3,167 research outputs found

    Transforming Password Protocols to Compose

    Get PDF
    Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. They improved our understanding of security protocols, allowed to discover flaws, and also provide support for protocol design. However, such analyses usually consider that the protocol is executed in isolation or assume a bounded number of protocol sessions. Hence, no security guarantee is provided when the protocol is executed in a more complex environment. In this paper, we study whether password protocols can be safely composed, even when a same password is reused. More precisely, we present a transformation which maps a password protocol that is secure for a single protocol session (a decidable problem) to a protocol that is secure for an unbounded number of sessions. Our result provides an effective strategy to design secure password protocols: (i) design a protocol intended to be secure for one protocol session; (ii) apply our transformation and obtain a protocol which is secure for an unbounded number of sessions. Our technique also applies to compose different password protocols allowing us to obtain both inter-protocol and inter-session composition

    Transforming Password Protocols to Compose

    Get PDF
    International audienceFormal, symbolic techniques are extremely useful for modelling and analysing security protocols. They improved our understanding of security protocols, allowed to discover flaws, and also provide support for protocol design. However, such analyses usually consider that the protocol is executed in isolation or assume a bounded number of protocol sessions. Hence, no security guarantee is provided when the protocol is executed in a more complex environment. In this paper, we study whether password protocols can be safely composed, even when a same password is reused. More precisely, we present a transformation which maps a password protocol that is secure for a single protocol session (a decidable problem) to a protocol that is secure for an unbounded number of sessions. Our result provides an effective strategy to design secure password protocols: (i) design a protocol intended to be secure for one protocol session; (ii) apply our transformation and obtain a protocol which is secure for an unbounded number of sessions. Our technique also applies to compose different password protocols allowing us to obtain both inter-protocol and inter-session composition

    ERP implementation for an administrative agency as a corporative frontend and an e-commerce smartphone app

    Get PDF
    This document contains all the descriptions, arguments and demonstrations of the researches, analysis, reasoning, designs and tasks performed to achieve the requirement to technologically evolve an managing agency in a way that, through a solution that requires a reduced investment, makes possible to arrange a business management tool with e-commerce and also a mobile application that allows access and consultation of mentioned tool. The first part of the document describes the scenario in order to contextualize the project and introduces ERP (Enterprise Resources Planning). In the second part, a deep research of ERP market products is carried out, identifying the strengths and weaknesses of each one of the products in order to finish with the choice of the most suitable product for the scenario proposed in the project. A third part of the document describes the installation process of the selected product carried out based on the use of Dockers, as well as the configurations and customizations that they make on the selected ERP. A description of the installation and configuration of additional modules is also made, necessary to achieve the agreed scope of the project. In a fourth part of the thesis, the process of creating an iOS and Android App that connects to the selected ERP database is described. The process begins with the design of the App. Once designed, it is explained the process of study and documentation of technologies to choose the technology stack that allows making an application robust and contemporary without use of licensing. After choosing the technologies to use there are explained the dependencies and needs to install runtime enviornments prior to the start of coding. Later, it describes how the code of the App has been raised and developed. The compilation and verification mechanisms are indicated in continuation. And finally, it is showed the result of the development of the App once distributed. Finally, a chapter for the conclusions analyzes the difficulties encountered during the project and the achievements, analyzing what has been learned during the development of this project

    Fotovoltaic excess management and visualization system

    Get PDF
    L'objectiu principal del projecte és el desenvolupament d'un prototip funcional per a un sistema de gestió i visualització d'excedents fotovoltaics basat en la integració de tecnologies ja existents. En termes més concrets, implica la implementació d'una solució software capaç de gestionar els excedents d'energia d'una casa intel·ligent o instal·lació similar (seguiment de l'ús de l'energia importada/exportada, decidir quan i com utilitzar l'excés d'energia, etc.), així com visualitzar-lo (consum de diferents dispositius, càlcul de potènciacostos/beneficis, recursos hardware, etc.)The project's main objective is the development of a working prototype for a photovoltaic excess management and visualization system based on the integration of already existing technologies. In more concrete terms, this means the implementation of a software-based solution capable of managing excess power from a smart home or similar installation (tracking use of imported/exported power, deciding when and how to use excess power, etc.), as well as visualizing it (consumption of different devices, computation of power costs/benefits, hardware resources, etc.

    Semantic business process management: a vision towards using semantic web services for business process management

    Get PDF
    Business process management (BPM) is the approach to manage the execution of IT-supported business operations from a business expert's view rather than from a technical perspective. However, the degree of mechanization in BPM is still very limited, creating inertia in the necessary evolution and dynamics of business processes, and BPM does not provide a truly unified view on the process space of an organization. We trace back the problem of mechanization of BPM to an ontological one, i.e. the lack of machine-accessible semantics, and argue that the modeling constructs of semantic Web services frameworks, especially WSMO, are a natural fit to creating such a representation. As a consequence, we propose to combine SWS and BPM and create one consolidated technology, which we call semantic business process management (SBPM

    Deliverable JRA1.1: Evaluation of current network control and management planes for multi-domain network infrastructure

