Filters








55 Hits in 2.0 sec

Smartcard Firewalls Revisited [chapter]

Henrich C. Pöhls, Joachim Posegga
2006 Lecture Notes in Computer Science  
We envision in particular a proxy firewall running on a smartcard and combining the best of both worlds: the smartcard as a secure environment, and the proxy firewall for securing the network.  ...  Facilitating the various security options smartcards offer, we show how to design a secure network firewall on a smartcard. We illustrate the usefulness of such a device in several scenarios.  ...  Towards a Firewall on a Networked Smartcard In order to securely act as a network firewall, all TCP/IP packets must be securely routed through the smartcard and subsequently through the firewall application  ... 
doi:10.1007/11733447_13 fatcat:jimmv6tdmrbcjooceel5yqkuaa

Attacks on Java Card 3.0 Combining Fault and Logical Attacks [chapter]

Guillaume Barbu, Hugues Thiebeauld, Vincent Guerin
2010 Lecture Notes in Computer Science  
Today fault attacks represent certainly the most powerful threat for smartcards.  ...  Java Card 3.0: A Set of New Security Features The complete specifications of the Java Card 3 Connected Edition have been revisited and enriched by new requirements to ensure a very high level of security  ... 
doi:10.1007/978-3-642-12510-2_11 fatcat:rlbzvlmhczf5fhomketqnkghuy

Formalizing the safety of Java, the Java virtual machine, and Java card

Pieter H. Hartel, Luc Moreau
2001 ACM Computing Surveys  
We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smartcards.  ...  Instead some of the formalization needs to be revisited.  ...  Section 5.3 revisits class loading from the JVM point of view.  ... 
doi:10.1145/503112.503115 fatcat:xg4uc2jgjbdhpaxism3f6cr42i

The Geometric Efficient Matching Algorithm for Firewalls

Dmitry Rovniagin, Avishai Wool
2011 IEEE Transactions on Dependable and Secure Computing  
Firewall packet matching can be viewed as a point location problem: Each packet (point) has five fields (dimensions), which need to be checked against every firewall rule in order to find the first matching  ...  Some firewalls treat UDP traffic as connection-oriented and perform state lookups on UDP packets as well. Fig. 1 . Excerpts from a Cisco PIX firewall configuration file, showing two rules.  ...  Contributions In this paper, we revisit a classical algorithm from computational geometry (cf., [10] , [22] ), and apply it to the firewall packet matching.  ... 
doi:10.1109/tdsc.2009.28 fatcat:lmmhq6yhrjaq5e4risb57l22la

GEOMETRIC EFFICIENT MATCHING ALGORITHM FOR FIREWALLS

Phaltane Anjali.D .
2014 International Journal of Research in Engineering and Technology  
Firewall packet matching can be viewed as a point location problem: Each packet (point) has five fields (dimensions), which need to be checked against every firewall rule in order to find the first matching  ...  Some firewalls treat UDP traffic as connection-oriented and perform state lookups on UDP packets as well. Fig. 1 . Excerpts from a Cisco PIX firewall configuration file, showing two rules.  ...  Contributions In this paper, we revisit a classical algorithm from computational geometry (cf., [10] , [22] ), and apply it to the firewall packet matching.  ... 
doi:10.15623/ijret.2014.0302107 fatcat:6c2hsndjy5gkddgvu2owxyapy4

A team collaboration space supporting capture and access of virtual meetings

Werner Geyer, Heather Richter, Ludwin Fuchs, Tom Frauenhofer, Shahrokh Daijavad, Steven Poltrock
2001 Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work - GROUP '01  
Using the mobile device as a Smartcard will also facilitate switching between different work modes.  ...  People work in individual mode to plan meetings, prepare an agenda, or revisit minutes from a past meeting.  ... 
doi:10.1145/500312.500315 fatcat:ekgyisz3pzh7jbgh35bzsuwl5a

A team collaboration space supporting capture and access of virtual meetings

Werner Geyer, Heather Richter, Ludwin Fuchs, Tom Frauenhofer, Shahrokh Daijavad, Steven Poltrock
2001 Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work - GROUP '01  
Using the mobile device as a Smartcard will also facilitate switching between different work modes.  ...  People work in individual mode to plan meetings, prepare an agenda, or revisit minutes from a past meeting.  ... 
doi:10.1145/500286.500315 dblp:conf/group/GeyerRFFDP01 fatcat:hoxhhbkfqbhubntvios6fqammq

