liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
BETA
Duma, Claudiu
Publications (10 of 18) Show all publications
Herzog, A., Shahmehri, N. & Duma, C. (2009). An ontology for information security (1ed.). In: Nemadi H (Ed.), Techniques and applications for advanced information privacy and security: emerging organizational, ethical and human issues (pp. 278-301). Information Science Reference
Open this publication in new window or tab >>An ontology for information security
2009 (English)In: Techniques and applications for advanced information privacy and security: emerging organizational, ethical and human issues / [ed] Nemadi H, Information Science Reference , 2009, 1, p. 278-301Chapter in book (Other academic)
Abstract [en]

Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities.

Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.

Show more Show less

Place, publisher, year, edition, pages
Information Science Reference, 2009 Edition: 1
National Category
Engineering and Technology
Identifiers
urn:nbn:se:liu:diva-59977 (URN)97-81-60566-210-7 (ISBN)1605662100 (ISBN)
Available from: 2010-10-01 Created: 2010-10-01 Last updated: 2014-06-24Bibliographically approved
Herzog, A., Shahmehri, N. & Duma, C. (2007). An ontology of information security. International Journal of Information Security and Privacy, 1(4), 1-23
Open this publication in new window or tab >>An ontology of information security
2007 (English)In: International Journal of Information Security and Privacy, ISSN 1930-1650, Vol. 1, no 4, p. 1-23Article in journal (Refereed) Published
Abstract [en]

We present a publicly available, OWL-based ontology of information security which models assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be used as a general vocabulary, roadmap, and extensible dictionary of the domain of information security. With its help, users can agree on a common language and definition of terms and relationships. In addition to browsing for information, the ontology is also useful for reasoning about relationships between its entities, for example, threats and countermeasures. The ontology helps answer questions like: Which countermeasures detect or prevent the violation of integrity of data? Which assets are protected by SSH? Which countermeasures thwart buffer overflow attacks? At the moment, the ontology comprises 88 threat classes, 79 asset classes, 133 countermeasure classes and 34 relations between those classes. We provide the means for extending the ontology, and provide examples of the extendibility with the countermeasure classes ‘memory protection’ and ‘source code analysis’. This article describes the content of the ontology as well as its usages, potential for extension, technical implementation and tools for working with it.

National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-14436 (URN)10.4018/jisp.2007100101 (DOI)
Available from: 2007-04-27 Created: 2007-04-27 Last updated: 2018-01-13
Duma, C., Herzog, A. & Shahmehri, N. (2007). Privacy in the Semantic Web: What Policy Languages Have to Offer. In: IEEE Workshop on Policies for Distributed Systems and Networks,2007: . Paper presented at IEEE Workshop on Policies for Distributed Systems and Networks,2007 (pp. 109). Bologna, Italy: IEEE
Open this publication in new window or tab >>Privacy in the Semantic Web: What Policy Languages Have to Offer
2007 (English)In: IEEE Workshop on Policies for Distributed Systems and Networks,2007, Bologna, Italy: IEEE , 2007, p. 109-Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Bologna, Italy: IEEE, 2007
Keywords
policy, privacy, semantic web
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-37670 (URN)10.1109/POLICY.2007.39 (DOI)37265 (Local ID)37265 (Archive number)37265 (OAI)
Conference
IEEE Workshop on Policies for Distributed Systems and Networks,2007
Available from: 2009-10-10 Created: 2009-10-10 Last updated: 2018-01-13
Madria, S., Mondal, A., Mohania, M., Bhargava, B., Bressan, S., Iwaihara, M., . . . Yolum, P. (2007). W18 - PDMST '07 & GRep '07: 4th international workshop on P2P Data Management, Security, and Trust. Database and Expert Systems Applications
Open this publication in new window or tab >>W18 - PDMST '07 & GRep '07: 4th international workshop on P2P Data Management, Security, and Trust
Show others...
2007 (English)In: Database and Expert Systems Applications, ISSN 1529-4188, , p. 775-776Other (Other academic)
Abstract [en]

[No abstract available]

