Filters








13,811 Hits in 7.6 sec

Logical and physical design issues for smart card databases

Cristiana Bolchini, Fabio Salice, Fabio A. Schreiber, Letizia Tanca
2003 ACM Transactions on Information Systems  
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium.  ...  We propose a joint approach to the logical and physical database design phases and evaluate several data structures with respect to the performance, power consumption, and endurance parameters of read/  ...  for smart card database design.  ... 
doi:10.1145/858476.858478 fatcat:ny3y2xlpfrgxnfdkvo26dygsii

Smart card embedded information systems: a methodology for privacy oriented architectural design

C. Bolchini, F.A. Schreiber
2002 Data & Knowledge Engineering  
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium.  ...  We propose a joint approach to the logical and physical database design phases supporting the required security levels, on the basis that all information is stored on the Flash-EEPROM storage medium, managed  ...  Acknowledgements We thankfully acknowledge the clarifying discussions and the helpful suggestions of our colleagues Letizia Tanca and Fabio Salice.  ... 
doi:10.1016/s0169-023x(02)00039-3 fatcat:jqj2rx5oa5a5vmoct5lagnonrm

Monitoring and Data Analytics-Triggered Reconfiguration in Partially Disaggregated Optical Networks

Ll. Gifre, F. Boitier, C. Delezoide, M. Ruiz, M. Buffa, A. Morea, R. Casellas, L. Velasco, P. Layec
2020 2020 22nd International Conference on Transparent Optical Networks (ICTON)  
We present ADONIS, which stands for Aggregator/Disaggregator for Optical Network equIpmentS, a novel open device agent able to construct logical network devices from (dis)aggregation of physical components  ...  We experimentally assess it by means of a control closed-loop involving ADONIS, a Software Defined Network controller, a Monitoring and Data Analytics system, and a novel reconfiguration tool, SMART-A.  ...  Then, ONOS discovers logical network devices; for each device, it retrieves its details by means of ADONIS and issues an operational databases update notification to CASTOR.  ... 
doi:10.1109/icton51198.2020.9203059 fatcat:osc4fcsokzdr5jp37kjzzpxnsu

Smart Ration Card System Using Rfid Biometrics And Sms Gateway

R. Mr.Badadhe Keshav, D. Miss.Yenare Deepali, A. Mr.Raut Sambhaji, P. Mr.Sayambar Sandip
2018 Zenodo  
In this paper, we have proposed a survey apportion card utilizing Radio recurrence recognizable proof (RFID) system, biometrics and SMS entry way to keep the apportion fraud.  ...  In this framework, a RFID tag is utilized that conveys relative points of interest and the client needs to demonstrate this tag at the proportion shop.  ...  We can likewise build up an online database for expansive number of clients and get an affirmation for the conveyed message. Figure 1 : 1 RFID based Smart Card verification  ... 
doi:10.5281/zenodo.1411769 fatcat:4dp6vxfe3zajdmwq32576z456y

Smart Card Identification Management Over A Distributed Database Model

Olabode
2011 Journal of Computer Science  
Results: This article presents a Smart Card Identification Management System over a Distributed Database Model.  ...  The programmable smart card to store identification detail, including the biometric feature was proposed.  ...  This research takes a look at the issue of National Identity card management in Nigeria and consequently presents a model for the conceptualization and realization of a Smart Card Identification Management  ... 
doi:10.3844/jcssp.2011.1770.1777 fatcat:ktb5hgojwjfpxd3vo4jt4za4xi

A New Design for Smart Card Security System Based on PUF Technology

Elham Kordetoodeshki, Sattar Mirzakuchaki
2013 International Journal of Machine Learning and Computing  
In this paper SRAMPUF technology is used to obtain an acceptable security level in smart cards. At first, the strategy of SRAMPUF for producing physical unreachable code is used.  ...  At last the result of this process is sent to data-center for comparison with a predefined database and authentication purposes.  ...  One of the most important aspects in smart card technology is the security aspect and therefore many encrypting methods for IP protection in smart cards have been proposed.  ... 
doi:10.7763/ijmlc.2013.v3.317 fatcat:vmbh5dgzivf7lgbtvlpqcn44x4

Infrastructure Standards for Smart ID Card Deployment

Ramaswamy Chandramouli, Philip Lee
2007 IEEE Security and Privacy  
With the increasing use of smart cards for identity verification of individuals, it has become imperative for organizations to properly design and engineer the expensive infrastructure system that supports  ...  smart card deployment.  ...  of the issued card (lost, stolen, damaged), establish the association between the credential set for an individual and the physical device where the credential resides (e.g., card serial number written  ... 
doi:10.1109/msp.2007.34 fatcat:luep2qhziffypdyxfpajufg2ii

Card Types [chapter]

