Optimal Mining on Security Labels in Multilevel Security System

2011 ◽  
Vol 22 (5) ◽  
pp. 1020-1030
Author(s):  
Zhi YANG ◽  
Shu-Yuan JIN ◽  
Mi-Yi DUAN ◽  
Bin-Xing FANG
Author(s):  
Santosh Kumar Sharma ◽  
Bonomali Khuntia

The entire world is running behind the smart technology to accomplish the daily needs in a smart way such as smart farming, smart irrigation system, smart transportation system, smart medical management, handling of smart home appliances, smart security, etc. Smart technology is the soul property of internet services and accessing data from virtual servers, which raises the alarm of security vulnerability and threats. In recommended system we have focused on application layer security which are concerned with application interface and queue manager for service exchange. As application layer is the closest to end user and produces the big threat to the application platform it motivates us to recommend strong multilevel security system to identify the different activity of handlers and identify their roles to enroute of accessing confidential data services. Subsequently, our work is to assure that every user should have an authentication key with specific privileges to get the desired information. In focus, we see the security management by integrating the Kerberos authentication protocol with honey encryption technique to provide strong multilevel security system.


Cash machines and bank cards are currently being used with the ultimate purpose of currency trades and agree a crucial operation in exchange. For eg, the shortcomings of the current validation scheme, the secret key and the Security code triggered a leakage of data put away in ATM payment card that resulted in the loss in cash in ledger and personal data misuse. In order to overcome this vulnerability of theft during cash transactions, it intend to use customers ' fingerprints as a hidden term included with once hidden expression. The consumer will have the right to carry on for exchange after accepted confirmation. Every individual's distinctive biometric label is one of its kind and unchangeable


2018 ◽  
Vol 7 (2.24) ◽  
pp. 259
Author(s):  
Karthikeyan M ◽  
Gowrishankar. KA ◽  
Rajith Sekar. G ◽  
E Elamaran ◽  
B Sudhakar

In this modern world security has become a major concern in securing a particular area such as banks, institution, temple premises etc.  The existing system can be easily broken either by hacking the password or by duplicating entry cards.  There are some security system which are very difficult to break but they are neither cost efficient nor easily affordable.  We proposed a strong secure and affordable system using RFID, PIN lock and face recognition using raspberry pi3.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document