Search results for "Computer security"

showing 10 items of 433 documents

Credit card incidents and control systems

2012

Abstract Credit and debit cards have spread and skyrocketed all around the world to become the most popular means of payments in many countries. Despite their enormous popularity, cards are not free of risk. Technology development and e-commerce have exponentially increased internal credit card incidents. This paper identifies and quantifies the different types of credit card fraud and puts into question the effectiveness of the role assigned to cardholders in its detection.

Card security codeComputer Networks and Communicationsmedia_common.quotation_subjectCredit card fraudLibrary and Information SciencesPaymentComputer securitycomputer.software_genreATM cardCredit cardBusinesscomputerMerchant servicesChargebackCredit card interestInformation Systemsmedia_commonInternational Journal of Information Management
researchProduct

Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text Simplification

2019

Health Information Technology Systems (HITS) are increasingly used to improve the quality of patient care while reducing costs. These systems have been developed in response to the changing models of care to an ongoing relationship between patient and care team, supported by the use of technology due to the increased instance of chronic disease. However, the use of HITS may increase the risk to patient safety and security. While standards can be used to address and manage these risks, significant communication problems exist between experts working in different departments. These departments operate in silos often leading to communication breakdowns. For example, risk management stakeholder…

Care processInteractive computer systemsMedical terminologyHealth information technologyText simplificationComputer sciencemedia_common.quotation_subjectKnowledge management02 engineering and technologyInformation technologyPatient safetyOrder (exchange)Computer securityPatient Empowerment; Health Information Seeking; User Requirements; Risk Management; IEC 80001-1; Medical Terminology Simplification;Machine learning0202 electrical engineering electronic engineering information engineeringInformation retrievalQuality (business)Risk managementComputer networksmedia_commonEstimationRisk ManagementSettore INF/01 - Informaticabusiness.industryCommunication020206 networking & telecommunications020207 software engineeringMedical Terminology SimplificationWorld Wide WebEducational technologyChronic diseaseRisk analysis (engineering)HealthbusinessIEC 80001-1Machine translating
researchProduct

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct

A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks

2022

WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The la…

Chemical technologyhealthcareTP1-1185BiochemistryAtomic and Molecular Physics and OpticsAnalytical Chemistrywireless body area networkssigncryptionHumansElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Wireless TechnologyInstrumentationAlgorithmsComputer SecurityConfidentialitySensors
researchProduct

Towards Next Generation System Architecture for Emergency Services

2011

European Union has decided that all emergencies can be reported to authorities by European citizens by calling 112 or sending a text message to 112. Distributing warnings and alerts of authorities to citizens currently happens through national TV and radio channels, but telecom networks are also used now in some countries for this purpose. During the last ten years there have been attempts to develop new system architectures for various emergency service provision phases. Some of them are already deployed in special cases, like in ambulance services. Multimedia emergency alert messages can be delivered to citizens over fixed and mobile telecom networks and commercial systems are already in …

Civil Emergency MessageWireless networkComputer scienceService delivery frameworkbusiness.industryUsabilityComputer securitycomputer.software_genreService provisioningSystems architecturemedia_common.cataloged_instanceSocial mediaEuropean unionbusinesscomputermedia_common
researchProduct

Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies

2004

An E-commerce transaction is a means to conduct particular commercial activities using the global digital E-commerce infrastructure. We concentrate here on business to customer (B-to-C) E-commerce transactions. These transactions are based on protocols offered by the global infrastructure, primarily the Internet. Using electronic means to do business can greatly improve the efficiency of the business transactions. It, however, poses some problems that were rarely considered to be important before. One class of problems is caused by the behavior of untrusted participants. For reasons such as dishonesty, disputes may arise. In the general case, when a dispute arises an untrustworthy participa…

Class (computer programming)AtomicityDishonestyProcess (engineering)business.industryComputer sciencemedia_common.quotation_subjectEconomics Econometrics and Finance (miscellaneous)Context (language use)E-commerceComputer securitycomputer.software_genreHuman-Computer InteractionThe InternetbusinesscomputerDatabase transactionmedia_commonElectronic Commerce Research
researchProduct

Crowd Models for Emergency Evacuation: A Review Targeting Human-Centered Sensing

2013

Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Human-centered sensing which allows crowd behavior to be monitored in real-time, and provides the basis for real-time crowd control. The question then becomes: to what degree can previous crowd models incorporate this development, and what areas need further research? In this paper, we provide a survey that describes some widely used crowd models and discuss their advantages a…

Class (computer programming)Emergency managementbusiness.industryEconomic shortageComputer securitycomputer.software_genreData scienceImportant researchCrowdsCrowd controlEmergency evacuationbusinessCrowd psychologyPsychologycomputer2013 46th Hawaii International Conference on System Sciences
researchProduct

An Investigation of Security and Privacy for Human Bond Communications

2017

Cloud computing securityPrivacy softwarebusiness.industry020204 information systemsBondInternet privacy0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications02 engineering and technologyBusinessComputer securitycomputer.software_genrecomputerHuman Bond Communication
researchProduct

FederatedCloudSim

2014

Recent developments show that the standardization of cloud service descriptions and exchange leads the way for the rise of cloud federations. In these federations CSPs (cloud service providers) can use resources of other CSPs in the case of a lack of local resources or they can add remote services to their catalogue. Cloud federations again demand for cloud brokers which offer the resources and services of different CSPs transparently to the users. Research of cloud federations in the real world is very complex and expensive as distributed hard- and software scenarios are needed. Therefore we present FederatedCloudSim, a very flexible cloud simulation framework that can be used to simulate …

Cloud computing securityStandardizationbusiness.industryCloud simulationCloud computingCloud service providerComputer securitycomputer.software_genreGeographySoftwareService levelCloud testingbusinesscomputerProceedings of the 2nd International Workshop on CrossCloud Systems
researchProduct

Self-establishing a Service Level Agreement within Autonomic Cloud Networking Environment

2014

International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). Several research works have been proposed for the SLA establishing in cloud computing, but not in cloud networking. In this paper, we propose an architecture for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and a …

Cloud computing security[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE/IFIPbusiness.industryComputer scienceQuality of service[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Data_MISCELLANEOUSQoSCloud computingComputer securitycomputer.software_genreService-level agreement[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Cloud testingAutonomic Cloud NetworkingData as a serviceArchitectureSLAbusinesscomputerDrawbackComputer network
researchProduct