To see the other types of publications on this topic, follow the link: Delegated authentication.

Journal articles on the topic 'Delegated authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 42 journal articles for your research on the topic 'Delegated authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Khan, Mohsin, Philip Ginzboorg, and Valtteri Niemi. "AKMA: Delegated Authentication System of 5G." IEEE Communications Standards Magazine 5, no. 3 (2021): 56–61. http://dx.doi.org/10.1109/mcomstd.101.2100015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loiselle, Mirka. "Multiple Authority Delegation in Art Authentication." Scientonomy: Journal for the Science of Science 1 (May 19, 2017): 41–53. http://dx.doi.org/10.33137/js.v1i0.28233.

Full text
Abstract:
In this paper, I expand upon the research on authority delegation begun by Overgaard and myself in our 2016 paper Authority Delegation. I argue that singular authority delegation – in which a community delegates authority over a given topic to a single expert community – should be distinguished from cases of multiple authority delegation. A community engages in multiple authority delegation iff that community delegates authority over a given topic to more than one expert community. Furthermore, multiple authority delegation can be further divided into two types: hierarchical and non-hierarchic
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Qun, Jianzhong Li, and Xuechang Ren. "A provably secure delegated authentication scheme and its applications." International Journal of Embedded Systems 11, no. 2 (2019): 139. http://dx.doi.org/10.1504/ijes.2019.098292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Qun, Jianzhong Li, and Xuechang Ren. "A provably secure delegated authentication scheme and its applications." International Journal of Embedded Systems 11, no. 2 (2019): 139. http://dx.doi.org/10.1504/ijes.2019.10019710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chien, Hung-Yu, and Tzu-Hang Hsu. "Secure fast WLAN handoff using time-bound delegated authentication." International Journal of Communication Systems 22, no. 5 (2009): 565–84. http://dx.doi.org/10.1002/dac.983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Lei, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong, and Kaoru Ota. "MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing." Security and Communication Networks 9, no. 16 (2016): 3777–89. http://dx.doi.org/10.1002/sec.1490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, JoonYoung, MyeongHyun Kim, JiHyeon Oh, YoungHo Park, KiSung Park, and Sungkee Noh. "A Secure Key Aggregate Searchable Encryption with Multi Delegation in Cloud Data Sharing Service." Applied Sciences 11, no. 19 (2021): 8841. http://dx.doi.org/10.3390/app11198841.

Full text
Abstract:
As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, the cloud server has privacy issues, including personal information and requires the help of a Trusted Third Party (TTP) for data sharing. However, because the amount of data generated and value increases, the data owner who produces data must become the subject of data sharing. In this study, we use key aggregate searchable encryption (KASE) technology, which enables keyword search, to efficiently share data without
APA, Harvard, Vancouver, ISO, and other styles
8

Dumitru, Ionuț Cătălin, and Mihai Togan. "Client Module with Multifactor Authentication for Remote Electronic Signature Generation Using Cryptography API: Next Generation." Journal of Military Technology 3, no. 1 (2020): 5–10. http://dx.doi.org/10.32754/jmt.2020.1.01.

Full text
Abstract:
In classic PKI systems, users resorted to cryptographic devices like smartcard or electronic-token to perform the required cryptographic operations, therefore all cryptographic operations will be done in a safe environment. Although a widely-accepted and highly-efficient method, along with the evolution of technology, it is also desirable to simplify user experience with the applications and at the same time to reduce costs. Thus, there is the problem of cryptographic devices and passwords needing to be retained and secret. To overcome all these impediments, we introduce the concept of remote
APA, Harvard, Vancouver, ISO, and other styles
9

Park, Jun-Cheol. "Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality." Korean Institute of Smart Media 11, no. 10 (2022): 76–88. http://dx.doi.org/10.30693/smj.2022.11.10.76.

Full text
Abstract:
Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity
APA, Harvard, Vancouver, ISO, and other styles
10

Pavlov, Andrey S., Nikolay Yu Svistunov, Vyacheslav I. Petrenko, Fariza B. Tebueva, Vladimir V. Kopytov, and Evgeniy N. Tishchenko. "PROTOCOL FOR THE DELEGATED AUTHENTICATION OF NEW AGENTS WHEN THE NUMBER OF AGENTS IS SCALING IN SWARMING ROBOT SYSTEMS." Вестник ВГУ Серия Системный анализ и информационные технологии, no. 4 (2022): 23–38. http://dx.doi.org/10.17308/sait/1995-5499/2022/4/23-38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Díaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (2019): 3292. http://dx.doi.org/10.3390/s19153292.

