5,089 research outputs found

    Non-Blocking Signature of very large SOAP Messages

    Full text link
    Data transfer and staging services are common components in Grid-based, or more generally, in service-oriented applications. Security mechanisms play a central role in such services, especially when they are deployed in sensitive application fields like e-health. The adoption of WS-Security and related standards to SOAP-based transfer services is, however, problematic as a straightforward adoption of SOAP with MTOM introduces considerable inefficiencies in the signature generation process when large data sets are involved. This paper proposes a non-blocking, signature generation approach enabling a stream-like processing with considerable performance enhancements.Comment: 13 pages, 5 figure

    Non-Blocking Signature of very large SOAP Messages

    Full text link
    Data transfer and staging services are common components in Grid-based, or more generally, in service-oriented applications. Security mechanisms play a central role in such services, especially when they are deployed in sensitive application fields like e-health. The adoption of WS-Security and related standards to SOAP-based transfer services is, however, problematic as a straightforward adoption of SOAP with MTOM introduces considerable inefficiencies in the signature generation process when large data sets are involved. This paper proposes a non-blocking, signature generation approach enabling a stream-like processing with considerable performance enhancements.Comment: 13 pages, 5 figure

    Secure publish-subscribe protocols for heterogeneous medical wireless body area networks

    Get PDF
    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution.This work was supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You)

    The Not-So-Secret Ballot: How Washington Fails to Provide a Secret Vote for Impaired Voters as Required by the Washington State Constitution

    Get PDF
    Secrecy in voting ensures that elections represent the true will of the people by permitting a voter to freely express his or her convictions without fear of even the most subtle form of influence, ridicule, intimidation, corruption, or coercion. Article VI, section 6 of the Washington State Constitution protects this secrecy by requiring the legislature to provide every voter with a method of voting that will secure absolute secrecy in preparing and casting his or her ballot. To that end, Washington election law requires that new technology be implemented by January 1, 2006 to provide visually impaired voters with a secret vote to the extent feasible. However, no similar provision exists for manually impaired voters. Manually impaired voters include a wide range of individuals who lack the manual dexterity to complete a paper ballot, such as amputees and individuals with cerebral palsy. Manually impaired voters must waive their constitutional right to vote in secret and instead must disclose their selections to a third party, usually in an open polling place where not only the person assisting the voter hears the selection, but so does everyone in the vicinity. Voting technology now exists and is approved for use in Washington that allows manually impaired voters to vote in secret. This Comment argues that in light of the plain language of the constitution, the framers\u27 intent in requiring absolute secrecy, and persuasive precedent from other jurisdictions, the Washington State Constitution requires that the legislature provide for secrecy in voting to the extent feasible. By failing to provide a secret vote for manually impaired voters to the extent feasible, the Washington legislature has not complied with the requirements of article VI, section 6

    Of PhDs, Pirates and the Public: Three-Dimensional Printing Technology and the Arts

    Get PDF

    Of PhDs, Pirates, and the Public: Three-Dimensional Printing Technology and the Arts

    Get PDF
    The confluence of three-dimensional printing, three-dimensional scanning, and the Internet will erode the dividing line between the physical and the digital worlds and will bring millions of laypeople into intimate contact with the full spectrum of intellectual property laws. One of the areas most affected by 3D printers will be three-dimensional art. This Article analyzes several ways in which 3D printing technology will affect the creation, delivery, and consumption of art. Not only does 3D printing offer great promise for creative works, but it also presents a problem of piracy that may accompany the digitization of three-dimensional works. As 3D printing technology’s relationship to intellectual property law is largely unexplored, this Article explores foundational issues regarding how copyright law applies to 3D printing technology, laying the groundwork upon which further analysis of 3D printing’s effects on copyright law may be built

    E-mail behavior profiling: Based on attachment and language text

    Get PDF
    Employees are stealing confidential information from its company via e-mail without detection. Invisible Witness tool can provide new assistance for an organization. Its techniques will automatically detect certain patterns across user accounts that indicate covert or malicious activities. Furthermore, this application assists the network administrator with targeted investigations. Many applications look for specific text or attachments, but Invisible Witness is the only application that is capable of creating user profiling. This application works with over 95 percent accuracy. I am sure that the Invisible Witness tool will minimize business risk to help protect valuable company information

    An Investigation of the Security Designs of a Structured Query Language (Sql) Database and its Middleware Application and their Secure Implementation Within Thinclient Environments

    Get PDF
    The Information Portability and Accountability Act (HIPAA) and The SarbanesOxley (SOX) regulations greatly influenced the health care industry regarding the means of securing financial and private data within information and technology. With the introduction of thinclient technologies into medical information systems (IS), data security and regulation compliancy becomes more problematic due to the exposure to the World Wide Web (WWW) and malicious activity. This author explores the best practices of the medical industry and information technology industry for securing electronic data within the thinclient environment at the three levels of architecture: the SQL database, its middleware application, and Web interface. Designing security within the SQL database is not good enough as breaches can occur through unintended consequences during data access within the middleware application design and data exchange design over computer networks. For example, a hospital\u27s medical records, which are routinely exchanged over computer networks, are subject to the audit control an encryption requirements mandated for data security. (Department of, 2008). While there is an overlapping of security techniques within each of the three layers of architectural security design, the use of 18 methodologies greatly enhances the ability to protect electronic information. Due to the variety of IS used within a medical facility, security conscientiousness, consistency of security design, excellent communication between designers, developers and system engineers, and the use of standardized security techniques within each of the three layers of architecture are required
    • …
    corecore