Remzi Seker - Profile on Academia.edu (original) (raw)

Papers by Remzi Seker

Research paper thumbnail of JigDFS for implementing secure container communities

JigDFS for implementing secure container communities

Systems, Man and Cybernetics, …

... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash valu... more ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...

Research paper thumbnail of Impact of duty cycle variation on WSNs

Impact of duty cycle variation on WSNs

… and Security (NTMS …, Jan 1, 2009

Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their applicat... more Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...

Research paper thumbnail of Dynamical System approach to insider threat detection

… (SysCon), Jan 1, 2011

Insider attacks have the potential to inflict severe damage to an organizations reputation, intel... more Insider attacks have the potential to inflict severe damage to an organizations reputation, intellectual property and financial assets. The primary difference between the external intrusions and the insider intrusions is that an insider wields power of knowledge about the information system resources, their environment, policies. We present an approach to detecting abnormal behavior of an insider by applying Dynamical System Theory to the insiders computer usage pattern. This is because abnormal system usage pattern is one of the necessary precursors to actual execution of an attack. A base profile of system usage pattern for an insider is created via applying dynamical system theory measures. A continuous monitoring of the insiders system usage and its comparison with this base profile is performed to identify considerable deviations. A sample system usage in terms of application system calls is collected, analyzed, and graphical results of the analysis are presented. Our results indicate that dynamical system theory has the potential of detecting suspicious insider behavior occurring prior to the actual attack execution.

Research paper thumbnail of JiGdFs: a seCure distriButed FiLe systeM For MediCaL iMaGe arCHiVinG

JiGdFs: a seCure distriButed FiLe systeM For MediCaL iMaGe arCHiVinG

Biomedical Engineering, Jan 1, 2011

The growth in use of medical imaging resulted in great challenges, such as handling, storing, ret... more The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...

Research paper thumbnail of A Secure Distributed File System for Medical Image Archiving

A Secure Distributed File System for Medical Image Archiving

… on Privacy, Security, Risk and Trust, Jan 1, 2010

Abstract The explosion of medical image usage in clinical and research domains brings us a great ... more Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...

Research paper thumbnail of Public Key Infrastructure

Public Key Infrastructure

Network Security, Administration and …, Jan 1, 2011

Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an ale... more Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, “Air Raid, Pearl Harbor. This is Not a Drill!” A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...

Research paper thumbnail of 4.5 Quality of Service in Packet-Switched Networks

4.5 Quality of Service in Packet-Switched Networks

Broadcasting and Optical …, Jan 1, 2006

4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter di... more 4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...

Research paper thumbnail of A Scalable Role-based Group Key Agreement and Role Identification Mechanism

A Scalable Role-based Group Key Agreement and Role Identification Mechanism

ieeexplore.ieee.org

Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human ... more Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...

Research paper thumbnail of Design of a lattice-based access control scheme

Systems, Man and …, Jan 1, 2009

We survey the literature for access control schemes in a user hierarchy. Some schemes have alread... more We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.

Research paper thumbnail of Container communities: Anti-tampering Wireless Sensor Network for global cargo security

Proceedings of the …, Jan 1, 2009

U.S. Immigration and Customs Enforcement is overwhelmed with the number of containers entering U.... more U.S. Immigration and Customs Enforcement is overwhelmed with the number of containers entering U.S.A. on a regular basis. Although containers are pre-screened and inspected at the time of shipment, it does not necessarily address all security risks. Containers stay en-route for long enough time that their contents can be tempered with or altered according to the procedures/needs of a terrorist attack. Moreover, considering the huge amount of shipments entering U.S. board daily, it is not practical to inspect every container again upon arriving U.S. ports. There is a urgent need to develop a protection system, such that the integrity of the containers can be persevered or at least the intrusion can be detected and properly handled. This paper proposes a design of a comprehensive solution that would monitor containers' integrity from the originating port to the destination port and report any intrusion event if it has taken place so the intruded container can be handled in an appropriate way. More important, the system itself needs to be secure and intrusion resistant. In the proposed system, intrusion detection sensors are deployed on each container, and form a Wireless Sensor Network (WSN) to report intrusion incidents. A secure and reliable communication protocol has been developed to ensure not only the integrity but also the authenticity of the communication conducted among among sensor nodes. With in the proposed system, not only the intrusions can be identified and properly handled, but also the system itself is attack resistant by utilizing Wireless Sensor Networks in a smart fashion.

