The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we combine formal modeling and analysis of infrastructures of organizations with sociological explanation to provide a framework for insider threat analysis. We use the higher order logic (HOL) proof assistant Isabelle/HOL to support this framework. In the formal model, we exhibit and use a common trick from the formal verification of security protocols, showing that it is applicable...
Cyber-physical systems represent an engineering challenge due to their safety and security concerns, particularly those systems involved in critical infrastructure which require some of the highest standards of safety, availability, integrity and security. The complexity of these systems makes the identification and analysis of safety and security requirements challenging. In this paper, we present...
The task of generating network-based evidence to support network forensic investigation is becoming increasingly prominent. Undoubtedly, such evidence is significantly imperative as it not only can be used to diagnose and respond to various network-related issues (i.e., performance bottlenecks, routing issues, etc.) but more importantly, can be leveraged to infer and further investigate network security...
The security of Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community. To this end, this paper sheds the light on a number of security approaches for CPS from two perspectives, namely, control-theoretic and cyber security. Further, threat detectors in various CPS environments are highlighted and discussed. The aim is to demonstrate the lack of coherent...
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature especially when it comes to critical transmitted data in a real-time environment. At the same time, the implementation of security counter-measures in such systems may impact transmission delays of critical tasks. For this reason selecting proper security mechanisms in such critical systems is an important issue...
Social network connectivity data that is anonymized and publicized for academic or commercial purposes are often vulnerable to de-anonymization attacks from attackers utilizing side information in the form of a second, public or crawled social network. Correlation between the two networks is the key factor allowing this attack scheme to work successfully. In this work, the best attack strategy available...
Due to complex and heterogeneous nature of a software being used in present-day scenario, the need for developing solution to the design related problems, where solutions were made earlier can be reused in a recurring manner. For solving various design problems, it is observed that design pattern helps to find a better solution to many of the recurring design problems. Generally, design patterns are...
In the course of performing their duties, system security engineers must develop a detailed understanding of cyber systems, the missions those systems support, the associated cyber threat, and the risk the threat poses to mission. They use this information to specify and track cyber requirements, security controls, and the architectural aspects that allow the controls to be coordinated and implemented...
To address future coalition operations in congested, cluttered, contested, connected and constrained battlespace, the US Army Research Laboratory and the UK Defence Science and Technology Laboratory are developing a new research program on Distributed Analytics and Information Science International Technology Alliance. In this paper, we present an overview the two interrelated Technical Areas which...
The Accessibility Stable Analysis Pattern intends to describe the core knowledge behind the concept of Accessibility. Accessibility finds an extensive range of usages in various applications. The pattern also gives an excellent start to software developers, by defining the core knowledge of any accessibility problem. Any developer can build on, extend or reuse the pattern to model any specific application...
In this work, we present a differential fault analysis of the SHA-3 finalist Gr⊘stl when used in the dedicated MAC mode. The fault model exploited here is similar to fault repeatability model proposed and used by Roche et al. in CARDIS 2011. We propose a new way of extracting half of the state of Gr⊘stl from the knowledge of the remaining half. This result is of particular interest since it may be...
Trustworthiness and technological security solutions are closely related to online collaborative learning as they can be combined with the aim of reaching information security requirements for e-Learning participants and designers. In this paper, we justify the need of trustworthiness models as a functional requirement devoted to improve information security. To this end, we propose a methodological...
Over the last decade, information security has been considered a key issue in e-Learning design. Although security requirements can be met with advanced technological approaches and these solutions offer feasible methods in many e-Learning scenarios, on-line assessment activities usually show specific issues that cannot be solved with technology alone. In addition, security vulnerabilities in on-line...
Security patterns describe security solutions that can be used in a particular context for recurring problems in order to solve a security problem in a more structured and reusable way. Patterns in general and Security patterns in particular, have become important concepts in software engineering, and their integration is a widely accepted practice. In this paper, we propose a model-driven methodology...
Detection of human behavior in On-line Social Networks (OSNs) has become more and more important for a wide range of applications, such as security, marketing, parent controls and so on, opening a wide range of novel research areas, which have not been fully addressed yet. In this paper, we present a two-stage method for anomaly detection in humans' behavior while they are using a social network....
This paper uses Agent-based modeling and simulation to study collective violent events from the perspective of individual's risk perception, by abstracting individual's risk preference, emotion factor, risk level and other factors we analyze and explore the influence of each factors to collective violent events. Considerable simulations indicate that, individual's density risk preference determines...
Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to recognize that the incorporation of security features should proceed by means of a systematic approach, combining principles from both software and security engineering. Such systematic approaches, particularly those implying...
Increasingly, security requirements are being viewed as a social construct derived from the culture and society within which the requirement is said to exist. A socio-technical system can be modelled as a series of inter-related, and interacting patterns of behaviour. Within a socio-technical system a security requirements can be derived from the analysis and interaction of the pattern. To capture...
Approximately 3 million pilgrims visit Mecca in Kingdom of Saudi Arabia each year to fulfill a religious obligation and perform rituals concentrated around few iconic Muslim landmarks, including Kaaba. Mecca is unarguably the most congested public space in the world with densities often exceeding 6 people per square meter causing comfort, safety and security issues. This dense concentration of people...
Recently, interest in performance modeling of out-come-based regulations has grown in the regulatory community. In this context, performance modeling refers to the measuring of important business aspects in a coordinated manner and the use of these measurements for improved decision making. Goal modeling techniques have shown to be beneficial when expressing and analyzing performance models. Since...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.