To see the other types of publications on this topic, follow the link: Client certificate.

Journal articles on the topic 'Client certificate'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Client certificate.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Foppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.

Full text
Abstract:
Abstract TLS, and SSL before it, has long supported the option for clients to authenticate to servers using their own certificates, but this capability has not been widely used. However, with the development of its Push Notification Service, Apple has deployed this technology on millions of devices for the first time. Wachs et al. [42] determined iOS client certificates could be used by passive network adversaries to track individual devices across the internet. Subsequently, Apple has patched their software to fix this vulnerability. We show these countermeasures are not effective by demonstr
APA, Harvard, Vancouver, ISO, and other styles
2

Ahamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption." International Journal of Information Security and Privacy 6, no. 2 (2012): 64–94. http://dx.doi.org/10.4018/jisp.2012040105.

Full text
Abstract:
The authors propose a Secure and Optimized Mobile based Merchant Payment (SOMMP) Protocol using Signcryption scheme with Forward Secrecy (SFS) based on elliptic curve which consumes less computational and communication cost. In SOMMP client sends message in the form of TransCertC (Transaction Certificate) which is a X.509 SLC (X.509 Short Lived Certificate) thereby reducing the client interactions with the engaging parties thereby reducing the consumption of resources (from Client’s perspective) which are very scarce in Resource Constrained Devices like Mobile Phones. In SOMMP protocol WSLC (W
APA, Harvard, Vancouver, ISO, and other styles
3

Mardianto, Is, and Kuswandi Kuswandi. "Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509." Jurnal ULTIMATICS 8, no. 1 (2017): 1–10. http://dx.doi.org/10.31937/ti.v8i1.496.

Full text
Abstract:
Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced E
APA, Harvard, Vancouver, ISO, and other styles
4

Boyen, Xavier, Udyani Herath, Matthew McKague, and Douglas Stebila. "Associative Blockchain for Decentralized PKI Transparency." Cryptography 5, no. 2 (2021): 14. http://dx.doi.org/10.3390/cryptography5020014.

Full text
Abstract:
The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single point
APA, Harvard, Vancouver, ISO, and other styles
5

Alnatsheh, Essam. "The Efficient Use of a List of Trusted Certificate Authorities." International Journal of Engineering Technology and Sciences 5, no. 3 (2018): 118–31. http://dx.doi.org/10.15282/ijets.v5i3.1135.

Full text
Abstract:
Nowadays, many Certificate Authorities (CAs) that issue certificates may or may not be trusted because not all CAs are reliable and trustworthy. University laboratories and computers of its people (students, lecturer and staff) are thus susceptible to the risk resulting from this mistrust. This study proposes a university owned notary server, which will be managed by the university, to solve the problem using a Certificate Trust List (CTL). Simply put, when students and others use the Web, the notary server checks the certificate to see whether a conflict exists and verifies the signatures and
APA, Harvard, Vancouver, ISO, and other styles
6

Sebastian, S., and R. S. Chouhan. "Privacy Preservation and Data Security on Internet Using Mutual Ssl." Oriental journal of computer science and technology 10, no. 1 (2017): 249–54. http://dx.doi.org/10.13005/ojcst/10.01.34.

Full text
Abstract:
It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet users depend daily on SSL/HTPS for secure communication on internet. Over the years, many attacks on the certificate trust model it uses have been evolved. Mutual SSL authentication shared verification alludes to two parties validating each other through checking the digital certificate so that both sides are guaranteed of the other’s identity. In technical terms, it alludes to a client (web program or client application) authenticate themselves to the server (server application) and that server li
APA, Harvard, Vancouver, ISO, and other styles
7

Budi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.

Full text
Abstract:
Extensible Authentication Protocol (EAP) is authentication method to protect wireless local area network from un-authorized user which there was interaction between radius servers, access point and client device. When EAP was used as authentication method, the authentication can be strengthened by using TLS (Transport Layer Security) certificate where client device and server will use certificate to verify the identity of each other. The certificate must meet requirement on the server and client for the successful authentication. For this time, the authentication method provides highest level
APA, Harvard, Vancouver, ISO, and other styles
8

Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.

