scholarly journals User Authentication and Authorization for Next Generation Mobile Passenger ID Devices for Land and Sea Border Control

Author(s):  
Maria Papaioannou ◽  
Georgios Mantas ◽  
Dimitrios Lymberopoulos ◽  
Jonathan Rodriguez
2017 ◽  
Vol 22 (S1) ◽  
pp. 1991-1999 ◽  
Author(s):  
Cheol-Joo Chae ◽  
Ki-Bong Kim ◽  
Han-Jin Cho

2021 ◽  
Author(s):  
Philippe Colson ◽  
Pierre-Edouard Fournier ◽  
Herve Chaudet ◽  
Jeremy Delerce ◽  
Audrey GIRAUD-GATINEAU ◽  
...  

After the end of the first epidemic episode of SARS-CoV-2 infections, as cases began to rise again during the summer of 2020, we at IHU Mediterranee Infection in Marseille, France, intensified the genomic surveillance of SARS-CoV-2, and described the first viral variants. In this study, we compared the incidence curves of SARS-CoV-2-associated deaths in different countries and reported the classification of SARS-CoV-2 variants detected in our institute, as well as the kinetics and sources of the infections. We used mortality collected from a COVID-19 data repository for 221 countries. Viral variants were defined based on ≥5 hallmark mutations shared by ≥30 genomes. SARS-CoV-2 genotype was determined for 24,181 patients using next-generation genome and gene sequencing (in 47% and 11% of cases, respectively) or variant-specific qPCR (in 42% of cases). Sixteen variants were identified by analysing viral genomes from 9,788 SARS-CoV-2-diagnosed patients. Our data show that since the first SARS-CoV-2 epidemic episode in Marseille, importation through travel from abroad was documented for seven of the new variants. In addition, for the B.1.160 variant of Pangolin classification (a.k.a. Marseille-4), we suspect transmission from mink farms. In conclusion, we observed that the successive epidemic peaks of SARS-CoV-2 infections are not linked to rebounds of viral genotypes that are already present but to newly-introduced variants. We thus suggest that border control is the best mean of combating this type of introduction, and that intensive control of mink farms is also necessary to prevent the emergence of new variants generated in this animal reservoir.


Author(s):  
Donald F. Norris ◽  
Laura Mateczun ◽  
Anupam Joshi ◽  
Tim Finin

Abstract In this paper, we examine cybersecurity challenges faced by America’s local, governments, including: the extent of cyberattacks; problems faced in preventing attacks from being successful; barriers to providing high levels of cybersecurity management; and actions that local governments believe should be taken to improve cybersecurity practice. Our research method consisted of a focus group of information technology (IT) and cybersecurity officials from one American state. Our findings indicate that cyberattacks are constant and can number in the tens of thousands or more per day. While our participants noted that while they were not perfect at it, they felt that they had cybersecurity technology under good control. Their biggest challenge is human – that is, end-users who make mistakes or engage in misconduct. Local governments face several barriers in providing high levels of cybersecurity, including: insufficient funding and staffing; problems of governance; and insufficient or under-enforced cybersecurity policies. Participants suggested several ways to improve local government cybersecurity, including: vulnerability assessment, scanning and testing, cybersecurity insurance, improving end-user authentication and authorization, end-user training and control, control over the use of external devices, and improved governance methods, among others. We conclude by making suggestions for further research into local government cybersecurity.


2005 ◽  
Vol 47 (6) ◽  
Author(s):  
Stefan Wesner

SummaryMobility is becoming a central aspect of everyday life and must not be ignored by the ongoing efforts in defining the Next Generation Grid architectures. Currently existing network agnostic Grid middleware solutions are duplicating functionality available from lower layers and cannot benefit from a richer set of additional information available such as the user or device context. In this article we will motivate why an integration of the infrastructure services built for supporting mobile users can be beneficial for the realization of a Next Generation Grid. Starting from a definition of the term Mobile Grid it is shown how new kind of adaptive applications can be realized and how the major obstacles for the wide take up of Grid solutions can be addressed. In particular how grid solutions can benefit from user authentication models, cross-organizational accounting, auditing and billing are covered. Beside the opportunities of this integration several new challenges in particular related to workflows and the management of Service Level Agreements will be outlined. This so called Cross-Layer Cooperation is seen as one of the major differences to other Next Generation Grids based on the Open Grid Service Architecture (OGSA) [10] approach. In the next section considerations related to deployment of Mobile Grids and why the approach outlined in the OGSA architecture to model grids as the composition of individual services is not adequate for this are presented.


2017 ◽  
Vol 2017 ◽  
pp. 1-15
Author(s):  
Shireen Tahira ◽  
Muhammad Sher ◽  
Ata Ullah ◽  
Muhammad Imran ◽  
Athanasios V. Vasilakos

Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS) which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM) registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.


Sign in / Sign up

Export Citation Format

Share Document