Pub Crawl #52

Image removed.Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

 

Attribute-based Encryption 2020  Image removed.  Image removed.      Image removed.    (all)

In an attribution-based encryption system, the decryption of a ciphertext should be possible only if the set of attributes of the user key matches the attributes of the ciphertext. The two types of attribute-based encryption schemes are key-policy attribute-based encryption and ciphertext-policy attribute-based encryption. For the Science of Security community, this research is relevant to the hard problems of scalability, human behavior, and policy-based governance.

Computing Theory and Composability 2020  Image removed.            (all)

The work cited here combine research into computing theory with research into the Science of Security hard problem of composability.

Computing Theory and Security Metrics 2020      Image removed.        (all)

The works cited here combine research into computing theory with research into the Science of Security hard problem of security metrics.

Computer Theory and Trust 2020       Image removed.    (all)

The works cited here combine research into computing theory with research into the Science of Security hard problem of trust between humans and humans, humans and computers, and between computers. 

Internet-scale Computing Security 2020  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Addressing security at Internet scale relates to all of the Hard Problems of the Science of Security.

Intrusion Tolerance 2020  Image removed.  Image removed.  (all)

Intrusion tolerance refers to a fault-tolerant design approach to defending communications, computer and other information systems against malicious attack. Rather than detecting all anomalies, tolerant systems only identify those intrusions which lead to security failures. The topic relates to the Science of Security issues of resilience and composability.

IoBT Security 2020  Image removed.  Image removed.  Image removed.    (all)

The Internet of Battlefield Things (IoBT) is distinct from the general Internet of Things due to the nature of the hardened specific networks employed under battlefield conditions. For the Science of Security community, this work is relevant to scalability, resilience, and human factors.

iOS Security 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

The proliferation and increased capability of “smart phones” has also increased security issues for users. For the Science of Security community, these small computing platforms have the same hard problems to solve as main frames, data centers, or desktops. The research cited here looked at encryption issues specific to Apple’s iOS operating system. For the Science of Security community, this work is relevant to the hard problems of compositionality, human factors, resiliency, and metrics.

IoT Security 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

The term Internet of Things (IT) refers to advanced connectivity of the Internet with devices, systems and services that include both machine-to-machine communications (M2M) and a variety of protocols, domains and applications. Since the concept incorporates literally billions of devices, the security implications are huge. For the Science of Security community, this work is relevant to the hard problems of resilience, composability, human behavior, and metrics.

IP Privacy 2020  Image removed.  Image removed.    Image removed.      (all)

Theft of Intellectual Property, that is, privacy, continues to be a matter of major research interest. The topic is related to the Science of Security regarding resilience, policy-based governance, and composability.

IP Protection 2020  Image removed.  Image removed.    Image removed.      (all)

Intellectual Property protection continues to be a matter of major research interest. The topic is related to the Science of Security regarding resilience, policy-based governance, and composability.

IPv6 Security 2020  Image removed.  Image removed.  Image removed.  Image removed.  (all)

Internet Protocol Version 6 is slowly being adopted as the replacement for version 4. Touted as a more secure protocol with increased address space, portability, and greater privacy, research into this and other related protocols has increased, particularly in the context of smart grid, mobile communications, and cloud computing. For the Science of Security community, it is relevant to resiliency, composability, metrics, and policy-based governance.

Kerberos 2020  Image removed.  Image removed.  Image removed.    (all)

Kerberos supports authentication in distributed systems. Used in intelligent systems, it is an encrypted data structure naming a user and a service the user may access. For the Science of Security community, it is relevant to the broad issues of cryptography and to resilience, human behavior, resiliency, and metrics.

Key Management 2020  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Successful key management is critical to the security of any cryptosystem. It is perhaps the most difficult part of cryptography including as it does system policy, user training, organizational and departmental interactions, and coordination between all of these elements and includes dealing with the generation, exchange, storage, use, and replacement of keys, key servers, cryptographic protocols, and user procedures. For researchers, key management is a challenge to create larger scale and faster systems to operate within the cloud and other complex environments, while ensuring validity and not adding weight to the process. For the Science of Security community, it is relevant to scalability, resilience, metrics, and human behavior.

Keystroke Analysis 2020      Image removed.    Image removed.    (all)

Keystrokes are a basis for behavioral biometrics. The rhythms and patterns of the individual user can become the basis for a unique biological identification. Research into this area of computer security is growing. For the Science of Security, keystroke analysis is relevant to the hard problems of human behavior factors and predictive metrics.