Full text
Abstract:
This article presents the results of an experimental study of the properties of SSL/TLS certificates of an anonymous Tor network, based on which it is concluded that there are several features that differ from other SSL/TLS certificates. At present, in the scientific literature and in the documentation of U.S. National Security Agency, and the U.K. Government Communications Headquarters devoted to the identification of Tor network traffic, two signs of SSL/TLS certificates are indicated - the name of the certificate subject, as well as the port of the certificate transmission and network conne
APA, Harvard, Vancouver, ISO, and other styles
9

Wibisurya, Aswin, and Timothy Yudi Adinugroho. "A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption." ComTech: Computer, Mathematics and Engineering Applications 5, no. 2 (2014): 647. http://dx.doi.org/10.21512/comtech.v5i2.2215.

Full text
Abstract:
Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate valida
APA, Harvard, Vancouver, ISO, and other styles
10

Mohamad, Imad, and Aws Abdulsahib. "A Framework Prototype for E-Authentication of Iraqi Civil-Identity Certificate." Iraqi Journal for Computers and Informatics 41, no. 1 (2014): 20–25. http://dx.doi.org/10.25195/ijci.v41i1.93.

Full text
Abstract:
The increasing needs for Iraqi citizens in getting the advantages of e-government services, administration anddemocracy motivates us to study and look for how to expand the e-government project of Iraq with new e-services. Theproposed framework considers a realistic problem in Iraq called the identity of the Civil Status. It verifies the (identity)validity of issued electronically instead of paperwork which takes significant time and effort to complete the transaction. Anelectronic interface is designed for the sake of the proposed framework using client-server approach assisted by PHP andMySQ
APA, Harvard, Vancouver, ISO, and other styles
11

Kohlar, Florian, Jörg Schwenk, Meiko Jensen, and Sebastian Gajek. "On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security." International Journal of Mobile Computing and Multimedia Communications 3, no. 4 (2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011100102.

Full text
Abstract:
In recent research, two approaches to protect SAML based Federated Identity Management (FIM) against man-in-the-middle attacks have been proposed. One approach is to bind the SAML assertion and the SAML artifact to the public key contained in a TLS client certificate. Another approach is to strengthen the Same Origin Policy of the browser by taking into account the security guarantees TLS gives. This work presents a third approach which is of further interest beyond IDM protocols, especially for mobile devices relying heavily on the security offered by web technologies. By binding the SAML ass
APA, Harvard, Vancouver, ISO, and other styles
12

Seniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.

Full text
Abstract:
Currently there is no method, feature, or ability in securing data transmission in microcontroller systems and applications with client-server scheme communication, while major modern computer systems using secure socket layer (SSL) for establishing secure communication. However, ESP espressif based microcontroller has supported SSL communication to secure data transmission, but only works on the Wi-Fi network. A single-board computer based embedded system has fully supported SSL communication, but it costs a very high price. On the other hand, STM32F103 microcontrollers with a very affordable
APA, Harvard, Vancouver, ISO, and other styles
13

Wei, Min, Shuaidong Zhang, Ping Wang, and Keecheon Kim. "An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things." International Journal of Distributed Sensor Networks 14, no. 1 (2018): 155014771875479. http://dx.doi.org/10.1177/1550147718754793.

Full text
Abstract:
As an industrial communication data interaction specification, OPC Unified Architecture effectively solves the industrial Internet of Things system integration problem. This article designs an authentication and key agreement scheme based on implicit certificate using the security model provided by OPC Unified Architecture. It establishes the secure channel and provides a guarantee for secure session for the OPC Unified Architecture server and client. Then, the test verification platform is implemented to verify the feasibility of the scheme. The result shows that the mechanism is feasible, an
APA, Harvard, Vancouver, ISO, and other styles
14

Kumar, Neeraj. "Load Balancing Aware Multiparty Secure Group Communication for Online Services in Wireless Mesh Networks." International Journal of Wireless Networks and Broadband Technologies 1, no. 3 (2011): 15–29. http://dx.doi.org/10.4018/ijwnbt.2011070102.

Full text
Abstract:
The internet offers services for users which can be accessed in a collaborative shared manner. Users control these services, such as online gaming and social networking sites, with handheld devices. Wireless mesh networks (WMNs) are an emerging technology that can provide these services in an efficient manner. Because services are used by many users simultaneously, security is a paramount concern. Although many security solutions exist, they are not sufficient. None have considered the concept of load balancing with secure communication for online services. In this paper, a load aware multipar
APA, Harvard, Vancouver, ISO, and other styles
15

Stasiak-Betlejewska, Renata, and Eva Nedeliaková. "Determinants of the Energy Saving Construction Quality in the Green Design." Quality Production Improvement - QPI 1, no. 1 (2019): 178–83. http://dx.doi.org/10.2478/cqpi-2019-0024.

