A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Protecting File Systems with Transient Authentication
2005
Wireless networks
This tension between usability and security is eliminated through Transient Authentication, in which a small hardware token continuously authenticates the user's presence to the laptop over a short-range ...
Laptops are vulnerable to theft, greatly increasing the likelihood of exposing sensitive files. Unfortunately, storing data in a cryptographic file system does not fully address this problem. ...
We resolve this tension with Transient Authentication, in which the user wears a small authentication token. ...
doi:10.1007/s11276-004-4743-z
fatcat:zqkpfvd6rvdttiz36omn5opsna
The case for transient authentication
2002
Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10
This paper presents the four principles of transient authentication, our experience applying the model to a cryptographic file system, and our plans for extending the model to other services and applications ...
Such persistent authentication is inappropriate for mobile and ubiquitous systems, because associations between people and devices are fleeting. To address this, we propose transient authentication. ...
Example: Protecting File Systems To validate this approach, we have built ZIA, a cryptographic file system employing transient authentication. ...
doi:10.1145/1133373.1133377
dblp:conf/sigopsE/NobleC02
fatcat:r3ysgumcpzfbhhj6ryzpooyy3i
Protecting applications with transient authentication
2003
Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03
We solve this problem with Transient Authentication, in which a small hardware token continuously authenticates the user's presence over a short-range, wireless link. ...
Current systems authenticate their users infrequently, and assume the user's identity does not change. ...
ZIA, a cryptographic file system, uses Transient Authentication for file data protection [7] . ...
doi:10.1145/1066116.1066117
fatcat:57tn6pfll5gztktuozzqq4ywsu
Mobile Device Security Using Transient Authentication
2006
IEEE Transactions on Mobile Computing
Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. ...
Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. ...
We have ported the Transient Authentication software to protect both x86-based devices (such as laptops) and iPAQ handhelds with ARM processors. ...
doi:10.1109/tmc.2006.169
fatcat:nhkpbwy52fgvvequ3vdlly4pqy
Authentication Model Based Bluetooth-enabled Mobile Phone
2005
Journal of Computer Science
the authentication for laptop over a Bluetooth wireless link, in the concept of transient authentication with out combining it with encryption file system. ...
ZIA combine authentication with a file encryption. ...
Table 1 : 1 Comparison with ZIA System
ZIA
LABM
Functionality
Authentication and Encryption
Authentication
File System
Wireless Link
IEEE 802.11 b
Bluetooth
Distance: 30-00 m
Distance: 10 m ...
doi:10.3844/jcssp.2005.200.203
fatcat:m6ts7m5wcfbbxe4xlxp5trrd4u
Mediated definite delegation - Certified Grid jobs in ALICE and beyond
2012
Journal of Physics, Conference Series
The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, including a discussion of non-repudiation in the face of malicious ...
These limitations are discussed and formulated, both in general and with respect to an adoption in line with Multi-user Grid Jobs. ...
transient entity's authenticity. ...
doi:10.1088/1742-6596/396/3/032096
fatcat:qworzs4v3rd6vhoyqltxlrfnjy
PinUP: Pinning User Files to Known Applications
2008
2008 Annual Computer Security Applications Conference (ACSAC)
In this paper, we take advantage of this reality by developing protection mechanisms that "pin" user files to the applications that may use them. ...
Because system protections do not differentiate applications, any malcode present in the downloaded software can compromise or otherwise leak all user data. ...
This functionality is similar to how the root user in UNIX systems is treated with respect to user file system protections. Applications within agid 0 must
Figure 4. ...
doi:10.1109/acsac.2008.41
dblp:conf/acsac/EnckMJ08
fatcat:uo67ljy7qzbx5ji4uuy2qtuz34
Data security mechanism of hyperledger fabric and its application in academic documents verification system
2022
International Journal of Health Sciences
Therefore, the privacy protection requirements are different from those in the academic documents verification system based on blockchain. ...
Data sharing is not implemented in the traditional academic documents verification system. ...
