Showing papers in "Computer Standards & Interfaces in 2010"
••
TL;DR: It is shown that the improved smart card authentication scheme proposed by Xu-Zhu-Feng is vulnerable to internal and impersonation attacks, and an improvement of their solution is proposed, and a new efficient strong smart card Authentication protocol is presented.
290 citations
••
TL;DR: Simulation results demonstrate that the embedded watermarks can be almost fully extracted from images compressed with very high compression ratio.
207 citations
••
TL;DR: This paper carries out a systematic review of the existing literature concerning security requirements engineering in order to summarize the evidence regarding this issue and to provide a framework/background in which to appropriately position new research activities.
186 citations
••
TL;DR: A global comparison has been done for the most relevant models against these conditions, and an interface proposal for trust and/or reputation models has been proposed, providing some pre-standardization recommendations.
148 citations
••
TL;DR: The proposed HPKI has delegated the trust and security management to the medical service provider during the contract period, which is more realistic and much an analogy to existing paper based health care systems in terms of functional structure.
114 citations
••
TL;DR: A notation that allows business users to model their business process and must be agile, easy to learn and design, and capable to provide semantic information about the process is presented.
57 citations
••
TL;DR: The K-response model is experimented for the 1-response scenario and its experimental results proved that the preceding host will get the response with in the time out period of the clone.
55 citations
••
TL;DR: There is a great need for low cost systems that can detect human veins with minimum computational requirements and to achieve low scanning errors the acquired image should be almost noiseless and the algorithms should detect the vein pattern in various conditions.
47 citations
••
TL;DR: This paper tries to find the optimal video codecs from energy analyses of them on handheld devices by investigating the effects from choices of codecs, file formats, and codec parameters.
33 citations
••
TL;DR: The inspiration of a conceptual model capable to originate an effective, scalable e-Government ontology is presented and the implementation of an ontology-based repository for designing, modelling and even reengineering of governmental services is implemented in the Greek Government.
30 citations
••
TL;DR: An Aspect-Oriented Programming-based approach to the development of software components for fault detection in automatic measurement systems is proposed, and results of software modularity and performance measurements for comparing aspect- and object-oriented solutions in rotating coils tests on superconducting magnets are reported.
••
TL;DR: The RMS bias caused by window sidelobes when applying twelve different generalized cosine windows is compared and the presented principle is applicable for all DFT based algorithms, not only for those used for RMS value estimation.
••
TL;DR: This work proposes a consensus problem based solution to make all sensors reach an agreement without the sink, which can conduct actions more quickly and directly.
••
TL;DR: This paper proposes ADOPT (Ad hoc Distributed OCSP for Trust), a certificate validation protocol which can be successfully applied in MANETs but also in mobile and wireless networks.
••
TL;DR: A framework based on an agreement contains a privacy model defined in the policy level of the agreement and provides upon it a reasoning mechanism for the evolution of the policies.
••
TL;DR: This paper presents a methodology with which to audit personal data protection, using Requirements Engineering and based on CobiT, and has been validated in four real case studies.
••
TL;DR: In this paper deficiencies identified by the authors during the implementation of a compiler, compliant with the second version of the IEC 61131-3 standard, are explained and analysed.
••
TL;DR: An XML-based framework, called XLIVE, which provides an efficient way to collect data in live forensic cases, according to well-known crime categories, which will be used extensively to deal with terabyte/petabyte digital systems.
••
TL;DR: A critical analysis of the on-going work standardizing low-latency EAP re-authentication and key distribution protocols for secure and seamless handover in mobile scenarios is provided.
••
TL;DR: This paper mounts the first impossible differential attack on 7-round Crypton using two new observations on the diffusion layer of Crypton, exploiting a 4-round impossible differential, and appropriately choosing three additional rounds.
••
TL;DR: A new class of auxetic materials, a hexachiral honeycomb structure with good mechanical properties, is investigated through computer simulation and measurement and promises better performance using different insertion techniques.
••
TL;DR: The adoption of TDR for granular materials monitoring is investigated, and an in-depth analysis is extended to various feedstuff materials, confirming its suitability for the considered applications.
••
TL;DR: Various implementations of the e-cognocracy technology are presented, starting with an initial proof of concept and going on to the use of smart cards to permit remote use of the system and influence the level of perceived confidence among users, eliminating the role of one of the confidence authorities formerly required to ensure appropriate system security.
••
TL;DR: In this article, the authors proposed an efficient scheme for issuing receipts to voters in an e-voting environment using the well-known divide-and-choose method, which requires neither special printers or scanners, nor frequent observations of voting machines.
••
TL;DR: A framework for tools to support the development of NDR for XML Schema is described, which aid in producing high quality XML schemas using a standards-based approach to information integration.
••
TL;DR: The proposed method is intended to test the linearity of the ADC in the static regime, using only constant test signals, except for a small amount of additive noise, in a nearly optimal manner.
••
TL;DR: The security framework that is to be developed for the generic grid platform created for the project GREDIA, which uses the OGSA standards, will follow GSI, the portion of Globus that implements security.
••
TL;DR: It is proved that an important quality factor in providing relevant information is how frequent Internet search services refresh their databases and when users' browsing behavior is jointly examined with the ability of the Internet search Services to offer new and fresh results, a more effective meta-search is provided.
••
TL;DR: This paper presents the test aspect of URN, the part of ITU-T's family of languages that describes functional requirements and high level designs with causal scenarios.
••
TL;DR: It is indicated that COM+ falls short of supporting even Core RBAC, and an algorithm is suggested that formally specifies the semantics of authorization decisions in COM+.