685 Hits in 4.1 sec

SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection [chapter]

Deguang Kong, Yoon-Chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Moreover, our results indicate that SAS is more robust to the byte distribution changes and noise injection attacks comparing to Polygraph and Hamsa.  ...  When SAS processes packets in a suspicious flow pool, it uses data flow analysis techniques to remove non-critical bytes.  ...  Polymorphism [20] usually uses a built-in encoder to encrypt original shellcode, and stores the encrypted shellcode and a decryption routine in the payload.  ... 
doi:10.1007/978-3-642-16161-2_1 fatcat:xbn7nzb2fzgvvafeizxy5sazkq

Quality Based Solution for Adaptable and Scalable Access Control in Cloud Computing

A. Varalakshmi Harika, Haleema P. K., R. Jaya subalakshmi, N. Ch. S. N. Iyengar
2014 International Journal of Grid and Distributed Computing  
Attribute Based Encryption to protect data of the users and analyze its performance.  ...  Cloud Computing Environment, the data presides over a set of networked resources and these data centers may be located in any part of the world and access of the data provided through Internet.  ...  Encryption Techniques for Storing the User data and key Management, Self Encrypting drive to protect the data from the unauthorized access in case of maintenance of servers of the cloud.  ... 
doi:10.14257/ijgdc.2014.7.6.11 fatcat:lbbpxzkxgfe4bjn57bhbzs3cjm

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh
2019 Transactions on Emerging Telecommunications Technologies  
Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers.  ...  In this paper, we provide a comparative analysis of different attribute based cryptographic mechanisms suitable for cloud data sharing services. we also provide a detailed discussion of different reviewed  ...  SA-KP-ABE Schemes Ostrovsky et al. 49 Liu et al. 53 proposed a SA-KP-ABE scheme adapted for cloud application.  ... 
doi:10.1002/ett.3667 fatcat:eu7rs5halbefrmbiipbf6t7c7e

Data confidentiality: to which extent cryptography and secured hardware can help

Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
2006 Annales des télécommunications  
Finally, this paper sketches a hybrid approach mixing data encryption, integrity control and secured hardware that could pave the way for future highly secured DBMS.  ...  Data confidentiality has become a major concern for individuals as well as for companies and administrations.  ...  The gain in confidence comes from the fact that an attack requires a conspiracy between DBA and SA. This solution can adapt to most DBMS products (Oracle, IBM DB2, SQL Server, Sybase).  ... 
doi:10.1007/bf03219909 fatcat:wtfn7f5lg5cbhcsdj24fclkvy4

Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography

Geetha, Jayakumar
2011 International journal of network security and its applications  
Agent delight at trusted Host as agent originator by means of symmetric key encryption. By using chain relation with trusted host, redundancy will be reduced and efficiency will be improved.  ...  We use TTP information with a host which is called Knowledge Based System (KBS) to maintain Trusted host Information.  ...  The model is mainly consists of protection agreements, trust estimation mechanism and dynamic self-adaptive process, which can resist colluded truncation attack.  ... 
doi:10.5121/ijnsa.2011.3517 fatcat:c76vj3n3qnbgncoahoh4rtwywm

LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment

Fei Li, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan
2014 39th Annual IEEE Conference on Local Computer Networks  
Technology advancements in smart mobile devices empower mobile users by enhancing mobility, customizability and adaptability of computing environments.  ...  In this paper, in order to allow secure data access in mobile environment, we securely combine both the dynamic and static attributes and develop novel access control technique.  ...  ACKNOWLEDGEMENTS This work was supported through the EPSRC Grants: "The Uncertainty of Identity: Linking Spatiotemporal Information Between Virtual and Real Worlds (EP/J005266/1)" and "TRUMP: A Trusted  ... 
doi:10.1109/lcn.2014.6925791 dblp:conf/lcn/LiRR14 fatcat:nmgvku3yond3vf6y3axbugh34i

Mimic Encryption Box for Network Multimedia Data Security

Xiabing Zhou, Bin Li, Yanrong Qi, Wanying Dong, Zhihua Xia
2020 Security and Communication Networks  
According to the principles of dynamization, diversification, and randomization, the mimic encryption box uses a reconfigurable encryption algorithm to encrypt network data and uses IP address hopping,  ...  Second, the mimic encryption box has a built-in pseudorandom number generator and key management system, which can generate an initial random key and update the key with the hash value of the data packet  ...  Finally, the mimic encryption box uses a "one packet, one key" encryption mechanism and has a certain self-cleaning function with a self-transforming network capability and a feedback mechanism.  ... 
doi:10.1155/2020/8868672 fatcat:gebhs2wukzhzvbi3z2vh3s4w2y

Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups

Yassine Essadraoui, Mohamed Dafir Ech-cherif El Kettani
2017 Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security  
In this paper, we propose to use Multivariate Quadratic Quasigroups (MQQ) to negotiate and share a secret key between two sensors.  ...  The Internet Key Exchange (IKE) protocol is well known as a secure key exchange protocol to establish secure channels between two hosts.  ...  In symmetric cryptography, two peers share a secret key and use it for encryption and decryption.  ... 
doi:10.5220/0006241902240231 dblp:conf/iotbd/EssadraouiK17 fatcat:44doraphdndyfaehoajkqjvmsq

