• Internet Traffic classification demystified

    Internet Traffic classification Demystified: Myths, Caveats, and the Best Practices

    0
    56
    231KB
    2019-09-19
    10
  • How_to_Use_TPM_Whitepaper_20090302_Final_3_.pdf

    The TPM, a secure cryptographic integrated circuit (IC), provides a hardware-based approach to manage user authentication, network access, data protection and more that takes security to higher level than software-based security. Perhaps surprisingly to many IT and operations staff, the TPM can be combined with widely used enterprise hardware such as network policy enforcement points, including Checkpoint firewalls, Cisco switchers and routers, and other 802.1x-compatible devices.

    0
    63
    209KB
    2019-09-19
    0
  • TPMs Strengthen User_and_Platform Authenticity_Final

    Strong user authentication and device validation are essential for trusted digital interactions. Both are necessary to protect against inappropriate access to sensitive and confidential information and valued systems. Both are required to protect the integrity of the information, prevent corruption of the files, and ensure the integrity of those systems

    0
    51
    172KB
    2019-09-19
    6
  • Network Monitoring using Traffic Dispersion Graphs.pdf

    Monitoring network traffic and detecting unwanted applications has become a challenging problem, since many applications obfuscate their traffic using unregistered port numbers or payload encryption. Apart from some notable exceptions, most traffic monitoring tools use two types of approaches: (a) keeping traffic statistics such as packet sizes and interarrivals, flow counts, byte volumes, etc., or (b) analyzing packet content. In this paper, we propose the use of Traffic Dispersion Graphs (TDGs) as a way to monitor, analyze, and visualize network traffic. TDGs model the social behavior of hosts (“who talks to whom”), where the edges can be defined to represent different interactions (e.g. the exchange of a certain number or type of packets). With the introduction of TDGs, we are able to harness a wealth of tools and graph modeling techniques from a diverse set of disciplines

    0
    106
    976KB
    2019-09-19
    10
  • Application of ABE for PII and personal data protection

    The following use cases are described: 1) The Mobile use case describes a situation of user access from less trusted networks. The objective is to provide user identity protection preserving disclosure to unauthorized entity. 2) The federated WLAN use case where users can access different WLAN networks using their credentials - issued by different authorities/domains - while preserving their privacy. 3) Many Internet of Things use cases or edge scenarios where data access mechanisms are actioned either in the network or on the device. 4) The Cloud use case where a third party accesses personal data from the Cloud Service Provider. The present document also provides recommendations on the ABE scheme to use for each use case

    0
    44
    275KB
    2019-07-17
    9
  • ts_103532v010101p.pdf

    The specifications address the following aspects: • Identification of an ABE scheme covering both the Ciphertext-Policy and Key-Policy variants • Definition of interactions between the data sources, the service providers and the authority releasing attributes and key material • Mechanisms for keys, policies, and attributes distribution • Mechanisms for secret key expiration and revocation • Definition of semantics for a basic set of attributes to ensure interoperability • Mapping to a standard Public Key Infrastructure X.509 • Mapping to a standard assertion protocol (SAML) • Definition of a policy schema for data access control • Identification of limitations compared to traditional ABAC features • Translation rules to XACML • Definition of new protocol bindings when existing bindings do not cover the deployment scenario (e.g. a CoAP binding for the IoT case)

    0
    57
    636KB
    2019-07-17
    0
  • Digital Identity Guidelines Authentication and Lifecycle Management

    These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of subjects interacting with government systems over open networks, establishing that a given claimant is a subscriber who has been previously authenticated. The result of the authentication process may be used locally by the system performing the authentication or may be asserted elsewhere in a federated identity system. This document defines technical requirements for each of the three authenticator assurance levels. This publication supersedes corresponding sections of NIST Special Publication (SP) 800-63-2

    0
    50
    1.5MB
    2019-07-17
    9
  • Blockchain-for-the-Transportation-Industry-Article-0318.pdf

    ew blockchain-based business models are enabled. The system could create an extremely fast and secure network for electric car charging station availability and payment. Further into the future, it may also prove essential to self-driving cars. Information from a self-driving Porsche on road conditions, could be uploaded and distributed across the blockchain. From there, other vehicles’ software connected to the system could access and analyze the information to provide a warning to traffc congestion or inclement weather

    0
    156
    1.23MB
    2019-07-17
    9
  • samsara-protocol-white-paper.pdf

    This research represents a model of buying and selling lotteries system on Blockchain by using Ethereum network to determines the conditions for the purchasing of the lottery and reward the prize winner. Our system uses Ethereum coins to buy and reward the prize for convenience in term of speed and also reduce the problems which is unable to be controlled by the government. For example, lottery agents (intermediaries) may sell the lottery at overprice, and reward the winners at a lower than appropriate rate. Additionally, the most important problem is the verification of the real owner of the lottery.

    0
    82
    2.04MB
    2019-07-17
    9
  • futureinternet-10-00020-v2.pdf

    Blockchain is receiving increasing attention from academy and industry, since it is considered a breakthrough technology that could bring huge benefits to many different sectors. In 2017, Gartner positioned blockchain close to the peak of inflated expectations, acknowledging the enthusiasm for this technology that is now largely discussed by media. In this scenario, the risk to adopt it in the wake of enthusiasm, without objectively judging its actual added value is rather high. Insurance is one the sectors that, among others, started to carefully investigate the possibilities of blockchain. For this specific sector, however, the hype cycle shows that the technology is still in the innovation trigger phase, meaning that the spectrum of possible applications has not been fully explored yet. Insurers, as with many other companies not necessarily active only in the financial sector, are currently requested to make a hard decision, that is, whether to adopt blockchain or not, and they will only know if they were right in 3–5 years. The objective of this paper is to support actors involved in this decision process by illustrating what a blockchain is, analyzing its advantages and disadvantages, as well as discussing several use cases taken from the insurance sector, which could easily be extended to other domains

    0
    101
    1005KB
    2019-07-17
    10
关注 私信
上传资源赚积分or赚钱