Filters








5,439 Hits in 6.6 sec

An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks

Sahel Alouneh, Feras Al-Hawari, Ismail Hababeh, Gheorghita Ghinea
2018 Security and Communication Networks  
The need for effective approaches to handle big data that is characterized by its large volume, different types, and high velocity is vital and hence has recently attracted the attention of several research  ...  Another aspect that is equally important while processing big data is its security, as emphasized in this paper. Accordingly, we propose to process big data in two different tiers.  ...  The proposed technique uses a semantic relational network model to mine and organize video resources based on their associations, while the authors in [11] proposed a Dynamic Key Length based Security  ... 
doi:10.1155/2018/8028960 fatcat:fcg5eyrp3verdf3k2b3xkhmooq

Modelling methods for web application verification and testing: state of the art

Manar H. Alalfi, James R. Cordy, Thomas R. Dean
2009 Software testing, verification & reliability  
Based on a short catalogue of desirable properties of web applications that require analysis, two different views of the methods are presented: a general categorization by modeling level, and a detailed  ...  Verification and testing of web software requires effective modeling techniques that address the specific challenges of web applications.  ...  (GSDA07) [62] propose a verification framework dedicated to security policies in web design.  ... 
doi:10.1002/stvr.401 fatcat:oklbi4yddraw7gdmo6qzplw74u

Cross-tier, label-based security enforcement for web applications

Brian J. Corcoran, Nikhil Swamy, Michael Hicks
2009 Proceedings of the 35th SIGMOD international conference on Management of data - SIGMOD '09  
, relatively easy to use, and, when compared to a single-tier approach, improves throughput by nearly an order of magnitude.  ...  SE-Links provides a uniform programming model, in the style of LINQ and Ruby on Rails, with language syntax for accessing objects residing either in the database or at the server.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
doi:10.1145/1559845.1559875 dblp:conf/sigmod/CorcoranSH09 fatcat:bc2zqdokk5hqvhf5e7cbiksccy

Data authentication and anonymization in IoT scenarios and future 5G networks using chaotic Digital Watermarking

Borja Bordel, Ramon Alcarria, Tomas Robles, Marcos Sanchez Iglesias
2021 IEEE Access  
To generate keys in a secure and simple manner, physical unclonable functions are employed.  ...  Besides, to reduce as much as possible the computational cost of algorithms, chaotic dynamics will be considered.  ...  In particular, we have selected PRISM model checker, because of its extensive employment in security formal verification. We are using PRISM 4.6 [53] .  ... 
doi:10.1109/access.2021.3055771 fatcat:qwawkrrp4fdenhpjkep5jwhaju

Building secure web applications

George V. Neville-Neil
2007 Queue  
As of today, the majority of the known approaches fall short of ensuring security across tiers.  ...  The framework utilizes homogeneous meta-programming to provide a uniform language for programming different components.  ...  We provide two variants of the location-based service to showcase two different attacker models.  ... 
doi:10.1145/1281881.1281889 fatcat:5sylpszp4zeb3j25zjn2wiors4

Bridging the gap between web application firewalls and web applications

Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
2006 Proceedings of the fourth ACM workshop on Formal methods in security - FMSE '06  
We have done a prototype implementation of our approach building on an existing static verification tool for Java, and we have applied our approach to a medium-sized J2EE based web application.  ...  The main contribution of this paper is that it shows how, through a combination of static and dynamic verification, WAFs can formally guarantee the absence of certain kinds of erroneous behaviour in web  ...  ACKNOWLEDGEMENTS The authors would like to thank Wolfram Schulte (from Microsoft Research), Bart Jacobs, Adriaan Moors and Jan Smans (from the Katholieke Universiteit Leuven) for their useful comments  ... 
doi:10.1145/1180337.1180344 dblp:conf/ccs/DesmetPJV06 fatcat:7fles7o7lfdfjnlqnezdnidtya

RAIDER: Responsive architecture for inter-domain economics and routing

Nirmala Shenoy, Murat Yuksel, Aparna Gupta, Koushik Kar, Victor Perotti, Manish Karir
2010 2010 IEEE Globecom Workshops  
Architectural solutions providing ways to better inter-domain economics and more scalable inter-domain routing protocols are of crucial importance.  ...  Further, scalability of BGP routing table sizes is becoming a stressing problem.  ...  Therefore, we envision that technologies at each tier of the FCT model must actively involve in SLA verification.  ... 
doi:10.1109/glocomw.2010.5700334 fatcat:dnhtscl2nrcr5hwacpukb6tcu4

Bridging the Gap between Web Application Firewall and Web Applications

Salman Khan
2021 International Journal for Research in Applied Science and Engineering Technology  
We have shown that with a combination of static and dynamic verification, WAFs can officially verify the absence of certain types of misconduct in web applications.  ...  In this paper, we give a chart of development filtering models and a couple suggestions to benefit the upside of web application firewall.  ...  ACKNOWLEDGEMENTS With great pleasure we want to take this opportunity to express our heartfelt gratitude to all those who have helped to make this work a great success. Thanks to Mrs.  ... 
doi:10.22214/ijraset.2021.34087 fatcat:xpvdsx65qrfvxl6zq3idfr3jx4

