Third-party identity management services enable cross-site information sharing, making Web access seamless but also raise significant privacy implications for the users. Using a combination of manual analysis of ident...
详细信息
The exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal secu- rity. data leak detection aims at scanning content (in stor- age or transmission) for exposed sens...
详细信息
The significant threats from information security breaches in cyber world is one of the most serious security problems. Organizations are facing growing number of sophisticated cyber-attacks every year. Efficient and ...
详细信息
Cloud computing allows customers to outsource the burden of data management and benefit from economy of scale, but privacy concerns limit its reach. Even if the stored data are encrypted, access patterns may leak valu...
详细信息
The evolution of digital communication includes both applications and devices running them. In this context, specific applications are needed to enhance a safeguard communication ensuring protection and trust services...
详细信息
ISBN:
(纸本)9781450338547
The evolution of digital communication includes both applications and devices running them. In this context, specific applications are needed to enhance a safeguard communication ensuring protection and trust services to the users. The growing need to address privacy concerns when social network data is released for mining purposes has recently led to considerable interest in various network security-based applications. In this paper, we develop an efficiency and adaptive network security-based application to ensure the privacy and data integrity across channel communications. This approach is designed on a model of clustering configuration of the involved members. The cluster members interact with the cluster leader for data exchange and sends to the base station. This scheme provides a strong mutual authentication framework that suits for real heterogeneous wireless applications. In addition, we contribute with a mathematical analysis to the delay and optimization analysis in a clustering topology node-based, also we compared the scheme with existing ones using security standards services. Finally, performance of this scheme is evaluated in term of computation and communication overhead;results show the present framework is efficiency and can be safeguard for Network security-based applications.
While mobile sensing applications are booming, the sensor man- agement mechanisms in current smartphone operating systems are left behind - they are incomprehensive and coarse-grained, expos- ing a huge attack surface...
详细信息
The leak of sensitive data on computer systems poses a seri- ous threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the con- tent in storage and transmission,...
详细信息
With data becoming available in larger quantities and at higher rates, new data processing paradigms have been pro- posed to handle large and fast data. data Stream Processing is one such paradigm wherein transient da...
详细信息
Near Field Communication (NFC) is a technology widely used for security-critical applications like access control or payment systems. Many of these systems rely on the security assumption that the card has to be in cl...
详细信息
ISBN:
(纸本)9781450336239
Near Field Communication (NFC) is a technology widely used for security-critical applications like access control or payment systems. Many of these systems rely on the security assumption that the card has to be in close proximity to communicate with the reader. We developed NFCGate, an Android application capable of relaying NFC communication between card and reader using two rooted but otherwise unmodified Android phones. This enables us to increase the distance between card and reader, eavesdrop on, and even modify the exchanged data. The application should work for any system built on top of ISO 14443-3 that is not hardened against relay attacks, and was successfully tested with a popular contactless card payment system and an electronic passport document.
The proceedings contain 41 papers. The topics discussed include: on the suitability of dissemination-centric access control systems for group-centric sharing;Streamforce: outsourcing access control enforcement for str...
ISBN:
(纸本)9781450322782
The proceedings contain 41 papers. The topics discussed include: on the suitability of dissemination-centric access control systems for group-centric sharing;Streamforce: outsourcing access control enforcement for stream data to the clouds;automated black-box detection of access control vulnerabilities in web applications;PhishSafe: leveraging modern Javascript API's for transparent and robust protection;COMPARS: toward an empirical approach for comparing the resilience of reputation systems;situational awareness through reasoning on network incidents;measuring the robustness of source program obfuscation: studying the impact of compiler optimizations on the obfuscation of C programs;interaction provenance model for unified authentication factors in service oriented computing;POSTER: a pairing-free certificateless hybrid signcryption scheme for advanced metering infrastructures;and DIVILAR: diversifying intermediate language for anti-repackaging on Android platform.
暂无评论