A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management
[article]
2014
arXiv
pre-print
In this work, we propose a general formal framework to analyse and compare communication protocols with respect to privacy by data minimisation. ...
We use our framework to analyse and compare four identity management systems. Finally, we discuss the completeness and (re)usability of the proposed framework. ...
In this work, we combine our previous building blocks into a general framework for privacy comparison of communication protocols, and we apply the framework in an identity management case study. ...
arXiv:1206.7111v3
fatcat:i4foywc5azbyjdwmxicz3hgap4
Malicious SSL Certificate Detection
2017
Proceedings of the International Conference on Future Networks and Distributed Systems - ICFNDS '17
2017)Malicious SSL certificate detection: A step towards advanced persistent threat defence. ...
Within the APT life cycle, continuous communication between infected hosts and Command and Control (C&C) servers is maintained to instruct and guide the compromised machines. ese communications are usually ...
Moreover, this alert suppression reduces the computational cost of the alert correlation framework. ...
doi:10.1145/3102304.3102331
dblp:conf/icfnds/GhafirPHHR17
fatcat:mbncwm5vpzbypalqdiegs5aaua
Framework for media data and owner authentication based on cryptography, watermarking, and biometric authentication
2001
Multimedia Systems and Applications IV
As an example we describe general concepts for a content-fragile watermarking approach for digital images and a generic approach for biometric authentication. ...
We introduce a general framework to protect media data by combining different existing techniques: cryptographic, watermarking and biometric approaches. ...
Astrid Mayerhöfer supported the design and evaluation of the biometric approach. We would like to thank them for many stimulating discussions and support. ...
doi:10.1117/12.448204
fatcat:lraenmkayvft7cmjey6jeryvgy
EDISON Data Science Framework: Part 5. EDSF Use Cases and Applications (EDSF-UCA) Release 4
2022
Zenodo
economy and Industry 4.0; * Digital and data competences definition and training profiles The EDSF Part 5 Use cases and applications is intended to collect known use cases by the authors and other projects ...
This document EDSF Use cases and applications (EDSF-UCA) includes the following use cases of using EDSF in curriculum design, skills management, and workplace alignment for new technology/digital transformation ...
Participation and contribution to both the IG-ETHRD and EDSF Community Initiative are open and free. ...
doi:10.5281/zenodo.7506499
fatcat:viksifwsffesngmuzkxthj4apq
Framework for preserving security and privacy in peer-to-peer content distribution systems
2015
Expert systems with applications
We have carried out simulations to evaluate the performance of our framework in terms of imperceptibility, robustness, throughput and content delivery costs. ...
Our proposed framework is able to resolve the problems of piracy tracing, buyer frameproofness, collusion resistance, dispute resolution and buyer's anonymity. ...
Acknowledgement This work was partly funded by the Spanish Government through projects TIN2011-27076-C03-02 "CO-PRIVACY" and CONSOLIDER INGENIO 2010 CSD2007-0004 "ARES". ...
doi:10.1016/j.eswa.2014.08.053
fatcat:2rhxgptwznaohmyvlfexsouwm4
Quantum certification and benchmarking
[article]
2020
arXiv
pre-print
This review provides a brief overview of the known characterization methods of certification, benchmarking, and tomographic recovery of quantum states and processes, as well as their applications in quantum ...
Concomitant with the rapid development of quantum technologies, challenging demands arise concerning the certification and characterization of devices. ...
application of these techniques in more general terms. ...
arXiv:1910.06343v2
fatcat:f6iv5pyw2newpaeze4x62utowq
EDISON Data Science Framework: Part 5. EDSF Use Cases and Applications (EDSF-UCA) Release 4
2022
Zenodo
economy and Industry 4.0; * Digital and data competences definition and training profiles The EDSF Part 5 Use cases and applications is intended to collect known use cases by the authors and other projects ...
This document EDSF Use cases and applications (EDSF-UCA) includes the following use cases of using EDSF in curriculum design, skills management, and workplace alignment for new technology/digital transformation ...
Participation and contribution to both the IG-ETHRD and EDSF Community Initiative are open and free. ...
doi:10.5281/zenodo.7538447
fatcat:lw2ogeswovb7dbosrfxyvwusmu
Design and Build a Population Administration Data Collection Application System Using the Zachman Framework
2021
International journal of engineering and applied technology
The results of the correlation analysis of the Zachman Framework model on the system built have a very strong correlation, which implies that the system built through the Zachman Framework approach can ...
In analyzing the system using the Zachman Framework approach with a Planner, Owner, Designer, and Builder perspective and perspective issues, namely What, How, Where, Who, and When. ...
