E-Book, Englisch, Band 29, 170 Seiten
Kiumi / Kim Advances in Security Technology
1. Auflage 2009
ISBN: 978-3-642-10240-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
E-Book, Englisch, Band 29, 170 Seiten
Reihe: Communications in Computer and Information Science
ISBN: 978-3-642-10240-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008. The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008).
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;5
2;Organization;6
3;Table of Contents;9
4;Security Analysis of “A Novel Elliptic Curve Dynamic Access Control System”;11
4.1;Introduction;11
4.2;Review the WWC-Scheme;13
4.2.1;The Operations of the Elliptic Curve;13
4.2.2;The WWC-Scheme;14
4.2.3;Inserting New Security Class;16
4.2.4;Adding Ordered Relationships;16
4.2.5;Deleting Relationships;17
4.2.6;The Security Analysis and Discussion;18
4.3;On the Security of WWC-Scheme;20
4.3.1;The Novel Exterior Attack;21
4.3.2;On the Security of Adding Ordered Relationships in WWC-Scheme;22
4.4;Conclusions;23
4.5;References;23
5;VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions;25
5.1;Introduction;25
5.2;Background Study;26
5.2.1;Session Initiation Protocol (SIP);26
5.2.2;Types of VoIP SPAM;27
5.2.3;Adapting Anti-spam Solutions for Email Field to VoIP Service;28
5.2.4;Feature of SPAM Caller;28
5.2.5;Cost of VoIP SPAM Call;30
5.3;VoIP SPAM Response System;30
5.4;Implementation of a Phased ANTI-SPIT Framework;31
5.4.1;Graylist Module and SPIT Level Decision Model;33
5.4.2;SPIT Level Decision Algorithm;33
5.4.3;SIP_SPF Module;35
5.4.4;Easy SPAM Reporter Module;37
5.5;Experiments;38
5.5.1;Evaluation Factors for Spam Filters;38
5.5.2;Experimental Results;39
5.6;Conclusion and Future Work;39
5.7;References;40
6;Feature Extraction for IRIS Recognition;41
6.1;Introduction;41
6.2;Previous Works;43
6.3;Our Work;45
6.3.1;24-bit Bitmap Color Image to 8-bit Gray Scale Conversion;45
6.3.2;IRIS Edge Detection;46
6.3.3;IRIS Effective Region Extraction and Pattern Generation;46
6.4;Result;47
6.5;Conclusion;48
6.6;References;49
7;Bidirectional Quantum Secure Direct Communication Based on Entanglement;50
7.1;Introduction;50
7.2;QSDC Protocol;52
7.3;Security Analysis;55
7.4;Conclusions;58
7.5;References;58
8;Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux;60
8.1;Introduction;60
8.2;Discretionary Access Control Mechanism of Linux;61
8.2.1;Unix-Like POSIX Permissions System;61
8.2.2;Capabilities;62
8.2.3;ACL;62
8.3;Mandatory Access Control Mechanism of Linux (SELinux);62
8.3.1;Architecture and Principle of SELinux;62
8.3.2;Policy Configuration of SELinux;63
8.3.3;Evaluation of SELinux;64
8.4;A New Mandatory Access Control Mechanism;64
8.4.1;LYSLinux Access Control Model;65
8.4.2;Description of Security Policy;66
8.4.3;Storage and Management of Security Policy;68
8.5;Prototype Design and Implementation;69
8.5.1;Security Facilities Inside Linux Kernel;69
8.5.2;Structural Design of LYSLinux Access Control Module;71
8.5.3;Process Design of Mandatory Access Control Based on LYSLinux;72
8.5.4;Prototype Implementation;73
8.6;Prototype Test and Results;74
8.7;Summary;75
8.8;References;75
9;Research on Streaming Data Integration System about Security Threat Monitor;77
9.1;Introduction;77
9.1.1;Limitations of the Current System;77
9.1.2;Requirements in Reality;78
9.1.3;Our Solution;78
9.1.4;Paper Organization;79
9.2;Related Work;80
9.2.1;Existing Network Monitor System;80
9.2.2;Data Stream Management System;80
9.3;Desiderata for GS-TMS System;81
9.3.1;Continuous;81
9.3.2;Automatic and Robust;81
