Loading...
Search for:
security-systems
0.007 seconds
Total 59 records
Comments on a lightweight cloud auditing scheme: Security analysis and improvement
, Article Journal of Network and Computer Applications ; Volume 139 , 2019 , Pages 49-56 ; 10848045 (ISSN) ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
Academic Press
2019
Abstract
In a cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Recently, Shen et al. proposed a new lightweight and privacy preserving cloud data auditing scheme which employs a third party medium to perform time-consuming operations on behalf of users. The authors have claimed that the scheme meets the security requirements of public auditing mechanisms. In this paper, we show that Shen et al.'s scheme is insecure by proposing two attacks on the scheme. In the first attack, an outside adversary can modify some messages in transmission to the cloud server...
A dynamic mandatory access control model
, Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 862-866 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) ; Amini, M ; Jalili, R ; Sharif University of Technology
2008
Abstract
Mandatory access control has traditionally been employed as a robust security mechanism in critical environments like military ones. As computing technology becomes more pervasive and mobile services are deployed, applications will need flexible access control mechanisms. Aggregating mandatory models with context-awareness would provide us with essential means to define dynamic policies needed in critical environments. In this paper, we introduce a dynamic context-aware mandatory access control model which enables us to specify dynamic confidentiality and integrity policies using contextual constraints. © 2008 Springer-Verlag
Reduction of sensor population in a camera sensor network
, Article 2008 International Symposium on Telecommunications, IST 2008, Tehran, 27 August 2008 through 28 August 2008 ; 2008 , Pages 349-353 ; 9781424427512 (ISBN) ; Samavi, S ; Ashori, M ; Karimi, N ; Fotohi, M ; Kasiri, K ; Sharif University of Technology
2008
Abstract
The problem of surveillance for intrusion detection in a camera sensor network is addressed in this paper. In order to save limited resources, a sensing task should involve just the right number of sensors. For a wide enough coverage area random and uniform distribution can be applied. We propose a novel method which allows reduction of number of sensors and guarantees a desired surveillance against aerial intrusion. Enhancement of the method is also offered to further reduce the number of sensors and improve the performance. ©2008 IEEE
Composite system reliability evaluation incorporating protection system failures
, Article Canadian Conference on Electrical and Computer Engineering 2005, Saskatoon, SK, 1 May 2005 through 4 May 2005 ; Volume 2005 , 2005 , Pages 486-489 ; 08407789 (ISSN) ; Sanaye Pasand, M ; Fotuhi Firuzabad, M ; Sharif University of Technology
2005
Abstract
Protection system malfunction play a significant role in the sequence of events leading to power system blackouts. This paper describes power system reliability evaluation incorporating protection system failures. A reliability model is used in order to determine the impact of protection system failure on power system reliability. The mechanism and scheme of protection and their hidden failure are analyzed based on their contribution to the cascading outage after occurrence of a fault. A number of reliability indices such as LOLP, EENS and ECI are calculated to describe the impact of protection system failures on reliability of power system. © 2005 IEEE
Security and privacy analysis of song-mitchell RFID authentication protocol
, Article Wireless Personal Communications ; Volume 69, Issue 4 , May , 2013 , Pages 1583-1596 ; 09296212 (ISSN) ; Aref, M. R ; Sharif University of Technology
2013
Abstract
Many applications, such as e-passport, e-health, credit cards, and personal devices that utilize Radio frequency Identification (RFID) devices for authentication require strict security and privacy. However, RFID tags suffer from some inherent weaknesses due to restricted hardware capabilities and are vulnerable to eavesdropping, interception, or modification. The synchronization and untraceability characteristics are the major determinants of RFID authentication protocols. They are strongly related to privacy of tags and availability, respectively. In this paper, we analyze a new lightweight RFID authentication protocol, Song and Mitchell, in terms of privacy and security. We prove that not...
