2,195 research outputs found

    Secure Electronic Cards in Public Services

    Get PDF
    The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient's medical history and payment for private medical services. The security issue is a very important one as the patient's history is confidential and the payment has to be safe.public services, mobile, security, m-application, smart card

    Secure Electronic Cards in Public Services

    Get PDF
    The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe

    Security in signalling and digital signatures

    Get PDF

    Building Information Management (BIM) and blockchain (BC) for sustainable building design information management framework

    Get PDF
    At present, sustainable design is experiencing energy consumption and cost-effectiveness challenges in the building industry. A recent body of literature argues that the development of emerging smart digital technologies, such as Building Information Management (BIM) and blockchain (BC), offer immediate benefits to the industry. However, the current application of BIM and BC in the sustainable design and construction process focuses on smart energy and construction management, with little attention to addressing challenges for applying BIM to sustainable design and proposing strategies in terms of the usability of these technologies in the management of building construction projects. Therefore, this paper sets out to explore the potential roles of an integrated BIM and BC approach for sustainable building design information management. The first attempt is presented to use BC aided BIM for sustainable building design coordination and collaboration in multiple building stages. BC has the potential to address challenges that hinder the industry from using BIM for sustainable design, which has been unearthed. An innovative BC enhanced transaction process in BIM is required for sustainable building development. Roles of a user level driven smart contract system of BC can be used to enhance BIM system in the sustainable buildings process. The role of BC is primarily at user level driven smart contracts and their record value exchange capabilities. A user level (BIM stakeholders) driven BC technology for transaction in BIM process flow is revealed, and the user level (sustainable building design project stakeholders/BIM clients) driven and the smart contract enabled BIM+ BC architecture to address challenges of BIM for sustainable design has been further circulated according to the literature. Subsequently, a conceptual architecture of BIM + BC for Sustainable Building Design Information Management Framework in building project management has been proposed, validated, and refined. The Framework has two level encompassing structures and flow. The high-level framework is focused on strategy, whilst the low-level framework demonstrates technical components in detail. This architecture supporting project stakeholders in managing information, has the potential to achieve and ensure the realization of sustainable design goals through the interactive realization of smart contracts integrated into the user level driven BIM + BC system and its recording value exchange function through three user-driven levels, namely user, system, and transaction

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Information Management in Product Development Workflows – A Novel Approach on the basis of Pseudonymization of Product Information

    Get PDF
    AbstractInformation stored in the documentation of a product constitutes in many aspects the intellectual property (IP) of an enterprise. This valuable knowledge, built over years of extensive research and development deserves special attention and protection. Especially the context of distributed product development activities and increased collaborations with external partners puts companies at a growing risk that unauthorized individuals obtain access to this prized capital. In this paper, we present a novel concept for managing and sharing sensitive information in product development processes. Product information is separated and subsequently pseudonymized into independent blocks of data fragments which can be reassembled to specific information levels depending on the requirements of the organization. Thus, a user can be given access to that level of information specifically required to complete the task. The product information itself is only available as unordered data fragments and no longer interpretable even in case of data theft. By doing so, a comprehensive protection against internal and external abuse of sensitive product information can be realized which can easily be combined with existing concepts in the field of information protection

    University authentication system based on Java card and digital X.509 certificate

    Get PDF
    This article presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality, integrity and non repudiation

    A Survey of hardware protection of design data for integrated circuits and intellectual properties

    No full text
    International audienceThis paper reviews the current situation regarding design protection in the microelectronics industry. Over the past ten years, the designers of integrated circuits and intellectual properties have faced increasing threats including counterfeiting, reverse-engineering and theft. This is now a critical issue for the microelectronics industry, mainly for fabless designers and intellectual properties designers. Coupled with increasing pressure to decrease the cost and increase the performance of integrated circuits, the design of a secure, efficient, lightweight protection scheme for design data is a serious challenge for the hardware security community. However, several published works propose different ways to protect design data including functional locking, hardware obfuscation, and IC/IP identification. This paper presents a survey of academic research on the protection of design data. It concludes with the need to design an efficient protection scheme based on several properties

    DATABASE SECURITY

    Get PDF
    Ensuring the security of databases is a complex issue. The more complex the databases are the more complex the security measures that are to be applied are. Network and Internet connections to databases may complicate things even further. Also, each and every additional internal user that would be added can create further serious security problems. The purpose of this paper is to highlight and identify the main methods and facets of attack on a database, as well as ways to deflect attacks, through focusing on the delicate issue of data inference.This paper will examine the different topics related to database security and see the adaption of the research to the changing environment
    corecore