9 research outputs found

    Naval Reserve support to information Operations Warfighting

    Get PDF
    Since the mid-1990s, the Fleet Information Warfare Center (FIWC) has led the Navy's Information Operations (IO) support to the Fleet. Within the FIWC manning structure, there are in total 36 officer and 84 enlisted Naval Reserve billets that are manned to approximately 75 percent and located in Norfolk and San Diego Naval Reserve Centers. These Naval Reserve Force personnel could provide support to FIWC far and above what they are now contributing specifically in the areas of Computer Network Operations, Psychological Operations, Military Deception and Civil Affairs. Historically personnel conducting IO were primarily reservists and civilians in uniform with regular military officers being by far the minority. The Naval Reserve Force has the personnel to provide skilled IO operators but the lack of an effective manning document and training plans is hindering their opportunity to enhance FIWC's capabilities in lull spectrum IO. This research investigates the skill requirements of personnel in IO to verify that the Naval Reserve Force has the talent base for IO support and the feasibility of their expanded use in IO.http://archive.org/details/navalreservesupp109451098

    Biometric Cryptosystems : Authentication, Encryption and Signature for Biometric Identities

    Get PDF
    Biometrics have been used for secure identification and authentication for more than two decades since biometric data is unique, non-transferable, unforgettable, and always with us. Recently, biometrics has pervaded other aspects of security applications that can be listed under the topic of ``Biometric Cryptosystems''. Although the security of some of these systems is questionable when they are utilized alone, integration with other technologies such as digital signatures or Identity Based Encryption (IBE) schemes results in cryptographically secure applications of biometrics. It is exactly this field of biometric cryptosystems that we focused in this thesis. In particular, our goal is to design cryptographic protocols for biometrics in the framework of a realistic security model with a security reduction. Our protocols are designed for biometric based encryption, signature and remote authentication. We first analyze the recently introduced biometric remote authentication schemes designed according to the security model of Bringer et al.. In this model, we show that one can improve the database storage cost significantly by designing a new architecture, which is a two-factor authentication protocol. This construction is also secure against the new attacks we present, which disprove the claimed security of remote authentication schemes, in particular the ones requiring a secure sketch. Thus, we introduce a new notion called ``Weak-identity Privacy'' and propose a new construction by combining cancelable biometrics and distributed remote authentication in order to obtain a highly secure biometric authentication system. We continue our research on biometric remote authentication by analyzing the security issues of multi-factor biometric authentication (MFBA). We formally describe the security model for MFBA that captures simultaneous attacks against these systems and define the notion of user privacy, where the goal of the adversary is to impersonate a client to the server. We design a new protocol by combining bipartite biotokens, homomorphic encryption and zero-knowledge proofs and provide a security reduction to achieve user privacy. The main difference of this MFBA protocol is that the server-side computations are performed in the encrypted domain but without requiring a decryption key for the authentication decision of the server. Thus, leakage of the secret key of any system component does not affect the security of the scheme as opposed to the current biometric systems involving cryptographic techniques. We also show that there is a tradeoff between the security level the scheme achieves and the requirement for making the authentication decision without using any secret key. In the second part of the thesis, we delve into biometric-based signature and encryption schemes. We start by designing a new biometric IBS system that is based on the currently most efficient pairing based signature scheme in the literature. We prove the security of our new scheme in the framework of a stronger model compared to existing adversarial models for fuzzy IBS, which basically simulates the leakage of partial secret key components of the challenge identity. In accordance with the novel features of this scheme, we describe a new biometric IBE system called as BIO-IBE. BIO-IBE differs from the current fuzzy systems with its key generation method that not only allows for a larger set of encryption systems to function for biometric identities, but also provides a better accuracy/identification of the users in the system. In this context, BIO-IBE is the first scheme that allows for the use of multi-modal biometrics to avoid collision attacks. Finally, BIO-IBE outperforms the current schemes and for small-universe of attributes, it is secure in the standard model with a better efficiency compared to its counterpart. Another contribution of this thesis is the design of biometric IBE systems without using pairings. In fact, current fuzzy IBE schemes are secure under (stronger) bilinear assumptions and the decryption of each message requires pairing computations almost equal to the number of attributes defining the user. Thus, fuzzy IBE makes error-tolerant encryption possible at the expense of efficiency and security. Hence, we design a completely new construction for biometric IBE based on error-correcting codes, generic conversion schemes and weakly secure anonymous IBE schemes that encrypt a message bit by bit. The resulting scheme is anonymous, highly secure and more efficient compared to pairing-based biometric IBE, especially for the decryption phase. The security of our generic construction is reduced to the security of the anonymous IBE scheme, which is based on the Quadratic Residuosity assumption. The binding of biometric features to the user's identity is achieved similar to BIO-IBE, thus, preserving the advantages of its key generation procedure

