Reports and Papers Archive

Page Content


Browse All Papers »       Submit A Paper »

Four Views on Security

Teemupekka Virtanen
Added 2013-01-30

Securing Cyberspace for the 44th Presidency

James R. Langevin, Michael T. McCaul, Scott Charney, Lt. General Harry Raduege
Added 2013-01-30

Federal Plan for Cyber Security and Information Assurance Research and Development

Interagency Working Group on Cyber Security and Information Assurance
Added 2013-01-30

An Information Security Meta-policy for Emergent Organizations

Richard Baskerville, Mikko Siponen
Added 2013-01-17

A Denial of Service and Some IPsec-implementations

M Muller, T Virtanen, J Arkko, Erricsson Finland
Added 2013-01-16

The Inevitable Pain of Software Development: Why There is No Silver Bullet

Daniel M. Berry

A variety of programming accidents, i.e., models, methods, artifacts, and tools, are examined to determine that each has a step that programmers find painful enough that they habitually avoid or postpone the step. This pain is generally where the programming accident meets requirements, the essence of software, and their relentless volatility. Hence, there is no silver bullet.

Added 2013-01-16

Privacy Preserving Context Aware Publish Subscribe Systems

CERIAS TR 2013-01
Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro Buchmann
Download: PDF

Publish/subscribe (pub/sub) systems support highly scalable, manyto- many communications among loosely coupled publishers and subscribers. Modern pub/sub systems perform message routing based on the message content and allow subscribers to receive messages related to their subscriptions and the current context. However, both content and context encode sensitive information which should be protected from third-party brokers that make routing decisions. In this work, we address this issue by proposing an approach for constructing a privacy preserving context-based pub/sub system. In particular, our approach assures the confidentiality of the messages being published and subscriptions being issued while allowing the brokers to make routing decisions without decrypting individual messages and subscriptions, and without learning the context. Further, subscribers with a frequently changing context such as location are able to issue and update subscriptions without revealing the subscriptions in plaintext to the broker and without the need to contact a trusted third party for each subscription change resulting from a change in the context. Our approach is based on a modified version of the Paillier additive homomorphic cryptosystem and a recent expressive group key management scheme. The former construct is used to perform privacy preserving matching and covering, and the latter construct is used to enforce fine-grained encryption based access control on the messages being published. We optimize our approach in order to efficiently handle frequently changing contexts. We have implemented our approach in a prototype using an industry strength JMS broker middleware. The experimental results show that our approach is highly practical.

Added 2013-01-15

Ensemble Classification for Relational Domains

CERIAS TR 2011-25
Hoda Eldardiry
Download: PDF
Added 2012-12-11

Accommodative Mandatory Access Control

CERIAS TR 2011-26
Jacques Daniel Thomas
Download: PDF
Added 2012-12-11

Analysis and Design of Intersession Network Coding in Communication Networks

CERIAS TR 2010-33
Abdallah Khreishah
Download: PDF
Added 2012-12-11

Automatic Migration to Role-Based Access Control

CERIAS TR 2010-34
Ian Molloy
Download: PDF
Added 2012-12-11