Filters








8 Hits in 5.1 sec

Security Protocols with Privacy and Anonymity of Users

Nazri bin Abdullah, Sead Muftic
2015 Universal Journal of Communications and Network  
In addition, new technologies are introducing the possibility of innovative applications that require user anonymity.  ...  The solution is based on the concept of a secure application proxy server, special cryptographic protocols, and encapsulated security objects.  ...  Proxy (SP) Server: A server to re-direct user requests to ASPs and SSPs for application and security services.  ... 
doi:10.13189/ujcn.2015.030403 fatcat:fss23xt5rfgrfh5otvbdf4w3gm

Defining security requirements with Common Criteria: applications,adoptions, and challenges [article]

Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, MD Zahidul Islam, Leo Yu Zhang, MD Rafiqul Islam, Warren Armstrong
2022 arXiv   pre-print
Specifically, we share the experiences and lessons gained through the recent Development of Australian Cyber Criteria Assessment (DACCA) project that promotes the CC among stakeholders in ICT security  ...  In this paper, we conduct a systematic review of the CC standards and its adoptions. Adoption barriers of the CC are also investigated based on the analysis of current trends in security evaluation.  ...  Acknowledgements We acknowledge Mr Bosheng Yan's contribution to data collection in relation to Protection Profile development through his internship associated with the Development of Australian Cyber  ... 
arXiv:2201.07417v1 fatcat:zptypqhlqzgzle2ncdi5njqlxu

IoT Software Security Building Blocks [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
The DM App in the SOS for the particular VM verifies and decrypts the data it received from its corresponding VM and then re-encrypts the data with actual RPMB key.  ...  the normal world or regular operating system) from the secure world purely in software through encrypted page tables (EPTs).  ... 
doi:10.1007/978-1-4842-2896-8_4 fatcat:5ffon6fjtnh6rfkpnbtwoxk7ou

Resilient payment systems

Khaled Baqer, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository, Ross Anderson
2018
Towards creating more resilient payment systems, we investigated issues related to security engineering in general, and payment systems in particular.  ...  From Chaum's proposals in the 1980s for private payment systems to micropayments, previous attempts failed to take off for a variety of reasons, including non-existing markets, or issues pertaining to  ...  The application of encrypting email suffers from strong network externalities in that I need my counterparties to encrypt their email too.  ... 
doi:10.17863/cam.32372 fatcat:mqjlvtlnmnhmnjeewt7tolpsja

Green Software [chapter]

Bob Steigerwald, Abhishek Agrawal
2012 Harnessing Green It  
The editorial team at Wiley deserves our commendation for their key roles in publishing this volume and in ensuring its quality.  ...  We thank Professor Ashok Jhunjhunwala in his role as Academic Lead for the IU-ATC in India, and our Theme 6 counterparts at the Indian Institute of Technology Madras.  ...  data using HSM.  ... 
doi:10.1002/9781118305393.ch3 fatcat:epohredblvhg5ei2chbw2fmhpy

Harnessing Green IT: Principles and Practices

San Murugesan
2008 IT Professional Magazine  
In a career spanning over three decades in academia and industry, Dr Murugesan has led several innovative IT projects, provided leadership in teaching and research, and consulted to business, industry  ...  He serves as Associate Editor-in-Chief of IEEE's IT Professional magazine and on the editorial boards of other international journals.  ...  The editorial team at Wiley deserves our commendation for their key roles in publishing this volume and in ensuring its quality.  ... 
doi:10.1109/mitp.2008.10 fatcat:g5np2vq245drvflci2bc7bj4me

Towards understanding and improving the crypto-asset user experience

Artemij Voskobojnikov
2021
This heterogeneity in behaviors was also confirmed through a cluster analysis.  ...  Through this analysis, we identified three distinct types of crypto-asset users, which we labeled as cypherpunks, hodlers, and rookies.  ...  former reduced this risk through portfolio diversification.  ... 
doi:10.14288/1.0401956 fatcat:bw2cgyduuffaphawr2mozsqnsm

Utilising the ArchiMate framework to model secure micromobility services : a review of ArchiMate, security modelling and micromobility enterprise [article]

Augustus William Ellerm, University Of Canterbury
2021
First, a mapping of current micromobility research is provided through the SMS study. This outlines a current lack of micromobility specific research.  ...  These benefits align well with the current needs of enterprise security, with stakeholders showing increasing interest in security governance and compliance.  ...  In [47] the authors discuss communication at a higher layer of abstraction -between enterprises, and how security can be implemented at the interface between enterprises as secure communication between  ... 
doi:10.26021/11071 fatcat:6yvx7pd5ezemxpyeaw7doluyfi