Catálogo de publicaciones - libros
Information Security: 9th International Conference; ISC 2006, Samos Island, Greece, August 30: September 2, 2006, Proceedings
Sokratis K. Katsikas ; Javier López ; Michael Backes ; Stefanos Gritzalis ; Bart Preneel (eds.)
En conferencia: 9º International Conference on Information Security (ISC) . Samos, Greece . August 30, 2006 - September 2, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Data Encryption; Operating Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Special Purpose and Application-Based Systems; Management of Computing and Information Systems
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-38341-3
ISBN electrónico
978-3-540-38343-7
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11836810_31
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation
K. Anagnostakis; S. Ioannidis; A. D. Keromytis; M. B. Greenwald
defensive systems communicate and cooperate in their to worm attacks, but determine the presence of a worm attack solely on local information. worm detection and immunization systems track suspicious behavior at multiple cooperating nodes to determine a worm attack is in progress. Earlier work has shown that cooperative systems can respond quickly to day-zero worms, while distributed defensive systems allow detectors to be more conservative (i.e. paranoid) about potential attacks because they manage false alarms efficiently.
In this paper we begin a preliminary investigation into the complex tradeoffs in such systems between communication costs, computation overhead, accuracy of the local tests, estimation of viral virulence, and the fraction of the network infected before the attack crests. We evaluate the effectiveness of different system configurations in various simulations. Our experiments show that distributed algorithms are better able to balance effectiveness against viruses with reduced cost in computation and communication when faced with false alarms. Furthermore, cooperative, distributed systems seem more robust against malicious participants in the immunization system than earlier cooperative but non-distributed approaches.
- Intrusion Detection and Worms | Pp. 427-442
doi: 10.1007/11836810_32
An Authentication and Key Exchange Protocol for Secure Credential Services
SeongHan Shin; Kazukuni Kobara; Hideki Imai
In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. The LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Diffie-Hellman problem.
- Key Exchange | Pp. 443-458
doi: 10.1007/11836810_33
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders
Yvo Desmedt; Josef Pieprzyk; Ron Steinfeld; Huaxiong Wang
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among ≥2+1 parties which simultaneously achieves all of the following properties:
1. Key Privacy (including forward security) against active attacks by group ,
2. Non-malleability — meaning in particular that no subset of up to corrupted group can ‘fix’ the agreed key to a desired value, and
3. Robustness against denial of service attacks by up to corrupted group .
Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.
- Key Exchange | Pp. 459-475
doi: 10.1007/11836810_34
Formalising Receipt-Freeness
H. L. Jonker; E. P. de Vink
Receipt-freeness is the property of voting protocols that a voter cannot create a receipt which proves how she voted. Since Benaloh and Tuinstra introduced this property, there has been a large amount of work devoted to the construction of receipt-free voting protocols. This paper provides a generic and uniform formalism that captures the notion of a receipt. The formalism is then applied to analyse the receipt-freeness of a number of voting protocols.
- Security Protocols and Formal Methods | Pp. 476-488
doi: 10.1007/11836810_35
Enhancing the Security and Efficiency of 3-D Secure
Mohammed Assora; Ayoub Shirvani
Security is a major concern for all involved in E-Commerce and particularly in the case of online transactions using debit/credit card. Following the failure of Secure Electronic Transaction (SET), 3-D Secure is an emerging industry standard for online transaction security. Although 3-D Secure is a well designed protocol, it is still prone to some security problems and excessive numbers of messages which could reduce the speed of transaction. This paper uses a new cryptographic technique based on password only authentication and key exchange to present a new vision for 3-D Secure. The new vision covers the security problems and reduces the number of messages for 3-D Secure. Moreover, the new vision has the development ability to simulate SSL/TLS in its simplicity and at the same time abolishes SSL/TLS security glitches. This simplicity and security are the necessary factors for online transaction protocol to be the future standard.
- Security Protocols and Formal Methods | Pp. 489-501
doi: 10.1007/11836810_36
Designing and Verifying Core Protocols for Location Privacy
David von Oheimb; Jorge Cuellar
Geographic privacy services provide location information on roaming targets to location recipients via location servers, in a way that protects the privacy of the individuals involved. In this paper we propose and discuss new protocols representing the core of Geopriv, with particular focus on the security requirements stated in the IETF’s RFC 3693. Using the AVISPA tool, we check that these requirements, namely anonymity against the location server, as well as confidentiality, integrity, and authenticity of the location information, are actually met. In the design phase of such protocols, numerous variants are to be considered and evaluated. Here the use of model checkers turns out to be very helpful in exploring the security implications quickly and precisely.
- Security Protocols and Formal Methods | Pp. 502-516
doi: 10.1007/11836810_37
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches
Mila Katzarova; Andrew Simpson
The development of infrastructures to facilitate the sharing of data for healthcare delivery and research purposes is becoming increasingly widespread. In addition to the technical requirements pertaining to efficient and transparent sharing of data across organisational boundaries, there are requirements pertaining to ethical and legal issues. Functional and non-functional concerns need to be balanced: for resource sharing to be as transparent as possible, an entity should be allowed to delegate a subset of its rights to another so that the latter can perform actions on the former’s behalf, yet such delegation needs to be performed in a fashion that complies with relevant legal and ethical restrictions. The contribution of this paper is twofold: to characterise the requirements for secure and flexible delegation within the emerging distributed healthcare context; and to evaluate existing approaches with respect to these requirements. We also suggest how some of these limitations might be overcome.
- Information Systems Security | Pp. 517-529
doi: 10.1007/11836810_38
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness
Jose M Torres; Jose M Sarriegi; Javier Santos; Nicolás Serrano
For how long can a business remain without its information systems? Current business goals and objectives highly depend on their availability. This highly dynamic and complex system must be properly secured and managed in order to ensure business survivability. However, the lack of a universally accepted information security critical factors’ taxonomy and indicators make security management of information systems (SMIS) a tough challenge. Effective information security management requires special focus on identifying the critical success factors (CSFs) when implementing and ensuring SMIS. The purpose of this paper is to share a group of 12 CSFs identified in the current information security literature as well as a set of 76 indicators which are easy to calculate and attempt to provide valuable information to organizations seeking information security level measurements.
- Information Systems Security | Pp. 530-545