    Design principles and patterns for computer systems that are simultaneously secure and usable

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Includes bibliographical references (p. 429-464) and index.It is widely believed that security and usability are two antagonistic goals in system design. This thesis argues that there are many instances in which security and usability can be synergistically improved by revising the way that specific functionality is implemented in many of today's operating systems and applications. Specific design principles and patterns are presented that can accomplish this goal. Patterns are presented that minimize the release of confidential information through remnant and remanent data left on hard drives, in web browsers, and in documents. These patterns are based on a study involving the purchase of 236 hard drives on the secondary market, interviews conducted with organizations whose drives had been acquired, and through a detailed examination of modern web browsers and reports of information leakage in documents. Patterns are presented that enable secure messaging through the adoption of new key management techniques. These patterns are supported through an analysis of S/MIME handling in modern email clients, a survey of 469 Amazon.com merchants, and a user study of 43 individuals. Patterns are presented for promoting secure operation and for reducing the danger of covert monitoring. These patterns are supported by the literature review and an analysis of current systems.(cont.) In every case considered, it is shown that the perceived antagonism of security and usability can be scaled back or eliminated by revising the underlying designs on which modern systems are conceived. In many cases these designs can be implemented without significant user interface changes. The patterns described in this thesis can be directly applied by today's software developers and used for educating the next generation of programmers so that longstanding usability problems in computer security can at last be addressed. It is very likely that additional patterns can be identified in other related areas.by Simson L. Garfinkel.Ph.D

    Texture and Colour in Image Analysis

    Get PDF
    Research in colour and texture has experienced major changes in the last few years. This book presents some recent advances in the field, specifically in the theory and applications of colour texture analysis. This volume also features benchmarks, comparative evaluations and reviews

