Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Epics: A Framework For Enforcing Security Policies In Composite Web Services, Rohit Ranchal, Bharat Bhargava, Pelin Angin, Lotfi Ben Othmane May 2019

Epics: A Framework For Enforcing Security Policies In Composite Web Services, Rohit Ranchal, Bharat Bhargava, Pelin Angin, Lotfi Ben Othmane

Electrical and Computer Engineering Publications

With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of their data and have to rely on service providers which provide limited selection of security and privacy preferences. This lack of awareness and loss of control over data ...


Cloud Migration Of Rpat Tool, Tanmay Gore Jan 2019

Cloud Migration Of Rpat Tool, Tanmay Gore

Creative Components

Machine learning has recently gained popularity in many engineering, science, medical and other domains outside computer science. Therefore, many researchers, scientist, students and developers are developing machine learning based applications for various purposes. However, due to a large number of technologies and application deployment platforms, these professionals spend more time learning technologies than on developing and optimizing the core logic for their applications. This paper describes the design and implementation of a new cloud-based deployment platform suitable to deploy machine learning based applications across multiple platforms. This platform focuses heavily on security, privacy, and ease of deployment for developers. It ...


Leveraging Bluetooth As A Second Factor In Two-Factor Authentication, Cimone Le Wright-Hamor Jan 2017

Leveraging Bluetooth As A Second Factor In Two-Factor Authentication, Cimone Le Wright-Hamor

Graduate Theses and Dissertations

Passwords have been the dominant single-factor authentication method for decades but are no longer sufficient to validate a user's identity. The simplistic nature of passwords perpetuate their existence and makes them an easy attack vector. However, Two-Factor Authentication (2FA) augments passwords and adds a layer of security. Although 2FA has the potential to increase security, traditional second factors require user interaction at every login attempt, which may contribute to slow adaptation. Traditional second factors drastically alter the user authentication experience and typically require the user to navigate away from the login screen. Therefore, we present a new second-factor method ...


Dragon: A Framework For Computing Preferred Defense Policies From Logical Attack Graphs, Swapnanjan Chatterjee Jan 2014

Dragon: A Framework For Computing Preferred Defense Policies From Logical Attack Graphs, Swapnanjan Chatterjee

Graduate Theses and Dissertations

Attack graphs provide formalism for modelling the vulnerabilities using a compact representation scheme. Two of the most popular attack graph representations are scenario attack graphs, and logical attack graphs. In logical attack graphs, the host machines present in the network are represented as exploit nodes, while the configurations (IDS rules, firewall policies etc.) running on them are represented as fact nodes. The actual user privileges that are possible on each of these hosts are represented as privilege nodes.

Existing work provides methods to analyze logical attack graphs and compute attack paths of varying costs. In this thesis we develop a ...


Graph-Based Forensic Investigation Of Bitcoin Transactions, Chen Zhao Jan 2014

Graph-Based Forensic Investigation Of Bitcoin Transactions, Chen Zhao

Graduate Theses and Dissertations

This thesis illustrates forensic research work on Bitcoin, an innovative Internet based global transaction system that attracts ascending popularity during the recent few years. As an open, public and scalable distributed payment system, Bitcoin brings forward significant economic and technological impact to our world. Meanwhile, a new notion of virtual currency, "Bitcoin" comes into existence such that Bitcoin currency can be "mined" from all over world complying with specific algorithms. Mined bit "coins" has practical monetary values that turn the Bitcoin system into a digital currency circulation system. Due to Bitcoin's decentralized semantics, Bitcoin transaction and currency are not ...


Security Implications Of Implantable Medical Devices, Shelby David Kobes Jan 2014

Security Implications Of Implantable Medical Devices, Shelby David Kobes

Graduate Theses and Dissertations

The advancement of wireless medical devices in the hospital has created an environment that is unsustainable, unsustainable for security management. I will explain how the development of wireless medical devices has changed the landscape of security in the medical field. How the history of medical devices and organizational issues affected device development. I will look in to the inner workings of pacemakers and pacemaker programmers and how their systems affect security. Who are the stakeholders for protecting the information and function of the medical device and pacemaker? What are the stakeholder's capacities and obstacles, especially if the device is ...


