-level read and write operations are authorized and it does so solely in terms of the history of group operations; join and leave for users and add, create, and remove for objects. This makes temporal logic one of the few formalisms in which the specification can be clearly and concisely expressed. The specification serves as a reference point that is the first step in deriving authorization-system component specifications from which a programmer with little security expertise could implement a high-assurance enforcement system for the specified policy.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"3 1","pages":"23:1-23:29"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89972757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems 煮青蛙攻击:安全网络坐标系统的局限性
Q Engineering Pub Date : 2011-11-01 DOI: 10.1145/2043621.2043627
Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
A network coordinate system assigns Euclidean “virtual” coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented in a variety of applications, most notably the popular Vuze BitTorrent client. Zage and Nita-Rotaru (at CCS 2007) and independently, Kaafar et al. (at SIGCOMM 2007), demonstrated that several widely-cited network coordinate systems are prone to simple attacks, and proposed mechanisms to defeat these attacks using outlier detection to filter out adversarial inputs. Kaafar et al. goes a step further and requires that a fraction of the network is trusted. More recently, Sherr et al. (at USENIX ATC 2009) proposed Veracity, a distributed reputation system to secure network coordinate systems. We describe a new attack on network coordinate systems, Frog-Boiling, that defeats all of these defenses. Thus, even a system with trusted entities is still vulnerable to attacks. Moreover, having witnesses vouch for your coordinates as in Veracity does not prevent our attack. Finally, we demonstrate empirically that the Frog-Boiling attack is more disruptive than the previously known attacks: systems that attempt to reject “bad” inputs by statistical means or reputation cannot be used to secure a network coordinate system.
网络坐标系统为网络中的每个节点分配欧几里得“虚拟”坐标,以便轻松估计从未相互接触的节点对之间的网络延迟。这些系统已经在各种应用程序中实现,最著名的是流行的Vuze BitTorrent客户端。Zage和Nita-Rotaru(在2007年CCS会议上)以及Kaafar等人(在2007年SIGCOMM会议上)分别证明了几个被广泛引用的网络坐标系统容易受到简单攻击,并提出了使用离群值检测来过滤敌对输入来击败这些攻击的机制。Kaafar等人更进一步,要求网络的一部分是可信的。最近,Sherr等人(在USENIX ATC 2009上)提出了Veracity,这是一种分布式信誉系统,用于保护网络坐标系统。我们描述了一种新的攻击网络坐标系统,青蛙沸腾,击败了所有这些防御。因此,即使是具有可信实体的系统仍然容易受到攻击。而且,即使有目击者为你的坐标做担保也不能阻止我们的攻击。最后,我们从经验上证明了青蛙煮沸攻击比以前已知的攻击更具破坏性:试图通过统计手段或声誉拒绝“坏”输入的系统不能用于保护网络坐标系统。
{"title":"The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems","authors":"Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim","doi":"10.1145/2043621.2043627","DOIUrl":"https://doi.org/10.1145/2043621.2043627","url":null,"abstract":"A network coordinate system assigns Euclidean “virtual” coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented in a variety of applications, most notably the popular Vuze BitTorrent client. Zage and Nita-Rotaru (at CCS 2007) and independently, Kaafar et al. (at SIGCOMM 2007), demonstrated that several widely-cited network coordinate systems are prone to simple attacks, and proposed mechanisms to defeat these attacks using outlier detection to filter out adversarial inputs. Kaafar et al. goes a step further and requires that a fraction of the network is trusted. More recently, Sherr et al. (at USENIX ATC 2009) proposed Veracity, a distributed reputation system to secure network coordinate systems. We describe a new attack on network coordinate systems, Frog-Boiling, that defeats all of these defenses. Thus, even a system with trusted entities is still vulnerable to attacks. Moreover, having witnesses vouch for your coordinates as in Veracity does not prevent our attack. Finally, we demonstrate empirically that the Frog-Boiling attack is more disruptive than the previously known attacks: systems that attempt to reject “bad” inputs by statistical means or reputation cannot be used to secure a network coordinate system.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"31 1","pages":"27:1-27:23"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74540042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM 授权最终用户限制他们自己的应用程序:比较SELinux、AppArmor和FBAC-LSM的可用性研究结果
Q Engineering Pub Date : 2011-09-01 DOI: 10.1145/2019599.2019604
Z. Schreuders, T. McGill, Christian N. Payne
Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional security models that focused on separating users from each other have proven ineffective in an environment of widespread software vulnerabilities and rampant malware. However, alternative approaches that provide more finely grained security generally require greater expertise than typical end users can reasonably be expected to have, and consequently have had limited success. The functionality-based application confinement (FBAC) model is designed to allow end users with limited expertise to assign applications hierarchical and parameterised policy abstractions based upon the functionalities each program is intended to perform. To validate the feasibility of this approach and assess the usability of existing mechanisms, a usability study was conducted comparing an implementation of the FBAC model with the widely used Linux-based SELinux and AppArmor security schemes. The results showed that the functionality-based mechanism enabled end users to effectively control the privileges of their applications with far greater success than widely used alternatives. In particular, policies created using FBAC were more likely to be enforced and exhibited significantly lower risk exposure, while not interfering with the ability of the application to perform its intended task. In addition to the success of the functionality-based approach, the usability study also highlighted a number of limitations and problems with existing mechanisms. These results indicate that a functionality-based approach has significant potential in terms of enabling end users with limited expertise to defend themselves against insecure and malicious software.
保护终端用户免受安全威胁是一个极其困难,但却日益重要的问题。传统的安全模型侧重于将用户彼此隔离,在软件漏洞广泛存在和恶意软件猖獗的环境中,这种模型已被证明是无效的。然而,提供更细粒度安全性的替代方法通常需要比典型最终用户所能合理期望的更多的专业知识,因此成功有限。基于功能的应用程序限制(FBAC)模型旨在允许具有有限专业知识的最终用户根据每个程序打算执行的功能为应用程序分配分层和参数化的策略抽象。为了验证该方法的可行性并评估现有机制的可用性,进行了一项可用性研究,将FBAC模型的实现与广泛使用的基于linux的SELinux和AppArmor安全方案进行了比较。结果表明,基于功能的机制使最终用户能够有效地控制其应用程序的特权,比广泛使用的替代方案成功得多。特别是,使用FBAC创建的策略更有可能得到执行,并且显示出显着降低的风险暴露,同时不会干扰应用程序执行其预期任务的能力。除了基于功能的方法的成功之外,可用性研究还强调了现有机制的一些限制和问题。这些结果表明,基于功能的方法在使专业知识有限的最终用户能够保护自己免受不安全和恶意软件的侵害方面具有巨大的潜力。
{"title":"Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM","authors":"Z. Schreuders, T. McGill, Christian N. Payne","doi":"10.1145/2019599.2019604","DOIUrl":"https://doi.org/10.1145/2019599.2019604","url":null,"abstract":"Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional security models that focused on separating users from each other have proven ineffective in an environment of widespread software vulnerabilities and rampant malware. However, alternative approaches that provide more finely grained security generally require greater expertise than typical end users can reasonably be expected to have, and consequently have had limited success.\u0000 The functionality-based application confinement (FBAC) model is designed to allow end users with limited expertise to assign applications hierarchical and parameterised policy abstractions based upon the functionalities each program is intended to perform. To validate the feasibility of this approach and assess the usability of existing mechanisms, a usability study was conducted comparing an implementation of the FBAC model with the widely used Linux-based SELinux and AppArmor security schemes. The results showed that the functionality-based mechanism enabled end users to effectively control the privileges of their applications with far greater success than widely used alternatives. In particular, policies created using FBAC were more likely to be enforced and exhibited significantly lower risk exposure, while not interfering with the ability of the application to perform its intended task. In addition to the success of the functionality-based approach, the usability study also highlighted a number of limitations and problems with existing mechanisms. These results indicate that a functionality-based approach has significant potential in terms of enabling end users with limited expertise to defend themselves against insecure and malicious software.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"103 1","pages":"19:1-19:28"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75059154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Practical Oblivious Outsourced Storage 实用遗忘外包存储
Q Engineering Pub Date : 2011-09-01 DOI: 10.1145/2019599.2019605
P. Williams, R. Sion, M. Sotáková
