Filters








14 Hits in 4.4 sec

Protecting applications with transient authentication

Mark D. Corner, Brian D. Noble
2003 Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03  
Such persistent authentication is inappropriate for mobile and ubiquitous systems, where associations between people and devices are fluid and unpredictable.  ...  Applications can be protected transparently by encrypting in-memory state when the user departs and decrypting this state when the user returns.  ...  Acknowledgements The authors wish to thank Peter Chen and Peter Honeyman, for many valuable conversations about this work.  ... 
doi:10.1145/1066116.1066117 fatcat:57tn6pfll5gztktuozzqq4ywsu

Stateless data concealment for distributed systems

Rachid Anane, Sukhvir Dhillon, Behzad Bordbar
2008 Journal of computer and system sciences (Print)  
This involves the division of a file into fragments, their encryption and compression, the random allocation of these fragments to the nodes, the generation and transcription of metadata for reconstructing  ...  If the network bandwidth and the amount of memory (whether persistent or volatile) is low and the load average is high then the performance of the scheme is bound to decrease.  ...  Blaze describes a system where keys are kept off-line on a smartcard [5] .  ... 
doi:10.1016/j.jcss.2007.04.007 fatcat:g6morfzudzhtjfvyndhqgodoym

IoT Vertical Applications and Associated Security Requirements [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
This will prevent the exposure of credit card or other PII during processing in the memory since the memory contents are encrypted inline.2.  ...  Having cold or warm sites with hardware security modules (HSM) that are unlocked with smartcards or other hardware tokens is best practice.  ... 
doi:10.1007/978-1-4842-2896-8_6 fatcat:eznovqjwwbbn5a4czv3q5cj3cm

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems [article]

Aditya Sundararajan, Arif I. Sarwat, Alexander Pons
2019 arXiv   pre-print
Biometric research is directed increasingly towards Wearable Biometric Systems (WBS) for user authentication and identification.  ...  It further discusses how these factors affect the design considerations for WBS, the open challenges and future directions of research in these areas.  ...  , and Short Time Fourier Transform (STFT) for minimal memory and computation complexity [40, 163, 189] .  ... 
arXiv:1903.02548v1 fatcat:mkl32giawnb5lgornzq4w3ec74

Building regulatory compliant storage systems

Zachary N. J. Peterson, Randal Burns
2006 Proceedings of the 2006 national conference on Digital government research - dg.o '06  
Other legislation sets limits on the amount of time an organization may be liable for maintaining their electronic data, but for those data that go out of scope, permanently deleting data from magnetic  ...  We then introduce algorithms and an architecture for the secure deletion of individual versions of a file.  ...  For example, a patient may hold a key share for their medical records on a smartcard, enabling them to control access to their records and also independently destroy their records without access to the  ... 
doi:10.1145/1146598.1146740 dblp:conf/dgo/PetersonB06 fatcat:zidl5ezqdnayva6rwee4ct7bdm

A Survey of Mobile Transactions

Patricia Serrano-Alvarado, Claudia Roncancio, Michel Adiba
2004 Distributed and parallel databases  
Several models for mobile transactions have been proposed but it is difficult to have an overview of all of them. This paper analyzes and compares several contributions to mobile transactions.  ...  Raffin for their help in reading this paper. We wish to thank the members of the NODS project (http://www-45 lsr.imag.fr/Les.Groupes/STORM/) for their feedbacks all along this research.  ...  This architecture is specially suitable for dumb terminals or small PDA applications. Thin client resources are limited (e.g. small screen size, small cache memory, limited bandwidth).  ... 
doi:10.1023/b:dapd.0000028552.69032.f9 fatcat:tohlptorcrbsxkgizqcnilsj6a

The Influence of Architectural Styles on Security, Using the Example of a Certification Authority [article]

Michael Tänzer
2014 arXiv   pre-print
So integrating security concerns early in the design process seems a promising approach for increasing the security of the resulting system.  ...  The requirements for the system are gathered and multiple designs according to different architectural styles are drafted and evaluated using a risk evaluation method.  ...  As the services also are responsible for persisting their data, they can't be deployed on multiple machines without some preparation.  ... 
arXiv:1408.2758v1 fatcat:meecqcqvazg6fdkjulo7xpnn2y

