Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.2 No.1 (7건)
No
1

A Design Pattern Detection Technique that Aids Reverse Engineering

Hakjin Lee, Hyunsang Youn, Eunseok Lee

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.2 No.1 2008.01 pp.1-11

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

If software design-patterns could be captured and reused then this would be very helpful to reverse-engineering often practiced by those who develop and who maintain software. The ad-hoc nature and informality of this reverse-engineering process however, makes the discovery of these patterns not straightforward. Moreover, a high false positive rate results from trying to detect these design-patterns. Although several static and dynamic analysis approaches have been proposed to overcome these difficulties, each technique cannot be used separately because of different reasons. And, even if this were possible, each technique in isolation cannot address detection of all of the important patterns. We propose a new taxonomy of GoF design patterns that can guide the reverse-engineering process. This new approach not only combines static analysis with dynamic analysis but also adds what we call the implementation-specific analysis. Using it we demonstrate that the reverse engineering process is faster and more accurate.

2

A New Special Biometric Identity Based Signature Scheme

Xiaodong Liu, Quan Miao, Daxing Li

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.2 No.1 2008.01 pp.13-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We propose a new special identity based signature scheme that make uses of fractal transform and entropy arrangement algorithm to generate the public key string from a biometric measurement of signer. A biometric reading provided by the alleged signer would be enough to verify the signature. The characteristic of this scheme is that When verifier finished the verification on the signature, he can compare the biometric information reconstructed by public key with that provided by signer to ensure the relationship between the public key and signer. So, this makes the verification more convenient and intuitionistic. Finally, we describe two possible attacks on this system and suggest ways to combat it.

3

Intelligent Search Mechanism based on Neuro-fuzzy System for the Distributed Object Groups

Romeo Mark A. Mateo, Jaewan Lee

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.2 No.1 2008.01 pp.19-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Current research in distributed systems focuses on object group models which are designed for scalable systems and provide accessible objects to the entire group. However, dynamic grouping using knowledge extraction from group of objects is not considered which provides accurate search for appropriate objects. In this paper, an integration of intelligent models in distributed object groups is presented in intelligent distributed framework. This paper proposes a locator service for the framework which implements the intelligent search mechanism based on neuro-fuzzy system. To have an accurate search of objects, the fuzzy system of the locator service is trained using the neuron-fuzzy algorithm. The proposed method is compared to other methods in accuracy of classification and result shows that it outperformed other algorithm based on processing time and accuracy.

4

Preventing Information Leakage in Secure Multiple XML Documents Publishing

Yixiang Ding, Tao Peng, Minghua Jiang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.2 No.1 2008.01 pp.29-37

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The Prevalent use of XML highlights an increasing need that publishing XML documents should meet precise security requirements, without revealing sensitive information to unauthorized users. We consider data-publishing applications where the publisher specifies what information is sensitive and should be protected. Hiding the sensitive information is no enough and the users can use common knowledge (e.g. “all patients in the same ward have the same disease”) to infer more data, which can cause leakage of sensitive information. We formulate the process how users can infer data using three types of common XML constraints and several functional dependencies. We develop a novel paradigm for finding a max partial document without causing information leakage when we publish several related XML documents, while allowing publishing as much data as possible. The experiments on real data sets show that effect of inference on data security, and how the paradigm can prevent leaking the sensitive information.

5

Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments

Miss Laiha Mat Kiah, Keith M. Martin

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.2 No.1 2008.01 pp.39-51

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Secure group communication allows a set of nodes (or devices) to communicate securely amongst each other over unprotected and open networks. Provision of security for group communication is based on cryptographic services, which relies on careful management of cryptographic keying material. Securing group communication in wired networks is fairly well understood, however wireless networks introduce further challenges as group members may move from one place to another while still remaining in a group session. In this paper we propose a host mobility protocol to govern group member movement in wireless mobile environments. We introduce the use of lists as part of our protocol design in order to facilitate host mobility.

6

Mining User Models for Effective Adaptation of Context-aware Applications

Shiu Lun Tsang, Siobhan Clarke

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.2 No.1 2008.01 pp.53-62

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Current context-aware adaptation techniques are limited in their support for user personalisation. Complex codebases, a reliance on developer modification and an inability to automatically learn from user interactions hinder their use for tailoring behaviour to individuals. To address these problems we have devised a personalised, dynamic, run-time approach to adaptation. The approach provides techniques for selecting the relevant information from a user’s behaviour history, for mining usage patterns, and for generating, prioritising, and selecting adaptation behaviour. Our evaluation study shows that the proposed mining approach is more accurate than rule-based and neural network methods when compared to actual user choices.

7

Definition of Security Practices in Security Management Part of Security Level Management Model

Tai-Hoon Kim, Kouichi Sakurai

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.2 No.1 2008.01 pp.63-71

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

To manage security level of IS, the first, organizations must be able to decide security level, the second, organizations must have procedures for building security countermeasures according to security level. For next step, organizations must be able to select areas where security countermeasures should be applied, and the last, organizations must be able to evaluate and improve the effect of security countermeasures. In this paper, we propose some essential elements for security level management of IS. These essential elements are expressed like as security practices, and in this paper, we propose some security practices related to security management area.

 
페이지 저장