A Framework for Assessing RFID System Security and Privacy Risks

2008 ◽  
Vol 7 (2) ◽  
pp. 70-77 ◽  
Author(s):  
Pawel Rotter
2014 ◽  
Vol 10 (2) ◽  
pp. 78-95 ◽  
Author(s):  
Karen Smith ◽  
Francis Mendez ◽  
Garry L. White

A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to which consumers stay focused, attentive, and alert to potential security and privacy risks on Facebook by restricting who can access and post to their Facebook accounts. Data from a survey of 286 adult Facebook users in the U.S. support the hypothesized relationships in the model. Results suggest that narcissism is related to increased Facebook exposure and lower Facebook vigilance, despite greater stated concern for privacy and security. Furthermore, females and younger users have greater risk exposure compared to males and older users. Implications of the findings and future research directions are discussed.


2019 ◽  
Vol 2019 ◽  
pp. 1-8
Author(s):  
Defu Liu ◽  
Guowu Yang ◽  
Yong Huang ◽  
Jinzhao Wu

Authentication protocol verification is a difficult problem. The problem of “state space explosion” has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of “state space explosion” in verifying the OSK protocol and VOSK protocol of RFID system. In this paper, the security and privacy of protocols in RFID systems are studied and analysed to verify the effectiveness of the combination of mathematical induction and model detection. We design a (r,s,t)-security experiment on the basis of privacy experiments in the RFID system according to the IND-CPA security standard in cryptography, using mathematical induction to validate the OSK protocol and VOSK protocol. Finally, the following conclusions are presented. The OSK protocol cannot resist denial of service attacks or replay attacks. The VOSK protocol cannot resist denial of service attacks but can resist replay attacks. When there is no limit on communication, the OSK protocol and VOSK protocol possess (r,s,t)-privacy; that is to say they can resist denial of service attacks.


2001 ◽  
Vol 44 (2) ◽  
pp. 51-57 ◽  
Author(s):  
Anup K. Ghosh ◽  
Tara M. Swaminatha

2007 ◽  
Vol 2 (7) ◽  
Author(s):  
Marci Meingast ◽  
Jennifer King ◽  
Deirdre K. Mulligan

2020 ◽  
Vol 9 (1) ◽  
pp. 91 ◽  
Author(s):  
Nasser Taleb ◽  
Elfadil A. Mohamed

This study is a literature review on cloud computing cloud computing trends as one the fastest growing technologies in the computer industry and their benefits and opportunities for all types of organizations. In addition, it addresses the challenges and problems that contribute to increasing the number of customers willing to adopt and use the technology. A mixed research study approach was adopted for the study, that is, by collecting and analyzing both quantitative and qualitative information within the same literature review and summarizing the findings of previous (related) studies. Results highlights the current and future trends of cloud computing and exposes readers to the challenges and problems associated with cloud computing. The reviewed literature showed that the technology is promising and is expected to grow in the future. Researchers have proposed many techniques to address the problems and challenges of cloud computing, such as security and privacy risks, through mobile cloud computing and cloud-computing governance.


Sign in / Sign up

Export Citation Format

Share Document