Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
Transactions on Computational Science IV: Special Issue on Security in ComputingMarch 2009
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-3-642-01003-3
Published:27 March 2009
Pages:
262
Skip Bibliometrics Section
Reflects downloads up to 18 Nov 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
chapter
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines

Trusted computing platforms aim to provide trust in computations performed by sensitive applications. Verifying the integrity of memory contents is a crucial security service that these platforms must provide since an adversary able to corrupt the ...

chapter
Behavioural Characterization for Network Anomaly Detection

In this paper we propose a methodology for detecting abnormal traffic on the net, such as worm attacks, based on the observation of the behaviours of different elements at the network edges. In order to achieve this, we suggest a set of critical ...

chapter
The Power of Anonymous Veto in Public Discussion

The Dining Cryptographers problem studies how to securely compute the boolean-OR function while preserving the privacy of each input bit. Since its first introduction by Chaum in 1988, it has attracted a number of solutions over the past twenty years.

...

chapter
Collusion-Resistant Message Authentication in Overlay Multicast Communication

This paper aims at providing message authentication service in overlay multicast. Previous work has mostly focused on the network layer IP multicast and not as much work has been done on the application layer overlay multicast. A main feature of overlay ...

chapter
A Model for Authentication Credentials Translation in Service Oriented Architecture

Due to the increasing number of service providers, the grouping of these providers following the federation concept and the use of the Single Sign On (SSO) concept are helping users to gain a transparent access to resources, without worrying about their ...

chapter
Secure and Efficient Group Key Agreements for Cluster Based Networks

Ad hoc wireless networks offer anytime-anywhere networking services for infrastructure-free communication over the shared wireless medium. The proliferation of portable devices and ad hoc networks have led to the need for security services. This is ...

chapter
An Integrated ECC-MAC Based on RS Code

This paper presents a message authentication code (MAC) with error-correcting capabilities which can be used for wireless transmission. Also the paper introduces a new nonlinear mixing function `<em>Nmix</em> ' which is cryptographically strong compared ...

chapter
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks

A vehicle can be tracked by monitoring the messages broadcast from it. The broadcast by a source contains its current identity and also allows estimation of its location by receivers. This mapping between the physical entity and the estimated location ...

chapter
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools

Several advanced Role based access control (RBAC) models have been developed supporting specific features (i.e.: role hierarchy, separation of duty) to achieve high flexibility. However, integrating additional features also increases their design ...

chapter
Role Based Access Control with Spatiotemporal Context for Mobile Applications

Role based access control (RBAC) is an established paradigm in resource protection. However, with the proliferation of mobile computing, it is being frequently observed that the RBAC access decision is directly influenced by the spatiotemporal context ...

chapter
A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior

The aim is to propose a new approach for stochastic modeling of an intrusion process and quantitative evaluation of the probability of the attacker success. In many situations of security analysis, it is necessary to obtain the probabilities of success ...

chapter
A Hardware Architecture for Integrated-Security Services

There are numerous techniques, methods and tools to promote the security of a digital system, however, each day the mechanisms of attack evolve and are integrated, creating separate spheres of combined attacks. In this context, this paper presents an ...

chapter
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology

This paper explores the resistance of MOS Current Mode Logic (MCML) against attacks based on the observation of the power consumption. Circuits implemented in MCML, in fact, have unique characteristics both in terms of power consumption and the ...

chapter
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection

Conventional approaches to either information flow security or intrusion detection are not suited to detecting Trojans that steal information such as credit card numbers using advanced cryptovirological and inference channel techniques. We propose a ...

Contributors
  • University of Calgary
  • Queen's University Belfast
  • Federal University of Sergipe

Index Terms

  1. Transactions on Computational Science IV: Special Issue on Security in Computing

        Reviews

        Edgar R. Weippl

        The Springer book series "Transactions on Computational Science" covers research in parallel and distributed environments; the special issue on security in computing addresses a wide range of timely topics, such as cryptographic protocols or tools. The 14 well-reviewed papers included in the book range from hardware mechanisms for memory authentication to detecting covert channels that leak information. I selected two papers to describe in a little more detail. In "Role-based access control [(RBAC)] with spatiotemporal context for mobile applications," the authors extend RBAC with spatiotemporal constraints limiting access to objects. For example, in the proposed domain of healthcare, doctors should only be allowed to see the files of patients that are in their hospital during working hours. Spatiotemporal aspects are not confined to role activation, but can also be part of the permission set. In this way, the extension is similar to the approach of Mark Strembeck [1], who also extends the permissions with constraints and does not limit constraints to role activation or assignment. In "Putting Trojans on the horns of a dilemma: redundancy for information theft detection," the idea is to detect possibly unauthorized information flows by "measuring explicitly everything that could have happened." Since low-bandwidth covert channels are almost impossible to prevent, the authors propose to define policies that limit the bandwidth (and prove an upper bound) instead of trying to prevent all unauthorized flows. Access to individual articles is possible via Springer's digital library [2]. As Amazon sells the book for almost $90 US, readers are more likely to access individual articles electronically and not purchase the printed copy. Online Computing Reviews Service

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Please enable JavaScript to view thecomments powered by Disqus.

        Recommendations