Re-designing the Web's Access Control System [chapter]

Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu
2011 Lecture Notes in Computer Science  
We believe that the Web's current access control models are fundamentally inadequate to satisfy the protection needs of today's web, and they need to be redesigned.  ...  Although various security solutions have been proposed to address the problems on the Web, few have addressed the root causes of why web applications are so vulnerable to these many attacks.  ...  We would like to acknowledge their contributions.  ... 
doi:10.1007/978-3-642-22348-8_2 fatcat:desga7je2ze2vmu5bju3qe6yim

Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies

L. Desmet, P. Verbaeten, W. Joosen, F. Piessens
2008 IEEE Transactions on Software Engineering  
We have developed a prototype implementation of our approach, building on the JML annotation language and the existing static verification tool ESC/Java2, and we successfully applied our approach to a  ...  This vulnerability can lead to a variety of erroneous behavior at runtime and can easily be triggered by a malicious user by applying attack techniques such as forceful browsing.  ...  ACKNOWLEDGMENT The authors would like to thank Wolfram Schulte (from Microsoft Research), Bart Jacobs, Adriaan Moors, and Jan Smans (from the Katholieke Universiteit Leuven) for their useful comments and  ... 
doi:10.1109/tse.2007.70742 fatcat:dkw3scuvqjhajh3xvs7tj44uou

Two-tiered face verification with low-memory footprint for mobile devices

Rafael Soares Padilha, Fernanda Andalo, Gabriel Bertocco, Waldir Almeida, William Dias, Thiago Resek, Ricardo Torres, Jacques Wainer, Anderson Rocha
2020 IET Biometrics  
The proposed experiments show that the solution outperforms state of the art face verification methods, providing a 4× speedup when processing an image in recent smartphone models.  ...  To train a CNN for the verification task, the authors propose a hybrid-image input, which allows the network to process encoded information of a pair of face images.  ...  A popular approach is model compression, where a CNN model is compressed in a lossy process, decreasing model size while trying to maintain ACC.  ... 
doi:10.1049/iet-bmt.2020.0031 fatcat:wjjjngytebb57lq42mkmaktcv4

HC-BGP: A light-weight and flexible scheme for securing prefix ownership

Ying Zhang, Zheng Zhang, Z. Morley Mao, Y. Charlie Hu
2009 2009 IEEE/IFIP International Conference on Dependable Systems & Networks  
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure.  ...  However, due to the implicit trust assumption among networks, Internet routing remains quite vulnerable to various types of misconfiguration and attacks.  ...  In summary, HC-BGP is a light-weight approach to provide prefix ownership security without a global PKI.  ... 
doi:10.1109/dsn.2009.5270359 dblp:conf/dsn/ZhangZMH09 fatcat:4d3zgxubonbt7ovf6kptsnf434

A Survey on Blockchain-based Internet Service Architecture: Requirements, Challenges, Trends and Future

Wenli Yang, Erfan Aghasian, Saurabh Garg, David Herbert, Leandro Disiuta, Byeong Kang
2019 IEEE Access  
Furthermore, we provide a comprehensive review to conceptualize the blockchain-based framework to develop the decentralized protocols for the extensive number of Internet services.  ...  This comprehensive survey aims to address blockchain integration to secure Internet services and identify the critical requirements of developing a decentralized trustworthy Internet service.  ...  The authors would like to thank all group members for providing references and suggestions related to our research field.  ... 
doi:10.1109/access.2019.2917562 fatcat:kvek7yvzs5fvxhvorq5rcjozji

Challenges in Formal Methods for Testing and Verification of Cloud Computing Systems

Amjad Gawanme, Ahmad Alomari
2015 Scalable Computing : Practice and Experience  
The design and deployment of cloud computing systems utilize the current technology development in order to provide the appropriate service and accommodate the increasing demand while maintaining high  ...  In this paper, we discuss the state of the art on using formal methods for the verification of cloud computing systems.  ...  In [19] , the authors used Petri Nets in order to model a system using three approaches: multithreaded, distributed, and cloud based approach.  ... 
doi:10.12694/scpe.v16i3.1104 fatcat:3paeyn7khzfh5jtadfnxdfiyla

Report on the EDBT/ICDT 2010 workshop on updates in XML

Michael Benedikt, Daniela Florescu, Philippa Gardner, Giovanna Guerrini, Marco Mesiti, Emmanuel Waller
2010 SIGMOD record  
combination of JavaScript and DOM to provide, for example, secure mashups for a more flexible, secure integration of outsourced payment services; (iii) on-going work on a verification tool for automatically  ...  In this paper, an overview of the recent research in dynamic XML labelling schemes is provided.  ... 
doi:10.1145/1860702.1860713 fatcat:t4esorolvvdajawik7lkygcnmu
« Previous Showing results 1 — 15 out of 5,439 results