984 resultados para Security Features


Relevância:

70.00% 70.00%

Publicador:

Resumo:

There is no doubt about the necessity of protecting digital communication: Citizens are entrusting their most confidential and sensitive data to digital processing and communication, and so do governments, corporations, and armed forces. Digital communication networks are also an integral component of many critical infrastructures we are seriously depending on in our daily lives. Transportation services, financial services, energy grids, food production and distribution networks are only a few examples of such infrastructures. Protecting digital communication means protecting confidentiality and integrity by encrypting and authenticating its contents. But most digital communication is not secure today. Nevertheless, some of the most ardent problems could be solved with a more stringent use of current cryptographic technologies. Quite surprisingly, a new cryptographic primitive emerges from the ap-plication of quantum mechanics to information and communication theory: Quantum Key Distribution. QKD is difficult to understand, it is complex, technically challenging, and costly-yet it enables two parties to share a secret key for use in any subsequent cryptographic task, with an unprecedented long-term security. It is disputed, whether technically and economically fea-sible applications can be found. Our vision is, that despite technical difficulty and inherent limitations, Quantum Key Distribution has a great potential and fits well with other cryptographic primitives, enabling the development of highly secure new applications and services. In this thesis we take a structured approach to analyze the practical applicability of QKD and display several use cases of different complexity, for which it can be a technology of choice, either because of its unique forward security features, or because of its practicability.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper introduces basic concepts of code access security, using and implementing security features, as well as types of security syntax and mechanism of checking and requesting specific permissions.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The LMS plays a decisive role in most eLearning environments. Although they integrate many useful tools for managing eLearning activities, they must also be effectively integrated with other specialized systems typically found in an educational environment such as Repositories of Learning Objects or ePortfolio Systems. Both types of systems evolved separately but in recent years the trend is to combine them, allowing the LMS to benefit from using the ePortfolio assessment features. This paper details the most common strategies for integrating an ePortfolio system into an LMS: the data, the API and the tool integration strategies. It presents a comparative study of strategies based on the technical skills, degree of coupling, security features, batch integration, development effort, status and standardization. This study is validated through the integration of two of the most representative systems on each category - respectively Mahara and Moodle.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ao longo dos anos a Internet tornou-se uma ferramenta fundamental para a sociedade e, nos dias de hoje, é praticamente inevitável não usufruir de algumas facilidades proporcionadas pela rede mundial. Devido à sua massificação nos últimos anos, os endereços de IP disponíveis esgotaram-se, pelo que tornou-se necessário a elaboração de uma nova versão do protocolo comunicação, utilizado para suportar todas as comunicações na Internet, o Internet Protocol, versão 6 (IPv6). Apesar da ampla utilização da Internet, a maioria dos seus utilizadores está completamente alheia às questões de segurança, estando por isso exposta a uma diversidade de perigos. O aumento da segurança é também uma das principais missões do IPv6, tendo-se introduzido alguns mecanismos de segurança relevantes. Este trabalho tem como objetivo estudar o IPv6, focando-se especialmente em questões relacionadas com os mecanismos de transição do IPv4 para IPv6 e em aspetos de segurança. Proporcionando uma abordagem teórica ao protocolo e aos conceitos de segurança, este documento apresenta também uma perspetiva mais técnica da implementação do IPv6, pretendendo ser um manual de apoio aos responsáveis pela implementação da versão 6 do IP. Os três métodos de transição, que permitem a atualização do IPv4 para IPv6, são analisados de forma a apoiar a equipa na tomada de decisão sobre qual (ou quais) os métodos de transição a utilizar. Uma parte substancial do trabalho foi dedicada à seleção e estudo de vulnerabilidades que se encontram presentes no IPv6, a forma como são exploradas por parte do atacante, a forma como podem ser classificadas e os processos que diminuem o risco de exposição a essas mesmas vulnerabilidades. Um conjunto de boas práticas na administração da segurança de redes é também apresentada, para melhorar a garantia de que problemas conhecidos não possam ser explorados por utilizadores mal intencionados.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Dissertação de Mestrado em Engenharia Informática