Engineering and theoretical underpinnings of retrenchment

R. Banach, M. Poppleton, C. Jeske, S. Stepney
2007 Science of Computer Programming  
Some of its shortcomings as a specification constructor at high levels of abstraction are pointed out, and these are used to motivate the adoption of retrenchment for certain high level development steps  ...  The Mondex purse and retrenchment The Mondex Purse is a smartcard electronic purse for containing genuine money.  ...  So 'lost' really means 'recoverably lost' in the A, B, C models.  ... 
doi:10.1016/j.scico.2007.04.002 fatcat:6moehhmeuzce7gql2nkvm4prsq

Resilient payment systems

Khaled Baqer, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository, Ross Anderson
2018
From Chaum's proposals in the 1980s for private payment systems to micropayments, previous attempts failed to take off for a variety of reasons, including non-existing markets, or issues pertaining to  ...  resilience, and scalability by introducing the ability to process payments offline without relying on the availability of network coverage; a lack of network coverage renders some payment services unusable for  ...  His advice has been invaluable, and I'm grateful for his counsel.  ... 
doi:10.17863/cam.32372 fatcat:mqjlvtlnmnhmnjeewt7tolpsja

Hiding from Whom?

Ksenia Ermoshina, Francesca Musiani
2018 intermédialités  
non-recoverable symmetric key lengths at 54 bits.  ...  Nonetheless, the standard persisted for years despite serious and known flaws-its International Organization for 260 Standardization (ISO) status not revoked, and agencies such as CSE maintained the standard  ...  For example, the RCMP's Firearms Internet Investigation Support Unit leverages publicly available online 501 open source intelligence to assist in the screening of specific firearm license applicants,  ... 
doi:10.7202/1058473ar fatcat:z2x3cfbpczehjgpmlzxjsfkrd4

The First International Workshop on Enterprise Cloud Computing-Strategies and Solutions

St, Mark Perry, Zaigham Mahmood
2011 unpublished
Internet and Web-based technologies led to new frameworks, languages, mechanisms and protocols for Web applications design and development.  ...  Web Services and applications are supported by a myriad of platforms, technologies, and mechanisms for syntax (mostly XML-based) and semantics (Ontology, Semantic Web).  ...  ACKNOWLEDGMENT The authors thank Marc Martens (Artesis lab industrial automation), for building the hardware mini-processes needed for performing the testing of this paper, and the good collaboration.  ... 
fatcat:bbhwhcilt5ew7l2ljx32ojcoaq

ASITA: Advanced Security Infrastructure for Multi-Agent-Applications in the Telematic Area [article]

Torge Schmidt, Technische Universität Berlin, Technische Universität Berlin, Sahin Albayrak
2002
Crossing borders of domains, means for secured e-commerce even between unknown agents are provided.  ...  This includes never saving keys willfully on a disk, using SmartCards for non-retrieval key storage, using operating system means to prevent memory areas holding keys being swapped to disk, encrypting  ...  The runtime environment is able to automatically release memory no longer referenced. Java also has a stack concept for memory allocation.  ... 
doi:10.14279/depositonce-571 fatcat:dgwm4l74hrem7farocwbphynya

Regulating next generation broadband

Ross Kelso
2008 Telecommunications Journal of Australia  
APIs, EPGs or within the set top box memory or operating system, nor even to associated Internet signals.  ...  Arrangements are also detailed to allocate analogue channels to aspirant access seekers, for an accepted access seeker to supply its own smartcards and STBs for servicing subscribers not already those  ... 
doi:10.2104/tja08007 fatcat:lrzba6vfdfdhjfkqdrry4quhoa

A study on the effect of Quality of Service (QoS) on enterprise cloud storage service adoption

AWAIS SIKANDAR
2021
QoS manages the data traffic for reducing the packet loss or jitter in the network and for accessing the security and privacy many attributes like privacy, data integrity and confidentiality are needed  ...  There is a need to incorporate QoS characteristics in the evaluation of cloud storage services for personal users.  ...  Multifactor authentication systems such as one-time passwords, phone-based authentication and smartcards protect cloud services because they make it harder for attackers to log in with stolen passwords  ... 
doi:10.25401/cardiffmet.15031605.v1 fatcat:2xxyjuea5newbljz3zz6jfaile