Full text
Abstract:
IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thu
APA, Harvard, Vancouver, ISO, and other styles
12

Ross, Hana, Michael Eads, and Michael Yates. "Why governments cannot afford Codentify to support their track and trace solutions." Tobacco Control 27, no. 6 (2018): 706–8. http://dx.doi.org/10.1136/tobaccocontrol-2017-053970.

Full text
Abstract:
BackgroundIn anticipation of the Protocol to Eliminate Illicit Trade in Tobacco Products (ITP) entering into force in 2018, there is a growing demand for information on track and trace (T&T) solutions for tobacco products. This article contrasts the efficacy of Codentify from the perspective of authentication with that of material-based multilayered security technologies.MethodTo calculate the probability of detecting one fraudulent pack under Codentify, we relied on a modified Bernoulli trial experiment with independent repeated sampling without replenishment. The probability is calculate
APA, Harvard, Vancouver, ISO, and other styles
13

Saraswathy, K. S., and S. S. Sujatha. "Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search." International journal of electrical and computer engineering systems 13, no. 7 (2022): 569–75. http://dx.doi.org/10.32985/ijeces.13.7.9.

Full text
Abstract:
The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since data management has been delegated to an untrusted cloud server in the data outsourcing phase, data access control has been identified as a major problem in cloud storage systems. To overcome this problem, in this paper, the access control of cloud storage using an Attribute-Based Access Control (ABAC) approach is utilized. First, the data must be stored in the cloud and security must be strong for the user to access the data. This model takes into con
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Jiakai, Yishi Zhao, and Xiao Chen. "OSCMS: A Decentralized Open-Source Coordination Management System Using a Novel Triple-Blockchain Architecture." Applied Sciences 13, no. 11 (2023): 6580. http://dx.doi.org/10.3390/app13116580.

Full text
Abstract:
Open-source systems help to manage the rapid development of software, while governing open-source systems properly can effectively promote software and software engineering. However, some significant problems, such as code controls, incentives, interaction and cooperation, automation, transparency and fairness of rights and responsibilities, cannot be properly solved by traditional methodologies. The decentralization, immutability, change in trust mode and smart contract programming of blockchain provide new solutions. In order to solve the problems of traditional centralized open-source gover
APA, Harvard, Vancouver, ISO, and other styles
15

Ferry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.

Full text
Abstract:
Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard wa
APA, Harvard, Vancouver, ISO, and other styles
16

Nechaeva, M. L., and D. A. Kiotova. "Key vectors for improving the activity of regional bodies of the Federal Treasury given the integrated management of public finance." Finance and Credit 26, no. 10 (2020): 2364–84. http://dx.doi.org/10.24891/fc.26.10.2364.

Full text
Abstract:
Subject. The article focuses on a set of financial and budgetary relations existing in regional bodies of the federal treasury, inter alia, in public finance management. Objectives. We search for new tools and available methods to enhance the performance and efficiency of the Federal Treasury bodies, illustrating the operation of the Federal Treasury for the Nizhny Novgorod Oblast. Methods. The study is based in general methods (the analysis and synthesis, abstraction and generalization), specific research (special) methods (economic analysis, statistical-economic method). Results. We devised
APA, Harvard, Vancouver, ISO, and other styles
17

Hong, Jun, Tao Wen, and Quan Guo. "Query Authentication of Outsourced Spatial Database." International Arab Journal of Information Technology 17, no. 4 (2020): 539–47. http://dx.doi.org/10.34028/iajit/17/4/12.

Full text
Abstract:
Outsourcing spatial database to a third party is becoming a common practice for more and more individuals and companies to save the cost of managing and maintaining database, where a data owner delegates its spatial data management tasks to a third party and grants it to provide query services. However, the third party is not full trusted. Thus, authentication information should be provided to the client for query authentication. In this paper, we introduce an efficient space authenticated data structure, called Verifiable Similarity Indexing tree (VSS-tree), to support authenticated spatial q
APA, Harvard, Vancouver, ISO, and other styles
18

