Context Data Acquisition Using Adaptive Non-repudiation Model

نویسندگان

چکیده

The subject of this study is the non-repudiation security service for network communication using TCP/IP stack. Generated evidence, as well decision-making process registering a given event, are context-aware. Non-repudiation equipped with context-awareness by widely utilized tools. aim paper to present timing results selected tools execution and complete evidence generation time. In some applications it crucial gather data fast possible because rapidly changing environment. For such situations, in case prolonged time, an output from tool might imprecisely describe contextual situation time occurrence event.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Timeout Estimation Using a Simulation Model for Non-repudiation Protocols

An essential issue for the best operation of non-repudiation protocols is to figure out their timeouts. In this paper, we propose a simulation model for this purpose since timeouts depend on specific scenario features such as network speed, TTP characteristics, number of originators and recipients, etc. Based on a one-to-many Markowicth's protocol simulation model as a specific example, we have...

متن کامل

Non-repudiation analysis using LySa with annotations

This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M. Buchholtz and H. Gao for authentication and freshness analyses. The result is an analysis that can statically che...

متن کامل

Intermediary Non-repudiation Protocols

In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In this paper, we introduce the concept of intermediary (or agent) in a non-repudiation protocol, define the aims of intermediary non-repudiation protocols, and analyze their security requirements. We present a simple scena...

متن کامل

Approaching decentralized non-repudiation

Securing data exchanges is a major preoccupation, and several techniques have been developed to reach that aim. The predominant model for such exchange is that which relies on trusted third-parties. Meanwhile, emerging technologies such as IoT are set to broadcast growing amounts of sensitive data, thereby making centralized architectures problematic for privacy and performance reasons and maki...

متن کامل

Middleware non-repudiation service for the data warehouse

Nowadays, storing the information is fundamental for the correct functioning of any organization. The critical factor is to guarantee the security of the stored data. In the traditional database systems the security requirements are limited to confidentiality, integrity, availability of the data and user authorization. The criticality of the database system and data repositories for modern busi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electronics and Telecommunications

سال: 2023

ISSN: ['2300-1933', '2081-8491']

DOI: https://doi.org/10.24425/119370