Full text
Abstract:
Abstract Crucial element of the contemporary construction development trend is compatibility of the building design with client and architecture trends and sustainability strategy. The environmental certification systems for buildings such as LEED, BREEAM and WELL apply a lot of attention to providing users with a healthy housing environment. The criteria of these systems include many practical recommendations that buildings should meet on design, construction and use stage. These requirements can be a signpost, even for buildings and offices that do not aspire to obtain a certificate. The aim
APA, Harvard, Vancouver, ISO, and other styles
16

Siau, Keng. "Xcert Software, Inc." Journal of Information Technology 14, no. 3 (1999): 235–42. http://dx.doi.org/10.1177/026839629901400303.

Full text
Abstract:
Xcert's business is in developing Internet and Intranet security enhancement technology. Xcert was founded in April 1996 by Andrew Csinger and Pat Richard and was headquartered in Vancouver, Canada. Xcert's solution to Internet security was a public key infrastructure (PKI). PKI is a system of digital certificates, certificate authorities (CAs) and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction. Xcert's PKI technology allows organizations of any size to issue digital certificates to their members. These organizations b
APA, Harvard, Vancouver, ISO, and other styles
17

Figueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (2019): 4455. http://dx.doi.org/10.3390/s19204455.

Full text
Abstract:
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations. Modbus is an application protocol that allows communication between millions of automation devices. Unfortunately, Modbus lacks basic security mechanisms, and this leads to multiple vulnerabilities, due to both design and implementation. This issue enables certain types of attacks, for example, man in the middle attacks, eavesdropping attacks, and replay attack. The exploitation of such flaws may greatly influence compan
APA, Harvard, Vancouver, ISO, and other styles
18

Sankarasubramanyan, R. "‘Preparation’ and ‘Readiness’: The Education Paradigm for the Organisation Development Certificate Programme." NHRD Network Journal 13, no. 3 (2020): 296–310. http://dx.doi.org/10.1177/2631454120951882.

Full text
Abstract:
The organisation development certificate programme (ODCP) offered by the Indian Society for Applied Behavioural Science—ISABS ( www.isabs.org ) is a unique blend of learning about organisations, the process of OD with deep awareness about self as an instrument of change. ISABS as an institution has been engaged with T-groups for the past 50 years, having learnt the same from National Training Laboratories (NTL) Institute for Applied Behavioural Science ( www.ntl.org ). The focus of ISABS has been on discovering oneself through the process of engagement in small groups. ISABS pedagogy has evolv
APA, Harvard, Vancouver, ISO, and other styles
19

Crawford, Judy, and Fred Shaffer. "BCIA in 2014: What's New?" Biofeedback 41, no. 4 (2013): 155–57. http://dx.doi.org/10.5298/1081-5937-41.4.04.

Full text
Abstract:
The Biofeedback Certification International Alliance (BCIA) has revised its recertification requirements and fees to reduce certificant costs. BCIA has expanded options for earning inexpensive and accessible continuing education, including Massive Open Online Courses (MOOCs). BCIA continues to promote ethics education to protect clients, professionals, and the credibility of our field. More educators teach BCIA's HRV Biofeedback Certificate of Completion didactic course to students and professionals. BCIA's Job Board has helped employers recruit our skilled certificants. Finally, there is a ne
APA, Harvard, Vancouver, ISO, and other styles
20

Pilev, D. "Digital Signing of Data in the Web-based Information Systems." Information Technologies and Control 14, no. 1 (2016): 21–26. http://dx.doi.org/10.1515/itc-2016-0018.

Full text
Abstract:
Abstract Digital signing of data in the Web-based IS is one of the most secure methods for guaranteeing the authenticity of data. Storage of user keys is particularly important for this methodology. The present development proposes a new algorithm for storage and usage of user keys for the database by the digital certificate of the client. The proposed methodology was designed for protection of data in a particular information system. One of the characteristics of this system is the great number of authorized users with rights for access and modification of various parts of data. With such sys
APA, Harvard, Vancouver, ISO, and other styles
21

Blythe, Stephen. "Computer Law of Tunisia: Promoting Secure E-Commerce Transactions with Electronic Signatures." Arab Law Quarterly 20, no. 3 (2006): 240–67. http://dx.doi.org/10.1163/026805506778388854.