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ympäristörasituksen vähentäminen, tiukkenevat päästörajat ja ehtyvät öljyvarat ovat ajaneet kulkuvälineteollisuuden hakemaan uusia vaihtoehtoja ajoneuvojen energiatehokkuuden kehittämiseksi. Hybriditeknologia tarjoaa ratkaisuja kustannustehokkuuden ja ympäristöystävällisyyden parantamiseksi. Hybriditeknologian yleistyessä myös työkoneympäristössä saadaan paitsi kehitettyä energiatehokkaampia ja pienemmillä käyttökustannuksilla olevia työkoneita, niin myös tuotua siviiliajoneuvoista tuttuja turvallisuusominaisuuksia työkoneympäristöön. Perinteisten diesel-moottorien korvaaminen nopeavasteisilla ja tarkasti säädettävillä sähkömoottoreilla tarjoaa mahdollisuuksia toteuttaa tarkempia ja monipuolisempia säätöjärjestelmiä kuin perinteisessä ympäristössä. Tässä diplomityössä suunnitellaan luistonestojärjestelmä ja elektroninen tasauspyörästö hybridityökoneympäristöön. Järjestelmä voi käyttökohteesta riippuen pienentää huomattavasti käyttökustannuksia ja mahdollistaa uusien sovellusten tuomista markkinoille, kuten esimerkiksi kääntymisen avustaminen differentiaalisella ohjauksella.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Globalization and liberalization, with the entry of many prominent foreign manufacturers, changed the automobile scenario in India, since early 1990‟s. Manufacturers such as Ford, General Motors, Honda, Toyota, Suzuki, Hyundai, Renault, Mitsubishi, Benz, BMW, Volkswagen and Nissan set up their manufacturing units in India in joint venture with their Indian counterpart companies, by making use of the Foreign Direct Investment policy of the Government of India, These manufacturers started capturing the hearts of Indian car customers with their choice of technological and innovative product features, with quality and reliability. With the multiplicity of choices available to the Indian passenger car buyers, it drastically changed the way the car purchase scenario in India and particularly in the State of Kerala. This transformed the automobile scene from a sellers‟ market to buyers‟ market. Car customers started developing their own personal preferences and purchasing patterns, which were hitherto unknown in the Indian automobile segment. The main purpose of this paper is to come up with the identification of possible parameters and a framework development, that influence the consumer purchase behaviour patterns of passenger car owners in the State of Kerala, so that further research could be done, based on the framework and the identified parameters

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Globalization and liberalization, with the entry of many prominent foreign manufacturers, changed the automobile scenario in India, since early 1990’s. World Leaders in automobile manufacturing such as Ford, General Motors, Honda, Toyota, Suzuki, Hyundai, Renault, Mitsubishi, Benz, BMW, Volkswagen and Nissan set up their manufacturing units in India in joint venture with their Indian counterpart companies, by making use of the Foreign Direct Investment policy of the Government of India, These manufacturers started capturing the hearts of Indian car customers with their choice of technological and innovative product features, with quality and reliability. With the multiplicity of choices available to the Indian passenger car buyers, it drastically changed the way the car purchase scenario in India and particularly in the State of Kerala. This transformed the automobile scene from a sellers’ market to buyers’ market. Car customers started developing their own personal preferences and purchasing patterns, which were hitherto unknown in the Indian automobile segment. The main purpose of this paper is to develop a model with major variables, which influence the consumer purchase behaviour of passenger car owners in the State of Kerala. Though there are innumerable studies conducted in other countries, there are very few thesis and research work conducted to study the consumer behaviour of the passenger car industry in India and specifically in the State of Kerala. The results of the research contribute to the practical knowledge base of the automobile industry, specifically to the passenger car segment. It has also a great contributory value addition to the manufacturers and dealers for customizing their marketing plans in the State

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Globalization and liberalization, with the entry of many prominent foreign manufacturers, changed the automobile scenario in India, since early 1990’s. World Leaders in automobile manufacturing such as Ford, General Motors, Honda, Toyota, Suzuki, Hyundai, Renault, Mitsubishi, Benz, BMW, Volkswagen and Nissan set up their manufacturing units in India in joint venture with their Indian counterpart companies, by making use of the Foreign Direct Investment policy of the Government of India, These manufacturers started capturing the hearts of Indian car customers with their choice of technological and innovative product features, with quality and reliability. With the multiplicity of choices available to the Indian passenger car buyers, it drastically changed the way the car purchase scenario in India and particularly in the State of Kerala. This transformed the automobile scene from a sellers’ market to buyers’ market. Car customers started developing their own personal preferences and purchasing patterns, which were hitherto unknown in the Indian automobile segment. The main purpose of this paper is to come up with the identification of possible parameters and a framework development, that influence the consumer purchase behaviour patterns of passenger car owners in the State of Kerala, so that further research could be done, based on the framework and the identified parameters.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Previous works have studied the characteristics and peculiarities of P2P networks, especially security information aspects. Most works, in some way, deal with the sharing of resources and, in particular, the storage of files. This work complements previous studies and adds new definitions relating to this kind of systems. A system for safe storage of files (SAS-P2P) was specified and built, based on P2P technology, using the JXTA platform. This system uses standard X.509 and PKCS # 12 digital certificates, issued and managed by a public key infrastructure, which was also specified and developed based on P2P technology (PKIX-P2P). The information is stored in a special file with XML format which is especially prepared, facilitating handling and interoperability among applications. The intention of developing the SAS-P2P system was to offer a complementary service for Giga Natal network users, through which the participants in this network can collaboratively build a shared storage area, with important security features such as availability, confidentiality, authenticity and fault tolerance. Besides the specification, development of prototypes and testing of the SAS-P2P system, tests of the PKIX-P2P Manager module were also performed, in order to determine its fault tolerance and the effective calculation of the reputation of the certifying authorities participating in the system

