-
Chapter and Conference Paper
Lightweight IEC 61850 Secure Communication Module for Microgrids
Microgrid systems use distributed renewable energy resources to reduce dependency of traditional power systems. These energy devices are located at various places because of their characteristic and communicat...
-
Chapter and Conference Paper
Testing the Differential Impact of Structural Paths in PLS Analysis: A Bootstrap** Approach
Researchers are often interested in examining the relative impact of PLS structural paths. As such, this paper focuses on how one assesses the impact of various antecedent constructs to a particular endogenous...
-
Chapter and Conference Paper
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments
In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an ...
-
Chapter and Conference Paper
An Effective Method for Location Privacy in Ubiquitous Computing
In ubiquitous computing environment, every service should have the characteristic of context-awareness. Since physical location is important information to grasp a user’s context, the service provider should m...
-
Chapter and Conference Paper
RPS: An Extension of Reference Monitor to Prevent Race-Attacks
Most software involves some vulnerabilities because of various potential factors such as design flaw and program bug. Among them, a faulty assumption on file access results in a side-effect as known TOCTTOU vu...
-
Chapter and Conference Paper
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction
The intrusion detection system (IDS) is used as one of the solutions against the Internet attack. However the IDS reports extremely many alerts as compared with the number of the real attack. Thus the operator...
-
Chapter and Conference Paper
Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs
The attribute oriented induction (AOI) is a kind of aggregation method. By generalizing the attributes of the alert, it creates several clusters that includes a set of alerts having similar or the same cause. ...
-
Chapter and Conference Paper
Effective Web-Related Resource Security Using Distributed Role Hierarchy
The recent trend of access control on the Web-related resource is that the service provider differentiates services according to the user’s attributes such as membership class or job position. For proper and s...
-
Chapter and Conference Paper
A Novel Method to Support User’s Consent in Usage Control for Stable Trust in E-business
In the recent Web environment, the key issue is not who can use the resource, but how to control the usage of resources. Usage control (UCON) is a consolidate solution for this problem. UCON can be applied to ...
-
Chapter and Conference Paper
Web Security Using Distributed Role Hierarchy
Today the Web becomes an essential part of everyday life. In company, school, or public office, people are hooked on computers to connect to the Web. On the other hand, we begin to encounter with web security ...