Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Subscriber’s Privacy is in a constant conflict with security and accountability providing controls employed for network monitoring activities of service providers and enterprises. This paper presents the results of the author’s research in the field of distributed network security monitoring architectures and the proposal of such a system that incorporates cryptographic protocols and a group signature scheme to deliver privacy protecting, network surveillance system architecture that provides subscriber’s accountability and controlled, revocable anonymity.
Słowa kluczowe
Wydawca
Rocznik
Tom
Strony
101--115
Opis fizyczny
Bibliogr. 10 poz., tab.
Twórcy
autor
- Institute of Telecommunications, Warsaw University of Technology, Poland
Bibliografia
- [1] Bianchi G., Boschi E., Kaklamani D.I., Koutsoloukas E.A., Lioudakis G.V., Oppedisano F., Petraschek M., Ricciato F., and Schmoll C., Towards privacy-preserving network monitoring: Issues and challenges, Personal, Indoor and Mobile Radio Communications - PIMRC’07 (2007): 1.
- [2] Xu K., Zhang Z. L., and Bhattacharyya S., Internet traffic behavior profiling for network security monitoring, IEEE/ACM 16(6) (2008): 1241.
- [3] Gogoulos F., Antonakopoulou A., Mousas A. S., Lioudakis G. V., Kaklamani D. I., and Venieris I. S., Privacy-aware passive network monitoring, Panhellenic Conference on Informatics 0 (2009): 171.
- [4] Bellare M., Shi H., and Zhang C., Foundations of group signatures: The case of dynamic groups, Topics in Cryptology - CT-RSA ’05, Lecture Notes in Computer Science 3376 (2005): 136.
- [5] Bellare M., Micciancio D., and Warinschi B., Foundations of group signatures: Formal definitions, simplifieed requirements, and a construction based on general assumptions, Advances in Cryptology - EUROCRYPT ’03, Lecture Notes in Computer Science 2656 (2003): 644.
- [6] Goldreich O., Two remarks concerning the goldwasser-micali-rivest signature scheme, Proceedings of CRYPTO ’86, London, UK, Springer–Verlag (1987): 104.
- [7] Boyen X. and Waters B., Full-domain subgroup hiding and constant-size group signatures, Public Key Cryptography – PKC ’07, Lecture Notes in Computer Science 4450 (2007): 1; Available at http://www.cs.stanford.edu/∼xb/pkc07/.
- [8] Groth J., Fully anonymous group signatures without random oracles, Proceedings of ASIACRYPT ’07, Berlin, Heidelberg, Springer–Verlag (2007): 164.
- [9] Liang X., Cao Z., Shaoand J., and Lin H., Short group signature without random oracles, 9th International Conference on Information and Communications Security – ICICS ’07, Berlin, Heidelberg, Springer–Verlag (2007): 69.
- [10] Boneh D. and Boyen X., Short signatures without random oracles, Proceedings of EUROCRYPT ’04, Lecture Notes in Computer Sciences 3027 (2004): 56.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-11294140-c350-420d-ab45-79c876045748