Shiuh-Pyng Shieh, Chern-Tang Lin, Wei-Bon Yang, and Hung-Min Sun. "Digital multisignature schemes for authenticating delegates in mobile code systems." IEEE Transactions on Vehicular Technology 49, no. 4 (2000): 1464–73. http://dx.doi.org/10.1109/25.875284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hung-Yu Chien, Jinn-Ke Jan, and Yuh-Min Tseng. "Forgery attacks on "multisignature schemes for authenticating mobile code delegates"." IEEE Transactions on Vehicular Technology 51, no. 6 (2002): 1669–71. http://dx.doi.org/10.1109/tvt.2002.804857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Tzong-Chen Wu and Chien-Lung Hsu. "Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems." IEEE Transactions on Vehicular Technology 52, no. 2 (2003): 462–65. http://dx.doi.org/10.1109/tvt.2003.808786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Schmitz, Guido. "Privacy-preserving Web single sign-on: Formal security analysis and design." it - Information Technology 64, no. 1-2 (2022): 43–48. http://dx.doi.org/10.1515/itit-2022-0003.

Full text
Abstract:
Abstract Single sign-on (SSO) systems, such as OpenID and OAuth, allow Web sites to delegate user authentication to third parties, such as Facebook or Google. These systems provide a convenient mechanism for users to log in and ease the burden of user authentication for Web sites. Conversely, by integrating such SSO systems, they become a crucial part of the security of the modern Web. So far, it has been hard to prove if Web standards and protocols actually meet their security goals. SSO systems, in particular, need to satisfy strong security and privacy properties. In this thesis, we develop
APA, Harvard, Vancouver, ISO, and other styles
22

Hamed, Naba, and Ali Yassin. "A Privacy-Preserving Scheme for Managing Secure Data in Healthcare System." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (2023): 70–82. http://dx.doi.org/10.37917/ijeee.19.2.9.

Full text
Abstract:
In the world of modern technology and the huge spread of its use, it has been combined with healthcare systems and the establishment of electronic health records (EHR) to follow up on patients. This merging of technology with healthcare has allowed for more accurate EHRs that follow a patient to different healthcare facilities. Timely exchange of electronic health information (EHR) between providers is critical for aiding medical research and providing fast patient treatment. As a result, security issues and privacy problems are viewed as significant difficulties in the healthcare system. Seve
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, JongHyup, and Taekyoung Kwon. "Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things." Sensors 21, no. 13 (2021): 4393. http://dx.doi.org/10.3390/s21134393.

Full text
Abstract:
The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial environments. Despite the promising benefits of IIoT, securely managing software updates is a challenging problem for those critical applications. This is due to at least the intrinsic lack of software protection mechanisms in legacy industrial systems. In this paper, to address the challenges in building a secure software supply chain for industrial environments, we propose a new approach that leverages distributed watchdogs with blockchain systems in protecting software supply chains. For this purpo
APA, Harvard, Vancouver, ISO, and other styles
24

Teuku, Ryan Firdaus. "Design of a web-based application for managing evidence data at the East Aceh District Prosecutor's Office." International Journal Of Computer Sciences and Mathematics Engineering 2, no. 2 (2023): 160–67. http://dx.doi.org/10.61306/ijecom.v2i2.38.

Full text
Abstract:
The prosecutor's office is a government institution that has the authority to delegate, prosecute perpetrators in court and carry out the decisions and decisions of criminal judges. Evidence is the object of a criminal act. Administrative processing of evidence at the East Aceh District Prosecutor's Office uses office computer applications so that the data stored is not well structured and is not centralized. This makes it difficult for evidence officers to recapitulate data quickly and efficiently. Apart from that, the risk of data loss or administrative errors is also prone to occur due to t
APA, Harvard, Vancouver, ISO, and other styles
25

Xun Yi and Chee Kheong Siew. "Attacks on Shieh--Lin--Yang--Sun digital multisignature schemes for authenticating delegates in mobile code systems." IEEE Transactions on Vehicular Technology 51, no. 6 (2002): 1313–15. http://dx.doi.org/10.1109/tvt.2002.802982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Siddiqui, Maha. "Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 1267–75. http://dx.doi.org/10.22214/ijraset.2024.59034.

