Remzi Seker - Profile on Academia.edu (original) (raw)
Papers by Remzi Seker
JigDFS for implementing secure container communities
Systems, Man and Cybernetics, …
... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash valu... more ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...
Impact of duty cycle variation on WSNs
… and Security (NTMS …, Jan 1, 2009
Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their applicat... more Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...
… (SysCon), Jan 1, 2011
Insider attacks have the potential to inflict severe damage to an organizations reputation, intel... more Insider attacks have the potential to inflict severe damage to an organizations reputation, intellectual property and financial assets. The primary difference between the external intrusions and the insider intrusions is that an insider wields power of knowledge about the information system resources, their environment, policies. We present an approach to detecting abnormal behavior of an insider by applying Dynamical System Theory to the insiders computer usage pattern. This is because abnormal system usage pattern is one of the necessary precursors to actual execution of an attack. A base profile of system usage pattern for an insider is created via applying dynamical system theory measures. A continuous monitoring of the insiders system usage and its comparison with this base profile is performed to identify considerable deviations. A sample system usage in terms of application system calls is collected, analyzed, and graphical results of the analysis are presented. Our results indicate that dynamical system theory has the potential of detecting suspicious insider behavior occurring prior to the actual attack execution.
JiGdFs: a seCure distriButed FiLe systeM For MediCaL iMaGe arCHiVinG
Biomedical Engineering, Jan 1, 2011
The growth in use of medical imaging resulted in great challenges, such as handling, storing, ret... more The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...
A Secure Distributed File System for Medical Image Archiving
… on Privacy, Security, Risk and Trust, Jan 1, 2010
Abstract The explosion of medical image usage in clinical and research domains brings us a great ... more Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...
Public Key Infrastructure
Network Security, Administration and …, Jan 1, 2011
Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an ale... more Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, Air Raid, Pearl Harbor. This is Not a Drill! A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...
4.5 Quality of Service in Packet-Switched Networks
Broadcasting and Optical …, Jan 1, 2006
4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter di... more 4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...
A Scalable Role-based Group Key Agreement and Role Identification Mechanism
ieeexplore.ieee.org
AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human ... more AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...
Systems, Man and …, Jan 1, 2009
We survey the literature for access control schemes in a user hierarchy. Some schemes have alread... more We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.
Proceedings of the …, Jan 1, 2009
U.S. Immigration and Customs Enforcement is overwhelmed with the number of containers entering U.... more U.S. Immigration and Customs Enforcement is overwhelmed with the number of containers entering U.S.A. on a regular basis. Although containers are pre-screened and inspected at the time of shipment, it does not necessarily address all security risks. Containers stay en-route for long enough time that their contents can be tempered with or altered according to the procedures/needs of a terrorist attack. Moreover, considering the huge amount of shipments entering U.S. board daily, it is not practical to inspect every container again upon arriving U.S. ports. There is a urgent need to develop a protection system, such that the integrity of the containers can be persevered or at least the intrusion can be detected and properly handled. This paper proposes a design of a comprehensive solution that would monitor containers' integrity from the originating port to the destination port and report any intrusion event if it has taken place so the intruded container can be handled in an appropriate way. More important, the system itself needs to be secure and intrusion resistant. In the proposed system, intrusion detection sensors are deployed on each container, and form a Wireless Sensor Network (WSN) to report intrusion incidents. A secure and reliable communication protocol has been developed to ensure not only the integrity but also the authenticity of the communication conducted among among sensor nodes. With in the proposed system, not only the intrusions can be identified and properly handled, but also the system itself is attack resistant by utilizing Wireless Sensor Networks in a smart fashion.
Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact
Software Engineering Research and …, Jan 1, 2006
Abstract The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
… Reuse and Integration, Jan 1, 2007
Instant Messaging (IM) is becoming an integral part of social as well as business life. The main ... more Instant Messaging (IM) is becoming an integral part of social as well as business life. The main concern with IM systems is that the information being transmitted is easily accessible. Although some protection could be achieved with the use of a secure tunneling (i.e. VPN etc.), they do not provide end-to-end secrecy. Off-the-record (OTR) is a protocol which enables IM users to have private conversations over the open and insecure public Internet. However, the OTR protocol currently does not support multi-user chat rooms. There is a need for such a product that provides users an opportunity to meet in an IM-based, virtual, and encrypted chat room. This project implements an extension of the two-party OTR protocol, named Group OTR-GOTR. GOTR enables users to have a free and secure multi-user communication environment with no proprietary software requirement. The case study describes a proof of concept plug-in of GOTR developed for the GAIM, as well as the plug-in implementation details. Such a product is believed to be beneficial to small businesses to keep their privacy and their competitiveness.
