Search results for "Computer security"
showing 10 items of 433 documents
Credit card incidents and control systems
2012
Abstract Credit and debit cards have spread and skyrocketed all around the world to become the most popular means of payments in many countries. Despite their enormous popularity, cards are not free of risk. Technology development and e-commerce have exponentially increased internal credit card incidents. This paper identifies and quantifies the different types of credit card fraud and puts into question the effectiveness of the role assigned to cardholders in its detection.
Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text Simplification
2019
Health Information Technology Systems (HITS) are increasingly used to improve the quality of patient care while reducing costs. These systems have been developed in response to the changing models of care to an ongoing relationship between patient and care team, supported by the use of technology due to the increased instance of chronic disease. However, the use of HITS may increase the risk to patient safety and security. While standards can be used to address and manage these risks, significant communication problems exist between experts working in different departments. These departments operate in silos often leading to communication breakdowns. For example, risk management stakeholder…
Mutual entity authentication for LTE
2011
In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks
2022
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The la…
Towards Next Generation System Architecture for Emergency Services
2011
European Union has decided that all emergencies can be reported to authorities by European citizens by calling 112 or sending a text message to 112. Distributing warnings and alerts of authorities to citizens currently happens through national TV and radio channels, but telecom networks are also used now in some countries for this purpose. During the last ten years there have been attempts to develop new system architectures for various emergency service provision phases. Some of them are already deployed in special cases, like in ambulance services. Multimedia emergency alert messages can be delivered to citizens over fixed and mobile telecom networks and commercial systems are already in …
Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies
2004
An E-commerce transaction is a means to conduct particular commercial activities using the global digital E-commerce infrastructure. We concentrate here on business to customer (B-to-C) E-commerce transactions. These transactions are based on protocols offered by the global infrastructure, primarily the Internet. Using electronic means to do business can greatly improve the efficiency of the business transactions. It, however, poses some problems that were rarely considered to be important before. One class of problems is caused by the behavior of untrusted participants. For reasons such as dishonesty, disputes may arise. In the general case, when a dispute arises an untrustworthy participa…
Crowd Models for Emergency Evacuation: A Review Targeting Human-Centered Sensing
2013
Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Human-centered sensing which allows crowd behavior to be monitored in real-time, and provides the basis for real-time crowd control. The question then becomes: to what degree can previous crowd models incorporate this development, and what areas need further research? In this paper, we provide a survey that describes some widely used crowd models and discuss their advantages a…
An Investigation of Security and Privacy for Human Bond Communications
2017
FederatedCloudSim
2014
Recent developments show that the standardization of cloud service descriptions and exchange leads the way for the rise of cloud federations. In these federations CSPs (cloud service providers) can use resources of other CSPs in the case of a lack of local resources or they can add remote services to their catalogue. Cloud federations again demand for cloud brokers which offer the resources and services of different CSPs transparently to the users. Research of cloud federations in the real world is very complex and expensive as distributed hard- and software scenarios are needed. Therefore we present FederatedCloudSim, a very flexible cloud simulation framework that can be used to simulate …
Self-establishing a Service Level Agreement within Autonomic Cloud Networking Environment
2014
International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). Several research works have been proposed for the SLA establishing in cloud computing, but not in cloud networking. In this paper, we propose an architecture for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and a …