    ESIIG2

    Get PDF
    331 p. , Il, Tablas, Gráficos.Libro ElectrónicoESIIG2 - The Second European Summit on Interoperability in the iGovernment, represents an unprecedented occasion to develop new synergies and create contacts with representatives of the European Commission, of the national and regional governments of Europe, of the research field, the Academia and experts of the ICT sector. Mrs Viviane Reding, Member of the European Commission for Information Society and Media gave her official patronage to the Second European Summit of Interoperability in the iGovernment, ESIIG2. Event with the patronage CISIS (Italian Interregional Centre of Information and Statistic Systems) The European Commission initiative i2010, through the DG Information and Media Society offered its support to ESIIG2.ForewordXI ESIIG 3 What is ESIIG2? 3 Commissioner Reding message 4 ESIIG 2 Co - hosted events5 The Programme 6 ESIIG2 Supporters8 The Regional Ministry for consumer protection and administrative simplification13 The Technical and Scientific Committee15 Structure of the Technical and Scientific Committee15 What does the Committee do?15 Important and innovative initiatives of ESIIG 219 Publication of the Call for Papers Results23 T-Seniority: E-inclusion and Interoperability25 Alejandro Echeverria Security and Privacy Preserving Data in E-Government Integration31 Claudio Biancalana, Francesco Saverio Profiti Proposal for Interoperability Between Public Universities39 Correcher E, Universidad Politécnica de Valencia, Spain A Cross-Application Reference Model to Support Interoperability 53 Elena Baralis, Tania Cerquitelli, Silvana Raffa Table of Contents VII Applying Soa to Mobile Secure eGovernment Services The Sweb Approach65 Silke Cuno, Yuri Glickman, Petra Hoepner, Linda Strick An Identity Metasystem Approach to Improve Eid Interoperability and Assure Privacy Compliance 74 Andrea Valboni Towards Interoperable Infrastructures of Geospatial Data 86 Sergio Farruggia, Emanuele Roccatagliata Modernization and Administrative Simplification Master Plan for the Local Councils of the Region of Murcia 101 Leandro Marín Muñoz, Pedro Olivares Sánchez, Isabel Belmonte Martínez Organizational Interoperability and Organizing for Interoperability in eGovernment109 Ralf Cimander, Herbert Kubicek The National Interoperability Framework: a New Regulatory Tool to Guarantee Interoperability Among Spanish Public Administrations 123 Agustí Cerrillo The Realization of the Greek E-Gif 131 Andreas Papadakis, Kostas Rantos, Antonis Stasis Build Government Interoperability Through Open Standard Technology 141 Goodwin Ting, Anne Rasanen, Marco Pappalardo Towards an Intercultural Representation of Mediterranean Intangible Cultural Heritage (Ich) An Xml Interoperability Framework for Regional Ich Databases 154 Jesse Marsh, Francesco Passantino Castile and Leon, a Model of Interoperability 168 Isabel Alonso Sánchez, José Ignacio de Uribe Ladrón de Cegama, Antonio Francisco Pérez Fernández, Jorge Ordás Alonso The Catalan Interoperability Model182 Ignasi Albors Identity and Residence Verification Data System189 Nimia Rodríguez Escolar, Jose A Eusamio Mazagatos From Extended Enterprise to Extended Government: Regione Lazio Interoperability and Egovernment Point of View 199 Claudio Biancalana, Dante Chiroli, Claudio Pisu, Francesco Saverio Profiti, Fabio Raimondi Contribution by the Members of the Technical and Scientific Committee 215 Interoperability and Egovernment Through Adoption of Standards 215 Flavia Marzano A Brief Compendium on Interoperability in Egovernment 224 Michele M Missikoff Table of Contents VIII Spc – The Italian Interoperabilty Framework with Services241 Francesco Tortorelli, Roberto Baldoni Exploitation of Digital Contents for the Public Administration 254 Giulio De Petra, Fabrizio Gianneschi, Giaime Ginesu Deploying the full transformational power of egovernment – collaboration and interoperability –270 Sylvia Archmann, Just Castillo Iglesias ICAR Report: Interoperability and Cooperation between applications among Italian Regions (English summary)278 CISIS - Central Staff of ICAR Project List of the finalists of the iG20 Award 297 IG20 AWARDS: Eucaris, the European car and driving licence information system297 INNOVATIVNESS: Interopcyl299 TRANSFERABILITY: Semic, Semantic Interoperability Center Europe301 IMPACT: Employment/unemployment status management: actual interoperability through the CO eService303 PRACTICAL RESULTS: Emilia Romagna Labour Information System 305 The ESIIG2 Summit results: the creation of ERNI and the Interoperability Declaration of Rome 309 The Interoperability Declaration of Rome 311 Follow the new and interesting developments of Esiig2 31

