Searched for: collection%253Air
(1 - 14 of 14)
document
Gordijn, Daan (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID’s, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the...
conference paper 2023
document
Grishkov, I. (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryption scheme that meant to improve the security of user’s data that is being uploaded to the distributed ledger. A new extension to the self-encryption scheme was deployed by integrating data owner’s identity into the...
conference paper 2023
document
di Angelo, Monika (author), Durieux, T. (author), Ferreira, João F. (author), Salzer, Gernot (author)
Smart contracts are blockchain programs that often handle valuable assets. Writing secure smart contracts is far from trivial, and any vulnerability may lead to significant financial losses. To support developers in identifying and eliminating vulnerabilities, methods and tools for the automated analysis of smart contracts have been proposed....
conference paper 2023
document
de Vos, Adriaan (author), Brighente, Alessandro (author), Conti, M. (author)
IEEE 802.1CB provides a standard for reliable packet delivery within Time-Sensitive Networking (TSN). As this standard is envisioned to be used in mission-critical networks in the near future, it has to be protected against security threats. The integrity of the network communication should be the biggest focus as guaranteed delivery is...
conference paper 2023
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
Li, Meng (author), Gao, Jianbo (author), Zhang, Zijian (author), Fu, Chaoping (author), Lal, C. (author), Conti, M. (author)
Shortest distance queries over large-scale graphs bring great benefits to various applications, i.e., save planning time and travelling expenses. To protect the sensitive nodes and edges in the graph, a user outsources an encrypted graph to an untrusted server without losing the query ability. However, no prior work has considered the user...
conference paper 2022
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, Andre M. H. (author), Khakzad, N. (author), van Gelder, P.H.A.J.M. (author)
Because of modern societies' dependence on industrial control systems, adequate response to system failures is essential. In order to take appropriate measures, it is crucial for operators to be able to distinguish between intentional attacks and accidental technical failures. However, adequate decision support for this matter is lacking. In...
conference paper 2019
document
Noroozian, A. (author), Koenders, Jan (author), van Veldhuizen, Eelco (author), Hernandez Ganan, C. (author), Alrwais, Sumayah (author), McCoy, Damon (author), van Eeten, M.J.G. (author)
This paper presents the first empirical study based on ground-truth data of a major Bullet-Proof Hosting (BPH) provider, a company called Maxided. BPH allows miscreants to host criminal activities in support of various cybercrime business models such as phishing, botnets, DDoS, spam, and counterfeit pharmaceutical websites. Maxided was legally...
conference paper 2019
document
Pan, K. (author), Herdeiro Teixeira, A.M. (author), López, Claudio (author), Palensky, P. (author)
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from an integral perspective. In order to support vulnerability assessment except analytic analysis, suitable platform for security tests needs to be developed. In this paper we analyze the cyber security of energy management system (EMS) against data...
conference paper 2018
document
Yin, Y. (author), Zuiderwijk-van Eijk, A.M.G. (author), Van Ossenbruggen, Jacco (author), Jeffery, Keith (author), Luthfi, A. (author), Janssen, M.F.W.H.A. (author)
Governments and publicly-funded research institutions increasingly open up data collected and created through research. One way to share and use data obtained through research is through Virtual Research Environments (VREs). Insights obtained through open data use in VREs can subsequently provide input for policy making. However, this process...
conference paper 2018
document
Steinmann, Patrick (author), Wigman, S.B.J. (author)
Between 2013 and 2015, over one million migrants entered Europe. Many European countries were unprepared for and overwhelmed by the rapidly unfolding, chaotic situation. To better handle future migration waves, and allow quicker exploration of government policy effects and interactions, a geospatial-based system dynamics model of migration flows...
conference paper 2018
document
Llombart, Nuria (author), Gandini, E. (author), Tamminen, A. (author), Luukanen, A. (author)
The aim of the European project CONSORTIS is the development of a walk-by imaging system for concealed object detections working at submillimetre-wave frequencies. This imager will allow to image a full body at two frequency bands with high sensitivity (<;1K) and large frame rate (10Hz). The imager relies on a large focal plane array with...
conference paper 2016
document
Trajanovski, S. (author), Kuipers, F.A. (author), Hayel, Yezekael (author), Altman, Eitan (author), Van Mieghem, P.F.A. (author)
Forming, in a decentralized fashion, an optimal network topology while balancing multiple, possibly conflicting objectives like cost, high performance, security and resiliency to viruses is a challenging endeavor. In this paper, we take a game-formation approach to network design where each player, for instance an autonomous system in the...
conference paper 2015
document
Ludema, M.W. (author)
An important issue in the design of secure supply chains is the understanding of the relation between supply chains and the organizational responsibility of specific parts of these supply chains. Organizational boundaries change over time by means of vertical and/or horizontal (des)-integration and so do the related organizational...
conference paper 2009
Searched for: collection%253Air
(1 - 14 of 14)