فهرست مطالب

International Journal of Information Security
Volume:2 Issue: 2, Jul 2010

  • تاریخ انتشار: 1389/10/05
  • تعداد عناوین: 5
|
  • Rasool Jalili Pages 67-68
  • Farzad Salim, Jason Reid, Ed Dawson Pages 69-87
    This article presents a survey of authorisation models and considers their `fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerging business models based on the concept of a `virtual organisation'. The article argues that present authorisation models are inflexible and poorly scalable in such dynamic environments due to their assumption that the future needs of the system can be predicted, which in turn justifies the use of persistent authorisation policies. The article outlines the motivation and requirement for a new flexible authorisation model that addresses the needs of information sharing. It proposes that a flexible and scalable authorisation model must allow an explicit specification of the objectives of the system and access decisions must be made based on a late trade-off analysis between these explicit objectives. A research agenda for the proposed Objective-Based Access Control concept is presented.
    Keywords: Security, Access Control, Authorization Model, Multi Objective Decision Making, Secure Information Sharing, Dynamic Environment
  • Ali Fanian, Mehdi Berenjkoub, Hossein Saidi, T. Aaron Gulliver Pages 89-105
    An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, but the resources needed in the sensors are substantial. Others are appropriate from the resource consumption perspective, but have weak performance. This paper proposes a key establishment protocol based on symmetric polynomials. To improve performance, the protocol uses a new model to distribute polynomial shares to the sensors. A key feature of the proposed protocol is the tradeoff between performance, security and resource consumption. Analysis shows that our solution has good performance compared to other approaches.
    Keywords: Key Management, Sensor Networks, Probabilistic Key Sharing, Symmetric Polynomial
  • Adnan Abdul, Aziz Gutub, Ahmed Ali Al Nazer Pages 107-118
    Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using Kashida, an Arabic extension character. The proposed approach is an attempt to maximize the use of Kashida to hide more information in Arabic text cover-media. To approach this, some algorithms have been designed and implemented in a system, called MSCUKAT (Maximizing Steganography Capacity Using Kashida in Arabic Text). The improvements of this attempt include increasing the capacity of cover media to hide more secret information, reducing the file size increase after hiding the secret and enhancing the security of the encoded cover media. This proposed work has been tested outperforming previous work showing promising results.
    Keywords: Arabic E Text_Text Steganography_Text Watermarking_Text Hiding_Kashida_Feature Coding
  • Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez Pages 119-128
    Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bitplanes. For steganalysis of PQ, we propose features extraction from the empirical matrix. The proposed features can be exploited within an empirical matrix of DCT coefficients which some most significant bit planes were deleted. We obtain four empirical matrices and fuse resulted features from these matrices which have been employed for steganalysis. This technique can detect PQ embedding on stego images with 77 percent detection accuracy on mixed embedding rates between 0:05 - 0:4 bits per non-zero DCT AC coefficients (BPNZC). Comparing the results, we also show that the detection rates are effectively comparable with respect to current steganalysis techniques for PQ steganography.
    Keywords: Empirical Matrix, Perturbed Quantization (PQ), Steganalysis, Steganography