Publisher
p. 775-776
National Category
Engineering and Technology
Identifiers
urn:nbn:se:liu:diva-47722 (URN)10.1109/DEXA.2007.4312999 (DOI)
Available from: 2009-10-11 Created: 2009-10-11 Last updated: 2017-12-13
Duma, C., Karresand, M., Shahmehri, N. & Caronni, G. (2006). A Trust-Aware, P2P-Based Overlay for Intrusion Detection. In: International Workshop on Database and Expert Systems Applications DEXA06,2006: . Paper presented at International Workshop on Database and Expert Systems Applications DEXA06,2006 (pp. 692). IEEE
Open this publication in new window or tab >>A Trust-Aware, P2P-Based Overlay for Intrusion Detection
2006 (English)In: International Workshop on Database and Expert Systems Applications DEXA06,2006, IEEE , 2006, p. 692-Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
IEEE, 2006
Keywords
intrusion detection, trust, peer-to-peer, security
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-34399 (URN)10.1109/DEXA.2006.21 (DOI)21408 (Local ID)21408 (Archive number)21408 (OAI)
Conference
International Workshop on Database and Expert Systems Applications DEXA06,2006
Available from: 2009-10-10 Created: 2009-10-10 Last updated: 2018-01-13
Byers, D., Ardi, S., Shahmehri, N. & Duma, C. (2006). Modeling Software Vulnerabilities with Vulnerability Cause Graphs. In: International Conference on Software Maintenance,2006: . Paper presented at International Conference on Software Maintenance,2006 (pp. 411-422). IEEE
Open this publication in new window or tab >>Modeling Software Vulnerabilities with Vulnerability Cause Graphs
2006 (English)In: International Conference on Software Maintenance,2006, IEEE , 2006, p. 411-422Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
IEEE, 2006
Keywords
Software Security, Vulnerability Modeling
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-34284 (URN)21258 (Local ID)21258 (Archive number)21258 (OAI)
Conference
International Conference on Software Maintenance,2006
Available from: 2009-10-10 Created: 2009-10-10 Last updated: 2018-01-13
Bonatti, P., Duma, C., Fuchs, N., Olmedilla, D., Peer, J. & Shahmehri, N. (2006). Semantic Web Policies -- A Discussion of Requirements and Research Issues. In: European Semantic Web Conference,2006: . Paper presented at European Semantic Web Conference,2006 (pp. 712-724). Springer: Springer
Open this publication in new window or tab >>Semantic Web Policies -- A Discussion of Requirements and Research Issues
Show others...
2006 (English)In: European Semantic Web Conference,2006, Springer: Springer , 2006, p. 712-724Conference paper, Published paper (Refereed)
Abstract [en]

Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the area, including the Semantic Web community, but several aspects still exist that prevent policy frameworks from widespread adoption and real world application. This paper discusses important requirements and open research issues in this context, focusing on policies in general and their integration into trust management frameworks, as well as on approaches to increase system cooperation, usability and user-awareness of policy issues.

Place, publisher, year, edition, pages
Springer: Springer, 2006
Keywords
semantic web, policy, trut, trust negotiation, reputation, rules
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-34403 (URN)10.1007/11762256_51 (DOI)21412 (Local ID)21412 (Archive number)21412 (OAI)
Conference
European Semantic Web Conference,2006
Available from: 2009-10-10 Created: 2009-10-10 Last updated: 2018-01-13
Bonatti, P., Duma, C., Olmedilla, D. & Shahmehri, N. (2005). An Integration of Reputation-based and Policy-based Trust Management. In: Semantic Web and Policy Workshop,2005 (pp. 136). Proceedings of the Semantic Web and Policy Workshop: UMBC eBiquity
Open this publication in new window or tab >>An Integration of Reputation-based and Policy-based Trust Management
2005 (English)In: Semantic Web and Policy Workshop,2005, Proceedings of the Semantic Web and Policy Workshop: UMBC eBiquity , 2005, p. 136-Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Proceedings of the Semantic Web and Policy Workshop: UMBC eBiquity, 2005
Keywords
trust, reputation, policy
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-30965 (URN)16643 (Local ID)16643 (Archive number)16643 (OAI)
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13
Duma, C., Shahmehri, N. & Caronni, G. (2005). Dynamic trust metrics for peer-to-peer systems. In: Proceedings of the Sixteenth International Workshop on Database and Expert Systems Applications, 2005. Paper presented at Sixteenth International Workshop on Database and Expert Systems Applications, 22-26 August, 2005, Copenhagen, Denmark (pp. 776-781). Los Alamitos, CA, USA: IEEE Computer Society
Open this publication in new window or tab >>Dynamic trust metrics for peer-to-peer systems
2005 (English)In: Proceedings of the Sixteenth International Workshop on Database and Expert Systems Applications, 2005, Los Alamitos, CA, USA: IEEE Computer Society, 2005, p. 776-781Conference paper, Published paper (Refereed)
Abstract [en]

