International Conference on Emerging Security Information, Systems and Technologies
About: International Conference on Emerging Security Information, Systems and Technologies is an academic conference. The conference publishes majorly in the area(s): Computer security model & Authentication. Over the lifetime, 364 publication(s) have been published by the conference receiving 2858 citation(s).
Topics: Computer security model, Authentication, Security information and event management, Mobile computing, The Internet
18 Jun 2009
TL;DR: A survey of botnet and botnet detection techniques is presented, which clarifies botnet phenomenon and discusses botnets detection techniques, and summarizes bot network detection techniques in each class and provides a brief comparison.
Abstract: Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The defining characteristic of botnets is the use of command and control channels through which they can be updated and directed. Recently, botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention. This paper is a survey of botnet and botnet detection. The survey clarifies botnet phenomenon and discusses botnet detection techniques. This survey classifies botnet detection techniques into four classes: signature-based, anomaly-based, DNS-based, and mining-base. It summarizes botnet detection techniques in each class and provides a brief comparison of botnet detection techniques.
25 Aug 2008
TL;DR: A new method for trust network analysis is described which is considered optimal because it does not require trust graph simplification, but instead uses edge splitting to obtain a canonical graph.
Abstract: Trust network analysis with subjective logic (TNA-SL) simplifies complex trust graphs into series-parallel graphs by removing the most uncertain paths to obtain a canonical graph. This simplification could in theory cause loss of information and thereby lead to sub-optimal results. This paper describes a new method for trust network analysis which is considered optimal because it does not require trust graph simplification, but instead uses edge splitting to obtain a canonical graph. The new method is compared with TNA-SL, and our simulation shows that both methods produce equal results. This indicates that TNA-SL in fact also represents an optimal method for trust network analysis and that the trust graph simplification does not affect the result.
14 Oct 2007
TL;DR: This paper surveys how the requirements for identity management have evolved, and their associated technologies, with emphasis on the federated approaches and user-centricity.
Abstract: Computing anytime anywhere is more and more the rule. In this ambient intelligent world, the choice of identity mechanisms will have a large impact on its social, cultural, business and political aspects. Privacy is a human need and the whole of society would suffer from its demise. Moreover, people have a hectic life and cannot spend their time administering their digital identities. In this paper, we survey how the requirements for identity management have evolved, and their associated technologies, with emphasis on the federated approaches and user-centricity.
25 Aug 2008
TL;DR: This work presents the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques and introduces an additional privilege level that is only used by a virtual machine monitor to issue management commands to the TPM.
Abstract: We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the complete power of a hardware TPM by providing for every virtual machine (VM) the illusion that it has its own hardware TPM. For this purpose, we introduce an additional privilege level that is only used by a virtual machine monitor to issue management commands, such as scheduling commands, to the TPM. Based on a TPM Control Structure, we can ensure that state information of a virtual machine's TPM cannot corrupt the TPM state of another VM. Our approach uses recent developments in the virtualization technology of processor architectures.
25 Aug 2008
TL;DR: A method for measuring the performance of the implementation and operation of an ISMS is presented and it is shown that the number of certified enterprises and the quality and performance of its implementation are low.
Abstract: The ISO27001:2005, as an information security management system (ISMS), is establishing itself more and more as the security standard in enterprises. In 2008 more than 4457 certified enterprises could be registered worldwide. Nevertheless, the registering an ISMS still says nothing about the quality and performance of its implementation. Therefore, in this article, a method for measuring the performance of the implementation and operation of an ISMS is presented.
Related Conferences (5)
Availability, Reliability and Security
2.1K papers, 24.8K citations
Trust, Security And Privacy In Computing And Communications
2.3K papers, 18.5K citations
International Workshop on Security
2K papers, 33.5K citations
European Symposium on Research in Computer Security
1K papers, 35.4K citations
Advanced Information Networking and Applications
5.7K papers, 56.4K citations