We develop a series of formal administrative models for recently proposed informal requirements for community cybersecurity information sharing [9]. Traditional enterprise-oriented administrative models are not suita...
详细信息
We develop a series of formal administrative models for recently proposed informal requirements for community cybersecurity information sharing [9]. Traditional enterprise-oriented administrative models are not suitable for the highly dynamic and distributed nature of this multi-organization application domain. Hence, new administrative models with robust intuitive grounding and rigorous mathematical foundations are required. We show that the role-based trust management (RT) framework [5], [7] is suitable in large measure to address the informal scenarios of [9], with one essential extension to enable self-assignment of users to selected roles. Applications of extended forms of RT, as well as its limitations, are also considered.
Dynamic analysis of malware is an ever evolving and challenging task. A malware infection tree (MiT) can assist in analysis by identifying processes and files related to a specific malware sample. In this paper we pro...
详细信息
In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cybersecurity. We believe that similar models will be applicable in numerous other domains. ...
详细信息
Cost effective development of secure software is a key goal for many software organizations as they seek to manage the risks of misbehaving software. Employing Formal Methods (FMs) in the Model-Based Software Engineer...
详细信息
In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cybersecurity. We believe that similar models will be applicable in numerous other domains. ...
详细信息
In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cybersecurity. We believe that similar models will be applicable in numerous other domains. The term community in this context refers to a county or larger city size unit with a clearly demarcated geographical boundary aligned more or less with a governance boundary. Our choice of the community domain is based on the decade long experience of the Center for Infrastructure Assurance and security (CIAS), now part of the Institute for cybersecurity (ICS-CIAS) at the University of Texas at San Antonio. Over the past decade ICS-CIAS has conducted cybersecurity preparedness exercises and training at communities throughout the nation specifically dealing with communication, incident response, disaster recovery, business continuity, security awareness and similar issues. We discuss the insights gained from these frequent exercises to illustrate the limitations of prior models for SIS, such as discretionary access control, mandatory access control and role-based access control. Specifically, we argue that these traditional models, while effective in addressing the issues that they were developed for, lack the agility to dynamically configure a system to facilitate SIS scenarios such as monitoring and response during a community cybersecurity incident life cycle. We discuss how our current research efforts at the Institute for cybersecurity on group-centric SIS models directly address the limitations of existing models in such scenarios.
Search engines are among the most-used resources on the internet. However, even today's most successful search engines struggle to provide high quality search results. According to recent studies as many as 50 per...
详细信息
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream processing applications have strong ti...
详细信息
ISBN:
(纸本)9780769531328
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream processing applications have strong timeliness and security demands. In particular, we address the following challenges: (1) propose a real-time dependable execution model by extending the component-based execution model with real-time and dependability properties, and (2) develop QoS-aware application composition and adaptation techniques that employ resource management strategies and security policies when discovering and selecting application components. Our approach enables us to develop a distributed stream processing environment that is predictable, secure, flexible and adaptable.
We propose a new linear array for multiplication in GF(2m) which outperforms most of the existing linear multipliers in terms of the area and time complexity. Moreover we will give a very detailed comparison of our ar...
详细信息
A mobile ad hoc network (MANET) is the cooperative engagement of a collection of wireless mobile nodes without aid of any established infrastructure or centralized administration. The conventional security solutions t...
详细信息
A mobile ad hoc network (MANET) is the cooperative engagement of a collection of wireless mobile nodes without aid of any established infrastructure or centralized administration. The conventional security solutions to provide key management through accessing trusted authorities or centralized servers are infeasible for this new environment since mobile ad hoc networks are characterized by the absence of any infrastructure, frequent mobility, and wireless links. In this paper, we propose an on-demand, fully localized, and hop-by-hop public key management scheme for MANETs. It can be performed by generating public/private key pairs by nodes themselves, issuing certificates to neighboring nodes, holding these certificates in their certificate repositories, and providing an authentication service quickly adaptive to the dynamic topology of the network without relying on any servers. Also, our scheme can be performed successfully as long as there is a physical communication line between two nodes, and it is accustomed well to the on-demand routing of MANETs.
暂无评论