984 resultados para security features
Resumo:
There is no doubt about the necessity of protecting digital communication: Citizens are entrusting their most confidential and sensitive data to digital processing and communication, and so do governments, corporations, and armed forces. Digital communication networks are also an integral component of many critical infrastructures we are seriously depending on in our daily lives. Transportation services, financial services, energy grids, food production and distribution networks are only a few examples of such infrastructures. Protecting digital communication means protecting confidentiality and integrity by encrypting and authenticating its contents. But most digital communication is not secure today. Nevertheless, some of the most ardent problems could be solved with a more stringent use of current cryptographic technologies. Quite surprisingly, a new cryptographic primitive emerges from the ap-plication of quantum mechanics to information and communication theory: Quantum Key Distribution. QKD is difficult to understand, it is complex, technically challenging, and costly-yet it enables two parties to share a secret key for use in any subsequent cryptographic task, with an unprecedented long-term security. It is disputed, whether technically and economically fea-sible applications can be found. Our vision is, that despite technical difficulty and inherent limitations, Quantum Key Distribution has a great potential and fits well with other cryptographic primitives, enabling the development of highly secure new applications and services. In this thesis we take a structured approach to analyze the practical applicability of QKD and display several use cases of different complexity, for which it can be a technology of choice, either because of its unique forward security features, or because of its practicability.
Resumo:
This paper introduces basic concepts of code access security, using and implementing security features, as well as types of security syntax and mechanism of checking and requesting specific permissions.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
The LMS plays a decisive role in most eLearning environments. Although they integrate many useful tools for managing eLearning activities, they must also be effectively integrated with other specialized systems typically found in an educational environment such as Repositories of Learning Objects or ePortfolio Systems. Both types of systems evolved separately but in recent years the trend is to combine them, allowing the LMS to benefit from using the ePortfolio assessment features. This paper details the most common strategies for integrating an ePortfolio system into an LMS: the data, the API and the tool integration strategies. It presents a comparative study of strategies based on the technical skills, degree of coupling, security features, batch integration, development effort, status and standardization. This study is validated through the integration of two of the most representative systems on each category - respectively Mahara and Moodle.
Resumo:
Ao longo dos anos a Internet tornou-se uma ferramenta fundamental para a sociedade e, nos dias de hoje, praticamente inevitvel no usufruir de algumas facilidades proporcionadas pela rede mundial. Devido sua massificao nos ltimos anos, os endereos de IP disponveis esgotaram-se, pelo que tornou-se necessrio a elaborao de uma nova verso do protocolo comunicao, utilizado para suportar todas as comunicaes na Internet, o Internet Protocol, verso 6 (IPv6). Apesar da ampla utilizao da Internet, a maioria dos seus utilizadores est completamente alheia s questes de segurana, estando por isso exposta a uma diversidade de perigos. O aumento da segurana tambm uma das principais misses do IPv6, tendo-se introduzido alguns mecanismos de segurana relevantes. Este trabalho tem como objetivo estudar o IPv6, focando-se especialmente em questes relacionadas com os mecanismos de transio do IPv4 para IPv6 e em aspetos de segurana. Proporcionando uma abordagem terica ao protocolo e aos conceitos de segurana, este documento apresenta tambm uma perspetiva mais tcnica da implementao do IPv6, pretendendo ser um manual de apoio aos responsveis pela implementao da verso 6 do IP. Os trs mtodos de transio, que permitem a atualizao do IPv4 para IPv6, so analisados de forma a apoiar a equipa na tomada de deciso sobre qual (ou quais) os mtodos de transio a utilizar. Uma parte substancial do trabalho foi dedicada seleo e estudo de vulnerabilidades que se encontram presentes no IPv6, a forma como so exploradas por parte do atacante, a forma como podem ser classificadas e os processos que diminuem o risco de exposio a essas mesmas vulnerabilidades. Um conjunto de boas prticas na administrao da segurana de redes tambm apresentada, para melhorar a garantia de que problemas conhecidos no possam ser explorados por utilizadores mal intencionados.
Resumo:
Dissertao de Mestrado em Engenharia Informtica
Resumo:
Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.