Full text
Abstract:
AbstractTunisia's Electronic Exchanges and Electronic Commerce Law ("ECL") was enacted for the purpose of achieving more security in E-commerce transactions. The ECL provides that: (1) electronic documents may be used to satisfy a statutory requirement for paper documents to be stored for a given period of time; and (2) an electronic signature affixed to an electronic document may be used to satisfy a statutory requirement for an ink signature to be executed on a paper document. The National Agency for Electronic Certification ("NAEC") licenses Certification Authorities ("CA") and regulates th
APA, Harvard, Vancouver, ISO, and other styles
22

Setyoningrum, Novita. "Strategi Pemasaran Jasa Balik Nama Sertifikat Tanah di Kantor Notaris Etik Pudji Lestari, S.H., M.Kn." Translitera : Jurnal Kajian Komunikasi dan Studi Media 10, no. 1 (2021): 32–44. http://dx.doi.org/10.35457/translitera.v10i1.1423.

Full text
Abstract:
The marketing mix is one of the aspects considered by the buyer to be able to decide on the purchase of a product, both goods and services. Services are also referred to as the provision of performance or invisible activities from one party to another. The Notary Office / PPAT Etik Pudji Lestari, SH., MKn has implemented 7P with activities in the form of product, price, place, promotion, people, process and physical awareness in its marketing mix so as to help encourage client interest to take care of returning the name of the certificate to the Notary / PPAT Ethics Pudji Lestari, SH., MKn. In
APA, Harvard, Vancouver, ISO, and other styles
23

Vušković, Petar. "Analysis of the Fluctuation of the Number of ISO 9001:2015 Certificates in the Republic of Croatia and Assessment of Satisfaction of Business Organisations Leadership with the Certificate." Naše gospodarstvo/Our economy 66, no. 4 (2020): 40–49. http://dx.doi.org/10.2478/ngoe-2020-0022.

Full text
Abstract:
Abstract The ISO 9001:2015 certificate of quality is nowadays the most renowned quality standard in the world. Standardised quality has become an imperative competitive advantage on the market for all serious business organisations. The fluctuation of the number of certificates of quality indicates to what extent companies are willing to ensure the quality of their products and services to customers and clients, and how fast the domestic market is standardised and integrated into the global economy. This paper presents the results of two empirical studies. The first one focused on the analysis
APA, Harvard, Vancouver, ISO, and other styles
24

Yadav, Preeti, Paulo Mateus, Nikola Paunković, and André Souto. "Quantum Contract Signing with Entangled Pairs." Entropy 21, no. 9 (2019): 821. http://dx.doi.org/10.3390/e21090821.

Full text
Abstract:
We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients’ honesty and deliver signed certificates. The protocol is fair, i.e., the probability that a client, say Bob, can obtain a signed copy of the contract, while Alice cannot, can be made arbitrarily small, and scales as N − 1 / 2 , where 4 N is the total number of rounds (communications between the two clients) of the prot
APA, Harvard, Vancouver, ISO, and other styles
25

Cambou, Bertrand, Michael Gowanlock, Bahattin Yildiz, et al. "Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions." Applied Sciences 11, no. 6 (2021): 2801. http://dx.doi.org/10.3390/app11062801.

Full text
Abstract:
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys is then more complex for handling longer keys. This paper describes practical ways to generate keys from physical unclonable functions, for both lattice and code-based cryptography. Handshakes between client devices containing the physical unclonable functions (PUFs) and a server are used to select sets of addressable positions in the PUFs, fro
APA, Harvard, Vancouver, ISO, and other styles
26

Bartók, Sándor P., and Péter Máté Erdősi. "May the advanced biometric electronic signature be applicable in public administration?" Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 455–62. http://dx.doi.org/10.24989/ocg.v325.37.

Full text
Abstract:
Electronic signature is a technology-neutral collective noun. Therefore, several different implementations compose the known types of electronic signatures. Many classifications may be defined, for instance from technological and legal aspects. In reference to acceptability, legal status of a given signature seems to be the most important attribute for transaction partners in the e-Administration. Full probative force is usually required by Public Administration and it is also a need for building trust between untrusted partners. It can be achieved by the well-known qualified electronic signat
APA, Harvard, Vancouver, ISO, and other styles
27

Mahmmod, Khalid Fazaa, Mohammed Muzahem Azeez, and Zeyad Hashem Ismael. "Design an active verification mechanism for certificates revocation in OCSP for internet authentication." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (2020): 4208. http://dx.doi.org/10.11591/ijece.v10i4.pp4208-4216.

