Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
The future of enterprise cyber defense is predictive and the use of model-based threat hunting is an enabling technique. Current approaches to threat modeling are predicated on the assumption that models are used to develop better... more
The future of enterprise cyber defense is predictive and the use of model-based threat hunting is an enabling technique. Current approaches to threat modeling are predicated on the assumption that models are used to develop better software, rather than to describe threats to software being used as a service (SaaS). In this paper, we propose a service-modeling methodology that will facilitate pro-active cyber defense for organizations adopting SaaS. We model structural and dynamic elements to provide a robust representation of the defensible system. Our approach is validated by implementing a prototype and by using it to model a popular course management system.
this document, we will present an overview of the framework and its metamodel, followed by specification of the infrastructure services. We will also relate out work to existing standardization and industry initiatives. 1.1 Notational... more
this document, we will present an overview of the framework and its metamodel, followed by specification of the infrastructure services. We will also relate out work to existing standardization and industry initiatives. 1.1 Notational Conventions The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC 2119]. This document uses namespace prefixes througout; they are listed in table 1.1. Note that the choice of any namespace prefix is arbitrary and not semantically A working prototype is available at http://maximus.uvt.nl/kees/phd-kees/ 4 Prefix Namespace Notes wsdl http://www.w3.org/2003/06/wsdl WSDL 1.2 specification http http://www.w3.org/2003/06/wsdl/http HTTP bindings for WSDL 1.2 xs http://www.w3.org/2001/XMLSchema XML Schema specification bp...
The future of enterprise cyber defense is predictive and the use of model-based threat hunting is an enabling technique. Current approaches to threat modeling are predicated on the assumption that models are used to develop better... more
The future of enterprise cyber defense is predictive and the use of model-based threat hunting is an enabling technique. Current approaches to threat modeling are predicated on the assumption that models are used to develop better software, rather than to describe threats to software being used as a service (SaaS). In this paper, we propose a service-modeling methodology that will facilitate pro-active cyber defense for organizations adopting SaaS. We model structural and dynamic elements to provide a robust representation of the defensible system. Our approach is validated by implementing a prototype and by using it to model a popular course management system.
Today’s enterprise environment is rapidly changing with organizations adopting cloud services at record rates. This deperimeterization of enterprise computing architectures depends on software as a service (SaaS) and makes traditional... more
Today’s enterprise environment is rapidly changing with organizations adopting cloud services at record rates. This deperimeterization of enterprise computing architectures depends on software as a service (SaaS) and makes traditional perimeter-based defense controls less effective. We propose a service-oriented threat modeling approach that focuses on the perspective of a service consumer. We supplement our approach by providing an implementation view that includes technical details of service implementations that can be queried to identify potential vulnerabilities in the system. Our approach differs from existing threat modeling methods in that we seek to capture interactions between services in a technologically agnostic manner. This extends the applicability of our model into the realm of security operations. A case study and proof-of-concept are presented to validate our approach and demonstrate how such a model can be used to provide meaningful support for operations engineers.
Voting is one of the most fundamental aspects of democracy. Over the past few decades, voting methods around the world have expanded from traditional paper ballot systems to electronic voting (e-voting), in which votes are written... more
Voting is one of the most fundamental aspects of democracy. Over the past few decades, voting methods around the world have expanded from traditional paper ballot systems to electronic voting (e-voting), in which votes are written directly to computer memory. Like any computer system, voting machines are susceptible to technical vulnerabilities that open up opportunities for hackers to tamper with votes, causing the use of electronic voting technology to raise concerns about ballot security. We describe how electronic voting can be supported by blockchain technology to ensure voter secrecy, vote correctness, and equal voting rights. In this paper, we present a system using two separate blockchains, each with separate transactions and consensus algorithms. We describe a prototype implementation that validates our ideas by executing several proof-of-concept simulations of a range of
Computer security incident response teams need to track inc ide ts as they develop. To support day-to-day operations, teams need to be able to generate quick overviews of ongoing incidents, and they mus t be upported in their daily work... more
Computer security incident response teams need to track inc ide ts as they develop. To support day-to-day operations, teams need to be able to generate quick overviews of ongoing incidents, and they mus t be upported in their daily work by automating as much routine work as poss ible. AIRT is a web-based system to provide incident tracking capabili ties to computer security incident response teams. Its design goals include to provide a comprehensive incident management console, ability to quickl y associate external teams with IP addresses, the ability to record an inciden t in 30 seconds after receiving it, provisions for PGP signed mail, and more . This paper presents AIRT, its goals, architecture and its functionali ty.
