Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (42)
- Information Security (13)
- Engineering (10)
- Electrical and Computer Engineering (5)
- Computer Engineering (3)
-
- Databases and Information Systems (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Artificial Intelligence and Robotics (1)
- Bioinformatics (1)
- Computational Engineering (1)
- Electrical and Electronics (1)
- Industrial Engineering (1)
- Life Sciences (1)
- OS and Networks (1)
- Other Operations Research, Systems Engineering and Industrial Engineering (1)
- Psychology (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Statistics and Probability (1)
- Systems and Communications (1)
- Institution
-
- Brigham Young University (11)
- Nova Southeastern University (3)
- Singapore Management University (3)
- University of Central Florida (3)
- James Madison University (2)
-
- Louisiana Tech University (2)
- Marquette University (2)
- South Dakota State University (2)
- University of Kentucky (2)
- University of South Florida (2)
- Air Force Institute of Technology (1)
- California Polytechnic State University, San Luis Obispo (1)
- Clemson University (1)
- Missouri University of Science and Technology (1)
- Munster Technological University (1)
- Purdue University (1)
- The University of Southern Mississippi (1)
- University of Louisville (1)
- University of South Carolina (1)
- Walden University (1)
- Washington University in St. Louis (1)
- Western University (1)
- Publication Year
- Publication
-
- Theses and Dissertations (13)
- Electronic Theses and Dissertations (6)
- CCE Theses and Dissertations (3)
- Dissertations and Theses Collection (Open Access) (3)
- Doctoral Dissertations (2)
-
- USF Tampa Graduate Theses and Dissertations (2)
- All Dissertations (1)
- Computer Science and Software Engineering (1)
- Dissertations (1)
- Dissertations (1934 -) (1)
- Electronic Thesis and Dissertation Repository (1)
- Master's Theses (2009 -) (1)
- Masters Theses (1)
- Masters Theses, 2010-2019 (1)
- Masters Theses, 2020-current (1)
- McKelvey School of Engineering Theses & Dissertations (1)
- Open Access Theses (1)
- Theses (1)
- Theses and Dissertations--Computer Science (1)
- University of Kentucky Doctoral Dissertations (1)
- Walden Dissertations and Doctoral Studies (1)
Articles 31 - 44 of 44
Full-Text Articles in Physical Sciences and Mathematics
Exploiting Human Factors In User Authentication, Payas Gupta
Exploiting Human Factors In User Authentication, Payas Gupta
Dissertations and Theses Collection (Open Access)
Our overarching issue in security is the human factor – and dealing with it is perhaps one of the biggest challenges we face today. Human factor is often described as the weakest part of a security system and users are often described as the weakest link in the security chain. In this thesis, we focus on two problems which are caused by human factors in user authentication and propose respective solutions. a) Secrecy information inference attack – publicly available information can be used to infer some secrecy information about the user. b) Coercion attack – where an attacker forces a …
Security On Medical Wireless Sensor Networks, Eric D. Southern
Security On Medical Wireless Sensor Networks, Eric D. Southern
Electronic Thesis and Dissertation Repository
Wireless technology is fast becoming a very important tool for all aspects of communication. An area that lacks a strong implementation for wireless communication is the medical field. Wireless systems could be used by clinicians to be better able to diagnose and monitor patients. The reason behind the lack of adoption in healthcare is due to the need to meet the legislated and perceived requirements of security and privacy when dealing with clinical information. The current methods of wireless authentication are investigated and an existing issue in mobile networks is described and solved with two novel solutions; one solution within …
Construction Of Efficient Authentication Schemes Using Trapdoor Hash Functions, Santosh Chandrasekhar
Construction Of Efficient Authentication Schemes Using Trapdoor Hash Functions, Santosh Chandrasekhar
University of Kentucky Doctoral Dissertations
In large-scale distributed systems, where adversarial attacks can have widespread impact, authentication provides protection from threats involving impersonation of entities and tampering of data. Practical solutions to authentication problems in distributed systems must meet specific constraints of the target system, and provide a reasonable balance between security and cost. The goal of this dissertation is to address the problem of building practical and efficient authentication mechanisms to secure distributed applications. This dissertation presents techniques to construct efficient digital signature schemes using trapdoor hash functions for various distributed applications. Trapdoor hash functions are collision-resistant hash functions associated with a secret trapdoor …