Research paper thumbnail of Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact

Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact

Software Engineering Research and …, Jan 1, 2006

Abstract – The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...

Research paper thumbnail of Off-the-Record Instant Messaging for Group Conversation

… Reuse and Integration, Jan 1, 2007

Instant Messaging (IM) is becoming an integral part of social as well as business life. The main ... more Instant Messaging (IM) is becoming an integral part of social as well as business life. The main concern with IM systems is that the information being transmitted is easily accessible. Although some protection could be achieved with the use of a secure tunneling (i.e. VPN etc.), they do not provide end-to-end secrecy. Off-the-record (OTR) is a protocol which enables IM users to have private conversations over the open and insecure public Internet. However, the OTR protocol currently does not support multi-user chat rooms. There is a need for such a product that provides users an opportunity to meet in an IM-based, virtual, and encrypted chat room. This project implements an extension of the two-party OTR protocol, named Group OTR-GOTR. GOTR enables users to have a free and secure multi-user communication environment with no proprietary software requirement. The case study describes a proof of concept plug-in of GOTR developed for the GAIM, as well as the plug-in implementation details. Such a product is believed to be beneficial to small businesses to keep their privacy and their competitiveness.

Research paper thumbnail of A component integration meta-framework using smart adapters

A component integration meta-framework using smart adapters

Proceedings of the 2004 …, Jan 1, 2004

Abstract Efforts to integrate independently developed software components, to a large extent, hav... more Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: “wiring”-level connectivity and semantic-level compatibility. ...

Research paper thumbnail of A role-based secure group communication framework

A role-based secure group communication framework

System of Systems …

Abstract—Building a secure group communication system is an active research topic. Several studie... more Abstract—Building a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...

Research paper thumbnail of Infrastructures for information technology systems

Infrastructures for information technology systems

Systems, Man and Cybernetics, …, Jan 1, 2005

Abstract – The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...

Research paper thumbnail of A risk assessment model of embedded software systems

A risk assessment model of embedded software systems

… Workshop, 2005. 29th Annual IEEE/NASA, Jan 1, 2005

Embedded systems are special purpose computer systems whose functions are implemented, controlled... more Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...

Research paper thumbnail of Phishing in the system of systems settings: Mobile technology

Systems, Man and …, Jan 1, 2005

The immense growth in mobile technology has opened various opportunities, both in marketing and i... more The immense growth in mobile technology has opened various opportunities, both in marketing and in M-Commerce applications. The growth in these applications is according to the system of systems concept through which technologies such as cell phone networks are becoming integrated with other systems such as the Internet. Unfortunately, this may also lead to a new security risk, the use of mobile technology, more specifically the distribution of Short Message Service (SMS) messages, to conduct phishing attacks. We demonstrate four types of phishing activities that can take place via mobile technology and provide a specific example on one of the introduced types.

Research paper thumbnail of Ontology for disaster mitigation and planning

Ontology for disaster mitigation and planning

Proceedings of the …, Jan 1, 2007

6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation ... more 6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...

Research paper thumbnail of Component-based software modeling based on shannon's information channels

Component-based software modeling based on shannon's information channels

R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For ... more R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004

Research paper thumbnail of Validity test for a set of nonlinear measures for short data length with reference to short-term heart rate variability signal

Journal of systems …, Jan 1, 2000

In this paper we investigate the requirements for the size of data set to be analyzed by a set of... more In this paper we investigate the requirements for the size of data set to be analyzed by a set of nonlinear measures. Time series from some standard nonlinear systems possessing chaotic behavior, as well as sinusoidal and random signals are considered. For Hénon, Kaplan-Yorke and logistic maps we found the measures of correlation dimension (CD), approximate entropy (AE), Lyapunov exponents (LE), and deterministic ratio (DR) to be reliable for data length as short as 500 samples. On short-term heart rate variability (HRV) signal, AE and DR measures were able to distinguish between various experimentally modified states of autonomic nervous system (ANS) controlling the heart rate (HR). Thus, titling and parasympathetic blockade make the system more deterministic and reduce its entropy whilst sympathetic blockade makes it less deterministic.

