Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








34,341 Hits in 5.3 sec

Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management [article]

Meilof Veeningen, Benne de Weger, Nicola Zannone
2014 arXiv   pre-print
In this work, we propose a general formal framework to analyse and compare communication protocols with respect to privacy by data minimisation.  ...  We use our framework to analyse and compare four identity management systems. Finally, we discuss the completeness and (re)usability of the proposed framework.  ...  In this work, we combine our previous building blocks into a general framework for privacy comparison of communication protocols, and we apply the framework in an identity management case study.  ... 
arXiv:1206.7111v3 fatcat:i4foywc5azbyjdwmxicz3hgap4

Malicious SSL Certificate Detection

Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Liangxiu Han, Umar Raza
2017 Proceedings of the International Conference on Future Networks and Distributed Systems - ICFNDS '17  
2017)Malicious SSL certificate detection: A step towards advanced persistent threat defence.  ...  Within the APT life cycle, continuous communication between infected hosts and Command and Control (C&C) servers is maintained to instruct and guide the compromised machines. ese communications are usually  ...  Moreover, this alert suppression reduces the computational cost of the alert correlation framework.  ... 
doi:10.1145/3102304.3102331 dblp:conf/icfnds/GhafirPHHR17 fatcat:mbncwm5vpzbypalqdiegs5aaua

Framework for media data and owner authentication based on cryptography, watermarking, and biometric authentication

Jana Dittman, Martin Steinebach, Lucilla Croce Ferri, Claus Vielhauer, Ralf Steinmetz, Petra Wohlmacher, Andrew G. Tescher, Bhaskaran Vasudev, V. Michael Bove, Jr.
2001 Multimedia Systems and Applications IV  
As an example we describe general concepts for a content-fragile watermarking approach for digital images and a generic approach for biometric authentication.  ...  We introduce a general framework to protect media data by combining different existing techniques: cryptographic, watermarking and biometric approaches.  ...  Astrid Mayerhöfer supported the design and evaluation of the biometric approach. We would like to thank them for many stimulating discussions and support.  ... 
doi:10.1117/12.448204 fatcat:lraenmkayvft7cmjey6jeryvgy

EDISON Data Science Framework: Part 5. EDSF Use Cases and Applications (EDSF-UCA) Release 4

Yuri Demchenko, Tomasz Wiktorski, Cuadrado Gallego Juan José, Viktoriya Degeler
2022 Zenodo  
economy and Industry 4.0; * Digital and data competences definition and training profiles The EDSF Part 5 Use cases and applications is intended to collect known use cases by the authors and other projects  ...  This document EDSF Use cases and applications (EDSF-UCA) includes the following use cases of using EDSF in curriculum design, skills management, and workplace alignment for new technology/digital transformation  ...  Participation and contribution to both the IG-ETHRD and EDSF Community Initiative are open and free.  ... 
doi:10.5281/zenodo.7506499 fatcat:viksifwsffesngmuzkxthj4apq

Framework for preserving security and privacy in peer-to-peer content distribution systems

Amna Qureshi, David Megías, Helena Rifà-Pous
2015 Expert systems with applications  
We have carried out simulations to evaluate the performance of our framework in terms of imperceptibility, robustness, throughput and content delivery costs.  ...  Our proposed framework is able to resolve the problems of piracy tracing, buyer frameproofness, collusion resistance, dispute resolution and buyer's anonymity.  ...  Acknowledgement This work was partly funded by the Spanish Government through projects TIN2011-27076-C03-02 "CO-PRIVACY" and CONSOLIDER INGENIO 2010 CSD2007-0004 "ARES".  ... 
doi:10.1016/j.eswa.2014.08.053 fatcat:2rhxgptwznaohmyvlfexsouwm4

Quantum certification and benchmarking [article]

J. Eisert, D. Hangleiter, N. Walk, I. Roth, D. Markham, R. Parekh, U. Chabaud, E. Kashefi
2020 arXiv   pre-print
This review provides a brief overview of the known characterization methods of certification, benchmarking, and tomographic recovery of quantum states and processes, as well as their applications in quantum  ...  Concomitant with the rapid development of quantum technologies, challenging demands arise concerning the certification and characterization of devices.  ...  application of these techniques in more general terms.  ... 
arXiv:1910.06343v2 fatcat:f6iv5pyw2newpaeze4x62utowq

EDISON Data Science Framework: Part 5. EDSF Use Cases and Applications (EDSF-UCA) Release 4

Yuri Demchenko, Tomasz Wiktorski, Cuadrado Gallego Juan José, Viktoriya Degeler, Oleg Chertov, Steven Brewer
2022 Zenodo  
economy and Industry 4.0; * Digital and data competences definition and training profiles The EDSF Part 5 Use cases and applications is intended to collect known use cases by the authors and other projects  ...  This document EDSF Use cases and applications (EDSF-UCA) includes the following use cases of using EDSF in curriculum design, skills management, and workplace alignment for new technology/digital transformation  ...  Participation and contribution to both the IG-ETHRD and EDSF Community Initiative are open and free.  ... 
doi:10.5281/zenodo.7538447 fatcat:lw2ogeswovb7dbosrfxyvwusmu

Design and Build a Population Administration Data Collection Application System Using the Zachman Framework

