Search results for "Authentication"

showing 10 items of 108 documents

Improving Password Memorability, While Not Inconveniencing the User

2019

Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…

Software_OPERATINGSYSTEMSpassword security behaviorrepetitionComputer sciencepassword memorabilityHuman Factors and ErgonomicsComputer securitycomputer.software_genreEducationPassword strengthmuistaminenPasswordta113AuthenticationRepetition (rhetorical device)turvallisuusGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securityHardware and Architectureuser conveniencekäyttäjäkokemuscomputerpassword verificationSoftwareInternational Journal of Human-Computer Studies
researchProduct

Traceable hierarchical attribute-based authentication for the cloud

2015

When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …

Structure (mathematical logic)HierarchyAuthenticationDatabasebusiness.industryComputer scienceAllowance (money)Cloud computingComputer securitycomputer.software_genreEncryptionbusinessCloud servercomputer2015 IEEE Conference on Communications and Network Security (CNS)
researchProduct

Objectives and Work Plan

2012

The objective of this PhD thesis was the development of fast and sensitive methods for the characterization of vegetable oils according to their botanical origin, and for the characterization and authentication of olive oils in relation to their quality, genetic variety and geographical origin. For this purpose, oils selected considering each and every one of the factors discussed in the introduction section will be used.

Work planRisk analysis (engineering)Computer sciencemedia_common.quotation_subjectQuality (business)Management by objectivesAuthentication (law)media_common
researchProduct

Biometric sensors rapid prototyping on field-programmable gate arrays

2015

AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…

WorkstationBiometricsComputer sciencebusiness.industryData_MISCELLANEOUSFingerprint (computing)EncryptionBiometric Authentication Systems FPGA.Reconfigurable computinglaw.inventionSoftwareArtificial IntelligencelawEmbedded systembusinessField-programmable gate arrayReplay attackSoftwareThe Knowledge Engineering Review
researchProduct

Authentication and authorization security solution for the internet of thing

2021

The Internet of Things (IoT) represents the interconnection between the Internet and physical objects, places and environments. However, this extensive connectivity of IoT can be hampered by malicious interventions from cyber attackers. Thus, ensuring security for users and IoT devices remains a challenge, especially authentication and authorization, which are essential building blocks of the security process. This is due to the unconventional IoT characteristics, including scalability, heterogeneity, interoperability, and dynamic changes, which make the existing security measures inadequate. Indeed, these characteristics bring up several security requirements to consider when defining a se…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]AuthenticationHôtel intelligent[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]SecurityAuthorizationSécuritéSmart HotelAuthentification
researchProduct

HPTLC fingerprinting—rapid method for the differentiation of honeys of different botanical origin based on the composition of the lipophilic fractions

2018

Bee honey possess various nutritional and medicinal functions, which are the result of its diverse chemical composition. The numerous bioactive compounds in honey come from flower nectar

animal structuresPharmaceutical ScienceDandelionfood quality01 natural sciencesArticlehoney fingerprintAnalytical Chemistrylcsh:QD241-441HPTLC0404 agricultural biotechnologylcsh:Organic chemistryDrug DiscoveryNectarSolid phase extractionPhysical and Theoretical ChemistryChemical compositionChromatography High Pressure LiquidChromatographyultrasound assisted extractionMilk ThistleChemistry010401 analytical chemistryOrganic ChemistryExtraction (chemistry)digestive oral and skin physiologyfungisolid phase extractionfood and beverages04 agricultural and veterinary sciencesHoney040401 food scienceThin-layer chromatography0104 chemical sciencesBlowing a raspberryhoney authenticationChemistry (miscellaneous)behavior and behavior mechanismsMolecular MedicineFood AnalysisMolecules
researchProduct

Application Development from Prototype to Beta : A Case Study of the Application SeafarerCV

2018

Master's thesis Multimedia and Educational Technology MM500 - University of Agder 2018 When the prototype of a software product is completed and approved, development of a betaready resource is often the natural step toward a future final release. This process contains many steps that may prove vital to the eventual success or downfall of a future product. Technologies must be chosen, design methodologies must be followed, and care must be given to provide the final product with a solid foundation to build upon. This thesis follows such a development process for the development of resources for beta-testing. This process, as well as the human centered design approaches, and the resulting re…

application success factorshuman-centered designsingle authentication serviceMM500Application developmentdevelopment processVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

Biometric Features for Mobile Agents Ownership

2005

Multi-Agent System (MAS) architectures can be used for e-Business application due their flexibility, scalability and interoperability. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent's actions. Agents, whose ownership was certainly fixed, could operate on behalf of their owner to make transactions, to buy or sell products. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identification information carried by an agent. In this paper, we investigate the possibility of using biometrics in mobile agent systems for owner authentication. Biometric features can be used …

biometric authentication systemsmulti-agent systems security.ComputingMilieux_LEGALASPECTSOFCOMPUTINGagent ownershipComputingMethodologies_ARTIFICIALINTELLIGENCE
researchProduct

An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite Assisted Internet of Things

2022

Recently, integrating satellite networks (e.g. Low-earth-orbit satellite constellation) into the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more reliable, ubiquitous and seamless network services. The LEO satellite networks serves as a key enabler to transform the connectivity across industries and geographical border. Despite the convenience brought from the LEO satellite networks, it arises security concerns, in which the essential one is to secure the communication between the IoT devices and the LEO satellite network. However, some challenges inheriting from the LEO satellite networks need to be considered : 1) the dynamic topology; 2) the resource…

blockchaintodentamineninternet of thingLEO satellite networksalausAuthentication schemetietoliikennesatelliititesineiden internetlohkoketjuttietoturvalangattomat verkot
researchProduct