Distributed ledger technologies are rising in popularity, mainly for the host of financial applications they potentially enable, through smart contracts. Several implementations of distributed ledgers have been propos...
详细信息
The proceedings contain 28 papers. The topics discussed include: a parser generator system for level-based programming languages;higher-order causal stream functions in sig from first principles;parametric DeltaJ 1.5:...
The proceedings contain 28 papers. The topics discussed include: a parser generator system for level-based programming languages;higher-order causal stream functions in sig from first principles;parametric DeltaJ 1.5: propagating feature attributes into implementation artifacts;graph-walk-based selective regression testing of web applications created with Google web toolkit;towards meta-level engineering and tooling for complex concurrent systems;structural type inference in java-like languages;CPSSC 1stinternationalworkshop on Cyber-Physical Systems in the context of smart cities;campuses as living & lived-in laboratories for smart city development;effective visualization and control of the indoor environmental quality in smart buildings;and achieving cloud scalability with microservices and DevOps in the connected car domain.
The design and implementation of a cryptographic scheme in a mobile ad hoc network (MANET) is highly complicated than the traditional networks. This is due to several reasons, like-unavailable central infrastructure s...
详细信息
ISBN:
(纸本)9783319309279;9783319309262
The design and implementation of a cryptographic scheme in a mobile ad hoc network (MANET) is highly complicated than the traditional networks. This is due to several reasons, like-unavailable central infrastructure services, periodic movable nodes, wireless link unsteadiness, and possible network separations. In this paper, we present a cryptographic key management scheme for secure communications in ad hoc networks. The scheme transmits the data in the presence of security attacks. The scheme provides the scalability of nodes and storage space wherein the nodes makes use of more than one key pair to encrypt and decrypt the messages. The scheme has been executed in javaprogramming language and empirically valued its efficiency via performance and security assessments. The simulation outcome has shown that the proposed scheme opposes against selfish nodes and takes less key storage space than traditional schemes. The scheme also satisfies the secure communication requirements.
In modern pervasive applications, it is important to validate access control mechanisms that are usually defined by means of the standard XACML language. Mutation analysis has been applied on access control policies f...
详细信息
ISBN:
(纸本)9781467370974
In modern pervasive applications, it is important to validate access control mechanisms that are usually defined by means of the standard XACML language. Mutation analysis has been applied on access control policies for measuring the adequacy of a test suite. In this paper, we present a testing framework aimed at applying mutation analysis at the level of the java based policy evaluation engine. A set of java based mutation operators is selected and applied to the code of the Policy Decision Point (PDP). A first experiment shows the effectiveness of the proposed framework in assessing the fault detection of XACML test suites and confirms the efficacy of the application of code-based mutation operators to the PDP.
This paper describes an extension to the current javasecurity model called the "Gateway" and why it was necessary to create it. This model allows secure applications, such as those used in electronic commer...
详细信息
java enabled smartcards protect security-related code and data by a sandbox concept. Unfortunately, this sandbox can be bypassed by fault attacks. Therefore, there is a substantial need for transparent, effective, an...
详细信息
java enabled smartcards are widely used to store confidential information in a trusted and secure way in an untrusted and insecure environment, for example the credit card in your briefcase. In this environment the o...
详细信息
The Direct Anonymous Attestation scheme allows to map procedures with an imperative requirement for anonymity, such as voting, to the electronic world while offering provable security. However, the scheme is complex a...
详细信息
ISBN:
(纸本)9781424452798
The Direct Anonymous Attestation scheme allows to map procedures with an imperative requirement for anonymity, such as voting, to the electronic world while offering provable security. However, the scheme is complex and requires demanding computations to be performed on a tamper-proof device. Such devices, e.g. secure smartcards, are typically resource constrained. We present the first implementation of the (simplified) Direct Anonymous Attestation protocols suitable for contemporary java Card smartcards. We point out performance bottlenecks and provide efficient solutions which allow our implementation to terminate within acceptable time.
Power analysis on smartcards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for java Card applets reverse engineering. Because power analysis alone doe...
详细信息
ISBN:
(纸本)9783540723530
Power analysis on smartcards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for java Card applets reverse engineering. Because power analysis alone does not provide enough information, we refine our methodology by involving additional information sources. Issues like distinguishing between bytecodes performing similar tasks and reverse engineering of conditional branches and nested loops are also addressed. The proposed methodology is applied to a commercially available java Card smart card and the results are reported. We conclude that our augmented power analysis can be successfully used to acquire information about the bytecodes executed on a java Card smart card.
The advent of the java Card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behaviour of these platforms is becoming crucia...
详细信息
ISBN:
(纸本)9783540723530
The advent of the java Card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behaviour of these platforms is becoming crucial. To meet this need, we present in this paper, a benchmark framework that enables performance evaluation at the byte-, code level. The first experimental results show that bytecode execution time isolation is possible.
暂无评论