One of the fundamental challenges for peer-to-peer (P2P) systems is the ability to manage risks involved in interacting and collaborating with priorly unknown and potentially malicious parties. Reputation-based trust management can mitigate this risk by deriving the trustworthiness of a certain peer from that peer's behavior history. However, the existing reputation systems do not provide an adequate reaction to quick changes in peers' behavior, raising serious concerns regarding their effectiveness in coping with dynamic malicious peers.

In this paper we investigate the requirements on the dynamics of trust in P2P systems and propose a versatile trust metric which satisfies these requirements. In particular, our proposed metric is able to detect and penalize both the sudden changes in peers' behavior and their potential oscillatory malicious behavior. Moreover, our metric is flexible and allows the implementation of different types of trust dynamics. We evaluate our metric through simulation and show its unique features and advantages over the existing metrics.

Place, publisher, year, edition, pages
Los Alamitos, CA, USA: IEEE Computer Society, 2005
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-30649 (URN)16244 (Local ID)0-7695-2424-9 (ISBN)16244 (Archive number)16244 (OAI)
Conference
Sixteenth International Workshop on Database and Expert Systems Applications, 22-26 August, 2005, Copenhagen, Denmark
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13
Duma, C. (2005). Security and trust mechanisms for groups in distributed services. (Doctoral dissertation). Linköping: Linköping University Electronic Press
Open this publication in new window or tab >>Security and trust mechanisms for groups in distributed services
2005 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Group communication is a fundamental paradigm in modem distributed services, with applications in domains such as content distribution, distributed games, and collaborative workspaces. Despite the increasing interest in group-based services and the latest developments in efficient and reliable multi cast, the secure management of groups remains a major challenge for group communication.

In this thesis we propose security and trust mechanisms for supporting secure management of groups within the contexts of controlled and of self-organizing settings.

Controlled groups occur in services, such as multi cast software delivery, where an authority exists that enforces a group membership policy. In this context we propose a secure group key management approach which assures that only authorized users can access protected group resources. In order to scale to large and dynamic groups, the key management scheme must also be efficient. However, security and efficiency are competing requirements. We address this issue by proposing two flexible group key management schemes which can be configured to best meet the security and efficiency requirements of applications and services. One of the schemes can also be dynamically tuned, at system runtime, to adapt to possible requirement changes.

Self-organizing groups occur in services, such as those enabled by peer-to-peer (P2P) and wireless technologies, which adopt a decentralized architecture. In the context of self-organizing groups, with no authority to dictate and control the group members' interactions, group members might behave maliciously and attempt to subvert other members in the group. We address this problem by proposing a reputation-based trust management approach that enables group members to distinguish between well-behaving and malicious members.

We have evaluated our group key management and trust mechanisms analytically and through simulation. The evaluation of the group key management schemes shows cost advantages for rekeying and key storage. The evaluation of the reputation-based trust management shows that our trust metric is resilient to group members maliciously changing their behavior and flexible in that it supports different types of trust dynamics. As a proof of concept, we have incorporated our trust mechanism into a P2P-based intrusion detection system. The test results show an increase in system resiliency to attacks.

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2005. p. 22
Series
Linköping Studies in Science and Technology. Dissertations, ISSN 0345-7524 ; 979
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-30648 (URN)16243 (Local ID)91-85457-54-X (ISBN)16243 (Archive number)16243 (OAI)
Public defence
2005-11-09, Visionen, hus B, Campus Valla, Linköpings universitet, Linköping, 10:15 (English)
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13Bibliographically approved
Organisations

Search in DiVA

Show all publications