The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Road networks are the most important facility to the public transportation in modern cities. Governments around the world allocate large amounts of budgets for the pavement maintenance every year. In this paper, we proposed a crowdsourcing solution to categorize road anomalies into safety related anomalies such as speed bumps and rumble strips, and dangerous anomalies such as bumps and potholes. The...
BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even...
This article contains analysis and comparison of different standards that implement Single Sign-On technology in context of their applicability to constructing security infrastructure of a distributed information-computing environment. Various non-proprietary protocols responsible for different aspects of secure information exchange were examined for creating a single authentication and authorization...
In this paper, we propose a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol [16]. As a distinguishing feature, AugMQTT does not require any certificate validation checks and certificate revocation checks on both publishers/subscribers and broker sides. Also, we discuss several aspects of AugMQTT followed by performance overhead of the AugPAKE protocol...
Globus Auth is a foundational identity and access management platform service designed to address unique needs of the science and engineering community. It serves to broker authentication and authorization interactions between end-users, identity providers, resource servers (services), and clients (including web, mobile, desktop, and command line applications, and other services). Globus Auth thus...
Digital TV broadcast technology is growing rapidly. One among many digital TV standards that has been develoved is DVB standard. When we want to use non-DVB enabler device such as general smartphone as a DVB receiver, we need to develop applications that can run on that device. In this paper, it is presented how we develop such application and emphasize in designing Electronic Service Guide (ESG)...
eScience middleware frameworks integrating multiple virtual organizations must incorporate comprehensive user identity and access management solutions. In this paper we examine usage patterns for these systems and map the patterns to widely used security standards and approaches. We focus on science gateways, a class of distributed system cyberinfrastructure. Science gateways are end user environments...
In the development of a new software solution, users and developers spend the majority of their effort on modeling the functional requirements. The Non-Functional Requirements (NFR) are treated as a second class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or forgotten. They are neglected because NFRs are often...
A Radio Frequency Identification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. The restricted computation ability and limited memory space of low-cost tags make existing RFID systems vulnerable. EPC Class 1 Generation 2 (EPC-C1G2) is the most popular standard for low cost passive RFID tags. For improving security of this standard; many security schemes...
Cloud computing model has been among the main stream popular new technologies by providing services such as software, platform and infrastructure. In the process of providing better services for customers, cloud service providers have developed proprietary standards on how cloud application interacts with their cloud. This has been limiting the cloud adoption because of the vendor lock-in and portability...
Secure communication and authentication are two very important factors when it comes to applications such as payments. Since payments involve critical information such as user account number, pin, balance, etc., it becomes very vulnerable to fraudulent elements that want to gain access to this information illegally. Thus, this hardware and algorithm aims at creating a mobile payment terminal through...
The typical result of an entire digital film production chain are multiple versions of a media file. This constitutes a great challenge in creating and managing for content creators. Especially in post production processes, different versions arise for final distribution of several resolutions, frame rates, languages and subtitles. The Interoperable Master Format (IMF) is a uniform master standard...
In industrial production scenarios, there is often a need to access heterogeneous information sources such as production units but also DBMS (Data base management system) and/or a local or shared file system to realize the necessary workflows. EDDL (Electronic Device Description Language) provides a standardized way to access and exchange information with the devices that make up the automation system...
The appearance of high-performance connectivity (e.g. Automotive Ethernet, C2X Communication) will enable seamless integration of cloud-based services into the vehicle's Electric/Electronic (E/E) architecture. This new development poses several challenges regarding in-vehicle communication such as the need for runtime adaptive communication or the establishment of continuous connectivity between functionality...
Recently, different RFID authentication protocols conforming to EPC Class 1 Generation 2 (EPC C1 G2) standard have been proposed. In 2013, Xiao et al. have proposed an improved mutual authentication protocol which claimed to eliminate the weaknesses of Yoon's protocol that has been proposed in 2012. In this paper, we study the security and the privacy of Xiao et al.'s protocol. It is shown that their...
The vision behind the Internet of Things (IoT) is that any things that need communications, are universally connected, and becoming an integral part of the future Internet. However, the existing of Low Power Networks (LPN) consisting of battery-powered nodes poses great challenge for traditional addressing and routing protocols. The paper proposes a geographical topology-enabled IPv6 addressing framework...
Anonymous password-based authenticated key exchange (APAKE) protocols are a topic of ongoing research interest. However, the security of existing APAKE protocols is generally provided in the random oracle model, and in these protocols, passwords are stored in cleartext on the server. However, proofs of security in the random oracle model do not necessarily imply security in the real world. Recent...
With the prevalence of JavaScript, Cross-site Scripting based on Document Object Model (DOM-based XSS) has become one of critical threats to client-side Web applications. To detect DOM-based XSS vulnerabilities, a variety of tools have been developed, providing different features and abilities. Both for developers and tool users, the benchmark plays an important role in evaluating the effectiveness...
Data sharing is a significant functionality in cloud storage. These cloud storage provider are answerable for keeping the data obtainable and available in addition to the physical environment protected and running. Here we can securely, efficiently, and flexibly share data with others in cloud storage. A new public-key cryptosystems is planned which create constant-size cipher texts such that efficient...
Many identity federations are designed to be used with web browsers. This paper proposes an approach for integrating non web-based applications with web-based identity federations using Kerberos protocol. We evaluate this approach by making NFS server available for users of SAML-based identity federation of Baden-Württemberg state of Germany. We make use of LDAP-Facade software for federating non...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.