59,999 Hits in 3.2 sec

Context-sensitive authorization in interaction patterns

Vincent Hourdin, Jean-Yves Tigli, Stéphane Lavirotte, Gaëtan Rey, Michel Riveill
2009 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems - Mobility '09  
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context.  ...  On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations.  ...  Observers are trusted entities from the publisher's point of view thanks to dynamic insertion of authentication components with aspects of assemblies.  ... 
doi:10.1145/1710035.1710055 dblp:conf/mobility/HourdinTLRR09 fatcat:pgcy3s3xrvcwtd6zsbyivm62hq

DSK-Based Authentication Technique for Secure Smart Grid Wireless Communication [chapter]

Mohan S. Khedkar, Vijay Shelake
2016 Advances in Computing Applications  
In this paper the concept of dynamic secret is applied to design dynamic secret based authentication and encryption scheme for smart grid wireless communication.  ...  Any missing or misjudging in retransmission sequence would prevent the adversary from achieving the keys.  ...  control networked devices based on these signals and the customer's preferences  ... 
doi:10.1007/978-981-10-2630-0_10 fatcat:zxhk3fzco5efli6k2kn65lhll4

Design of Speaker Verification using Dynamic Time Warping (DTW) on Graphical Programming for Authentication Process

Barlian Henryranu Prasetio, Dahnial Syauqy
2017 Journal of Information Technology and Computer Science  
We implement Dynamic Time Warping algorithm to compare human voice with reference voice as the authentication process.  ...  However, this type of authentication has been identified to have many weaknesses.  ...  We have design of speaker verification using dynamic time warping (DTW) on graphical programming for authentication process.  ... 
doi:10.25126/jitecs.20172124 fatcat:wulfhalynfcl5ffcz6jf5agjnm

Context-aware Authorization in Highly Dynamic Environments [article]

Jean-Yves Tigli, Stephane Lavirotte, Gaetan Rey, Vincent Hourdin and Michel Riveill
2011 arXiv   pre-print
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user needs.  ...  On the other hand, standard access control trusts users once they have authenticated, despite the fact that they may reach unauthorized contexts.  ...  Access Control in Interaction Patterns studied it; the Information from column summarizes how contextual information is obtained and if it is authenticated The granularity of operations access control  ... 
arXiv:1102.5194v1 fatcat:qjoopgnx7vgqpfxsr6bwdlt7cu

Highly Secured Dynamic Color QR Pattern Generation for Real Time Application [chapter]

R. Sanjjey, S. Abisheak, T.R. Dineshkumar, M. Kirthan, S. Sivasaravanababu
2021 Advances in Parallel Computing  
This work advances the state-of-art secured WBAN system and QR pattern enabled authentication for privacy measures.  ...  Access control model output R. Sanjjey et al. / Highly Secured Dynamic Color QR Pattern Generation  ...  Access Control Model Authenticity in WBAN denotes the medical information transfer from access point to the storage space and rule sets to define each valid group.  ... 
doi:10.3233/apc210290 fatcat:eqfuc6463zeufofk6ell6uygpy

Evolution of the Brain Computing Interface (BCI) and Proposed Electroencephalography (EEG) Signals Based Authentication Model

Qaseem Ramzan, Stanislav Shidlovskiy, E. Siemens, A.D. Mehtiyev, V.I. Syryamkin, A.V. Yurchenko
2018 MATEC Web of Conferences  
When everything is interconnected through IoT and considering that we control all interconnected things by means of our brain using BCI (Brain Computer Interface), the meaning of security breach becomes  ...  Considering the sensitivity of data in the era of IoT, a new form of authentication is required, which should incorporate BCI rather than usual authentication techniques.  ...  Rumyantseva from Tomsk State University for English language editing.  ... 
doi:10.1051/matecconf/201815501006 fatcat:c3hao2zpyjb7hoyg4lkrb4ibza

Design of High-Security USB Flash Drives Based on Chaos Authentication

Teh-Lu Liao, Pei-Yen Wan, Pin-Cheng Chien, Yi-Chieh Liao, Liang-Kai Wang, Jun-Juh Yan
2018 Electronics  
Recently, due to the remarkable progress of digital signal processing (DSP) technology, the researchers often implement the controllers by the microcontroller with DSP technology for better reliability  ...  The Bluetooth module is used to communicate between the master and the slave to achieve chaos synchronization such that the same random and dynamical chaos signal can be simultaneously obtained at both  ...  Conflict of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/electronics7060082 fatcat:ro6p6hk5rvdq3jc3wcboxaj3bi

Set-based replay attack detection in closed-loop systems using a plug & play watermarking approach

