security is of critical importance for the successful deployment of sensor networks, since it can ensure properties such as data integrity, secrecy, and availability. We have the unique opportunity to ensure security ...
详细信息
ISBN:
(纸本)1595933344
security is of critical importance for the successful deployment of sensor networks, since it can ensure properties such as data integrity, secrecy, and availability. We have the unique opportunity to ensure security even for early deployments of sensor networks, which could avoid alarming news articles and help fend off corporate and consumer security and privacy fears. In this talk, I will discuss the most important security issues in sensor networks, present realistic attacker models, comment on industry trends for achieving security, and highlight present and future research directions.
the growth of the Internet has been accompanied by the growth of e-services (e.g. e-commerce, e-health). this proliferation of e-services has put large quantities of consumer private information in the hands of the se...
详细信息
ISBN:
(纸本)1595935495
the growth of the Internet has been accompanied by the growth of e-services (e.g. e-commerce, e-health). this proliferation of e-services has put large quantities of consumer private information in the hands of the service providers, who in many cases have mishandled the information, either intentionally or unintentionally, to the detriment of consumer privacy. As a result, government bodies have put in place privacy legislation that spells out a consumer's privacy rights and how consumer private information is to be handled. Providers are required to comply with such privacy legislation. this paper proposes visualization as a tool that can be used by security or privacy analysts to understand how private information flows within and between provider organizations, as a way of identifying vulnerabilities that can lead to non-compliance. A model of private information flow and a graphical notation for visualizing this flow are proposed. An application example of using the notation to identify privacy vulnerabilities is given. Copyright 2006 Government of Canada.
Outsourcing, as a popular business model, helps enterprises cut operating costs, but at the same time it also puts the enterprise's sensitive data in danger. How to ensure that private data is safe when it is dist...
详细信息
ISBN:
(纸本)9780889866133
Outsourcing, as a popular business model, helps enterprises cut operating costs, but at the same time it also puts the enterprise's sensitive data in danger. How to ensure that private data is safe when it is distributed across the enterprises in a outsourcing chain is a critical security issue. Based on the reality of wide usage of workflow in enterprises and the observation that the workflows specify the relationships and dependences as well as the flow of data among tasks, we propose a framework, which is built on top of workflow management s, to protect private data by executing the "right" workflow at runtime. By integrating support of purpose and obligation into workflow management systems, the safety of the distribution and redistribution of private data will be ensured.
this proceedings contains 25 papers. data mining and analytics today have advanced rapidly from the early days of pattern finding in commercial databases. they are now a core part of business intelligence and inform d...
this proceedings contains 25 papers. data mining and analytics today have advanced rapidly from the early days of pattern finding in commercial databases. they are now a core part of business intelligence and inform decision-making in many areas of human endeavor including science, business, health care and security. Mining of unstructured text, semi-structured web information and multimedia data have continued to receive attention, as have professional challenges to using data mining in industry. Accepted submissions have been grouped into seven sessions reflecting these application areas. Papers published in this conference are categorized under topics such as Professional Challenges, Healthdata Mining, Scientific data Mining, Text Mining, Algorithms, Financial data Mining, and Web Mining. the key terms of this proceedings include delegating, privacy preserving, bloom filter, data mining, statistics, predictive accuracy, target population, observational data, selection bias, reject inference, comparison of algorithms, microarray data, classification, data mining, survey data, features selection, classification, association rule, harmonics, power quality, monitoring system, data mining, classification, clustering, segmentation, prediction, corrosion, civil engineering, spelling error correction, abbreviation expansion, case restoration, dirty text, text preprocessing, text cleaning.
Social network analysis is an important methodology in sociological research. Although social network data is very useful to researchers and policy makers, releasing it to the public may cause an invasion of privacy. ...
详细信息
ISBN:
(纸本)3540476938
Social network analysis is an important methodology in sociological research. Although social network data is very useful to researchers and policy makers, releasing it to the public may cause an invasion of privacy. In this paper, we generalize the techniques used to protect private information in tabulated data, and propose some safety criteria for assessing the risk of breaching confidentiality by releasing social network data. We assume a situation of data linking, where data is released to a particular user who has some knowledge about individual nodes of a social network. We adopt description logic as the underlying knowledge representation formalism and consider the safety criteria in both open-world and closed-world contexts.
security is an abstraction. Even the technique used by Justice Stewart to define hard core pornography1 does not appear to be applicable as we are unable to discern those characteristics of a system that would lead us...