Attribute-based ring signatures: Security analysis and a new construction
, Article 2013 10th International ISC Conference on Information Security and Cryptology ; 2013 ; Asaar, M. R ; Salmasizadeh, M ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
In this study, we review attribute-based ring signature schemes. Our proposal presents two contributions; the first one is security analysis of Wenqiang et al.'s scheme in 2009 by presenting an attack in which we show that their scheme is forgeable. The second contribution is an efficient attribute-based ring signature scheme with constant size and constant number of pairing operations. Our scheme is unconditionally anonymous and unforgeable in the standard model. The security of our proposal is based on Static Diffie Hellman (SDH) problem. Compared with the existing attribute-based ring signature scheme with constant size, the length of the signature and the pairing operations in our scheme...
Organizational secure knowledge flow model
, Article 2015 7th Conference on Information and Knowledge Technology, IKT 2015, 26 May 2015 through 28 May 2015 ; May , 2015 , Page(s): 1 - 6 ; 9781467374859 (ISBN) ; Shalmani, M. T. M ; Habibi, J ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
With the advance and growth of knowledge management in the past two decades, currently knowledge is regarded as one of the most significant organizational assets. Today the success of businesses is dependent on the value that they give to knowledge and how they attempt to manage it. Hence, in such conditions, knowledge as a valuable asset of the organization must be well-protected. What is managed in knowledge management in organizations is actually not knowledge. What are managed are the knowledge-related processes thru which knowledge workers interact with each other. Hence, organizational knowledge protection does not mean protecting knowledge, but securing the management of knowledge and...
A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework
, Article Journal of Information Security and Applications ; Volume 43 , 2018 , Pages 99-109 ; 22142134 (ISSN) ; Rezaei Aliabadi, M ; Sharif University of Technology
Elsevier Ltd
2018
Abstract
Designing an efficient and secure electronic voting (e-voting) protocol without the presence of trusted authorities, known as decentralized voting protocols, is one of the most interesting and challenging problems in cryptography. In these protocols the outcome of the protocol is computed by voters collaborating with each other. We provide a rigorous proof of security of a decentralized e-voting protocol proposed by Khader et al. in the Universal Composability (UC) Framework. This protocol is the state-of-the-art decentralized e-voting protocol in terms of efficiency and security, whose security has only been justified against a set of desired properties required in e-voting protocols. For...
A temporal description logic based access control model for expressing history constrained policies in semantic web
, Article Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009, 20 July 2009 through 22 July 2009, London ; 2009 , Pages 142-149 ; 9780769537429 (ISBN) ; Amini, M ; Jalili, R ; Sharif University of Technology
2009
Abstract
An access control model for Semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering the benefits of logic-based models and the description logic foundation of Semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics (TL-ALCF). This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous accesses. The specification of each component of the model as well as the approach to define history...
Handling context in a semantic-based access control framework
, Article Proceedings - International Conference on Advanced Information Networking and Applications, AINA, 26 May 2009 through 29 May 2009, Bradford ; 2009 , Pages 103-108 ; 1550445X (ISSN); 9780769536392 (ISBN) ; Amini, M ; Jalili, R ; IEEE Computer Society ; Sharif University of Technology
2009
Abstract
As semantic web grows, security concerns increase. One concern is controlling accesses to resources in this environment. In order to infer whether the access is allowed or not, different information of different entities including contextual information should be involved. From access control point of view, we divide the entities in semantic web into three categories: resources (objects), requesters (subjects), and environment (infrastructure, time, and location). In this paper, we present a semantic-based context-aware access control framework to be applied in semantic web, considered as a multi-domain environment. To handle context information in the framework, we propose a context...