Full text
Abstract:
Abstract: We present a novel solution, the Blockchain-based Secure and Efficient Secret Image Sharing (BC-SESIS) scheme, designed to enhance the security and efficiency of secret image sharing in wireless networks. Traditional Secret Image Sharing (SIS) methods generate multiple shadow images to distribute a secret image, allowing retrieval with a subset of these shadows. However, existing SIS schemes suffer from vulnerabilities, particularly during communication, where shadow images are susceptible to tampering and corruption, compromising security. Leveraging blockchain technology, BC-SESIS
APA, Harvard, Vancouver, ISO, and other styles
27

Kumar, Anand, Dharmesh Dhabliya, Pankaj Agarwal, et al. "Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques." Computational Intelligence and Neuroscience 2022 (September 29, 2022): 1–13. http://dx.doi.org/10.1155/2022/8803586.

Full text
Abstract:
The Internet of Things (IoT) ushers in a new era of communication that depends on a broad range of things and many types of communication technologies to share information. This new age of communication will be characterised by the following characteristics: Because all of the IoT’s objects are connected to one another and because they function in environments that are not protected, it poses a significantly greater number of issues, constraints, and challenges than do traditional computing systems. This is due to the fact that traditional computing systems do not have as many interconnected c
APA, Harvard, Vancouver, ISO, and other styles
28

Bockelman, Brian, Andrew Hanushevsky, Oliver Keeble, et al. "Bootstrapping a New LHC Data Transfer Ecosystem." EPJ Web of Conferences 214 (2019): 04045. http://dx.doi.org/10.1051/epjconf/201921404045.

Full text
Abstract:
GridFTP transfers and the corresponding Grid Security Infrastructure (GSI)-based authentication and authorization system have been data transfer pillars of the Worldwide LHC Computing Grid (WLCG) for more than a decade. However, in 2017, the end of support for the Globus Toolkit - the reference platform for these technologies - was announced. This has reinvigorated and expanded efforts to replace these pillars. We present an end-to-end alternate utilizing HTTP-based WebDAV as the transfer protocol, and bearer tokens for distributed authorization. This alternate ecosystem, integrating significa
APA, Harvard, Vancouver, ISO, and other styles
29

Nurzi, Farhan Ahmad, and Kasmawahida Ab Wahab. "Web-Based Student Task Management System." Engineering, Agriculture, Science and Technology Journal (EAST-J) 1, no. 1 (2022): 50–56. http://dx.doi.org/10.37698/eastj.v1i1.119.

Full text
Abstract:
Task management systems are usually used by the project development teams to track their tasks from beginning to end, delegate subtasks to teammates, and set deadlines to make sure projects get done on time. It helps individuals to work more productively and efficiently. The same concept can be applied to students who have to perform group assignments but are located remotely from each other due to the closure of educational institutions because of the Covid19 pandemic. It is difficult for a student to divide group tasks since they only meet each other virtually through online classes with lim
APA, Harvard, Vancouver, ISO, and other styles
30

Mishra*, Arjit, Surendra Gupta, and Swarnim Soni. "Designing Information System for Private Network using RBAC, FGAC and Micro service Architecture." International Journal of Engineering and Advanced Technology 10, no. 4 (2021): 195–200. http://dx.doi.org/10.35940/ijeat.d2474.0410421.

Full text
Abstract:
Microservice architecture is used in developing enterprise-level applications with the intent to modularise deployment of the application, this happens by creating an application as a collection of var-ious smaller applications known as microservices. An Information system is one such application that is ever-growing and therefore needs an architectural solution that addresses this issue. While microservice architecture addresses this issue by giving low coupling among microservices, future scalability of the system, and convenience in developing, deploying, and integrating new microservices.F
APA, Harvard, Vancouver, ISO, and other styles
31

Chaudhari, Shilpa, R. Aparna, and Archana Rane. "A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another." Cybernetics and Information Technologies 21, no. 3 (2021): 24–49. http://dx.doi.org/10.2478/cait-2021-0028.

Full text
Abstract:
Abstract Proxy Re-Signature (PRS) complements well-established digital signature service. Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which does not learn any signing-key and cannot produce new valid signature on new message for Alice or Bob. PRS has been largely ignored since then but it has spurred considerable research interest recently for sharing web-certificates, forming weak-group signatures, and authenticating network path. This article provides a survey summarizing a
APA, Harvard, Vancouver, ISO, and other styles
32

Marwan, Mbarek, Ali Kartit, and Hassan Ouahmane. "A Framework to Secure Medical Image Storage in Cloud Computing Environment." Journal of Electronic Commerce in Organizations 16, no. 1 (2018): 1–16. http://dx.doi.org/10.4018/jeco.2018010101.

