The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Given the proliferation of malware and malicious activities, the integrity of communication systems is an ever growing concern. In this work, we propose StaticTrust, an integrity measurement framework which enables a system to evaluate the integrity and state of a remote client prior to providing trusted communication services. StaticTrust is designed for a specific class of network devices that have...
Right now, password authenticated key exchange which enables communication parties to authenticate each other and establish a session key via easily memorable passwords is widely used because of the advantages of simplicity, convenience, adaptability, mobility, and less hardware requirement. In this paper, we will introduce a verifier-based password authenticated key exchange protocol via elliptic...
Poor usability of IT security present a serious security vulnerability which can be exploited to compromise systems that are otherwise secure. This is of particular concern when considering that the majority of people connecting to the Internet are not experts in IT security. Personal firewalls represent the most important security mechanisms for protecting users against Internet security threats...
A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Key management is crucial part of security, this issue is even bigger in MANETs. The distribution of encryption keys in an authenticated manner is a difficult task. Because of dynamic nature of MANETs, when...
In biometric systems, the threat of “spoofing”, where an imposter will fake a biometric trait, has lead to the increased use of multimodal biometric systems. It is assumed that an imposter must spoof all modalities in the system to be accepted. This paper looks at the cases where some but not all modalities are spoofed. The contribution of this paper is to outline a method for assessment of multimodal...
There is an increasing concern that the open GNSS services are highly vulnerable to malicious and accidental denial of service events by low power jammers and location “spoofers” (meaconing). AJAMS (Anti Jamming and Meaconing System) is a new system concept, developed by Thales, built on the back of the services provided by Galileo, which requires no change to the existing Galileo signals or system...
As more and more services and applications are emerging in the Internet, exposing user sensitive data in the Internet becomes more easily. The simplest way to protect the security of sensitive user data is to encrypt the data in advance, and then disclose the data decryption key only to those authorized users. However, the sensitive user data will be leaked while the decryption key is exposed to unauthorized...
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution...
Despite the potential that Cloud Computing has for revolutionizing every aspect of the software industry, there are significant shortcomings in the area of security and risk assessment and mitigation. The basic value proposition of Cloud Computing is that by leasing applications online, companies have the potential to significantly reduce their operating costs. What is not often pointed out however...
Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability...
Doing route selection based in part on source addresses is a form of policy routing, which has started to receive increased amounts of attention. In this paper, we extend our previous work on ROLF (ROuting as the Firewall Layer) to achieve source prefix filtering. This permits easy definition of “inside” and “outside”, even in MANET environment where there...
We present here a data-base firewall to prevent from attacks against MySQL back-end data-base of web applications. It works as a data-base connection proxy, which means that the web applications connect to the DB-FW rather than the original MySQL server directly. The firewall listens SQL query requests from the client as well as analyzes them, and then if they are safe, will call the original MySQL...
Network manufacturing technology has proven an effective approach to achieving integration of the distributed manufacturing resources over Internet. The nature of high interoperability of network manufacturing results in a variety of security threats due to the ultimate dependence upon operating system. Virtualization technology, allowing a monitor and control layer running between operating system...
Achieving trust relationship with privacy preservation is one of the key purposes of identity management. A novel identity management model is proposed to build trust relationship among different parties through identity validation and authentication. A two-way handshake process with two variants is introduced to implement strong mutual authentication between users and service providers without revealing...
In current Xen environment, platform attests its integrity to remote customer through signing the measurements of itself by Attestation Identity Key (AIK) from virtual TPM instance. They believe that this evidence of the platform is credible since the signature of AIK can not be faked. However, this approach ignores the privileged domain and its administrator. Since they could access arbitrary memory...
To effectively implement fair use and rights transfer of digital content in DRM(digital rights management) system, a usage control protocol model MUCON(Multi-UCON) using encryption, digital watermarking technology and traitor tracing technology based on UCON(usage control) is proposed, whose characteristics are feature binding, flexible authorization, traitor tracking, and off-line control. Meanwhile,...
The interaction between business communities becomes a crucial requirement due to the need of exchanging and sharing resources and services. In general, each system defines its own security policy to manage access control to its resources. In this case, we may have security interoperability problems due to the variety and complexity of secured systems implementations. In this paper, we provide a formal...
Global Navigation Satellite System (GNSS) signal authentication is a requirement for a number of applications. GNSS authentication has been proposed with aiding techniques that can be applied to the existing GPS and as a new security function for future GNSS. The paper proposes a concept of a new authentication scheme based on signal authentication sequences that can be integrated in GNSS. The method...
In spite of the existence of security challenges to develop informational and servicing structures, web services are important for organizations. There are so many things done to compensate for their security shortcomings, including replacing security standards in their structure to provide defensive tools such as web services firewall. Due to the is attempting inefficiency of the current Intrusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.