Filters








9,331 Hits in 3.5 sec

Protecting File Systems with Transient Authentication

Mark D. Corner, Brian D. Noble
2005 Wireless networks  
This tension between usability and security is eliminated through Transient Authentication, in which a small hardware token continuously authenticates the user's presence to the laptop over a short-range  ...  Laptops are vulnerable to theft, greatly increasing the likelihood of exposing sensitive files. Unfortunately, storing data in a cryptographic file system does not fully address this problem.  ...  We resolve this tension with Transient Authentication, in which the user wears a small authentication token.  ... 
doi:10.1007/s11276-004-4743-z fatcat:zqkpfvd6rvdttiz36omn5opsna

The case for transient authentication

Brian D. Noble, Mark D. Corner
2002 Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10  
This paper presents the four principles of transient authentication, our experience applying the model to a cryptographic file system, and our plans for extending the model to other services and applications  ...  Such persistent authentication is inappropriate for mobile and ubiquitous systems, because associations between people and devices are fleeting. To address this, we propose transient authentication.  ...  Example: Protecting File Systems To validate this approach, we have built ZIA, a cryptographic file system employing transient authentication.  ... 
doi:10.1145/1133373.1133377 dblp:conf/sigopsE/NobleC02 fatcat:r3ysgumcpzfbhhj6ryzpooyy3i

Protecting applications with transient authentication

Mark D. Corner, Brian D. Noble
2003 Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03  
We solve this problem with Transient Authentication, in which a small hardware token continuously authenticates the user's presence over a short-range, wireless link.  ...  Current systems authenticate their users infrequently, and assume the user's identity does not change.  ...  ZIA, a cryptographic file system, uses Transient Authentication for file data protection [7] .  ... 
doi:10.1145/1066116.1066117 fatcat:57tn6pfll5gztktuozzqq4ywsu

Mobile Device Security Using Transient Authentication

A.J. Nicholson, M.D. Corner, B.D. Noble
2006 IEEE Transactions on Mobile Computing  
Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence.  ...  Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication.  ...  We have ported the Transient Authentication software to protect both x86-based devices (such as laptops) and iPAQ handhelds with ARM processors.  ... 
doi:10.1109/tmc.2006.169 fatcat:nhkpbwy52fgvvequ3vdlly4pqy

Authentication Model Based Bluetooth-enabled Mobile Phone

Rania Abdelhamee, Sabira Khatun, Borhanuddin Mohd Ali, Abdul Rahman Ramli
2005 Journal of Computer Science  
the authentication for laptop over a Bluetooth wireless link, in the concept of transient authentication with out combining it with encryption file system.  ...  ZIA combine authentication with a file encryption.  ...  Table 1 : 1 Comparison with ZIA System ZIA LABM Functionality Authentication and Encryption Authentication File System Wireless Link IEEE 802.11 b Bluetooth Distance: 30-00 m Distance: 10 m  ... 
doi:10.3844/jcssp.2005.200.203 fatcat:m6ts7m5wcfbbxe4xlxp5trrd4u

Mediated definite delegation - Certified Grid jobs in ALICE and beyond

Steffen Schreiner, Costin Grigoras, Maarten Litmaath, Latchezar Betev, Johannes Buchmann
2012 Journal of Physics, Conference Series  
The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, including a discussion of non-repudiation in the face of malicious  ...  These limitations are discussed and formulated, both in general and with respect to an adoption in line with Multi-user Grid Jobs.  ...  transient entity's authenticity.  ... 
doi:10.1088/1742-6596/396/3/032096 fatcat:qworzs4v3rd6vhoyqltxlrfnjy

PinUP: Pinning User Files to Known Applications

William Enck, Patrick McDaniel, Trent Jaeger
2008 2008 Annual Computer Security Applications Conference (ACSAC)  
In this paper, we take advantage of this reality by developing protection mechanisms that "pin" user files to the applications that may use them.  ...  Because system protections do not differentiate applications, any malcode present in the downloaded software can compromise or otherwise leak all user data.  ...  This functionality is similar to how the root user in UNIX systems is treated with respect to user file system protections. Applications within agid 0 must Figure 4.  ... 
doi:10.1109/acsac.2008.41 dblp:conf/acsac/EnckMJ08 fatcat:uo67ljy7qzbx5ji4uuy2qtuz34

Data security mechanism of hyperledger fabric and its application in academic documents verification system

K. Kumutha, S. Jayalakshmi, P. SriPriya
2022 International Journal of Health Sciences  
Therefore, the privacy protection requirements are different from those in the academic documents verification system based on blockchain.  ...  Data sharing is not implemented in the traditional academic documents verification system.  ...  This article especially introduces the privateness safety mechanism of the Hyperledger Fabric and makes use of an educational files verification case to explain.  ... 
doi:10.53730/ijhs.v6ns3.6821 fatcat:vo27jr2urbhyvff7lcdvlj2tvy

