88 resultados para Smart Card


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This case study describes the experience of a state government health department in evaluating the use of smart card technology to redesign health benefits programs for the disabled in Australia. The social and political context of the system is explained in detail, and the potential benefits and risks accruing to the government, health care intermediaries and the community are examined.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper initiates the study of two specific security threats on smart-card-based password authentication in distributed systems. Smart-card-based password authentication is one of the most commonly used security mechanisms to determine the identity of a remote client, who must hold a valid smart card and the corresponding password to carry out a successful authentication with the server. The authentication is usually integrated with a key establishment protocol and yields smart-card-based password-authenticated key agreement. Using two recently proposed protocols as case studies, we demonstrate two new types of adversaries with smart card: 1) adversaries with pre-computed data stored in the smart card, and 2) adversaries with different data (with respect to different time slots) stored in the smart card. These threats, though realistic in distributed systems, have never been studied in the literature. In addition to point out the vulnerabilities, we propose the countermeasures to thwart the security threats and secure the protocols. © 2013 IEEE.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Wireless broadcasting is an efficient way to broadcast data to a large number of users. Some commercial applications of wireless broadcasting, such as satellite pay-TV, desire that only those users who have paid for the service can retrieve broadcast data. This is often achieved by broadcast encryption, which allows a station securely to broadcast data to a dynamically changing set of privileged users through open air. Most existing broadcast encryption schemes can only revoke a pre-specified number of users before system re-setup or require high computation, communication and storage overheads in receivers. In this paper, we propose a new broadcast encryption scheme based on smart cards. In our scheme, smart cards are used to prevent users from leaking secret keys. Additionally, once an illegally cloned smart card is captured, our scheme also allows tracing of the compromised smart card by which illegal smart cards are cloned, and can then revoke all cloned smart cards. The new features of our scheme include minimal computation needs of only a few modular multiplications in the smart card, and the capability to revoke up to any number of users in one revocation. Furthermore, our scheme is secure against both passive and active attacks and has better performance than other schemes.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The process of buying, selling or interacting with customers via Internet, Tele-sale, Smart card or other computer network is referred to as Electronics Commerce. Whereas online trade has been touting its flexibility, convenience and cost savings, the newest entrant is wireless e-commerce. This form of business offers many attractions; including 24 hours seven days’ open shop–business, vastly reduced fixed cost, and increased profitability. Amazon.com is an example of a successful venture, in e-business. Internet Service providers (ISP/ASP) have a significant influence on the feasibility, security and cost competitiveness of an e-business venture. In the ISP model of services, multiple users and their databases are normally offered on a single hardware, platform sharing the same IP address and Domain name. Clients will require a mechanism, which allows them to update their Web contents and databases frequently even many times daily without intervention of local system Administrator (ISP Admin). The paper overviews few steps to enable corporate clients to update their web content more securely.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

As part of the security within distributed systems, various services and resources need protection from unauthorized use. Remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. The conversion not only significantly improves the information assurance at low cost but also protects client privacy in distributed systems. In addition, our framework retains several practice-friendly properties of the underlying two-factor authentication, which we believe is of independent interest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces an aggregation algorithm for airborne swarming guided weapon systems, which can aggregate munitions into a given shape while reaching the surface. The algorithm uses an artificial force based controller to navigate the members of the swarm into the desired geographical position and evenly distribute them inside the shape. Inter-member repulsion forces are used to avoid collisions among members, which is crucial for a weapon deployment system. Moreover, a lower bound for the release height was obtained which guarantee convergence of the complete weapon system into the target area. The proposed swarming guided weapon system was tested using computer simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In an environmental context, the use of RFID (radio frequency identification) and load cell sensor technology can be employed for not only bringing down waste management costs, but also to facilitate automating and streamlining waste (e.g., garbage, recycling, and green) identification and weight measurement processes for designing smart waste management systems. In this paper, we outline a RFID and sensor model for designing a system in real-time waste management. An application of the architecture is described in the area of RFID and sensor based automatic waste identity, weight, and stolen bins identification system (WIWSBIS).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This case study-based research examines the outcomes of using quality system software (QSS) in terms of the support it provides to, and the constraints it imposes on, its users. The results indicate that QSS can help facilitate knowledge access and sharing, and to a lesser extent, facilitate communication. It can be an effective mechanism for initiating and managing changes to work processes. Although some writers have opined that information technology (IT) is another way of controlling workers, this was not evidenced in this study. Technical shortcomings did hamper performance of some tasks, and for some managers, extra work was involved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Jamie’s Kitchen the high profile celebrity chef Jamie Oliver set out to transform a group of unemployed young Londoners into the enterprising, ideal worker of 21st century flexible capitalism. The paper will argue that this reality TV series provides a means to explore key features of new work regimes. We will analyse particular aspects of the increasingly powerful individualising and normalising processes shaping the lifeworlds of young workers in a globalising risk society. Processes that require those who wish to be positively identified as entrepreneurial to do particular sorts of work on themselves; or suffer the consequences.
Drawing on Foucault’s later work on the care of the self, and the  individualization theses of the reflexive modernization literature, we identify and analyse the forms of personhood that various institutions, organisations and individuals seek to encourage in young workers; and the ways in which institutionalised risk environments increasingly individualise the risks and uncertainties associated with labour market participation. The paper argues that our understandings of what it means to be a worker of the world, are being rearticulated around the idea that we are free to choose. And we must exercise this freedom – reap its rewards, carry its obligations – as individuals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Part III. Examines the mathematics behind common card games. Aim of the card game Happy Families; Format of the card game Old Maid; Instruction for playing the card game Rummy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

12 minute solo within an hour-long work, performed 18 - 22 February 2004  at the Dancehouse, Melbourne