Lecture Notes in Computer Science 2828 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen



Similar documents
Lecture Notes in Computer Science 5161

Java and the Java Virtual Machine

Understanding Competitive Advantage

Lecture Notes in Computer Science

The Banks and the Italian Economy

Lecture Notes in Computer Science 3161

Spatial Data on the Web

Springer-Verlag Berlin Heidelberg GmbH

Lecture Notes in Computer Science 3422

Design of Flexible Production Systems

A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS

International Series on Consumer Science

How To Write An Fpa Programmable Gate Array

Automated Firewall Analytics

Ammonia. Catalysis and Manufacture. Springer-Verlag. Berlin Heidelberg New York London Paris Tokyo Hong Kong Barcelona Budapest

Oral and Cranial Implants

Spatial Inequalities

Ding-Zhu Du Editors. Network Security

Lecture Notes in Computer Science 7850

Human Rights in European Criminal Law

Lasers in Restorative Dentistry

Stem Cell Biology and Regenerative Medicine

Collaborative Customer Relationship Management

Software Process Automation

THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS

Security In Information Systems WOSIS-2005

Applying Comparative Effectiveness Data to Medical Decision Making

Bachelor of Information Technology (Network Security)

Statistics for Innovation

Corporate Performance Management

The Language Factor in International Business. Linguistic Insights in Language and Communication. Peter Lang

The Product Manager s Toolkit

Handbook of Research. on Social, Economic, and Environmental. Sustainability in the. Development of Smart. Cities


New Frontiers in Entrepreneurship

A Secure Intrusion Avoidance System Using Hybrid Cryptography

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica

Challenges and Opportunities in Health Care Management

Big-Data Analytics and Cloud Computing

FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM

THREAT MODELLING FOR ACTIVE DIRECTORY

Miklós Szendrői Franklin H. Sim (Eds.) Color Atlas of Clinical Orthopedics

Cost Management in Shipbuilding

The MRI Study Guide for Technologists

SpringerBriefs in Criminology

Eva-Maria Jakobs and Daniel Perrin (Eds.) Handbook of Writing and Text Production

Network Security Essentials:

Lecture Notes in Mathematics 2033

Lecture Notes in Mathematics 2108

Lecture Notes in Mathematics

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

EU SUSTAINABLE ENERGY WEEK JUNE 2013

Lectures for the course: Electronic Commerce Technology (IT 60104)

Studies in the Economics of Uncertainty

Cryptography and Network Security

A Robust Multimedia Contents Distribution over IP based Mobile Networks

Frank Peter Helmus. Process Plant Design. Project Management from Inquiry to Acceptance. Translated by Christine Ahner

Supporting Education and Training in the field of Satellite Navigation in Europe. Gabriella Povero. Istituto Superiore Mario Boella

Eleventh Hour Security+

Mobile Market Research

Complications in Endodontic Surgery

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

Human-Survey Interaction

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl

Lecture Notes in Mathematics 2026

Lecture Notes in Artificial Intelligence

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0

Library and Information Sciences

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Cryptography and Network Security Chapter 1

Representation of E-documents in AIDA Project

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Lecture Notes in Computer Science

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

CIS 253. Network Security

SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS

Audio and Video for the Internet

Cmix solution. CMix Japan Co. Ltd. Copyright (C) 2007 CMix Japan Co. Ltd. All Rights Reserved.

Essential Clinical Social Work Series

List of Projects in Application

Wireless Encryption Protection

How to Send Video Images Through Internet

Springer Proceedings in Mathematics & Statistics

CcMS: A Cloud Computing Based Content Management System

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Improving Quality Assurance in European Vocational Education and Training

Global Logistics Management

Transcription:

Lecture Notes in Computer Science 2828 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo

Antonio Lioy Daniele Mazzocchi (Eds.) Communications and Multimedia Security Advanced Techniques for Network and Data Protection 7th IFIP-TC6 TC11 International Conference, CMS 2003 Torino, Italy, October 2-3, 2003 Proceedings 13

Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editors Antonio Lioy Politecnico di Torino Dip. di Automatica e Informatica corso Duca degli Abruzzi, 24, 10129 Torino, Italy E-mail: lioy@polito.it Daniele Mazzocchi Istituto Superiore Mario Boella corso Trento, 21, 10129 Torino, Italy E-mail: mazzocchi@ismb.it Cataloging-in-Publication Data applied for A catalog record for this book is available from the Library of Congress. Bibliographic information published by Die Deutsche Bibliothek Die Deutsche Bibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data is available in the Internet at <http://dnb.ddb.de>. CR Subject Classification (1998): C.2, E.3, D.4.6, H.5.1, K.4.1, K.6.5, H.4 ISSN 0302-9743 ISBN 3-540-20185-8 Springer-Verlag Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer-Verlag Berlin Heidelberg New York a member of BertelsmannSpringer Science+Business Media GmbH http://www.springer.de IFIP International Federation for Information Processing, Hofstraße 3, A-2361 Laxenburg, Austria 2003 Printed in Germany Typesetting: Camera-ready by author, data conversion by PTP-Berlin GmbH Printed on acid-free paper SPIN: 10959107 06/3142 543210

Preface The Communications and Multimedia Security conference (CMS 2003) was organized in Torino, Italy, on October 2-3, 2003. CMS 2003 was the seventh IFIP working conference on communications and multimedia security since 1995. Research issues and practical experiences were the topics of interest, with a special focus on the security of advanced technologies, such as wireless and multimedia communications. The book Advanced Communications and Multimedia Security contains the 21 articles that were selected by the conference program committee for presentation at CMS 2003. The articles address new ideas and experimental evaluation in several fields related to communications and multimedia security, such as cryptography, network security, multimedia data protection, application security, trust management and user privacy. We think that they will be of interest not only to the conference attendees but also to the general public of researchers in the security field. We wish to thank all the participants, organizers, and contributors of the CMS 2003 conference for having made it a success. October 2003 Antonio Lioy General Chair of CMS 2003 Daniele Mazzocchi Program Chair of CMS 2003

