Search results for "VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424"

showing 7 items of 7 documents

Privacy Violation Classification of Snort Ruleset

2010

Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacyNaive Bayes classifierComputer scienceRelational databasePrivacy softwareData securityConfidentialityNetwork monitoringIntrusion detection systemData miningcomputer.software_genrecomputer
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

Pattern recognition based authentication in mobile and wireless systems

2008

Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad During last several decades’ mobile communication has aimed a dramatically development, and brought remarkable change of people’s life. Mobile communication offer wireless connectivity that enables mobility and computing in dynamic communication environments. The market demands driving the mobile communication technology development fast ever. Numbers of communication systems have been developed and numerous service providers and equipment vendors entered this market. Therefore many new advance techniques have been introduced into it which gives subscriber a larger bandwidth, more powerful proces…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424IKT590VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010

Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424business.industryControl (management)Information securityIntegrated operationsComputer securitycomputer.software_genreInvestment (macroeconomics)System dynamicsRisk analysis (engineering)Information and Communications TechnologybusinesscomputerRisk managementVulnerability (computing)2010 43rd Hawaii International Conference on System Sciences
researchProduct

Securing Assets with RFID

2008

Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology which has been dormant without very much development. In the last years the interest has grown and new ideas to use it has surfaced. This thesis is set out to present a comprehensive solution proposal for a RFID asset management system. A case will be presented which will be a scarlet thread throughout the paper. We cover areas like RFID technology and standards, tags, readers…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424IKT590VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

A roadmap towards improving managed security services from a privacy perspective

2014

Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacymanaged security servicesPrivacy by Designbusiness.industryComputer scienceDigital forensicsBig dataethical awarenesssecurityIntrusion detection systemLibrary and Information SciencesprivacyComputer securitycomputer.software_genreComputer Science ApplicationsOutsourcingInformation sensitivityintrusion detection and prevention systemsoutsourcingbusinesscomputerRegister of data controllersEthics and Information Technology
researchProduct

Secure Group Communication Using Fractional Public Keys

2010

Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424TheoryofComputation_MISCELLANEOUSScheme (programming language)business.industryComputer scienceKey spaceTheoryofComputation_GENERALCryptographyPublic-key cryptographySymmetric-key algorithmCommunication in small groupsCollusionbusinessKey managementcomputerComputer networkcomputer.programming_language2010 International Conference on Availability, Reliability and Security
researchProduct