9.3.3;Transparent;81
9.3.4;Efficient;81
9.3.5;Simple;81
9.4;The System Architecture;81
9.4.1;The Components of the System;81
9.4.2;Log to Stream;83
9.4.3;Stream Schema Matching;84
9.4.4;Query Language;84
9.4.5;Query Rewriting;84
9.4.6;Broken Mapping Detection;85
9.4.7;Summarization;85
9.5;Evaluation Design;85
9.6;Conclusion;87
9.7;References;87
10;Using Honeypots to Secure E-Government Networks;89
10.1;Introduction;89
10.2;E-Government;90
10.3;Honeypots;91
10.3.1;Physical Honeypot;93
10.3.2;Virtual Honeypot;93
10.3.3;Advantages and Disadvantages of Various Kinds of Honeypots;93
10.3.4;Honeynet and Honeywall;94
10.4;The Proposed Model of a Fault Tolerance Honeynet for Securing E-Government;94
10.5;Conclusion;97
10.6;References;97
11;Trust-Risk-Game Based Access Control in Cross Domain Application;99
11.1;Introduction;99
11.2;Related Work;101
11.3;Access Control Mechanism Based on Trust and Risk;102
11.4;Formal Game Model;104
11.5;Trust Conception and Evaluation;106
11.6;Risk Definition and Assessment;107
11.7;Scenario Description Example;108
11.7.1;Trust Evaluation;108
11.7.2;Risk Assessment;108
11.7.3;Analysis with Game Model;109
11.8;Future Work and Conclusions;110
11.9;References;111
12;Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis;113
12.1;Introduction;113
12.2;Preliminaries;114
12.2.1;Notations;114
12.2.2;Extended Feistel Network;114
12.2.3;Differential Cryptanalysis;115
12.2.4;Impossible Differential Characteristics;115
12.3;Provable Security for EFN against DC;117
12.4;Impossible Differential Characteristics of EFN;124
12.5;Conclusion;126
12.6;References;126
12.7;A Tables and Diagrams;127
13;Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment;132
13.1;Introduction;132
13.2;Related Work;133
13.3;Use Case Precedence Diagrams and the Construction Sequence;134
13.4;Experimental Design;135
13.4.1;Variables Selection;136
13.4.2;Subjects;136
13.4.3;Materials and Case Studies;136
13.4.4;Tasks Performed during the Experiment;137
13.5;Results;137
13.5.1;Comparison between Ad-hoc and UCPD;138
13.5.2;Comparison between Ad-hoc and UCPD in the Same Case Study;139
13.5.3;Comparison between Case Studies Using UCPD;140
13.5.4;Qualitative Results;141
13.6;Discussion;143
13.6.1;Threats to Construct Validity;143
13.6.2;Threats to Internal Validity;143
13.6.3;Threats to External Validity;143
13.7;Conclusions and Future Work;144
13.8;References;144
13.9;Appendix: Results from Questionnaires;145
14;Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework;148
14.1;Introduction;148
14.2;Rationale;149
14.3;Coordination and Management;149
14.3.1;Project Coordination in the Agile Environment;149
14.3.2;Deriving Project Value Tasks;150
14.4;Temporal Probabilistic Reasoning;151
14.4.1;The Fundamental Theory;151
14.4.2;The Emergent Situation Awareness Technology;152
14.5;Experimental Analysis and Interpretation;153
14.5.1;The ESA as Applied to Software Projects;153
14.5.2;Task Acceptance Patterns;154
14.5.3;Task Completion Patterns;155
14.5.4;Profitability Analysis Patterns;157
14.6;Implications and Future Work;159
14.7;References;159
15;A Secured Technique for Image Data Hiding;161
15.1;Introduction;161
15.2;Related Works;162
15.3;Our Work;164
15.3.1;SIDH_MAIN (TargetImage, CoverImage);164
15.3.2;PAD (PICTURE, SIZE);165
15.3.3;SIDH_ENC (PICTURE_1, PICTURE_2, SIZE);165
15.3.4;SIDH_DEC (PICTURE_1, PICTURE_2, SIZE);166
15.4;Result and Discussion;167
15.4.1;Complexity Analysis of the Stated Algorithm;167
15.4.2;Test Results;167
15.5;Conclusion;168
15.6;References;169
16;Author Index;170