Lightweight Ciphers 2020  Image removed.      Image removed.      (all)

Lightweight cryptography is a major research direction. The release of SIMON in June 2013 generated significant interest and a number of studies evaluating and comparing it to other cipher algorithms. To the Science of Security community, lightweight ciphers can support resilience and scalability, especially in cyber physical systems constrained with power and “weight” budgets.

Linux Operating System Security 2020  Image removed.    Image removed.  Image removed.      (all)

Operating system security is a component of resiliency, composability, and an area of concern for predictive metrics. This research focuses on the Linux kernel.

Location Privacy in Wireless Networks 2020  Image removed.    Image removed.  Image removed.  Image removed.    (all)

Privacy services on mobile devices are a major issue in cybersecurity. For the Science of Security community, the problem relates to resiliency, metrics, human behavior, and compositionality.

MANET Privacy 2020  Image removed.  Image removed.  Image removed.  (all)

Privacy is an important research issues for mobile ad hoc networks (MANETs). For the Science of Security community, this work relates to the hard problems of resilience, metrics, and compositionality.

MANET Security 2020  Image removed.  Image removed.  Image removed.  (all)

Security is an important research issue for mobile ad hoc networks (MANETs). For the Science of Security community, this work relates to the hard problems of resilience, metrics, and compositionality.

Measurement And Metrics Testing 2020      Image removed.        (all)

Measurement and metrics are hard problems in the Science of Security. The research cited here looks at methods and techniques for testing the validity of measurement and metrics techniques.

Metadata Discovery Problem 2020  Image removed.      Image removed.      (all)

Metadata is often described as “data about data.” Usage varies from virtualization to data warehousing to statistics. Because of its volume and complexity, metadata has the potential to tax security procedures and processes. For the Science of Security community, work in this area is relevant to the problems of scalability, resilience, and compositionality.

Microelectronics Security 2020      Image removed.    Image removed.  Image removed.         (all)

Microelectronics is at the center of the IT world. Their security—provenance, integrity of their manufacture, and capacity for providing embedded security—is both an opportunity and a problem for cybersecurity research. For the Science of Security community, microelectronic security is a constituent component of resiliency, composability, and predictive metrics.

Middleware Security 2020  Image removed.  Image removed.    Image removed.      (all)

Middleware facilitates distributed processing and is of significant interest to the security world with the development of cloud and mobile applications. It is important to the Science of Security community relative to resilience, policy-based governance and composability.

Moving Target Defense 2020  Image removed.    Image removed.  Image removed.      (all)

Moving Target Defense (MTD) research focuses on the presentation of a dynamic attack surface to an adversary, increasing the work factor necessary to successfully attack and exploit a cyber target. For the Science of Security community, MTD is related to scalability, resilience and predictive metrics.

Science of Security 2019  Image removed.  Image removed.  Image removed.  Image removed.  Image removed.    (all)

Many more articles and research studies are appearing with “Science of Security” as a keyword. The articles cited here discuss the degree to which security is a science and various issues surrounding its development, ranging from basic approach to essential elements. The articles cited here address the fundamental concepts of the Science of Security.

 

 

 

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests for removal via email of the links or modifications to specific citations. Please include the URL of the specific citation in your correspondence.

 

Pub Crawl contains bibliographical citations, abstracts if available, links on specific topics, and research problems of interest to the Science of Security community.

How recent are these publications?

These bibliographies include recent scholarly research on topics that have been presented or published within the stated year. Some represent updates from work presented in previous years; others are new topics.

How are topics selected?

The specific topics are selected from materials that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are also chosen for their usefulness for current researchers.

How can I submit or suggest a publication?

Researchers willing to share their work are welcome to submit a citation, abstract, and URL for consideration and posting, and to identify additional topics of interest to the community. Researchers are also encouraged to share this request with their colleagues and collaborators.

What are the hard problems?

Select a hard problem to retrieve related publications.

  1. Image removed. - Scalability and Composability: Develop methods to enable the construction of secure systems with known security properties from components with known security properties, without a requirement to fully re-analyze the constituent components.
  2. Image removed. - Policy-Governed Secure Collaboration: Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains.
  3. Image removed. - Security Metrics Driven Evaluation, Design, Development, and Deployment: Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  4. Image removed. - Resilient Architectures: Develop means to design and analyze system architectures that deliver required service in the face of compromised components.
  5. Image removed. - Understanding and Accounting for Human Behavior: Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties.
 
Submitted by Anonymous on