Search results for "Computer Security"
showing 10 items of 433 documents
An attribute based access control scheme for secure sharing of electronic health records
2016
Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…
An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment
2017
Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health systems is of paramount importance. As a way of achieving this requirement, more emphasis has been given to anonymous attribute credentials, which allows a user to anonymously prove the ownership of a set of attributes to a verifier and thereby gain access to protected resources. Among the existin…
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
2013
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…
Finnish Cyber Security Strategy and Implementation
2015
Technical and automated solutions and information networks, which make planning, guidance and implementation possible fast and in a cost-efficient way, are widely used in Finnish information society. The flipside of this development is increased dependency on extensive and complicated technical systems and information networks. Failures in these systems or, for example, in their power supply may rapidly affect comprehensive security in society. Threats against security in society have become more multifaceted and, as a consequence, more complicated. Threats can no longer be divided clearly into military and non-military threats or internal and external threats; they are often interconnected…
Analysis of dynamic service oriented systems for security related problems detection
2017
The paper presents an approach to solve some problems arising in the management process of IT security. Our motivation of this research is to study in every detail the context of service oriented systems, which can be defined as considerable heterogeneous, dynamic and flexible configuration of the hardware and software system resources. The fundamental difference between security management systems with traditional centralized and monolithic architecture and service oriented systems is discussed. We propose a multilayered-reference model for service-oriented systems aimed predominantly at principal objectives related to IT based systems security working in dynamic environments. Likewise, co…
Driver training interests of a Spanish sample of young drivers and its relationship with their self-assessment skills concerning risky driving behavi…
2013
Abstract Poor driving self-assessment skills (e.g., over-confidence) have been pointed out as an important explanatory factor behind young drivers’ accident involvement. This paper explores (1) what young drivers miss in their training as drivers in order to analyze whether an assessment of one's own driving skills plays an important role in their desire to improve as drivers, and (2) how these training interests are related to an estimate of their self-assessment skills concerning risky driving behavior. For this purpose, a study was conducted using a survey with a blocked sampling design of novice drivers. The survey solicited respondents’ self-report about (1) the contents of training co…
Privacy Enhanced Device Access
2012
In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
A Cloud Federation Architecture
2015
Cloud Computing is the state of the art computation paradigm enabling providers to offer computing resources to customers in a pay-per-use fashion. Nowadays public Cloud providers offer similar services within few service models, mainly IaaS and PaaS. Cloud providers give to the user the feeling to dispose of infinite resources, thus having to predict the user requirements in order to provide services with minimal costs, maintaining at the same time high levels of SLAs. In order to achieve this goal, Cloud providers can cooperate together to bring new business opportunities, such as expanding available resources, achieving cost effective asset optimization and adopting power saving policies…
Model-Driven Development Approach for Providing Smart Home Services
2009
Smart home is about the application of automation techniques for the comfort and security of residents' privately owned homes. In a smart home environment, different and independent embedded devices provide services that can be freely used by others, in the sense of service invocation. This paper presents our idea of using Model Driven Development (MDD) for the composition of existing services, by which we aim at demonstrating how new smart home services will be promoted.