Full text
Abstract:
No doubt that data security online is crucial. Therefore, great attention has been paid to that aspect by companies and organizations given its economic and social implications. Thus, online certificate status protocol (OCSP) is considered one of the most prominent protocol functioning in this field, which offers a prompt support for certificates online. In this research, a model designed based on field programable gate array (FPGA) using Merkel’s tree has been proposed to overcome the delay that might have occurred in sorting and authentication of certificates. Having adopted this model and w
APA, Harvard, Vancouver, ISO, and other styles
28

Shah, Hitesh, Priti Solanky, Rachana Kapadia, and Sunil Nayak. "Mid-Level Health Providers- their perceptions and background knowledge pertaining to Comprehensive Primary Health Care and Health and Wellness Center." Healthline 11, no. 2 (2020): 40–47. http://dx.doi.org/10.51957/healthline_159_2020.

Full text
Abstract:
Introduction: To achieve universal health coverage, concept of Health and Wellness Center (HWC) was given under Ayushman Bharat. For providing health care services through HWC, cadre of Mid-Level Health Provider (MLHP) is introduced who would be leading primary health care team at HWC. Objective: This study was undertaken with objective to assess the factors favoring to join this course and baseline knowledge of Comprehensive Primary Health Care (CPHC) and Health and Wellness Center (HWC) among course candidates Method: It was a cross sectional study conducted among candidates of certificate c
APA, Harvard, Vancouver, ISO, and other styles
29

Martinez Pedreira, Miguel, Costin Grigoras, Volodymyr Yurchenko, and Maksim Melnik Storetvedt. "The Security model of the ALICE next generation Grid framework." EPJ Web of Conferences 214 (2019): 03042. http://dx.doi.org/10.1051/epjconf/201921403042.

Full text
Abstract:
JAliEn (Java-AliEn) is the ALICE next generation Grid framework which will be used for the top-level distributed computing resources management during the LHC Run 3 and onward. While preserving an interface familiar to the ALICE users, its performance and scalability are an order of magnitude better than the currently used framework. To implement the JAliEn security model, we have developed the so-called Token Certificates – short lived full Grid certificates, generated by central services automatically or on the client’s request. Token Certificates allow fine-grained control over user/client
APA, Harvard, Vancouver, ISO, and other styles
30

Meyer, Helen. "Securing intranet data with SSL client certificates." Computers & Security 16, no. 4 (1997): 334. http://dx.doi.org/10.1016/s0167-4048(97)80213-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Vlasenko, Aleksandra, and Irina Korkh. "Issues of Security of Remote Banking Systems." NBI Technologies, no. 2 (December 2018): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.1.

Full text
Abstract:
The banking system of the Russian Federation is based on Federal legislation, as well as industry and inter-industry standards developed by the International community and the Central Bank of the Russian Federation. The introduction and development of remote banking services is the most popular direction in the modern banking system. The term ‘remote banking service’ refers to the technology of providing services for the remote transmission of orders by credit institutions (without clients’ presence in bank office), using different communication channels. Information security in bank-client sy
APA, Harvard, Vancouver, ISO, and other styles
32

Sukarti, Sukarti, and Sri Karnila. "PERANCANGAN STRATEGI PELAYANAN BERBASIS PENGETAHUAN PADA KANTOR NOTARIS." KLIK - KUMPULAN JURNAL ILMU KOMPUTER 3, no. 2 (2016): 114. http://dx.doi.org/10.20527/klik.v3i2.44.

Full text
Abstract:
The study resulted in a strategy design for certificate making service at the notary office. It was a case study at notary office of Theresia Dwi Wijayanti, S.H. the mechanism and work frame/ principle of certificate making service was still in the form of job instructions understood only by several employees, and this often made repeated questions at the service department and became a problem when the employee took permission not to come to work. Since the mechanism and work flow/ principle of the service was not vivid, and there were no any media for the service of making the authentic cert
APA, Harvard, Vancouver, ISO, and other styles
33

YANG, Huan-Ming. "人類遺傳學家的社會責任". International Journal of Chinese & Comparative Philosophy of Medicine 2, № 4 (1999): 55–65. http://dx.doi.org/10.24112/ijccpm.21381.

