Search results for "Computer Security"

showing 10 items of 433 documents

LynxNet: Wild Animal Monitoring Using Sensor Networks

2010

Monitoring wild animals, especially those that are becoming endangered (for example, lynxes and wolves) is important for biology researchers. Solutions for the monitoring already exist; however, they all have drawbacks, such as limited range or lifetime, sensing modality, reporting delays, unreliability of operation. In this work we describe our experiences in designing an improved animal monitoring sensor system and low-level software for sensor node control and communication. The target animals for this particular research are wild lynxes or canines, however it can be extended to other animal species. The LynxNet system is based on tracking collars, built around TMote Mini sensor nodes, s…

Modality (human–computer interaction)business.industryReal-time computingComputer securitycomputer.software_genreAnimal monitoringGeneralLiterature_MISCELLANEOUSKey distribution in wireless sensor networksBase stationSensor nodeGlobal Positioning SystemMobile wireless sensor networkbusinesscomputerWireless sensor network
researchProduct

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther

2016

Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…

Model checkingAuthenticationTheoretical computer scienceComputer sciencebusiness.industry020206 networking & telecommunicationsCryptography02 engineering and technologyMutual authenticationCryptographic protocolComputer securitycomputer.software_genreKey authenticationDiscrete logarithmAuthentication protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputer2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
researchProduct

Survey of Formal Verification Methods for Smart Contracts on Blockchain

2019

Due to the immutable nature of distributed ledger technology such as blockchain, it is of utter importance that a smart contract works as intended before employment outside test network. This is since any bugs or errors will become permanent once published to the live network, and could lead to substantial economic losses; as manifested in the infamous DAO smart contract exploit hack in 2016. In order to avoid this, formal verification methods can be used to ensure that the contract behaves according to given specifications. This paper presents a survey of the state of the art of formal verification of smart contracts. Being a relatively new research area, a standard or best practice for fo…

Model checkingSmart contractExploitComputer science020206 networking & telecommunications02 engineering and technologyFormal methodsComputer securitycomputer.software_genreSyntax (logic)Automated theorem provingOrder (business)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingFormal verificationcomputer2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

US scorn for treaties hasn't improved nuclear security

2006

MultidisciplinaryPolitical scienceComputer securitycomputer.software_genrecomputerNature
researchProduct

Toward an Integrated System for Surveillance and Behaviour Analysis of Groups and People

2013

Security and INTelligence SYStem is an Italian research project which aims to create an integrated system for the analysis of multi-modal data sources (text, images, video, audio), to assist operators in homeland security applications. Within this project the Scientific Research Unit of the University of Palermo is responsible of the image and video analysis activity. The SRU of Palermo developed a web service based architecture that provides image and video analysis capabilities to the integrated analysis system. The developed architecture uses both state of the art techniques, adapted to cope with the particular problem at hand, and new algorithms to provide the following services: image …

MultimediaComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONHomeland securityPlan (drawing)computer.software_genreComputer securityPhase (combat)Unit (housing)homeland security weapon detection weapon classification image analysis video analysis logo recognition forgery detection information fusionState (computer science)Web serviceArchitecturecomputerCropping
researchProduct

LifeRescue Software Prototype for Supporting Emergency Responders During Fire Emergency Response: A Usability and User Requirements Evaluation

2017

For an efficient emergency response, emergency responders (ERs) should exchange information with one another to obtain an adequate understanding and common operational picture of the emergency situation. Despite the current developments on information systems, many ERs are unable to get access to the relevant information as the data is heterogeneous and distributed at different places and due to security and privacy barriers. As a result, ERs are unable to coordinate well and to make good decisions. Therefore, to overcome these difficulties, a web-based application called LifeRescue was developed for supporting easy information access during emergency search and rescue operation. The goal o…

MultimediaEmergency managementbusiness.industryComputer scienceSystem usability scale05 social sciencesInformation accessUsability02 engineering and technologyComputer securitycomputer.software_genreUser requirements documentSession (web analytics)Software020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation systembusinesscomputer050203 business & managementUser-centered design
researchProduct

State surveillance as a threat to personal security of individuals

2015

Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories, as "Panopticon", "ban-opticon" and "synopticon". Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.

National Security AgencySurveillancelcsh:Industrial safety. Industrial accident preventionbusiness.industrymedia_common.quotation_subjectlcsh:Political sciencePersonal securityUnited States National Security AgencyComputer securitycomputer.software_genreThreatState (polity)state apparatusSociologylcsh:T55-55.3businesscomputerlcsh:Jmedia_commonSecuritologia
researchProduct

Data Backup Dilemma

2016

When the Great East Japan Earthquake struck in 2011, several municipalities lost their residential data including backup. Since none of them had ever considered the total loss of data, data backup policy had been paid little attention. In many cases, the backup tapes were simply stored inside the server room, just beside the server rack. Following the calamity, the Japanese national government tried to introduce a data backup system to municipalities using the cloud. The purpose was to secure the safekeeping of backup data. However, municipalities were reluctant to go along with this since overcoming the loss of network connectivity during an earthquake remained foremost in their minds. The…

National governmentComputer sciencebusiness.industry05 social sciencesCloud computing02 engineering and technologyNetwork connectivityComputer securitycomputer.software_genreHybrid approachDilemmaBackup020204 information systems0502 economics and businessData_FILES0202 electrical engineering electronic engineering information engineering050211 marketingServer roombusinesscomputerProceedings of the 17th International Digital Government Research Conference on Digital Government Research
researchProduct

A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control

2006

Multi-agent systems expose users to risks related to lack of knowledge above interacting users. Such systems should provide tools to protect their own resources from illegal accesses by unauthorized users. This paper describes a security framework for Multi-agent systems preventing a trusted agent to interact with malicious agents and granting agent and platform resources. This feature is obtained adding an access control mechanism that joins the benefits of Credential Based Access Control, Role Based Access Control and Mandatory Access Control. Authorizations and access control policies are set by XML based policy files. A case study on a distributed document retrieval system is also illus…

National securityComputer access controlbusiness.industryComputer scienceMulti-agent systemAuthorizationData securityAccess controlComputer securitycomputer.software_genreCredentialMandatory access controlDiscretionary access controlRole-based access controlbusinesscomputer
researchProduct

Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies

2009

The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…

National securityDatabases FactualMedical Records Systems ComputerizedComputer scienceOpen grid services architecture (OGSA)Information Storage and RetrievalData securityCryptographycomputer.software_genreEncryptionComputer securityAccess to InformationOntologiesCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALHumansElectrical and Electronic EngineeringGridComputer SecurityInternetbusiness.industryAuthorizationGeneral MedicineInformation securityGridComputer Science ApplicationsGrid computingPrivacyScalabilityKey (cryptography)SecurityDatabase Management SystemsbusinessWeb service resource framework (WSRF)computerLENGUAJES Y SISTEMAS INFORMATICOSConfidentialityBiotechnology
researchProduct