Listing 1 - 10 of 33 | << page >> |
Sort by
|
Choose an application
A7 Software is currently working on Andaman7 (see www.andaman7.com ), a mobile application allowing to create, manage and share electronic health records1 to improve collaboration between doctors and patients. It is composed of client applications running on mobile devices and a back end server written in Java, responsible for synchronizing data between them. Andaman7 for iPad was launched recently on the AppStore. We are willing to design, implement and deploy a PKI on our server, allowing client applications to encrypt end-to-end their medical data exchanges as well as messaging system data. The private and public keys will be generated on client-side and the server will be responsible for distributing and certifying the public keys. In order to minimize the traffic between clients and server, an algorithm similar to PGP will be used to achieve the asymmetric encryption/decryption. Furthermore, we would like to develop a messaging system integrated with Andaman7 allowing users to securely send messages to each other. Users will be able to invite or block others. Notifications will inform users who receive a message or an invitation. The new messaging system will have to respect the current Andaman7 architecture and concepts.
Choose an application
Choose an application
Choose an application
Choose an application
"La sécurité sur Internet passe en partie par la sécurité des protocoles de communication et par les solutions de cryptographie. Ce manuel d'apprentissage des principes et algorithmes de sécurisation a pour objectif de fournir une approche compréhensible des techniques mises en oeuvre dans les réseaux de communication. Il présente les dernières recommandations nationales (RGS) et européennes (i-GAS) ainsi que de nombreuses applications comme la gestion de la sécurité des navigateurs Internet et des systèmes d'exploitation ou plus récemment des systèmes à base de blockchains (comme les monnaies électroniques de type bitcoin). La partie cours est complétée par 50 exercices corrigés. Cette 2e édition comporte de nouveaux exercices et des mises à jour sur les protocoles et les standards de sécurité." [Éditeur]
Choose an application
Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.
Computers and civilization. --- Electronic data processing --- Computer networks. --- Operating systems (Computers). --- Cryptography. --- Data encryption (Computer science). --- Business information services. --- Computers and Society. --- IT Operations. --- Computer Communication Networks. --- Operating Systems. --- Cryptology. --- IT in Business. --- Management. --- Computer security --- Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Security measures --- Computer networks
Choose an application
This book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city of Canterbury, UK, 30 June–1 July 2005. The workshop was informal and lively, and the university setting encouragedactive exchangesbetween the speakersand the audience. TheworkshopprogramcomprisedakeynotespeechfromDr.CarlisleAdams, followedby18refereedpapers,withaworkshopdinnerinandguidedtouraround the historic Dover Castle. Dr. Adams is well known for his contributions to the CAST family of s- metric encryption algorithms, to international standards from the IETF, ISO, and OASIS, authorship of over 30 refereed journals and conference papers, and co-authorship of Understanding PKI: Concepts, Standards, and Deployment Considerations (Addison-Wesley). Dr. Adams keynote speech was entitled ‘PKI: Views from the Dispassionate “I”,’ in which he presented his thoughts on why PKIhas been availableas an authentication technology for many years now,but has only enjoyed large-scale success in fairly limited contexts to date. He also presented his thoughts on the possible future(s) of this technology, with emp- sis on the major factors hindering adoption and some potential directions for future research in these areas. In response to the Call for Papers, 43 workshop papers were submitted in total. All papers were blind reviewed by at least two members of the Program Committee, the majority having 3 reviewers, with a few borderline papers h- ing 4 or more reviewers; 18 papers were accepted for presentation in 8 sessions.
Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Application software. --- Computers and civilization. --- Computer Communication Networks. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Public key infrastructure (Computer security)
Choose an application
Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two successful TrustBus inter- tional workshops, held in 2002 and 2003 in conjunction with the DEXA conferences in Aix-en-Provence and in Prague. Being the first of a planned series of successful conferences it was our goal that this event would initiate a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust and privacy in digital business. We thank you all the attendees for coming to Zaragoza to participate and debate the new emerging advances in this area. The conference program consisted of one invited talk and nine regular technical papers sessions. The invited talk and keynote speech was delivered by Ahmed Patel from the Computer Networks and Distributed Systems Research Group, University College Dublin, Ireland on “Developing Secure, Trusted and Auditable Services for E-Business: An Autonomic Computing Approach”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control - sues to electronic voting, from trust and protocols to digital rights management. The conference attracted close to 100 submissions of which the program committee - cepted 29 papers for presentation and inclusion in the conference proceedings.
Computer security --- Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Security measures --- Computer networks --- Computer science. --- Computer Communication Networks. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information Systems. --- Management information systems. --- Computer Science. --- Computers and Society. --- Operating Systems. --- Data Encryption. --- Management of Computing and Information Systems. --- Business Information Systems. --- Computer Science --- Engineering & Applied Sciences --- Public key infrastructure (Computer networks) --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Data communication systems --- Transmission of data --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Business. --- Management science. --- Computer communication systems. --- Computers and civilization. --- Business and Management. --- Business and Management, general. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Quantitative business analysis --- Problem solving --- Operations research --- Statistical decision --- Trade --- Economics --- Commerce --- Industrial management --- Communication systems --- Operating systems --- Distributed processing --- Business --- Information superhighway --- Information theory --- Telecommunication systems --- Cryptology. --- Computer networks. --- Operating systems (Computers) --- Data encryption (Computer science)
Choose an application
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security. Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool. Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.
Computer network protocols. --- Computer networks -- Security measures. --- Data protection. --- Public key infrastructure (Computer security). --- Computer networks --- Computer network protocols --- Public key infrastructure (Computer security) --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Security measures. --- Protocols, Computer network --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Computer Communication Networks. --- Coding and Information Theory. --- Computer security --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing
Choose an application
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; trust and reputation in pervasive environments; trust and privacy issues in mobile environments; security and privacy in the cloud; security policies/usability issues; and privacy requirements and privacy audit.
Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Computer science. --- Data protection. --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Computer Science --- Engineering & Applied Sciences --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computer security. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Public key infrastructure (Computer security)
Listing 1 - 10 of 33 | << page >> |
Sort by
|