详细信息
ISBN:
(纸本)1595935533
security is an abstraction. Even the technique used by Justice Stewart to define hard core pornography1 does not appear to be applicable as we are unable to discern those characteristics of a system that would lead us to believe that it is secure by casual inspection. Indeed, we may be unable to do so, even after a prolonged and detailed evaluation. Many years ago, I designed an experiment that attempted to evaluate the reliability of N-version fault tolerant software. this paradigm states that, under the assumptions 1) that multiple versions of the software fail independently and 2) that the mechanism used to resolve differences is perfect, the reliability of a system using N versions will be the product of the reliabilities of the individual versions. While the assumptions are reasonable for hardware where failures are (more or less) randomly distributed over time, they are problematic for software in which failures are distributed in the data domain and tend to cluster in "hard" parts of the problem space. Since even a small percentage of correlated failures has a major effect on the reliability gain, the paradigm is largely ineffective. Unfortunately, reaching this conclusion was not easy. Early workers in the field thought that independent failures would be the rule providing that programmers worked independently. I termed this the "prayer for diversity approach" because it seemed to me to be akin to praying that the different programmers did not make the same mistakes. Other approaches were equally ineffective. A major avionics development divided the instruction set of the processor used into two subsets, either of which was sufficient to implement the required code. Each of the two development groups was restricted to a single subset and it was claimed that this should avoid common failures. the term "Voodoo software engineering" appears to be applicable to this approach. After a number of years, we seem to understand what was wrong with both of these approa
Cheating in secret sharing has been considered in several papers. Recently cheating in visual cryptography has been considered in [10], where (2, n)-threshold visual cryptography schemes are provided. In this paper we...
详细信息
ISBN:
(纸本)3540380809
Cheating in secret sharing has been considered in several papers. Recently cheating in visual cryptography has been considered in [10], where (2, n)-threshold visual cryptography schemes are provided. In this paper we provide new (2, n)-threshold visual cryptography schemes. Our model is different from the one considered in [10];in particular we aim at constructing cheating immune schemes without the use of extra information, like additional shares, or images as done in [10]. We have provided a formal definition of cheating which requires that a group of cheaters be able to deterministically force a honest participant to reconstruct a wrong secret. the (2, n)-threshold schemes that we provide do not allow such cheating, regardless of the number of cheaters.
the proceedings contain 26 papers. the special focus in this conference is on security and privacy in Communication Networks. the topics include: Secure and verifiable top-k query in two-tiered sensor networks;a bidir...
ISBN:
(纸本)9783540354673
the proceedings contain 26 papers. the special focus in this conference is on security and privacy in Communication Networks. the topics include: Secure and verifiable top-k query in two-tiered sensor networks;a bidirectional light communications framework for secure communications on smartphones;towards resilient and efficient bidirectional communication botnets;contrasting permission patterns between clean an malicious android applications;mining api-level features for robust malware detection in android;disabling a computer by exploiting softphone vulnerabilities;practical confinement of untrusted software in virtual cloud computing;integrated security architecture for virtual machines;generic mediated encryption;public-key encryption resilient to linear related-key attacks;detecting package-level clones using machine learning;automatic polymorphic exploit generation for software vulnerabilities;a novel web tunnel detection method based on protocol behaviors;non-hierarchical memory access rights to enforce the principle of least privilege;scalable security model generation and analysis using k-importance measures;control flow security in embedded systems;an e-payment architecture ensuring a high level of privacy protection;unveiling privacy setting breaches in online social networks;security concerns and remedy in a cloud based e learning system;ensuring data integrity by anomaly node detection during data gathering in WSNS;reversible data hiding scheme based on 3-least significant bits and mix column transform.
the term proxy certificate is used to describe a certificate that is issued by an end user for the purpose of delegating responsibility to another user so that the latter can perform certain actions on behalf of the f...
详细信息
ISBN:
(纸本)3540380809
the term proxy certificate is used to describe a certificate that is issued by an end user for the purpose of delegating responsibility to another user so that the latter can perform certain actions on behalf of the former. Such certificates have been suggested for use in a number of applications, particularly in distributed computing environments where delegation of rights is common. In this paper, we present a new concept called proof-carrying proxy certificates. Our approach allows to combine the verification of the validity of the proxy certificate and the authorization decision making in an elegant way that enhances the privacy of the end user. In contrast with standard proxy certificates that are generated using standard (public-key) signature schemes, the proposed certificates are generated using a signature scheme for which the validity of a generated signature proves the compliance of the signer with a credential-based policy. We present a concrete realization of our approach using bilinear pairings over elliptic curves and we prove its security under adapted attack models.
the proceedings contain 79 papers. the topics discussed include: a grid scheduling algorithm for bag-of-tasks applications using multiple queues with duplication;model the MPI performance for non-contiguous data;optim...
详细信息
ISBN:
(纸本)0769526136
the proceedings contain 79 papers. the topics discussed include: a grid scheduling algorithm for bag-of-tasks applications using multiple queues with duplication;model the MPI performance for non-contiguous data;optimized algorithm for computing invariants of ordinary petri nets;radiative heat transfer simulation using programmable graphics hardware;decoupling metrics for services composition;an approach to analyzing the Windows and Linux security models;reducing the requirement in FEC codes via capillary routing;a distributed topic map architecture for enterprise knowledge management;mapping COSA software architecture concepts into UML2.0;analyzing security interoperability during component integration;fault tolerant non-trivial repeating pattern discovering for music data;hoarding and prefetching for mobile databases;on history-sensitive models of interactive queues;application services based on personal data ontology;and irregular patch for image synthesis.
暂无评论