Full text
Abstract:
LANGUAGE NOTE | Document text in Chinese; abstract also in English.作者首先指出科學是一把雙刃劍,科學家是鑄造和掌握這把雙刃劍的人。因比有責任去關注對科學技術的正當使用,使之有益於人類。中國人類遺傳學家當前有四項責任:加速研究並應用於衛生保健;最大限度減少/避免遺傳信息和保護措施的誤用/濫用,其中尤其是要堅持知情同意/知情選擇和保護隱私原則;積極參與ELSI爭論;以及教育臨床醫生、公眾和自己。他強調,更重要的是我們必須充分地認識到通過遺傳學措施提供給特定個人的具體幫助與“改良人口質量”的本質區別。我們必須探索隱藏在30億城基對內的秘密,我們人類和我們社會一直是依靠這些城基進化和發展的。我們必須努力工作來更新我們關於我們基因的知識,並應用這些知識於人民的衛生保健和我們的社會。The advances of the world-wide Human Genome Project and other research in this field have led to the explosion of knowledge about our genes which are so widely and deeply involved in our lives. The knowledge and related techno
APA, Harvard, Vancouver, ISO, and other styles
34

Retno, Sujacka, Novia Hasdyna, Mutasar Mutasar, and Rozzi Kesuma Dinata. "Algoritma Honey Encryption dalam Sistem Pendataan Sertifikat Tanah dan Bangunan di Universitas Malikussaleh." INFORMAL: Informatics Journal 5, no. 3 (2020): 87. http://dx.doi.org/10.19184/isj.v5i3.20804.

Full text
Abstract:
The management of Land and Building Certificates at Universitas Malikussaleh is still using a manual library in Biro Perlengkapan which contains some problem whereas it can be burned accidentally refers to fire case in 2017 in Rektorat Building at Universitas Malikussaleh. Given the problem faced by the staff in Biro Perlengkapan, the authors idea is to create a database-based data processing system, the authors designed an integrated information system which be able to anticipated such problem in the future and saving time to collecting important certificates such Land and Building Certificat
APA, Harvard, Vancouver, ISO, and other styles
35

Norman, Mark. "ACCESSING SERVICES WITH CLIENT DIGITAL CERTIFICATES: A SHORT REPORT FROM THE DCOCE PROJECT." New Review of Information Networking 10, no. 2 (2004): 193–207. http://dx.doi.org/10.1080/13614570500091940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Vicky, William Caelli, and Yu-Nien Maggie Chen. "Using a Public Key Registry for Improved Trust and Scalability in National E-Health Systems." International Journal of E-Health and Medical Communications 4, no. 4 (2013): 66–83. http://dx.doi.org/10.4018/ijehmc.2013100105.

Full text
Abstract:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet
APA, Harvard, Vancouver, ISO, and other styles
37

Díaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (2019): 3292. http://dx.doi.org/10.3390/s19153292.

Full text
Abstract:
IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thu
APA, Harvard, Vancouver, ISO, and other styles
38

Nithya, S. Mary Virgil, and V. Rhymend Uthariaraj. "Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience." Security and Communication Networks 2020 (January 27, 2020): 1–13. http://dx.doi.org/10.1155/2020/4838497.

Full text
Abstract:
Secured storage system is a critical component in cloud computing. Cloud clients use cloud auditing schemes to verify the integrity of data stored in the cloud. But with the exposure of the auditing secret key to the Cloud Service Provider, cloud auditing becomes unsuccessful, however strong the auditing schemes may be. Therefore, it is essential to prevent the exposure of auditing secret keys, and even if it happens, it is necessary to minimize the damage caused. The existing cloud auditing schemes that are strongly resilient to key exposure are based on Public Key Infrastructure and so have
APA, Harvard, Vancouver, ISO, and other styles
39

Zasada, Stefan J., Ali N. Haidar, and Peter V. Coveney. "On the usability of grid middleware and security mechanisms." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 369, no. 1949 (2011): 3413–28. http://dx.doi.org/10.1098/rsta.2011.0131.

Full text
Abstract:
Usability is an all too often neglected aspect of grid computing, although it is one of the principal factors militating against the widespread uptake of distributed computing. Many resource providers on a grid infrastructure deploy a standard middleware stack and expect users to invoke the default client tools for that middleware stack to access their resources. Unfortunately, many of these middleware client tools have been developed as an afterthought, and are widely considered difficult to use. Such tools typically require a user to interact with a machine, to stage data and launch jobs, an
APA, Harvard, Vancouver, ISO, and other styles
40

SYSLING, FENNEKE. "Science and self-assessment: phrenological charts 1840–1940." British Journal for the History of Science 51, no. 2 (2018): 261–80. http://dx.doi.org/10.1017/s0007087418000055.

