-
Final Architecture Specification of security, privacy, and incentive mechanisms
Abstract: In this document, we define the NADA security architecture based on refined use case scenarios, a derived high level model and security analysis. For the architecure design and verification we are applying the well known STRIDE model.
Submitted 17 November, 2009; originally announced November 2009.
Comments: Delieverable of the EU FP7 project Nanodatacenters
-
arXiv:0806.1610 [pdf, ps, other]
SPAM over Internet Telephony and how to deal with it
Abstract: In our modern society telephony has developed to an omnipresent service. People are available at anytime and anywhere. Furthermore the Internet has emerged to an important communication medium. These facts and the raising availability of broadband internet access has led to the fusion of these two services. Voice over IP or short VoIP is the keyword, that describes this combination. The advantag… ▽ More
Submitted 10 June, 2008; originally announced June 2008.
Comments: 7th annual Conference Information Security South Africa (ISSA 2008) University of Johannesburg, South Africa, 7 -9 July 2008
-
arXiv:0712.2231 [pdf, ps, other]
Trust for Location-based Authorisation
Abstract: We propose a concept for authorisation using the location of a mobile device and the enforcement of location-based policies. Mobile devices enhanced by Trusted Computing capabilities operate an autonomous and secure location trigger and policy enforcement entity. Location determination is two-tiered, integrating cell-based triggering at handover with precision location measurement by the device.
Submitted 13 December, 2007; originally announced December 2007.
Comments: To appear in: Proceedings of the Wireless Communications and Networking Conference, IEEE WCNC 2008, Las Vegas, USA, 31 March - 2 April 2008
-
arXiv:0712.2113 [pdf, ps, other]
On the deployment of Mobile Trusted Modules
Abstract: In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We… ▽ More
Submitted 13 December, 2007; originally announced December 2007.
Comments: To appear in: Proceedings of the Wireless Communications and Networking Conference, IEEE WCNC 2008, Las Vegas, USA, 31 March - 2 April 2008
-
Protection of DVB Systems by Trusted Computing
Abstract: We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted platform module (TPM) into the set-top-box or residential home gateway. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO), or other payment providers.
Submitted 14 February, 2007; originally announced February 2007.
Comments: Accepted contribution to the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2007, 28-29 March 2007 at the Orange County Convention Center, Orlando, FL, USA; 7 pages, 4 figures
-
arXiv:cs/0701145 [pdf, ps, other]
Non-Repudiation in Internet Telephony
Abstract: We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data stream and its temporal sequence and thus the security context of a conversation. The concept is close to the… ▽ More
Submitted 23 January, 2007; originally announced January 2007.
Comments: Accepted full research paper at IFIP sec2007, Sandton, South Africa, 14-16 May 2007
-
arXiv:cs/0701144 [pdf, ps, other]
Trusted Ticket Systems and Applications
Abstract: Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in personal computers and mobile devices alike. Despite its neutrality with respect to applications, it has raised some privacy concerns. We show that trusted computing can be applied for service access control in a manner protecting users' privacy. We construct a ticket system -- a concept which is at… ▽ More
Submitted 23 January, 2007; originally announced January 2007.
Comments: Accepted full research paper at IFIP sec2007, Sandton, South Africa, 14-16 May 2007
-
Trustworthy content push
Abstract: Delivery of content to mobile devices gains increasing importance in industrial environments to support employees in the field. An important application are e-mail push services like the fashionable Blackberry. These systems are facing security challenges regarding data transport to, and storage of the data on the end user equipment. The emerging Trusted Computing technology offers new answers t… ▽ More
Submitted 17 October, 2007; v1 submitted 11 December, 2006; originally announced December 2006.
Comments: 4 pages, 4 eps figures
Journal ref: Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE, March 2007 Page(s):2909 - 2912
-
arXiv:cs/0607142 [pdf, ps, other]
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Abstract: Reputation and recommendation systems are fundamental for the formation of community market places. Yet, they are easy targets for attacks which disturb a market's equilibrium and are often based on cheap pseudonyms used to submit ratings. We present a method to price ratings using trusted computing, based on pseudonymous tickets.
Submitted 29 August, 2006; v1 submitted 31 July, 2006; originally announced July 2006.
Comments: Refereed contribution to the 4th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods, December 13 -15, 2006 on AXMEDIS 2006 in Leeds, England. 5 pages, 3 figures, final version
-
Security and Non-Repudiation for Voice-Over-IP Conversations
Abstract: We present a concept to achieve non-repudiation for natural language conversations by electronically signing packet-based, digital, voice communication. Signing a VoIP-based conversation means to protect the integrity and authenticity of the bidirectional data stream and its temporal sequence which together establish the security context of the communication. Our concept is conceptually close to… ▽ More
Submitted 14 June, 2006; originally announced June 2006.
Comments: Poster presentation at the ISSA 2006 From Insight to Foresight Conference, Sandton, South Africa, 5th-7th July 2006
ACM Class: C.2.0
-
Trusted Computing in Mobile Action
Abstract: Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to support more efficient ways to authenticate users and devices, potentially enabling novel services based on the security provided by the infrastructure. In this paper we exhibit some usage scenarios from the mobile doma… ▽ More
Submitted 10 June, 2006; originally announced June 2006.
Comments: In: Peer-reviewed Proceedings of the Information Security South Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006, Sandton, South Africa
ACM Class: C.2.0
-
arXiv:cs/0606032 [pdf, ps, other]
A secure archive for Voice-over-IP conversations
Abstract: An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signatures. Security is concentrated in a single, efficient component, allowing for a detailed analysis.
Submitted 7 June, 2006; originally announced June 2006.
Comments: 9 pages, 2 figures. (C) ACM, (2006). This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of VSW06, June, 2006, Berlin, Germany
ACM Class: C.2.0
-
arXiv:cs/0603051 [pdf, ps, other]
Transitive trust in mobile scenarios
Abstract: Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enable… ▽ More
Submitted 13 March, 2006; originally announced March 2006.
Comments: Pre-refereed version. To appear in Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), Freiburg im Breisgau, Germany 6th-9th June 2006. Lecture Notes in Computer Science, Springer-Verlag
-
arXiv:cs/0507071 [pdf, ps, other]
Security for Distributed Web-Applications via Aspect-Oriented Programming
Abstract: Identity Management is becoming more and more important in business systems as they are opened for third parties including trading partners, consumers and suppliers. This paper presents an approach securing a system without any knowledge of the system source code. The security module adds to the existing system authentication and authorisation based on aspect oriented programming and the liberty… ▽ More
Submitted 29 July, 2005; originally announced July 2005.
Comments: Refereed contribution to the Conference Information Security South Africa (ISSA 2005) Sandton, South Africa, 29. June - 1. July 2005
ACM Class: K.6.5; D.1.5; D.2