In this article we introduce a technique, guaranteeing access pattern privacy against a computationally bounded adversary, in outsourced data storage, with communication and computation overheads orders of magnitude better than existing approaches. In the presence of a small amount of temporary storage (enough to store O(√n log n) items and IDs, where n is the number of items in the database), we can achieve access pattern privacy with computational complexity of less than O(log2 n) per query (as compared to, for instance, O(log4 n) for existing approaches). We achieve these novel results by applying new insights based on probabilistic analyses of data shuffling algorithms to Oblivious RAM, allowing us to significantly improve its asymptotic complexity. This results in a protocol crossing the boundary between theory and practice and becoming generally applicable for access pattern privacy. We show that on off-the-shelf hardware, large data sets can be queried obliviously orders of magnitude faster than in existing work.
在本文中,我们将介绍一种技术,在外包数据存储中保证访问模式隐私不受计算有限对手的影响,其通信和计算开销比现有方法好几个数量级。在存在少量临时存储(足以存储O(√n log n)项和id,其中n是数据库中的项数)的情况下,我们可以实现访问模式隐私,每个查询的计算复杂度小于O(log2 n)(与现有方法相比,例如,O(log4 n))。我们将基于数据变换算法的概率分析的新见解应用于遗忘RAM,从而实现了这些新颖的结果,使我们能够显着提高其渐近复杂性。这导致协议跨越了理论和实践之间的界限,并普遍适用于访问模式隐私。我们表明,在现成的硬件上,查询大型数据集的速度可以比现有工作快几个数量级。
{"title":"Practical Oblivious Outsourced Storage","authors":"P. Williams, R. Sion, M. Sotáková","doi":"10.1145/2019599.2019605","DOIUrl":"https://doi.org/10.1145/2019599.2019605","url":null,"abstract":"In this article we introduce a technique, guaranteeing access pattern privacy against a computationally bounded adversary, in outsourced data storage, with communication and computation overheads orders of magnitude better than existing approaches. In the presence of a small amount of temporary storage (enough to store O(√n log n) items and IDs, where n is the number of items in the database), we can achieve access pattern privacy with computational complexity of less than O(log2 n) per query (as compared to, for instance, O(log4 n) for existing approaches).\u0000 We achieve these novel results by applying new insights based on probabilistic analyses of data shuffling algorithms to Oblivious RAM, allowing us to significantly improve its asymptotic complexity. This results in a protocol crossing the boundary between theory and practice and becoming generally applicable for access pattern privacy. We show that on off-the-shelf hardware, large data sets can be queried obliviously orders of magnitude faster than in existing work.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"43 1","pages":"20:1-20:28"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74237470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Authenticated Dictionaries: Real-World Costs and Trade-Offs 认证字典:现实世界的成本和权衡
Q Engineering Pub Date : 2011-09-01 DOI: 10.1145/2019599.2019602
Scott A. Crosby, D. Wallach
Authenticated dictionaries are a widely discussed paradigm to enable verifiable integrity for data storage on untrusted servers, such as today’s widely used “cloud computing” resources, allowing a server to provide a “proof,” typically in the form of a slice through a cryptographic data structure, that the results of any given query are the correct answer, including that the absence of a query result is correct. Persistent authenticated dictionaries (PADs) further allow queries against older versions of the structure. This research presents implementations of a variety of different PAD algorithms, some based on Merkle tree-style data structures and others based on individually signed “tuple” statements (with and without RSA accumulators). We present system throughput benchmarks, indicating costs in terms of time, storage, and bandwidth as well as considering how much money would be required given standard cloud computing costs. We conclude that Merkle tree PADs are preferable in cases with frequent updates, while tuple-based PADs are preferable with higher query rates. For Merkle tree PADs, red-black trees outperform treaps and skiplists. Applying Sarnak-Tarjan’s versioned node strategy, with a cache of old hashes at every node, to red-black trees yields the fastest Merkle tree PAD implementation, notably using half the memory of the more commonly used mutation-free path copying strategy. For tuple PADs, although we designed and implemented an algorithm using RSA accumulators that offers constant update size, constant storage per update, constant proof size, and sublinear computation per update, we found that RSA accumulators are so expensive that they are never worthwhile. We find that other optimizations in the literature for tuple PADs are more cost-effective.
