272,823 research outputs found

    Armanesia Blockchain System: Blockchain and IFPS-Based Archive System Prototype

    Get PDF
    Document integrity is critical to public trust in archives management. Armanesia is an innovative research project aims to develop prototype of information systems to support the management of digital archives based on blockchain technology. The project uses blockchain technology to record verification, immutability, and other metadata derived from various types of digital records. In this system, archives are permanently stored through peer-to-peer distribution and consensus verification without the need for a third party. The continuum archive cycle is based on Armanesia workflow infrastructure. The prototype is built through open-source technologies such as IPFS (Interplanetary File System) for blockchain-enabled file systems to design a system prototype using the SDLC (System Development Life Cycle) method. Armanesia technology can be applied for both public and private blockchain ecosystems. &nbsp

    FIRMWARE CONFIGURATION INTEGRITY IDENTIFY

    Get PDF
    In system firmware (BIOS) develop phase, system firmware (BIOS) source code includes various peripheral devices firmware and configuration INF file. A binary raw data file that includes BIOS and various peripheral device firmware name, version, & vendor will be generate during BIOS build process. The binary raw data will be integrated into system firmware. Like, BIOS Logo file. A new SMBIOS type provides individual FW name, version, and vendor information. A warning message which firmware information doesn’t match firmware BKC will display in preboot environment when system firmware is not protection. An error log that firmware doesn’t match firmware BKC will always be record to support error management software tool. Two new WMI interface to return a binary raw data of various firmware information and error log. It can be utility on automatic verification software tool or error management software tool

    Proof Verification and Attribute Based Re-Encryption of Shared Data over Public Cloud

    Get PDF
    Cloud storage is the best and proficient approach to handle our information remotely. In any case, since information proprietors and clients are more often than not outside the trusted area of cloud specialist co-ops the information security and get to control is the critical component at the season of delicate information put away in the cloud. Additionally, now days there are distinctive systems are accessible for information sharing and saving security of information proprietor and client. Key Escrow is the one of the significant issue now a day. We can’t keep full trust over the key power focus since they might be abuse their benefits. This is unsatisfactory for data sharing circumstances. In this paper we concentrated the current procedure for sharing the information from information proprietor to information client. The methodology propose an enhanced two-party key issuing convention that can ensure that neither key power nor cloud specialist co-op can bargain the entire mystery key of a client exclusively. The method also present the idea of quality with weight, being given to upgrade the statement of characteristic, which cannot just extend the expression from paired to discretionary state, additionally help the intricacy of get to approach. In this manner, both capacity cost and encryption many-sided quality for a cipher text are eased. Attribute based encryption is an open key based encryption that empowers get to control over encoded information utilizing access strategies and credited qualities. In this paper we propose proof verification module which verify proof of shared file and is received by data consumer when file shared by data owner and also a method which applies re-encryption (ABE) of a shared file here the attributes of data consumers are used to generate key

    CRYPTOGRAPHIC PROTOCOL SECURITY IN NATIONAL ENCRYPTION APPLICATIONS

    Get PDF
    In the era of digital transformation, information exchange, especially confidential and strategic information has become the most vital aspect for almost all organizations. Various bad precedents regarding classified and strategic information leaks in Indonesia have become a slap in the face that must be acknowledge and answered with effective solutions. In 2020, XYZ Agency developed a file encryption application (ABC Application) to address the challenge of securing confidential information, especially those transmitted on electronic channels. Until 2022, the ABC Application has been implemented in a limited scope and its implementation is planned to be expanded nationally. After 2 years of operation, the XYZ Agency has conducted a study on the security of the algorithm used in ABC Application, but unfortunately has not conducted an in-depth study regarding the security of the protocol suite used in the Application. In this research, a security analysis of ABC application protocol suites, namely the registration protocol, user verification, key generation, and key request for the encryption-decryption process protocol was conducted through formal verification approach using the Scyther Tool. The analysis focuses on aspects of guaranteeing confidentiality of information and authentication with four criteria, namely secrecy, aliveness, synchronization, and agreement. The experimental results showed that these protocols meet the security criteria for the transmitted confidential information but have general weaknesses in the authentication aspect, especially for synchronization and agreement criteria. Based on these weaknesses, technical recommendations are proposed that are able to overcome the identified weaknesses

    Set Partition and Trace Based Verification of Web Service Composition

    Get PDF
    AbstractDe*signing and running Web services compositions are error-prone as it is difficult to determine the behavior of web services during execution and their conformance to functional requirements. Interaction among composite Web services may cause concurrency related issues. In this paper, we present a formal model for reasoning and verifying Web services composition at design level. We partition the candidate services being considered for composition into several subsets on the basis of their service invocation order. We arrange these subsets to form a Web services set partition graph and transform to a set of interacting traces. Then, we propose a novel methodology for service interaction verification that uses service description (from WSDL file) to extract the necessary information and facilitates the process of modeling, analyzing, and reasoning the composite services. As a part of verification technique, we use two levels of modeling. This includes abstract modeling that further leads to detailed modeling if required, thereby reducing the computation time and modeling complexity

    Rapid industrial furnace thermal modeling for improved fuel efficiency

    Get PDF
    The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file.Title from title screen of research.pdf file (viewed on April 9, 2009)Includes bibliographical references.Thesis (M.S.) University of Missouri-Columbia 2007.Dissertations, Academic -- University of Missouri--Columbia -- Mechanical and aerospace engineering.The development and verification of an innovative modeling technique for industrial gas fired glass melting furnaces will be discussed. Rapid and accurate modeling of industrial furnaces is needed for the development of advanced furnace control systems. Although, computational fluid dynamics modeling of industrial furnaces has been shown to be accurate, they are computational expensive. Two variations of a new modeling technique, S2S Rapid and DO Rapid, presented use information obtained via CCD camera for calculation heat exchange within the furnace. Both utilize temperature information obtained via CCD camera for calculating heat exchange within the furnace. S2S Rapid and DO Rapid both calculated the heat flux to the glass quite fast as compared to the CFD model. In addition, the calculated heat flux to the glass using DO Rapid model is in close agreement with the CFD model
    • …
    corecore