    Get PDF
    This deliverable includes a compilation and evaluation of available control and management architectures and protocols applicable to a multilayer infrastructure in a multi-domain Virtual Network environment.The scope of this deliverable is mainly focused on the virtualisation of the resources within a network and at processing nodes. The virtualization of the FEDERICA infrastructure allows the provisioning of its available resources to users by means of FEDERICA slices. A slice is seen by the user as a real physical network under his/her domain, however it maps to a logical partition (a virtual instance) of the physical FEDERICA resources. A slice is built to exhibit to the highest degree all the principles applicable to a physical network (isolation, reproducibility, manageability, ...). Currently, there are no standard definitions available for network virtualization or its associated architectures. Therefore, this deliverable proposes the Virtual Network layer architecture and evaluates a set of Management- and Control Planes that can be used for the partitioning and virtualization of the FEDERICA network resources. This evaluation has been performed taking into account an initial set of FEDERICA requirements; a possible extension of the selected tools will be evaluated in future deliverables. The studies described in this deliverable define the virtual architecture of the FEDERICA infrastructure. During this activity, the need has been recognised to establish a new set of basic definitions (taxonomy) for the building blocks that compose the so-called slice, i.e. the virtual network instantiation (which is virtual with regard to the abstracted view made of the building blocks of the FEDERICA infrastructure) and its architectural plane representation. These definitions will be established as a common nomenclature for the FEDERICA project. Other important aspects when defining a new architecture are the user requirements. It is crucial that the resulting architecture fits the demands that users may have. Since this deliverable has been produced at the same time as the contact process with users, made by the project activities related to the Use Case definitions, JRA1 has proposed a set of basic Use Cases to be considered as starting point for its internal studies. When researchers want to experiment with their developments, they need not only network resources on their slices, but also a slice of the processing resources. These processing slice resources are understood as virtual machine instances that users can use to make them behave as software routers or end nodes, on which to download the software protocols or applications they have produced and want to assess in a realistic environment. Hence, this deliverable also studies the APIs of several virtual machine management software products in order to identify which best suits FEDERICA’s needs.Postprint (published version

    Mobile application for tracking cycling activity

    Get PDF
    Dissertação de mestrado integrado em Engenharia InformáticaIn recent decades there has been significant growth in cycling and the use of bicycles as a means of transport and beyond recreational use. Technological advances along with smartphones and web platforms can help cyclists as they consider and plan their routes. This brings several social, economic and environmental benefits. Technology is now present in all aspects of modern life, and that includes cycling. This "technological revolution of cycling" is a phenomenon that attracts more and more attention and a variety of interests, fuelled both by the processes of transition to intelligent mobility and by a growth in attention to cycling in cities around the world. This is where this dissertation comes in, which aims to develop the prototype of a mobile application for cycling urban mobility, more specifically to be used by cyclists as a digital tool to support the various aspects of this form of mobility. This application prototype will have the opportunity to introduce itself in a context that is not much explored yet, being able to allow the cyclist to make a manual tracking or autonomous tracking of his travels, thus making that mobility in that city can be investigated and at the same time improved. It is about thinking of an application that has been designed with a global purpose but has a local behaviour, thus being able to operate in any region that is being used, making it a versatile application without any kind of restriction.Nas últimas décadas tem havido um crescimento significativo no ciclismo e na utilização de bicicletas como meio de transporte e para além do uso recreativo. Os avanços tecnológicos juntamente com os telemóveis e plataformas web podem ajudar os ciclistas enquanto consideram e planejam as suas rotas. Isto traz vários benefícios sociais, económicos e ambientais. A tecnologia está agora presente em todos os aspectos da vida moderna, e isso inclui o ciclismo. Esta "revolução tecnológica do ciclismo" é um fenômeno que atrai cada vez mais a atenção e uma variedade de interesses, alimentada tanto pelos processos de transição para a mobilidade inteligente como por um crescimento de atenção ao ciclismo nas cidades de todo o mundo. É aqui que entra esta dissertação que visa o desenvolvimento do protótipo de uma aplicação móvel para a mobilidade urbana ciclável, mais especificamente para ser usada pelos ciclistas como ferramenta digital de apoio a diversas vertentes dessa forma de mobilidade. Este protótipo de aplicação terá a oportunidade de se introduzir num contexto que ainda não é muito explorado, podendo permitir ao ciclista fazer um rastremento manual ou autônomo das viagens do mesmo, fazendo assim com que a mobilidade naquela cidade possa ser investigada e ao mesmo tempo melhorada. Trata-se de pensarmos numa aplicação que tenha sido pensada com um propósito global mas que tenha um comportamento local, sendo assim capaz operar em qualquer região que esteja a ser utilizada, fazendo assim da mesma uma aplicação versátil e sem qualquer tipo de restrição.This work is supported by: European Structural and Investment Funds in the FEDER component, through the Operational Competitiveness and Internationalization Programme (COMPETE 2020) [Project no 039334; Funding Reference: POCI-01-0247-FEDER-039334

    Recent Advanced Computing Methods Employed in Web Service Automation - A Survey

    Get PDF
    Web Service Automation gains momentum for the past two decades. So, various computational algorithms have been developed on different aspects of web service categorization and resource allocation. Research activities are more on comparing the algorithms over time and space complexity. Web designers and service providers make their contribution to enrich the IT products in this area. In this paper, a detail study is attempted on the above aspects of web service Automation. We open an area of web technology for implementation of newer algorithms. Keywords - Web Service Allocation, Zero Knowledge Authentication, Logic Programming, Service Computing, Distributed Algorithms, Cloud computing
    corecore