Full text
Abstract:
Nowadays, modern healthcare providers create massive medical images every day because of the recent progress in imaging tools. This is generally due to the increasing number of patients demanding medical services. This has resulted in a continuous demand of a large storage space. Unfortunately, healthcare domains still use local data centers for storing medical data and managing business processes. This has significant negative impacts on operating costs associated with licensing fees and maintenance. To overcome these challenges, healthcare organizations are interested in adopting cloud stora
APA, Harvard, Vancouver, ISO, and other styles
33

Lin, Cheng-Jun, Rui Xue, Shao-Jun Yang, Xinyi Huang, and Shimin Li. "Linearly Homomorphic Signatures from Lattices." Computer Journal 63, no. 12 (2020): 1871–85. http://dx.doi.org/10.1093/comjnl/bxaa034.

Full text
Abstract:
Abstract Linearly homomorphic signatures (LHSs) allow any entity to linearly combine a set of signatures and to provide authentication service for the corresponding (combined) data. The public key of the current known LHSs from lattices in the standard model requires $O(l)$ matrices and $O(k)$ vectors, where $l$ is the length of file identifier and $k$ is the maximum data set size that linear functions support. In this paper, we construct two lattice-based LHS schemes with provable security in the standard model and both schemes can authenticate vectors defined over finite field. First, we pre
APA, Harvard, Vancouver, ISO, and other styles
34

Mir, Omid, Daniel Slamanig, Balthazar Bauer, and René Mayrhofer. "Practical Delegatable Anonymous Credentials From Equivalence Class Signatures." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 488–513. http://dx.doi.org/10.56553/popets-2023-0093.

Full text
Abstract:
Anonymous credentials (ACs) systems are a powerful cryptographic tool for privacy-preserving applications and provide strong user privacy guarantees for authentication and access control. ACs allow users to prove possession of attributes encoded in a credential without revealing any information beyond them. A delegatable AC (DAC) system is an enhanced AC system that allows the owners of credentials to delegate the obtained credential to other users. This allows to model hierarchies as usually encountered within public-key infrastructures (PKIs). DACs also provide stronger privacy guarantees th
APA, Harvard, Vancouver, ISO, and other styles
35

Hieu, Phan Duong, and Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES." Journal of Computer Science and Cybernetics 37, no. 4 (2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.

Full text
Abstract:
Cryptography is the fundamental cornerstone of cybersecurity employed for achieving data confidentiality, integrity, and authenticity. However, when cryptographic protocols are deployed for emerging applications such as cloud services or big data, the demand for security grows beyond these basic requirements. Data nowadays are being extensively stored in the cloud, users also need to trust the cloud servers/authorities that run powerful applications. Collecting user data, combined with powerful machine learning tools, can come with a huge risk of mass surveillance or undesirable data-driven st
APA, Harvard, Vancouver, ISO, and other styles
36

Muslim, Shohib, Sri Hudiarini, Sholahuddin Al-Fatih, Khrisna Hadiwinata, and Nandaru Ramadhan. "Harmonization of Online Mortgage Regulations as a Form of Legal Certainty." Journal of Law and Sustainable Development 11, no. 12 (2023): e856. http://dx.doi.org/10.55908/sdgs.v11i12.856.

Full text
Abstract:
Objective: The topic of this study is the obligations and role of a notary in the registration of electronic mortgages under the conditions of the 2019 Mortgage Law and the 2019 ATR/BPN Ministerial Regulation No. 9. Legal clarity in the procedures used to electronically register mortgages. Theoritical Framework: The author employed Gustav Radbruch's theory of legal certainty to analyse the issues with this study. Legal certainty can be attained through the application of penalties to legal subjects, including people and legal entities, which places more emphasis on the process of implementatio
APA, Harvard, Vancouver, ISO, and other styles
37

Du, Jianming, Guofang Dong, Juangui Ning, Zhengnan Xu, and Ruicheng Yang. "Identity-based controlled delegated outsourcing data integrity auditing scheme." Scientific Reports 14, no. 1 (2024). http://dx.doi.org/10.1038/s41598-024-58325-y.