In this paper, we address the question whether security of service-oriented computing in general, and web services technology in particular, is adequately equipped for any interaction patterns that are not request-response, such as... more
In this paper, we address the question whether security of service-oriented computing in general, and web services technology in particular, is adequately equipped for any interaction patterns that are not request-response, such as event-driven interactions. Taking into account the distributed nature of access control, we argue that serviceoriented computing needs message context level security, which captures the relationship of each message to other messages, and places it in the context of a services interaction sequence. We illustrate these requirements by discussing them from the point of view of the EFSOC frame-
Computer science educators have tried to identify the best language for their first-year college students to use when learning how to program. Consequently, selecting a computer programming language for use in an introductory programming... more
Computer science educators have tried to identify the best language for their first-year college students to use when learning how to program. Consequently, selecting a computer programming language for use in an introductory programming course has been a hot-button topic within computing education communities. This paper builds on the work started by Richard Reid in the early 1990s, which surveys institutions providing post-secondary education. It provides educators with up-to-date information about common choices for computer programming languages used in first computer programming courses. This year’s survey results indicate clearly that, at the moment, Java and Python are the most commonly used languages. A new element in the survey is that we have now started collecting data regarding the second programming course (CS2). Our findings show that 88% of all surveyed schools only use one of four languages (Java, Python, C++, and C), with the adoption of Python growing steadily at t...
Interoperability between enterprise applications requires an understanding of the obstacles to interoperability in order to provide methods for overcoming these obstacles. We address the problem from different angles: first, we... more
Interoperability between enterprise applications requires an understanding of the obstacles to interoperability in order to provide methods for overcoming these obstacles. We address the problem from different angles: first, we investigate the benefit of multi-lingual ontologies to overcome language problems between users of an enterprise application. Second, we propose a method to integrate legacy components into new enterprise applications. Third, we research the impact service-oriented computing to enterprise application integration. Finally, we present our results with agent-oriented platforms for integrating autonomous applications. 1. Ontologies for enterprise integration Matching interfaces by routines for data conversion between applications are not solving the problem of discovering the opportunity for application integration and for addressing semantic mismatches between data and services. One aspect of the semantic mismatch is multi-linguality and heterogeneous data repre...
Recently, a myriad of standards has been proposed to address several (related) issues for implementing the Service Oriented Computing (SOC) paradigm, including service invocation, description, composition, and security. However, what is... more
Recently, a myriad of standards has been proposed to address several (related) issues for implementing the Service Oriented Computing (SOC) paradigm, including service invocation, description, composition, and security. However, what is missing is a consistent and solid framework that may serve as a canonical foundation on top of which existing standards may be unified, and new standards could be proposed. This framework should go far beyond formalizing service interfaces and should incorporate critical service primitives for securely blending software services with business processes, abstract services, service resources and the such. To address this challenge, we introduce the Event-driven Framework for Service Oriented Computing (EFSOC) that is organized in three orthogonal tiers: the event tier, the business process tier, and the security tier. The event tier encompasses formalisms to rigourously define business-related events, and supports their propagation throughout the busin...
Service-oriented computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applications. In order to realize the vision of services being utilized as fundamental elements of business... more
Service-oriented computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applications. In order to realize the vision of services being utilized as fundamental elements of business collaboration, security is a critical issue that must be addressed. As SOC adopts messages as the binding factor for loosely couple service interactions, messages must be protected in the context in which they are exchanged. In this paper, we adopt a layered security approach in which we argue that transport level security and message level security, such as provided by current web services standards and products, are not adequate for protecting services from unauthorized use, but that an additional layer in which the message context is protected is required. The message context layer is subsequently related to the EFSOC framework, which provides a event-driven framework for service-oriented computing.
1 Introduction.................................................................................................................................4 2 Notational Conventions................................................................. ...... more
1 Introduction.................................................................................................................................4 2 Notational Conventions................................................................. ... ... Conceptual overview of the EFSOC event service ... EFSOC is a secure framework for event-based service oriented computing. ...
Service Oriented Computing (SOC) demands a framework that seamlessly integrates all connection points between business processes, services and associated support resources. To address this challenge, we introduce the Event-driven... more
Service Oriented Computing (SOC) demands a framework that seamlessly integrates all connection points between business processes, services and associated support resources. To address this challenge, we introduce the Event-driven Framework for Service Oriented Computing (EFSOC) that is organized in three tiers: the event tier, the business process tier, and the access control tier. The event tier encompasses definitions of business-related events, and supports their propagation throughout the business process flow. The business process tier specifies the interactions between business processes and services and the access control tier defines access roles that are allowed to invoke certain services. This paper has been submitten to ICEIS 2004 and was accepted as a poster session. It is also available in the Infolab Technical Report Series as report number 14.
