Filters








200,965 Hits in 4.0 sec

An integrated framework for security protocol analysis

Marcin Olszewski, Lukasz Cyra
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
In the paper we present an analytical framework that integrates the object-oriented and formal modeling approaches.  ...  Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance.  ...  We propose an integrated framework for security protocol analysis which combines formal modeling techniques for cryptographic protocol verification with object-oriented analysis in a well-defined engineering  ... 
doi:10.1145/1368310.1368325 dblp:conf/ccs/OlszewskiC08 fatcat:olcaky7rgzfshp7c7oz5xgx6me

Explanation-Guided Fairness Testing through Genetic Algorithm [article]

Ming Fan, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu
2022 arXiv   pre-print
A plethora of research has proposed diverse methods for individual fairness testing.  ...  This work proposes ExpGA, an explanationguided fairness testing approach through a genetic algorithm (GA).  ...  CONCLUSION This work proposes ExpGA, an explanation-guided method through the GA for software fairness testing.  ... 
arXiv:2205.08335v1 fatcat:kwcxbsoif5ct3cq4m4i77rwee4

Guest editorial overview

Li Gong, J. Guttman, P. Ryan, S. Schneider
2003 IEEE Journal on Selected Areas in Communications  
that integrates four components useful for protocol analysis: specification, a belief logic, an analysis engine for that belief logic, and a message round calculator.  ...  Formal justification for the transformation steps is grounded in the strand space framework for protocol analysis, providing a novel application of that protocol verification framework.  ...  and Analysis of Security Protocols.  ... 
doi:10.1109/jsac.2002.806120 fatcat:cax6gmav4zfvzb43o5hmwqjimu

Universal Identity and Access Management Framework for Future Ecosystems

Daniela Pöhn, Wolfgang Hommel
2021 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
In order to gain an overview and to enable interoperability, this article proposes an identity and access management framework (IAMF).  ...  As various protocols are developed to solve real-world problems, it is increasingly difficult to provide secure implementations and configurations.  ...  IAMF allows various protocols to interact. It further adds an overview of all identity management systems run within one organization and an integration to security management.  ... 
doi:10.22667/jowua.2021.03.31.064 dblp:journals/jowua/PohnH21 fatcat:v45tv7qbf5a4xmdamzmjw6mv4y

A Risk Management Framework for Penetration Testing of Global Banking & Finance Networks VoIP Protocols

Yogesh Malhotra
2014 Social Science Research Network  
This article's focus is on addressing these critical gaps in global banking and finance practices and key industry frameworks underlying prudent risk management and information assurance practices for  ...  ABSTRACT Voice over Internet Protocol based networks have been gaining central prominence in global banking and finance industry over the past decade.  ...  Having defined the need for an integrated adaptive overarching risk management framework for the 3-levels at which vulnerability analysis and penetration testing are implemented, it needs to be recognized  ... 
doi:10.2139/ssrn.2555098 fatcat:f26bkmgmkjcfvoexz7k67qfcw4

Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS [chapter]

Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
2014 Lecture Notes in Computer Science  
the basic TCG platform attestation platform protocol, securely realizes the TNC functionality in the hybrid model.  ...  In this paper, we introduce two primitive ideal functionalities for TNC: an ideal dual-authentication certification functionality which binds messages and both the user and platform identities, and an  ...  [6] presented the first security analysis of the TLS protocol in the UC framework.  ... 
doi:10.1007/978-3-319-11698-3_9 fatcat:qt4ecdxzfvh6fkaadnayf5psyi

Advanced Network Security Analysis (ANSA) in Big Data Technology

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This information is sorted as IP Wise, Port Wise, and Protocol Wise.  ...  In the big data environment, securing a large amount of data has become a challenging issue in both security and research industry.  ...  An effective proposed framework is Metamorphic Malware analysis and real-time detection or commonly known as MARD that helps in detecting real time information and Big Data security.  ... 
doi:10.35940/ijitee.j9369.0881019 fatcat:4wd3d4ok4jfnljlhoz4bdhv3gu

Mind the Gap: Ceremonies for Applied Secret Sharing

Bailey Kacsmar, Chelsea H. Komlo, Florian Kerschbaum, Ian Goldberg
2020 Proceedings on Privacy Enhancing Technologies  
Our framework accounts for such variations in the design and analysis of secret sharing implementations by presenting a more detailed user-focused process and defining previously overlooked assumptions  ...  properties, a result that cannot be derived from the analysis of the underlying cryptographic protocol alone.  ...  program, and the Royal Bank of Canada for funding this research.  ... 
doi:10.2478/popets-2020-0033 fatcat:pq6elin7s5eaxb7fuj4tnwlvky