Chip-Secured Data Access [chapter]

Luc Bouganim, Philippe Pucheral
2002 VLDB '02: Proceedings of the 28th International Conference on Very Large Databases  
acting as a mediator between a client and an encrypted database.  ...  With this statement in mind, we propose a solution called C-SDA (Chip-Secured Data Access), which enforces data confidentiality and controls personal privileges thanks to a clientbased security component  ...  Acknowledgments The authors wish to thank Philippe Bonnet and Ioana Manolescu for their helpful comments on this paper.  ... 
doi:10.1016/b978-155860869-6/50020-2 dblp:conf/vldb/BouganimP02 fatcat:mrzdsk4sj5dcrnqtmdg6ru6syq

PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging [chapter]

Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
2014 Lecture Notes in Computer Science  
It leverages a combination of automated and manual analysis of security logs and alerts which originate from a wide and varying array of sources and are often aggregated into a massive data repository.  ...  We introduce PillarBox, a tool for securely relaying SAS data in a security analytics system.  ...  We thank Alina Oprea, Ting-Fang Yen and Todd S. Leetham for many useful discussions during the design and evaluation of PillarBox.  ... 
doi:10.1007/978-3-319-11379-1_3 fatcat:q7z4f2pvqvdzbhv2mhueoml76u


Lathies BhaskerT., Arul Jagan G.
2014 ICTACT Journal on Communication Technology  
In the Simulation section we have analyzed our proposed architecture for both proactive and reactive protocols.  ...  Here one SPY Agent moves around the network and monitors the aggregator nodes i.e, the Cluster Heads for secure data collection.  ...  The security for the data transmission is achieved through efficient encryption and decryption mechanism which is explained in [14] .  ... 
doi:10.21917/ijct.2014.0146 fatcat:ua5jby7udzgjthcknlppws6kei

User-centric privacy-preserving statistical analysis of ubiquitous health monitoring data

George Drosatos, Pavlos Efraimidis
2014 Computer Science and Information Systems  
In this paper, we propose a user-centric software architecture for managing Ubiquitous Health Monitoring Data (UHMD) generated from wearable sensors in a Ubiquitous Health Monitoring System (UHMS), and  ...  We describe a prototype implementation that performs a statistical analysis on a community of independent personal agents.  ...  Finally, the SAS decrypts the results and finds that the average of the question which was submitted is 37.125 o C.  ... 
doi:10.2298/csis130120022d fatcat:vx3u45m42fhkhflvzbxudxnaj4

Enhanced Trust Based Access Control for Multi-Cloud Environment

N. R. Rejin Paul, D. Paul Raj
2021 Computers Materials & Continua  
The proposed methodology consists of data encryption using Cyclic Shift Transposition Algorithm and trust-based access control method.  ...  This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue.  ...  Hence a data protection mechanism with a self-contained module called Role-based access control enhanced using data-centric attribute-based encryption (DC-RBAC) was popularized [17] .  ... 
doi:10.32604/cmc.2021.018993 fatcat:dsscxk4xivawdln4fol3fb7v2u

Utilization of Mobile Agents for Building a Secure Decentralized Energy System with Remote Monitoring

H. M. Eldegwi et. al.
2016 International Journal of Computing and Digital Systems  
Decentralized energy system plans a significant role for developed countries in attenuating risks and security threats of the electricity sector and guarantee continuous electricity distribution in times  ...  systems have failed in remote rural areas due to weak infrastructures; roads between urban habitations are in a very bad condition even if found, scattered communities and high losses, this makes grid  ...  Intelligent: adapt and develop their action. 1. Autonomous: it has self-control. 2. Target-driven: it is pro-active. 3. Temporally continuous: it executes continuously.  ... 
doi:10.12785/ijcds/050404 fatcat:p4ji4iqy6redvcheyppck2gvgu

Towards a Hybrid Public Key Infrastructure (PKI): A Review [article]

Priyadarshi Singh, Abdul Basit, N. Chaitanya Kumar, V. Ch. Venkaiah
2019 IACR Cryptology ePrint Archive  
Also, the summary of the comparison, based on various features, is presented in a table.  ...  In this paper, we have reviewed and compared such hybrid schemes which tried to combine both the certificate based PKC and ID-based PKC.  ...  CI A = [ID A ||ID CA ||r A ||CertN o||P eriod||y CA ||E xt ] CA computes the signature parameter sA = x CA h(CI A ) + kA and sends (CI A , sA ) to Alice. Alice obtains her private key x A = sA + a.  ... 
dblp:journals/iacr/SinghBKV19 fatcat:hazur7hj4bdl7lpmudwuf54qxi
« Previous Showing results 1 — 15 out of 685 results