USA: Limits of Authorized Access

2021 ◽  
Vol 22 (6) ◽  
pp. 170-174
Keyword(s):  
2021 ◽  
pp. 154-165
Author(s):  
Pavel Lozhnikov ◽  
◽  
Samal Zhumazhanova ◽  

Existing asymmetric encryption algorithms involve the storage of a secret private key, authorized access to which, as a rule, is carried out upon presentation of a password. Passwords are vulnerable to social engineering and human factors. Combining biometric security techniques with cryptography is seen as a possible solution to this problem, but any biometric cryptosystem should be able to overcome the small differences that exist between two different implementations of the same biometric parameter. This is especially true for dynamic biometrics, when differences can be caused by a change in the psychophysiological state of the subject. The solution to the problems is the use of a system based on the "biometrics-code" converter, which is configured to issue a user key after presentation of his/her biometric image. In this case, the key is generated in advance in accordance with accepted standards without the use of biometric images. The work presents results on using thermal images of a user for reliable biometric authentication based on a neural network "biometrics-code" converter. Thermal images have recently been used as a new approach in biometric identification systems and are a special type of biometric images that allow us to solve the problem of both the authentication of the subject and the identification of his psychophysiological state. The advantages of thermal imaging are that this technology is now becoming available and mobile, allowing the user to be identified and authenticated in a non-contact and continuous manner. In this paper, an experiment was conducted to verify the images of thermograms of 84 subjects and the following indicators of erroneous decisions were obtained: EER = 0.85 % for users in the "normal"state.


2021 ◽  
Vol 55 (2) ◽  
pp. 84-89
Author(s):  
D.V. Shutov ◽  
◽  
K.M. Arzamasov ◽  
D.V. Drozdov ◽  
A.E. Demkina ◽  
...  

We performed analysis of the available Russian home-use health monitoring devices that can be connected to a smartphone or pad for data transfer. Specifically, we sought for the gadgets capable to register heart rate, blood pressure, ECG, blood glucose, and respiration rate. There are three options of data processing and storage. Namely, these are storage in and authorized access to the manufacturer's site with minimal opportunity of data handling and interpretation; an autonomous server to hold and handle big data sets and, finally, access protocols and templates enabling gadget integration with external services.


Author(s):  
Sarvesh Tanwar Harshita ◽  
Sarvesh Tanwar

Nowadays, e-commerce is one of the most growing sectors in the field of internet. It gives the flexibility to shop online, transact online, transfer money online and many more feature to its internet users. As the growth of e-commerce increases, e-commerce security also comes out a major concern to ensure its user a secure transaction without any fear over the network. Banking sector is one of the most prominent sectors of growth in world of e-commerce, but as its demand increases the security and risks along with it also increases. E-commerce security must ensure major security features of cryptography: privacy, authentication, access control, confidentiality and protect data from un-authorized access. In this chapter, all aspects regarding e-commerce describes from its introduction to its security, countermeasures and an example of doing secure payment from any website.


Author(s):  
Christa Scholtz ◽  
Maryna Polataiko

AbstractIn 1975, the Bourassa government received legal advice that the James Bay Northern Quebec Agreement exceeded provincial jurisdiction. Legal counsel advised the constitutionality of the Agreement be secured through formal constitutional amendment. No such amendment was sought. Based on authorized access to Premier Bourassa’s archived dossier on the Agreement’s negotiation, this article sets out the following: 1) why the provincial government sought to encroach on federal jurisdiction; 2) the strategic means employed to insulate the Agreement from s. 91(24) litigation; and 3) provincial negotiators’ views on how judges would approach the Agreement going forward. This article confirms theoretical expectations about when governments might coordinate to transgress federalism’s division of powers: a high probability that courts would find a transgression occurred, and a high political cost should governments not coordinate on a transgression strategy.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Today's people are moving towards the internet services through cloud computing to acquire their required service, but they have less confidence about cloud computing because all the tasks are handled by the service provider. Cloud system provides features to the owner to store their data on some remote locations and allow only authorized users to access their data according to their access capability. Data security becomes particularly serious in the cloud computing environment because data are scattered in different machines and storage devices including servers, PCs, and various mobile devices such as smart phones. To make the cloud computing be adopted by enterprise, the security concerns of users should be rectified first to make cloud environment trustworthy. The trustworthy environment is the basic prerequisite to win the confidence of users to adopt this technology. However, there are various security concerns that need to be taken care of regarding the trust maintenance between various parties, authorized access of confidential data, data storage privacy, and integrity.


2016 ◽  
Vol 2016 ◽  
pp. 1-12 ◽  
Author(s):  
Imtiaz Parvez ◽  
M. G. S. Sriyananda ◽  
İsmail Güvenç ◽  
Mehdi Bennis ◽  
Arif Sarwat

The surge of mobile devices such as smartphone and tablets requires additional capacity. To achieve ubiquitous and high data rate Internet connectivity, effective spectrum sharing and utilization of the wireless spectrum carry critical importance. In this paper, we consider the use of unlicensed LTE (LTE-U) technology in the 3.5 GHz Citizens Broadband Radio Service (CBRS) band and develop a multiarmed bandit (MAB) based spectrum sharing technique for a smooth coexistence with WiFi. In particular, we consider LTE-U to operate as a General Authorized Access (GAA) user; hereby MAB is used to adaptively optimize the transmission duty cycle of LTE-U transmissions. Additionally, we incorporate downlink power control which yields a high energy efficiency and interference suppression. Simulation results demonstrate a significant improvement in the aggregate capacity (approximately 33%) and cell-edge throughput of coexisting LTE-U and WiFi networks for different base station densities and user densities.


Sign in / Sign up

Export Citation Format

Share Document