A novel solution for root-MUSIC with reduced complexity
, Article 6th Iranian Conference on Radar and Surveillance Systems, ICRSS 2019, 4 December 2019 through 6 December 2019 ; 2019 ; 9781728129372 (ISBN) ; Karbasi, S. M ; Bastani, M. H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
The root-MUSIC algorithm is a popular method to estimate Angle of Arrival (AoA) as an extension of multiple signal classification (MUSIC). In this paper, we have proposed a novel solution for the root-MUSIC algorithm. The new method exhibits a much lower computational complexity, while maintaining the same theoretical performance as the root-MUSIC. © 2019 IEEE
Calculus for composite authorities' policy derivation in shared domains of pervasive computing environments
, Article 11th International Conference on Computer and Information Technology, ICCIT 2008, Khulna, 25 December 2008 through 27 December 2008 ; March , 2008 , Pages 21-28 ; 9781424421367 (ISBN) ; Jalili, R ; Sharif University of Technology
2008
Abstract
The decentralized security management in a pervasive computing environment' requires apportioning the environment into several security domains. In each security domain' an administrator (we call it authority) is responsible for specifying the security policies of the domain. Overlapping of security domains results in the requirement of cooperative security management in the shared/ overlapping domains. To satisfy this requirement' we propose an abstract security model' as well as its supplementary calculus of composite authorities. The security model is based on deontic logic and is independent of the domains' heterogeneity. The model's policy language (we call it MASL) enables multiple...
Using description logics for network vulnerability analysis
, Article International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, Morne, 23 April 2006 through 29 April 2006 ; Volume 2006 , 2006 ; 0769525520 (ISBN); 9780769525525 (ISBN) ; Jalili, R ; Abolhassani, H ; Shahriari, H. R ; Sharif University of Technology
2006
Abstract
The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model which could be used to analyze TCP/IP networks against attacks....
Multiple human tracking using PHD filter in distributed camera network
, Article Proceedings of the 4th International Conference on Computer and Knowledge Engineering, ICCKE 2014 ; 2014 , pp. 569-574 ; ISBN: 9781479954865 ; Jamzad, M ; Sharif University of Technology
Abstract
The Gaussian mixture probability hypothesis density (GM-PHD) filter is a closed form approximation of the multi-target Bayes filter which can overcome most multitarget tracking problems. Limited field of view, decreasing cost of cameras, and advances of using multi-camera induce us to use large-scale camera networks. In this paper, a multihuman tracking framework using the PHD filter in a distributed camera network is proposed. Each camera tracks objects locally with PHD filter and a track-after-detect scheme and its estimates of targets are sent to neighboring nodes. Then each camera fuses its local estimates with it's neighbors. The proposed method is evaluated on the public PETS2009...
Making HeNB more secure with improved secure access protocol and analyzing it
, Article Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 16 September 2015 through 18 September 2015 ; Volume 158 , 2015 , Pages 107-120 ; 18678211 (ISSN) ; 9783319269245 (ISBN) ; Payandeh, A ; Habibi, H ; Sharif University of Technology
Springer Verlag
2015
Abstract
The 3rd Generation Partnership Project (3GPP) defined a new architecture, called Home eNode B (HeNB). HeNB is able to provide new services with higher data rate in a low cost. Security is a critical aspect of HeNB. In order to have HeNB secure access to core network, 3GPP defines an authentication protocol based on IKEv2. A number of security vulnerabilities such as HeNB masquerading have not been addressed and solved by 3GPP technical specification yet. In this paper an improved HeNB authentication protocol is introduced which does not allow an attacker to connect unauthorized network users using a mask. Finally, we evaluate our protocol performance and verify it by Automated Validation of...
Specification of history based constraints for access control in conceptual level
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 17 December 2010 through 19 December 2010, Gandhinagar ; Volume 6503 LNCS , 2010 , Pages 186-200 ; 03029743 (ISSN) ; 9783642177132 (ISBN) ; Amini, M ; Jalili, R ; Sharif University of Technology
2010
Abstract
An access control model for Semantic Web should take the semantic relationships among the entities, defined in the abstract conceptual level (i.e., ontology level), into account. Authorization and policy specification based on a logical model let us infer implicit security policies from the explicit ones based on the defined semantic relationships in the domains of subjects, objects, and actions. In this paper, we propose a logic based access control model for specification and inference of history-constrained access policies in conceptual level of Semantic Web. The proposed model (named TDLBAC-2) enables authorities to state policy rules based on the history of users' accesses using a...
