Reducing User Error by Establishing Encryption Patterns

نویسندگان

  • Anthony Gabrielson
  • Haim Levkowitz
چکیده

This paper is motivated by a desire to create a user friendly, technically flexible approach to cryptography. This approach can create a flexible design pattern that is useable under a wide variety of circumstances from broadcast media to existing network protocols. This is accomplished by designing a new, key piece of infrastructure used for cryptography key lookup. Once the key is obtained the application/protocol developer is given the flexibility to meet their requirements. Keywords-Security Patterns; Patterns of Trust; Authorization Patterns

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Secure Methodology for Data Encryption with DNA Steganography and vein Patterns

The transfer of data in a secure way can be implemented using Biometric technologiesto authenticate. Thanjavur, India. We identify and use invariant and unique biometric features to embed data. The mechanism consists of a two level encryption system using certain algorithms .The vein pattern of a user is obtained and his DNA sequence is retrieved from the database. The first level of encryption...

متن کامل

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

With increasing security threats in internet environments, we may therefore want to establish a secure mechanism for data transmissions on each network. This paper presents a mechanism for establishing secure switching local area networks (LANs) by using intelligent switching hubs. Then we can achieve secure internet environments by means of the proposed switching LANs and firewalls. The propos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011