Exploring Identity Management At Community Colleges In Texas With Open Access To College Computer Networks, Michael John Callahan
Exploring Identity Management At Community Colleges In Texas With Open Access To College Computer Networks, Michael John Callahan
Walden Dissertations and Doctoral Studies
The study addressed the lack of identity management practices in Texas community colleges to identify guest users who access college computers. Guest user access is required by Texas law and is part of the state's mission to bridge the technology gap; however, improper identification methods leave the college vulnerable to liability issues. The purpose of this study was to eliminate or mitigate liabilities facing colleges by creating and using security policies to identify guest users. This study combined the theoretical concepts of Cameron's internal security management model with the external trust models of the Liberty Alliance and Microsoft's Passport software. …
Protecting Privacy And Ensuring Security Of Rfid Systems Using Private Authentication Protocols, Md. Endadul Hoque
Protecting Privacy And Ensuring Security Of Rfid Systems Using Private Authentication Protocols, Md. Endadul Hoque
Master's Theses (2009 -)
Radio Frequency IDentification (RFID) systems have been studied as an emerging technology for automatic identification of objects and assets in various applications ranging from inventory tracking to point of sale applications and from healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy concerns. To ensure the widespread deployment of this technology, the security and privacy threats must be addressed. However, providing solutions to the security and privacy threats has been a challenge due to extremely inadequate resources of typical RFID tags. Authentication protocols can be a possible solution to secure RFID communications. …
Convenient Decentralized Authentication Using Passwords, Timothy W. Van Der Horst
Convenient Decentralized Authentication Using Passwords, Timothy W. Van Der Horst
Theses and Dissertations
Passwords are a very convenient way to authenticate. In terms of simplicity and portability they are very difficult to match. Nevertheless, current password-based login mechanisms are vulnerable to phishing attacks and typically require users to create and manage a new password for each of their accounts. This research investigates the potential for indirect/decentralized approaches to improve password-based authentication. Adoption of a decentralized authentication mechanism requires the agreement between users and service providers on a trusted third party that vouches for users' identities. Email providers are the de facto trusted third parties on the Internet. Proof of email address ownership is …
Simple, Secure, Selective Delegation In Online Identify Systems, Bryant Gordon Cutler
Simple, Secure, Selective Delegation In Online Identify Systems, Bryant Gordon Cutler
Theses and Dissertations
The ability to delegate privileges to others is so important to users of online identity systems that users create ad hoc delegation systems by sharing authentication credentials if no other easy delegation mechanism is available. With the rise of internet-scale relationship-based single sign-on protocols like OpenID, the security risks of password sharing are unacceptable. We therefore propose SimpleAuth, a simple modification to relationship-based authentication protocols that gives users a secure way to selectively delegate subsets of their privileges, making identity systems more flexible and increasing user security. We also present a proof-of-concept implementation of the SimpleAuth pattern using the sSRP …
Wireless Authentication Using Remote Passwords, Andrew S. Harding
Wireless Authentication Using Remote Passwords, Andrew S. Harding
Theses and Dissertations
Current authentication methods for wireless networks are difficult to maintain. They often rely on globally shared secrets or heavyweight public-key infrastructure. Wireless Authentication using Remote Passwords (WARP) mitigates authentication woes by providing usable mechanisms for both administrators and end-users. Administrators grant access by simply adding users' personal messaging identifiers (e.g., email addresses, IM handles, cell phone numbers) to an access control list. There is no need to store passwords or other account information. Users simply prove ownership of their authorized identifier to obtain wireless access.