    Human-machine-centered design and actuation of lower limb prosthetic systems

    Get PDF
    People with lower limb loss or congenital limb absence require a technical substitute that restores biomechanical function and body integrity. In the last decades, mechatronic prostheses emerged and especially actuated ones increased the biomechanical functionality of their users. Yet, various open issues regarding the energy efficiency of powered systems and the impact of user-experience of the prosthesis on technical design remain. As tackeling the latter aspect urgently requires the consideration of user demands, this thesis proposes a novel human-machine-centered design (HMCD) approach for lower limb prosthetics. Further, it contributes to the design and control of elastic (prosthetic) actuation. The HMCD approach describes a framework that equally considers technical and human factors. Therefore, seven human factors influencing lower limb prosthetic design are determined, analyzed, and modeled using human survey data: Satisfaction, Feeling of Security, Body Schema Integration, Support, Socket, Mobility, and Outer Appearance. Based on the application of quality function deployment (QFD), those factors can be considered as a HMCD focus in systems engineering. As an exemplary application, a powered prosthetic knee concept is elaborated with the HMCD approach. The comparison of the HMCD focus with a purely technical one, which is determined with a control group, reveals distinct differences in the weighting of requirements. Hence, the proposed method should lead to different prosthetic designs that might improve the subjective user-experience. To support this by integrating users throughout the systems engineering process, two concepts for human-in-the-loop experiments are suggested. As an enabling technology of powered lower limb prostheses, variable (series) elastic actuation and especially such with variable torsion stiffness (VTS) is investigated. Inverse dynamics simulations with synthetic and human trajectories as well as experiments show that the consideration of the actuator inertia is crucial: Only by including it in advanced models, the whole range of natural dynamics and antiresonance can be exploited to minimize power consumption. A corresponding control strategy adapts the actuator to achieve energy efficiency over a wide range of operational states using these models. The exemplary design of the powered prosthetic knee with respect to the HMCD prioritization of requirements confirms the fundamental suitability of VTS for integration in prosthetic components. In this, considering actuator inertia enables the determination of an optimal stiffness for serial elastic actuation of the human knee during walking that is not found in previous studies. A first simulation considering the changed dynamics of prosthetic gait indicates the potential to reveal lower design requirements. The designed knee concept combines promising biomechanical functionality and long operating time due to elastic actuation and energy recuperation. Beyond lower limb prosthetics, the proposed HMCD framework can be used in other applications with distinct human-machine interrelations by adjusting the human and technical factors. Likewise, the insights into variable elastic actuation design and control can be transferred to other systems demanding energy-efficient performance of cyclic tasks

    Jornadas Nacionales de Investigación en Ciberseguridad: actas de las VIII Jornadas Nacionales de Investigación en ciberseguridad: Vigo, 21 a 23 de junio de 2023

    Get PDF
    Jornadas Nacionales de Investigación en Ciberseguridad (8ª. 2023. Vigo)atlanTTicAMTEGA: Axencia para a modernización tecnolóxica de GaliciaINCIBE: Instituto Nacional de Cibersegurida

    Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts

    Get PDF
    Information and Communication Technology (ICT) are transforming society’s information flows. These new interactive environments decouple agents, information and actions from their original contexts and this introduces challenges when evaluating trustworthiness and intelligently placing trust.This thesis develops methods that can extend institutional trust into digitally enhanced interactive settings. By applying privacy-preserving cryptographic protocols within a technical architecture, this thesis demonstrates how existing human systems of identification that support institutional trust can be augmented with ICT in ways that distribute trust, respect privacy and limit the potential for abuse. Importantly, identification systems are located within a sociologically informed framework of interaction where identity is more than a collection of static attributes.A synthesis of the evolution and systematisation of cryptographic knowledge is presented and this is juxtaposed against the ideas developed within the digital identity community. The credential mechanism, first conceptualised by David Chaum, has matured into a number of well specified mathematical protocols. This thesis focuses on CL-RSA and BBS+, which are both signature schemes with efficient protocols that can instantiate a credential mechanism with strong privacy-preserving properties.The processes of managing the identification of healthcare professionals as they navigate their careers within the Scottish Healthcare Ecosystem provide a concrete case study for this work. The proposed architecture mediates the exchange of verifiable, integrity-assured evidence that has been cryptographically signed by relevant healthcare institutions, but is stored, managed and presented by the healthcare professionals to whom the evidence pertains.An evaluation of the integrity-assured transaction data produced by this architecture demonstrates how it could be integrated into digitally augmented identification processes, increasing the assurance that can be placed in these processes. The technical architecture is shown to be practical through a series of experiments run under realistic production-like settings.This work demonstrates that designing decentralised, standards-based, privacy-preserving identification systems for trusted professionals within highly assured social contexts can distribute institutionalised trust to trustworthy individuals and empower these individuals to interface with society’s increasingly socio-technical systems
    corecore