This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held in London, UK, in June 2008. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on cybercrime and digital forensics investigation, voice and video over internet protocols security, computer security, security architecture and authorisations, and IT governance.
Author(s): Hamid Jahankhani, Kenneth Revett, Dominic Palmer-Brown
Edition: 1
Publisher: Springer
Year: 2008
Language: English
Pages: 310
Introduction......Page 12
Cybercrime......Page 13
Voice over Internet Protocol (VoIP)......Page 14
Using Unsecured Networks......Page 16
Spam......Page 17
Conclusions......Page 18
Previous Work......Page 19
Initialization......Page 20
Evidence Collection......Page 21
Evidence Examination and Analysis......Page 22
Case Termination......Page 24
Conclusion......Page 25
References......Page 26
Definition......Page 27
Mechanisms......Page 28
Research Method......Page 29
Security Practices within Contact Centres......Page 30
References......Page 33
Introduction......Page 35
Introduction to Card-Not-Present Transactions......Page 36
Merchant Goals......Page 38
Background......Page 39
The Event Calculus......Page 40
Discovering Attacks......Page 41
Purchase Scenario......Page 42
Purchase Code......Page 43
Reasoning about Fraud......Page 44
Conclusions and Further Work......Page 46
References......Page 47
Introduction......Page 49
Counterfeit Card Fraud......Page 50
Lost and Stolen Fraud......Page 51
Likely Trends......Page 52
Stakeholders......Page 53
Risk Assessment......Page 54
Summary and Conclusions......Page 55
References......Page 56
Introduction......Page 57
Tracking Internet Trails......Page 58
Changing the Sender’s Address......Page 60
Points to Consider......Page 61
References......Page 62
Evaluation of Tools for Protection of Interest against Hacking and Cracking......Page 63
Description of Attacks......Page 69
Testing SIP Dialog Verification......Page 70
Discussion of Results......Page 71
References......Page 72
Introduction......Page 73
VoIP Communication Flow......Page 74
IP/TCP/UDP Protocols Steganography......Page 75
SIP/SDP Protocols Steganography......Page 76
Conclusions......Page 79
References......Page 80
Introduction......Page 81
Mouth Movement Representation......Page 83
Classification......Page 84
Experiments......Page 85
Results and Discussion......Page 86
Summary......Page 87
References......Page 88
Introduction......Page 89
Verheul and Tilborg’s Basic Colored Secret Sharing Scheme......Page 90
Bit-Level Colored Secret Sharing......Page 91
Chang, Tsai, Chen’s Scheme for Colored Images......Page 92
Proposed Scheme for Colored Images......Page 93
Hiding Algorithm......Page 94
Results......Page 95
References......Page 96
Introduction......Page 99
Brief Description of Trivium......Page 100
Results of Experiments on Original Trivium......Page 101
Results of Experiments on Tweaked Trivium......Page 103
Results and Comments......Page 105
References......Page 106
Introduction......Page 108
General Model for Secret Sharing Schemes......Page 109
Secure Reliable Storage System......Page 110
General Model for SRSS......Page 111
Detailed Design of SRSS......Page 112
FEATURES of the Proposed SRSS......Page 114
References......Page 115
Introduction......Page 116
Definitions and Notations......Page 117
Entities......Page 118
Channels......Page 120
Method to Develop a GSR Fair Exchange Protocol for E-trading......Page 121
Conclusion......Page 122
References......Page 123
Introduction......Page 124
Background and Motivation......Page 125
M-PKI Service Model Using Mobile Phone......Page 126
Store of Private Key onto the Mobile Phone......Page 127
Characteristics and Comparisons......Page 128
References......Page 130
Introduction......Page 131
Defensive Mechanisms against SYN Flooding Attack......Page 132
D-SAT Method......Page 133
IPFIX Architecture......Page 134
FDFIX Method......Page 135
Conclusions......Page 137
References......Page 138
Introduction......Page 140
Motivation......Page 141
The Proposed Message Exchange Mechanism......Page 142
Multisensor Environment......Page 143
Federated Multisensor Environment......Page 144
Formalism......Page 145
Analysis of the Message Exchange Mechanism (MEM)......Page 147
References......Page 148
Introduction......Page 150
Kolmogorov Complexity......Page 151
Information Distance......Page 152
SVM for Classification......Page 153
