Showing 1 - 10 of 2,362
security authentication process when accessing remote servers. The security of internet banking application has high level but …€ (Internet for breeders) and “AgromanuaÌlâ€. Two most popular domestic portals – „seznam.cz†and “DatoveÌ schraÌnkyâ …€ (Data boxes) were also included to compare the results of agricultural portals security. The aim of this paper is to point …
Persistent link: https://www.econbiz.de/10011142397
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … continue to influence the way society makes payment for goods and services, the requirement for more advanced security … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the …
Persistent link: https://www.econbiz.de/10009440800
Users are often considered the weakest link in the security chain because of their natural propensity for choosing … user's personal security. However, we don't fully understand the impact on the organisation as a whole when such laxity is … contained in these policies impact on the security of the systems in an organisation. Sometimes a mandated tightening of policy …
Persistent link: https://www.econbiz.de/10010671706
RFID authentication protocols based on symmetric key cryptography. We identify the security and privacy requirements for an … healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy … concerns. To ensure the widespread deployment of this technology, the security and privacy threats must be addressed. However …
Persistent link: https://www.econbiz.de/10009484555
have several essential security and privacy properties. We present a basic yet reasonably expressive language which …
Persistent link: https://www.econbiz.de/10009430549
<Para ID="Par2">In the paper, an integrated approach for the modeling and enforcement of delegation policies in process-aware information systems is presented. In particular, a delegation extension for process-related role-based access control (RBAC) models is specified. The extension is generic in the sense...</para>
Persistent link: https://www.econbiz.de/10011001385
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de/10009430789
utilises the security enhanced 64K microprocessor chip and biometric technology, ensuring a high level of accuracy, enabling …
Persistent link: https://www.econbiz.de/10010670142
Multifactor authentication is a tool to combat identity theft and is mandated by the Federal Financial Institutions … Examination Council. However, there are only a few US financial institutions that have implemented two-factor authentication. A … web authentication technologies that are currently available to financial institutions and provides an interpretation of …
Persistent link: https://www.econbiz.de/10008539400
Multifactor authentication is a tool to combat identity theft and is mandated by the Federal Financial Institutions … Examination Council. However, there are only a few US financial institutions that have implemented two-factor authentication. A … web authentication technologies that are currently available to financial institutions and provides an interpretation of …
Persistent link: https://www.econbiz.de/10005048881