Showing 1 - 8 of 8
ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader … stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be …
Persistent link: https://www.econbiz.de/10009483982
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegation is particularly useful in federated environments where multiple systems, with their own security autonomy, are connected under one common federation. Although many delegation schemes have been...
Persistent link: https://www.econbiz.de/10009437840
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that protects private data through the enforcement of licenses provided by consumers. Prior to supplying data, data owners are...
Persistent link: https://www.econbiz.de/10009438034
As network capacity has increased over the past decade, individuals and organisations have found it increasingly appealing to make use of remote services in the form of service-oriented architectures and cloud computing services. Data processed by remote services, however, is no longer under the...
Persistent link: https://www.econbiz.de/10009438308
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users? access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer...
Persistent link: https://www.econbiz.de/10009483459
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the … to an attacker. The model is based on a graphical authentication application previously developed called Authentigraph. …
Persistent link: https://www.econbiz.de/10009440800
(Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol … we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of …
Persistent link: https://www.econbiz.de/10009483920
studies how the three types of trust - ability, benevolence, and integrity impact on knowledge transfer from the inter … integrity and benevolence varied across organisations suggesting that there can be a possible impact of organisational factors …
Persistent link: https://www.econbiz.de/10009437913