SVM and rar Experiments......Page 154
Related Works......Page 156
References......Page 157
Introduction......Page 159
System Use-Case......Page 160
Cooperative Threat Detection by Trusting Agents......Page 161
System Evaluation......Page 164
Conclusions......Page 165
References......Page 166
Introduction......Page 167
Limitations of Previous Work......Page 168
PPS Architecture......Page 169
Demultiplexor Operation......Page 170
Switching Operation......Page 171
Multiplexor Operation......Page 172
Performance Simulation and Alanysis......Page 173
References......Page 176
Introduction......Page 178
Methods......Page 179
Results......Page 181
References......Page 185
Introduction......Page 187
Existing Attacks on A5/2 Cipher......Page 188
System of Algebraic Equations for A5/2 Key-Stream Generator......Page 189
Experimental Results on Algebraic Cryptanalysis of A5/2 Using Groebner Basis......Page 191
Conclusion......Page 192
References......Page 193
Introduction......Page 195
Related Work......Page 196
The Calculus of Administrative Domains......Page 197
The Calculus of Administrators......Page 198
Proof Theory......Page 199
Semantics......Page 200
Case Study......Page 201
References......Page 203
Standard Cryptography......Page 205
Two Different Approaches for Quantum Distribution......Page 207
Polarization of Photons - Charles H. Bennett and Gilles Brassard (1984)......Page 208
Entangled Photon States......Page 209
Quantum Coding......Page 211
Quantum Privacy Attacks......Page 212
Summary and Conclusion......Page 213
References......Page 214
Introduction......Page 215
Literature Review......Page 216
Methods......Page 220
Discussion......Page 222
References......Page 223
Low Density Parity Check Codes......Page 225
Optimal Decoding of Binary Block Codes......Page 226
The BP Algorithm......Page 228
Check Node Update Simplification : BP-Based Algorithm......Page 230
Complexity Comparison......Page 231
References......Page 232
Introduction......Page 233
Standard MIP Authentication......Page 234
MIP / AAA Authentication......Page 235
A Local (AAA) Protocol for Mobile IP (LMIP/AAA)......Page 236
Key Management......Page 237
Conclusion......Page 242
References......Page 243
Introduction......Page 244
Introduction to the BioVault Version 1.0 Protocol......Page 245
The Basic BioVault Process......Page 246
Detection of Replay......Page 247
The Token Parcel......Page 249
Conclusion......Page 250
Bibliography......Page 251
Introduction......Page 252
Review of the Lin et al.'s Scheme......Page 253
The Problem of the Lin et al.'s Scheme......Page 255
The Improved Scheme......Page 256
The Security of the Improved Scheme......Page 257
References......Page 258
Introduction......Page 260
A Meta-process for ISRM......Page 261
A Risk Management Knowledge Sharing and Collaboration Platform......Page 263
Conclusions and Further Research......Page 265
References......Page 266
Introduction......Page 268
Mobile Security Gap Analysis......Page 269
Handheld Devices......Page 270
Mobile Networks......Page 271
Security Mechanisms......Page 273
Policy Implications......Page 274
Conclusions......Page 275
References......Page 276
Introduction......Page 277
From Relationship Management to mCRM......Page 278
Mobile CRM Landscape......Page 279
Unique Characteristics of mCRM......Page 280
Five Critical Factors for Mobile CRM......Page 281
m-CRM Specific Factors......Page 282
Taxonomy of Wireless Computing Security......Page 284
Connection Security......Page 286
Mobile VPN Solution......Page 287
Conclusion......Page 288
Reference......Page 289
Introduction......Page 291
E-Commerce Security......Page 292
Security Governance......Page 293
Methodology of Applying Information Security Governance......Page 294
E-Commerce Security Methodologies......Page 295
Services Provided by Digital Signature......Page 296
Use of the Digital Signature Applications in Developing Countries......Page 297
Conclusion......Page 298
References......Page 299
Current Position......Page 300
Benefits of the ISO27004 Approach to Metrics/Measurement......Page 301
Introduction......Page 302
Architecture Layers and Relative Specifications......Page 303
Need for WS Security-Related Specifications......Page 304
The Variety of Platforms for Security Solutions......Page 305
Development Tools Utilized......Page 307
Transaction Security – Session Authentication......Page 308
References......Page 310