Search results for "Authentic"

showing 10 items of 203 documents

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Is My Office 365 GDPR Compliant? : Security Issues in Authentication and Administration

2018

The General Data Protection Regulation, commonly referred as GDPR, will be enforced in all European Union countries in May 2018. GDPR sets requirements for processing EU citizens’ personal data regardless of the physical location of the organisation processing the data. Over 40 percent of European organisations are using Office 365. Microsoft claims that Office 365 service is GDPR compliant, and has provided tools to help Office 365 customers to ensure their GDPR compliancy. In this paper, we present some security issues related to the very foundation of Office 365 service, namely Azure Active Directory and administrative tools, and assess their GDPR compliancy. Our findings reveal that per…

ta113Computer scienceinformation securityOffice 365Microsoft OfficeComputer securitycomputer.software_genreAuthentication (law)pilvipalvelutGDPRtietoturvacomputerAdministration (government)Azure
researchProduct

First Year Computing Students' Perceptions of Authenticity in Assessment

2017

The problem of how best to assess student learning is a fundamental one in education. Changes to computer science curricula seek to emphasise teaching practices that promote deep learning through direct, contextual examination of student performance on tasks that resemble those of practitioners, rather than more traditional methods. This kind of "authentic assessment" is becoming more popular as it appears to incorporate employability skills associated with professional practice into the curriculum in a natural way. In this paper, we report on an investigation into how computing students themselves understand the terminology of authentic assessment. We give a brief summary of some of the sa…

ta113learningstudents030504 nursingComputer scienceSituated learningmedia_common.quotation_subject05 social sciences050301 educationEmployabilityTerminology03 medical and health sciencescomputingAuthentic assessmentPerceptionPedagogyComputingMilieux_COMPUTERSANDEDUCATIONNatural (music)0305 other medical science0503 educationCurriculummedia_commonQualitative researchProceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education
researchProduct

Bridging authentic learning task into technology supported transformative pedagogy in Finnish teacher training

2018

The goal of the Finnish teacher training is to educate autonomous teachers, who have pedagogical competence and theoretical understanding about using ICT in teaching and learning. In this study, we describe teacher students’ pedagogical ICT competence as designers of technology supported learning tasks. The study is based on Hughes’ RAT model, which is a framework for assessing technology integration. The theoretical definition of RAT model is technology as a) replacement, b) amplification or c) transformation. To define this there are three systematical dimensions to analyze a particular technology use: Instructional Methods, Student learning processes and Curriculum Goals. The data consis…

ta113teacher studenttieto- ja viestintätekniikkatransformationtaidotopetusBridging (programming)Authentic learningTransformative learningPedagogyComputingMilieux_COMPUTERSANDEDUCATIONta516learning taskict competencePsychologyopettajankoulutus
researchProduct

Authorized authentication evaluation framework for constrained environments

2016

Internetin kasvu ei perustu tällä hetkellä vain uusien solmujen määrään, vaan Internet on levittäytymässä aivan uusille alueille. Viimeaikoina erilaiset tavat kerätä tietoa ja ohjata laitteita uusin tavoin ovat yleistyneet esimerkiksi teollisuudessa, kaupunkiympäristöjen melun ja saasteiden seurannassa. Lisäksi käsitteet älykoti tai -kaupunki alkavat olla yleisesti tunnettuja. Nykyinen kasvu näiden teknologioiden käytössä perustuu pitkälti laitteiden koon pienenemiseen ja hintojen laskuun. Jotta Esineiden Internet pystyy kasvamaan merkittävällä tavalla, laitteiden fyysisten kokojen ja hintojen tulisi pysyä matalalla tasolla tai laskea edelleen. Pieni koko ja hinta tarkoittaa kuitenkin usein…

todentaminenAuthorized AuthenticationInternet of Thingsrajoitetut ympäristötConstrained EnvironmentsAccess controlesineiden internet
researchProduct

Efficient remote authentication

2013

In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that itcan be applied without prior knowledge of theoperating system or the modules on the remote machine. peerReviewed

todentaminentietokoneetetäkäyttöremote authenticationtietoturvavirtuaaliympäristöVirtual machinedatabasedigital rights management
researchProduct

Smart Wireless Sensor Networks and Biometric Authentication for Real Time Traffic Light Junctions Management

2013

The main challenge of intelligent transportation systems (ITS) is to deal with ‘real-time’ information to improve vehicular traffic management. Road data can be processed and used for dynamic traffic light management in order to reduce waiting times in queues. This paper proposes an innovative distributed architecture based on a wireless sensor network (WSN) with a network coordinator providing remote and ubiquitous authentication module for managing unexpected events. The architecture is completed by a dynamic module for street priority management depending on traffic rate. Many experimental trials have been carried out considering three different levels of traffic intensity to prove the e…

traffic lightAuthenticationbusiness.industryComputer scienceFloating car dataWSNAdvanced Traffic Management SystemTraffic intensitywireless sensor networkintelligent transportation systemembedded sensorTraffic shapingbusinessbiometric authentication.Intelligent transportation systemTraffic generation modelWireless sensor networkInformation SystemsComputer network
researchProduct

A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks

2022

Underwater wireless sensor networks (UWSNs) have emerged as the most widely used wireless network infrastructure in many applications. Sensing nodes are frequently deployed in hostile aquatic environments in order to collect data on resources that are severely limited in terms of transmission time and bandwidth. Since underwater information is very sensitive and unique, the authentication of users is very important to access the data and information. UWSNs have unique communication and computation needs that are not met by the existing digital signature techniques. As a result, a lightweight signature scheme is required to meet the communication and computation requirements. In this researc…

underwater wireless sensor networks; certificateless online/offline signature; authentication schemeElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550BiochemistryInstrumentationAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct

Computer Networks

2018

This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.

wireless networksroutersoptical networksnetwork architecturesecurityqueueing systemstelecommunication networksQuality of Service (QoS)radioauthenticationcomputer networksdata securitytelecommunciation trafficwireless sensor networksInternet protocolsenergy efficiency
researchProduct