This article especially introduces the privateness safety mechanism of the Hyperledger Fabric and makes use of an educational files verification case to explain. ...
doi:10.53730/ijhs.v6ns3.6821
fatcat:vo27jr2urbhyvff7lcdvlj2tvy
LIBER FIM4L Recommendations 2020 v.01
[article]
2020
Zenodo
Publishers and suppliers of licensed online resources want to provide authorized users of institutions for higher education and research with access to their services in a controlled way. ...
Publishers with (older) systems that require more attributes for authentication to function should adapt their systems ASAP. ...
Single Sign On (SSO) The ability of a user to access multiple discrete systems or sets of resources with a single set of access credentials. ...
doi:10.5281/zenodo.4118124
fatcat:kresko3t2jbyfcwhj4m7uhq5iu
Design and Implementation of a Defense System from TCP Injection Attacks
2016
Indian Journal of Science and Technology
We designed and implemented the defense system to protect against the Advanced Persistent Threat and other attacks, and research issues in networks and Cloud Computing. ...
An experimental analysis is given along with In-depth analytics and mechanisms regarding the threats in transit and TCP Session Hijacking. ...
At destinations users can download file only with proper authentication 14 . ...
doi:10.17485/ijst/2016/v9i40/98588
fatcat:qp26zmucuzfolipnvrayxo5fze
Secure and trustworthy file sharing over cloud storage using eID tokens
[article]
2015
arXiv
pre-print
The access to the cryptographic material used to protect data is implemented using the identification and authentication functionalities of national electronic identity (eID) tokens. ...
We have successfully tested our prototype in Windows, Mac OS X and Linux, with Dropbox, OneDrive, Google Drive and SugarSync. ...
file system. ...
arXiv:1501.03139v1
fatcat:qqz2lgdm75cnfmcovxi7nzaaui
RFID-Based Authentication Middleware for Mobile Devices
2010
2010 43rd Hawaii International Conference on System Sciences
We present an RFID-based Authentication Middleware (RFID-AM) that combines point of entry and continuous authentication with transparent on-demand encryption of user files. ...
Mobile devices play an increasingly important role in our lives and tend to become representations of our digital selves when we trust these devices with sensitive information. ...
Transient authentication provides a model to resolve the tension between protection and usability discussed in Section 2. ...
doi:10.1109/hicss.2010.320
dblp:conf/hicss/SytaKC10
fatcat:zcuo24sneffn7ogpzgwqcyv6bu
Characterizing throughput bottlenecks for secure GridFTP transfers
2013
2013 International Conference on Computing, Networking and Communications (ICNC)
The control channel is encrypted and integrity protected by default. The data channel is authenticated by default. ...
We show that this can be accomplished through threaded Globus GridFTP server instances configured with appropriately chosen parallelism and concurrency, allowing for a more effective use of available system ...
GridFTP supports requests for arbitrary file regions. • Fault recovery methods are needed to handle failures such as transient network and server outages. ...
doi:10.1109/iccnc.2013.6504202
dblp:conf/iccnc/VardoyanKLT13
fatcat:i2zgufhc6rb7xhipksl6o7n7ne
Fine-Grained Access Control in the Chirp Distributed File System
2012
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
The paper concludes with a discussion of integrating the authentication system into workflow systems. ...
The system is evaluated to show that performance and scalability are similar to other authentication methods. ...
Authenticating with a Chirp Ticket Authenticating using a ticket is as simple as transferring the ticket file with your job. ...
doi:10.1109/ccgrid.2012.128
dblp:conf/ccgrid/DonnellyT12
fatcat:rl7a5hemxba2jcigns26cpeoo4
Protecting Data in Modern Computing Devices
2016
International Journal Of Engineering And Computer Science
The multi-board design with CPU module and carrier board is developed at RISE LAB, Department of CSE, IIT Madras. ...
This paper explains the modern compute device mechanisms using which the privacy and confidentiality concerns be addressed with limited amount of usage of cryptographic functions. ...
Memory data is protected and verified by hash algorithm. The entire file system is encrypted with OTPMK (One-Time Programmable Master Key) to avoid possibility of modified rootkits. ...
doi:10.18535/ijecs/v5i6.33
fatcat:qnywwamfbze3pahzqs34tfs3pa
« Previous
Showing results 1 — 15 out of 9,331 results