Search results for "Computer security"
showing 10 items of 433 documents
Properties and constraints of cheating-immune secret sharing schemes
2006
AbstractA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants.Cheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the recons…
Optimal Hedging of Option Portfolios with Transaction Costs
2006
One of the most successful approaches to option hedging with transaction costs is the utility based approach pioneered by Hodges and Neuberger (1989). However, this approach has one major drawback that prevents the broad application of this approach in practice: the lack of a closed-form solution. The direct numerical computations of the utility based hedging strategy are cumbersome in a practical implementation. Despite some recent advances in finding an explicit description of the utility based hedging strategy by using either asymptotic, approximation, or other methods, so far they were concerned primarily with hedging a single plain-vanilla option. However, in practice one often faces t…
Reliability of Data Transmission of UAVs
2018
Drones have been recently an interesting subject of research due to their roles in accomplishing missions. Flying in a formation fleet, they form a cooperative communication system in order to improve the efficiency of the mission. For this reason, the reliability of the communication is essential to guarantee the overall performance of the fleet although the link conditions, the external factors and the hardware failures of a drone. The drones capture several images or videos of the geographical area of the mission and send them to other drones in the fleet or to the Ground Station Control (GSC). The importance is to ensure that all the data transmitted is received. In this article, we aim…
A Battery-free Asset Monitoring System based on RF Wireless Power Transfer
2020
In the Internet of Things (IoT) era, asset monitoring represents an appealing implementation of Wireless Sensor Networks due to the enormous benefits associated with being able to monitor and record the exact position and transportation conditions of assets, personal objects, and the like. This kind of infrastructure enables the provision of increasingly advanced services, including the ability to measure the movement speed of a monitored asset using relatively inexpensive nodes with sensing capabilities and wireless transmission and reception. These nodes would ideally employ battery-free sensors that do not require any maintenance, but conventional power supply management systems cannot s…
A negotiation protocol to improve long distance truck parking
2017
Trust-enhanced data integrity model
2012
In this paper we propose an enhancement of data integrity model. The proposed model is based on the idea of Biba integrity model but uses more elaborated integrity measurements. Since integrity can be seen as “trustworthiness of data and resources”, we propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness.
A method to optimize a typology-based classification system
2014
This study sought to provide guidelines for implementing typology-based qualitative analysis of human movement patterns.Fifteen participant-analysts were instructed how to classify treading water behaviours into eight different categories using a training set of videos. They were later provided with two additional sets of videos called validation, and test sets. Results first identified reliable (n=9), and not reliable (n=6) analysts. A decision study outlined that one analyst was sufficient to reliably categorize the behaviours in the ‘reliable’ analyst group, whereas up to four were necessary in the ‘unreliable’ group. These data provided new insights into more objective qualitative analy…
A Security Framework for Smart Ubiquitous Industrial Resources
2007
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distributed, self-managing, collaborative, international, nomadic, and ubiquitous. We are currently working on a middleware platform focused on the industrial needs, UBIWARE. UBIWARE integrates Ubiquitous Computing with Semantic Web, Distributed AI, Security and Privacy, and Enterprise Application Integration. In this paper, we describe our long-term vision for the security and privacy management in complex multi-agent systems like UBIWARE, SURPAS. The security infrastructure has to become pervasive, interoperable and inte…
A roadmap towards improving managed security services from a privacy perspective
2014
Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…
Managing Emerging Information Security Risks during Transitions to Integrated Operations
2010
Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…