Advances in Information Security and Its Application -  Jong Hyuk Park,  Justin Zhan,  Changhoon Lee,  Guilin Wang,  Tai-hoon Kim,  Sang-Soo Yeo

Advances in Information Security and Its Application (eBook)

Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
eBook Download: PDF
2009 | 1. Auflage
X, 137 Seiten
Springer-Verlag
978-3-642-02633-1 (ISBN)
Systemvoraussetzungen
64,15 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application, security protocol and its application, other security research.

Preface 5
Organization 7
Table of Contents 9
Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections 11
Introduction 11
Key Exchange and Stream Cipher by Tree Parity Machines 12
Security and Attacks 13
Tree-Parity Machine Architecture Variants 14
Implementation and Results 16
TPMRA Bus Controller Implementation 18
Conclusions 19
References 19
A Security Metrics Development Method for Software Intensive Systems 21
Introduction 21
Security Metrics 22
Proposed Security Metrics Development Process 22
Threat and Vulnerability Analysis 23
Security Requirements 24
Decomposing Requirements 24
Measurement Architecture and Evidence Collection 25
Related Work 25
References 26
The ISDF Framework: Integrating Security Patterns and Best Practices 27
Introduction 27
Background 29
Related Work 30
The ISDF Framework 31
Requirements Stage 32
Design Stage 32
Implementation Stage 33
Post Implementation Stage 33
AnExample 33
Stage 1: Requirements 34
Stage 2: Design 35
Conclusion and Future Work 36
References 37
Client Hardware-Token Based Single Sign-On over Several Servers without Trusted Online Third Party Server 39
Introduction 39
Hardware Token Authentication 40
Certificate Based User Authentication 41
Certificate Based Authorization 42
A Working Infrastructure 42
Single-Sign-On 43
R/´esum/´e and Conclusions 46
References 46
Concurrency and Time in Role-Based Access Control 47
Introduction 47
Backgrounds on Petri Nets 48
Expressing Time and Concurrency 49
Analysis of TCRBAC 50
Tools Support 51
Summary 52
References 52
Performance Assessment Method for a Forged Fingerprint Detection Algorithm 53
Introduction 53
Related Works 54
Performance Evaluation Procedure 54
Evaluation Target and Evaluation Method Selection 55
Selecting the Test Sample and Environment 56
Sample Correction 56
Performance Evaluator for Forged Fingerprint Detection 57
Conclusion 59
References 59
An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings 60
Introduction 60
Preliminaries 61
Security Model 61
Communicational Model 62
Security Notions 62
The Novel PAKE Protocol 63
Our PAKE Protocol 63
Security Proof 63
Evaluation of Efficiency and Security 65
Conclusion 65
References 65
A New Analytical Model and Protocol for Mobile Ad-Hoc Networks Based on Time Varying Behavior of Nodes 67
Introduction 67
Mobility Modeling of Ad-Hoc Nodes 68
Time Behavior Modeling of Nodes 69
Adaptive Time Behavior Model (ATBM) 70
Mobility Model for Ad-Hoc Nodes 71
Numerical Results for Time Behavior of Nodes 72
Conclusion 76
References 77
Context-Based E-Health System Access Control Mechanism 78
Introduction 78
Related Work 79
Context-Aware Access Control Model 80
Contextual Model 80
Conceptual Framework 82
Authorization Framework 83
Policy Specification for Access to Services 85
Conclusions and Future Directions 86
References 86
Analysis of a Mathematical Model for Worm Virus Propagation 88
Introduction 88
Mathematical Modeling 88
SI Model 88
Two-Factor Model 89
SIQR Model 89
Simulation 92
Conclusion 94
References 94
A Contents Encryption Mechanism Using Reused Key in IPTV 95
Introduction 95
Related Works 96
Multicasting Contents Encryption Mechanism Using Reused Key 97
Media Contents Encryption Using Multicasting 97
Key Reuse Establishment Process between IPTV Terminal and Head-End 97
Establishment of a Group Key of Head-End 98
Performance Evaluation 98
Conclusion 100
References 100
High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform 101
Introduction 101
Suggested Scheme 102
Watermark Embedding 103
Watermark Extracting 104
Experimental Results 104
Conclusion 106
References 107
Experiment Research of Automatic Deception Model Based on Autonomic Computing 108
Introduction 108
Automatic Deception Conceptual Model 109
Model Structure 109
Service Transplant 109
Trapping Subnet 110
Mathematical Model of Autonomic Trap 111
Experimental Simulation 112
Conclusion 114
References 114
Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks 115
Introduction 115
Investigation of the Current WAFs 116
Poor Quality of Protection 117
Simplified Taxonomy of Web Attacks 117
Two Decision Modules for WAF 119
Attack-Decision Module 119
Priority-Decision Module 119
Conclusion and Future Work 120
References 120
Reconsidering Data Logging in Light of Digital Forensics 121
Introduction 121
Problems of Current Logging 122
Purpose-Based Forensic Logging 123
Collectable Logs 123
Features 124
Purpose and Log 125
Conclusion and Future Work 127
References 127
Blurriness in Live Forensics: An Introduction 129
Introduction 129
Meaning of Blurriness 130
Experimental Setup 132
How to Approach This Issue? 135
Conclusions 135
References 136
Author Index 137

Erscheint lt. Verlag 1.1.2009
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Hardware
Schlagworte authentication • autonomic computing • Cryptographic Hardware • data hiding • Data Security • digital forensics • E-Health • fingerprint detection • Firewall • hardware token • IPTV • ISDF • Key exchange • Manet • Networks • role-based access • security • security metrics • security patterns • virus pro • Worm
ISBN-10 3-642-02633-8 / 3642026338
ISBN-13 978-3-642-02633-1 / 9783642026331
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 3,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99