2010 Smart Card Handbook  
Test methods for contactless smart cards 642 15.3.1 Test methods for proximity smart cards 644 15.3.2 Test methods for vicinity coupling smart cards 18.1.1 Electronic payment transactions with smart cards  ...  Card Production 567 14.1 Tasks and roles in the production process 567 14.2 The smart card life cycle 569 14.3 Chip and module production 571 14.3.1 Chip design 572 14.3.2 Smart card  ... 
doi:10.1002/9780470660911.ch2 fatcat:3fnngjb5tzdrhjs4v3whvafy5e

A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies [chapter]

Kevin Eagles, Konstantinos Markantonakis, Keith Mayes
2007 Lecture Notes in Computer Science  
A threat analysis framework and methodology was developed by the authors to catalogue threats, vulnerabilities, attacks and countermeasures for smart cards (contact and contactless) and wireless sensor  ...  The goal of this research was to determine "Security Lessons" learned from the world of smart cards that may be applied to wireless sensor network nodes and vice versa.  ...  The proposed framework and methodology in this paper may help to assess any shared security issues between Java Card 3.0 [13] , secure distributed computing on a Java Card grid [14] and also the use  ... 
doi:10.1007/978-3-540-72354-7_14 fatcat:de74z43m3zgd3gbvqxqeud2r3u

Demonstration of Monitoring and Data Analytics-triggered reconfiguration in partially disaggregated optical networks

Ll. Gifre, F. Boitier, C. Delezoide, M. Ruíz, M. Buffa, A. Morea, Ramon Casellas, L. Velasco, P. Layec
2020 Zenodo  
We demonstrate a novel agent for optical disaggregated optical networks.  ...  When the Monitoring and Data Analytics detects a degradation, it recommends the SDN controller to trigger a network reconfiguration computed by a novel planning tool.  ...  For each device, it retrieves its details by means of ADONIS and issues an operational databases update notification to CASTOR.  ... 
doi:10.5281/zenodo.3981211 fatcat:szkjdi5mnvbibcry2r3shkfxm4

Generic Information System for Chain Stores based on Borland C++ Builder

Changyu Liu, Juntao Xiong, Bin Lu
2015 International Journal of Smart Home  
Besides, we also illustrate the system from three most principal stages in software engineering, which are system analysis, system design and system implementation.  ...  With the rapid growth of global economy, chain stores are springing up all over the world and have dominated more and more service markets, e.g., retail and dining.  ...  Database Design Database design is also a key stage in system design.  ... 
doi:10.14257/ijsh.2015.9.11.27 fatcat:znvzvvwqsrgftd2uqkeztuvsie

A context-aware methodology for very small data base design

C. Bolchini, F. A. Schreiber, L. Tanca
2004 SIGMOD record  
We propose a complete methodology for designing Very Small Data Bases, from the identification of the device resident portions down to the choice of the physical data structure, optimizing the cost and  ...  The design of a Data Base to be resident on portable devices and embedded processors for professional systems requires considering both the device memory peculiarities and the mobility aspects, which are  ...  LOGISTIC AND PHYSICAL DATA STRUCTURES The right-side branch of our methodology aims at identifying the most convenient logical and physical data structures the DBMS must make available for the VSDB designer  ... 
doi:10.1145/974121.974134 fatcat:nfwey5l3czc7re4ho3hvw5ru6e

Using Smart Cards in an Educational Environment [chapter]

Costas Lambrinoudakis
2000 IFIP Advances in Information and Communication Technology  
This paper presents the main functional, architectural and security characteristics of a smart card pilot application for an Educational Institute, together with the resulting benefits for both the students  ...  A detailed description of the way that the smart card security features have been capitalised for implementing certification and authentication mechanisms is also provided.  ...  These areas are: Secret Area: This area can be written only once and there are no physical or logical means that can be used for reading it from the outside[l].  ... 
doi:10.1007/978-0-387-35515-3_14 fatcat:pbuh2qpikzegxlsfm3vlfqst2q

A Real-time DBMS System for the Immigration Processing of Large Hajj Crowd

Amir A. Khwaja
2017 International Journal of Modern Education and Computer Science  
This paper reports experience with the design and development of a prototype backend DBMS system to automate the immigration processing of the large Hajj crowd.  ...  The Hajj event occurs in the twelfth month of the Islamic lunar calendar and requires anywhere from two to three millions of Muslims from all over the world to make pilgrimage for 10-15 days to the Holy  ...  Smart card based Hajj identity cards may be issued to the pilgrims with all the relevant information stored on the smart card.  ... 
doi:10.5815/ijmecs.2017.09.04 fatcat:c4t6ihfqjvfv5gg3mtrpupzlqm

Are we smart about security?

Keith Mayes, Konstantinos Markantonakis
2003 Information Security Technical Report  
The Multi-application Smart Card offers a promising solution, however we may need to challenge some existing practices if we are to empower the Citizen in the on-line world.  ...  The introduction of new technologies and changes in behaviours has resulted in an erosion of personal contact and greater reliance on security systems and safeguards.  ...  areas of interest are smart card security and smart card applications along with security protocol design.  ... 
doi:10.1016/s1363-4127(03)00102-x fatcat:2zgdydgckrbqrgvszvheephlza
« Previous Showing results 1 — 15 out of 13,811 results