Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJanuary 2006
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 221–230Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the ...
- ArticleJanuary 2006
Formal analysis of card-based payment systems in mobile devices
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 213–220To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-...
- ArticleJanuary 2006
Logcrypt: forward security and public verification for secure audit logs
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 203–211Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We build on prior work by showing how log creation can be separated from log ...
- ArticleJanuary 2006
SKMA: a key management architecture for SCADA systems
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 183–192Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distribution systems. Currently there is little understanding of how to best protect SCADA systems from ...
- ArticleJanuary 2006
Description of bad-signatures for network intrusion detection
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 175–182Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems normally use stochastic approaches or a rule-based system to detect ...
-
- ArticleJanuary 2006
A method for access authorisation through delegation networks
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 165–174Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for enforcing that only authorised parties are actually able to access those ...
- ArticleJanuary 2006
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 135–144Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category of IDS attempts to incorporate into its design properties found in the ...
- ArticleJanuary 2006
Analysis of traceback techniques
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 115–124Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's to protect their networks from DDoS attacks. Recently, several novel traceback ...
- ArticleJanuary 2006
EGEE: building a pan-European grid training organisation
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 105–111As the largest EU Grid project, it is one of the Enabling Grids for E-SciencE initiatives foremost goals to establish a production quality Grid infrastructure. Amongst EGEE's diverse duties the creation of a pan-European Grid training organisation plays ...
- ArticleJanuary 2006
Distributed intrusion detection in clusters based on non-interference
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 89–95We present in this paper the investigation of a noninterference-based, policy-based intrusion detection system to detect security policy violations in clusters. The Reference Flow Control model has been proposed as a host-based approach for detecting ...
- ArticleJanuary 2006
A simplified approach to web service development
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 79–88Most languages used for developing web services and clients exhibit properties which make calling remote functions across a network a non-trivial task. The type systems used by object oriented languages have many incompatibilities with those required for ...
- ArticleJanuary 2006
Towards dynamic data grid framework for eResearch
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54January 2006, Pages 9–16The scale at which scientific data is produced will undergo a massive change in the near future. Many sophisticated scientific discovery laboratories or the installation of sensor networks would produce a large amount of data. Research in protein ...