Showing 1 - 10 of 305
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … continue to influence the way society makes payment for goods and services, the requirement for more advanced security … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the …
Persistent link: https://www.econbiz.de/10009440800
RFID authentication protocols based on symmetric key cryptography. We identify the security and privacy requirements for an … healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy … concerns. To ensure the widespread deployment of this technology, the security and privacy threats must be addressed. However …
Persistent link: https://www.econbiz.de/10009484555
have several essential security and privacy properties. We present a basic yet reasonably expressive language which …
Persistent link: https://www.econbiz.de/10009430549
an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When … discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions … prove its correctness and security. - We describe a new searchable encryption scheme that exceeds existing analogues with …
Persistent link: https://www.econbiz.de/10009467071
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de/10009430789
disadvantages such as security, privacy, reliability, physical location of data and the unavailability of service due to crashes or …
Persistent link: https://www.econbiz.de/10009434867
risk is placed on the security and privacy of the data. PVI, LoBot, and TVEM provide a means for clients to establish trust … in cloud platforms, thus reducing their risk exposure. PVI is a new management and security model that shares the … responsibility of security management in cloud computing between the service provider and client, decreasing the risk exposure to …
Persistent link: https://www.econbiz.de/10009439441
. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an … operations • A robust business environment that requires connections among the control system domain, the external Internet, and …
Persistent link: https://www.econbiz.de/10009436060
interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process … universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that …, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture …
Persistent link: https://www.econbiz.de/10009436673
site while not hindering the lab's open connectivity with the Internet, we implemented a pseudo three-tier architecture for … behind a firewall, and access was granted via an encrypted link to a thin client. Authentication in the future will be … ports and an automated installation process that included SMB signing and disabling LM Authentication in favor of NTLMv2 …
Persistent link: https://www.econbiz.de/10009436886