1,641 research outputs found

    Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning

    Get PDF
    The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts. To protect authorities and their clients proactively from undetected exploits and misuse, we introduce CoSi, a scalable witness cosigning protocol ensuring that every authoritative statement is validated and publicly logged by a diverse group of witnesses before any client will accept it. A statement S collectively signed by W witnesses assures clients that S has been seen, and not immediately found erroneous, by those W observers. Even if S is compromised in a fashion not readily detectable by the witnesses, CoSi still guarantees S's exposure to public scrutiny, forcing secrecy-minded attackers to risk that the compromise will soon be detected by one of the W witnesses. Because clients can verify collective signatures efficiently without communication, CoSi protects clients' privacy, and offers the first transparency mechanism effective against persistent man-in-the-middle attackers who control a victim's Internet access, the authority's secret key, and several witnesses' secret keys. CoSi builds on existing cryptographic multisignature methods, scaling them to support thousands of witnesses via signature aggregation over efficient communication trees. A working prototype demonstrates CoSi in the context of timestamping and logging authorities, enabling groups of over 8,000 distributed witnesses to cosign authoritative statements in under two seconds.Comment: 20 pages, 7 figure

    A Secure Mobile-based Authentication System

    Get PDF
    Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetric cryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks. Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their own trusted computers.La informació financera és extremadament sensible. Per tant, la banca electrònica ha de proporcionar un sistema robust per autenticar als seus clients i fer-los accedir a les dades de forma remota. D'altra banda, aquest sistema ha de ser usable, accessible, i portàtil. Es proposa una resposta al desafiament basat en una contrasenya única (OTP), esquema que utilitza la criptografia simètrica en combinació amb un mòdul de maquinari de seguretat. Amés, aquesta solució ofereix mobilitat convenient per als usuaris que volen bancària en línia en qualsevol moment i en qualsevol lloc, no només des dels seus propis equips de confiança.La información financiera es extremadamente sensible. Por lo tanto, la banca electrónica debe proporcionar un sistema robusto para autenticar a sus clientes y hacerles acceder a sus datos de forma remota. Por otra parte, dicho sistema debe ser usable, accesible, y portátil. Se propone una respuesta al desafío basado en una contraseña única (OTP), esquema que utiliza la criptografía simétrica en combinación con un módulo hardware de seguridad hardware. Además, esta solución ofrece una movilidad conveniente para los usuarios que quieren la entidad bancaria en línea en cualquier momento y en cualquier lugar, no sólo des de sus propios equipos de confianza

    Application of information systems in irregular settlement management and low-cost housing provision

    Get PDF
    Bibliography: pages 105-107.Information Systems, both paper-based and computer-based, are integral in the management of irregular settlements and the process of delivering low-cost housing in South Africa. An Irregular Settlement can be defined as an area where the 'shacks' have no fixed street address. Due to policies by previous regimes, under whose rule irregular settlements were almost ignored, there is often little or no spatial or socio-economic data available about existing irregular settlements. Thus for the use of the community, or to organisations interested in helping to improve the quality of life of the residents living in these settlements. As a prerequisite to quality of life, the basic need of shelter, along with food, healthcare and education need to be made available. The emphasis today is thus being placed on the provision of low-cost housing. A need thus arises to have up-to-date information about these irregular settlements in order to plan either for the upgrading of the settlement or for the relocation to new low-cost housing developments. Currently mostly paper-based systems are being used in these developments. There are two opportunities where computer-oriented information systems could be used at this time in 1996 and 1997 to assist with the management and upgrading of irregular settlements. The first is the stage of managing an existing irregular settlement; the second is managing the process of housing provision, taking advantage of the project-linked subsidy scheme. Two Cape Town based projects provide case studies for the application of information systems at the two stages identified above. The first is the Marconi Beam 'From Shacks to Houses' project located in Milnerton. The second is the Integrated Services Land Project (iSLP) of the Cape Flats. The Marconi Beam Settlement is an irregular settlement that has been accepted as part of the 'Project-Linked Subsidy Scheme' for the provision of new low-cost housing. Previously only paper-based systems were being used to manage the settlement and its move to the new Joe Slovo Park formal housing development. There was also found to be a lack of appropriate tools and awareness of which technology could be used in the process. Some of the specific application areas in which we were able to provide solutions in Marconi Beam included: ■ the identification of people directly affected by the fire that swept through the settlement in October 1996; ■ the residents who would be affected by the construction of a new road through the one area of the settlement could be identified, facilitating their movement away from the area; and ■ a system of tracking the internal moves of residents was devised by which we were able to maintain a record of the internal movements of residents whilst the system of the lottery was in place. Subsequently, with the use of the Block System, the identification of residents who were required to come in and have their applications for new houses processed, as a result of their spatial location in the settlement, was accomplished. The Indlu Management System, a computer based system, resulted from the need to keep track of, and process, large amounts of socio-economic data in order to speedily process the large number of applicants applying for national housing subsidies. As a result of the implementation of this system, the processing times per applicant have been reduced from 30 minutes to 10 minutes per applicant. The successful use of these systems in the two projects demonstrate that there is thus a definite role to be played in the use of information systems in relation to the management of irregular settlements and the provision of low-cost housing