Wie OT Security Engineering eine Ingenieurwissenschaft wird

Heiko Rudolph
2019 atp edition - Automatisierungstechnische Praxis  
Token, Smartcard, Zertifikat) und körperliche Merkmale (z. B. Fingerabdruck, Iriserkennung) unterschieden.  ...  (...) 6.2.8 ICS-Revisited • 6.3.3 Netzebene Neben den kabelgebundenen Netzen sind im Rahmen des Audits auch Funknetze zu überprüfen.  ... 
doi:10.17560/atp.v61i8.2410 fatcat:qur7dnciqnfo7dakpj2lelifn4

Exploring the Reasons for a Failure of Electronic Payment Systems: A Case Study of and Australian Company

Benjamin Lim, Heejin Lee, Sherah Kurnia
2007 Journal of research and practice in information technology  
and then a page with a lot of stuff on it and it wasn't really obvious why you needed all that stuff necessarily and it was never really revisited.  ...  Rose et al (1999) strongly recommend that organisations engaged in electronic transactions employ security measures such as encryption and firewalls.  ...  Finally, in light of the success of the iTunes music store and the emergence of micropayments via mobile phones, the issue of micropayments needs to be revisited.  ... 
dblp:journals/acj/LimLK07 fatcat:7ljsa3442jcz7ff4pcxvljdpk4

Towards Applying Cryptographic Security Models to Real-World Systems

Jochen Rill
2020
Firewalls Revisited In this section, we will apply our improved model to the previously discussed example of the three firewall architecture.  ...  No Authentication Using Smartcards Without Additional Trust By default, EMV uses smartcards containing shared secrets with the bank in order to authenticate transactions.  ... 
doi:10.5445/ir/1000118648 fatcat:nwrx3zmbtjb7hbmqvqp7zih4eu

Palantir

Himanshu Khurana, Jim Basney, Mehedi Bakht, Mike Freemon, Von Welch, Randy Butler
2009 Proceedings of the 8th Symposium on Identity and Trust on the Internet - IDtrust '09  
For strong two-factor authentication, we support both one-time password (OTP) hardware tokens and PKI-based smartcards.  ...  When the smartcard is unlocked, it authenticates to the server via the TLS protocol using private cryptographic data residing on the card.  ... 
doi:10.1145/1527017.1527023 dblp:conf/idtrust/KhuranaBBFWB09 fatcat:c5fjluikrfdwndn6w4zi6nbuqi

Formalising Java Safety—An Overview [chapter]

Pieter H. Hartel
2000 Smart Card Research and Advanced Applications  
ALTERNATIVE REPRESENTATION Grimaud et al [20] propose the FACADE intermediate language specifically for use on smartcards.  ...  VERIFICATION REVISITED A small footprint device (a smart card) does not have enough memory to perform byte code verification.  ... 
doi:10.1007/978-0-387-35528-3_7 fatcat:56uqzqoh6nbbllkysyxqwwiz44

How to Disembed a Program? [chapter]

Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
2004 Lecture Notes in Computer Science  
Unlike a smartcard, the XµP contains no ROM at all.  ...  We revisit this model by alleviating the integrity assumption on the executed program, explicitly allowing malevolent and arbitrary modifications of its contents.  ...  Complexity grew to the point where current cards are nothing but miniature computers embarking a linker, a loader, a Java virtual machine, remote method invocation modules, a bytecode verifier, an applet firewall  ... 
doi:10.1007/978-3-540-28632-5_32 fatcat:5d4lxwbnundrlkzklirsuppske

The Eavesdropping Employer: A Twenty-First Century Framework for Employee Monitoring

Corey Ciocchetti
2010 Social Science Research Network  
Elizabeth Wilborn, Revisiting the Public/Private Distinction: Employee Monitoring in the Workplace, 32 GA. L.  ...  ., How To Bypass a Firewall or Internet Filter, WIKIHOW.COM, http:// www.wikihow.com/Bypass-a-Firewall-or-Internet-Filter (last visited May 23, 2010).  ... 
doi:10.2139/ssrn.1617785 fatcat:aylkuclying5tid54lk6rcgpeq

Worst-case resource-usage analysis of java card classic editions application bytecode

Luke Dominic Mark Urquhart, Chris Hankin
2016
Java Card is the dominant smartcard technology in use today, with over 12 billion Java Card smartcards having shipped globally in the last 15 years.  ...  Almost exclusively, the deployed Java Card smartcards are instances of a Classic edition for which garbage collection is an optional component in even the most recent Classic edition.  ...  Smartcards What is a smartcard? In what areas are they used?  ... 
doi:10.25560/42538 fatcat:ucdmho3jrzawzmtgafz3yd6vqq
« Previous Showing results 1 — 15 out of 55 results