The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we introduce a new fine-grained two-factor authentication (2FA) access control system for web-based cloud computing services. Specifically, in our proposed 2FA access control system, an attribute-based access control mechanism is implemented with the necessity of both a user secret key and a lightweight security device. As a user cannot access the system if they do not hold both, the...
The Student Information Report System (SIRS) has been developed for the purpose of sending regular reports to the student's parent about the activities of the student. SIRS consists of five modules which can be useful to work with the system in a simplified manner. Login module provides the authentication to the system and creation of new account for a staff. The access is available to the staff only...
A CAPTCHA is a technique that is used to prevent automated programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already reported, conventional CAPTCHAs could be overcome by state-of-the-art malwares since the capabilities of computers are approaching those of humans. Therefore, CAPTCHAs should be based on even more advanced human-cognitive-processing...
Internet of Things (IoT) and B3G/4G communication are promoting the pervasive mobile services with its advanced features. However, security problems are also baffled the development. This paper proposes a trust model to protect the user's security. The billing or trust operator works as an agent to provide a trust authentication for all the service providers. The services are classified by sensitive...
CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already reported, conventional CAPTCHA could be overcome by state-of-the-art malware since the capabilities of computers are approaching those of humans. Therefore, CAPTCHA should be based on even more advanced human-cognitive-processing...
Trusted Computing has become the research focus in information security field. Its idea is to embed a secure chip named TPM (Trusted Platform Module) in the computer's hardware, with which a trust chain can be set up to ensure the trust of computer. Since the resources of TPM are restricted, the interfaces and capabilities are cumbersome. In order to solve these problems, TCG gave a TSS (TCG Software...
CAPTCHAs are challenges or tests administered automatically over networks that can distinguish between people and machines (automated script) and thus protect web services from abuse by programs disguising as human users. Most existing CAPTCHA challenges are a single challenge response system (CR) that provide ready-made answers to the users in which case a bot may answer the test and escape scot-free...
An authentication system based on trusted platform is presented in distributed network, network nodes are distributed in each domain, the domain authentication server based-TPM granted a certificate to each trusted member of domain and authorize trust token to access network source in different domain, in this paper, many security technologies are applied, member with trust token can span domain boundaries,...
During last years, service federation has been a hot topic for researchers all along the world. In that context, single sign on (SSO) access to services has risen as a major concern for this kind of environments and many proposals suited to several scenarios have been stated. We can think of eduroam an eduGAIN as two major examples of this, the former as a federated initiative to provide access to...
For many Internet-based service providers, client authentication is required before the delivery of services. Currently, most client authentication mechanism is only focusing on the identity authentication. In this paper, we claim that more business opportunities will be created if service providers obtain more information about clients. Then we propose the concept of the integrated authentication...
The rise of the Internet and the push for ubiquitous computing has brought a proliferation of numerous single method solutions, forcing users to remember numerous secret codes, a task that is becoming increasingly difficult. On the web, codes are used by publications, blogs, Webmail, e-commerce sites, and financial institutions. Elsewhere, they serve as authentication mechanism for Internet service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.