Relevância:

60.00% 60.00%

Publicador:

Resumo:

O presente trabalho investiga os discursos da mídia impressa (jornal), acerca da violência escolar em Belém do Pará, no período de 2001 a 2010. Ante tal iniciativa, aponta-se como questão norteadora do estudo, saber: Qual o(s) significado(s) e sentido(s) de violência escolar produzidos nos discursos do jornal impresso “O Liberal” em Belém, no período de 2001- 2010? Com o objetivo de: a) investigar quais os significados e sentidos produzidos pelo jornal impresso “O Liberal”, em Belém, no período de 2001-2010; (b) identificar qual a recorrência de matérias sobre violência escolar no jornal impresso “O Liberal” em Belém, no período de 2001-2010; (c) verificar que discursos são materializados no jornal impresso “O Liberal” em Belém, no período de 2001-2010, sobre a violência escolar, e por fim, (d) identificar a relação das imagens fotográficas com a construção discursiva do jornal impresso de “O Liberal”, em Belém, no período de 2001-2010, sobre violência escolar. E, uma vez partindo dos pressupostos da pesquisa documental, o corpus da pesquisa exploratória constitui-se de duzentos e sessenta (260) peças jornalísticas, levantadas junto à Biblioteca Pública Arthur Vianna (CENTUR). A partir desse corpus de 260 peças jornalísticas, consideramos vinte (20) peças jornalísticas, para compor o corpus de análise dessa dissertação, que se destaca por seu tratamento explícito e nomeado da violência escolar. A análise dar-se-á à luz da teoria/análise do discurso bakhtiniano; para a qual, todo discurso está impregnado de intenções ideológicas, o que dá significado e sentido às mensagens da mídia. O exame dos achados nos proporcionou concluir que, o número de publicações de peças com teor explícito na abordagem da violência escolar é muito pequeno em relação ao período estudado. Constatou-se também que o jornal “O Liberal” possui um posicionamento acerca da violência escolar que busca consolidar sempre que a aborda por meio da apropriação de falas testemunhais e do discurso científico. Verificou-se ainda que, a teia discursiva das matérias jornalísticas analisadas conjuga basicamente dez elementos quase sempre reiteráveis, sobre os quais compõe sentidos e apreciações que extrapolam significações dicionarizadas; em cuja trama, a imagem funciona como partícipe do movimento enunciativo que, da mesma forma evidencia a figura do aluno como principal ator das ocorrências violentas na escola e do fenômeno como caso de polícia e recursos de segurança. Neste sentido, espera-se poder contribuir para uma apreciação crítica da mídia em suas dimensões próprias de construção dos debates públicos; assim como para uma compreensão da violência escolar no âmbito da sua veiculação.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Die Bedrohung durch Produktpiraterie wächst ständig, besonders der deutsche Maschinen- und Anlagenbau ist mehr und mehr davon betroffen. Um Komponenten und Ersatzteile zu schützen, wurde ein technisches Konzept zur Abwehr von Produktpiraterie entwickelt. In diesem System werden Teile mit kopiersicheren Echtheitsmerkmalen gekennzeichnet, welche an diversen Identifikations- und Prüfpunkten entlang der Supply-Chain und besonders beim Einsatz in der Maschine ausgelesen und geprüft werden. Die Prüfergebnisse werden in einer zentralen Datenbank gespeichert, um neue Services zu ermöglichen und die Kommunikation zwischen Hersteller und Kunde zu erleichtern.