Extensible Pre-Authentication In Kerberos, Phillip L. Hellewell
Extensible Pre-Authentication In Kerberos, Phillip L. Hellewell
Theses and Dissertations
Organizations need to provide services to a wide range of people, including strangers outside their local security domain. As the number of users grows larger, it becomes increasingly tedious to maintain and provision user accounts. It remains an open problem to create a system for provisioning outsiders that is secure, flexible, efficient, scalable, and easy to manage. Kerberos is a secure, industry-standard protocol. Currently, Kerberos operates as a closed system; all users must be specified upfront and managed on an individual basis. This paper presents EPAK (Extensible Pre-Authentication in Kerberos), a framework that enables Kerberos to operate as an open …
Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop
Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop
Theses and Dissertations
The purpose of this research is to determine whether the transition to a two-factor authentication system is more secure than a system that relied only on what users “know” for authentication. While we found that factors that made passwords inherently vulnerable did not transfer to the PIN portion of a two-factor authentication system, we did find significant problems relating to usability, worker productivity, and the loss and theft of smart cards. The new authentication method has disrupted our ability to stay connected to ongoing mission issues, forced some installations to cut off remote access for their users and in one …
Extending Distributed Temporal Protocol Logic To A Proof Based Framework For Authentication Protocols, Shahabuddin Muhammad
Extending Distributed Temporal Protocol Logic To A Proof Based Framework For Authentication Protocols, Shahabuddin Muhammad
Electronic Theses and Dissertations
Running critical applications, such as e-commerce, in a distributed environment requires assurance of the identities of the participants communicating with each other. Providing such assurance in a distributed environment is a difficult task. The goal of a security protocol is to overcome the vulnerabilities of a distributed environment by providing a secure way to disseminate critical information into the network. However, designing a security protocol is itself an error-prone process. In addition to employing an authentication protocol, one also needs to make sure that the protocol successfully achieves its authentication goals. The Distributed Temporal Protocol Logic (DTPL) provides a language …
Developing Strand Space Based Models And Proving The Correctness Of The Ieee 802.11i Authentication Protocol With Restricted Sec, Zeeshan Furqan
Developing Strand Space Based Models And Proving The Correctness Of The Ieee 802.11i Authentication Protocol With Restricted Sec, Zeeshan Furqan
Electronic Theses and Dissertations
The security objectives enforce the security policy, which defines what is to be protected in a network environment. The violation of these security objectives induces security threats. We introduce an explicit notion of security objectives for a security protocol. This notion should precede the formal verification process. In the absence of such a notion, the security protocol may be proven correct despite the fact that it is not equipped to defend against all potential threats. In order to establish the correctness of security objectives, we present a formal model that provides basis for the formal verification of security protocols. We …
Digital Receipts: A System To Detect The Compromise Of Digital Certificates, Nathaniel Allen Seeley
Digital Receipts: A System To Detect The Compromise Of Digital Certificates, Nathaniel Allen Seeley
Theses and Dissertations
The ease of copying digital materials creates difficulty in detecting the theft of digital certificates. Uneducated users frequently fail to protect their digital certificate keys by not encrypting them, storing them in insecure places, and using them unwisely. In addition, there is no way to prove that protocols involving certificates are completely secure. This thesis introduces a system to ameliorate these problems by detecting the compromise of digital certificates. It leverages dual logging messages sent via side channels to a trusted third party. This third party correlates these messages and automatically detects when an imposter presents a certificate based on …
Preserving Trust Across Multiple Sessions In Open Systems, Fuk-Wing Thomas Chan
Preserving Trust Across Multiple Sessions In Open Systems, Fuk-Wing Thomas Chan
Theses and Dissertations
Trust negotiation, a new authentication paradigm, enables strangers on the Internet to establish trust through the gradual disclosure of digital credentials and access control policies. Previous research in trust negotiation does not address issues in preserving trust across multiple sessions. This thesis discusses issues in preserving trust between parties who were previously considered strangers. It also describes the design and implementation of trust preservation in TrustBuilder, a prototype trust negotiation system. Preserving trust information can reduce the frequency and cost of renegotiation. A scenario is presented that demonstrates that a server supporting trust preservation can recoup the cost of the …