The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data stores are typically accessed using a clientserver paradigm wherein the client runs as part of an application process which is trying to access the data store. This paper presents the design and implementation of enhanced data store clients having the capability of caching data for reducing the latency for data accesses, encryption for providing confidentiality before sending data to the server,...
The paper presents MorphicLib, a new partial homomorphic cryptography library written in Java that can be used to implement a wide-range of applications. The paper shows the use of the library with the HomomorphicSpace coordination service. This service is a tuple space that stores encrypted tuples but still supports operations like returning tuples with values within a certain range.
Data-security is a remarkable hurdle to the vast embracement of Cloud utility. In this paper, we introduce a distinctly secured data logging framework to keep track of the genuine usage of end-user's information in the Cloud. In particular, an approach focusing data is proposed to enable enclosed logging process with the user data and policies. A line-by-line security of file authentication is developed...
Pairing-based cryptography have begun to draw attention ever since the work of Boneh and Franklin in 2001 proposing the first identity-based encryption scheme using bilinear pairings. In 2010, Tan et al. developed a pairing library that has running times that is as competitive as Pairing-Based Crypto (PBC) library. However, since Tan et al's pairing library was written in Java, it was not known to...
The falling price of mobile devices with high mobile subscriber penetration rate provides an opportunity to create an affordable mobile solution to disseminate and gather health related information in remote areas in a real time. These solutions come with data security and privacy challenges, and many existing mobile data collection systems (MDCS) do not systematically address very important security...
Equipped with camera, microphone, GPS and other sensors, together with convenient applications such as email clients, smartphones have a high potential to become a cost-effective intelligence gathering platform in a war zone. However, current smartphone applications are developed for civilian use. Due to lack of support for military requirements, such as confidentiality, smartphones may not be directly...
This paper is about an application that tries to help people in their relations with their local government. Id EST: in many bureaucratic processes, citizens are required to provide copies of paper documents such as diplomas, birth certificates… Obviously, this kind of documents cannot be provided online. Using this application, users are able to provide the required documents on the internet and...
With the rapid development of wireless communication and Java technique, the wireless applications built on Java is of great promise. So it's important to pay more attention to their security. Based on the introduction of J2ME, this article also analyzes how to secure the new booming wireless application of J2ME, especially on small wireless device. This paper introduces communication technology on...
This paper is about an application that tries to help people in their relations with their local government. Id EST: in many bureaucratic processes, citizens are required to provide copies of paper documents such as diplomas, birth certificates… Obviously, this kind of documents cannot be provided online. Using this application, users are able to provide the required documents on the internet and...
This paper introduced a practicable method to connect web portal with campus-user information system, via a Web Service-based SSO (Single Sign-on) system, in order to realize the sharing of users' statuses and information. Cookies, after being serialized into binary array and encrypted with RSA, will be transmitted in the Web Service framework. Then this array will be deserialized when Identity Server...
Near Field Communication (NFC) is a short-range communication technology and has been applied around the world. The most common service of NFC will be micropayments. Technically, the card emulation mode of NFC will simulate mobile devices such as cell phones into stored value cards, and then debit from external readers. Apart from simulating cell phones as stored value cards, read-write mode of NFC...
In this paper, we propose a web solution that generates secure documents using XML security technology and tokens through a component-based approach. Tokens consist of user identity certificates and keys associated with the certificates. Tokens can either be in software or hardware. To provide such middleware, we gather a list of applicable components related to XML security, review its trends and...
The design scheme and key technologies of remote tax declaration system (RTDS) is proposed in this paper. Especially, it is presented that how to apply XML to deal with heterogeneous data source, how to make use of the PKI and DES algorithms to improve the efficiency of encryption, and how to solve the concurrency of clients in RTDS by using Java threads. Finally, the experiment results are shown...
Parlay/OSA is a key service provisioning technology in next generation network[1], which opens the functions of telecommunication network to the 3rd service supplier and uses Parlay Framework Interface to ensure the security when the 3rd service supplier accessing to the Parlay/OSA. However, there are still some security vulnerabilities in this technology [2]. In this paper, an improved security protection...
To prevent file transmission in the electronic military affair system from being damaged. Methods: security mechanisms of Web service based on J2EE platform, system security based on RSA algorithm, and the basic principle of digital signature. Procedure: to explain definition, characteristics and structure of the electronic military affair system, and to analyze its design process and security. Conclusion:...
Ad hoc networking is considered as an inexpensive solution for easy and fast wireless network coverage. However, for real service deployment, security and availability in such networks are still under research even though some experimentation has shown its viability. Additionally, peer-to-peer (P2P) networking has emerged as a key technology to enable resource sharing among users. As a result, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.