Filters








10 Hits in 9.1 sec

Prototyping security test objects for use with advanced biometric authentication systems

Tsutomu Matsumoto
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS &#39;08</a> </i> &nbsp;
The state-of-art methodology to measure or assess security of advanced biometric authentication systems is updated.  ...  To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ASIACCS'08, March 18-20, 2008, Akihabara, Tokyo, Japan.  ...  Copyright 2008 ACM 978-1-59593-979-1…$5.00. Figure 1 . 1 The Security Measuring Method for Biometric  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368313">doi:10.1145/1368310.1368313</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/Matsumoto08.html">dblp:conf/ccs/Matsumoto08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qxcd7eg3hfgaxjezz3vtwwlvfm">fatcat:qxcd7eg3hfgaxjezz3vtwwlvfm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218041456/https://static.aminer.org/pdf/20170130/pdfs/ccs/eurhqrgydcn3fpmozxvu87sabjjncklf.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/29/d2/29d2c77fba252ab7ad9aa9ec887c71f404ffee7f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368313"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Usage control platformization via trustworthy SELinux

Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS &#39;08</a> </i> &nbsp;
In this paper we identify the general requirements of a trusted usage control enforcement in heterogeneous computing environments, and also propose a general platform architecture to meet these requirements  ...  However, the enabling technology for usage control is a challenging problem and the space has not been fully explored yet.  ...  ASIACCS '08, March 18-20, Tokyo, Japan Copyright 2008 ACM 978-1-59593-979-1/08/0003 ...$5.00. tralized) locations or platforms, which is called the usage control problem proposed by researchers in literatures  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368345">doi:10.1145/1368310.1368345</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/AlamSLZ08.html">dblp:conf/ccs/AlamSLZ08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3weg245qvjaczebkcvrzacfrpu">fatcat:3weg245qvjaczebkcvrzacfrpu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809065829/http://profsandhu.com/zhang/pub/asiaccs08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ff/6a/ff6a4810f0a83fa0372680324f07c6a04ba18d66.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368345"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers

Chaeyeon Oh, Joonseo Ha, Heejun Roh
<span title="2021-12-24">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/smrngspzhzce7dy6ofycrfxbim" style="color: black;">Applied Sciences</a> </i> &nbsp;
Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification  ...  Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis  ...  In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ACM ASIACCS), ASIA CCS ’20, Taipei, Taiwan, 5–9 October 2020; Association for Computing Machinery: New  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app12010155">doi:10.3390/app12010155</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kdkvmdkbareb7cxgy7er7ncday">fatcat:kdkvmdkbareb7cxgy7er7ncday</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220126130243/https://mdpi-res.com/d_attachment/applsci/applsci-12-00155/article_deploy/applsci-12-00155.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2f/da/2fdad600c103cee3afd7124f59c1e2524ccdf075.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app12010155"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Controlled privacy preserving keyword search

Stephen S. Yau, Yin Yin
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS &#39;08</a> </i> &nbsp;
However, because the public servers are not under the control of users, there concerns on the privacy on the users data stored in the servers, which hinders the applications of public data sharing.  ...  With our approach, 1) users could store and share information with other users without worrying about the servers to compromise their privacies, 2) users can control both the access and the keyword search  ...  Acknowledgment This work was supported by the National Science Foundation under grant number ITR-CYBERTRUST 0430565.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368356">doi:10.1145/1368310.1368356</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/YauY08.html">dblp:conf/ccs/YauY08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h5gjrbhsmvdg7gbipq4cophty4">fatcat:h5gjrbhsmvdg7gbipq4cophty4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705062429/http://dpse.eas.asu.edu/papers/ASIACCS08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b9/83/b983cc902544235d83eb4afd35b992f8e0c0e676.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368356"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Decentralized Deep Learning for Multi-Access Edge Computing: A Survey on Communication Efficiency and Trustworthiness [article]

Yuwei Sun, Hideya Ochiai, Hiroshi Esaki
<span title="2021-12-06">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Furthermore, we offer a comprehensive overview of the current state-of-the-art in the field by outlining the challenges of DDL and the most relevant solutions from novel perspectives of communication efficiency  ...  Wider coverage and a better solution to a latency reduction in 5G necessitate its combination with multi-access edge computing (MEC) technology.  ...  in Proceedings of the 2006 ACM 2020 ACM SIGSAC Conference on Computer and Communications Symposium on Information, Computer and Communications Security, Security, Virtual  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.03980v4">arXiv:2108.03980v4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3chrjozkxrdzljthkjzlagg6uy">fatcat:3chrjozkxrdzljthkjzlagg6uy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211208095643/https://arxiv.org/pdf/2108.03980v4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/5d/115d7306d60d3bcdfe02f183f41f1be0260f1588.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.03980v4" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06

Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS &#39;08</a> </i> &nbsp;
Setup(1 k , n) takes as input a security parameter 1 k and the number of total users n. and outputs the public parameters PP and the master key MK.  ...  We next propose a new mIB-KEM which overcomes the security flaw identified in the construction of Chatterjee and Sarkar.  ...  Acknowledgments We would like to thank the anonymous referees for their helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368366">doi:10.1145/1368310.1368366</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/ParkKL08.html">dblp:conf/ccs/ParkKL08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nc6yz327avfqbligo352yhtpmi">fatcat:nc6yz327avfqbligo352yhtpmi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218064518/https://static.aminer.org/pdf/20170130/pdfs/ccs/emx6aodfuymsoy179ukazrqcbjt34n5d.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/e8/94e836c361b5a40cac98aac77468c1697f962a64.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368366"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Mechanisms for usage control

A. Pretschner, M. Hilty, D. Basin, C. Schaefer, T. Walter
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS &#39;08</a> </i> &nbsp;
We present a formal model for different mechanisms that can enforce usage control policies on the consumer side.  ...  Usage control is a generalization of access control that also addresses how data is used after it is released.  ...  ASIACCS '08, March 18-20, Tokyo, Japan Copyright 2008 ACM 978-1-59593-979-1/08/0003 ...$5.00. tors, the consumer and provider negotiate the usage request, a topic not treated in this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368344">doi:10.1145/1368310.1368344</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/PretschnerHBSW08.html">dblp:conf/ccs/PretschnerHBSW08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lpnbs7u7lfggxibormgejxdzkm">fatcat:lpnbs7u7lfggxibormgejxdzkm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20080424174800/http://www.inf.ethz.ch/personal/basin/pubs/asiaccs08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cc/eb/ccebf3dce9861cfb83d5b4d002d7f1ed0ca08753.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368344"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Detecting VoIP based DoS attacks at the public safety answering point

Christoph Fuchs, Nils Aschenbruck, Felix Leder, Peter Martini
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS &#39;08</a> </i> &nbsp;
Thus, critical infrastructures within the PSTN like the emergency call service, are accessible from the VoIP network (e.g. the Internet) and get exposed to new security threats.  ...  For us, this was the motivation to analyse the applicability of the concept of Intrusion Detection (ID) in the emergency call context and develop an adapted ID-architecture including its implementation  ...  ASIACCS '08, March 18-20, Tokyo, Japan Copyright 2008 ACM 978-1-59593-979-1/08/0003 ...$5.00.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368333">doi:10.1145/1368310.1368333</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/FuchsALM08.html">dblp:conf/ccs/FuchsALM08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gos2hfvgi5hprjjk76zupfpv2i">fatcat:gos2hfvgi5hprjjk76zupfpv2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190216130931/https://static.aminer.org/pdf/20170130/pdfs/ccs/ik0eu6ylsdqwvmahdgg7jhk9nfcoxztt.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/a4/1ca4ac7ff2d3a4c122f6acde7ae4797c037a719f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368333"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Principled reasoning and practical applications of alert fusion in intrusion detection systems

Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS &#39;08</a> </i> &nbsp;
However, there has been very little work on analyzing the effectiveness of an IDS ensemble.  ...  In this paper, we study the following problem: how to make a good fusion decision on the alerts from multiple detectors in order to improve the final performance.  ...  ASIACCS '08, March 18-20, Tokyo, Japan Copyright 2008 ACM 978-1-59593-979-1/08/0003 ...$5.00.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368332">doi:10.1145/1368310.1368332</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/GuCL08.html">dblp:conf/ccs/GuCL08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rscr3ijpyzh2xja63osxj7tqri">fatcat:rscr3ijpyzh2xja63osxj7tqri</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100621092842/http://faculty.cse.tamu.edu/guofei/paper/Gu_asiaccs08_idsFusion.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/37/e7370794eb8ec72ba784a9bfe3d28682f5354ec2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368332"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

On spatio-temporal constraints and inheritance in role-based access control

Liang Chen, Jason Crampton
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS &#39;08</a> </i> &nbsp;
In this paper, we define three spatio-temporal models based on RBAC96 the de facto standard for RBAC, and extend these models to include activation and usage hierarchies.  ...  Although temporal, spatial and spatio-temporal role-based access control (RBAC) models have been developed, a family of simple, expressive and flexible models that convincingly addresses the interaction  ...  ASIACCS '08, March 18-20, Tokyo, Japan Copyright 2008 ACM 978-1-59593-979-1/08/0003 ...$5.00. widely accepted as an alternative to traditional discretionary and mandatory access controls.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368341">doi:10.1145/1368310.1368341</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/ChenC08.html">dblp:conf/ccs/ChenC08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4h6phoatqfdflbe6m3bwepmfpy">fatcat:4h6phoatqfdflbe6m3bwepmfpy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171025184552/https://core.ac.uk/download/pdf/21748648.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/81/05/8105ad5a680fe63b554536ac9742a38d37038340.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368341"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>