Reducing User Error by Establishing Encryption Patterns
نویسندگان
چکیده
This paper is motivated by a desire to create a user friendly, technically flexible approach to cryptography. This approach can create a flexible design pattern that is useable under a wide variety of circumstances from broadcast media to existing network protocols. This is accomplished by designing a new, key piece of infrastructure used for cryptography key lookup. Once the key is obtained the application/protocol developer is given the flexibility to meet their requirements. Keywords-Security Patterns; Patterns of Trust; Authorization Patterns
منابع مشابه
The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملSecure Methodology for Data Encryption with DNA Steganography and vein Patterns
The transfer of data in a secure way can be implemented using Biometric technologiesto authenticate. Thanjavur, India. We identify and use invariant and unique biometric features to embed data. The mechanism consists of a two level encryption system using certain algorithms .The vein pattern of a user is obtained and his DNA sequence is retrieved from the database. The first level of encryption...
متن کاملEstablishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments
With increasing security threats in internet environments, we may therefore want to establish a secure mechanism for data transmissions on each network. This paper presents a mechanism for establishing secure switching local area networks (LANs) by using intelligent switching hubs. Then we can achieve secure internet environments by means of the proposed switching LANs and firewalls. The propos...
متن کامل