
Security and Trust Management
Beschreibung
Weitere Details
Weitere Ausgaben
Inhalt
- 7170
- Preface
- Organization
- Table of Contents
- Uncertainty, Subjectivity, Trust and Risk: How It All Fits together
- Aleatory Uncertainty vs. Epistemic Uncertainty
- Objective vs. Subjective
- Trust vs. Risk
- Trust Management from Three Perspectives
- Trust Management on Behalf of the Trustor
- Trust Management on Behalf of the Trustee
- Trust Management on Behalf of the System Owner
- References
- Trust Extortion on the Internet
- Introduction
- Details of Public-Key Infrastructures
- The Browser PKI
- The Browser PKI's Failure to Stop Phishing Attacks
- TLS without Server Certificates
- Adjacent Structures of DNS and the Browser PKI
- Using DNSSEC for Server Certificates
- Conclusion
- References
- Trust Areas: A Security Paradigm for the Future Internet
- Introduction
- The Vision of Multi-domain Trust Areas
- Research Tasks and Challenges
- Conclusions
- References
- Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security
- Introduction
- Trust
- Foreground Trust
- Device Comfort
- Thinking about the Interface
- Dogs and Icons: The Design of Comfort
- Related Work
- Conclusions and Ongoing Work
- References
- A Proof-Carrying File System with Revocable and Use-Once Certificates
- Introduction
- Motivating Example
- The Policy Logic BLL
- The File System LPCFS
- Experimental Results
- Macrobenchmarks
- Microbenchmarks
- Summary of Experimental Results
- Conclusion
- References
- New Modalities for Access Control Logics: Permission, Control and Ratification
- Introduction
- Distributed Access Control Model
- Limits of Access Control Logics: Permissions, Control and Information Flow
- The New Modalities
- Permission and Control
- The Modality (A ratified)
- Semantics
- A Semantics-Based Calculus for ACL+
- Termination
- Extending Seq-ACL+ with Constructs for Subordination
- Related Work
- Conclusion
- References
- Security Notions of Biometric Remote Authentication Revisited
- Introduction
- Related Work
- Motivation and Contributions
- Preliminaries
- Architecture of the System
- Secure Sketches
- Cancelable Biometrics
- ElGamal Encryption Scheme
- Security Model
- Identity Privacy
- Schemes Based on Secure Sketches
- A New Attack
- Preventing the Attacks
- A New Protocol
- Identity Privacy for Cancelable Biometrics: A New Notion
- Comparison
- Conclusion
- References
- Hiding the Policy in Cryptographic Access Control
- Introduction
- Towards Policy Privacy
- Related Work
- Syntax Tree Majors
- Building the System
- Setup and KeyGen
- Encryption
- Decryption
- Discussion
- Anonymity of the Policy
- Comparison with Nishide's Construction
- Reducing the Size of the Ciphertext
- Conclusion
- References
- Location Privacy in Relation to Trusted Peers
- Introduction
- Related Work
- User-Centric Location Privacy Metric
- Adversary Model
- Measuring Location Privacy
- Knowledge.
- Sensitivity.
- Trust Relation.
- Definition of Privacy Loss.
- Comparison with Anonymity Metrics.
- Example Implementation of K
- Uncertainty of a Location Observation
- Determining an Adversary's Knowledge Gain
- Example
- Example Implementation of S
- Static Location Sensitivity
- Dynamic Location Sensitivity
- Example
- Conclusion and Outlook
- References
- Fairness in Non-Repudiation Protocols
- Introduction
- Preliminaries
- Non-Repudiation Protocols
- Alternating-Time Temporal Logic
- Capturing Fairness of Exchange in ATL
- Existing Formalizations
- Fair Exchange and Imperfect Information
- Effective Fairness
- Hierarchy of Fairness Requirements
- Related Work
- Conclusions and Future Work
- References
- Risk-Aware Role-Based Access Control
- Introduction
- Background
- RBAC96 State as a Directed Graph
- Spatio-Temporal Constraints and Inheritance in RBAC
- Defining Risk in RBAC
- Simple Models for Risk-Aware RBAC
- Risk Mitigation
- The RBACT Model
- The RBACC Model
- The RBACA Model
- A Risk-Aware RBAC Model
- On the Advantages of Flat Risk-Aware RBAC
- On Sessions in Risk-Aware RBAC
- Related Work
- Concluding Remarks
- References
- Automated Analysis of Infinite State Workflows with Access Control Policies
- Introduction
- Parametrized Workflow Systems with Access Control
- Symbolic Representation of Parameterized Workflow Systems with Access Control
- Automated Analysis of Parameterized Workflow Systems
- Related Work and Discussion
- References
- The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes
- Introduction
- Introduction to Sanitizable Signatures Schemes (SanSig)
- Contribution
- State of the Art
- Discussion/Analysis of Existing Terms and Definitions
- EU Regulation: Integrity in Information Technology
- EU / US Regulation: Data Integrity
- EU Regulation: Data Integrity in Electronic Signatures
- Technical: Data Integrity
- Cryptographic: Data Integrity in Digital Signatures
- Sanitizable Signatures: Data Integrity Protection
- Transparency: Legally the Opposite of Technical
- Legal Transparency
- Technical Transparency of Sanitizable Signature Schemes
- Role of Integrity for Statutory Trust in Signatures
- 1st Axis: Allowed Changes
- 2nd Axis: Detection of Changes
- New Definition: Data Integrity
- Conclusion: Detectable Sanitizable Signature (ACA-1CD)
- References
- Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms
- Introduction
- Background and Related Work
- Remote Attestation
- Available Remote Attestation Opensource Tools
- Mutual Attestation Scheme
- High-Level Description
- Diffie-Hellman Key Exchange
- TPM Quote and Verify
- Hardware Test Results
- Discussion and Conclusion
- References
- Secure Architecure for the Integration of RFID and Sensors in Personal Networks
- Introduction
- Convenience of the Integration of RFID and PNs
- Network Architecture of the PN
- Software Components in the PN Architecture
- Secure Management of RFID Nodes and Sensors in the Architecture
- Discovery and Management of RFID-Enabled Items in the Architecture
- Secure Access and Communication with RFID Nodes and Sensors
- Alternatives in Secure Direct Access to RFID Nodes
- User Privacy in the Access to Context-Aware Technologies
- Conclusions
- References
- Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
- Introduction
- Uncertainty in the Crowds
- Uncertainty in Mumbai
- Uncertainty in Haiti
- Windows of Uncertainty
- Provenance Factors Affecting Trust in Information
- Identity of Informer
- Location of Informer
- Freshness of Information
- Reputation
- Popularity
- Context/Situation, Interest and Ethics
- Social Relation
- Corroboration
- Competence
- Conviction/Certainty
- System Architecture
- Information Source Filter
- Tactical Situation Object (TSO) Encoder
- Scoring Function
- Consistency Analysis and Conflict Resolution
- Decision Making Policy
- Generating TSO Inputs
- Conclusions and Future Work
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.