Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Data-Driven Network-Centric Threat Assessment, Dae Wook Kim
Data-Driven Network-Centric Threat Assessment, Dae Wook Kim
Browse all Theses and Dissertations
As the Internet has grown increasingly popular as a communication and information sharing platform, it has given rise to two major types of Internet security threats related to two primary entities: end-users and network services. First, information leakages from networks can reveal sensitive information about end-users. Second, end-users systems can be compromised through attacks on network services, such as scanning-and-exploit attacks, spamming, drive-by downloads, and fake anti-virus software. Designing threat assessments to detect these threats is, therefore, of great importance, and a number of the detection systems have been proposed. However, these existing threat assessment systems face significant challenges in …
De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle
De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle
Browse all Theses and Dissertations
Data generalization (anonymization) is a widely misunderstood technique for preserving individual privacy in non-interactive data publishing. Easily avoidable anonymization failures are still occurring 14 years after the discovery of basic techniques to protect against them. Identities of individuals in anonymized datasets are at risk of being disclosed by cyber attackers who exploit these failures. To demonstrate the importance of proper data anonymization we present three perspectives on data anonymization. First, we examine several de-anonymization attacks to formalize the anatomy used to conduct attacks on anonymous data. Second, we examine the vulnerabilities of an anonymous nursing workforce survey to convey how …
Privacy-Preserving Attribute-Based Access Control In A Grid, Sang Mork Park
Privacy-Preserving Attribute-Based Access Control In A Grid, Sang Mork Park
Browse all Theses and Dissertations
A Grid community is composed of diverse stake holders, such as data resource providers, computing resource providers, service providers, and the users of the resources and services. In traditional security systems for Grids, most of the authentication and authorization mechanisms are based on the user's identity or the user's classification information. If the authorization mechanism is based on the user's identity, fine-grained access control policies can be implemented but the scalability of the security system would be limited. If the authorization mechanism is based on the user's classification, the scalability can be improved but the fine-grained access control policies may …