PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Context Data Acquisition Using Adaptive Non-repudiation Model

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The subject of this study is the non-repudiation security service for network communication using TCP/IP stack. Generated evidence, as well as decision-making process of registering a given event, are context-aware. Non-repudiation is equipped with context-awareness by using widely utilized network tools. The aim of this paper is to present timing results for selected tools execution and to complete the evidence generation time. In some applications it is crucial to gather evidence data as fast as possible because of the rapidly changing network environment. For such situations, in case of prolonged execution time, an output from a tool might imprecisely describe the contextual situation from the time of the occurrence of an event.
Rocznik
Strony
197--202
Opis fizyczny
Bibliogr. 16 poz., rys., tab., wykr.
Twórcy
autor
  • Institute of Telecommunications, Warsaw University of Technology, Warsaw, Poland
Bibliografia
  • [1] Kott, Alexander, et al. Visualizing the tactical ground battlefield in the year 2050: Workshop report. No. ARL-SR-0327. ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE, 2015.
  • [2] European Comission. ”Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace.”, 2013.
  • [3] European Commission. Decision C(2017)2468 of 24 April 2017. ”Horizon 2020, Work Programme 2016 - 2017, 14. Secure societies - Protecting freedom and security of Europe and its citizens”, 2017.
  • [4] Dashti, Mohammad Torabi. Keeping fairness alive. Diss. PhD thesis, Vrije Universiteit, Amsterdam, 2008.
  • [5] Wu, Wei, et al. ”How to achieve non-repudiation of origin with privacy protection in cloud computing.” Journal of Computer and System Sciences 79.8 (2013): 1200-1213.
  • [6] Zhou, Jianying, and Dieter Gollman. ”A fair non-repudiation protocol.” Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on. IEEE, 1996.
  • [7] Zhou, Jianying, and Dieter Gollmann. ”An efficient non-repudiation protocol.” Computer Security Foundations Workshop, 1997. Proceedings., 10Th. IEEE, 1997.
  • [8] Tunia, Marcin Alan. 2016. Rozpoznawanie kontekstu na potrzeby usługi niezaprzeczalności, Przegld Telekomunikacyjny-Wiadomości Telekomunikacyjne, nr 8-9/2016
  • [9] ISO/IEC,. 2009. Information Technology Security Techniques Non-Repudiation Part 1: General. 13888-1:2009.
  • [10] Dey, Anind, et al. 2001. ”A Conceptual Framework And A Toolkit For Sup-porting The Rapid Prototyping Of Context-Aware Applications”. Human-Computer Interaction 16 (2), 97-166.
  • [11] W3C Recommendation 10 June 2008. ”XML Signature Syntax and Processing (Second Edition)”, 2008.
  • [12] Linux Manpages Online nslookup, https://man.cx/nslookup, Accessed: 2017-04-28.
  • [13] Nmap: the Network Mapper Free Security Scanner, https://nmap.org, Accessed:
  • [14] Linuxcommand.org whois manual page, http://linuxcommand.org/man pages/whois1.html, Accessed: 2017-04-28.
  • [15] IP Address Details ipinfo.io, http://ipinfo.io, Accessed: 2017-04-28.
  • [16] Linux man page geoiplookup, https://linux.die.net/man/1/geoiplookup, Accessed: 2017-04-28.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-96f42dc2-83f8-4d51-a6b4-95d47c919be9
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.