E-Book, Englisch, Band 36, 137 Seiten
Park / Zhan / Lee Advances in Information Security and Its Application
1. Auflage 2009
ISBN: 978-3-642-02633-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
E-Book, Englisch, Band 36, 137 Seiten
Reihe: Communications in Computer and Information Science
ISBN: 978-3-642-02633-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application, security protocol and its application, other security research.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;5
2;Organization;7
3;Table of Contents;9
4;Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections;11
4.1;Introduction;11
4.2;Key Exchange and Stream Cipher by Tree Parity Machines;12
4.2.1;Security and Attacks;13
4.3;Tree-Parity Machine Architecture Variants;14
4.4;Implementation and Results;16
4.5;TPMRA Bus Controller Implementation;18
4.6;Conclusions;19
4.7;References;19
5;A Security Metrics Development Method for Software Intensive Systems;21
5.1;Introduction;21
5.2;Security Metrics;22
5.3;Proposed Security Metrics Development Process;22
5.4;Threat and Vulnerability Analysis;23
5.5;Security Requirements;24
5.6;Decomposing Requirements;24
5.7;Measurement Architecture and Evidence Collection;25
5.8;Related Work;25
5.9;References;26
6;The ISDF Framework: Integrating Security Patterns and Best Practices;27
6.1;Introduction;27
6.2;Background;29
6.3;Related Work;30
6.4;The ISDF Framework;31
6.4.1;Requirements Stage;32
6.4.2;Design Stage;32
6.4.3;Implementation Stage;33
6.4.4;Post Implementation Stage;33
6.5;AnExample;33
6.5.1;Stage 1: Requirements;34
6.5.2;Stage 2: Design;35
6.6;Conclusion and Future Work;36
6.7;References;37
7;Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server;39
7.1;Introduction;39
7.2;Hardware Token Authentication;40
7.2.1;Certificate Based User Authentication;41
7.2.2;Certificate Based Authorization;42
7.2.3;A Working Infrastructure;42
7.3;Single-Sign-On;43
7.4;R\´esum\´e and Conclusions;46
7.5;References;46
8;Concurrency and Time in Role-Based Access Control;47
8.1;Introduction;47
8.2;Backgrounds on Petri Nets;48
8.3;Expressing Time and Concurrency;49
8.4;Analysis of TCRBAC;50
8.5;Tools Support;51
8.6;Summary;52
8.7;References;52
9;Performance Assessment Method for a Forged Fingerprint Detection Algorithm;53
9.1;Introduction;53
9.2;Related Works;54
9.3;Performance Evaluation Procedure;54
9.3.1;Evaluation Target and Evaluation Method Selection;55
9.3.2;Selecting the Test Sample and Environment;56
9.4;Sample Correction;56
9.5;Performance Evaluator for Forged Fingerprint Detection;57
9.6;Conclusion;59
9.7;References;59
10;An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings;60
10.1;Introduction;60
10.2;Preliminaries;61
10.3;Security Model;61
10.3.1;Communicational Model;62
10.3.2;Security Notions;62
10.4;The Novel PAKE Protocol;63
10.4.1;Our PAKE Protocol;63
10.4.2;Security Proof;63
10.4.3;Evaluation of Efficiency and Security;65
10.5;Conclusion;65
10.6;References;65
11;A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes;67
11.1;Introduction;67
11.2;Mobility Modeling of Ad-Hoc Nodes;68
11.3;Time Behavior Modeling of Nodes;69
11.3.1;Adaptive Time Behavior Model (ATBM);70
11.4;Mobility Model for Ad-Hoc Nodes;71
11.5;Numerical Results for Time Behavior of Nodes;72
11.6;Conclusion;76
11.7;References;77
12;Context-Based E-Health System Access Control Mechanism;78
12.1;Introduction;78
12.2;Related Work;79
12.3;Context-Aware Access Control Model;80
12.3.1;Contextual Model;80
12.3.2;Conceptual Framework;82
12.3.3;Authorization Framework;83
12.3.4;Policy Specification for Access to Services;85
12.4;Conclusions and Future Directions;86
12.5;References;86
13;Analysis of a Mathematical Model for Worm Virus Propagation;88
13.1;Introduction;88
13.2;Mathematical Modeling;88
13.2.1;SI Model;88
13.2.2;Two-Factor Model;89
13.2.3;SIQR Model;89
13.3;Simulation;92
13.4;Conclusion;94
13.5;References;94
14;A Contents Encryption Mechanism Using Reused Key in IPTV;95
14.1;Introduction;95
14.2;Related Works;96
14.3;Multicasting Contents Encryption Mechanism Using Reused Key;97
14.3.1;Media Contents Encryption Using Multicasting;97
14.3.2;Key Reuse Establishment Process between IPTV Terminal and Head-End;97
14.3.3;Establishment of a Group Key of Head-End;98
14.4;Performance Evaluation;98
14.5;Conclusion;100
14.6;References;100
15;High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform;101
15.1;Introduction;101
15.2;Suggested Scheme;102
15.2.1;Watermark Embedding;103
15.2.2;Watermark Extracting;104
15.3;Experimental Results;104
15.4;Conclusion;106
15.5;References;107
16;Experiment Research of Automatic Deception Model Based on Autonomic Computing;108
16.1;Introduction;108
16.2;Automatic Deception Conceptual Model;109
16.2.1;Model Structure;109
16.2.2;Service Transplant;109
16.2.3;Trapping Subnet;110
16.3;Mathematical Model of Autonomic Trap;111
16.4;Experimental Simulation;112
16.5;Conclusion;114
16.6;References;114
17;Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks;115
17.1;Introduction;115
17.2;Investigation of the Current WAFs;116
17.2.1;Poor Quality of Protection;117
17.3;Simplified Taxonomy of Web Attacks;117
17.4;Two Decision Modules for WAF;119
17.4.1;Attack-Decision Module;119
17.4.2;Priority-Decision Module;119
17.5;Conclusion and Future Work;120
17.6;References;120
18;Reconsidering Data Logging in Light of Digital Forensics;121
18.1;Introduction;121
18.2;Problems of Current Logging;122
18.3;Purpose-Based Forensic Logging;123
18.3.1;Collectable Logs;123
18.3.2;Features;124
18.3.3;Purpose and Log;125
18.4;Conclusion and Future Work;127
18.5;References;127
19;Blurriness in Live Forensics: An Introduction;129
19.1;Introduction;129
19.2;Meaning of Blurriness;130
19.3;Experimental Setup;132
19.3.1;How to Approach This Issue?;135
19.4;Conclusions;135
19.5;References;136
20;Author Index;137




