127 research outputs found

    Auditable data structures: theory and applications

    Full text link
    Every digital process needs to consume some data in order to work properly. It is very common for applications to use some external data in their processes, getting them by sources such as external APIs. Therefore, trusting the received data becomes crucial in such scenarios, considering that if the data are not self-produced by the consumer, the trust in the external data source, or in the data that the source produces, can not always be taken for granted. The most used approach to generate trust in the external source is based on authenticated data structures, that are able to authenticate the source when queried through the generation of proofs. Such proofs are useful to assess authenticity or integrity, however, an external user could also be interested in verifying the data history and its consistency. This problem seems to be unaddressed by current literature, which proposes some approaches aimed at executing audits by internal actors with prior knowledge about the data structures. In this paper, we address the scenario of an external auditor with no data knowledge that wants to verify the data history consistency. We analyze the terminology and the current state of the art of the auditable data structures, then we will propose a general framework to support external audits from both internal and external users

    Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings

    No full text

    Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning

    Get PDF
    International audienceThe ability to efficiently detect the software protections used is at a prime to facilitate the selection and application of adequate deob-fuscation techniques. We present a novel approach that combines semantic reasoning techniques with ensemble learning classification for the purpose of providing a static detection framework for obfuscation transformations. By contrast to existing work, we provide a methodology that can detect multiple layers of obfuscation, without depending on knowledge of the underlying functionality of the training-set used. We also extend our work to detect constructions of obfuscation transformations, thus providing a fine-grained methodology. To that end, we provide several studies for the best practices of the use of machine learning techniques for a scalable and efficient model. According to our experimental results and evaluations on obfuscators such as Tigress and OLLVM, our models have up to 91% accuracy on state-of-the-art obfuscation transformations. Our overall accuracies for their constructions are up to 100%

    Digital steganalysis: Computational intelligence approach

    Get PDF
    In this paper, we present a consolidated view of digital media steganalysis from the perspective of computational intelligence.In our analysis the digital media steganalysis is divided into three domains which are image steganalysis, audio steganalysis, and video steganalysis.Three major computational intelligence methods have also been identified in the steganalysis domains which are bayesian, neural network, and genetic algorithm.Each of these methods has its own pros and cons

    Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies

    Get PDF
    We improve the design and implementation of two-party and three-party authenticated dynamic dictionaries and apply these dictionaries to cryptocurrency ledgers. A public ledger (blockchain) in a cryptocurrency needs to be easily verifiable. However, maintaining a data structure of all account balances, in order to verify whether a transaction is valid, can be quite burdensome: a verifier who does not have the large amount of RAM required for the data structure will perform slowly because of the need to continually access secondary storage. We demonstrate experimentally that authenticated dynamic dictionaries can considerably reduce verifier load. On the other hand, per-transaction proofs generated by authenticated dictionaries increase the size of the blockchain, which motivates us to find a solution with most compact proofs. Our improvements to the design of authenticated dictionaries reduce proof size and speed up verification by 1.4-2.5 times, making them better suited for the cryptocurrency application. We further show that proofs for multiple transactions in a single block can compressed together, reducing their total length by approximately an additional factor of 2. We simulate blockchain verification, and show that our verifier can be about 20 times faster than a disk-bound verifier under a realistic transaction load

    Culture and Information Security Awareness: Examining the Role of Organisational and Security Culture

    Get PDF
    This item is only available electronically.The relationship between security culture and ISA has received preliminary support; however, its interplay with organisational culture is yet to be empirically explored. Therefore, this study examined the relationship between ISA, organisational culture, and security culture. A total of 508 working Australians completed an online questionnaire. ISA was measured using the Human Aspects of Information Security Questionnaire (HAIS-Q); organisational culture was measured using the Denison Organisational Culture Survey (DOCS); and security culture was assessed through the Organisational Security Culture Measure. Our results showed that while organisational culture and security culture were correlated with ISA, security culture mediated the relationship between organisational culture and ISA. This finding has important applied implications. Organisations can improve ISA by focussing on security culture rather than organisational culture, saving them time and resources. Future research could further extend current findings by also considering national culture.Thesis (M.Psych(Organisational & Human Factors)) -- University of Adelaide, School of Psychology, 201

