• Phát triển thuật toán mật mã khóa công khai dựa trên hệ mật ElgamalPhát triển thuật toán mật mã khóa công khai dựa trên hệ mật Elgamal

    Hơn nữa, mặc dù bản mã được tạo ra bởi thuật toán mới đề xuất bao gồm 3 thành phần (C,E,S) nhưng độ dài của nó không lớn hơn độ dài bản mã 2 thành phần (C,R) mà thuật toán ElGamal tạo ra. Giả sử |p| = 512 bit, |q| = 160 bit khi đó độ dài bản mã do thuật toán ElGamal tạo ra là: |C| + |R| = 512 bit + 512 bit = 1024 bit. Trong khi đó, bản mã với kh...

    pdf5 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 111 | Lượt tải: 0

  • Bài giảng Computer Security - 11. Private and Trusted InteractionsBài giảng Computer Security - 11. Private and Trusted Interactions

    Bird’s Eye View of Research Research integrates ideas from: Cooperative information systems Collaborations Privacy, trust, and information theory General privacy solutions provided Example applications studied: Location-based routing and services for wireless networks Electronic supply chain management systems Applicability to: Ad hoc net...

    ppt67 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 119 | Lượt tải: 0

  • Bài giảng Computer Security - 10. P2D2: A Mechanism for Privacy-Preserving Data DisseminationBài giảng Computer Security - 10. P2D2: A Mechanism for Privacy-Preserving Data Dissemination

    Future Work - Extensions Adopting proposed mechanism for DRM, IRM (intellectual rights managenment) and proprietary/confidential data Privacy: Private data – owned by an individual Intellectual property, trade/diplomatic/military secrets: Proprietary/confidential data – owned by an organization Custimizing proposed mechanismm for selected...

    ppt38 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 126 | Lượt tải: 0

  • Bài giảng Computer Security - 9. Role-Based Access Control (RBAC) Role Classification AlgorithmBài giảng Computer Security - 9. Role-Based Access Control (RBAC) Role Classification Algorithm

    3.3) Experiment Summary Accuracy of detection of malicious users by the classification algorithm ranges from 60% to 90% 90% of misbehaviors identified in a friendly environment Friendly environment - fewer than 20% of behaviors are malicious 60% of misbehaviors identified in an unfriendly environment Unfriendly environment - at least 90% of b...

    ppt12 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 107 | Lượt tải: 0

  • Bài giảng Computer Security - 8. Trust in P2P SystemsBài giảng Computer Security - 8. Trust in P2P Systems

    d) Experim. Results – General Remarks Defining a context of trust increases a peer's ability to identify and mitigate attacks on the context-related tasks Context of trust can be used to increase a peer’s reasoning ability for different tasks Such as routing, integrity checking and protecting privacy

    ppt25 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 113 | Lượt tải: 0

  • Bài giảng Computer Security - 7. Using Trust for Role-Based Access Control (RBAC)Bài giảng Computer Security - 7. Using Trust for Role-Based Access Control (RBAC)

    Design a declarative language for system administrators to define role assignment policies Specify content and number of evidence statements needed for role assignment Define a threshold value characterizing the minimal degree of trust expected for each evidence statement Specify trust constraints that a user/issuer must satisfy to obtain a role...

    ppt22 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 126 | Lượt tải: 0

  • Bài giảng Computer Security - 5. Security Paradigms and Pervasive Trust ParadigmBài giảng Computer Security - 5. Security Paradigms and Pervasive Trust Paradigm

    Initial Use of Pervasive Trust Initial use of pervasive trust: perimeter-defense authorization model Investigated by B. Bhargava, Y. Zhong, et al., 2002 - 2003 using trust ratings: direct experiences second-hand recommendations using trust ratings to enhance the role-based access control (RBAC) mechanism

    ppt39 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 89 | Lượt tải: 0

  • Bài giảng Computer Security - 4. Introduction to Trust in ComputingBài giảng Computer Security - 4. Introduction to Trust in Computing

    Example: Use of Pervasive Trust for Access Control Use of pervasive trust for access control perimeter-defense authorization model Investigated by B. Bhargava, Y. Zhong, et al., 2002 - 2003 using trust ratings: direct experiences second-hand recommendations using trust ratings to enhance the role-based access control (RBAC) mechanism

    ppt22 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 112 | Lượt tải: 0

  • Bài giảng Computer Security - 3. Privacy Enhancing Technologies (PET)Bài giảng Computer Security - 3. Privacy Enhancing Technologies (PET)

    Conclusions Trade-off: Privacy vs. Convenience People want free privacy None of these tools are good enough by themselves Technology that ensures the website is following its policy Need for an universal organization Privacy Enhancing Technologies (PET) Bobby Vellanki Computer Science Dept. Yale University Oct . 2003

    ppt24 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 110 | Lượt tải: 0

  • Bài giảng Computer Security - 1. Introduction to Computer SecurityBài giảng Computer Security - 1. Introduction to Computer Security

    Principle of Effectiveness (p.26) Controls must be used—and used properly—to be effective. They must be efficient, easy to use, and appropriate. Principle of Weakest Link (p.27) Security can be no stronger than its weakest link. Whether it is the power supply that powers the firewall or the operating system under the security application ...

    ppt49 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 96 | Lượt tải: 0