An Fpga Architecture For The Recovery Of Wpa/Wpa2 Keys, Tyler Blaine Johnson Jan 2014

An Fpga Architecture For The Recovery Of Wpa/Wpa2 Keys, Tyler Blaine Johnson

Graduate Theses and Dissertations

Wi-Fi protected access (WPA) has provided serious improvements over the now deprecated wired equivalent privacy protocol (WEP). WPA, however, still has some flaws that allow an attacker to obtain the passphrase. One of these flaws is exposed when the access point (AP) is operating in the WPA personal mode. This is the most common mode as it is the quickest and easiest to configure. It requires the attacker to capture the traffic from four-way handshake between the AP and client, and then provide enough compute time to reverse the passphrase. Attackers quickly noticed that by investing the compute time in ...


Risk-Based Security-Constrained Optimal Power Flow: Mathematical Fundamentals, Computational Strategies, Validation, And Use Within Electricity Markets, Qin Wang Jan 2013

Risk-Based Security-Constrained Optimal Power Flow: Mathematical Fundamentals, Computational Strategies, Validation, And Use Within Electricity Markets, Qin Wang

Graduate Theses and Dissertations

This dissertation contributes to develop the mathematical fundamentals and computational strategies of risk-based security-constrained optimal power flow (RB-SCOPF) and validate its application in electricity markets. The RB-SCOPF enforces three types of flow-related constraints: normal state deterministic flow limits, contingency state deterministic flow limits (the "N-1" criteria), and contingency state system risk, which depends only on contingency states but not the normal state. Each constraint group is scaled by a single parameter setting allowing tradeoffs between deterministic constraints and system risk. Relative to the security-constrained optimal power flow (SCOPF) used in industry today, the RB-SCOPF finds operating conditions that are more ...


A Framework For Cost-Sensitive Automated Selection Of Intrusion Response, Christopher Roy Strasburg Jan 2009

A Framework For Cost-Sensitive Automated Selection Of Intrusion Response, Christopher Roy Strasburg

Graduate Theses and Dissertations

In recent years, cost-sensitive intrusion response has gained

significant interest due to its emphasis on the balance between

potential damage incurred by the intrusion and cost of the response.

However, one of the challenges in applying this approach is defining a

consistent and adaptable measurement framework to evaluate the expected

benefit of a response. In this thesis we present a model and framework

for the cost-sensitive assessment and selection of intrusion response.

Specifically, we introduce a set of measurements that characterize the

potential costs associated with the intrusion handling process, and

propose an intrusion response evaluation method with respect to ...


Attacks And Countermeasures On Routing Protocols In Wireless Networks, Narasimha Rao Venkata Laxmi Velagaleti Jan 2008

Attacks And Countermeasures On Routing Protocols In Wireless Networks, Narasimha Rao Venkata Laxmi Velagaleti

Graduate Theses and Dissertations

Routing in wireless networks is not an easy task as they are highly vulnerable to attacks. The main goal of this work is to study the routing performance and security aspects of wireless ad hoc and mesh networks. Most of the routing protocols use hop-count as the routing metric. Hop count metric may not be appropriate for routing in wireless networks as this does not account for the link qualities, advantages of multi-radio paradigm etc.

There are several metrics designed for link quality based source routing protocols for multi-radio wireless ad hoc and mesh networks. For example Weighted Cumulative Expected ...


Multi-Protocol Attack: A Survey Of Current Research, Nalin V. Subramanian, Josh Dehliger Jan 2006

Multi-Protocol Attack: A Survey Of Current Research, Nalin V. Subramanian, Josh Dehliger

Computer Science Technical Reports

Traditionally, verification methods for security protocols typically assume that the protocols are used in isolation of other protocols (i.e., there is only a single protocol using a network at a given time). However, in practice it is unrealistic to assume that a security protocol runs in isolation in an insecure network. A multi-protocol attack is an attack in which more than one protocol is involved. The verification methods for security protocols that assume a single protocol on a network will fail to verify a protocol´┐Żs resistance/vulnerability to multi-protocol attacks. Further, multiple security protocols that are verified to ...