Usage of the Internet for content delivery is increasing. Content Delivery Network is proposed for efficient content delivery in an IP network. However, there are some issues, including over load to content servers, a...
详细信息
Usage of the Internet for content delivery is increasing. Content Delivery Network is proposed for efficient content delivery in an IP network. However, there are some issues, including over load to content servers, and so on. Content Centric Network attracts attention as a new generation network, which can solve these issues. However, in Content Centric Network anyone who knows the content ID would get the contents, therefore, it is difficult to deliver content only to permitted person. To solve this problem, we propose the group data accesscontrol method. the proposed method is evaluated confidentiality, integrity and availability, and performance. the proposed method is also evaluated its action by emulation program.
Business network is designed to match their organizational structure. therefore, network reconfiguration is required to meet change of organizational structure and requirements from users. However, quick and detailed ...
详细信息
Business network is designed to match their organizational structure. therefore, network reconfiguration is required to meet change of organizational structure and requirements from users. However, quick and detailed reconfiguration is difficult because configuration in conventional network equipment need to be modified manually for each network apparatuses. the purpose of this study is to improve quick response of network reconfiguration to meet users' requests. We realize the accesscontrol method based on organizational structure by cooperating OpenFlow and database that saved user information. We propose the network control scheme that users are able to edit structure information. To confirm the proposed methods, we made test bed and performed operation verification. As a result, we confirmed that the change of structure information by users was reflected in network control within 5 seconds.
In mobile ad-hoc networks (MANET), the suppression of energy consumption is very important, because the networks may be used in situations with disaster or lacking of infrastructures. In our study, we propose a sleep ...
详细信息
In mobile ad-hoc networks (MANET), the suppression of energy consumption is very important, because the networks may be used in situations with disaster or lacking of infrastructures. In our study, we propose a sleep control method exploiting a routing protocol using mobile agent, where nodes not included in a derived route go to sleep. In the proposed method, a node sends a sleep control packet before a packet transmission. the node which received the packet decides to sleep or not autonomously. From performance evaluation by computer simulation, we show that the proposed method can decrease the energy consumption while maintaining the packet delivery rate.
Bio-cryptography represents a relative new and emerging domain, which proposes to strengthen the usual biometric systems, by adding the traditional cryptography layer to their architecture. Its main benefit lies in th...
详细信息
Bio-cryptography represents a relative new and emerging domain, which proposes to strengthen the usual biometric systems, by adding the traditional cryptography layer to their architecture. Its main benefit lies in the elimination of the need for storing enrolled users biometric templates. Although bio-cryptographic algorithms confer a certain level of security, their main disadvantage is the high consumption of computational resources they exhibit, as they perform many complex mathematical operations and need large amounts of data for their completion. this paper proposes the error-correcting codes method for reducing bio-cryptographic algorithms computational complexity and aims to evaluate the usage of Reed-Solomon error-correcting codes during the polynomial reconstruction phase of the biometric decryption stage within the Fuzzy Vault scheme.
accesscontrol is a fundamental security mechanism that both protects processes from attacks and confines compromised processes that may try to propagate an attack. Nonetheless, we still see an ever increasing number ...
详细信息
ISBN:
(纸本)9781450335560
accesscontrol is a fundamental security mechanism that both protects processes from attacks and confines compromised processes that may try to propagate an attack. Nonetheless, we still see an ever increasing number of software vulnerabilities. Researchers have long proposed that improvements in accesscontrol could prevent many vulnerabilities, many of which capture contextual information to more accurately detect obviously unsafe operations. However, developers are often hesitant to extend their accesscontrol mechanisms to use more sensitive accesscontrol policies. My experience leads me to propose that it is imperative that an accesscontrol systems be able to extract context accurately and efficiently and be capable of inferring any non-trivial policies. In this talk, I will discuss some recent research that enforces context-sensitive policies by either extracting process context, integrating code to extract context from programs, or extracting user context. We find that context-sensitive mechanisms can prevent some obviously unsafe operations from being authorized efficiently and discuss our experiences in inferring accesscontrol policies. Based on this research, we are encouraged that future research may enable context-sensitive accesscontrol policies to be produced and enforced to prevent vulnerabilities.
