The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern business goals are often fulfilled with workflows that may cross many organisations and utilise services on a variety of devices and/or supported by different platforms. Current workflows are inherently context-aware. Each context is governed and constrained by its own policies and rules to prevent unauthorised participants from executing sensitive tasks and also to prevent tasks from accessing...
Recently, Wang et al. showed that Das et al.'s dynamic ID-based remote user authentication scheme is vulnerable to an impersonation attack and can not achieve mutual authentication. Consequently, a more efficient and secure dynamic ID-based remote user authentication scheme was proposed and claimed that it was now secure and of practical value. However, in this paper, we will show that Wang et al...
This paper proposed a personal authentication system using small resources for home use. The following three goals were achieved at the same time by this system: (1) identification of each individual, (2) unique existence of each individual in the specified time and space, and (3) no contradiction in the existence of each individual in view of the space and the time before and after an event. Considering...
Security problems arise in software systems are very challenging. Using program analysis techniques and some language based security rules can help in enforcing application-level security through control access to program resources and verification of control flow of the information inside the program based on some security properties. This paper presents a new job analyzer component for an intrusion...
Recently, Khan et al. showed that Wang et al.'s dynamic ID-based remote user authentication scheme is not feasible for real-life implementations such as without preserving anonymity of a user during authentication, user cannot choose the password he/she wants, no provision for revocation of lost or stolen smart card, and can not provide session key agreement. Consequently, an improved version of dynamic...
Many existing grid authorization systems adopt an inefficient structure of storing security policies for the available resources. That leads to huge repetitions in checking security rules. One of the efficient mechanisms that handle these repetitions is the Hierarchical Clustering Mechanism (HCM) [1]. HCM reduces the redundancy in checking security rules compared to the Brute Force Approach as well...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.