LIBER FIM4L Recommendations 2020 v.01 [article]

Jos Westerbeke, Jiri Pavlik, Peter Gietz
2020 Zenodo  
Publishers and suppliers of licensed online resources want to provide authorized users of institutions for higher education and research with access to their services in a controlled way.  ...  Publishers with (older) systems that require more attributes for authentication to function should adapt their systems ASAP.  ...  Single Sign On (SSO) The ability of a user to access multiple discrete systems or sets of resources with a single set of access credentials.  ... 
doi:10.5281/zenodo.4118124 fatcat:kresko3t2jbyfcwhj4m7uhq5iu

Design and Implementation of a Defense System from TCP Injection Attacks

G. Ranjith, J. Vijayachandra, B. Prathusha, P. Sagarika
2016 Indian Journal of Science and Technology  
We designed and implemented the defense system to protect against the Advanced Persistent Threat and other attacks, and research issues in networks and Cloud Computing.  ...  An experimental analysis is given along with In-depth analytics and mechanisms regarding the threats in transit and TCP Session Hijacking.  ...  At destinations users can download file only with proper authentication 14 .  ... 
doi:10.17485/ijst/2016/v9i40/98588 fatcat:qp26zmucuzfolipnvrayxo5fze

Secure and trustworthy file sharing over cloud storage using eID tokens [article]

Eduardo Duarte, Filipe Pinheiro, André Zúquete, Hélder Gomes
2015 arXiv   pre-print
The access to the cryptographic material used to protect data is implemented using the identification and authentication functionalities of national electronic identity (eID) tokens.  ...  We have successfully tested our prototype in Windows, Mac OS X and Linux, with Dropbox, OneDrive, Google Drive and SugarSync.  ...  file system.  ... 
arXiv:1501.03139v1 fatcat:qqz2lgdm75cnfmcovxi7nzaaui

RFID-Based Authentication Middleware for Mobile Devices

Ewa Syta, Stan Kurkovsky, Bernardo Casano
2010 2010 43rd Hawaii International Conference on System Sciences  
We present an RFID-based Authentication Middleware (RFID-AM) that combines point of entry and continuous authentication with transparent on-demand encryption of user files.  ...  Mobile devices play an increasingly important role in our lives and tend to become representations of our digital selves when we trust these devices with sensitive information.  ...  Transient authentication provides a model to resolve the tension between protection and usability discussed in Section 2.  ... 
doi:10.1109/hicss.2010.320 dblp:conf/hicss/SytaKC10 fatcat:zcuo24sneffn7ogpzgwqcyv6bu

Characterizing throughput bottlenecks for secure GridFTP transfers

G. Vardoyan, Rajkumar Kettimuthu, M. Link, S. Tuecke
2013 2013 International Conference on Computing, Networking and Communications (ICNC)  
The control channel is encrypted and integrity protected by default. The data channel is authenticated by default.  ...  We show that this can be accomplished through threaded Globus GridFTP server instances configured with appropriately chosen parallelism and concurrency, allowing for a more effective use of available system  ...  GridFTP supports requests for arbitrary file regions. • Fault recovery methods are needed to handle failures such as transient network and server outages.  ... 
doi:10.1109/iccnc.2013.6504202 dblp:conf/iccnc/VardoyanKLT13 fatcat:i2zgufhc6rb7xhipksl6o7n7ne

Fine-Grained Access Control in the Chirp Distributed File System

Patrick Donnelly, Douglas Thain
2012 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)  
The paper concludes with a discussion of integrating the authentication system into workflow systems.  ...  The system is evaluated to show that performance and scalability are similar to other authentication methods.  ...  Authenticating with a Chirp Ticket Authenticating using a ticket is as simple as transferring the ticket file with your job.  ... 
doi:10.1109/ccgrid.2012.128 dblp:conf/ccgrid/DonnellyT12 fatcat:rl7a5hemxba2jcigns26cpeoo4

Protecting Data in Modern Computing Devices

M. Suganiya, Dr. A. Pravin
2016 International Journal Of Engineering And Computer Science  
The multi-board design with CPU module and carrier board is developed at RISE LAB, Department of CSE, IIT Madras.  ...  This paper explains the modern compute device mechanisms using which the privacy and confidentiality concerns be addressed with limited amount of usage of cryptographic functions.  ...  Memory data is protected and verified by hash algorithm. The entire file system is encrypted with OTPMK (One-Time Programmable Master Key) to avoid possibility of modified rootkits.  ... 
doi:10.18535/ijecs/v5i6.33 fatcat:qnywwamfbze3pahzqs34tfs3pa
« Previous Showing results 1 — 15 out of 9,331 results