Filters








13 Hits in 2.8 sec

A distributed key assignment protocol for secure multicast based on proxy cryptography

Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
However, this raises the problem of "one affects all," whereby the actions of one member affect the whole group.  ...  A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members.  ...  ASIACCS '06, March 21-24, 2006, Taipei, Taiwan Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00.  ... 
doi:10.1145/1128817.1128875 dblp:conf/ccs/HuangCCL06 fatcat:cnjfnxoncrgypfcyqku6dhgjca

A general design towards secure ad-hoc collaboration

Masayuki Nakae, Xinwen Zhang, Ravi Sandhu
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
However, this raises the problem of "one affects all," whereby the actions of one member affect the whole group.  ...  A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members.  ...  ASIACCS '06, March 21-24, 2006, Taipei, Taiwan Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00.  ... 
doi:10.1145/1128817.1128874 dblp:conf/ccs/NakaeZS06 fatcat:rbrxdc6nnjaz7kgrhdqftfncmu

A refined look at Bernstein's AES side-channel analysis

Michael Neve, Jean-Pierre Seifert, Zhenghong Wang
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
It shows the correlation between the attack phase and the profiling phase for one fixed byte.  ...  From this analysis we also derive a general limit on the number of derivable key bits through his technique which depends on the architecture of the underlying CPU. 2) We show the results of several important  ...  To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ASIACCS '06, March 21-24, 2006, Taipei, Taiwan.  ... 
doi:10.1145/1128817.1128887 dblp:conf/ccs/NeveSW06 fatcat:auerxq25k5cybnjywxcwkav4za

Can machine learning be secure?

Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
important to security for machine learning, an analytical model giving a lower bound on attacker's work function, and a list of open problems.  ...  Novel contributions of this paper include a taxonomy of different types of attacks on machine learning techniques and systems, a variety of defenses against those attacks, a discussion of ideas that are  ...  ASIACCS'06, March 21-24, 2006 , Taipei, Taiwan Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00 attack (known bad) traffic.  ... 
doi:10.1145/1128817.1128824 dblp:conf/ccs/BarrenoNSJT06 fatcat:s6y6wpq2e5bfnjw4bh73coppvm

A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers

Chaeyeon Oh, Joonseo Ha, Heejun Roh
2021 Applied Sciences  
Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification  ...  Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis  ...  In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ACM ASIACCS), ASIA CCS ’20, Taipei, Taiwan, 5–9 October 2020; Association for Computing Machinery: New  ... 
doi:10.3390/app12010155 fatcat:kdkvmdkbareb7cxgy7er7ncday

An attack-localizing watermarking scheme for natural language documents

Gaurav Gupta, Josef Pieprzyk, Hua Xiong Wang
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K.  ...  Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives.  ...  ACKNOWLEDGEMENTS We would like to thank Vijayakrishnan Pasupathinathan, Robert Dale, Krystian Matusiewicz and Christophe Tartary for their valuable contributions towards this research.  ... 
doi:10.1145/1128817.1128842 dblp:conf/ccs/GuptaPW06 fatcat:c6zqib7luze6dmi6dc5mnaowtu

Decentralized Deep Learning for Multi-Access Edge Computing: A Survey on Communication Efficiency and Trustworthiness [article]

Yuwei Sun, Hideya Ochiai, Hiroshi Esaki
2021 arXiv   pre-print
Furthermore, we offer a comprehensive overview of the current state-of-the-art in the field by outlining the challenges of DDL and the most relevant solutions from novel perspectives of communication efficiency  ...  Wider coverage and a better solution to a latency reduction in 5G necessitate its combination with multi-access edge computing (MEC) technology.  ...  ACM, 2020, pp. ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006. ACM, 2006, pp. 113–131. [Online]. Available: https://doi.org/10.1145/3372297.3423362 16–25. [Online].  ... 
arXiv:2108.03980v4 fatcat:3chrjozkxrdzljthkjzlagg6uy