Resumo:
Ympristrasituksen vhentminen, tiukkenevat pstrajat ja ehtyvt ljyvarat ovat ajaneet kulkuvlineteollisuuden hakemaan uusia vaihtoehtoja ajoneuvojen energiatehokkuuden kehittmiseksi. Hybriditeknologia tarjoaa ratkaisuja kustannustehokkuuden ja ympristystvllisyyden parantamiseksi. Hybriditeknologian yleistyess mys tykoneympristss saadaan paitsi kehitetty energiatehokkaampia ja pienemmill kyttkustannuksilla olevia tykoneita, niin mys tuotua siviiliajoneuvoista tuttuja turvallisuusominaisuuksia tykoneympristn. Perinteisten diesel-moottorien korvaaminen nopeavasteisilla ja tarkasti sdettvill shkmoottoreilla tarjoaa mahdollisuuksia toteuttaa tarkempia ja monipuolisempia stjrjestelmi kuin perinteisess ympristss. Tss diplomityss suunnitellaan luistonestojrjestelm ja elektroninen tasauspyrst hybriditykoneympristn. Jrjestelm voi kyttkohteesta riippuen pienent huomattavasti kyttkustannuksia ja mahdollistaa uusien sovellusten tuomista markkinoille, kuten esimerkiksi kntymisen avustaminen differentiaalisella ohjauksella.
Resumo:
Globalization and liberalization, with the entry of many prominent foreign manufacturers, changed the automobile scenario in India, since early 1990s. Manufacturers such as Ford, General Motors, Honda, Toyota, Suzuki, Hyundai, Renault, Mitsubishi, Benz, BMW, Volkswagen and Nissan set up their manufacturing units in India in joint venture with their Indian counterpart companies, by making use of the Foreign Direct Investment policy of the Government of India, These manufacturers started capturing the hearts of Indian car customers with their choice of technological and innovative product features, with quality and reliability. With the multiplicity of choices available to the Indian passenger car buyers, it drastically changed the way the car purchase scenario in India and particularly in the State of Kerala. This transformed the automobile scene from a sellers market to buyers market. Car customers started developing their own personal preferences and purchasing patterns, which were hitherto unknown in the Indian automobile segment. The main purpose of this paper is to come up with the identification of possible parameters and a framework development, that influence the consumer purchase behaviour patterns of passenger car owners in the State of Kerala, so that further research could be done, based on the framework and the identified parameters
Resumo:
Globalization and liberalization, with the entry of many prominent foreign manufacturers, changed the automobile scenario in India, since early 1990s. World Leaders in automobile manufacturing such as Ford, General Motors, Honda, Toyota, Suzuki, Hyundai, Renault, Mitsubishi, Benz, BMW, Volkswagen and Nissan set up their manufacturing units in India in joint venture with their Indian counterpart companies, by making use of the Foreign Direct Investment policy of the Government of India, These manufacturers started capturing the hearts of Indian car customers with their choice of technological and innovative product features, with quality and reliability. With the multiplicity of choices available to the Indian passenger car buyers, it drastically changed the way the car purchase scenario in India and particularly in the State of Kerala. This transformed the automobile scene from a sellers market to buyers market. Car customers started developing their own personal preferences and purchasing patterns, which were hitherto unknown in the Indian automobile segment. The main purpose of this paper is to develop a model with major variables, which influence the consumer purchase behaviour of passenger car owners in the State of Kerala. Though there are innumerable studies conducted in other countries, there are very few thesis and research work conducted to study the consumer behaviour of the passenger car industry in India and specifically in the State of Kerala. The results of the research contribute to the practical knowledge base of the automobile industry, specifically to the passenger car segment. It has also a great contributory value addition to the manufacturers and dealers for customizing their marketing plans in the State
Resumo:
Globalization and liberalization, with the entry of many prominent foreign manufacturers, changed the automobile scenario in India, since early 1990s. World Leaders in automobile manufacturing such as Ford, General Motors, Honda, Toyota, Suzuki, Hyundai, Renault, Mitsubishi, Benz, BMW, Volkswagen and Nissan set up their manufacturing units in India in joint venture with their Indian counterpart companies, by making use of the Foreign Direct Investment policy of the Government of India, These manufacturers started capturing the hearts of Indian car customers with their choice of technological and innovative product features, with quality and reliability. With the multiplicity of choices available to the Indian passenger car buyers, it drastically changed the way the car purchase scenario in India and particularly in the State of Kerala. This transformed the automobile scene from a sellers market to buyers market. Car customers started developing their own personal preferences and purchasing patterns, which were hitherto unknown in the Indian automobile segment. The main purpose of this paper is to come up with the identification of possible parameters and a framework development, that influence the consumer purchase behaviour patterns of passenger car owners in the State of Kerala, so that further research could be done, based on the framework and the identified parameters.
