Catálogo de publicaciones - libros
Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings
Costas Lambrinoudakis ; Günther Pernul ; A Min Tjoa (eds.)
En conferencia: 4º International Conference on Trust, Privacy and Security in Digital Business (TrustBus) . Regensburg, Germany . September 3, 2007 - September 7, 2007
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Computers and Society; Management of Computing and Information Systems; Data Encryption; Computer Communication Networks; Systems and Data Security; IT in Business
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-74408-5
ISBN electrónico
978-3-540-74409-2
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2007
Cobertura temática
Tabla de contenidos
Situation-Based Policy Enforcement
Thomas Buntrock; Hans-Christian Esperer; Claudia Eckert
Current operating systems enforce access control policies based on completely static rules, a method originating from a time where computers were expensive and had to serve several users simultaneously. Today, as computers are cheap, a trend to mobile workstations can be realized, where a single device is used to perform a task under unpredictable, . However, the static access rules still remain, while their use in mobile environments is limited, because in changing environments, access rights must constantly be adjusted to guarantee data integrity in all situations. With dynamically adjusting rules, in turn, it is not sufficient anymore to check access to data only once; instead, access rights must be revalidated every time data is actually accessed, even if part of that data is cached by an application. In this paper, we present a method to dynamically and retrospectively enforce access control policies based on the context a device is operating in, while tracing data beyond disk accesses.
- Session 6: Policy Management | Pp. 190-200
Using Purpose Lattices to Facilitate Customisation of Privacy Agreements
Wynand van Staden; Martin S. Olivier
Protecting the privacy of individuals demands that special care be taken with the handling of an individual’s personal information. Either the system should store as little or no user data at all, or it should protect access to the data in cases where it is necessary that data has to be stored. A common approach to the protection of PII (in a privacy aware system) is to associate a set of purposes with the PII which indicates the enterprise’s use of the data.
Purposes placed in a hierarchical structure (such as a lattice) can subsume each other, which can provide flexibility in the customisation of a privacy agreement. In this article the customisation of privacy agreements using purposes placed in a lattice is considered. In particular minimal acceptance levels, maximal acceptance levels, validation and invalidation of agreements with respect to purpose lattices are introduced.
- Session 6: Policy Management | Pp. 201-209
A Pattern-Driven Framework for Monitoring Security and Dependability
Christos Kloukinas; George Spanoudakis
In this paper we describe a framework that supports the dynamic configuration, adaptation and monitoring of systems that need to guarantee specific security and dependability (S&D) properties whilst operating in distributed settings. The framework is based on providing abstract specifications of implementation solutions that can be used by systems in order to achieve specific S&D properties. The focus herein will be on the monitoring aspects of the framework which allow it to adapt to violations of the S&D requirements and changes to the current context.
- Session 6: Policy Management | Pp. 210-218
Security Aspects for Secure Download of Regulated Software
Sibylle Hick; Christoph Ruland
Software can be found in a lot of different infrastructures in our daily life e.g. mobile phones, cars, or ticket machines. Due to always increasing requirements or failures in programs, updates are needed at all times and mean a great cost and time advantage. Not always can the technical possibility to download software components be realized right away because various security issues or legal restraints have to be taken into account. This paper introduces a security architecture for regulated software download that is performed in the area of measuring instruments but can also be applied for other infrastructures. Therefore at first the legal requirements in which the software download is performed – here the liberalized energy market - is introduced. Furthermore different security requirements that are necessary to connect the technical and legal needs are presented. The analysis of the legal situation, the participants, resources, and threads draws a total picture of the system. Starting from these conclusions an infrastructure that supports the different security aspects will be presented.
- Session 7: Security System Management | Pp. 219-227
Using the Lens of Circuits of Power in Information Systems Security Management
Christos Fragos; Maria Karyda; Evangelos Kiountouzis
This paper uses the perspective of power in the study of IS security management. We explore the role of power in the implementation of an information systems security policy, using the Circuits of Power as a Framework for the analysis. A case study research was conducted in a public sector organization that introduced a security policy in order to comply with the law. The authors interviewed members of the organization to explore the different aspects of power relations which were intertwined with the implementation of the policy and used the Circuits of Power to analyze the data gathered. The conclusions derived from the analysis illustrate the role of power in the policy implementation process and indicate that a power perspective provides useful insight in the study of factors affecting the implementation of security policies.