VI Organization CMS 2003 was organized by the TORSEC Computer and Network Security Group of the Dipartimento di Automatica ed Informatica at the Politecnico di Torino, in cooperation with the Istituto Superiore Mario Boella. Conference Committee General Chair: Program Chair: Organizing Chair: Antonio Lioy (Politecnico di Torino, Italy) Daniele Mazzocchi (Istituto Superiore Mario Boella, Italy) Andrea S. Atzeni (Politecnico di Torino, Italy) Program Committee F. Bergadano, Università di Torino E. Bertino, Università di Milano L. Breveglieri, Politecnico di Milano A. Casaca, INESC, chairman IFIP TC6 M. Cremonini, Università di Milano Y. Deswarte, LAAS-CNRS M. G. Fugini, Politecnico di Milano S. Furnell, University of Plymouth R. Grimm, Technische Universität Ilmenau B. Jerman-Blažič, Institut Jožef Stefan S. Kent, BBN T. Klobučar, Institut Jožef Stefan A. Lioy, Politecnico di Torino P. Lipp, IAIK J. Lopez, Universidad de Málaga F. Maino, CISCO D. Mazzocchi, ISMB S. Muftic, KTH F. Piessens, Katholieke Universiteit Leuven P. A. Samarati, Università di Milano A. F. G. Skarmeta, Universidad de Murcia L. Strous, De Nederlandsche Bank, chairman IFIP TC11 G. Tsudik, University of California at Irvine

Organization CMS 2003 was organized by the TORSEC Computer and Network Security Group of the Dipartimento di Automatica ed Informatica at the Politecnico di Torino, in cooperation with the Istituto Superiore Mario Boella. Conference Committee General Chair: Program Chair: Organizing Chair: Antonio Lioy (Politecnico di Torino, Italy) Daniele Mazzocchi (Istituto Superiore Mario Boella, Italy) Andrea S. Atzeni (Politecnico di Torino, Italy) Program Committee F. Bergadano, Università di Torino E. Bertino, Università di Milano L. Breveglieri, Politecnico di Milano A. Casaca, INESC, chairman IFIP TC6 M. Cremonini, Università di Milano Y. Deswarte, LAAS-CNRS M. G. Fugini, Politecnico di Milano S. Furnell, University of Plymouth R. Grimm, Technische Universität Ilmenau B. Jerman-Blažič, Institut Jožef Stefan S. Kent, BBN T. Klobučar, Institut Jožef Stefan A. Lioy, Politecnico di Torino P. Lipp, IAIK J. Lopez, Universidad de Málaga F. Maino, CISCO D. Mazzocchi, ISMB S. Muftic, KTH F. Piessens, Katholieke Universiteit Leuven P. A. Samarati, Università di Milano A. F. G. Skarmeta, Universidad de Murcia L. Strous, De Nederlandsche Bank, chairman IFIP TC11 G. Tsudik, University of California at Irvine

Table of Contents Cryptography Computation of Cryptographic Keys from Face Biometrics... 1 Alwyn Goh, David C.L. Ngo AUTHMAC DH: A New Protocol for Authentication and Key Distribution... 14 Heba K. Aslan Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection... 27 Alwyn Goh, David C.L. Ngo Network Security Securing the Border Gateway Protocol: A Status Update... 40 Stephen T. Kent Towards an IPv6-Based Security Framework for Distributed Storage Resources... 54 Alessandro Bassi, Julien Laganier Operational Characteristics of an Automated Intrusion Response System... 65 Maria Papadaki, Steven Furnell, Benn Lines, Paul Reynolds Mobile and Wireless Network Security A Secure Multimedia System in Emerging Wireless Home Networks... 76 Nut Taesombut, Richard Huang, Venkat P. Rangan Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents... 89 Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji A Security Scheme for Mobile Agent Platforms in Large-Scale Systems... 104 Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro Trust and Privacy Privacy and Trust in Distributed Networks... 117 Thomas Rössler, Arno Hollosi

VIII Table of Contents Extending the SDSI / SPKI Model through Federation Webs... 132 Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero Trust-X : An XML Framework for Trust Negotiations... 146 Elisa Bertino, Elena Ferrari, Anna C. Squicciarini Application Security How to Specify Security Services: A Practical Approach... 158 Javier Lopez, Juan J. Ortega, Jose Vivas, Jose M. Troya Application Level Smart Card Support through Networked Mobile Devices... 172 Pierpaolo Baglietto, Francesco Moggia, Nicola Zingirian, Massimo Maresca Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage... 181 Alwyn Goh, Kuan W. Yip, David C.L. Ngo Multimedia Security Selective Encryption of the JPEG2000 Bitstream... 194 Roland Norcen, Andreas Uhl Robust Spatial Data Hiding for Color Images... 205 Xiaoqiang Li, Xiangyang Xue, Wei Li Watermark Security via Secret Wavelet Packet Subband Structures... 214 Werner Dietl, Andreas Uhl A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression... 226 David Megías, Jordi Herrera-Joancomartí, Julià Minguillón Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs... 239 Alwyn Goh, G.S. Poh, David C.L. Ngo Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization... 252 Bubi G. Flepp-Stars, Herbert Stögner, Andreas Uhl Author Index... 265