We propose an accesscontrol language for securing RDF graphs which essentially leverages an underlying query language based redaction mechanism to provide fine grained RDF accesscontrol. the accesscontrol language ...
详细信息
ISBN:
(纸本)9781450329392
We propose an accesscontrol language for securing RDF graphs which essentially leverages an underlying query language based redaction mechanism to provide fine grained RDF accesscontrol. the accesscontrol language presented is equipped with critical features such as policy resolution and cascading policies that are essential for fine grained RDF accesscontrol. We present the architecture of our system which primarily features a flexible, scalable and general purpose RDF accesscontrol mechanism.
A Geo-Social Computing System (GSCS) allows users to declare their current locations, and uses these declared locations to make authorization decisions. Recent years have seen the emergence of a new generation of soci...
详细信息
ISBN:
(纸本)9781450329392
A Geo-Social Computing System (GSCS) allows users to declare their current locations, and uses these declared locations to make authorization decisions. Recent years have seen the emergence of a new generation of social computing systems that are GSCSs. this paper proposes a protection model for GSCSs. the protection system tracks the current locations of users and a knowledge base of primitive spatial relations between locations. accesscontrol policies can be formulated by the composition of primitive spatial relations. the model is extended to account for Geo-Social Network Systems (GSNSs), which track both a spatial knowledge base and a social network. A policy language for GSNSs is proposed for specifying policies that combine both social and spatial constraints.
Withthe wide use of Role-based accesscontrol (RBAC), the need for monitoring, evaluation, and verification of RBAC implementations (e.g., to evaluate ex post which users acting in which roles were authorized to exec...
详细信息
ISBN:
(纸本)9781450329392
Withthe wide use of Role-based accesscontrol (RBAC), the need for monitoring, evaluation, and verification of RBAC implementations (e.g., to evaluate ex post which users acting in which roles were authorized to execute permissions) is evident. In this paper, we aim at detecting and identifying anomalies that originate from insiders such as the infringement of rights or irregular activities. To do that, we compare prescriptive (original) RBAC models (i.e. how the RBAC model is expected to work) with generative (current-state) RBAC models (i.e. the actual accesses represented by an RBAC model obtained with mining techniques). For this we present different similarity measures for RBAC models and their entities. We also provide techniques for visualizing anomalies within RBAC models based on difference graphs. this can be used for the alignment of RBAC models such as for policy updates or reconciliation. the effectiveness of the approach is evaluated based on a prototypical implementation and an experiment.
Processes need a variety of resources from their operating environment in order to run properly, but adversary may controlthe inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabi...
详细信息
ISBN:
(纸本)9781450329392
Processes need a variety of resources from their operating environment in order to run properly, but adversary may controlthe inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabilities. Conventional accesscontrol methods are not suitable to prevent such vulnerabilities because they use one set of permissions for all system call invocations. In this paper, we define a novel policy model for describing when resource retrievals are unsafe, so they can be blocked. this model highlights two contributions: (1) the explicit definition of adversary models as adversarial roles, which list the permissions that dictate whether one subject is an adversary of another, and (2) the application of data-flow to determine the adversary control of the names used to retrieve resources. An evaluation using multiple adversary models shows that data-flow is necessary to authorize resource retrieval in over 90% of system calls. By making adversary models and the adversary accessibility of all aspects of resource retrieval explicit, we can block resource access attacks system-wide.
the relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer ...
详细信息
ISBN:
(纸本)9781450329392
the relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer or navigation system. However, so far applications are restricted to using dedicated displays. In order to increase flexibility, the requirement of sharing displays between applications has emerged. Sharing displays leads to safety and security concerns since safety-critical applications as the dashboard warning lights share the same displays with uncritical or untrusted applications like the navigation system or third-party applications. To guarantee the safe and secure sharing of displays, we present a formal model for defining and controlling the access to display areas in this paper. We prove the validity of this model, and present a proof-of-concept
暂无评论