SecureSurgiNET: A framework for ensuring security in telesurgery

Sohail Iqbal, Shahzad Farooq, Khuram Shahzad, Asad Waqar Malik, Mian M Hamayun, Osman Hasan
2019 International Journal of Distributed Sensor Networks  
In this article, we propose the first complete framework, called SecureSurgiNET, for ensuring security in telesurgery environments.  ...  An analysis is provided describing the security and throughput of Advanced Encryption Standard during the intraoperative phase of SecureSurgiNET.  ...  Security strength The implementation of the proposed framework is based on well-established and standardized protocols to provide a robust and secure system for telesurgery.  ... 
doi:10.1177/1550147719873811 fatcat:rsiougwzd5azzpdgz4qbmojffq

Security Modeling and Analysis

Jason Bau, John C. Mitchell
2011 IEEE Security and Privacy  
His research focuses on Web security, network security, privacy, programming language analysis and design, formal methods, and applications of mathematical logic to computer science.  ...  He's editor in chief of the Journal of Computer Security and has been actively involved in IEEE and ACM conference organization and program committees.  ...  Security Modeling and Analysis Our security modeling and analysis framework reflects decades of research in specific areas, such as network protocol security.  ... 
doi:10.1109/msp.2011.2 fatcat:wu6anyjnurayzisnfeo3llxgva

Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework [article]

Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy
2021 arXiv   pre-print
This paper proposes a security integration between 6LoWPAN and the Routing Protocol for Low Power and Lossy Networks (RPL) through the Chained Secure Mode (CSM) framework as a possible solution.  ...  Since the CSM framework provides a mean of immediate-sender trust, through the use of Network Coding (NC), and an integration interface for the other protocols (or mechanisms) to use this trust to build  ...  In this paper, a security integration between RPL and 6LoW-PAN protocols is proposed using the CSM framework.  ... 
arXiv:2104.14422v1 fatcat:z766weoi55a4ndf4msjbsmnnxe

Improving Privacy of OpenID Cloud Identity Management Framework: Formal Analysis, Verification of Protocol

Roshni Bhandari, Dhiren Patel, Brijesh A.
2018 International Journal of Computer Applications  
The various identity management frameworks that help making Cloud environment more secure.  ...  We provide a simple and scalable defense mechanism for service providers to ensure the authenticity and integrity of the protocol messages.  ...  While the security of the protocol is critical, so security analysis is required.  ... 
doi:10.5120/ijca2018916388 fatcat:4zuz6zlf2vbrje2rc3nvnmmkyi

Secure Wireless Embedded Systems Via Component-based Design

Theis Hjorth, Rune Torbensen
2010 2010 IEEE Second International Conference on Social Computing  
Following this method we propose a security framework with a secure communication component for distributed wireless embedded devices.  ...  The components communicate using the Secure Embedded Exchange Protocol (SEEP), which has been designed for flexible trust establishment so that small, resource-constrained, wireless embedded systems are  ...  for his aid in the protocol analysis, and the reviewers for their comments.  ... 
doi:10.1109/socialcom.2010.150 dblp:conf/socialcom/HjorthT10 fatcat:wkhj2uhxnbbbvggxr3jcmh5a4a

Security and Protocol Exploit Analysis of the 5G Specifications [article]

Roger Piqueras Jover, Vuk Marojevic
2018 arXiv   pre-print
for security as well as a number protocol edge cases that could render 5G systems vulnerable to adversarial attacks.  ...  Although the security has been enhanced when compared to previous generations to tackle known protocol exploits, our analysis identifies some potentially unrealistic system assumptions that are critical  ...  Section IV provides a holistic analysis of the deployment challenges of the proposed 5G security framework, highlighting the potential risk of protocol exploits and sensitive information leaks.  ... 
arXiv:1809.06925v4 fatcat:z5pd73erwnfzxdnkkuhpps7kjy

A Static Verification Framework for Secure Peer-to-Peer Applications

Andrea Zisman
2007 Second International Conference on Internet and Web Applications and Services (ICIW'07)  
The approach avoids security issues to be taken into consideration as a separate layer that is added to the system as an afterthought by the use of security protocols.  ...  The framework supports the specification, modeling, and analysis of security aspects together with the general characteristics of the system, during early stages of the development life-cycle.  ...  The design models and security protocols in our work are based on an extension of UMLSec to allow modeling of security requirements such as confidentiality, integrity, authentication, and access control  ... 
doi:10.1109/iciw.2007.11 dblp:conf/iciw/Zisman07 fatcat:ctrexhk7hrbgxj5wxr573xhgeu
« Previous Showing results 1 — 15 out of 200,965 results