A component integration meta-framework using smart adapters
Proceedings of the 2004 …, Jan 1, 2004
Abstract Efforts to integrate independently developed software components, to a large extent, hav... more Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: wiring-level connectivity and semantic-level compatibility. ...
A role-based secure group communication framework
System of Systems …
AbstractBuilding a secure group communication system is an active research topic. Several studie... more AbstractBuilding a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...
Infrastructures for information technology systems
Systems, Man and Cybernetics, …, Jan 1, 2005
Abstract The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
A risk assessment model of embedded software systems
… Workshop, 2005. 29th Annual IEEE/NASA, Jan 1, 2005
Embedded systems are special purpose computer systems whose functions are implemented, controlled... more Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...
Systems, Man and …, Jan 1, 2005
The immense growth in mobile technology has opened various opportunities, both in marketing and i... more The immense growth in mobile technology has opened various opportunities, both in marketing and in M-Commerce applications. The growth in these applications is according to the system of systems concept through which technologies such as cell phone networks are becoming integrated with other systems such as the Internet. Unfortunately, this may also lead to a new security risk, the use of mobile technology, more specifically the distribution of Short Message Service (SMS) messages, to conduct phishing attacks. We demonstrate four types of phishing activities that can take place via mobile technology and provide a specific example on one of the introduced types.
Ontology for disaster mitigation and planning
Proceedings of the …, Jan 1, 2007
6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation ... more 6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...
Component-based software modeling based on shannon's information channels
R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For ... more R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004
Journal of systems …, Jan 1, 2000
In this paper we investigate the requirements for the size of data set to be analyzed by a set of... more In this paper we investigate the requirements for the size of data set to be analyzed by a set of nonlinear measures. Time series from some standard nonlinear systems possessing chaotic behavior, as well as sinusoidal and random signals are considered. For Hénon, Kaplan-Yorke and logistic maps we found the measures of correlation dimension (CD), approximate entropy (AE), Lyapunov exponents (LE), and deterministic ratio (DR) to be reliable for data length as short as 500 samples. On short-term heart rate variability (HRV) signal, AE and DR measures were able to distinguish between various experimentally modified states of autonomic nervous system (ANS) controlling the heart rate (HR). Thus, titling and parasympathetic blockade make the system more deterministic and reduce its entropy whilst sympathetic blockade makes it less deterministic.
JigDFS for implementing secure container communities
Systems, Man and Cybernetics, …
... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash valu... more ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...
Impact of duty cycle variation on WSNs
… and Security (NTMS …, Jan 1, 2009
Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their applicat... more Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...
… (SysCon), Jan 1, 2011
Insider attacks have the potential to inflict severe damage to an organizations reputation, intel... more Insider attacks have the potential to inflict severe damage to an organizations reputation, intellectual property and financial assets. The primary difference between the external intrusions and the insider intrusions is that an insider wields power of knowledge about the information system resources, their environment, policies. We present an approach to detecting abnormal behavior of an insider by applying Dynamical System Theory to the insiders computer usage pattern. This is because abnormal system usage pattern is one of the necessary precursors to actual execution of an attack. A base profile of system usage pattern for an insider is created via applying dynamical system theory measures. A continuous monitoring of the insiders system usage and its comparison with this base profile is performed to identify considerable deviations. A sample system usage in terms of application system calls is collected, analyzed, and graphical results of the analysis are presented. Our results indicate that dynamical system theory has the potential of detecting suspicious insider behavior occurring prior to the actual attack execution.
JiGdFs: a seCure distriButed FiLe systeM For MediCaL iMaGe arCHiVinG
Biomedical Engineering, Jan 1, 2011
The growth in use of medical imaging resulted in great challenges, such as handling, storing, ret... more The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...
A Secure Distributed File System for Medical Image Archiving
… on Privacy, Security, Risk and Trust, Jan 1, 2010
Abstract The explosion of medical image usage in clinical and research domains brings us a great ... more Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...
Public Key Infrastructure
Network Security, Administration and …, Jan 1, 2011
Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an ale... more Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, Air Raid, Pearl Harbor. This is Not a Drill! A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...
4.5 Quality of Service in Packet-Switched Networks
Broadcasting and Optical …, Jan 1, 2006
4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter di... more 4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...
A Scalable Role-based Group Key Agreement and Role Identification Mechanism
ieeexplore.ieee.org
AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human ... more AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...
Systems, Man and …, Jan 1, 2009
We survey the literature for access control schemes in a user hierarchy. Some schemes have alread... more We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.
