Advances in Security Technology

International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

Advances in Security Technology

International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

59,92 €*

lieferbar, sofort per Download

This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008. The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008).

1;Preface;52;Organization;63;Table of Contents;94;Security Analysis of "A Novel Elliptic Curve Dynamic Access Control System";114.1;Introduction;114.2;Review the WWC-Scheme;134.2.1;The Operations of the Elliptic Curve;134.2.2;The WWC-Scheme;144.2.3;Inserting New Security Class;164.2.4;Adding Ordered Relationships;164.2.5;Deleting Relationships;174.2.6;The Security Analysis and Discussion;184.3;On the Security of WWC-Scheme;204.3.1;The Novel Exterior Attack;214.3.2;On the Security of Adding Ordered Relationships in WWC-Scheme;224.4;Conclusions;234.5;References;235;VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions;255.1;Introduction;255.2;Background Study;265.2.1;Session Initiation Protocol (SIP);265.2.2;Types of VoIP SPAM;275.2.3;Adapting Anti-spam Solutions for Email Field to VoIP Service;285.2.4;Feature of SPAM Caller;285.2.5;Cost of VoIP SPAM Call;305.3;VoIP SPAM Response System;305.4;Implementation of a Phased ANTI-SPIT Framework;315.4.1;Graylist Module and SPIT Level Decision Model;335.4.2;SPIT Level Decision Algorithm;335.4.3;SIP_SPF Module;355.4.4;Easy SPAM Reporter Module;375.5;Experiments;385.5.1;Evaluation Factors for Spam Filters;385.5.2;Experimental Results;395.6;Conclusion and Future Work;395.7;References;406;Feature Extraction for IRIS Recognition;416.1;Introduction;416.2;Previous Works;436.3;Our Work;456.3.1;24-bit Bitmap Color Image to 8-bit Gray Scale Conversion;456.3.2;IRIS Edge Detection;466.3.3;IRIS Effective Region Extraction and Pattern Generation;466.4;Result;476.5;Conclusion;486.6;References;497;Bidirectional Quantum Secure Direct Communication Based on Entanglement;507.1;Introduction;507.2;QSDC Protocol;527.3;Security Analysis;557.4;Conclusions;587.5;References;588;Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux;608.1;Introduction;608.2;Discretionary Access Control Mechanism of Linux;618.2.1;Unix-Like POSIX Permissions System;618.2.2;Capabilities;628.2.3;ACL;628.3;Mandatory Access Control Mechanism of Linux (SELinux);628.3.1;Architecture and Principle of SELinux;628.3.2;Policy Configuration of SELinux;638.3.3;Evaluation of SELinux;648.4;A New Mandatory Access Control Mechanism;648.4.1;LYSLinux Access Control Model;658.4.2;Description of Security Policy;668.4.3;Storage and Management of Security Policy;688.5;Prototype Design and Implementation;698.5.1;Security Facilities Inside Linux Kernel;698.5.2;Structural Design of LYSLinux Access Control Module;718.5.3;Process Design of Mandatory Access Control Based on LYSLinux;728.5.4;Prototype Implementation;738.6;Prototype Test and Results;748.7;Summary;758.8;References;759;Research on Streaming Data Integration System about Security Threat Monitor;779.1;Introduction;779.1.1;Limitations of the Current System;779.1.2;Requirements in Reality;789.1.3;Our Solution;789.1.4;Paper Organization;799.2;Related Work;809.2.1;Existing Network Monitor System;809.2.2;Data Stream Management System;809.3;Desiderata for GS-TMS System;819.3.1;Continuous;819.3.2;Automatic and Robust;819.3.3;Transparent;819.3.4;Efficient;819.3.5;Simple;819.4;The System Architecture;819.4.1;The Components of the System;819.4.2;Log to Stream;839.4.3;Stream Schema Matching;849.4.4;Query Language;849.4.5;Query Rewriting;849.4.6;Broken Mapping Detection;859.4.7;Summarization;859.5;Evaluation Design;859.6;Conclusion;879.7;References;8710;Using Honeypots to Secure E-Government Networks;8910.1;Introduction;8910.2;E-Government;9010.3;Honeypots;9110.3.1;Physical Honeypot;9310.3.2;Virtual Honeypot;9310.3.3;Advantages and Disadvantages of Various Kinds of Honeypots;9310.3.4;Honeynet and Honeywall;9410.4;The Proposed Model of a Fault Tolerance Honeynet for Securing E-Government;9410.5;Conclusion;9710.6;References;9711;Trust-Risk-Game Based Access Control in Cross Domain Application;9911.1;Introduction;9911.2;Related Work;10111.3;Access Control Mecha
ISBN 9783642102400
Artikelnummer 9783642102400
Medientyp E-Book - PDF
Copyrightjahr 2009
Verlag Springer-Verlag
Umfang 170 Seiten
Sprache Englisch
Kopierschutz Adobe DRM