Full text
Abstract:
AbstractThis paper looks at phrenological charts as mediators of (pseudo-)scientific knowledge to individual clients who used them as a means of self-assessment. Phrenologists propagated the idea that the human mind could be categorized into different mental faculties, with each particular faculty represented in a different area of the brain and by bumps on the head. In the US and the UK popular phrenologists examined individual clients for a fee. Drawing on a collection of phrenological charts completed for individual clients, this paper shows how charts aspired to convey new ideals of selfho
APA, Harvard, Vancouver, ISO, and other styles
41

Nóbrega, José Cândido da Silva, Francisco das Chagas Bezerra Neto, Aline Carla de Medeiros, and Patrício Borges Maracajá. "Plano de gestão na cadeia de comercialização do mel no Sertão da Paraiba." Research, Society and Development 10, no. 7 (2021): e52710715719. http://dx.doi.org/10.33448/rsd-v10i7.15719.

Full text
Abstract:
Esse estudo apresentou o plano de gestão na cadeia de comercialização do mel no sertão da Paraíba. A empresa que se pretende abrir terá o nome fictício de MEL ORGÂNICO POMBALENSE. Ela se diferenciará das concorrentes, pois oferecerá aos consumidores produtos orgânicos. O principal motivo para esta proposta é que atualmente não há nenhuma empresa especializada na região de Pombal em mel orgânico certificado, ou pelo menos não em evidência ou quantidade, que desenvolva um trabalho semelhante, portanto acredito que estes diferenciais possam agregar valor ao processo de venda, criando uma carteira
APA, Harvard, Vancouver, ISO, and other styles
42

Asiedu, William Asiedu, K. Osei-Boateng, and John Rajan. "Server-aided Public Key Signatures for Diverse Network Devices." International Journal of Technology and Management Research 1, no. 1 (2020): 57–63. http://dx.doi.org/10.47127/ijtmr.v1i1.6.

Full text
Abstract:
One of the main challenges of securing effective computation in diverse network devices tends to be a limitation of their computational power. Server assisted signature scheme was recently presented as nonrepudiation service for mobile and constrained devices. They all tend to have a feature in common: limited computational capabilities and equally limited power (as most operate on batteries). The scheme suffered with high storage requirements and memory requirements for the mobile clients. This makes them ill-suited for public key signatures. This paper examines practical and conceptual impli
APA, Harvard, Vancouver, ISO, and other styles
43

Cosby, Janel, Christina Marie Figueroa, and Rose L. Allen. "Differences Between the 1993 and 2007 Standards for the Certificate of Clinical Competence in Audiology." Perspectives on Administration and Supervision 18, no. 2 (2008): 44–49. http://dx.doi.org/10.1044/aas18.2.44.

Full text
Abstract:
ABSTRACT Individuals applying for their initial American Speech-Language-Hearing Association (ASHA) Certificate of Clinical Competence in Audiology (CCC-A) must now adhere to the 2007 Certification Standards in Audiology (ASHA, 2008). The standards, which took effect on January 1, 2007, require a doctoral degree for persons who apply for certification after December 31, 2011. This article compares the 1993 and 2007 Standards for Certification in Audiology and discusses the major differences, such as length of the practicum experience, assignment of patients/clients, the number and type of cloc
APA, Harvard, Vancouver, ISO, and other styles
44

Arun Kumar, S., and M. S. Anbarasi. "Noble Authentication Protocol with Privacy Preservation Policy for Public Auditing on Shared Data." Journal of Computational and Theoretical Nanoscience 16, no. 8 (2019): 3252–58. http://dx.doi.org/10.1166/jctn.2019.8172.

Full text
Abstract:
The cloud based services today offers a large amount of services irrespective of the geographical location to individuals or a group. This opens the way to new security dangers to the protection and also the integrity of the information put away. Public Key Infrastructure mechanism, advanced endorsements, computerized marks are existing techniques to accomplish numerous security prerequisite sites, however late dangers make them powerless against genuine assaults when utilized without earlier trust-point establishments. At the time of open reviewing of the information by Third Party Auditor, i
APA, Harvard, Vancouver, ISO, and other styles
45

Fourchard, Laurent. "BUREAUCRATS AND INDIGENES: PRODUCING AND BYPASSING CERTIFICATES OF ORIGIN IN NIGERIA." Africa 85, no. 1 (2015): 37–58. http://dx.doi.org/10.1017/s0001972014000734.

