The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

An Information Security Meta-policy for Emergent Organizations

Richard Baskerville, Mikko Siponen
Added 2013-01-17


A Denial of Service and Some IPsec-implementations

M Muller, T Virtanen, J Arkko, Erricsson Finland
Added 2013-01-16

The Inevitable Pain of Software Development: Why There is No Silver Bullet

Daniel M. Berry

A variety of programming accidents, i.e., models, methods, artifacts, and tools, are examined to determine that each has a step that programmers find painful enough that they habitually avoid or postpone the step. This pain is generally where the programming accident meets requirements, the essence of software, and their relentless volatility. Hence, there is no silver bullet.

Added 2013-01-16


Privacy Preserving Context Aware Publish Subscribe Systems

CERIAS TR 2013-01
Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro Buchmann
Download: PDF

Publish/subscribe (pub/sub) systems support highly scalable, manyto- many communications among loosely coupled publishers and subscribers. Modern pub/sub systems perform message routing based on the message content and allow subscribers to receive messages related to their subscriptions and the current context. However, both content and context encode sensitive information which should be protected from third-party brokers that make routing decisions. In this work, we address this issue by proposing an approach for constructing a privacy preserving context-based pub/sub system. In particular, our approach assures the confidentiality of the messages being published and subscriptions being issued while allowing the brokers to make routing decisions without decrypting individual messages and subscriptions, and without learning the context. Further, subscribers with a frequently changing context such as location are able to issue and update subscriptions without revealing the subscriptions in plaintext to the broker and without the need to contact a trusted third party for each subscription change resulting from a change in the context. Our approach is based on a modified version of the Paillier additive homomorphic cryptosystem and a recent expressive group key management scheme. The former construct is used to perform privacy preserving matching and covering, and the latter construct is used to enforce fine-grained encryption based access control on the messages being published. We optimize our approach in order to efficiently handle frequently changing contexts. We have implemented our approach in a prototype using an industry strength JMS broker middleware. The experimental results show that our approach is highly practical.

Added 2013-01-15

Ensemble Classification for Relational Domains

CERIAS TR 2011-25
Hoda Eldardiry
Download: PDF
Added 2012-12-11

Accommodative Mandatory Access Control

CERIAS TR 2011-26
Jacques Daniel Thomas
Download: PDF
Added 2012-12-11

Analysis and Design of Intersession Network Coding in Communication Networks

CERIAS TR 2010-33
Abdallah Khreishah
Download: PDF
Added 2012-12-11

Automatic Migration to Role-Based Access Control

CERIAS TR 2010-34
Ian Molloy
Download: PDF
Added 2012-12-11

EXAM - An Environment for XACML Policy Analysis and Management

CERIAS TR 2010-35
Prathima Rao
Download: PDF
Added 2012-12-11

Nudging the Digital Pirate: Piracy and the Conversion of Pirates to Paying Customers

CERIAS TR 2011-27
Matthew J. Hashim
Download: PDF
Added 2012-12-11

Entitled Essays on Information Risk Management in Electronic Markets

CERIAS TR 2010-36
Juhee Kwon
Download: PDF
Added 2012-12-11

Efficient Query Processing for Uncertain Data

CERIAS TR 2011-28
Yinian Qi
Download: PDF
Added 2012-12-11

Accountability for Grid Computing Systems

CERIAS TR 2011-29
Wonjun Lee
Download: PDF
Added 2012-12-11