1,435 research outputs found

    Chimaera 1.0 Tutorial & Reference

    Get PDF
    Chimaera is a model intended to secure data (messages) exchanges between applications. Chimaera uses the PEM (Privacy Enhanced Mail) format which enables the receiver to authentificate the sender identity using special informations (certificates, signature, hash-coding) held into the message. PEM is a model for e-mail authentification and certification. PEM complies to X509 standard as for the handling of certificates. Chimaera provides a way to generate PEM formatted mails. Such mails will be fully read by users running a similar PEM application, not necessarily Chimaera. Basic Chimaera services are: The certification of public keys of individuals thru submission to the local certification authority

    Merging and Extending the PGP and PEM Trust Models - the ICE-TEL Trust Model

    Get PDF
    The ICE-TEL project is a pan-European project that is building an Internet X.509 based certification infrastructure throughout Europe, plus several secure applications that will use it. This paper describes the trust model that is being implemented by the project. A trust model specifies the means by which a user may build trust in the assertion that a remote user is really who he purports to be (authentication) and that he does in fact have a right to access the service or information that he is requesting (authorization). The ICE-TEL trust model is based on a merging of and extensions to the existing Pretty Good Privacy (PGP) web of trust and Privacy Enhanced Mail (PEM) hierarchy of trust models, and is called a web of hierarchies trust model. The web of hierarchies model has significant advantages over both of the previous models, and these are highlighted here. The paper further describes the way that the trust model is enforced through some of the new extensions in the X.509 V3 certificates, and gives examples of its use in different scenarios

    Security Issues Related to Industry\u27s Use of the Internet

    Get PDF

    Email Security: The Challenges of Network Security

    Get PDF
    Now a day’s, network security has become very important. For those securities Simple Mail Transport Protocol is the most widely used protocol for e-mail delivery. But, it lackssecurity features like privacy, authentication and integrity of e-mail message. To make e-mail communication secure and private,e-mail servers adopted one or more security features. The security protocolsprovide a most security but it also has several limitations. This paper discusseslimitations of e-mail security protocols, analyses and evaluates theireffectiveness in e-mail servers, as well as outlines the various attack methods which are used, and various defencemechanisms against them. DOI: 10.17762/ijritcc2321-8169.15060

    Constellation Architecture Team-Lunar Scenario 12.0 Habitation Overview

    Get PDF
    This paper will describe an overview of the Constellation Architecture Team Lunar Scenario 12.0 (LS-12) surface habitation approach and concept performed during the study definition. The Lunar Scenario 12 architecture study focused on two primary habitation approaches: a horizontally-oriented habitation module (LS-12.0) and a vertically-oriented habitation module (LS-12.1). This paper will provide an overview of the 12.0 lunar surface campaign, the associated outpost architecture, habitation functionality, concept description, system integration strategy, mass and power resource estimates. The Scenario 12 architecture resulted from combining three previous scenario attributes from Scenario 4 "Optimized Exploration", Scenario 5 "Fission Surface Power System" and Scenario 8 "Initial Extensive Mobility" into Scenario 12 along with an added emphasis on defining the excursion ConOps while the crew is away from the outpost location. This paper will describe an overview of the CxAT-Lunar Scenario 12.0 habitation concepts and their functionality. The Crew Operations area includes basic crew accommodations such as sleeping, eating, hygiene and stowage. The EVA Operations area includes additional EVA capability beyond the suitlock function such as suit maintenance, spares stowage, and suit stowage. The Logistics Operations area includes the enhanced accommodations for 180 days such as enhanced life support systems hardware, consumable stowage, spares stowage, interconnection to the other habitation elements, a common interface mechanism for future growth, and mating to a pressurized rover or Pressurized Logistics Module (PLM). The Mission & Science Operations area includes enhanced outpost autonomy such as an IVA glove box, life support, medical operations, and exercise equipment

    PKI and high-level security programming abstractions for SNOOP

    Get PDF
    When working with sensitive data in a distributed setting, secure multi-partycomputations(SMC) protocols aims to preserve the privacy of participants. Acore aspect of any SMC protocol is secure communication between participants.Based on the NOOP and SNOOP middleware with a combination of secret keyand public-key cryptography we design and implement a public key infrastruc-ture(PKI) to share signed certificates containing a participants credentials andpublic key. Components of the PKI support signing and verification of certifi-cates, public-key encryption supports signing and verification of communica-tion between participants. Our tools provide high-level security programmingabstractions to support the development of SMC protocols

    Internet Privacy

    Full text link
    The benefits of the Internet have come at some cost, one of which is a loss of privacy, which is often regarded as a moral right or a legal right. Internet privacy is primarily concerned with protecting user information. It is widely acknowledged as the top consideration in any online interaction. New threats to privacy and civil liberties are emerging daily and privacy practices are not one size fits all. This paper provides a brief introduction to online privacy

    Aplicaciones de los métodos criptográficos

    Get PDF
    Peer Reviewe
    • …
    corecore