Camtepe, Seyit A.
Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savi...
Camtepe, Seyit A. Yener, Bulent
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to di...
Salim, Farzad
Current regulatory requirements on data privacy make it increasingly important for enterprises to be able to verify and audit their compliance with their privacy policies. Traditionally, a privacy policy is written in a natural language. Such policies inherit the potential ambiguity, inconsistency and mis-interpretation of natural text. Hence, form...
Camtepe, Seyit A.
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. I...
Kolahi, Samad Narayan, Shaneel Nguyen, Du D.T. Sunarto, Y. Mani, Paul
This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both TCP and UDP protocols. The parameters considered are throughput and response time. The results indicate that security mechanism d...
Narayan, Shaneel Kolahi, Samad Brooking, Kris de Vere, Simon
Virtual Private Network (VPN) is a technology that provides secure communication for data as it transits through insecure regions of information technology infrastructure. With prolific development of the Internet, businesses nowadays implement VPN tunnels using different protocols that guarantee data authenticity and security between multiple site...
Schmidt, Aubrey-Derrick Camtepe, Seyit A. Albayrak, Sahin
Static anaylsis represents an approach of checking source code or compiled code of applications before it gets executed. Chess and McGraw state that static anaylsis promises to identify common coding problems automatically. While manual code checking is also a form of static analysis, software tools are used in most cases in order to perform the ch...
Bye, Rainer Camtepe, Seyit A. Albayrak, Sahin
We propose CIMD (Collaborative Intrusion and Malware Detection), a scheme for the realization of collaborative intrusion detection approaches. We argue that teams, respectively detection groups with a common purpose for intrusion detection and response, improve the measures against malware. CIMD provides a collaboration model, a decentralized group...
Messerman, Arik Mustafic, Tarik Camtepe, Seyit A. Albayrak, Sahin
There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and...
Pham, Quan Reid, Jason F. Dawson, Edward
The paper addresses the issue of providing access control via delegation and constraint management across multiple security domains. Specifically, this paper proposes a novel Delegation Constraint Management model to manage and enforce delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is i...