Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 661 - 681 of 681

Full-Text Articles in Physical Sciences and Mathematics

Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.) Jan 2002

Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.)

Research outputs pre 2011

The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year's conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations.

The papers cover many topics, all within the field of information warfare and its applications, now and into the future.

The papers have been grouped into six streams: …


Using Mobile Agents For Analyzing Intrusion In Computer Networks, Jay Aslam, Marco Cremonini, David Kotz, Daniela Rus Jul 2001

Using Mobile Agents For Analyzing Intrusion In Computer Networks, Jay Aslam, Marco Cremonini, David Kotz, Daniela Rus

Dartmouth Scholarship

Today hackers disguise their attacks by launching them form a set of compromised hosts distributed across the Internet. It is very difficult to defend against these attacks or to track down their origin. Commercially available intrusion detection systems can signal the occurrence of limited known types of attacks. New types of attacks are launched regularly but these tools are not effective in detecting them. Human experts are still the key tool for identifying, tracking, and disabling new attacks. Often this involves experts from many organizations working together to share their observations, hypothesis, and attack signatures. Unfortunately, today these experts have …


Privacy-Preserving Cooperative Statistical Analysis, Wenliang Du, Mikhail J. Atallah Jan 2001

Privacy-Preserving Cooperative Statistical Analysis, Wenliang Du, Mikhail J. Atallah

Electrical Engineering and Computer Science - All Scholarship

The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Sometimes these computations may occur between mutually untrusted entities. The problem is trivial if the context allows the conduct of these computations by a trusted entity that would know the inputs from all the participants; however if the context disallows this then the techniques of secure multi-party computation become very relevant and can provide useful solutions. Statistic analysis is a widely used computation in real life, but the known methods usually require one to know the whole …


Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.) Jan 2001

Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)

Research outputs pre 2011

Welcome to Perth, Western Australia, and to the 2nd International We-B Conference 2001 "working for excellence in the e-conomy" hosted by the We-B Centre, School of Management Information Systems at Edith Cowan University.

This is an international conference for academics and industry specialists in e-business, e-government and related fields. The conference has drawn participants from national and international organisations.

All submitted papers were subjected to an anonymous peer review process managed by the Conference Committee.


Covert Shells, John Christian Smith Nov 2000

Covert Shells, John Christian Smith

John Christian Smith

The potential for covert communications exist anywhere that legitimate communication channels are in use. In order to maintain control of the channel once exploited, the insertion of a backdoor Trojan horse server, to be used with a client that provides shell access, is often a necessary prerequisite to establishing and using a covert channel long term.

We discuss covert channel communications methods ranging from embedded channels to disguised protocols. What follows is a review of available covert shell tools. The underground, historical evolution of covert shells is reviewed, focusing on selected, available tools, which range from simple encapsulation methods to …


A Formal Semantics For Spki, Jon Howell, David Kotz Oct 2000

A Formal Semantics For Spki, Jon Howell, David Kotz

Dartmouth Scholarship

We extend the logic and semantics of authorization due to Abadi, Lampson, et al. to support restricted delegation. Our formal model provides a simple interpretation for the variety of constructs in the Simple Public Key Infrastructure (SPKI), and lends intuition about possible extensions. We discuss both extensions that our semantics supports and extensions that it cautions against.


End-To-End Authorization, Jon Howell, David Kotz Oct 2000

End-To-End Authorization, Jon Howell, David Kotz

Dartmouth Scholarship

Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified approach to authorization. Our approach allows applications that span administrative, network, abstraction, and protocol boundaries to understand the end-to-end authority that justifies any given request. The resulting distributed systems are more secure and easier to audit. \par We describe boundaries that can interfere with end-to-end authorization, and outline our unified approach. We describe the system we built and the applications we adapted to use our unified authorization system, and measure its costs. We conclude that our system …


Restricted Delegation: Seamlessly Spanning Administrative Boundaries, Jon Howell, David Kotz Apr 2000

Restricted Delegation: Seamlessly Spanning Administrative Boundaries, Jon Howell, David Kotz

Dartmouth Scholarship

Historically and currently, access control and authentication is managed through ACLs. Examples include:

• the list of users in /etc/password, the NIS passwd map, or an NT domain

• permissions on Unix files or ACLs on NT objects

• a list of known hosts in .ssh/known hosts

• a list of IP addresses in .rhosts (for rsh) or .htaccess (http)

The limitations of ACLs always cause problems when spanning administrative domains (and often even inside administrative domains). The best example is the inability to express transitive sharing. Alice shares read access to object X with Bob (but not access to …


A Pairwise Key Pre-Distribution Scheme For Wireless Sensor Networks, Wenliang Kevin Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney Jan 2000

A Pairwise Key Pre-Distribution Scheme For Wireless Sensor Networks, Wenliang Kevin Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney

Electrical Engineering and Computer Science - All Scholarship

This paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resilience and associated overhead. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that communications between any additional nodes are compromised is close to zero. This desirable property lowers the initial payoff of smaller-scale network breaches to an adversary, and makes it necessary …


Science And Security Watch: A Threat To The United States From Foreign Graduate Students Training In Physics?, Ibpp Editor Jul 1999

Science And Security Watch: A Threat To The United States From Foreign Graduate Students Training In Physics?, Ibpp Editor

International Bulletin of Political Psychology

This article critiques concerns of some United States (US) security analysts that foreign graduate students in physics who train at universities within the US present security vulnerabilities for the US.


Likely And Unlikely Events In International Security Affairs: An Example From The People's Republic Of China, Ibpp Editor Jul 1999

Likely And Unlikely Events In International Security Affairs: An Example From The People's Republic Of China, Ibpp Editor

International Bulletin of Political Psychology

This article describes a human judgment shortfall in international security decision making based on statistical probabilities.