Full text
Abstract:
ABSTRACTIn the last three decades, the politics of indigeneity have led to discrimination against and marginalization of non-indigenes as well as numerous violent conflicts between indigenes and non-indigenes in Nigeria. This discrimination, which is based on a localized place of belonging, has today become bureaucratized: local governments produce ‘certificates of indigene’ to identify the origin of their holders. This article looks at the bureaucratic machinery of issuing certificates of origin in two local governments of Oyo State (in the south-west) and the everyday encounters between user
APA, Harvard, Vancouver, ISO, and other styles
46

Azevedo, Dulce de Oliveira, Elza Maria de Sá Ferreira, Maria de Fátima de Faria Jóia, and Miriam Gonçalves Matheus. "Assistência de enfermagem ao cliente queimado no ambulatório e/ou no domicílio após alta da unidade de internação." Revista Brasileira de Enfermagem 42, no. 1-2-3-4 (1989): 60–67. http://dx.doi.org/10.1590/s0034-71671989000100008.

Full text
Abstract:
A investigação realizada por quatro enfermeiras objetiva ressaltar a importância desse profissional na assistência ao queimado, após alta hospitalar, para averiguar o aparecimento de possíveis seqüelas e, diagnosticando-as, utilizar meios para miniminzá-las. Também foi preocupação do grupo certificar se as orientações dadas a cliente/família sobre higiene, uso de suportes ortopédicos e máscaras haviam sido assimiladas. Os resultados confirmam a ocorrência de problemas relacionados à cicatrização das lesões.
APA, Harvard, Vancouver, ISO, and other styles
47

Cowardin, William H., George W. Dowell, and Richard C. Rodi. "MSRC Responders: Construction and Operation of Sixteen Oil Spill Response Vessels." Marine Technology and SNAME News 32, no. 03 (1995): 164–78. http://dx.doi.org/10.5957/mt1.1995.32.3.164.

Full text
Abstract:
The Marine Spill Response Corporation (MSRC) was established to provide catastrophic spill response capabilities to its client companies as required by the Oil Pollution Act of 1990 (OPA 90). The MSRC fleet consists of 16 oil spill response vessels (OSRVs), 16 boom support boats, 17 oil barges, and numerous small craft totaling 273 vessels, 185 of which are U.S. Coast Guard certificated. This paper provides an overview of these vessels, their capabilities, and their roles in oil spill response. Particular emphasis is placed on the design, acquisition, and operation of the 200 ft oceangoing OSR
APA, Harvard, Vancouver, ISO, and other styles
48

Morales Ruiz, Engel Román. "Experiencia exitosa en la implementación del sistema gestión de la inocuidad alimentaria ISO 22000:2005." Revista Ciencia y Tecnología El Higo 1, no. 2 (2009): 16–18. http://dx.doi.org/10.5377/elhigo.v1i2.8650.

Full text
Abstract:
El ingenio Monte Rosa S.A (MSA), cumpliendo con su futuro visionario de llegar a ser una de las 10 empresas más importantes en el mercado de edulcorantes en el mundo para el año 2030, decidió en el año 2007 certificarse bajo la norma ISO 22000:2005. Esto para asegurar la salud de los consumidores de los productos elaborados por la empresa. La norma ISO 22000 establece los requerimientos que debe cumplir un sistema de gestión de la inocuidad alimentaria (SGIA) en una organización dentro de la cadena alimentaria. El sistema ISO 22000 de MSA está basado en un robusto sistema de gestión de la cali
APA, Harvard, Vancouver, ISO, and other styles
49

Rayment, G. E., K. I. Peverill, and B. C. Shelley. "Australian Soil and Plant Analysis Council soil and plant quality assurance programs and the impact of variability of test results on clients." Australian Journal of Experimental Agriculture 38, no. 7 (1998): 777. http://dx.doi.org/10.1071/ea97159.

Full text
Abstract:
Summary. In relatively few years, the Australian Soil and Plant Analysis Council Inc. (ASPAC) has conducted 2 inter-laboratory proficiency programs on plant material and 3 inter-laboratory proficiency programs on soils. The purpose of these performance-based programs is to enhance the quality of soil and plant analysis in Australasia, with guidance where necessary from the soil and plant expertise of ASPAC members. ASPAC’s inaugural ‘Accreditation Committee’ reviewed published standards and existing laboratory accreditation/proficiency programs in Australia and internationally before developin
APA, Harvard, Vancouver, ISO, and other styles
50

Pradhan, S. "P03-253 - Attitudes and response of opioid-dependent clients to receiving certificates as contingency management- a qualitative survey." European Psychiatry 25 (2010): 1320. http://dx.doi.org/10.1016/s0924-9338(10)71307-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!