Proceedings of the …, Jan 1, 2009
U.S. Immigration and Customs Enforcement is overwhelmed with the number of containers entering U.... more U.S. Immigration and Customs Enforcement is overwhelmed with the number of containers entering U.S.A. on a regular basis. Although containers are pre-screened and inspected at the time of shipment, it does not necessarily address all security risks. Containers stay en-route for long enough time that their contents can be tempered with or altered according to the procedures/needs of a terrorist attack. Moreover, considering the huge amount of shipments entering U.S. board daily, it is not practical to inspect every container again upon arriving U.S. ports. There is a urgent need to develop a protection system, such that the integrity of the containers can be persevered or at least the intrusion can be detected and properly handled. This paper proposes a design of a comprehensive solution that would monitor containers' integrity from the originating port to the destination port and report any intrusion event if it has taken place so the intruded container can be handled in an appropriate way. More important, the system itself needs to be secure and intrusion resistant. In the proposed system, intrusion detection sensors are deployed on each container, and form a Wireless Sensor Network (WSN) to report intrusion incidents. A secure and reliable communication protocol has been developed to ensure not only the integrity but also the authenticity of the communication conducted among among sensor nodes. With in the proposed system, not only the intrusions can be identified and properly handled, but also the system itself is attack resistant by utilizing Wireless Sensor Networks in a smart fashion.
Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact
Software Engineering Research and …, Jan 1, 2006
Abstract The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
… Reuse and Integration, Jan 1, 2007
Instant Messaging (IM) is becoming an integral part of social as well as business life. The main ... more Instant Messaging (IM) is becoming an integral part of social as well as business life. The main concern with IM systems is that the information being transmitted is easily accessible. Although some protection could be achieved with the use of a secure tunneling (i.e. VPN etc.), they do not provide end-to-end secrecy. Off-the-record (OTR) is a protocol which enables IM users to have private conversations over the open and insecure public Internet. However, the OTR protocol currently does not support multi-user chat rooms. There is a need for such a product that provides users an opportunity to meet in an IM-based, virtual, and encrypted chat room. This project implements an extension of the two-party OTR protocol, named Group OTR-GOTR. GOTR enables users to have a free and secure multi-user communication environment with no proprietary software requirement. The case study describes a proof of concept plug-in of GOTR developed for the GAIM, as well as the plug-in implementation details. Such a product is believed to be beneficial to small businesses to keep their privacy and their competitiveness.
A component integration meta-framework using smart adapters
Proceedings of the 2004 …, Jan 1, 2004
Abstract Efforts to integrate independently developed software components, to a large extent, hav... more Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: wiring-level connectivity and semantic-level compatibility. ...
A role-based secure group communication framework
System of Systems …
AbstractBuilding a secure group communication system is an active research topic. Several studie... more AbstractBuilding a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...
Infrastructures for information technology systems
Systems, Man and Cybernetics, …, Jan 1, 2005
Abstract The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
A risk assessment model of embedded software systems
… Workshop, 2005. 29th Annual IEEE/NASA, Jan 1, 2005
Embedded systems are special purpose computer systems whose functions are implemented, controlled... more Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...
Systems, Man and …, Jan 1, 2005
The immense growth in mobile technology has opened various opportunities, both in marketing and i... more The immense growth in mobile technology has opened various opportunities, both in marketing and in M-Commerce applications. The growth in these applications is according to the system of systems concept through which technologies such as cell phone networks are becoming integrated with other systems such as the Internet. Unfortunately, this may also lead to a new security risk, the use of mobile technology, more specifically the distribution of Short Message Service (SMS) messages, to conduct phishing attacks. We demonstrate four types of phishing activities that can take place via mobile technology and provide a specific example on one of the introduced types.
Ontology for disaster mitigation and planning
Proceedings of the …, Jan 1, 2007
6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation ... more 6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...
Component-based software modeling based on shannon's information channels
R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For ... more R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004
Journal of systems …, Jan 1, 2000
In this paper we investigate the requirements for the size of data set to be analyzed by a set of... more In this paper we investigate the requirements for the size of data set to be analyzed by a set of nonlinear measures. Time series from some standard nonlinear systems possessing chaotic behavior, as well as sinusoidal and random signals are considered. For Hénon, Kaplan-Yorke and logistic maps we found the measures of correlation dimension (CD), approximate entropy (AE), Lyapunov exponents (LE), and deterministic ratio (DR) to be reliable for data length as short as 500 samples. On short-term heart rate variability (HRV) signal, AE and DR measures were able to distinguish between various experimentally modified states of autonomic nervous system (ANS) controlling the heart rate (HR). Thus, titling and parasympathetic blockade make the system more deterministic and reduce its entropy whilst sympathetic blockade makes it less deterministic.