Java’S Insecure Parallelism, Per Brinch Hansen Jan 1999

Java’S Insecure Parallelism, Per Brinch Hansen

College of Engineering and Computer Science - Former Departments, Centers, Institutes and Projects

The author examines the synchronization features of Java and finds that they are insecure variants of his earliest ideas in parallel programming published in 1972-73. The claim that Java supports monitors is shown to be false. The author concludes that Java ignores the last twenty-five years of research in parallel programming languages.


Formal Analysis Of A Secure Communication Channel: Secure Core-Email Protocol, Dan Zhou, Shiu-Kai Chin Jan 1999

Formal Analysis Of A Secure Communication Channel: Secure Core-Email Protocol, Dan Zhou, Shiu-Kai Chin

Electrical Engineering and Computer Science - All Scholarship

To construct a highly-assured implementation of secure communication channels we must have clear definitions of the security services, the channels, and under what assumptions these channels provide the desired services. We formally define secure channel services and develop a detailed example. The example is a core protocol common to a family of secure email systems. We identify the necessary properties of cryptographic algorithms to ensure that the email protocol is secure, and we verify that the email protocol provides secure services under these assumptions. We carry out the definitions and verifications in higher-order logic using the HOL theorem-prover. All our …


Trends. An Encryption Paradox: Cracking The Groupe Speciale Mobile Standard (Gsm), Ibpp Editor Apr 1998

Trends. An Encryption Paradox: Cracking The Groupe Speciale Mobile Standard (Gsm), Ibpp Editor

International Bulletin of Political Psychology

The author discusses the vulnerability of encryption methods used with today's modern technology.


Trends. Some Security Lessons From Kyoto, Ibpp Editor Dec 1997

Trends. Some Security Lessons From Kyoto, Ibpp Editor

International Bulletin of Political Psychology

The author discusses how "the environment" is no longer a fringe Issue championed by starry-eyed dreamers and psychodynamic deviants, and perennial misfits who have little understanding of or orientation to reality. In fact, the relevance of "the environment" for policies of political security has become quite significant.


Resource Access Control For An Internet User Agent, Nataraj Nagaratnam, Steven B. Byrne Jan 1997

Resource Access Control For An Internet User Agent, Nataraj Nagaratnam, Steven B. Byrne

Electrical Engineering and Computer Science - All Scholarship

The rapid increase in the Internet's connectivity has lead to proportional increase in the development of Web-based applications. Usage of downloadable content has proved effective in a number of emerging applications including electronic commerce, software components on-demand, and collaborative systems. In all these cases, Internet user agents (like browsers, tuners) are widely used by the clients to utilize and execute such downloadable content. With this new technology of using downloadable content comes the problem of the downloaded content obtaining unauthorized access to the client's resources. In effect, granting a hostile remote principal the requested access to client's resources may lead …


Review Of Personal Identification Systems, J. M. Cross Jan 1997

Review Of Personal Identification Systems, J. M. Cross

Research outputs pre 2011

The growth of the use of biometric personal identification systems has been relatively steady over the last 20 years. The expected biometric revolution which was forecast since the mid 1970's has not yet occurred. The main factor for lower than expected growth has been the cost and user acceptance of the systems. During the last few years, however, a new generation of more reliable, less expensive and better designed biometric devices have come onto the market. This combined with the anticipated expansion of new reliable, user friendly inexpensive systems provides a signal that the revolution is about to begin. This …


Biometric Imaging: Three Dimensional Imaging Of The Human Hand Using Coded Structured Lighting, T. A. Vuori, C. L. Smith Jan 1995

Biometric Imaging: Three Dimensional Imaging Of The Human Hand Using Coded Structured Lighting, T. A. Vuori, C. L. Smith

Research outputs pre 2011

In this report the results of applying a three dimensional range imaging system, based on coded structured light, are presented. This includes a description of a new improved spatial coding scheme. This new scheme increases the number of reference points available and provides a basis for more accurate calculation of their location. A detailed description of the image processing methods used to extract structural information and to identify structural objects from the camera image are given. In addition the method used to calculate the locations of reference points with 'subpixel' accuracy is described. Finally, the results of experiments with synthesised …


Surface Water And Groundwater Conjunctive Use Management: Santa Clara County, California, Jeanette L. Micko Jun 1991

Surface Water And Groundwater Conjunctive Use Management: Santa Clara County, California, Jeanette L. Micko

Innovation in Western Water Law and Management (Summer Conference, June 5-7)

47 pages (includes illustrations and maps).


Big Horn River Litigation Experience: The Second Generation – Post Decree Administration, Gordon W. Fassett Jun 1991

Big Horn River Litigation Experience: The Second Generation – Post Decree Administration, Gordon W. Fassett

Innovation in Western Water Law and Management (Summer Conference, June 5-7)

5 pages.


An Analysis Of The Monitored Electronic Alarm Activations In The Perth Metropolitan Area, Lynnette M. Bloom, James M. Cross, David Mcdougall Jan 1991

An Analysis Of The Monitored Electronic Alarm Activations In The Perth Metropolitan Area, Lynnette M. Bloom, James M. Cross, David Mcdougall

Research outputs pre 2011

This study as indicated in [7] was carried out under the auspices of Edith Cowan University's Institute of Security and Applied Technology and had the support of the Western Australian Police and the Perth-based Central Monitoring Agencies. The data analysed was obtained essentially from Police records, backed up by data from two of Perth's larger security companies, and consists of all the monitored alarms in the Perth Metropolitan Area which were attended by the police in the months of May and September 1989.In our consideration of the frequency of alarms by time of day and day of week, and the …