security engineering must be integrated with all stages of application specification and development to be effective. Doing this properly is increasingly critical as organisations rush to offload their software servic...
详细信息
ISBN:
(纸本)9783642169540
security engineering must be integrated with all stages of application specification and development to be effective. Doing this properly is increasingly critical as organisations rush to offload their software services to cloud providers. Service-level agreements (SLAs) withthese providers currently focus on performance-oriented parameters, which runs the risk of exacerbating an impedance mismatch withthe security middleware. Not only do we want cloud providers to isolate each of their clients from others, we also want to have means to isolate components and users within each client's *** propose a principled approach to designing and deploying end-to-end secure, distributed software by means of thorough, relentless tagging of the security meaning of data, analogous to what is already done for data types. the aim is to guarantee that---above a small trusted code base---data cannot be leaked by buggy or malicious software components. this is crucial for cloud infrastructures, in which the stored data and hosted services all have different owners whose interests are not aligned (and may even be in competition). We have developed data tagging schemes and enforcement techniques that can help form the aforementioned trusted code base. Our big idea---cloud-hosted services that have end-to-end information flow control---preempts worries about security and privacy violations retarding the evolution of large-scale cloud computing.
Withthe rapid development and interconnection of power systems, the low frequency oscillations(LFO) has become one of the serious factors threatening the power system stability. thus, how to quickly locate the source...
详细信息
the proceedings contain 15 papers. the topics discussed include: the effects of introspection on creating privacy policy;key allocation schemes for private social networks;a distortion-based metric for location privac...
ISBN:
(纸本)9781605587837
the proceedings contain 15 papers. the topics discussed include: the effects of introspection on creating privacy policy;key allocation schemes for private social networks;a distortion-based metric for location privacy;on the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design;XPay: practical anonymous payments for Tor routing and other networked services;PSP: private and secure payment with RFID;a verifiable, centralized, coercion-free reputation system;hashing it out in public: common failure modes of DHT-based anonymity schemes;longest common subsequence as private search;redactable signatures on data with dependencies and their application to personal health records;a Greek (privacy) tragedy: the introduction of social security numbers in Greece;faking contextual data for fun, profit, and privacy;and Plinko: polling with a physical implementation of a noisy channel.
Identity management is a set of viable technologies for supporting electronic interactions requiring identity information in the digital world. Although numerous elemental technologies have been developed in support o...
详细信息
ISBN:
(纸本)9781605587868
Identity management is a set of viable technologies for supporting electronic interactions requiring identity information in the digital world. Although numerous elemental technologies have been developed in support of emerging standards and specifications, there has been little research on identity governance across domain boundaries from the user's viewpoint. It is thus still difficult for users to understand how their own identity information is being maintained, used, and propagated. An identity management framework is described for tracing the history of how a user's identity information is handled after it is transferred across domains of control. Withthis framework, organizations that manage identity information can improve accountability for their data practices and thereby increase their trustworthiness. the framework also enables users to control and optimize the propagation of their identity information in a user-centric manner. Copyright 2009 acm.
Radio Frequency IDentification (RFID) technology based applications are gaining widespread acceptance. Much of the RFID use at this time is in tracking objects. this type of application takes a variety of forms. Our g...
详细信息
this position paper introduces lightweight cryptographic jails (CryptoJails) that protect the privacy of applicationdata by intercepting write accesses and redirecting them to encrypted application containers. Crypto...
详细信息
ISBN:
(纸本)9781605587806
this position paper introduces lightweight cryptographic jails (CryptoJails) that protect the privacy of applicationdata by intercepting write accesses and redirecting them to encrypted application containers. CryptoJails ensure that applicationdata (for example, cached emails or web pages) cannot be read or undetectably altered by other applications. Unlike existing approaches, CryptoJails do not require kernel modifications or even superuser (i.e., root) privileges, do not impose significant performance overhead, and may even be used with already installed applications. Copyright 2009 acm.
Storage of personal information by service providers risks privacy loss from data breaches. Our prior work on minimal disclosure credentials presented a mechanism to control the dissemination of personal information. ...
详细信息
ISBN:
(纸本)9781605587837
Storage of personal information by service providers risks privacy loss from data breaches. Our prior work on minimal disclosure credentials presented a mechanism to control the dissemination of personal information. In that work, personal data was broken into individual claims, which can be released in arbitrary subsets while still being cryptographically verifiable. In applying that work, we encountered the problem of connections between claims, which manifest as disclosure dependencies. In this work, we provide an efficient way to provide minimal disclosure, but with cryptographic enforcement of dependencies between claims, as specified by the claims certifier. this provides a mechanism for redactable signatures on data with disclosure dependencies. We show that an implementation of our scheme can verify thousands of dependent claims in tens of milliseconds. We also describe ongoing work in which the approach is being used within a larger system for dispensing personal health records. Copyright 2009 acm.
Radio Frequency Identification (RFID) is a contactless technology, it considered the way to replace the barcode, since the barcode is data read with line of sight and limits the utility for item-level of logistic and ...
详细信息
privacy-preserving data mining aims at discovering beneficial information from a large amount of data without violating the privacy policy. privacy-preserving association rules mining research has already generated ma...
详细信息
ISBN:
(纸本)9781605588162
privacy-preserving data mining aims at discovering beneficial information from a large amount of data without violating the privacy policy. privacy-preserving association rules mining research has already generated many interesting results. Based on commutative encryptions and the Secure Multi-party Computation (SMC) theory, Kantarcioglu and Clifton [1] propose two protocols to implement privacy-preserving mining of association rules over horizontally partitioned data. the paper addresses its incorrect security proof and introduces a more well-founded proof. this paper also identifies several other errors in [1]. this kind of protocols and their proof are a concrete application of Secure Multi-party Computation, which is be of great significances to the privacy-preserving data mining studies based on SMC. thus establishment of the correct proof methodology is important. this paper demonstrates the correct proof methodology by correcting the fault proof in [1]. Copyright 2009 acm.
Withthe growing use of the Internet, users need to reveal an increasing amount of private information when accessing online services, and, with growing integration, this information is shared among services. Although...
详细信息
ISBN:
(纸本)9783642008429
Withthe growing use of the Internet, users need to reveal an increasing amount of private information when accessing online services, and, with growing integration, this information is shared among services. Although progress was achieved in acknowledging the need to design privacy-friendly systems and protocols, there are still no satisfactory technical privacy-protecting solutions that reliably enforce user-defined flexible privacy policies. Today, the users can assess and analyze privacy policies of data controllers, but they cannot control access to and usage of their private data beyond their own computing environment. In this paper, we propose a conceptual framework for user-controlled formal privacy policies and examine elements of its design and implementation. In our vision, a Trusted Personal Information Wallet manages private data according to a user-defined privacy policies. We build on Trusted Virtual Domains (TVDs), leveraging trusted computing and virtualization to construct privacy domains for enforcing the user's policy. We present protocols for establishing these domains, and describe the implementation of the building blocks of our framework. Additionally, a simple privacy policy for trusted privacy domains functioning between different organizations and entities across networks is described as an example. Finally, we identify future research challenges in this area.
暂无评论