60,736 Hits in 2.9 sec

On the verification of security-aware E-services

Silvio Ranise
2012 Journal of symbolic computation  
Web services providing E-commerce capabilities to support business transactions over the Internet are more and more widespread.  ...  The development of such services involves several security issues ranging from authentication to the management of the access to shared resources according to a given business model.  ...  Acknowledgements The work presented in this paper was partially supported by the FP7-ICT-2007-1 Project no. 216471, ''AVANTSSAR: Automated Validation of Trust and Security of Service-oriented Architectures  ... 
doi:10.1016/j.jsc.2011.12.033 fatcat:mysxkoynjjcstgvwk7kdjmh7ui

Securing Location-Aware Services Based on Online/Offline Signatures in VANETs [chapter]

Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee
2011 Lecture Notes in Computer Science  
In particular, we introduce the notion of location-aware credentials based on "hash-sign-switch" paradigm so as to guarantee the trustworthiness of location in location-aware services while providing conditional  ...  Furthermore, the proposed protocol provides efficient procedures that alleviate a burden of computation for location-aware signature generation and verification on vehicles in VANETs.  ...  Location-Aware Signature Generation and Verification Fig. 2 depicts the message structure used for a secure location-aware service. The type field represents either request or response.  ... 
doi:10.1007/978-3-642-23300-5_21 fatcat:c77n6b2wyjhmzg4tiojqxmyeyi

Security and Verification of Data in Multi-Cloud Storage with Provable Data Possession

Vrushali KGaikwad, Ramesh Kagalkar
2015 International Journal of Computer Applications  
Data integrity verification is one of the biggest security issue in cloud. To check integrity of data Provable data possession is one of the method available.  ...  The security of our scheme is based on trusted third party auditor and structure of zero-awareness proof , which can fulfill reliability of awareness, completeness, and properties.  ...  INTRODUCTION To store data on cloud is one of the services offered by cloud computing. Therefore, instead of storing data on local server , they can store it on the cloud service provider's storage.  ... 
doi:10.5120/20549-2924 fatcat:2rp5a2bmd5ekta3pq4cjnmunvi

Usability Analysis on Security of E-mail Accounts: Differences between Fantasy and Reality

Zara Tariq, Ramsha Arif
2014 International Journal of Security and Its Applications  
Second, we categorized users in to three types and on the basis of that we study on user's view on online security, confidence and usability on their E-mail service provider.  ...  By performing a comparison based on efficiency and security, the approach is to begin by analyzing unlike free of charge E-mail service providers.  ...  42.3% of users said that MSN is the best mail service provider which ensures that users are not aware of back-end security or they never investigate the security provided by different Email service providers  ... 
doi:10.14257/ijsia.2014.8.5.09 fatcat:btfxo27sgnhjljz5f2d3kpef44

The Security of Information Channels in Banking Services

Marcin Olkiewicz, Mariusz Terebecki, Radosław Wolniak
2019 System Safety: Human - Technical Facility - Environment  
The aim of this paper is to present crucial security aspects in electronic banking, which indirectly affect the quality and security of the offered banking service and whether clients are aware of the  ...  This study focuses on the aspects related to the information technology security, and in particular, the quality of information security.  ...  particular on: 1. ensuring identity verification and data security; 2. assessment of clients' awareness regarding the rules of safe use of these channels; 3. client education.  ... 
doi:10.2478/czoto-2019-0014 fatcat:ehjhewf77zg3pkhixhv67c6h7a

Multi-Level Security for Internet Banking Services

Sowjanya V.L., Mrs. K. Santosh Jhansi
2017 IJARCCE  
Also, the length of the session timeout may effect on the conveince of the service and subsequent user fulfilment.  ...  This paper proposing an alternate method by applying authentication via multi-level user verification by applying biometrics an application in the service of sessions. 627 CASHMA authentication server  ...  This is due to architectural decisions where the client is kept very simple. This paper explores multi-level user verification in order to provide more security for internet banking services.  ... 
doi:10.17148/ijarcce.2017.65120 fatcat:zoanhr77ibb3jgpoz3oygtptte

Revisiting the role of web assurance seals in business-to-consumer electronic commerce

Dan J. Kim, Charles Steinfield, Ying-Ju Lai
2008 Decision Support Systems  
There is conflicting evidence as to the current level of awareness and impact of Web Assurance Seal Services (WASSs).  ...  This study examines the effects of an educational intervention designed to increase consumer's knowledge, of security and privacy aspect of business-to-consumer (B2C) e-commerce websites and assurance  ...  After verification, the e-retailers place the seal on their websites, indicating that the site conforms to the certifying body's standards [10] .  ... 
doi:10.1016/j.dss.2007.11.007 fatcat:6l7pkakvkfgstin7ugr23g7isu

Identity Verification and Societal Challenges: Explaining the Gap Between Service Provision and Development Outcomes

