Author(s): Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-Hoon Kim, Sang-Soo Yeo
Edition: 1
Year: 2009
Language: English
Pages: 137
Front Cover
......Page 1
Title Page
......Page 3
Copyright
......Page 4
Preface......Page 5
Organization......Page 7
Table of Contents......Page 9
Introduction......Page 11
Key Exchange and Stream Cipher by Tree Parity Machines......Page 12
Security and Attacks......Page 13
Tree-Parity Machine Architecture Variants......Page 14
Implementation and Results......Page 16
TPMRA Bus Controller Implementation......Page 18
References......Page 19
Introduction......Page 21
Proposed Security Metrics Development Process......Page 22
Threat and Vulnerability Analysis......Page 23
Decomposing Requirements......Page 24
Related Work......Page 25
References......Page 26
Introduction......Page 27
Background......Page 29
Related Work......Page 30
The ISDF Framework......Page 31
Design Stage......Page 32
An Example......Page 33
Stage 1: Requirements......Page 34
Stage 2: Design......Page 35
Conclusion and Future Work......Page 36
References......Page 37
Introduction......Page 39
Hardware Token Authentication......Page 40
Certificate Based User Authentication......Page 41
A Working Infrastructure......Page 42
Single-Sign-On......Page 43
References......Page 46
Introduction......Page 47
Backgrounds on Petri Nets......Page 48
Expressing Time and Concurrency......Page 49
Analysis of TCRBAC......Page 50
Tools Support......Page 51
References......Page 52
Introduction......Page 53
Performance Evaluation Procedure......Page 54
Evaluation Target and Evaluation Method Selection......Page 55
Sample Correction......Page 56
Performance Evaluator for Forged Fingerprint Detection......Page 57
References......Page 59
Introduction......Page 60
Security Model......Page 61
Security Notions......Page 62
Security Proof......Page 63
References......Page 65
Introduction......Page 67
Mobility Modeling of Ad-Hoc Nodes......Page 68
Time Behavior Modeling of Nodes......Page 69
Adaptive Time Behavior Model (ATBM)......Page 70
Mobility Model for Ad-Hoc Nodes......Page 71
Numerical Results for Time Behavior of Nodes......Page 72
Conclusion......Page 76
References......Page 77
Introduction......Page 78
Related Work......Page 79
Contextual Model......Page 80
Conceptual Framework......Page 82
Authorization Framework......Page 83
Policy Specification for Access to Services......Page 85
References......Page 86
SI Model......Page 88
SIQR Model......Page 89
Simulation......Page 92
References......Page 94
Introduction......Page 95
Related Works......Page 96
Key Reuse Establishment Process between IPTV Terminal and Head-End......Page 97
Performance Evaluation......Page 98
References......Page 100
Introduction......Page 101
Suggested Scheme......Page 102
Watermark Embedding......Page 103
Experimental Results......Page 104
Conclusion......Page 106
References......Page 107
Introduction......Page 108
Service Transplant......Page 109
Trapping Subnet......Page 110
Mathematical Model of Autonomic Trap......Page 111
Experimental Simulation......Page 112
References......Page 114
Introduction......Page 115
Investigation of the Current WAFs......Page 116
Simplified Taxonomy of Web Attacks......Page 117
Priority-Decision Module......Page 119
References......Page 120
Introduction......Page 121
Problems of Current Logging......Page 122
Collectable Logs......Page 123
Features......Page 124
Purpose and Log......Page 125
References......Page 127
Introduction......Page 129
Meaning of Blurriness......Page 130
Experimental Setup......Page 132
Conclusions......Page 135
References......Page 136
Author Index......Page 137