He-Ming Ruan
National Taiwan University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by He-Ming Ruan.
intelligent networking and collaborative systems | 2011
Chien-Ting Kuo; He-Ming Ruan; Chin-Laung Lei; Shih-Jen Chen
Information security audit has become more and more important to organizations. Human is usually the most vulnerable part about information security in an organization. In this paper, we propose a dynamic risk assessment mechanism to help the information security manager realizing the human security awareness and vulnerability assessment in end client devices. The proposed mechanism will generate graphic reports to help security manager to improve the information security of organizations. A practical implementation demonstrates that the proposed mechanism is both useful and effective.
information security | 2012
Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; Chin-Laung Lei
Information security audit has become more and more important nowadays. Among the audited items, the status of security patch could be the most important part. In this paper, we proposed a security patch lifecycle to assess the information security risk with the help of vulnerability databases. A case study using the Google Trend is also given to demonstrate that the proposed security patch lifecycle is both useful and practical.
information security | 2015
He-Ming Ruan; Ming-Hwa Tsai; Yennun Huang; Yen-Hua Liao; Chin-Laung Lei
In data analysis, it is always a tough task to strike the balance between the privacy and the applicability of the data. Due to the demand for individual privacy, the data are being more or less obscured before being released or outsourced to avoid possible privacy leakage. This process is so called de-identification. To discuss a de-identification policy, the most important two aspects should be the re-identification risk and the information loss. In this paper, we introduce a novel policy searching method to efficiently find out proper de-identification policies according to acceptable re-identification risk while retaining the information resided in the data. With the UCI Machine Learning Repository as our real world dataset, the re-identification risk can therefore be able to reflect the true risk of the de-identified data under the de-identification policies. Moreover, using the proposed algorithm, one can then efficiently acquire policies with higher information entropy.
information security | 2014
He-Ming Ruan; Chin-Laung Lei
Cloud storage services have become necessities in our daily life. Although the cloud storage services provide online storage to hold data for the data owner with high accessibility, trust is always an obstacle between the user and the service provider. In this paper, we aim at the audit privilege management issue of integrity audit for cloud storage and search for a proper solution to provide controllable audit privilege dispatch.
Journal of Internet Technology | 2014
Yu-Shian Chen; He-Ming Ruan; Chin-Laung Lei
A cloud storage service is never sufficient if it only guarantees one of data confidentiality and integrity. Remote storage without encryption could expose private information to outsiders; while storage without integrity could be appended with garbled and useless cipher. This paper presents the Stratus, an integrated encrypted storage atop of heterogeneous cloud storage. Standing on users perspective, we focus on guaranteeing convenient access and integrity verification to the clouds. Also, Stratus preserves implicitly the folder hierarchy of the original storage and allows painless data migration and sharing without backward decryption. By the technique of dummy list, Stratus is able to perform lazy deletion, reducing access overhead. In particular, we use a novel authentication method, the Binomial Merkle Forests (BMF), to offer a lightweight and public verifiable proof of integrity checking. Other salient features of Stratus include assured deletion and space query in O(log N).
Archive | 2013
Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; Chin-Laung Lei
As the security consciousness rising, information security audit has become an important issue nowadays. This circumstance makes the security audit baseline database a crucial research domain. In this paper, we proposed a security baseline database to assist information security auditors to maintain the security update patch baseline automatically with the help of the Microsoft knowledge base and automatic audit process. A practical implementation demonstrates that the proposed structure is both useful and effective.
information security | 2012
He-Ming Ruan; Yu-Shian Chen; Chin-Laung Lei
Nowadays, the cloud computing have engulfed not only the IT industry but also the general publics all around the world. Our daily life is now full of various cloud services such as Gmail or Google Document. Although the cloud services can provide on-line platforms for co-working between a group of collaborators, trust is always a hesitation for a user to adopt cloud services. In this paper, we aim at the integrity issue for on-line co-working and seek for a proper solution. We develop a framework to enable the remote data integrity verification for on-line co-working scenarios. In addition to provide a framework, we also show the feasibility of our framework by providing a concrete example.
Archive | 2011
He-Ming Ruan; Chin-Laung Lei; Yung-Chih Liu
international conference on emerging security information systems and technologies | 2014
Po-Wen Chi; Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; Chin-Laung Lei
international conference on supercomputing | 2014
He-Ming Ruan; Gan Wei Yeap; Chin-Laung Lei