1 Introduction.................................................................................................................................4 2 Notational Conventions................................................................. ...... more
1 Introduction.................................................................................................................................4 2 Notational Conventions................................................................. ... ... Conceptual overview of the EFSOC event service ... EFSOC is a secure framework for event-based service oriented computing. ...
Abstract. Service-oriented computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applica-tions. In order to realize the vision of services being utilized as funda-mental elements of... more
Abstract. Service-oriented computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applica-tions. In order to realize the vision of services being utilized as funda-mental elements of business collaboration, security is a critical ...
Research Interests:
Service-oriented computing is a new computing paradigm which is positioned in a highly dynamic environment. Because of the highly dynamic, and sometimes unpredictable nature of service invoca-tions in a service-oriented environment, and... more
Service-oriented computing is a new computing paradigm which is positioned in a highly dynamic environment. Because of the highly dynamic, and sometimes unpredictable nature of service invoca-tions in a service-oriented environment, and because of the possible ...
ABSTRACT
Research Interests:
This paper presents a methodology for designing and developing a symmetric Role-Based Access Control (RBAC) model for web-services (named RBAC4WS). In particular, the paper reports a formal metamodel that serves as the foundation of the... more
This paper presents a methodology for designing and developing a symmetric Role-Based Access Control (RBAC) model for web-services (named RBAC4WS). In particular, the paper reports a formal metamodel that serves as the foundation of the RBAC4WS speci cation ...
Research Interests:
ABSTRACT
Page 1. EFSOC: A Secure Framework for Event-Based Service-Oriented Computing Kees Leune∗ Willem-Jan van den Heuvel Tilburg University Infolab, Department of Information Systems and Management The Netherlands E-mail: kees@uvt.nl,... more
Page 1. EFSOC: A Secure Framework for Event-Based Service-Oriented Computing Kees Leune∗ Willem-Jan van den Heuvel Tilburg University Infolab, Department of Information Systems and Management The Netherlands E-mail: kees@uvt.nl, wjheuvel@uvt.nl Abstract ...
ABSTRACT
Abstract. Service-oriented computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applica-tions. In order to realize the vision of services being utilized as funda-mental elements of... more
Abstract. Service-oriented computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applica-tions. In order to realize the vision of services being utilized as funda-mental elements of business collaboration, security is a critical ...
Matching interfaces by routines for data conversion between applications are not solving the problem of discovering the opportunity for application integration and for addressing semantic mismatches between data and services. One aspect... more
Matching interfaces by routines for data conversion between applications are not solving the problem of discovering the opportunity for application integration and for addressing semantic mismatches between data and services. One aspect of the semantic mismatch is multi-...
4.1 Operation Descriptions . . . . . . . . . . . . . . . . . . . . . . . . 18 4.1.1 requestAuthorization Operation . . . . . . . . . . . . . . . 18 4.1.2 newRoleType Operation . . . . . . . . . . . . . . . . . . . 19 4.1.3 newSubject... more
4.1 Operation Descriptions . . . . . . . . . . . . . . . . . . . . . . . . 18 4.1.1 requestAuthorization Operation . . . . . . . . . . . . . . . 18 4.1.2 newRoleType Operation . . . . . . . . . . . . . . . . . . . 19 4.1.3 newSubject Operation . . . . . . . . . . . . . . . . . . . . 19 4.1.4 newRoleAssignment Operation . . . . . . . . . . . . . . . ...
WSDM is a user-centered method for the design of kiosk Web Sites. By explicitly starting from the requirements of the users or visitors, WSDM solves web site problems that are primarily caused by that fact that a site has no underlying... more
WSDM is a user-centered method for the design of kiosk Web Sites. By explicitly starting from the requirements of the users or visitors, WSDM solves web site problems that are primarily caused by that fact that a site has no underlying design at all, or that the design is mostly data-driven.
The average number of undergraduate computer science (CS) majors is larger today than at any time previously and the average number of CS majors at doctoral granting academic units has more than tripled since 2006 [5]. Yet, almost a third... more
The average number of undergraduate computer science
(CS) majors is larger today than at any time previously
and the average number of CS majors at doctoral granting
academic units has more than tripled since 2006 [5]. Yet,
almost a third of first-time college students who start a
computational major change it at least once within three
years [12]. Approximately 40% of those who embark on
a CS program eventually leave without a degree [16].
Chen [3] states that women and minority students drop
out of computer science at higher rates in comparison to
white males. This paper reflects on the introduction of a
1-credit Computing Orientation Seminar—mandatory
for all students entering a CS program—and on its role
in building community to improve retention, student
engagement, and diversity. The findings presented in this
paper do not claim to be a silver bullet for solving these
issues in CS education. However, we believe that there
is value in reflection, and that our reflection reinforces
the idea that active interventions towards community
formation positively impact student outcomes.