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    The Microsoft vs. Netscape browser’s war: A game theory based analysis

    Get PDF
    During 1996 the world’s attention was captured by the litigation posed by the United States’ government against Microsoft, blaming the latter of abusive use of its monopoly power in order to win what was known as the “browser’s war”. This paper presents the previous scenario to the web browser’s battle carried out by Microsoft and Netscape, analyzing both firm’s strategies in a short and also in a long term horizon game. The study provided is based on game theory tools and attempts to give a model that explains the firms’ behavior. Although the presented model is quite simple, it accurately explains the strategic interaction between the firms and its predictions fits with the actual results.Eje: V - Workshop de agentes y sistemas inteligentesRed de Universidades con Carreras en Informática (RedUNCI

    An Economic Analysis of Domain Name Policy

    Get PDF
    One of the most important features of the architecture of the Internet is the Domain Name System (DNS), which is administered by the Internet Corporation for Assigned Names and Numbers (ICANN). Logically, the DNS is organized into Top Level Domains (such as .com), Second Level Domains (such as amazon.com), and third, fourth, and higher level domains (such as www.amazon.com). The physically infrastructure of the DNS consists of name servers, including the Root Server System which provides the information that directs name queries for each Top Level Domain to the appropriate server. ICANN is responsible for the allocation of the root and the creation or reallocation of Top Level Domains. The Root Server System and associated name space are scarce resources in the economic sense. The root servers have a finite capacity and expansion of the system is costly. The name space is scarce, because each string (or set of characters) can only be allocated to one Registry (or operator of a Top Level Domain). In addition, name service is not a public good in the economic sense, because it is possible to exclude strings from the DNS and because the allocation of a string to one firm results in the inability of other firms to use that name string. From the economic perspective, therefore, the question arises: what is the most efficient method for allocating the root resource? There are only five basic options available for allocation of the root. (1) a static root, equivalent to a decision to waste the currently unallocated capacity; (2) public interest hearings (or beauty contests); (3) lotteries; (4) a queuing mechanism; or (5) an auction. The fundamental economic question about the Domain Name System is which of these provides the most efficient mechanism for allocating the root resource? This resource allocation problem is analogous to problems raised in the telecommunications sector, where the Federal Communications Commission has a long history of attempting to allocate broadcast spectrum and the telephone number space. This experience reveals that a case-by-case allocation on the basis of ad hoc judgments about the public interest is doomed to failure, and that auctions (as opposed to lotteries or queues) provide the best mechanism for insuring that such public-trust resources find their highest and best use. Based on the telecommunications experience, the best method for ICANN to allocate new Top Level Domains would be to conduct an auction. Many auction designs are possible. One proposal is to auction a fixed number of new Top Level Domain slots each year. This proposal would both expand the root resource at a reasonable pace and insure that the slots went to their highest and best use. Public interest Top Level Domains could be allocated by another mechanism such as a lottery and their costs to ICANN could be subsidized by the proceeds of the auction

    Web based presentation of semantically tagged 3D content for public sculptures and monuments in the UK

    Get PDF
    Copyright © 2009 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee
    corecore