13 research outputs found
Analysis of single sign-on protocols from the perspective of architecture deployment, security and usability
Single Sign-On (SSO) requires one time authentication with a set of username and password which then allows an authorized user to enter all resources.This scheme was introduced to overcome the issue of memorability load among users who own
several accounts.Currently, there are four main SSO protocols; 1) Security Assertion Markup Language (SAML), 2) OpenID, 3) Info Card and 4) OAuth.These protocols were sh~died separately
and they have different architecture deployment and implementation wise.It was found from the literature, that many users were not aware of the existence of those protocols which probably explain the slow adoption.Thus, this paper seeks to study the four protocols together by making further analysis and then compare them in terms of its architecture deployment and implementation wise focusing on security and usability perspective.It is much in hope that this paper will be beneficial in giving a better understanding of the SSO protocols, and contributes to better improvement in its implementation
Modelling escalation of attacks in federated identity management
PhD ThesisFederated Identity Management (FIM) is an increasingly prevalent method for authenticating
users online. FIM offloads the authentication burden from a Service Provider (SP) to an Identity
Provider (IdP) that the SP trusts. The different entities involved in the FIM process are referred
to as stakeholders. The benefits of FIM to stakeholders are clear, such as the ability for users to
use Single Sign-On. However, the security of FIM also has to be evaluated. Attacks on one point in
a FIM system can lead to other attacks being possible, and detecting those attacks can be hard just
from modelling the functionality of the FIM system. Attacks in which the effect of one attack can
become the cause for another attack are referred to in this thesis as escalating attacks. The
overall research question this thesis revolves around: how can we model escalating attacks to
detect attacks which are possible through an adversary first launching another attack, and present
causality of attacks to the FIM stakeholders involved?
This thesis performs a survey of existing attacks in FIM. We categorise attacks on FIM using a
taxonomy of our own design. This survey is the first attempt at categorising attacks that target
FIM using a taxonomy. Some attacks can have an effect that causes another attack to be possible in
ways that are difficult to predict. We consider a case study involving OAuth 2.0 (provided by
existing literature), as a basis for modelling attack escalation.
We then seek to present a language for modelling FIM systems and attacker manipulations on those
systems. We find that FIM systems can be generalised for the purpose of a programmatic logical
analysis. In addition, attacker manipulations on a system can be broken down using an existing
conceptual framework called Malicious and Accidental Fault Tolerance (MAFTIA).
Using a generalised FIM system model and MAFTIA, we can express a complex interlinking of attacks
informed by case studies in FIM security analysis. This is the first attempt to model FIM systems
generally and apply logical analysis to that model.
Finally, we show how causality of attacks can be analysed using attack trees. We find that any
solutions to an escalating attack can be expressed using a tree model which conforms to existing
research on attack trees. Our approach is the first attempt of modelling attacks on FIM systems
through the use of attack trees. We consider stakeholder attribution and cost analysis as concrete
methods for analysing attack trees
Challenges in Cybersecurity and Privacy - the European Research Landscape
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects
Challenges in Cybersecurity and Privacy - the European Research Landscape
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects
On the adoption of end-user IT security measures
[no abstract
Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
authentication; computer science; computer software selection and evaluation; cryptography; data privacy; formal logic; formal methods; formal specification; internet; privacy; program compilers; programming languages; security analysis; security systems; semantics; separation logic; software engineering; specifications; verification; world wide we
Proceedings, MSVSCC 2016
Proceedings of the 10th Annual Modeling, Simulation & Visualization Student Capstone Conference held on April 14, 2016 at VMASC in Suffolk, Virginia
Recommended from our members
Federal Register
Daily publication of the U.S. Office of the Federal Register contains rules and regulations, proposed legislation and rule changes, and other notices, including "Presidential proclamations and Executive Orders, Federal agency documents having general applicability and legal effect, documents required to be published by act of Congress, and other Federal agency documents of public interest" (p. ii). Table of Contents starts on page iii