Search results for "Computer security"

showing 10 items of 433 documents

Properties and constraints of cheating-immune secret sharing schemes

2006

AbstractA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants.Cheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the recons…

TheoryofComputation_MISCELLANEOUSHomomorphic secret sharingCryptography0102 computer and information sciences02 engineering and technologyShared secretComputer securitycomputer.software_genre01 natural sciencesSecret sharingCheating0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsSecret sharingMathematicsbusiness.industryApplied MathematicsCryptographic protocol16. Peace & justiceShamir's Secret Sharing010201 computation theory & mathematicsResilient functionsCryptographySecure multi-party computation020201 artificial intelligence & image processingVerifiable secret sharingbusinesscomputerDiscrete Applied Mathematics
researchProduct

Optimal Hedging of Option Portfolios with Transaction Costs

2006

One of the most successful approaches to option hedging with transaction costs is the utility based approach pioneered by Hodges and Neuberger (1989). However, this approach has one major drawback that prevents the broad application of this approach in practice: the lack of a closed-form solution. The direct numerical computations of the utility based hedging strategy are cumbersome in a practical implementation. Despite some recent advances in finding an explicit description of the utility based hedging strategy by using either asymptotic, approximation, or other methods, so far they were concerned primarily with hedging a single plain-vanilla option. However, in practice one often faces t…

Transaction costMathematical optimizationActuarial scienceEmpirical researchEconomicsPortfolioParameterized complexityAsset (computer security)Market neutralDrawbackSSRN Electronic Journal
researchProduct

Reliability of Data Transmission of UAVs

2018

Drones have been recently an interesting subject of research due to their roles in accomplishing missions. Flying in a formation fleet, they form a cooperative communication system in order to improve the efficiency of the mission. For this reason, the reliability of the communication is essential to guarantee the overall performance of the fleet although the link conditions, the external factors and the hardware failures of a drone. The drones capture several images or videos of the geographical area of the mission and send them to other drones in the fleet or to the Ground Station Control (GSC). The importance is to ensure that all the data transmitted is received. In this article, we aim…

Transmission (telecommunications)Computer scienceRobustness (computer science)Reliability (computer networking)Control (management)Communications systemComputer securitycomputer.software_genrecomputerProtocol (object-oriented programming)DroneData transmissionSSRN Electronic Journal
researchProduct

A Battery-free Asset Monitoring System based on RF Wireless Power Transfer

2020

In the Internet of Things (IoT) era, asset monitoring represents an appealing implementation of Wireless Sensor Networks due to the enormous benefits associated with being able to monitor and record the exact position and transportation conditions of assets, personal objects, and the like. This kind of infrastructure enables the provision of increasingly advanced services, including the ability to measure the movement speed of a monitored asset using relatively inexpensive nodes with sensing capabilities and wireless transmission and reception. These nodes would ideally employ battery-free sensors that do not require any maintenance, but conventional power supply management systems cannot s…

TraverseComputer scienceNode (networking)010401 analytical chemistryReal-time computing020206 networking & telecommunications02 engineering and technologySettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciAsset (computer security)01 natural sciences0104 chemical sciencesIdentification (information)0202 electrical engineering electronic engineering information engineeringSystem on a chipWireless power transferWireless Power Transfer WPT Wireless Sensor Networks WSNs Radio Frequency Energy Harvesting Wireless Battery Charger Lithium Ion Internet of ThingsWireless sensor networkEnergy harvesting
researchProduct

A negotiation protocol to improve long distance truck parking

2017

Truck050210 logistics & transportationComputer sciencemedia_common.quotation_subject05 social sciences020101 civil engineering02 engineering and technologyComputer securitycomputer.software_genre0201 civil engineeringComputer Science ApplicationsTheoretical Computer ScienceNegotiationComputational Theory and MathematicsArtificial Intelligence0502 economics and businessProtocol (object-oriented programming)computerSoftwaremedia_commonIntegrated Computer-Aided Engineering
researchProduct

Trust-enhanced data integrity model

2012

In this paper we propose an enhancement of data integrity model. The proposed model is based on the idea of Biba integrity model but uses more elaborated integrity measurements. Since integrity can be seen as “trustworthiness of data and resources”, we propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness.

TrustworthinessComputer scienceData integrityTrusted ComputingSubjective logicComputer securitycomputer.software_genrecomputer2012 IEEE 1st International Symposium on Wireless Systems (IDAACS-SWS)
researchProduct

A method to optimize a typology-based classification system

2014

This study sought to provide guidelines for implementing typology-based qualitative analysis of human movement patterns.Fifteen participant-analysts were instructed how to classify treading water behaviours into eight different categories using a training set of videos. They were later provided with two additional sets of videos called validation, and test sets. Results first identified reliable (n=9), and not reliable (n=6) analysts. A decision study outlined that one analyst was sufficient to reliably categorize the behaviours in the ‘reliable’ analyst group, whereas up to four were necessary in the ‘unreliable’ group. These data provided new insights into more objective qualitative analy…

TypologyEngineeringTraining setbusiness.industryGeneralizability theoryPoison controlGeneral Medicinegeneralizability theoryComputer securitycomputer.software_genreMachine learningTest (assessment)Qualitative analysisCategorizationclinical educationexpertiseGeneralizability theoryArtificial intelligenceClinical educationbusinessta315computerEngineering(all)asiantuntijuus
researchProduct

A Security Framework for Smart Ubiquitous Industrial Resources

2007

Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distributed, self-managing, collaborative, international, nomadic, and ubiquitous. We are currently working on a middleware platform focused on the industrial needs, UBIWARE. UBIWARE integrates Ubiquitous Computing with Semantic Web, Distributed AI, Security and Privacy, and Enterprise Application Integration. In this paper, we describe our long-term vision for the security and privacy management in complex multi-agent systems like UBIWARE, SURPAS. The security infrastructure has to become pervasive, interoperable and inte…

Ubiquitous robotUbiquitous computingbusiness.industryComputer scienceInteroperabilityProvisioningWeb application securitycomputer.software_genreComputer securityWorld Wide WebMiddleware (distributed applications)Enterprise application integrationbusinessSemantic Webcomputer
researchProduct

A roadmap towards improving managed security services from a privacy perspective

2014

Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacymanaged security servicesPrivacy by Designbusiness.industryComputer scienceDigital forensicsBig dataethical awarenesssecurityIntrusion detection systemLibrary and Information SciencesprivacyComputer securitycomputer.software_genreComputer Science ApplicationsOutsourcingInformation sensitivityintrusion detection and prevention systemsoutsourcingbusinesscomputerRegister of data controllersEthics and Information Technology
researchProduct

Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010

Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424business.industryControl (management)Information securityIntegrated operationsComputer securitycomputer.software_genreInvestment (macroeconomics)System dynamicsRisk analysis (engineering)Information and Communications TechnologybusinesscomputerRisk managementVulnerability (computing)2010 43rd Hawaii International Conference on System Sciences
researchProduct