Fortifying password authentication in integrated healthcare delivery systems

Yanjiang Yang, Robert H. Deng, Feng Bao
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
However, existing password systems (under either the single-server model or the multi-server model) do not provide adequate security when applied to IDSs.  ...  We generalize the two-server model to an architecture of a single control server supporting multiple service servers, tailored to the organizational structure of IDSs.  ...  ASIACCS'06, March 21-24, 2006 (such as hospitals and primary care clinics) that serve different aspects of the care continuum.  ... 
doi:10.1145/1128817.1128855 dblp:conf/ccs/YangDB06 fatcat:76hdzdhkj5bnfcefloqmvsz6ja

Supporting location-based conditions in access control policies

Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
Based on these parameters, we present the formal definition of a number of location-based predicates, their management, evaluation, and enforcement.  ...  Our LBAC model includes a novel way of taking into account the limitations of the technology used to ascertain the location of the requester.  ...  The definitive version was published in Proceedings of the 2006 ACM Symposium on Information, computer and communications security, Taipei, Taiwan,March 21-24, 2006, http://doi.acm.org/10.1145/1128817.1128850  ... 
doi:10.1145/1128817.1128850 dblp:conf/ccs/ArdagnaCDVS06 fatcat:75s3aeimcra7tkkwy73psvdtdq

An efficient key establishment scheme for secure aggregating sensor networks

Erik-Oliver Blaß, Martina Zitterbart
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
This results in unnecessary expensive communication and memory consumption, growing linearly with the size of the network, and guarantees secure connections only with a certain probability.  ...  This work presents a novel approach for efficient and secure key establishment of nodes joining the network by utilizing the fact that communication in sensor networks follows a paradigm called aggregation  ...  ASIACCS'06 March 21-24, 2006, Taipei, Taiwan Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00.  ... 
doi:10.1145/1128817.1128863 dblp:conf/ccs/BlassZ06 fatcat:sk6vpm3ttzhbhoxotgq4wjwzgm

Application security support in the operating system kernel

Manigandan Radhakrishnan, Jon A. Solworth
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
The mechanisms are oriented towards providing authorization properties, and this goal drives the design of permissions and protection mechanisms.  ...  This reduces the need for users and applications to be aware of protection mechanism, since the protection mechanism provides the user with more freedom in how they do things.  ...  ACKNOWLEDGEMENTS The authors would like to thank Damian Roqueiro for his careful reading of an earlier draft of this paper as well as Ashley Poole, Prof. V. N.  ... 
doi:10.1145/1128817.1128848 dblp:conf/ccs/RadhakrishnanS06 fatcat:uhprbihbi5estogqobzijhz3fa

Dynamic rule-ordering optimization for high-speed firewall filtering

Hazem Hamed, Ehab Al-Shaer
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
Packet filtering plays a critical role in many of the current high speed network technologies such as firewalls and IPSec devices.  ...  The optimization of firewall policies is critically important to provide high performance packet filtering particularly for high speed network security.  ...  To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ASIACCS'06, March 21-24, 2006 , Taipei, Taiwan.  ... 
doi:10.1145/1128817.1128867 dblp:conf/ccs/HamedA06 fatcat:dfuxt4uzgzagtb2oazicfmcfkm

Safety analysis of usage control authorization models

Xinwen Zhang, Ravi Sandhu, Francesco Parisi-Presicce
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
In UCONA, an access control decision is based on the subject and/or the object attributes, which can be changed as the side-effects of using the access right, resulting in possible changes to future access  ...  While the policy specification flexibility and expressive power of this model have been studied in previous work, as a related and fundamental problem, the safety analysis of UCON has not been explored  ...  This completes our undecidability proof. 2 ASIACCS '06 March 21-24, 2006, Taipei, Taiwan. Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00.  ... 
doi:10.1145/1128817.1128853 dblp:conf/ccs/ZhangSP06 fatcat:dfbp24awozae7cpjtxexciw25a