Carlos Trapiello, Vicenc Puig
2019 2019 4th Conference on Control and Fault Tolerant Systems (SysTol)  
Similar to a virtual actuator scheme, the proposed methodology masks the presence of the authentication signal to the system controller, that do not need to be retuned as it remains immunized.  ...  Furthermore, a set-based analysis concerning the effect that the performance loss imposed by a watermarking signal has in the detectability of a replay attack is performed for the stationary, assuming  ...  It also shows (in green), the system outputs as seen from the controller point of view which are immunized to the injection of the authentication signal. 2) Replay attack: It is assumed that an attacker  ... 
doi:10.1109/systol.2019.8864790 dblp:conf/systol/TrapielloP19 fatcat:ipnbvnklcvcyfdsqdxu5ibj4tu

Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks

Jose Rubio-Hernan, Luca de Cicco, Joaquin Garcia-Alfaro
2016 2016 11th International Conference on Availability, Reliability and Security (ARES)  
The authors acknowledge support from the Cyber CNI Chair of Institut Mines-Télécom.  ...  It has been acknowledged by the Center of excellence in Cybersecurity.  ...  The Proposed Multi-watermark Signal The goal of the new detection scheme is to increase the difficulty in retrieving the authentication watermark ∆u t from the control signal u t , so that the probability  ... 
doi:10.1109/ares.2016.2 dblp:conf/IEEEares/Rubio-HernanCG16 fatcat:3o35lhpcvjgwpksycsu4avxnha

Cyber-Physical Systems Attestation

Junia Valente, Carlos Barreto, Alvaro A. Cardenas
2014 2014 IEEE International Conference on Distributed Computing in Sensor Systems  
During CPS-attestation, the verifier introduces false control signals to the system and observes the system dynamics to verify that the sensors and controllers are operating correctly.  ...  be controlled properly by the PLC control signal.  ... 
doi:10.1109/dcoss.2014.61 dblp:conf/dcoss/ValenteBC14 fatcat:uvgd2sverzh75p3pgibykejygu

IoT Security Techniques Based on Machine Learning [article]

Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu
2018 arXiv   pre-print
We focus on the machine learning based IoT authentication, access control, secure offloading and malware detection schemes to protect data privacy.  ...  of service attacks, jamming and eavesdropping.  ...  and dynamic networks.  ... 
arXiv:1801.06275v1 fatcat:y6fkpgin2vgjxexkst6nsd7ynq

A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud

Abdul Jaleel, Shazia Arshad, Muhammad Shoaib
2018 Symmetry  
Autonomic computing embeds self-management features in software systems using external feedback control loops, i.e., autonomic managers.  ...  An autonomic computing design should accommodate autonomic capability growth by allowing the dynamic configuration of self-* services, but this causes security and integrity issues.  ...  The design of control systems that integrate and configure self-* services from the cloud offer the dynamic incorporation of self-management capabilities.  ... 
doi:10.3390/sym10050141 fatcat:gxkngo3fizfudj3phkvqmzjac4

Injecting Reliable Radio Frequency Fingerprints Using Metasurface for The Internet of Things [article]

Sekhar Rajendran, Zhi Sun, Feng Lin, Kui Ren
2020 arXiv   pre-print
Existing authentication schemes-based on digital signatures have overhead costs associated with them in terms of computation time, battery power, bandwidth, memory, and related hardware costs.  ...  The proposed MeRFFI system can be easily integrated into the existing authentication schemes.  ...  The authentication sends back the acknowledgment along with the hash of the feature extracted from the pilot signal (H(f p)).  ... 
arXiv:2006.06895v3 fatcat:assk5szutnapzctjkx7wnxal4a

New Thermo-Optical Plants for Laboratory Experiments

T. Huba, M. Huba, P. Bistak, P. Tapak
2014 IFAC Proceedings Volumes  
Then it continues with a short description of linear and nonlinear identification and control experiments that may be carried out with the recently innovated model directly in a classroom from the Matlab  ...  This paper explains motivation and gives a brief development history of a laboratory model of thermo-optical plant.  ...  From the control point of view it is based on dynamical classes (DC) of control given by the number of pulses of a nearly time optimal control input.  ... 
doi:10.3182/20140824-6-za-1003.02760 fatcat:vhat2quvlrbdrg4ba6nsmdgnci

A Synergy of the Wireless Sensor Network and the Data Center System

Ke Hong, Shuo Yang, Zhiqiang Ma, Lin Gu
2013 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems  
It is shown that wireless sensor networks (sensornets) can provide fine-grained measurements in data centers, and achieve better control of the data center platform for energy efficiency.  ...  We argue that the combined computational and networking capability of a sensor network enables it to interact with the clusters in a much more sophisticated way and enhance essential functions in a data  ...  Upon receiving CONTROL_COMMAND, the anchor motes retrieve the ID of the control mote from the message, and may conduct additional authentication for the control mote (refer to Section II-C).  ... 
doi:10.1109/mass.2013.49 dblp:conf/mass/HongYMG13 fatcat:big7uoxk7revrj3idysonbzrti
« Previous Showing results 1 — 15 out of 59,999 results