    1851 International Sanitary Conference and the construction of an international sphere of public health

    Get PDF
    Focusing on the 1851 International Sanitary Conference, this dissertation analyses an important episode in the international regulation of health, trade, passengers, and cargo in a period of epidemic crisis. It argues that a group of diplomats and physicians appointed to represent 12 European nations instituted a new international forum that extended – and occasionally rivalled – national and local agencies for epidemic governance. Together, delegates endeavoured to establish a common sanitary policy in Europe and in the Orient. By creating shared surveillance and judicial mechanisms – while standardising definitions and practices – delegates aimed to engineer the flow of people, vessels, cargo, and diseases in the Mediterranean region. As a transnational forum, the Conference was a platform where doctors and diplomats reinterpreted models of public health and sanitary administration while creating institutions that challenged conventional concepts of borders, national policy, and state sovereignty. As a multinational event, the Conference marked the unprecedented transition from local, national and, bilateral public health policies into a coherent transnational project for the governance of epidemics. The dissertation is based on extensive research conducted in hitherto largely unexplored medical, diplomatic, and national collections in Britain, France, Italy, Portugal, Spain, and the United States of America. Sources ranging from diplomatic correspondence to medical publications and personal diaries, tie together multiple national and professional perspectives while untangling a diversity of personal and state agendas that fundamentally shaped the foundation of international public health mechanisms and contributed towards the crystallisation of medical concepts. Chapter one demonstrates how economic and political concerns about the impact of quarantine on international trade led to calls for international regulation and the standardization of quarantine practices in the Mediterranean region. Drawing on medical reports, pamphlets and diplomatic correspondence, the chapter exposes the multitude of quarantine practices in the Mediterranean region and a growing international demand for prophylactic reform. These exchanges, it is shown, culminated with the organization of the 1851 International Sanitary Conference in Paris. Chapter two argues that the Conference challenged previous diplomatic and medical protocols by including two professional groups in the process of regulating international public health. The lack of precedent allowed diplomatic and medical delegates to establish new rules for the conduct of the conference, which gave them a relatively high level of autonomy from the states they represented. Chapter three focuses on the problems of constructing a shared aetiological classification and regulating quarantine practices. It shows that, although doctors gained progressive control over the Conference, ultimately diplomatic agendas shaped the final outcome. In addition, it demonstrates that, rather than defending the elimination of quarantines, liberal states supported the continuation of quarantine practice in the Mediterranean; albeit that they managed to severely limit its operation in practice. Finally, chapter four examines how European and Oriental sanitary institutions were uniformly redesigned and new international judicial mechanisms created. These measures variously affected the sovereignty of the participating states by limiting their independent capacity to set national epidemic policies. However, the chapter argues that these negotiations took the shape of sovereignty bargains: by loosening control over specific elements of their sovereignty, states managed to advance their political, economic and sanitary agendas. By looking at the International Sanitary Conference of 1851, this dissertation shows how the foundations of international public health had consequences not only for the control of epidemic diseases and the circulation of goods and people in the Mediterranean region, but also for the authority and status of the nation states. By doing so, it reveals that international public health governance resulted from the amalgamation of a particular configuration of expert and diplomatic struggles and compromises. Moreover, the dissertation shifts the traditional local and national focus in the history of medicine to a wider and international context where local and national traditions struggled to produce coherent discourses and practices

    Management: A bibliography for NASA managers

    Get PDF
    This bibliography lists 731 reports, articles and other documents introduced into the NASA Scientific and Technical Information System in 1990. Items are selected and grouped according to their usefulness to the manager as manager. Citations are grouped into ten subject categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy
    • …
    corecore