Anti Aprianti, Yayatillah Rubiati, Muhamad Renaldi Aripin, Cecep Warman
2021 International journal of engineering and applied technology  
The results of the correlation analysis of the Zachman Framework model on the system built have a very strong correlation, which implies that the system built through the Zachman Framework approach can  ...  In analyzing the system using the Zachman Framework approach with a Planner, Owner, Designer, and Builder perspective and perspective issues, namely What, How, Where, Who, and When.  ...  (Design and Build a Population Administration Data Collection Application System Using the Zachman Framework) Table 6 . 6 Analysis of the Correlation Results of the X and Y Relationships Correlations  ... 
doi:10.52005/ijeat.v4i1.48 fatcat:giw53xmuxnawbj745mgjljgpqi

Evaluating Trust in Grid Certificates [article]

David O'Callaghan, Louise Doran, Brian Coghlan
2009 arXiv   pre-print
Digital certificates are used to secure international computation and data storage grids used for e-Science projects, like the Worldwide Large Hadron Collider Computing Grid.  ...  We have designed and implemented a program and related test suites for checking X.509 certificates against the certificate profiles and policies relevant for use on the Grid.  ...  Test Framework The requirements on the design of the tool were to provide a way to specify assertions and comparisons of certificates against profiles; and to provide a framework to evaluate a certificate  ... 
arXiv:0910.5920v1 fatcat:kfnaxm4pfrcofasyjjq64ekj7m

Holistic Evaluation of Digital Applications in the Energy Sector—Evaluation Framework Development and Application to the Use Case Smart Meter Roll-Out

Paul Weigel, Manfred Fischedick, Peter Viebahn
2021 Sustainability  
This study proposes a framework for the holistic evaluation of digital applications in the energy sector.  ...  The novelty of the proposed framework is the specific combination of the three methods and its setup to enable sound applicability to the wide variety of digital applications in the energy sector.  ...  Test of the Proposed Framework After the development of the evaluation framework and its adaption to digital applications in the energy sector described in Section 0, a digital application is evaluated  ... 
doi:10.3390/su13126834 fatcat:vh5czbdc2vcbdk3zzkolfciuam

ViewpointCovid-19 digital test certificates and blockchain

Maria Papadaki, Ioannis Karamitsos, Marinos Themistocleous
2021 Journal of Enterprise Information Management  
PurposeThe purpose of this study is to investigate how healthcare and public organizations can control and monitor digital health test certificates with citizens or other stakeholders using Blockchain  ...  The implementation of blockchain applications in the health-care industry will result in a more secure, visible, auditable environment accessible by all the parties involved.Originality/valueIt was identified  ...  There are five available frameworks ( Figure 3 ) and from these Fabric and Burrow frameworks are more suitable for COVID-19 certificates (e.g. both support smart contracts).  ... 
doi:10.1108/jeim-07-2021-554 fatcat:4lbg72pqvjbd7nurs5g3xemuce

A Framework of TPM, SVM and Boot Control for Securing Forensic Logs

Nazanin Borhan, Ramlan Mahmod, Ali Dehghantanha
2012 International Journal of Computer Applications  
Cyber forensics can be one of the important solutions to systematically gather, process, interpret and utilize digital evidence and log of the activities and events of a system is one of the most important  ...  Computer logs files contain the crucial information that is stored and can be an important forensics evidence of attacks and actions of a system.  ...  It basically replaces software protection into hardware based protect by using encryption keys, digital certificates and passwords.  ... 
doi:10.5120/7831-1042 fatcat:dqoes664tvhencv6gjrv2mwze4

SecureABC: Secure AntiBody Certificates for COVID-19 [article]

Chris Hicks and David Butler and Carsten Maple and Jon Crowcroft
2020 arXiv   pre-print
We consider the implications of antibody certificate systems, develop a set of risk-minimising principles and a security framework for their evaluation, and show that these may be satisfied in practice  ...  We use these two protocols to illustrate the utility-privacy trade-offs of antibody certificates and their alternatives.  ...  Whilst the work here specifically considers antibody certificates for COVID-19, our framework of security properties, implementation results and privacy-preserving protocols contribute more generally to  ... 
arXiv:2005.11833v5 fatcat:zqpu3u6xx5bezcyphrgquf7f3y

Certification Authority Liability Analysis

Thomas J. Smedinghoff
1998 Social Science Research Network  
Issue of Certificate Upon approval of the application, the CA will physically generate a certificate and digitally sign it using the CA's private signing key.  ...  They may also consider, with regard to integration clauses, a buyer's lack of sophistication with warranties and contracts in general, and with digital certificate agreements in particular.  ...  Of course, such licenses would only bind the parties to the license, and not the outside world. 742 Securing Ownership of Copyrights Copyright is generally owned by the individual (or individuals) who  ... 
doi:10.2139/ssrn.2602207 fatcat:22shedn4y5dltipim5uahzjyjy

Experts reviews of a cloud forensic readiness framework for organizations

Ahmed Alenezi, Hany F. Atlam, Gary B. Wills
2019 Journal of Cloud Computing: Advances, Systems and Applications  
The factors were comprehensively studied and extracted from the literature; then, the factors were analysed, duplicates were removed, and the factors were categorized and synthesized to produce the framework  ...  Among these concerns are how to conduct a thorough digital investigation in cloud environments and how to be prepared to gather data ahead of time before the occurrence of an incident; indeed, this kind  ...  Availability of data and materials Not applicable.  ... 
doi:10.1186/s13677-019-0133-z fatcat:4j5hj7rhmzgubajo5dnbymvzjq
« Previous Showing results 1 — 15 out of 34,341 results