- Session 7: Security System Management | Pp. 228-236
Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets
Stefan Schmidt; Robert Steele; Tharam Dillon
Today, the Internet provides an alternative platform where service consumers and service providers can exchange goods and services at electronic marketplaces (e-Markets). In second generation e-Markets consumers and providers have the opportunity to use autonomous agents to act on their behalf to discover, select, and negotiate with potential business partners. Agents can close contracts, make payments, monitor and review contract compliance. Information about the trustworthiness, reputation and the credibility of services, service providers, retailers, and entire business domains is crucial for the assessment of business partners during the service selection process in marketplaces. Agent owners expect their agents to follow social principles and values found in traditional marketplaces. In this paper we discuss the framework which enables autonomous agents to evaluate social information which is then used for service selection. Furthermore, agents will are able to review ongoing or completed business interactions for the benefit of peers and their own future decisions. We simulate how the service selection process progresses through new information drawn from reviews of past business interactions.
- Session 7: Security System Management | Pp. 237-247
X316 Security Toolbox for New Generation of Certificate
Rachid Saadi; Jean Marc Pierson; Lionel Brunie
Most of industrial or public domains involve a trusted and distributed infrastructure which provides individuals digital credentials and certificates. These latter allow their owner to authenticate herself, prove her rights and gain access inside trusted organizations. The certificate usability scope is extended to contain more and more information, where someones can be considered as sensitive. Contrary to existing certificate standards, we aim to provide a flexible format of certificate enabling to disclose, to blind and to cipher any authorized part of a certificate according to the user context, environment and willing. In this paper, we define and describe a new certificate model called: ”X316” and we supply a security toolbox (i.e. X316 Signature, X316 Encryption and X316 Context) allowing its owner for managing her certificate freely according to contextual situation.
- Session 8: Security and Trust | Pp. 248-258
Detecting Malicious SQL
José Fonseca; Marco Vieira; Henrique Madeira
Web based applications often have vulnerabilities that can be exploited to launch SQL-based attacks. In fact, web application developers are normally concerned with the application functionalities and can easily neglect security aspects. The increasing number of web attacks reported every day corroborates that this attack-prone scenario represents a real danger and is not likely to change favorably in the future. However, the main problem resides in the fact that most of the SQL-based attacks cannot be detected by typical intrusion detection systems (IDS) at network or operating system level. In this paper we propose a database level IDS to concurrently detect malicious database operations. The proposed IDS is based on a comprehensive anomaly detection scheme that checks SQL commands to detect SQL injection and analyses transactions to detect more elaborate data-centric attacks, including insider attacks.
- Session 8: Security and Trust | Pp. 259-268
Trusted Code Execution in JavaCard
Antonio Maña; Antonio Muñoz
Some important problems in information security such as software protection, watermarking and obfuscation have been proved to be impossible to solve with software-based solutions. By protecting certain actions in order to guarantee that they are executed as desired, trivial solutions to those problems can be implemented. For tamperproof hardware devices such as smart cards to serve this purpose they must provide the capability to execute code on-the-fly. This paper presents mechanism to allow dynamic code execution in Java Card in order for these cards to be used in software protection problems. However, the solution can be used in other applications.
- Session 8: Security and Trust | Pp. 269-279
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards
Detlef Hühnlein; Manuel Bach
The forthcoming ISO/IEC 24727 series of standards defines application programming interfaces for smart cards and is expected to provide a major contribution to the global interoperability of smart cards and card-applications. However it assumes in part 2 [8] that certain information concerning the capabilities of the card and its (cryptographic) applications is stored itself. As already issued smart cards do not provide the required structures, the significance of ISO/IEC 24727 for billions (see [5]) of “legacy cards” seems to be questionable. In order to overcome this problem, the present paper introduces an alternative approach, which does but provides the information which is necessary to map generic requests to card-specific APDUs to the middleware in form of XML-based -files.
- Session 8: Security and Trust | Pp. 280-289