Showing 1 - 10 of 18
ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader … stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be …
Persistent link: https://www.econbiz.de/10009483982
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegation is particularly useful in federated environments where multiple systems, with their own security autonomy, are connected under one common federation. Although many delegation schemes have been...
Persistent link: https://www.econbiz.de/10009437840
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that protects private data through the enforcement of licenses provided by consumers. Prior to supplying data, data owners are...
Persistent link: https://www.econbiz.de/10009438034
This article presents a survey of authorisation models and considers their ‘fitness-for-purpose’ in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities...
Persistent link: https://www.econbiz.de/10009438192
As network capacity has increased over the past decade, individuals and organisations have found it increasingly appealing to make use of remote services in the form of service-oriented architectures and cloud computing services. Data processed by remote services, however, is no longer under the...
Persistent link: https://www.econbiz.de/10009438308
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users? access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer...
Persistent link: https://www.econbiz.de/10009483459
Secure management of Australia's commercial critical infrastructure presents ongoing challenges to both the owners of this infrastructure as well as to the government. It is currently managed through high-level information sharing via collaboration but does this situation suit the commercial...
Persistent link: https://www.econbiz.de/10009483703
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the … to an attacker. The model is based on a graphical authentication application previously developed called Authentigraph. …
Persistent link: https://www.econbiz.de/10009440800
reader’s signals. Along thisvein, a class of ultralightweight RFID authentication protocols has been designed,which uses only …
Persistent link: https://www.econbiz.de/10009461313
(Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol … we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of …
Persistent link: https://www.econbiz.de/10009483920