(Design and Build a Population Administration Data Collection Application System Using the Zachman Framework)
Table 6 . 6 Analysis of the Correlation Results of the X and Y Relationships Correlations ...
doi:10.52005/ijeat.v4i1.48
fatcat:giw53xmuxnawbj745mgjljgpqi
Evaluating Trust in Grid Certificates
[article]
2009
arXiv
pre-print
Digital certificates are used to secure international computation and data storage grids used for e-Science projects, like the Worldwide Large Hadron Collider Computing Grid. ...
We have designed and implemented a program and related test suites for checking X.509 certificates against the certificate profiles and policies relevant for use on the Grid. ...
Test Framework The requirements on the design of the tool were to provide a way to specify assertions and comparisons of certificates against profiles; and to provide a framework to evaluate a certificate ...
arXiv:0910.5920v1
fatcat:kfnaxm4pfrcofasyjjq64ekj7m
Holistic Evaluation of Digital Applications in the Energy Sector—Evaluation Framework Development and Application to the Use Case Smart Meter Roll-Out
2021
Sustainability
This study proposes a framework for the holistic evaluation of digital applications in the energy sector. ...
The novelty of the proposed framework is the specific combination of the three methods and its setup to enable sound applicability to the wide variety of digital applications in the energy sector. ...
Test of the Proposed Framework After the development of the evaluation framework and its adaption to digital applications in the energy sector described in Section 0, a digital application is evaluated ...
doi:10.3390/su13126834
fatcat:vh5czbdc2vcbdk3zzkolfciuam
ViewpointCovid-19 digital test certificates and blockchain
2021
Journal of Enterprise Information Management
PurposeThe purpose of this study is to investigate how healthcare and public organizations can control and monitor digital health test certificates with citizens or other stakeholders using Blockchain ...
The implementation of blockchain applications in the health-care industry will result in a more secure, visible, auditable environment accessible by all the parties involved.Originality/valueIt was identified ...
There are five available frameworks ( Figure 3 ) and from these Fabric and Burrow frameworks are more suitable for COVID-19 certificates (e.g. both support smart contracts). ...
doi:10.1108/jeim-07-2021-554
fatcat:4lbg72pqvjbd7nurs5g3xemuce
A Framework of TPM, SVM and Boot Control for Securing Forensic Logs
2012
International Journal of Computer Applications
Cyber forensics can be one of the important solutions to systematically gather, process, interpret and utilize digital evidence and log of the activities and events of a system is one of the most important ...
Computer logs files contain the crucial information that is stored and can be an important forensics evidence of attacks and actions of a system. ...
It basically replaces software protection into hardware based protect by using encryption keys, digital certificates and passwords. ...
doi:10.5120/7831-1042
fatcat:dqoes664tvhencv6gjrv2mwze4
SecureABC: Secure AntiBody Certificates for COVID-19
[article]
2020
arXiv
pre-print
We consider the implications of antibody certificate systems, develop a set of risk-minimising principles and a security framework for their evaluation, and show that these may be satisfied in practice ...
We use these two protocols to illustrate the utility-privacy trade-offs of antibody certificates and their alternatives. ...
Whilst the work here specifically considers antibody certificates for COVID-19, our framework of security properties, implementation results and privacy-preserving protocols contribute more generally to ...
arXiv:2005.11833v5
fatcat:zqpu3u6xx5bezcyphrgquf7f3y
Certification Authority Liability Analysis
1998
Social Science Research Network
Issue of Certificate Upon approval of the application, the CA will physically generate a certificate and digitally sign it using the CA's private signing key. ...
They may also consider, with regard to integration clauses, a buyer's lack of sophistication with warranties and contracts in general, and with digital certificate agreements in particular. ...
Of course, such licenses would only bind the parties to the license, and not the outside world. 742
Securing Ownership of Copyrights Copyright is generally owned by the individual (or individuals) who ...
doi:10.2139/ssrn.2602207
fatcat:22shedn4y5dltipim5uahzjyjy
Experts reviews of a cloud forensic readiness framework for organizations
2019
Journal of Cloud Computing: Advances, Systems and Applications
The factors were comprehensively studied and extracted from the literature; then, the factors were analysed, duplicates were removed, and the factors were categorized and synthesized to produce the framework ...
Among these concerns are how to conduct a thorough digital investigation in cloud environments and how to be prepared to gather data ahead of time before the occurrence of an incident; indeed, this kind ...
Availability of data and materials Not applicable. ...
doi:10.1186/s13677-019-0133-z
fatcat:4j5hj7rhmzgubajo5dnbymvzjq
« Previous
Showing results 1 — 15 out of 34,341 results