Kathy McGrath
2016 MIS Quarterly  
outcomes from the provision of identity verification services while others do not.  ...  Although IS research is well aware that the provision of a service does not of itself deliver development outcomes, the nature and role of ICT-based services in development is not well understood.  ...  on Nigeria and introductions to several of the participants in this study; Ariyo Maiye for some initial data collection at NIMC; and Edgar Whitley for introducing me to the finer points of identity card  ... 
doi:10.25300/misq/2016/40.2.12 fatcat:xua2zvfewrft7px47p673gsune

BigNFC: Novel Formal model for NFC based context-aware applications

Aicha Nabet, Rachid Systèmes Boudour
2021 Informatica (Ljubljana, Tiskana izd.)  
In literature, most of works focuses on creating a general model for context-aware systems ignoring the specificity of certain applications such as NFC applications where they present a higher complexity  ...  Context-aware computing refers to system ability to sense its environment and change its behavior for delivering suitable services.  ...  Context-aware system presents the ability of system to adapt services to satisfy the preferences of user in dynamic environment.  ... 
doi:10.31449/inf.v45i5.3496 fatcat:nrgdgjsm65holps3hpyqrvcura

A Fast and Scalable Authentication Scheme in IoT for Smart Living [article]

Jianhua Li, Jiong Jin, Lingjuan Lyu, Dong Yuan, Yingying Yang, Longxiang Gao, Chao Shen
2020 arXiv   pre-print
The severe security flaw discourages the adoption of the Internet of things in smart living.  ...  Then, we design lightweight protocols to implement the scheme, where both a high level of security and low computation workloads on SO (no bilinear pairing requirement on the client-side) is accomplished  ...  Security is also enhanced grounded on at least two facts initiated by VO, namely, heavyweight security workloads offloaded from an SO, and flexible management imposed on an SO with local awareness of working  ... 
arXiv:2011.06325v1 fatcat:32mfnicbibf65gynvnlcthbvpu

Better Security Aware D2D Transmission Protocol with Optimal Relay Assignment Algorithm (ORAA)

2019 International Journal of Engineering and Advanced Technology  
It increases the quality and health care by providing a reliable and cost effective. In this system, a protocol called LSAP (Lightweight and Security Aware protocol).  ...  Source node of minimum capacity was identified by ORA at the time of iteration process, which results in designing an efficient system.  ...  In addition, light weight and security aware protocol has a uniqueness of promote security with hash chain of sectional key.  ... 
doi:10.35940/ijeat.f1035.0886s19 fatcat:5wqle7i6vrfh7koywlhrdceewy

Effectiveness and Limitations of E-Mail Security Protocols

M Tariq Banday
2011 International Journal of Distributed and Parallel systems  
The add-on security protocols provide a reasonable security but have several limitations.  ...  To make e-mail communication secure and private, e-mail servers incorporate one or more security features using add-on security protocols.  ...  These include SMTP session refusal to unauthorized servers through IP address verification, refusal of e-mail relaying, restriction on use of certain SMTP commands like EXPN, verification of e-mail envelope  ... 
doi:10.5121/ijdps.2011.2304 fatcat:gc6k5cpj6rgaxn5llkda3xbhce


David Nicolas Bartolini, Andreas Ahrens, Jelena Zascerinska
2018 Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska  
The aim of the present paper is to design an instrument (questionnaire) for customer's cyber risk assessment in insurability verification.  ...  The method for building an instrument (questionnaire) is empirical research. Empirical research is based on use of empirical evidence. A questionnaire with 11 questions is proposed.  ...  There are spelling mistakes in the e-mail and on the website.  ... 
doi:10.5604/01.3001.0012.5274 fatcat:dg6pnl7mnnbjtlae5plerrnzzi

A New Approach to Enhance Internet Banking Security

M. F., Kamruddin Nur, Aloke Kumar, Md. Akhtaruzzaman
2017 International Journal of Computer Applications  
This is followed by a description of a demonstration implementation of the system. Security is the main concern and vital issue for the success of e-banking services.  ...  In this paper, a security-aware architecture is introduced to protect from several attacks. The proposed system has a secure protocol and certificate verification mechanism.  ...  The secure protocol has a processing stack, which is based on handshaking scheme, certificate verification, signature verification, and alert mechanism.  ... 
doi:10.5120/ijca2017913093 fatcat:n3q2trxy2fgr7elvqrl3dkeqmq

Promises, Social, and Ethical Challenges with Biometrics in Remote Identity Onboarding [chapter]

Katrin Laas-Mikko, Tarmo Kalvet, Robert Derevski, Marek Tiits
2022 Advances in Computer Vision and Pattern Recognition  
These non-technical requirements need to be addressed in developing identity verification technologies based on biometrical algorithms and security techniques.  ...  In the context of the COVID-19 pandemic, increasing international mobility, and a greater focus on user convenience, established onboarding rules and procedures have been disrupted.  ...  Acknowledgements This research was funded by the European Commission, grant number 883356-Image Manipulation Attack Resolving Solutions (iMARS).  ... 
doi:10.1007/978-3-030-87664-7_20 fatcat:cbw4bwttdjbrjd4bj66p76csnm
« Previous Showing results 1 — 15 out of 60,736 results