Research paper thumbnail of JigDFS for implementing secure container communities

JigDFS for implementing secure container communities

Systems, Man and Cybernetics, …

... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash valu... more ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...

Research paper thumbnail of Impact of duty cycle variation on WSNs

Impact of duty cycle variation on WSNs

… and Security (NTMS …, Jan 1, 2009

Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their applicat... more Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...

Research paper thumbnail of Dynamical System approach to insider threat detection

… (SysCon), Jan 1, 2011

Insider attacks have the potential to inflict severe damage to an organizations reputation, intel... more Insider attacks have the potential to inflict severe damage to an organizations reputation, intellectual property and financial assets. The primary difference between the external intrusions and the insider intrusions is that an insider wields power of knowledge about the information system resources, their environment, policies. We present an approach to detecting abnormal behavior of an insider by applying Dynamical System Theory to the insiders computer usage pattern. This is because abnormal system usage pattern is one of the necessary precursors to actual execution of an attack. A base profile of system usage pattern for an insider is created via applying dynamical system theory measures. A continuous monitoring of the insiders system usage and its comparison with this base profile is performed to identify considerable deviations. A sample system usage in terms of application system calls is collected, analyzed, and graphical results of the analysis are presented. Our results indicate that dynamical system theory has the potential of detecting suspicious insider behavior occurring prior to the actual attack execution.

Research paper thumbnail of JiGdFs: a seCure distriButed FiLe systeM For MediCaL iMaGe arCHiVinG

JiGdFs: a seCure distriButed FiLe systeM For MediCaL iMaGe arCHiVinG

Biomedical Engineering, Jan 1, 2011

The growth in use of medical imaging resulted in great challenges, such as handling, storing, ret... more The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...

Research paper thumbnail of A Secure Distributed File System for Medical Image Archiving

A Secure Distributed File System for Medical Image Archiving

… on Privacy, Security, Risk and Trust, Jan 1, 2010

Abstract The explosion of medical image usage in clinical and research domains brings us a great ... more Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...

Research paper thumbnail of Public Key Infrastructure

Public Key Infrastructure

Network Security, Administration and …, Jan 1, 2011

Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an ale... more Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, “Air Raid, Pearl Harbor. This is Not a Drill!” A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...

Research paper thumbnail of 4.5 Quality of Service in Packet-Switched Networks

4.5 Quality of Service in Packet-Switched Networks

Broadcasting and Optical …, Jan 1, 2006

4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter di... more 4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...

Research paper thumbnail of A Scalable Role-based Group Key Agreement and Role Identification Mechanism

A Scalable Role-based Group Key Agreement and Role Identification Mechanism

ieeexplore.ieee.org

Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human ... more Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...

Research paper thumbnail of Design of a lattice-based access control scheme

Systems, Man and …, Jan 1, 2009

We survey the literature for access control schemes in a user hierarchy. Some schemes have alread... more We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.

Research paper thumbnail of Container communities: Anti-tampering Wireless Sensor Network for global cargo security

Proceedings of the …, Jan 1, 2009

U.S. Immigration and Customs Enforcement is overwhelmed with the number of containers entering U.... more U.S. Immigration and Customs Enforcement is overwhelmed with the number of containers entering U.S.A. on a regular basis. Although containers are pre-screened and inspected at the time of shipment, it does not necessarily address all security risks. Containers stay en-route for long enough time that their contents can be tempered with or altered according to the procedures/needs of a terrorist attack. Moreover, considering the huge amount of shipments entering U.S. board daily, it is not practical to inspect every container again upon arriving U.S. ports. There is a urgent need to develop a protection system, such that the integrity of the containers can be persevered or at least the intrusion can be detected and properly handled. This paper proposes a design of a comprehensive solution that would monitor containers' integrity from the originating port to the destination port and report any intrusion event if it has taken place so the intruded container can be handled in an appropriate way. More important, the system itself needs to be secure and intrusion resistant. In the proposed system, intrusion detection sensors are deployed on each container, and form a Wireless Sensor Network (WSN) to report intrusion incidents. A secure and reliable communication protocol has been developed to ensure not only the integrity but also the authenticity of the communication conducted among among sensor nodes. With in the proposed system, not only the intrusions can be identified and properly handled, but also the system itself is attack resistant by utilizing Wireless Sensor Networks in a smart fashion.

