Using Subliminal Channel Mechanism to Defend Against the Insider Attacks

碩士 === 朝陽科技大學 === 資訊工程系碩士班 === 101 === Due to the rapid development of the Internet, many applications of Internet are widely used. It brings convenient, but derives many problems. We often hear news about insider trading in different enterprises, the cheating case of engineer commercial spying, etc...

Full description

Bibliographic Details
Main Authors: Chien-Hung Chen, 陳建宏
Other Authors: Chin-Ling Chen
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/52904837083392712115
id ndltd-TW-101CYUT5392014
record_format oai_dc
spelling ndltd-TW-101CYUT53920142017-08-19T04:15:53Z http://ndltd.ncl.edu.tw/handle/52904837083392712115 Using Subliminal Channel Mechanism to Defend Against the Insider Attacks 使用潛隱通道的機制抵擋內部攻擊 Chien-Hung Chen 陳建宏 碩士 朝陽科技大學 資訊工程系碩士班 101 Due to the rapid development of the Internet, many applications of Internet are widely used. It brings convenient, but derives many problems. We often hear news about insider trading in different enterprises, the cheating case of engineer commercial spying, etc. The security of Internet becomes an important issue in the transaction. In this thesis, we proposed two schemes to apply in different environment. In the first scheme, we defend against the illegal insider trading of enterprises to construct an investigator unearths illegal behavior via a subliminal channel. The scheme can let investigator safety to send the evidence to the organization. And we set an official agent to make both have fair arbitration. The second scheme focuses on e-bidding case. We proposed an electronic public engineering project bidding protocol via a subliminal channel. In the bidding phase, we use the blind signature based on ElGamal mechanism to protect bidder’s identity, also can prevent the insiders of Public Construction Commission to disclose bid information. And we use the arbitration mechanism to construct a secure and fair scheme to protect the rights benefit. Chin-Ling Chen 陳金鈴 2013 學位論文 ; thesis 55 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 朝陽科技大學 === 資訊工程系碩士班 === 101 === Due to the rapid development of the Internet, many applications of Internet are widely used. It brings convenient, but derives many problems. We often hear news about insider trading in different enterprises, the cheating case of engineer commercial spying, etc. The security of Internet becomes an important issue in the transaction. In this thesis, we proposed two schemes to apply in different environment. In the first scheme, we defend against the illegal insider trading of enterprises to construct an investigator unearths illegal behavior via a subliminal channel. The scheme can let investigator safety to send the evidence to the organization. And we set an official agent to make both have fair arbitration. The second scheme focuses on e-bidding case. We proposed an electronic public engineering project bidding protocol via a subliminal channel. In the bidding phase, we use the blind signature based on ElGamal mechanism to protect bidder’s identity, also can prevent the insiders of Public Construction Commission to disclose bid information. And we use the arbitration mechanism to construct a secure and fair scheme to protect the rights benefit.
author2 Chin-Ling Chen
author_facet Chin-Ling Chen
Chien-Hung Chen
陳建宏
author Chien-Hung Chen
陳建宏
spellingShingle Chien-Hung Chen
陳建宏
Using Subliminal Channel Mechanism to Defend Against the Insider Attacks
author_sort Chien-Hung Chen
title Using Subliminal Channel Mechanism to Defend Against the Insider Attacks
title_short Using Subliminal Channel Mechanism to Defend Against the Insider Attacks
title_full Using Subliminal Channel Mechanism to Defend Against the Insider Attacks
title_fullStr Using Subliminal Channel Mechanism to Defend Against the Insider Attacks
title_full_unstemmed Using Subliminal Channel Mechanism to Defend Against the Insider Attacks
title_sort using subliminal channel mechanism to defend against the insider attacks
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/52904837083392712115
work_keys_str_mv AT chienhungchen usingsubliminalchannelmechanismtodefendagainsttheinsiderattacks
AT chénjiànhóng usingsubliminalchannelmechanismtodefendagainsttheinsiderattacks
AT chienhungchen shǐyòngqiányǐntōngdàodejīzhìdǐdǎngnèibùgōngjī
AT chénjiànhóng shǐyòngqiányǐntōngdàodejīzhìdǐdǎngnèibùgōngjī
_version_ 1718516719061827584