Resumo:
Previous works have studied the characteristics and peculiarities of P2P networks, especially security information aspects. Most works, in some way, deal with the sharing of resources and, in particular, the storage of files. This work complements previous studies and adds new definitions relating to this kind of systems. A system for safe storage of files (SAS-P2P) was specified and built, based on P2P technology, using the JXTA platform. This system uses standard X.509 and PKCS # 12 digital certificates, issued and managed by a public key infrastructure, which was also specified and developed based on P2P technology (PKIX-P2P). The information is stored in a special file with XML format which is especially prepared, facilitating handling and interoperability among applications. The intention of developing the SAS-P2P system was to offer a complementary service for Giga Natal network users, through which the participants in this network can collaboratively build a shared storage area, with important security features such as availability, confidentiality, authenticity and fault tolerance. Besides the specification, development of prototypes and testing of the SAS-P2P system, tests of the PKIX-P2P Manager module were also performed, in order to determine its fault tolerance and the effective calculation of the reputation of the certifying authorities participating in the system
Resumo:
O presente trabalho investiga os discursos da mdia impressa (jornal), acerca da violncia escolar em Belm do Par, no perodo de 2001 a 2010. Ante tal iniciativa, aponta-se como questo norteadora do estudo, saber: Qual o(s) significado(s) e sentido(s) de violncia escolar produzidos nos discursos do jornal impresso O Liberal em Belm, no perodo de 2001- 2010? Com o objetivo de: a) investigar quais os significados e sentidos produzidos pelo jornal impresso O Liberal, em Belm, no perodo de 2001-2010; (b) identificar qual a recorrncia de matrias sobre violncia escolar no jornal impresso O Liberal em Belm, no perodo de 2001-2010; (c) verificar que discursos so materializados no jornal impresso O Liberal em Belm, no perodo de 2001-2010, sobre a violncia escolar, e por fim, (d) identificar a relao das imagens fotogrficas com a construo discursiva do jornal impresso de O Liberal, em Belm, no perodo de 2001-2010, sobre violncia escolar. E, uma vez partindo dos pressupostos da pesquisa documental, o corpus da pesquisa exploratria constitui-se de duzentos e sessenta (260) peas jornalsticas, levantadas junto Biblioteca Pblica Arthur Vianna (CENTUR). A partir desse corpus de 260 peas jornalsticas, consideramos vinte (20) peas jornalsticas, para compor o corpus de anlise dessa dissertao, que se destaca por seu tratamento explcito e nomeado da violncia escolar. A anlise dar-se- luz da teoria/anlise do discurso bakhtiniano; para a qual, todo discurso est impregnado de intenes ideolgicas, o que d significado e sentido s mensagens da mdia. O exame dos achados nos proporcionou concluir que, o nmero de publicaes de peas com teor explcito na abordagem da violncia escolar muito pequeno em relao ao perodo estudado. Constatou-se tambm que o jornal O Liberal possui um posicionamento acerca da violncia escolar que busca consolidar sempre que a aborda por meio da apropriao de falas testemunhais e do discurso cientfico. Verificou-se ainda que, a teia discursiva das matrias jornalsticas analisadas conjuga basicamente dez elementos quase sempre reiterveis, sobre os quais compe sentidos e apreciaes que extrapolam significaes dicionarizadas; em cuja trama, a imagem funciona como partcipe do movimento enunciativo que, da mesma forma evidencia a figura do aluno como principal ator das ocorrncias violentas na escola e do fenmeno como caso de polcia e recursos de segurana. Neste sentido, espera-se poder contribuir para uma apreciao crtica da mdia em suas dimenses prprias de construo dos debates pblicos; assim como para uma compreenso da violncia escolar no mbito da sua veiculao.
Resumo:
Die Bedrohung durch Produktpiraterie wchst stndig, besonders der deutsche Maschinen- und Anlagenbau ist mehr und mehr davon betroffen. Um Komponenten und Ersatzteile zu schtzen, wurde ein technisches Konzept zur Abwehr von Produktpiraterie entwickelt. In diesem System werden Teile mit kopiersicheren Echtheitsmerkmalen gekennzeichnet, welche an diversen Identifikations- und Prfpunkten entlang der Supply-Chain und besonders beim Einsatz in der Maschine ausgelesen und geprft werden. Die Prfergebnisse werden in einer zentralen Datenbank gespeichert, um neue Services zu ermglichen und die Kommunikation zwischen Hersteller und Kunde zu erleichtern.