An identity-based network access control scheme for single authority MANETs
, Article Proceedings - 2010 IEEE Asia-Pacific Services Computing Conference, APSCC 2010, 6 December 2010 through 10 December 2010 ; December , 2010 , Pages 462-468 ; 9780769543055 (ISBN) ; Movaghar, A ; Institute of Electrical and Electronics Engineers; IEEE Computer Society; IEEE Comput. Soc. Tech. Comm. Serv. Comput. (TCSC); Natural Science Foundation of China; Hangzhou Dianzi University ; Sharif University of Technology
2010
Abstract
Security in mobile ad hoc networks (MANETs) is an active research topic. Bulks of prior work focused on key management and secure routing without addressing an important pre-requisite: network access control, the problem of how securely extend the network. In this paper, we present INAC, an identity-based network access control scheme for MANETs. In INAC, each node in the network must have an identity-based membership token in order to take part in network activities. Membership tokens have special formats, which not only guarantee security of non-compromised nodes, but also enable that nodes obtain identity-based membership tokens based on their trustworthiness. Through simulations we...
Pore-scale analysis of filtration loss control by colloidal gas aphron nano-fluids (CGANF) in heterogeneous porous media
, Article Experimental Thermal and Fluid Science ; Volume 77 , 2016 , Pages 327-336 ; 08941777 (ISSN) ; Ghazanfari, M. H ; Sharif University of Technology
Elsevier Inc
2016
Abstract
This study concerns micro-scale analysis of filtration loss control induced by blockage ability of a new colloidal gas fluid, Colloidal Gas Aphron Nano-Fluid (CGANF) in fractured porous media. Fumed silica nanoparticles and a novel environmentally friendly bio surfactant, Olea Europaea, were used for monitoring CGANF displacements in heterogeneous micromodels including single fracture. Analysis of pressure drop along the micromodel during tests showed an increasing resistance to flow of CGANF dispersion through porous media as more CGANF was injected. When lamella division occurs, more small bubbles are formed and then pressure drop through porous media increases. Small bubbles play an...
Welcome to Binder: a kernel level attack model for the Binder in Android operating system
, Article 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 156-161 ; 9781509034345 (ISBN) ; Daryabar, F ; Tadayon, M. H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2017
Abstract
In this paper, we consider to seek vulnerabilities and we conduct possible attacks on the crucial and essential parts of Android OSs architecture including the framework and the Android kernel layers. As a regard, we explain the Binder component of Android OS from security point of view. Then, we demonstrate how to penetrate into the Binder and control data exchange mechanism in Android OS by proposing a kernel level attack model based on the hooking method. As a result, by implementing the attack model, it is illustrated that the Android processes are detectable and the data can be extracted from any process and system calls. © 2016 IEEE
RI-COTS: trading performance for reliability improvements in commercial of the shelf systems
, Article 19th International Symposium on Computer Architecture and Digital Systems, CADS 2017, 21 December 2017 through 22 December 2017 ; Volume 2018-January , March , 2018 , Pages 1-6 ; 9781538643792 (ISBN) ; Hosseini Monazzah, A. M ; Farbeh, H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2018
Abstract
The flexibility of software-based fault tolerant approaches in providing the required level of reliability Commer-cial-Off-The Shelf (COTS) devices made them the first choice in designing safety-critical systems. In this paper, we propose a reliability improvement method for COTS-based systems, so-called, RI-COTS. The main idea behind RI-COTS is to establish a tradeoff between reliability and performance of COTS system through controlling redundant execution at instruction level. RI-COTS is implemented on LEON2 processor VHDL model. Our simulation results show that comparing with the most related studies, RI-COTS can improve the fault detection capability by 20% with only 4% performance...