Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.5 No.2 (6건)
No
1

Bouncer : Policy-Based Fine Grained Access Control in Large Databases

Lukasz Opyrchal, Jeff Cooper, Ryan Poyar, Brian Lenahan, Daniel Zeinner

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.5 No.2 2011.04 pp.1-16

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Current access control solutions in databases are based on tables and views. While view access control approach is flexible, it does not scale when the number of users (and therefore necessary views) is large. Consequently, most applications are forced to perform access control enforcement in the application code instead of the database. This approach has numerous disadvantages. We present a novel approach for fine-grained access control in large databases. Our solution combines relational databases with trust management techniques. Trust management systems such as KeyNote and CPOL can be used to evaluate policy rules to determine whether a given query can be performed and which parts of the resulting data can be presented to the user. We present the design and implementation of our system as well as a set of performance experiments based on MySQL database and CPOL policy evaluation engine.

2

Cyber Security Threats Detection Using Ensemble Architecture

Te-Shun Chou

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.5 No.2 2011.04 pp.17-32

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper describes an ensemble design for cyber security threats detection, which fuses the results from multiple classifiers together to make a final assessment decision. For promoting both speed and accuracy in the detection performance, only some of the features in traffic data are selected for each base classifier. In the kernel of each classifier, we combine Dempster-Shafer theory with k-nearest neighbor technique to solve the uncertainty problems caused by ambiguous and limited intrusion information. In addition, we apply data mining techniques to reduce the number of false alarms. The results indicate that our ensemble approach achieves higher detection rates than that of using a full feature set of classifiers.

3

Digital Watermarking Scheme Based on Fast Fourier Transformation for Audio Copyright Protection

Pranab Kumar Dhar, Jong-Myon Kim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.5 No.2 2011.04 pp.33-48

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Digital watermarking is now drawing attention as a new method of protecting digital content from unauthorized copying. This paper proposes a new watermarking scheme in based on Fast Fourier Transformation (FFT) for copyright protection of digital audio. In the proposed watermarking scheme, the original audio is segmented into non-overlapping frames. Watermarks are embedded into the selected prominent peaks of the magnitude spectrum of each frame. Informal listening reveals excellent imperceptibility of the embedded watermark. The proposed watermarking scheme is tested by various kinds of attack to demonstrate the robustness of watermarking. Simulation results suggest that the imperceptible watermarks embedded with the proposed method are highly robust against various kinds of attacks such as noise addition, cropping, re-sampling, re-quantization, MP3 compression, and low pass filtering. We observe that the proposed scheme shows similar robustness compare to Cox’s method. In addition, the proposed method provides better performance than Cox’s method in terms of SNR result because of embedding watermarks into the selected prominent peaks of magnitude spectrum of each frame of the original audio signal. Our proposed scheme achieves SNR (signal-to-noise ratio) values ranging from 20 dB to 28 dB, in contrast to Cox's method which achieves SNR values ranging from only 14 dB to 23 dB.

4

Evaluation of Countermeasures Against Fault

Ahmadou A. SERE, Julien Iguchi-Cartigny, Jean-Louis Lanet

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.5 No.2 2011.04 pp.49-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Java Card are devices subject to either hardware and software attacks. Thus several countermeasures need to be embedded to avoid the effects of these attacks. Recently, the idea to combine logical attacks with a physical attack to bypass bytecode verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified on-card using laser beam. Such applications become mutant applications, with a different behavior. This internal change could lead to bypass control and protection and thus should offer illegal access to secret data and operation inside the chip. In this paper, we propose a set of countermeasures that can be activated by the developer using the annotation mechanism. These countermeasures are efficient but also affordable for the smart card domain, as shown by the evaluation of the coverage and memory usage.

5

Multibiometrics Feature Level Fusion by Graph Clustering

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.5 No.2 2011.04 pp.61-74

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a feature level fusion approach which uses the improved K-medoids clustering algorithm and isomorphic graph for face and palmprint biometrics. Partitioning around medoids (PAM) algorithm is used to partition the set of n invariant feature points of the face and palmprint images into k clusters. By partitioning face and palmprint images with scale invariant features SIFT points, a number of clusters are formed on both the images. Then on each cluster, an isomorphic graph is drawn. Most probable pair of graphs is searched using iterative relaxation algorithm from all possible isomorphic graphs for a pair of corresponding face and palmprint images. Finally, graphs are fused by pairing the isomorphic graphs into augmented groups in terms of addition of invariant SIFT points and in terms of combining pair of keypoint descriptors by concatenation rule. Experimental results obtained from the extensive evaluation show that the proposed feature level fusion with the improved K-medoids partitioning algorithm improves the performance of the system.

6

Proxy Re-encryption with Keyword Search: New Definitions and Algorithms with Proofs

Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.5 No.2 2011.04 pp.75-93

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (Re-dPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model, along with the proofs.

 
페이지 저장