SMARTCOP – A Smart Card Based Access Control for the Protection of Network Security Components

Author(s):  
Joaquín García-Alfaro ◽  
Sergio Castillo ◽  
Jordi Castellà-Roca ◽  
Guillermo Navarro ◽  
Joan Borrell
Author(s):  
Kimaya Arun Ambekar ◽  
Kamatchi R.

Cloud computing is based on years of research on various computing paradigms. It provides elasticity, which is useful in the situations of uneven ICT resources demands. As the world is moving towards digitalization, the education sector is expected to meet the pace. Acquiring and maintaining the ICT resources also necessitates a huge amount of cost. Education sector as a community can use cloud services on various levels. Though the cloud is very successfully running technology, it also shows some flaws in the area of security, privacy and trust. The research demonstrates a model in which major security areas are covered like authorization, authentication, identity management, access control, privacy, data encryption, and network security. The total idea revolves around the community cloud as university at the center and other associated colleges accessing the resources. This study uses OpenStack environment to create a complete cloud environment. The validation of the model is performed using some cases and some tools.


Author(s):  
Kurniati Kurniati ◽  
Rahmat Novrianda Dasmen

PT. KAI Palembang is a branch of PT. Kereta Api Indonesia (KAI) Persero located in South Sumatra Province, where PT. KAI Persero is an Indonesian State-Owned Enterprise that organizes railway transportation which provide services including passenger and goods transportation. PT. KAI Palembang has a computer network connected to PT. KAI Persero central is located in Jakarta. Now, PT. KAI Palembang is trying to improve computer network security, where one of them is limiting the access of users who connected to PT. KAI Palembang computer network. This can be done by implementing Access Control Lists (ACLs) and Frame Relay on PT. KAI Palembang computer network. In this research used the Network Development Life Cycle (NDLC) method which has several stages, namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring and Management. This research method is used because the results of this research will be displayed in the Cisco packet tracer simulator. In addition, the results of this research were tested using a ping test between computers to show that the ACLs design had been running well.  


2013 ◽  
Vol 380-384 ◽  
pp. 2451-2454 ◽  
Author(s):  
Gui Fen Zhao ◽  
Ying Li ◽  
Li Ping Du ◽  
Jian Wei Guo

With the increasing amount of online shoppers, the security for E-Business becomes more important. Security middleware is one of the methods to achieve secure E-Business application. A security middleware based on smart card and combined secret key is proposed for mobile users and PC users. The security components are developed on the basis of cipher service provide by smart cards, encryption cards and combined secret key method, and provide security service interfaces based on J2EE. The middleware is proved valid for protecting the secrecy and integrity of order information during payment test.


Sign in / Sign up

Export Citation Format

Share Document