Research paper thumbnail of Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact

Infrastructures for Information Technology Systems: Perspectives on Their Evolution and Impact

Software Engineering Research and …, Jan 1, 2006

Abstract – The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...

Research paper thumbnail of Off-the-Record Instant Messaging for Group Conversation

… Reuse and Integration, Jan 1, 2007

Instant Messaging (IM) is becoming an integral part of social as well as business life. The main ... more Instant Messaging (IM) is becoming an integral part of social as well as business life. The main concern with IM systems is that the information being transmitted is easily accessible. Although some protection could be achieved with the use of a secure tunneling (i.e. VPN etc.), they do not provide end-to-end secrecy. Off-the-record (OTR) is a protocol which enables IM users to have private conversations over the open and insecure public Internet. However, the OTR protocol currently does not support multi-user chat rooms. There is a need for such a product that provides users an opportunity to meet in an IM-based, virtual, and encrypted chat room. This project implements an extension of the two-party OTR protocol, named Group OTR-GOTR. GOTR enables users to have a free and secure multi-user communication environment with no proprietary software requirement. The case study describes a proof of concept plug-in of GOTR developed for the GAIM, as well as the plug-in implementation details. Such a product is believed to be beneficial to small businesses to keep their privacy and their competitiveness.

Research paper thumbnail of A component integration meta-framework using smart adapters

A component integration meta-framework using smart adapters

Proceedings of the 2004 …, Jan 1, 2004

Abstract Efforts to integrate independently developed software components, to a large extent, hav... more Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: “wiring”-level connectivity and semantic-level compatibility. ...

Research paper thumbnail of A role-based secure group communication framework

A role-based secure group communication framework

System of Systems …

Abstract—Building a secure group communication system is an active research topic. Several studie... more Abstract—Building a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...

Research paper thumbnail of Infrastructures for information technology systems

Infrastructures for information technology systems

Systems, Man and Cybernetics, …, Jan 1, 2005

Abstract – The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...

Research paper thumbnail of A risk assessment model of embedded software systems

A risk assessment model of embedded software systems

… Workshop, 2005. 29th Annual IEEE/NASA, Jan 1, 2005

Embedded systems are special purpose computer systems whose functions are implemented, controlled... more Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...

Research paper thumbnail of Phishing in the system of systems settings: Mobile technology

Systems, Man and …, Jan 1, 2005

The immense growth in mobile technology has opened various opportunities, both in marketing and i... more The immense growth in mobile technology has opened various opportunities, both in marketing and in M-Commerce applications. The growth in these applications is according to the system of systems concept through which technologies such as cell phone networks are becoming integrated with other systems such as the Internet. Unfortunately, this may also lead to a new security risk, the use of mobile technology, more specifically the distribution of Short Message Service (SMS) messages, to conduct phishing attacks. We demonstrate four types of phishing activities that can take place via mobile technology and provide a specific example on one of the introduced types.

Research paper thumbnail of Ontology for disaster mitigation and planning

Ontology for disaster mitigation and planning

Proceedings of the …, Jan 1, 2007

6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation ... more 6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...

Research paper thumbnail of Component-based software modeling based on shannon's information channels

Component-based software modeling based on shannon's information channels

R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For ... more R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004

Research paper thumbnail of Validity test for a set of nonlinear measures for short data length with reference to short-term heart rate variability signal

Journal of systems …, Jan 1, 2000

In this paper we investigate the requirements for the size of data set to be analyzed by a set of... more In this paper we investigate the requirements for the size of data set to be analyzed by a set of nonlinear measures. Time series from some standard nonlinear systems possessing chaotic behavior, as well as sinusoidal and random signals are considered. For Hénon, Kaplan-Yorke and logistic maps we found the measures of correlation dimension (CD), approximate entropy (AE), Lyapunov exponents (LE), and deterministic ratio (DR) to be reliable for data length as short as 500 samples. On short-term heart rate variability (HRV) signal, AE and DR measures were able to distinguish between various experimentally modified states of autonomic nervous system (ANS) controlling the heart rate (HR). Thus, titling and parasympathetic blockade make the system more deterministic and reduce its entropy whilst sympathetic blockade makes it less deterministic.