经过身份验证的字典是一种被广泛讨论的范例,用于在不受信任的服务器(例如今天广泛使用的“云计算”资源)上实现数据存储的可验证完整性,它允许服务器提供“证明”(通常以加密数据结构中的切片形式),证明任何给定查询的结果是正确的答案,包括没有查询结果是正确的。持久身份验证字典(pad)进一步允许对结构的旧版本进行查询。本研究提出了各种不同的PAD算法的实现,一些基于Merkle树式数据结构,另一些基于单独签名的“元组”语句(有或没有RSA累加器)。我们提供了系统吞吐量基准,表明在时间、存储和带宽方面的成本,并考虑在给定标准云计算成本的情况下需要多少钱。我们得出结论,在频繁更新的情况下,Merkle树pad更可取,而基于双元组的pad更可取,查询率更高。对于默克尔树pad来说,红黑树的表现优于树堆和跳跃树。将sarak - tarjan的版本节点策略应用于红黑树,在每个节点上都有旧散列缓存,可以产生最快的Merkle树PAD实现,特别是使用更常用的无突变路径复制策略的一半内存。对于元组pad,尽管我们使用RSA累加器设计并实现了一种算法,该算法提供恒定的更新大小、每次更新的恒定存储、恒定的证明大小和每次更新的次线性计算,但我们发现RSA累加器非常昂贵,根本不值得使用。我们发现文献中针对元组pad的其他优化更具成本效益。
{"title":"Authenticated Dictionaries: Real-World Costs and Trade-Offs","authors":"Scott A. Crosby, D. Wallach","doi":"10.1145/2019599.2019602","DOIUrl":"https://doi.org/10.1145/2019599.2019602","url":null,"abstract":"Authenticated dictionaries are a widely discussed paradigm to enable verifiable integrity for data storage on untrusted servers, such as today’s widely used “cloud computing” resources, allowing a server to provide a “proof,” typically in the form of a slice through a cryptographic data structure, that the results of any given query are the correct answer, including that the absence of a query result is correct. Persistent authenticated dictionaries (PADs) further allow queries against older versions of the structure. This research presents implementations of a variety of different PAD algorithms, some based on Merkle tree-style data structures and others based on individually signed “tuple” statements (with and without RSA accumulators). We present system throughput benchmarks, indicating costs in terms of time, storage, and bandwidth as well as considering how much money would be required given standard cloud computing costs. We conclude that Merkle tree PADs are preferable in cases with frequent updates, while tuple-based PADs are preferable with higher query rates. For Merkle tree PADs, red-black trees outperform treaps and skiplists. Applying Sarnak-Tarjan’s versioned node strategy, with a cache of old hashes at every node, to red-black trees yields the fastest Merkle tree PAD implementation, notably using half the memory of the more commonly used mutation-free path copying strategy. For tuple PADs, although we designed and implemented an algorithm using RSA accumulators that offers constant update size, constant storage per update, constant proof size, and sublinear computation per update, we found that RSA accumulators are so expensive that they are never worthwhile. We find that other optimizations in the literature for tuple PADs are more cost-effective.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"144 1","pages":"17:1-17:30"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76812822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
期刊
ACM Transactions on Information and System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1