Performance is a key issue in the implementation of tools for policy-based management of large and complex networked systems. When a system is characterized by millions of policies, the policy decision point is usuall...
详细信息
Performance is a key issue in the implementation of tools for policy-based management of large and complex networked systems. When a system is characterized by millions of policies, the policy decision point is usually a performance bottleneck for the whole system. Although a few researchers have proposed cache-based methods to improve the efficiency of the policy decision point, the mutable variables, e.g., time, location, and temperature, are usually hard to be dealt with. The reason is that when applicable policies contain mutable variables, the policy decision point has to re-evaluate conditions in policies for events with the same targets. This paper thus proposes a novel Mutable Variable Aware Cache mechanism, by which the entries in the cache are aware of the mutable variables. The conditions or sub-conditions that do not contain mutable variables in the applicable policies will be evaluated once during the life cycle of a policy decision point for specific events, and the evaluation results will be appended to the cache. This optimization can greatly reduce the cost of fetching the values of mutable variables and evaluating the conditions or sub-conditions. It can, therefore, improve the performance of the policy decision point. We classify the possible situations and propose key algorithms. We also conduct a performance evaluation, which shows that the Mutable Variable Aware Cache mechanism can significantly improve the efficiency of a policy decision point.
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m...
详细信息
Exploiting the idea of cooperative communications is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. In this paper, we propose a hybrid coop...
详细信息
Exploiting the idea of cooperative communications is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. In this paper, we propose a hybrid cooperative relaying and jamming scheme to enhance the security of a two-way relay network, where some intermediate nodes help to relay the signal to the legitimate terminals via distributed beamforming and the others jam the eavesdropper simultaneously. In such a way, both two cooperative phases of the data transmission are protected. Subjected to the more practical per-node power constraint of each node and without the channel state information (CSI) of the eavesdropper, we propose a scheme to enhance the secrecy of the two terminals. It is shown that the problem can be transformed into a semidefinite programming (SDP) problem with an additional rank-1 constraint. We then develop a penalty function method and an iterative algorithm to solve such a problem efficiently, instead of the popular semi-definite relaxation (SDR) and randomization techniques proposed in the previous literatures. Simulations show that the proposed hybrid scheme greatly improves the security of the two-way relay networks.
Microblog is becoming more and more popular in our life. Due to the numerous information on this platform, it is very useful to detect bursty topic in real-time to help people get essential information quickly. As a n...
详细信息
Region Copy-Move forgery, in which a part of the image is copied and then pasted to another part of the same image. Some important goals and sensitive objects can be hidden imperceptibly;this forgery is at the rather ...
详细信息
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. H...
详细信息
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system(TOS) is proposed to try to solve these problems. Ho...
详细信息
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system(TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture(DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System(TS) and the security System(SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted information Channel(TIC) to protect the information flow between TS and SS. In a word, the doublesystem architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.
The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access,...
详细信息
The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access, partial ID, XOR operation, etc. By using of the reader authority distribution method, the unauthorized tag`s information was prevented give-away and it can avoid the lawful reader attack, location privacy attack, etc. Function of the reader was fully used. At the same time, the back-end database`s load and the time of the tag`s answer were reduced. Compared with several traditional security authentication protocols, this protocol is more security, lower energy consumption and more suitable for low-cost RFID system.
A (t, n) secret sharing (SS) scheme can be divided into two protocols: share generation protocol and secret reconstruction protocol. In share generation protocol, a mutually trusted dealer selects a secret and distrib...
详细信息
The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control,...
详细信息
The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, Separation of Duty. However, these mechanisms can not eliminate the privilege in OS kernel layer. This paper proposes a Separation of Three Powers Architecture (STPA). The authorizations in OS are divided into three parts: System Management Subsystem (SMS), security Management Subsystem (SEMS) and Audit Subsystem (AS). Mutual support and mutual checks and balances which are the design principles of STPA eliminate the administrator in the kernel layer. Furthermore, the paper gives the formal description for authorization division using the graph theory. Finally, the implementation of STPA is given. Proved by experiments, the Separation of Three Powers Architecture we proposed can provide reliable protection for the OS through authorization division.
暂无评论