Full text
Abstract:
AbstractWith the continuous development of cloud computing, the application of cloud storage has become more and more popular. To ensure the integrity and availability of cloud data, scholars have proposed several cloud data auditing schemes. Still, most need help with outsourced data integrity, controlled outsourcing, and source file auditing. Therefore, we propose a controlled delegation outsourcing data integrity auditing scheme based on the identity-based encryption model. Our proposed scheme allows users to specify a dedicated agent to assist in uploading data to the cloud. These authoriz
APA, Harvard, Vancouver, ISO, and other styles
38

Hommel, Wolfgang, Michael Grabatin, Stefan Metzger, and Daniela Pöhn. "Level of Assurance Management Automation for Dynamic Identity Federations based on Vectors of Trust." PIK - Praxis der Informationsverarbeitung und Kommunikation 39, no. 3-4 (2016). http://dx.doi.org/10.1515/pik-2016-0003.

Full text
Abstract:
AbstractAccessing remote IT services through identity federations (IFs) is based on solid technical protocols such as the Security Assertion Markup Language (SAML) and OpenID Connect. However, reliable delegated user authentication and authorization also pose organizational challenges regarding the quality management of user data. Level of Assurance (LoA) concepts have been adapted and applied to IFs, but their inhomogeneous proliferation bears the risk of aggravating instead of simplifying the manual work steps. This is increased by the providing IT services for multiple or dynamically set up
APA, Harvard, Vancouver, ISO, and other styles
39

Hyam, Roger, Alan Elliott, and William Ulate. "Rhakhis: A workflow for managing the WFO taxonomic backbone." Biodiversity Information Science and Standards 6 (August 23, 2022). http://dx.doi.org/10.3897/biss.6.91432.

Full text
Abstract:
In 2021, the World Flora Online (WFO) Council agreed that the team at the Royal Botanic Garden Edinburgh would take on the technical role of managing the WFO Taxonomic Backbone (WFO-TB). This presentation outlines the implementation of a system to manage the associated data and explores possible future developments. The WFO-TB is a global concensus checklist of plants including bryophytes, pteridophytes, gymnosperms and angiosperms. The checklist data consists of two parts: facts concerning the nomenclatural acts that establish the names under the nomenclatural code, and consensus expert opini
APA, Harvard, Vancouver, ISO, and other styles
40

Nassar Kyriakidou, Chalima Dimitra, Athanasia Maria Papathanasiou, and George C. Polyzos. "Decentralized Identity With Applications to Security and Privacy for the Internet of Things." Computer Networks and Communications, August 28, 2023. http://dx.doi.org/10.37256/cnc.1220233048.

Full text
Abstract:
Decentralized Identity (dID) has brought to the forefront the advantages and importance of total user control over identity. Previous solutions delegate identity management to the responsibility of third-party applications or services, which may raise multiple privacy and security concerns regarding users' personal data. In this paper, we highlight the significance of dID and in particular Self-Sovereign Identity (SSI) for a rapidly evolving ecosystem with a plethora of interconnected devices with different characteristics, such as the Internet of Things (IoT). Specifically, we analyze the ben
APA, Harvard, Vancouver, ISO, and other styles
41

"Data Protection in IoT using CoAP based on Enhanced DTLS." International Journal of Advanced Trends in Computer Science and Engineering 12, no. 4 (2023): 162–71. http://dx.doi.org/10.30534/ijatcse/2023/041242023.

Full text
Abstract:
The Internet of Things (IoT), refers to all the infrastructures and technologies put in place to operate various objects through an Internet connection, it is about connected objects. One of the most frequently used IoT application protocols is the Constrained Application Protocol (CoAP) that matches restricted computers. CoAP is a solution for in-regulated data formats and a high security to protect government-related data from cyber-attacks. CoAP advises using DTLS (Datagram Transport Layer Security) to provide robust security of the UDP-based TLS edition. Initially, DTLS was planned for con
APA, Harvard, Vancouver, ISO, and other styles
42

N, Deepika, Durga P, Gayathri N, and Murugesan M. "Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection." International Journal of Scientific Research in Science and Technology, March 22, 2019, 287–99. http://dx.doi.org/10.32628/ijsrst196250.

Full text
Abstract:
The cloud security is one of the essential roles in cloud, here we can preserve our data into cloud storage. More and more clients would like to keep their data to PCS (public cloud servers) along with the rapid development of cloud computing. Cloud storage services allow users to outsource their data to cloud servers to save local data storage costs. Multiple verification tasks from different users can be performed efficiently by the auditor and the cloud-stored data can be updated dynamically. It makes the clients check whether their outsourced data is kept intact without downloading the who
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!