Search results for "Authentication"
showing 10 items of 108 documents
Improving Password Memorability, While Not Inconveniencing the User
2019
Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…
Traceable hierarchical attribute-based authentication for the cloud
2015
When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …
Objectives and Work Plan
2012
The objective of this PhD thesis was the development of fast and sensitive methods for the characterization of vegetable oils according to their botanical origin, and for the characterization and authentication of olive oils in relation to their quality, genetic variety and geographical origin. For this purpose, oils selected considering each and every one of the factors discussed in the introduction section will be used.
Biometric sensors rapid prototyping on field-programmable gate arrays
2015
AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…
Authentication and authorization security solution for the internet of thing
2021
The Internet of Things (IoT) represents the interconnection between the Internet and physical objects, places and environments. However, this extensive connectivity of IoT can be hampered by malicious interventions from cyber attackers. Thus, ensuring security for users and IoT devices remains a challenge, especially authentication and authorization, which are essential building blocks of the security process. This is due to the unconventional IoT characteristics, including scalability, heterogeneity, interoperability, and dynamic changes, which make the existing security measures inadequate. Indeed, these characteristics bring up several security requirements to consider when defining a se…
HPTLC fingerprinting—rapid method for the differentiation of honeys of different botanical origin based on the composition of the lipophilic fractions
2018
Bee honey possess various nutritional and medicinal functions, which are the result of its diverse chemical composition. The numerous bioactive compounds in honey come from flower nectar
Application Development from Prototype to Beta : A Case Study of the Application SeafarerCV
2018
Master's thesis Multimedia and Educational Technology MM500 - University of Agder 2018 When the prototype of a software product is completed and approved, development of a betaready resource is often the natural step toward a future final release. This process contains many steps that may prove vital to the eventual success or downfall of a future product. Technologies must be chosen, design methodologies must be followed, and care must be given to provide the final product with a solid foundation to build upon. This thesis follows such a development process for the development of resources for beta-testing. This process, as well as the human centered design approaches, and the resulting re…
Decision-cache based XACML authorisation and anonymisation for XML documents
2012
Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…
Biometric Features for Mobile Agents Ownership
2005
Multi-Agent System (MAS) architectures can be used for e-Business application due their flexibility, scalability and interoperability. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent's actions. Agents, whose ownership was certainly fixed, could operate on behalf of their owner to make transactions, to buy or sell products. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identification information carried by an agent. In this paper, we investigate the possibility of using biometrics in mobile agent systems for owner authentication. Biometric features can be used …
An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite Assisted Internet of Things
2022
Recently, integrating satellite networks (e.g. Low-earth-orbit satellite constellation) into the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more reliable, ubiquitous and seamless network services. The LEO satellite networks serves as a key enabler to transform the connectivity across industries and geographical border. Despite the convenience brought from the LEO satellite networks, it arises security concerns, in which the essential one is to secure the communication between the IoT devices and the LEO satellite network. However, some challenges inheriting from the LEO satellite networks need to be considered : 1) the dynamic topology; 2) the resource…