The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The identification of vulnerable hosts and subsequent deployment of mitigation mechanisms such as service disabling or installation of patches is both time-critical and error-prone. This is in part owing to the fact that malicious worms can rapidly scan networks for vulnerable hosts, but is further exacerbated by the fact that network topologies are becoming more fluid and vulnerable hosts may only...
Limited capabilities and mission requirements imply that nodes in tactical mobile ad-hoc networks (MANETs) carry a significant risk of being compromised physically or logically. In addition nodes or groups of nodes may defect, which is a particular concern in coalition environments where networks may spread beyond organizational boundaries. To identify defecting or compromised nodes including Byzantine...
Wildcard identity-based encryption (IBE) provides an effective means of communicating among groups which do not have a well-defined membership or hierarchy pre-established, as may frequently be the case in dynamic coalition operations. The protection of group communication against compromised nodes is, however, expensive in that it typically requires frequent re-keying in the case of attribute-based...
While techniques such as biometric face recognition observe facial landmarks and local texture for identification and verification, temporal variability and long term impact of aging reduce recognition accuracy considerably. Facial bone and moreover dental structures, are, however, both exposed directly and much less variable and are routinely used in forensic applications. We propose to use novel...
Privacy protection techniques are an important supplementary of biometric systems. Their main purpose is to prevent security leakages in common biometric systems and to preserve the user's privacy. However, when cryptographic functions are used in the algorithms, randomness of biometric features is strictly required from the security point of view. This randomness is hard to achieve in many feature...
While best practices and standards are emerging, supported by advances in research, for forensic investigations in individual computer systems and networks, new challenges are arising, which threaten to more than make up for the ground gained by investigators and researchers. In this paper we review some of the challenges posed by the increasingly common use of highly distributed and complex systems...
Risk and vulnerability management is a critical task in maintaining any nontrivial network, but made increasingly difficult by the dynamic nature of internetworking, transient connectivity, and the use of virtual machines that are connected intermittently, while both real and virtual hosts may harbor vulnerabilities that must be addressed to protect both the vulnerable host and its environment whether...
This paper presents a novel algorithm for enhancing the efficiency and robustness of distributed trust authority protocols for mobile ad hoc networks (MANETs). Our algorithm determines a quorum of trust authority nodes required for a distributed protocol run based upon a set of quality metrics and establishes an efficient routing strategy to contact these nodes. An implementation and efficiency analysis...
Tactical networks in urban environments are constrained by limited line-of-sight communication and frequent network partitioning. Moreover, energy efficiency for both communication and computation is a major concern as such networks are typically limited to battery-powered devices. Additional resources such as autonomous unmanned vehicles (UVs) or unmanned aerial vehicles (UAVs) are available in today...
While retina recognition is recognized as a highly accurate and difficult to forge biometric, it has not seen widespread acceptance. In addition to user acceptance of what is at times considered an invasive technique, this limited acceptance was caused in part by the relatively high cost of signal acquisition. To alleviate the latter concern, this paper therefore describes a retina recognition algorithm...
Summary form only given. Tactical networks frequently need to be set up without adequate infrastructure in place or where infrastructure elements can be destroyed easily and, moreover, must themselves be mobile and extensible. It is therefore desirable to provide mechanisms based on mobile ad hoc networks, which have been studied intensely in recent years. However, the specific requirements for tactical...
Modern GIS systems increasingly rely on server-side rendering and Web services for the rendering of geographical and application-specific data for both efficiency and security reasons since the underlying data sets for critical infrastructures and emergency operations are typically extremely sensitive. Given that display devices can be spread in the field on mobile devices, the ability to track and...
While dynamic content-based filtering mechanisms for the identification of unsolicited commercial email (UCE, or more commonly "spam") have proven to be effective, these techniques require considerable computational resources. It is therefore highly desirable to reduce the number of emails that must be subjected to a content-based analysis. In this paper, a number of efficient techniques...
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, high level guidance for the derivation of actual penetration attempts. In this paper, a mechanism for the systematic modeling, simulation, and exploitation of complex multistage and multiagent vulnerabilities in networked and distributed systems based on stochastic and interval-timed colored Petri...
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espionage and intelligence activities. This paper describes a fully transparent, capability-based file system security mechanism for use in heterogeneous computing environments with emphasis on the implementation on the Microsoft...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.